You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: AKS-Arc/workload-identity.md
+21-4Lines changed: 21 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,8 @@ description: Learn how to deploy and configure an AKS Arc cluster with workload
4
4
author: sethmanheim
5
5
ms.author: sethm
6
6
ms.topic: how-to
7
-
ms.date: 11/08/2024
7
+
ms.date: 01/23/2025
8
+
ms.reviewer: leslielin
8
9
9
10
---
10
11
@@ -167,16 +168,32 @@ $MSIPrincipalId=$(az identity show --resource-group $resource_group_name --name
167
168
168
169
### Create a Kubernetes service account
169
170
170
-
Create a Kubernetes service account and annotate it with the client ID of the managed identity created in the previous step:
171
+
In this step, you create a Kubernetes service account and annotate it with the client ID of the managed identity you created in the previous step.
172
+
173
+
Use cluster connect to access your cluster from a client device. For more information, see [Access your cluster from a client device](/azure/azure-arc/kubernetes/cluster-connect?tabs=azure-cli%2Cagent-version#access-your-cluster-from-a-client-device):
171
174
172
175
```azurecli
173
176
az connectedk8s proxy -n $aks_cluster_name -g $resource_group_name
174
177
```
175
178
176
-
Open a new window. Copy and paste the following CLI commands:
179
+
Open a new CLI command window. Copy and paste the following commands:
Copy file name to clipboardExpand all lines: azure-local/concepts/compare-windows-server.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 10/21/2024
10
10
11
11
# Compare Azure Local to Windows Server
12
12
13
-
> Applies to: Azure Local, versions 23H2 and 22H2; Windows Server 2022
13
+
> Applies to: Azure Local 2311.2 and later; Windows Server 2022
14
14
15
15
This article explains key differences between Azure Local and Windows Server and provides guidance about when to use each. Both products are actively supported and maintained by Microsoft. Many organizations choose to deploy both as they are intended for different and complementary purposes.
Copy file name to clipboardExpand all lines: azure-local/concepts/datacenter-firewall-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 10/25/2024
10
10
11
11
# What is Datacenter Firewall?
12
12
13
-
> Applies to: Azure Local, versions 23H2 and 22H2; Windows Server 2022, Windows Server 2019, Windows Server 2016
13
+
> Applies to: Azure Local 2311.2 and later; Windows Server 2022, Windows Server 2019, Windows Server 2016
14
14
15
15
Datacenter Firewall is a network layer, 5-tuple (protocol, source and destination port numbers, source and destination IP addresses), stateful, multitenant Software Defined Networking (SDN) firewall. The Datacenter Firewall protects east-west and north-south traffic flows across the network layer of virtual networks and traditional VLAN networks.
Copy file name to clipboardExpand all lines: azure-local/concepts/network-controller-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 10/21/2024
10
10
11
11
# What is Network Controller?
12
12
13
-
> Applies to: Azure Local, versions 23H2 and 22H2; Windows Server 2022, Windows Server 2019, Windows Server 2016
13
+
> Applies to: Azure Local 2311.2 and later; Windows Server 2022, Windows Server 2019, Windows Server 2016
14
14
15
15
Network Controller is the cornerstone of Software Defined Networking (SDN) management. It's a highly scalable server role that provides a centralized, programmable point of automation to manage, configure, monitor, and troubleshoot virtual network infrastructure.
Planning to deploy Network Controller via Windows Admin Center requires a set of virtual machines (VMs) running the Azure Stack HCI operating system. Network Controller is a highly available and scalable server role that requires a minimum of three VMs to provide high availability on your network.
14
+
This article describes how to plan to deploy Network Controller on Azure Local via Windows Admin Center on a set of virtual machines (VMs).
15
+
16
+
Planning to deploy Network Controller via Windows Admin Center requires a set of VMs running the Azure Stack HCI operating system. Network Controller is a highly available and scalable server role that requires a minimum of three VMs to provide high availability on your network.
15
17
16
18
> [!NOTE]
17
19
> We recommend that you deploy Network Controller on its own dedicated VMs.
Copy file name to clipboardExpand all lines: azure-local/concepts/plan-software-defined-networking-infrastructure-23h2.md
+21-21Lines changed: 21 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,32 +4,36 @@ description: This topic provides information on how to plan a Software Defined N
4
4
ms.topic: conceptual
5
5
ms.author: anpaul
6
6
author: AnirbanPaul
7
-
ms.date: 10/18/2024
7
+
ms.date: 01/10/2025
8
+
ms.service: azure-local
8
9
---
9
10
# Plan a Software Defined Network infrastructure for Azure Local, version 23H2
10
11
11
-
> Applies to: Azure Local, versions 23H2; Windows Server 2022, Windows Server 2019, Windows Server 2016
12
+
> Applies to: Azure Local 2311.2 and later; Windows Server 2022, Windows Server 2019, Windows Server 2016
12
13
13
14
Learn about deployment planning for a Software Defined Network (SDN) infrastructure, including hardware and software prerequisites. This topic includes planning requirements for physical and logical network configuration, routing, gateways, network hardware, and more. It also includes considerations on extending an SDN infrastructure and using a phased deployment.
14
15
15
16
## Prerequisites
16
17
17
18
There are several hardware and software prerequisites for an SDN infrastructure, including:
18
19
19
-
-**Security groups and dynamic DNS registration**. You must prepare your datacenter for Network Controller deployment, which requires a set of virtual machines (VMs). Before you can deploy the Network Controller, you must configure security groups and dynamic DNS registration.
20
+
-**Physical network**. You need access to your physical network devices to configure virtual local area networks (VLANs), routing, and the Border Gateway Protocol (BGP). This topic provides instructions for manual switch configuration, and options to use either BGP peering on Layer-3 switches / routers, or a Routing and Remote Access Server (RRAS) virtual machine (VM).
20
21
21
-
To learn more about Network Controller deployment for your datacenter, see [Requirements for Deploying Network Controller](/windows-server/networking/sdn/plan/installation-and-preparation-requirements-for-deploying-network-controller).
22
+
-**Physical compute hosts**. These hosts run Hyper-V and are required to host an SDN infrastructure and tenant VMs. Specific network hardware is required in these hosts for best performance, as described in the next section.
22
23
23
-
-**Physical network**. You need access to your physical network devices to configure virtual local area networks (VLANs), routing, and the Border Gateway Protocol (BGP). This topic provides instructions for manual switch configuration, and options to use either BGP peering on Layer-3 switches / routers, or a Routing and Remote Access Server (RRAS) VM.
24
+
-**Dynamic DNS registration**. This step is optional if Network Controller is deployed on host machines. For deployment on VMs, you must prepare your datacenter and optionally configure dynamic DNS registration.
24
25
25
-
-**Physical compute hosts**. These hosts run Hyper-V and are required to host an SDN infrastructure and tenant VMs. Specific network hardware is required in these hosts for best performance, as described in the next section.
26
+
To learn more about Network Controller deployment for your datacenter, see [Requirements for Deploying Network Controller](/windows-server/networking/sdn/plan/installation-and-preparation-requirements-for-deploying-network-controller).
26
27
27
28
### SDN hardware requirements
28
29
29
30
This section provides hardware requirements for physical switches when planning an SDN environment.
30
31
31
32
#### Switches and routers
32
33
34
+
> [!NOTE]
35
+
> If you're using a switch certified for Azure Local, it'll already meet all the necessary requirements. For more information, see [Network switches for Azure Local](./physical-network-requirements.md#network-switches-for-azure-local).
36
+
33
37
When selecting a physical switch and router for your SDN environment, make sure it supports the following set of capabilities:
34
38
- Switchport MTU settings \(required\)
35
39
- MTU set to >= 1674 bytes \(including L2-Ethernet Header\)
@@ -77,6 +81,8 @@ All physical compute hosts must access the management logical network and the HN
77
81
78
82
The HNV Provider network serves as the underlying physical network for East/West (internal-internal) tenant traffic, North/South (external-internal) tenant traffic, and to exchange BGP peering information with the physical network.
79
83
84
+
HNV Provider network is required only for virtual networks, and not for logical networks.
85
+
80
86
Here's how HNV Provider network allocates IP addresses. Use this to plan your address space for the HNV Provider network.
81
87
82
88
- Allocates two IP addresses to each physical server
@@ -91,7 +97,6 @@ A DHCP server can automatically assign IP addresses for the management network,
91
97
| If... | Then... |
92
98
|:-|:-|
93
99
| The logical networks use VLANs, | the physical compute host must connect to a trunked switch port that has access to the VLANs. It's important to note that the physical network adapters on the computer host must not have any VLAN filtering activated. |
94
-
| You are using Switched-Embedded Teaming (SET) and have multiple Network Interface Card (NIC) team members, such as network adapters, | you must connect all NIC team members for that particular host to the same Layer-2 broadcast domain. |
95
100
| The physical compute host is running additional infrastructure VMs, such as Network Controller, the SLB/Multiplexer (MUX), or Gateway, | ensure that the management logical network has sufficient IP addresses for each hosted VM. Also, ensure that the HNV Provider logical network has sufficient IP addresses to allocate to each SLB/MUX and gateway infrastructure VM. Although IP reservation is managed by the Network Controller, failure to reserve a new IP address due to unavailability may result in duplicate IP addresses on your network. |
96
101
97
102
For information about Hyper-V Network Virtualization (HNV) that you can use to virtualize networks in a Microsoft SDN deployment, see [Hyper-V Network Virtualization](/windows-server/networking/sdn/technologies/hyper-v-network-virtualization/hyper-v-network-virtualization).
@@ -112,10 +117,10 @@ Change the sample IP subnet prefixes and VLAN IDs for your environment.
112
117
| Network name | Subnet | Mask | VLAN ID on trunk | Gateway | Reservation (examples) |
| GRE VIP | 31.30.30.0 | 24 | NA | 31.30.30.1 | 31.30.30.2 – GRE VIP1|
119
124
120
125
## Routing infrastructure
121
126
@@ -137,25 +142,21 @@ You or your network administrator must configure the BGP router peer to accept c
137
142
For more information, see [Border Gateway Protocol (BGP)](/windows-server/remote/remote-access/bgp/border-gateway-protocol-bgp).
138
143
139
144
## Default gateways
140
-
Machines configured to connect to multiple networks, such as the physical hosts, SLB/MUX, and gateway VMs must only have one default gateway configured. Use the following default gateways for the hosts and the infrastructure VMs:
145
+
146
+
Machines configured to connect to multiple networks, such as the physical hosts, SLB/MUX, and gateway VMs must only have one default gateway configured. The SDN installation through Windows Admin Center, SDN Express, or the Azure portal automatically configures the default gateways.
147
+
148
+
Use the following default gateways for the hosts and the infrastructure VMs:
149
+
141
150
- For Hyper-V hosts, use the management network as the default gateway.
142
151
- For Network Controller VMs, use the management network as the default gateway.
143
152
- For SLB/MUX VMs, use the management network as the default gateway.
144
153
- For the gateway VMs, use the HNV Provider network as the default gateway. This should be set on the front-end NIC of the gateway VMs.
145
154
146
-
## Switches and routers
147
-
To help configure your physical switch or router, a set of sample configuration files for a variety of switch models and vendors is available at the [Microsoft SDN GitHub repository](https://github.com/microsoft/SDN/tree/master/SwitchConfigExamples). A readme file and tested command-line interface (CLI) commands for specific switches are provided.
148
-
149
-
For detailed switch and router requirements, see the SDN hardware requirements section above.
150
-
151
155
## Compute
152
156
All Hyper-V hosts must have the appropriate operating system installed, be enabled for Hyper-V, and use an external Hyper-V virtual switch with at least one physical adapter connected to the management logical network. The host must be reachable via a management IP address assigned to the management host vNIC.
153
157
154
158
You can use any storage type that is compatible with Hyper-V, shared, or local.
155
159
156
-
> [!TIP]
157
-
> It is convenient to use the same name for all your virtual switches, but it isn't mandatory. If you plan to use scripts to deploy, see the comment associated with the `vSwitchName` variable in the config.psd1 file.
158
-
159
160
### Host compute requirements
160
161
The following shows the minimum hardware and software requirements for the four physical hosts used in the example deployment.
161
162
@@ -171,7 +172,6 @@ The following shows the requirements for the VM roles.
| SLB/MUX (three nodes) | 8 vCPUs | 8 GB recommended | 75 GB for operating system drive |
173
174
| RAS Gateway<br> (single pool of three nodes<br> gateways, two active, one passive) | 8 vCPUs | 8 GB recommended | 75 GB for operating system drive |
174
-
| RAS Gateway BGP router<br> for SLB/MUX peering<br> (alternatively use ToR switch<br> as BGP Router) | 2 vCPUs | 2 GB | 75 GB for operating system drive |
175
175
176
176
If you use System Center - Virtual Machine Manager (VMM) for deployment, additional infrastructure VM resources are required for VMM and other non-SDN infrastructure. To learn more, see [System requirements for System Center Virtual Machine Manager](/system-center/vmm/system-requirements?preserve-view=true&view=sc-vmm-2019).
0 commit comments