Skip to content

Commit 35521ed

Browse files
author
Manika Dhiman
committed
resolved merge conflicts
2 parents 6459b93 + 3401bc4 commit 35521ed

File tree

249 files changed

+1528
-1877
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

249 files changed

+1528
-1877
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1051,6 +1051,16 @@
10511051
"redirect_url":"/azure-stack/operator/azure-stack-servicing-policy",
10521052
"redirect_document_id":true
10531053
},
1054+
{
1055+
"source_path":"azure-stack/operator/azure-stack-train-and-cert.md",
1056+
"redirect_url":"/azure-stack/operator/index",
1057+
"redirect_document_id":true
1058+
},
1059+
{
1060+
"source_path":"azure-stack/operator/azure-stack-powershell-install.md",
1061+
"redirect_url":"/azure-stack/operator/powershell-install-az-module",
1062+
"redirect_document_id":true
1063+
},
10541064
{
10551065
"source_path":"azure-stack/ruggedized/customer-replaceable-unit/emc-poweredge-tactical-indicators-and-codes.md",
10561066
"redirect_url":"/azure-stack/ruggedized/customer-replaceable-unit/indicators-and-codes",

AKS-Arc/workload-identity.md

Lines changed: 21 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ description: Learn how to deploy and configure an AKS Arc cluster with workload
44
author: sethmanheim
55
ms.author: sethm
66
ms.topic: how-to
7-
ms.date: 11/08/2024
7+
ms.date: 01/23/2025
8+
ms.reviewer: leslielin
89

910
---
1011

@@ -167,16 +168,32 @@ $MSIPrincipalId=$(az identity show --resource-group $resource_group_name --name
167168

168169
### Create a Kubernetes service account
169170

170-
Create a Kubernetes service account and annotate it with the client ID of the managed identity created in the previous step:
171+
In this step, you create a Kubernetes service account and annotate it with the client ID of the managed identity you created in the previous step.
172+
173+
Use cluster connect to access your cluster from a client device. For more information, see [Access your cluster from a client device](/azure/azure-arc/kubernetes/cluster-connect?tabs=azure-cli%2Cagent-version#access-your-cluster-from-a-client-device):
171174

172175
```azurecli
173176
az connectedk8s proxy -n $aks_cluster_name -g $resource_group_name
174177
```
175178

176-
Open a new window. Copy and paste the following CLI commands:
179+
Open a new CLI command window. Copy and paste the following commands:
177180

178181
```azurecli
179-
$yaml = @" apiVersion: v1 kind: ServiceAccount metadata: annotations: azure.workload.identity/client-id: $MSIId name: $SERVICE_ACCOUNT_NAME namespace: $SERVICE_ACCOUNT_NAMESPACE "@ $yaml = $yaml -replace '\$MSIId', $MSIId ` -replace '\$SERVICE_ACCOUNT_NAME', $SERVICE_ACCOUNT_NAME ` -replace '\$SERVICE_ACCOUNT_NAMESPACE', $SERVICE_ACCOUNT_NAMESPACE $yaml | kubectl apply -f -
182+
$yaml = @"
183+
apiVersion: v1
184+
kind: ServiceAccount
185+
metadata:
186+
annotations:
187+
azure.workload.identity/client-id: $MSIId
188+
name: $SERVICE_ACCOUNT_NAME
189+
namespace: $SERVICE_ACCOUNT_NAMESPACE
190+
"@
191+
192+
$yaml = $yaml -replace '\$MSIId', $MSIId `
193+
-replace '\$SERVICE_ACCOUNT_NAME', $SERVICE_ACCOUNT_NAME `
194+
-replace '\$SERVICE_ACCOUNT_NAMESPACE', $SERVICE_ACCOUNT_NAMESPACE
195+
196+
$yaml | kubectl apply -f -
180197
```
181198

182199
The following output shows successful creation of the service account:

azure-local/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -331,11 +331,11 @@ items:
331331
href: manage/manage-arc-virtual-machine-resources.md
332332
- name: Manage VM extensions
333333
href: manage/virtual-machine-manage-extension.md
334-
- name: License Arc VMs
334+
- name: Activate Arc VMs
335335
items:
336336
- name: Azure verification for VMs
337337
href: deploy/azure-verification.md
338-
- name: License Windows Server VMs
338+
- name: Activate Windows Server VMs
339339
href: manage/vm-activate.md
340340
- name: Deploy Windows Server Azure Edition VMs
341341
href: manage/windows-server-azure-edition-23h2.md
@@ -590,6 +590,8 @@ items:
590590
href: migrate/migrate-vmware-migrate.md
591591
- name: Enable guest management
592592
href: migrate/migrate-enable-guest-management.md
593+
- name: Maintain static IP addresses
594+
href: migrate/migrate-maintain-ip-addresses.md
593595
- name: FAQ
594596
href: migrate/migrate-faq.yml
595597
- name: Troubleshoot

azure-local/concepts/compare-windows-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 10/21/2024
1010

1111
# Compare Azure Local to Windows Server
1212

13-
> Applies to: Azure Local, versions 23H2 and 22H2; Windows Server 2022
13+
> Applies to: Azure Local 2311.2 and later; Windows Server 2022
1414
1515
This article explains key differences between Azure Local and Windows Server and provides guidance about when to use each. Both products are actively supported and maintained by Microsoft. Many organizations choose to deploy both as they are intended for different and complementary purposes.
1616

azure-local/concepts/datacenter-firewall-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 10/25/2024
1010

1111
# What is Datacenter Firewall?
1212

13-
> Applies to: Azure Local, versions 23H2 and 22H2; Windows Server 2022, Windows Server 2019, Windows Server 2016
13+
> Applies to: Azure Local 2311.2 and later; Windows Server 2022, Windows Server 2019, Windows Server 2016
1414
1515
Datacenter Firewall is a network layer, 5-tuple (protocol, source and destination port numbers, source and destination IP addresses), stateful, multitenant Software Defined Networking (SDN) firewall. The Datacenter Firewall protects east-west and north-south traffic flows across the network layer of virtual networks and traditional VLAN networks.
1616

azure-local/concepts/gateway-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.custom: kr2b-contr-experiment
1010
---
1111
# What is Remote Access Service (RAS) Gateway for Software Defined Networking?
1212

13-
> Applies to: Azure Local, versions 23H2 and 22H2; Windows Server 2022, Windows Server 2019, Windows Server 2016
13+
> Applies to: Azure Local 2311.2 and later; Windows Server 2022, Windows Server 2019, Windows Server 2016
1414
1515
This article provides an overview of Remote Access Service (RAS) Gateway for Software Defined Networking (SDN) in Azure Local and Windows Server.
1616

azure-local/concepts/network-controller-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 10/21/2024
1010

1111
# What is Network Controller?
1212

13-
> Applies to: Azure Local, versions 23H2 and 22H2; Windows Server 2022, Windows Server 2019, Windows Server 2016
13+
> Applies to: Azure Local 2311.2 and later; Windows Server 2022, Windows Server 2019, Windows Server 2016
1414
1515
Network Controller is the cornerstone of Software Defined Networking (SDN) management. It's a highly scalable server role that provides a centralized, programmable point of automation to manage, configure, monitor, and troubleshoot virtual network infrastructure.
1616

azure-local/concepts/plan-network-controller-deployment.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,16 @@ description: This article covers how to plan to deploy Network Controller on Azu
44
author: AnirbanPaul
55
ms.author: anpaul
66
ms.topic: conceptual
7-
ms.date: 11/06/2024
7+
ms.date: 01/22/2025
88
---
99

1010
# Plan to deploy Network Controller on Azure Local, version 23H2
1111

1212
[!INCLUDE [applies-to](../includes/hci-applies-to-23h2.md)]
1313

14-
Planning to deploy Network Controller via Windows Admin Center requires a set of virtual machines (VMs) running the Azure Stack HCI operating system. Network Controller is a highly available and scalable server role that requires a minimum of three VMs to provide high availability on your network.
14+
This article describes how to plan to deploy Network Controller on Azure Local via Windows Admin Center on a set of virtual machines (VMs).
15+
16+
Planning to deploy Network Controller via Windows Admin Center requires a set of VMs running the Azure Stack HCI operating system. Network Controller is a highly available and scalable server role that requires a minimum of three VMs to provide high availability on your network.
1517

1618
> [!NOTE]
1719
> We recommend that you deploy Network Controller on its own dedicated VMs.

azure-local/concepts/plan-software-defined-networking-infrastructure-23h2.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -4,32 +4,36 @@ description: This topic provides information on how to plan a Software Defined N
44
ms.topic: conceptual
55
ms.author: anpaul
66
author: AnirbanPaul
7-
ms.date: 10/18/2024
7+
ms.date: 01/10/2025
8+
ms.service: azure-local
89
---
910
# Plan a Software Defined Network infrastructure for Azure Local, version 23H2
1011

11-
> Applies to: Azure Local, versions 23H2; Windows Server 2022, Windows Server 2019, Windows Server 2016
12+
> Applies to: Azure Local 2311.2 and later; Windows Server 2022, Windows Server 2019, Windows Server 2016
1213
1314
Learn about deployment planning for a Software Defined Network (SDN) infrastructure, including hardware and software prerequisites. This topic includes planning requirements for physical and logical network configuration, routing, gateways, network hardware, and more. It also includes considerations on extending an SDN infrastructure and using a phased deployment.
1415

1516
## Prerequisites
1617

1718
There are several hardware and software prerequisites for an SDN infrastructure, including:
1819

19-
- **Security groups and dynamic DNS registration**. You must prepare your datacenter for Network Controller deployment, which requires a set of virtual machines (VMs). Before you can deploy the Network Controller, you must configure security groups and dynamic DNS registration.
20+
- **Physical network**. You need access to your physical network devices to configure virtual local area networks (VLANs), routing, and the Border Gateway Protocol (BGP). This topic provides instructions for manual switch configuration, and options to use either BGP peering on Layer-3 switches / routers, or a Routing and Remote Access Server (RRAS) virtual machine (VM).
2021

21-
To learn more about Network Controller deployment for your datacenter, see [Requirements for Deploying Network Controller](/windows-server/networking/sdn/plan/installation-and-preparation-requirements-for-deploying-network-controller).
22+
- **Physical compute hosts**. These hosts run Hyper-V and are required to host an SDN infrastructure and tenant VMs. Specific network hardware is required in these hosts for best performance, as described in the next section.
2223

23-
- **Physical network**. You need access to your physical network devices to configure virtual local area networks (VLANs), routing, and the Border Gateway Protocol (BGP). This topic provides instructions for manual switch configuration, and options to use either BGP peering on Layer-3 switches / routers, or a Routing and Remote Access Server (RRAS) VM.
24+
- **Dynamic DNS registration**. This step is optional if Network Controller is deployed on host machines. For deployment on VMs, you must prepare your datacenter and optionally configure dynamic DNS registration.
2425

25-
- **Physical compute hosts**. These hosts run Hyper-V and are required to host an SDN infrastructure and tenant VMs. Specific network hardware is required in these hosts for best performance, as described in the next section.
26+
To learn more about Network Controller deployment for your datacenter, see [Requirements for Deploying Network Controller](/windows-server/networking/sdn/plan/installation-and-preparation-requirements-for-deploying-network-controller).
2627

2728
### SDN hardware requirements
2829

2930
This section provides hardware requirements for physical switches when planning an SDN environment.
3031

3132
#### Switches and routers
3233

34+
> [!NOTE]
35+
> If you're using a switch certified for Azure Local, it'll already meet all the necessary requirements. For more information, see [Network switches for Azure Local](./physical-network-requirements.md#network-switches-for-azure-local).
36+
3337
When selecting a physical switch and router for your SDN environment, make sure it supports the following set of capabilities:
3438
- Switchport MTU settings \(required\)
3539
- MTU set to >= 1674 bytes \(including L2-Ethernet Header\)
@@ -77,6 +81,8 @@ All physical compute hosts must access the management logical network and the HN
7781

7882
The HNV Provider network serves as the underlying physical network for East/West (internal-internal) tenant traffic, North/South (external-internal) tenant traffic, and to exchange BGP peering information with the physical network.
7983

84+
HNV Provider network is required only for virtual networks, and not for logical networks.
85+
8086
Here's how HNV Provider network allocates IP addresses. Use this to plan your address space for the HNV Provider network.
8187

8288
- Allocates two IP addresses to each physical server
@@ -91,7 +97,6 @@ A DHCP server can automatically assign IP addresses for the management network,
9197
| If... | Then... |
9298
|:-|:-|
9399
| The logical networks use VLANs, | the physical compute host must connect to a trunked switch port that has access to the VLANs. It's important to note that the physical network adapters on the computer host must not have any VLAN filtering activated. |
94-
| You are using Switched-Embedded Teaming (SET) and have multiple Network Interface Card (NIC) team members, such as network adapters, | you must connect all NIC team members for that particular host to the same Layer-2 broadcast domain. |
95100
| The physical compute host is running additional infrastructure VMs, such as Network Controller, the SLB/Multiplexer (MUX), or Gateway, | ensure that the management logical network has sufficient IP addresses for each hosted VM. Also, ensure that the HNV Provider logical network has sufficient IP addresses to allocate to each SLB/MUX and gateway infrastructure VM. Although IP reservation is managed by the Network Controller, failure to reserve a new IP address due to unavailability may result in duplicate IP addresses on your network. |
96101

97102
For information about Hyper-V Network Virtualization (HNV) that you can use to virtualize networks in a Microsoft SDN deployment, see [Hyper-V Network Virtualization](/windows-server/networking/sdn/technologies/hyper-v-network-virtualization/hyper-v-network-virtualization).
@@ -112,10 +117,10 @@ Change the sample IP subnet prefixes and VLAN IDs for your environment.
112117
| Network name | Subnet | Mask | VLAN ID on trunk | Gateway | Reservation (examples) |
113118
|:-|:-|:-|:-|:-|:-|
114119
| Management | 10.184.108.0 | 24 | 7 | 10.184.108.1 | 10.184.108.1 - Router<br> 10.184.108.4 - Network Controller<br> 10.184.108.10 - Compute host 1<br> 10.184.108.11 - Compute host 2<br> 10.184.108.X - Compute host X |
115-
| HNV Provider | 10.10.56.0 | 23 | 11 | 10.10.56.1 | 10.10.56.1 - Router<br> 10.10.56.2 - SLB/MUX1<br> 10.10.56.5 - Gateway1 |
116-
| Public VIP | 41.40.40.0 | 27 | NA | 41.40.40.1 | 41.40.40.1 - Router<br> 41.40.40.3 - IPSec S2S VPN VIP |
117-
| Private VIP | 20.20.20.0 | 27 | NA | 20.20.20.1 | 20.20.20.1 - Default GW (router) |
118-
| GRE VIP | 31.30.30.0 | 24 | NA | 31.30.30.1 | 31.30.30.1 - Default GW |
120+
| HNV Provider | 10.10.56.0 | 23 | 11 | 10.10.56.1 | 10.10.56.1 - Router<br> 10.10.56.2 - SLB/MUX1<br> 10.10.56.5 - Gateway1<br> 10.10.56.6, 10.10.56.7 – Compute host 1 |
121+
| Public VIP | 41.40.40.0 | 27 | NA | 41.40.40.1 | 41.40.40.2 – Public VIP1<br> 41.40.40.3 - IPSec S2S VPN VIP |
122+
| Private VIP | 20.20.20.0 | 27 | NA | 20.20.20.1 | 20.20.20.2 – Private VIP1 |
123+
| GRE VIP | 31.30.30.0 | 24 | NA | 31.30.30.1 | 31.30.30.2 – GRE VIP1 |
119124

120125
## Routing infrastructure
121126

@@ -137,25 +142,21 @@ You or your network administrator must configure the BGP router peer to accept c
137142
For more information, see [Border Gateway Protocol (BGP)](/windows-server/remote/remote-access/bgp/border-gateway-protocol-bgp).
138143

139144
## Default gateways
140-
Machines configured to connect to multiple networks, such as the physical hosts, SLB/MUX, and gateway VMs must only have one default gateway configured. Use the following default gateways for the hosts and the infrastructure VMs:
145+
146+
Machines configured to connect to multiple networks, such as the physical hosts, SLB/MUX, and gateway VMs must only have one default gateway configured. The SDN installation through Windows Admin Center, SDN Express, or the Azure portal automatically configures the default gateways.
147+
148+
Use the following default gateways for the hosts and the infrastructure VMs:
149+
141150
- For Hyper-V hosts, use the management network as the default gateway.
142151
- For Network Controller VMs, use the management network as the default gateway.
143152
- For SLB/MUX VMs, use the management network as the default gateway.
144153
- For the gateway VMs, use the HNV Provider network as the default gateway. This should be set on the front-end NIC of the gateway VMs.
145154

146-
## Switches and routers
147-
To help configure your physical switch or router, a set of sample configuration files for a variety of switch models and vendors is available at the [Microsoft SDN GitHub repository](https://github.com/microsoft/SDN/tree/master/SwitchConfigExamples). A readme file and tested command-line interface (CLI) commands for specific switches are provided.
148-
149-
For detailed switch and router requirements, see the SDN hardware requirements section above.
150-
151155
## Compute
152156
All Hyper-V hosts must have the appropriate operating system installed, be enabled for Hyper-V, and use an external Hyper-V virtual switch with at least one physical adapter connected to the management logical network. The host must be reachable via a management IP address assigned to the management host vNIC.
153157

154158
You can use any storage type that is compatible with Hyper-V, shared, or local.
155159

156-
> [!TIP]
157-
> It is convenient to use the same name for all your virtual switches, but it isn't mandatory. If you plan to use scripts to deploy, see the comment associated with the `vSwitchName` variable in the config.psd1 file.
158-
159160
### Host compute requirements
160161
The following shows the minimum hardware and software requirements for the four physical hosts used in the example deployment.
161162

@@ -171,7 +172,6 @@ The following shows the requirements for the VM roles.
171172
| Network Controller (three nodes) | 4 vCPUs | 4 GB minimum<br> (8 GB recommended) | 75 GB for operating system drive |
172173
| SLB/MUX (three nodes) | 8 vCPUs | 8 GB recommended | 75 GB for operating system drive |
173174
| RAS Gateway<br> (single pool of three nodes<br> gateways, two active, one passive) | 8 vCPUs | 8 GB recommended | 75 GB for operating system drive |
174-
| RAS Gateway BGP router<br> for SLB/MUX peering<br> (alternatively use ToR switch<br> as BGP Router) | 2 vCPUs | 2 GB | 75 GB for operating system drive |
175175

176176
If you use System Center - Virtual Machine Manager (VMM) for deployment, additional infrastructure VM resources are required for VMM and other non-SDN infrastructure. To learn more, see [System requirements for System Center Virtual Machine Manager](/system-center/vmm/system-requirements?preserve-view=true&view=sc-vmm-2019).
177177

0 commit comments

Comments
 (0)