Skip to content

Commit 356191a

Browse files
authored
Merge pull request #18194 from MicrosoftDocs/main
6/12/2025 PM Publish
2 parents 997663a + 665b149 commit 356191a

10 files changed

+156
-30
lines changed

AKS-Arc/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,8 @@
55
items:
66
- name: What is AKS enabled by Azure Arc?
77
href: aks-overview.md
8+
- name: Compare AKS across platforms
9+
href: aks-platforms-compare.md
810
- name: Supported Kubernetes versions
911
href: supported-kubernetes-versions.md
1012
- name: Data collection

AKS-Arc/aks-platforms-compare.md

Lines changed: 128 additions & 0 deletions
Large diffs are not rendered by default.

AKS-Arc/kubernetes-monitor-audit-events.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Monitor Kubernetes audit events in AKS enabled by Azure Arc
33
description: Learn how to create a diagnostic setting to access Kubernetes audit logs.
44
author: sethmanheim
55
ms.topic: how-to
6-
ms.date: 05/08/2024
6+
ms.date: 06/12/2025
77
ms.author: sethm
88
ms.lastreviewed: 02/26/2024
99
ms.reviewer: guanghu
@@ -18,7 +18,7 @@ You can access Kubernetes audit logs in Kubernetes control plane logs. Control p
1818

1919
## Create a diagnostic setting
2020

21-
Before creating the diagnostic setting, install the **Arc K8S** extension, which enables log collection from the AKS cluster.
21+
Before you create the diagnostic setting, install the **Arc K8S** extension, which enables log collection from the AKS cluster.
2222

2323
Install the Arc K8S extension by running the following command:
2424

@@ -56,4 +56,4 @@ az k8s-extension delete -g <resouerce-group-name> -c <cluster-name> --cluster-ty
5656

5757
## Next steps
5858

59-
[Monitor Kubernetes object events](kubernetes-monitor-object-events.md)
59+
[Monitor Kubernetes object events](kubernetes-monitor-object-events.md)

azure-local/manage/azure-enhanced-management-managed-identity.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use enhanced Azure management for Azure Local. This en
44
ms.topic: article
55
author: alkohli
66
ms.author: alkohli
7-
ms.date: 05/12/2023
7+
ms.date: 06/10/2025
88
---
99

1010
# Enhanced management of Azure Local from Azure
@@ -30,7 +30,7 @@ The managed identity serves as an identity for the various components of your ma
3030

3131
For more information, see [Monitor Azure Local with Azure Monitor Insights](./monitor-single-23h2.md).
3232

33-
- **Protection of VM workloads via Azure Site Recovery** - You can protect your business critical VM workloads running on Azure Local by replicating the VMs using the Azure Site Recovery agent which is deployed as an Arc for Server extension. The Azure Local managed identity is used to download a key credential file from Azure. This file lets the agent know which service to talk to and which Recovery services vault to communicate with. This mechanism allows us to scope the access to the Recovery services vault to only the applicable Azure Local.
33+
- **Protection of VM workloads via Azure Site Recovery** - You can protect your business critical virtual machine (VM) workloads running on Azure Local by replicating the VMs using the Azure Site Recovery agent which is deployed as an Arc for Server extension. The Azure Local managed identity is used to download a key credential file from Azure. This file lets the agent know which service to talk to and which Recovery services vault to communicate with. This mechanism allows us to scope the access to the Recovery services vault to only the applicable Azure Local.
3434

3535
The Arc for Server extension uses the system managed identity to download the key credential file to every machine of the system. If a new machine is added to your system, Azure Local automatically triggers the installation of Arc for Server extension for Azure Site Recovery on the new machine. In the absence of managed identity, this was previously a manual step that required you to install the agent to each machine that was added to the system.
3636

@@ -43,7 +43,7 @@ With this feature enhancement, the following actions can be initiated from Azure
4343

4444
## Enable enhanced management
4545

46-
To enable the enhanced management feature, you will need to install the latest cumulative update for Azure Local, version 22H2 and rerun registration for your system.
46+
To enable the enhanced management feature, you'll need to install the latest cumulative update for Azure Local, version 22H2 and rerun registration for your system.
4747

4848
## Prerequisites
4949

@@ -73,15 +73,15 @@ For systems running version 22H2, to enable Azure management and managed identit
7373
Update-Module -Name Az.StackHCI
7474
```
7575
76-
1. Skip this step and go to the next step if your system is already registered. If your system has not been previously registered to Azure, [register your system with Azure](../deploy/register-with-azure.md). The registration process configures a managed identity and Azure Service Bus to enable the new management feature.
77-
1. If the system is already registered to Azure, rerun the registration. Use of `RepairRegistration` parameter will help configure a managed identity and Azure Service Bus while retaining other information such as resource name, resource group and other settings.
76+
1. Skip this step and go to the next step if your system is already registered. If your system hasn't been previously registered to Azure, [register your system with Azure](../deploy/register-with-azure.md). The registration process configures a managed identity and Azure Service Bus to enable the new management feature.
77+
1. If the system is already registered to Azure, rerun the registration. Use of the `RepairRegistration` parameter helps configure a managed identity and Azure Service Bus while retaining other information such as resource name, resource group, and other settings.
7878
7979
```powershell
8080
Register-AzStackHCI -SubscriptionId "<subscription_ID>" -RepairRegistration
8181
```
8282
8383
> [!NOTE]
84-
> The registration fails if you use an older version, earlier than 1.4.1 for your `Az.StackHCI` PowerShell module. The updated module is backward compatible and will run on OS versions with or without the new feature update installed.
84+
> The registration fails if you use an older version, earlier than 1.4.1 for your `Az.StackHCI` PowerShell module. The updated module is backward compatible and runs on OS versions with or without the new feature update installed.
8585
8686
8787
## Next steps

azure-local/manage/trusted-launch-vm-overview.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,8 +42,6 @@ Trusted launch is a security type that can be specified when you create Azure Lo
4242

4343
- VM live migration network traffic isn't encrypted. We strongly recommend that you enable a network layer encryption technology such as IPsec to protect live migration network traffic.
4444

45-
<!--- VM live migration network traffic is not encrypted. We strongly recommend that you enable IPsec to protect live migration network traffic. For more information, see [Network Recommendations for a Hyper-V Cluster](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn550728(v=ws.11)#How_to_isolate_the_network_traffic_on_a_Hyper-V_cluster).-->
46-
4745
## Guest operating system images
4846

4947
All Windows 11 images (excluding 24H2 Windows 11 SKUs) and Windows Server 2022 images from Azure Marketplace supported by Azure Local VMs are supported. See [Create Azure Local VM image using Azure Marketplace images](/azure-stack/hci/manage/virtual-machine-image-azure-marketplace?tabs=azurecli) for a list of all supported Windows 11 images.
-55.7 KB
Loading

azure-local/migrate/migrate-azure-migrate.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Migrate Hyper V VMs to Azure Local using Azure Migrate (preview)
33
description: Learn about how to to migrate Windows and Linux VMs to your Azure Local instance using Azure Migrate (preview).
44
author: alkohli
55
ms.topic: how-to
6-
ms.date: 10/31/2024
6+
ms.date: 06/12/2025
77
ms.author: alkohli
88
ms.reviewer: alkohli
99
ms.custom: linux-related-content
@@ -21,8 +21,8 @@ This article describes how to migrate Hyper-V virtual machines (VMs) to Azure Lo
2121

2222
Before you migrate your VMs:
2323

24-
- Make sure that you have replicated the VM on your Azure Local instance. To replicate a VM, use the instructions in [Replicate Hyper-V VMs to Azure Local using Azure Migrate](migrate-hyperv-replicate.md).
25-
- Make sure the replication has completed and the migration status is **Ready to migrate**.
24+
- Make sure that you replicate the VM on your Azure Local instance. To replicate a VM, use the instructions in [Replicate Hyper-V VMs to Azure Local using Azure Migrate](migrate-hyperv-replicate.md).
25+
- Make sure the replication is completed and that the migration status is **Ready to migrate**.
2626

2727

2828
## Migrate VMs
@@ -69,7 +69,7 @@ Once the migration is complete, the VMs are running on your Azure Local instance
6969
## Verify and complete migration
7070

7171
> [!IMPORTANT]
72-
> After verifying the status of the migrated VM, be sure to **complete migration** as detailed below. Failing to do so may lead to unexpected behavior.
72+
> After verifying the status of the migrated VM, be sure to **complete migration** as follows. Failing to do so may lead to unexpected behavior.
7373
7474
1. In the Azure portal, go to your Azure Local resource, then select **Virtual machines**.
7575
1. In the list of VMs in the right-pane, verify that the VMs that you migrated are present.
@@ -98,19 +98,19 @@ Once the migration is complete, the VMs are running on your Azure Local instance
9898

9999
:::image type="content" source="./media/migrate-azure-migrate/complete-migration-virtual-machine-3.png" alt-text="Screenshot of confirmation to complete migration in Azure portal."lightbox="./media/migrate-azure-migrate/complete-migration-virtual-machine-3.png":::
100100

101-
The **Complete migrate** action starts the **Delete protected item** job that you can track from the  **Jobs**  page. This job will only clean up the replication by deleting the delete protected item job - this will not affect your migrated VM.
101+
The **Complete migrate** action starts the **Delete protected item** job that you can track from the  **Jobs**  page. This job only cleans up the replication by deleting the delete protected item job - this won't affect your migrated VM.
102102

103103
:::image type="content" source="./media/migrate-azure-migrate/complete-migration-virtual-machine-4.png" alt-text="Screenshot of Jobs page with deletion job selected in Azure portal."lightbox="./media/migrate-azure-migrate/complete-migration-virtual-machine-4.png":::
104104

105-
Completing the migration or deleting the protected item will automatically remove any leftover seed files, such as the seed.iso file attached to the migrated VM and seed disks used during replication. These files can occupy significant space on the target Azure Local system, so it's important to finalize the migration after verifying the VMs. If migrations are not completed, these files will continue to occupy space on the target system.
105+
Completing the migration or deleting the protected item will automatically remove any leftover seed files, such as the seed.iso file attached to the migrated VM and seed disks used during replication. These files can occupy significant space on the target Azure Local system, so it's important to finalize the migration after verifying the VMs. If migrations aren't completed, these files continue to occupy space on the target system.
106106

107-
After the migrate resource is deleted, it is also removed from the **Replications** view. You'll also see the migrated VM job disappear from the **Replications** view.
107+
After the migrate resource is deleted, it's also removed from the **Replications** view. You also see the migrated VM job disappear from the **Replications** view.
108108

109109
:::image type="content" source="./media/migrate-azure-migrate/complete-migration-virtual-machine-5.png" alt-text="Screenshot of Replications page with VM not showing in the list in Azure portal."lightbox="./media/migrate-azure-migrate/complete-migration-virtual-machine-5.png":::
110110

111111
## Clean up
112112

113-
Once you have verified that migration is complete and no more machines need to be migrated, the last step is to clean up. Cleanup requires deletion of the following resources created during migration:
113+
Once you verify that migration is complete and no more machines need to be migrated, the last step is to clean up. Cleanup requires deletion of the following resources created during migration:
114114

115115
- Source VMs and the associated VM disks from the Hyper-V server and the Failover Cluster Manager.
116116
- Source and target appliance VMs.

azure-local/overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,6 @@ Customers often choose Azure Local in the following scenarios.
7777
| Highly performant SQL Server | Azure Local provides an additional layer of resiliency to highly available, mission-critical Always On availability groups-based deployments of SQL Server. This approach also offers extra benefits associated with the single-vendor approach, including simplified support and performance optimizations built into the underlying platform. To learn more, see [Deploy SQL Server on Azure Local](./deploy/sql-server-23h2.md). |
7878
| Trusted enterprise virtualization | Azure Local satisfies the trusted enterprise virtualization requirements through its built-in support for Virtualization-based Security (VBS). VBS relies on Hyper-V to implement the mechanism referred to as virtual secure mode, which forms a dedicated, isolated memory region within its guest VMs. By using programming techniques, it's possible to perform designated, security-sensitive operations in this dedicated memory region while blocking access to it from the host OS. This considerably limits potential vulnerability to kernel-based exploits. To learn more, see [About Trusted Launch for Azure Local VMs enabled by Arc](./manage/trusted-launch-vm-overview.md). |
7979
| Scale-out storage | Storage Spaces Direct is a core technology of Azure Local that uses industry-standard servers with locally attached drives to offer high availability, performance, and scalability. Using Storage Spaces Direct results in significant cost reductions compared with competing offers based on storage area network (SAN) or network-attached storage (NAS) technologies. These benefits result from an innovative design and a wide range of enhancements, such as persistent read/write cache drives, mirror-accelerated parity, nested resiliency, and deduplication. |
80-
| Disaster recovery for virtualized workloads | A stretched cluster of Azure Local (functionality only available in Azure Stack HCI OS, version 22H2) provides automatic failover of virtualized workloads to a secondary site following a primary site failure. Synchronous replication ensures crash consistency of VM disks. |
8180
| Data center consolidation and modernization | Refreshing and consolidating aging virtualization hosts with Azure Local can improve scalability and make your environment easier to manage and secure. It's also an opportunity to retire legacy SAN storage to reduce footprint and total cost of ownership. Operations and systems administration are simplified with unified tools and interfaces and a single point of support. |
8281
| Branch office and edge | For branch office and edge workloads, you can minimize infrastructure costs by deploying two-node clusters with inexpensive witness options, such as a cloud witness. Another factor that contributes to the lower cost of two-node clusters is support for switchless networking, which relies on crossover cable between cluster nodes instead of more expensive high-speed switches. Customers can also centrally view remote Azure Local deployments in the Azure portal. To learn more, see [Deploy branch office and edge on Azure Local](deploy/branch-office-edge.md). |
8382

azure-local/whats-new.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -123,11 +123,10 @@ This release has the following features and improvements:
123123

124124
The following preview features aren't supported for Azure Local in Azure Government cloud:
125125

126-
- [Azure Arc Gateway](./deploy/deployment-azure-arc-gateway-overview.md).
127-
- [Deploy using local identity with Key Vault](./deploy/deployment-local-identity-with-key-vault.md).
128-
- [Azure Site Recovery](./manage/azure-site-recovery.md).
129-
- [Windows Admin Center in Azure portal](/windows-server/manage/windows-admin-center/azure/manage-vm).
130-
<!--- [Azure Backup](/backup/back-up-azure-stack-hyperconverged-infrastructure-virtual-machines).-->
126+
- [Azure Arc Gateway](./deploy/deployment-azure-arc-gateway-overview.md).
127+
- [Deploy using local identity with Key Vault](./deploy/deployment-local-identity-with-key-vault.md).
128+
- [Azure Site Recovery](./manage/azure-site-recovery.md).
129+
- [Windows Admin Center in Azure portal](/windows-server/manage/windows-admin-center/azure/manage-vm).
131130

132131
- **Registration and deployment changes**
133132
- **Extension installation**: Extensions are no longer installed during the registration of Azure Local machines. Instead, the extensions are installed in the machine validation step during the Azure Local instance deployment. For more information, see [Register with Azure Arc via console](./deploy/deployment-arc-register-server-permissions.md) and [Deploy via Azure portal](./deploy/deploy-via-portal.md).

azure-stack/operator/azure-site-recovery-capacity-planning.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about capacity planning for Azure Site Recovery.
44
author: ronmiab
55
ms.author: robess
66
ms.topic: conceptual
7-
ms.date: 08/12/2024
7+
ms.date: 06/10/2025
88
ms.reviewer: rtiberiu
99
ms.lastreviewed: 04/15/2024
1010
---
@@ -79,7 +79,7 @@ The target environment requires one Azure Site Recovery vault to be created for
7979
Installation of Azure Site Recovery on Azure Stack Hub requires that you install the Site Recovery Resource Provider (RP).
8080

8181
> [!NOTE]
82-
> With Microsoft.SiteRecovery-1.2301.2216.2287, Azure Site Recovery on Azure Stack Hub does not require Event Hubs as a dependency.
82+
> With Microsoft.SiteRecovery-1.2301.2216.2287, Azure Site Recovery on Azure Stack Hub doesn't require Event Hubs as a dependency.
8383
8484
:::image type="content" source="../operator/media/azure-site-recovery/capacity-planning/three-services.png" alt-text="Screenshot of the three services to install Azure Site Recovery on Azure Stack Hub."lightbox="media/azure-site-recovery/capacity-planning/three-services.png":::
8585

@@ -117,7 +117,7 @@ When creating the BCDR plan, consider all aspects of the protected workloads. Th
117117

118118
For the scope of Azure Site Recovery on Azure Stack Hub, here's a starting point for calculations, especially for the cache storage account used:
119119

120-
1. If there's a failover, during normal operations, multiply the number of disks replicated by the average RPO. For example, you might have (2MB * 250s). The cache storage account is normally a few KB to 500 MB per disk.
120+
1. If there's a failover, during normal operations, multiply the number of disks replicated by the average RPO. For example, you might have (2 MB * 250 s). The cache storage account is normally a few KB to 500 MB per disk.
121121

122122
2. If there's a failover, given a worst case scenario, multiply the number of disks replicated by the average RPO over a full day.
123123

@@ -151,11 +151,11 @@ The following table is an example of tests run in our environments. You can use
151151
|16 |32 MB/s |4096 | |
152152

153153
> [!NOTE]
154-
> 8Kb is the smallest block size of data Azure Site Recovery supports. Any changes less than 8Kb are treated as 8Kb.
154+
> 8 Kb is the smallest block size of data Azure Site Recovery supports. Any changes less than 8 Kb are treated as 8 Kb.
155155
156156
To test further, we generated a consistent type of workload; for example, consistent storage changes in blocks of 8 Kb that total up to 1 MB/s per disk. This scenario isn't likely in a real workload, given that changes can happen at various times of the day, or in spikes of various sizes.
157157

158-
To replicate these random patterns, we've also tested scenarios with:
158+
To replicate these random patterns, we also tested scenarios with:
159159

160160
- 120 VMs (80 Windows, 40 Linux) protected through the same Azure Site Recovery VM appliance.
161161
- Each VM generating at random intervals, at least twice per hour, random blocks totaling 5 Gb of data across five files.

0 commit comments

Comments
 (0)