You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-local/concepts/single-server-clusters.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: robess
6
6
ms.topic: overview
7
7
ms.reviewer: kimlam
8
8
ms.lastreviewed: 04/01/2024
9
-
ms.date: 04/01/2024
9
+
ms.date: 04/03/2025
10
10
---
11
11
12
12
# Using Azure Stack HCI on a single server
@@ -22,10 +22,10 @@ This article provides an overview of running Azure Stack HCI on a single server,
22
22
Along with the benefits mentioned, there are some initial limitations to recognize.
23
23
24
24
- You must use PowerShell to create the single-node cluster and enable Storage Spaces Direct.
25
-
- Single servers must use only a single drive type: Non-volatile Memory Express (NVMe) or Solid-State (SSD) drives.
25
+
- Single servers must use only a single drive type: Nonvolatile Memory Express (NVMe) or Solid-State (SSD) drives.
26
26
- Stretched (dual-site) clusters aren't supported with individual servers (stretched clusters require a minimum of two servers in each site).
27
27
- To install updates for single-node clusters, see [Updating single-node clusters](../deploy/single-server.md#updating-single-node-clusters). For solution updates (such as driver and firmware updates), see your solution vendor.
28
-
- Operating system or other updates requiring a restart cause downtime to running virtual machines (VMs) because there isn't another running cluster node to move the VMs to. We recommend manually shutting down the VMs before restarting to ensure that the VMs have enough time to shut down prior to the restart.
28
+
- Operating system or other updates requiring a restart cause downtime to running virtual machines (VMs) because there isn't another running cluster node to move the VMs to. We recommend manually shutting down the VMs before restarting to ensure that the VMs have enough time to shut down before the restart.
29
29
30
30
## Prerequisites
31
31
@@ -72,11 +72,11 @@ The following table describes currently known issues for single-node clusters. T
72
72
73
73
|Issue | Notes|
74
74
|-----------|---------------|
75
-
|SBL cache isn't supported in single-node clusters. | All-flash, flat configuration with Non-volatile Memory Express (NVMe) or Solid-State Drives (SSD) must be used. |
75
+
|SBL cache isn't supported in single-node clusters. | All-flash, flat configuration with Nonvolatile Memory Express (NVMe) or Solid-State Drives (SSD) must be used. |
76
76
|Windows Admin Center doesn't support creating single-node clusters. |[Deploy single server with PowerShell](../deploy/create-cluster-powershell.md). |
77
-
|Windows Admin Center cosmetic user interface (UI) changes needed. | Doesn't limit Live Migration within the same cluster; allows affinity rules to be created, etc. Actions will fail without any harm. |
77
+
|Windows Admin Center cosmetic user interface (UI) changes needed. | Doesn't limit Live Migration within the same cluster; allows affinity rules to be created, etc. Actions fail without any harm. |
78
78
|Windows Admin Center pause server fails since it tries to drain the server. | Utilize PowerShell to pause (suspend the server). |
79
-
|Cluster Aware Updating (CAU) doesn't support single-node clusters in 21H2. You'll need to update to 22H2. | Update using Windows Admin Center (through server manager), PowerShell, or the Server Configuration tool (SConfig). [Learn more](../deploy/single-server.md#updating-single-node-clusters)|
79
+
|Cluster Aware Updating (CAU) doesn't support single-node clusters in 21H2. You need to update to 22H2. | Update using Windows Admin Center (through server manager), PowerShell, or the Server Configuration tool (SConfig). [Learn more](../deploy/single-server.md#updating-single-node-clusters)|
Copy file name to clipboardExpand all lines: azure-local/deploy/deployment-arc-register-server-permissions.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Register your Azure Local machines with Azure Arc and assign permissions
3
3
description: Learn how to Register your Azure Local machines with Azure Arc and assign permissions for deployment.
4
4
author: alkohli
5
5
ms.topic: how-to
6
-
ms.date: 03/20/2025
6
+
ms.date: 04/03/2025
7
7
ms.author: alkohli
8
8
ms.service: azure-local
9
9
ms.custom: devx-track-azurepowershell
@@ -17,7 +17,7 @@ This article describes how to register your Azure Local machines and then set up
17
17
18
18
## Prerequisites
19
19
20
-
Before you begin, make sure you've completed the following prerequisites:
20
+
Before you begin, make sure you complete the following prerequisites:
21
21
22
22
### Azure Local machine prerequisites
23
23
@@ -79,7 +79,7 @@ Before you begin, make sure you've completed the following prerequisites:
79
79
```
80
80
81
81
---
82
-
2. Connect to your Azure account and set the subscription. You'll need to open browser on the client that you're using to connect to the machine and open this page: `https://microsoft.com/devicelogin` and enter the provided code in the Azure CLI output to authenticate. Get the access token and account ID for the registration.
82
+
2. Connect to your Azure account and set the subscription. Open a browser on the client that you're using to connect to the machine and open this page: `https://microsoft.com/devicelogin` and enter the provided code in the Azure CLI output to authenticate. Get the access token and account ID for the registration.
83
83
84
84
# [PowerShell](#tab/powershell)
85
85
@@ -192,7 +192,7 @@ This section describes how to assign Azure permissions for deployment from the A
192
192
193
193
1. In the right pane, go to **Role assignments**. Verify that the deployment user has all the configured roles.
194
194
195
-
1. In the Azure portal go to **Microsoft Entra Roles and Administrators** and assign the **Cloud Application Administrator** role permission at the Microsoft Entra tenant level.
195
+
1. In the Azure portal, go to **Microsoft Entra Roles and Administrators** and assign the **Cloud Application Administrator** role permission at the Microsoft Entra tenant level.
196
196
197
197
:::image type="content" source="media/deployment-arc-register-server-permissions/cloud-application-administrator-role-at-tenant.png" alt-text="Screenshot of the Cloud Application Administrator permission at the tenant level." lightbox="./media/deployment-arc-register-server-permissions/cloud-application-administrator-role-at-tenant.png":::
Copy file name to clipboardExpand all lines: azure-local/manage/remote-support-arc-extension.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: robess
6
6
ms.topic: overview
7
7
ms.reviewer: shisab
8
8
ms.lastreviewed: 01/19/2024
9
-
ms.date: 10/22/2024
9
+
ms.date: 04/03/2025
10
10
---
11
11
12
12
# Azure Local Remote Support ARC extension overview
@@ -17,7 +17,7 @@ This article provides a brief overview of the Remote Support Arc extension, its
17
17
18
18
## About the Remote Support Arc extension
19
19
20
-
The Remote Support Arc extension, shown as AzureEdgeRemoteSupport in the Azure portal, can expedite setup time and enhance support issue resolution. This capability happens by pre-installing the remote support agent on all nodes of the system. Additionally, it supports the configuration of scheduled tasks for [Just Enough Administration (JEA)](../manage/get-remote-support.md#install-jea-configurations-before-azure-registration).
20
+
The Remote Support Arc extension, shown as AzureEdgeRemoteSupport in the Azure portal, can expedite setup time and enhance support issue resolution. This capability happens by preinstalling the remote support agent on all nodes of the system. Additionally, it supports the configuration of scheduled tasks for [Just Enough Administration (JEA)](../manage/get-remote-support.md#install-jea-configurations-before-azure-registration).
21
21
22
22
The scheduled tasks to configure JEA are set up through either:
Copy file name to clipboardExpand all lines: azure-stack/operator/azure-site-recovery-known-issues.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: ronmiab
5
5
ms.author: robess
6
6
ms.topic: troubleshooting
7
7
ms.custom: linux-related-content
8
-
ms.date: 06/03/2024
8
+
ms.date: 04/03/2025
9
9
ms.reviewer: rtiberiu
10
10
ms.lastreviewed: 04/25/2024
11
11
---
@@ -14,22 +14,22 @@ ms.lastreviewed: 04/25/2024
14
14
15
15
This article describes known issues for Azure Site Recovery on Azure Stack Hub. Use the following sections for details about the current known issues and limitations in Azure Site Recovery on Azure Stack Hub.
16
16
17
-
## Maximum disk size supported is 1022 GB
17
+
## Maximum disk size supported is 1,022 GB
18
18
19
-
When you protect a VM, Azure Site Recovery needs to add an additional 1 GB of data to an existing disk. Since Azure Stack Hub has a hard limitation for the maximum size of a disk at 1023 GB, the maximum size of a disk protected by Site Recovery must be equal to or less than 1022.
19
+
When you protect a virtual machine (VM), Azure Site Recovery needs to add an additional 1 GB of data to an existing disk. Since Azure Stack Hub has a hard limitation for the maximum size of a disk at 1,023 GB, the maximum size of a disk protected by Site Recovery must be equal to or less than 1022.
20
20
21
21
When you try to protect a VM with a disk of 1023Gb, the following behavior occurs:
22
22
23
-
- Enable protection succeeds as a seed disk of only 1 GB is created and ready for use. There is no error at this step.
24
-
- Replication is blocked at **xx% Synchronized** and after a while, the replication health becomes **Critical** with the error **AzStackToAzStackSourceAgentDiskSourceAgentSlowResyncProgressOnPremToAzure**. The error occurs because during replication, Site Recovery tries to resize the seed disk to 1024 GB and write to it. This operation fails, as Azure Stack Hub does not support 1024 GB disks.
23
+
- Enable protection succeeds as a seed disk of only 1 GB is created and ready for use. There's no error at this step.
24
+
- Replication is blocked at **xx% Synchronized** and after a while, the replication health becomes **Critical** with the error **AzStackToAzStackSourceAgentDiskSourceAgentSlowResyncProgressOnPremToAzure**. The error occurs because during replication, Site Recovery tries to resize the seed disk to 1,024 GB and write to it. This operation fails, as Azure Stack Hub doesn't support 1,024 GB disks.
25
25
26
26
:::image type="content" source="media/azure-site-recovery-known-issues/max-disk-number-1.png" alt-text="Screenshot of Azure portal showing maximum disk error." lightbox="media/azure-site-recovery-known-issues/max-disk-number-1.png":::
27
27
28
28
- The seed disk created for this disk (in the target subscription) is still at 1 GB in size, and the **Activity log** shows a few **Write Disk** failures with the error message **The value '1024' of parameter 'disk.diskSizeGb' is out of range. Value '1024' must be between '1' and '1023' inclusive.**
29
29
30
30
:::image type="content" source="media/azure-site-recovery-known-issues/max-disk-number-2.png" alt-text="Screenshot of Azure portal showing write disk errors." lightbox="media/azure-site-recovery-known-issues/max-disk-number-2.png":::
31
31
32
-
The current workaround for this issue is to create a new disk (of 1022 GB or less), attach it to your source VM, copy the data from the 1023 GB disk to the new one, and then remove the 1023 GB disk from the source VM. Once this procedure is done, and the VM has all disks smaller or equal to 1022 GB, you can enable the protection using Azure Site Recovery.
32
+
The current workaround for this issue is to create a new disk (of 1,022 GB or less), attach it to your source VM, copy the data from the 1,023 GB disk to the new one, and then remove the 1,023 GB disk from the source VM. Once this procedure is done, and the VM has all disks smaller or equal to 1,022 GB, you can enable the protection using Azure Site Recovery.
33
33
34
34
## Re-protection: available data disk slots on appliance
35
35
@@ -42,7 +42,7 @@ The current workaround for this issue is to create a new disk (of 1022 GB or les
42
42
- Increase the size of the Azure Site Recovery appliance VM.
43
43
44
44
>[!NOTE]
45
-
> We do not test and validate large VM SKUs for the appliance VM.
45
+
> We don't test and validate large VM SKUs for the appliance VM.
46
46
47
47
4. If you're trying to re-protect a VM, but there aren't enough slots on the appliance to hold the replication disks, the error message **An internal error occurred** displays. You can check the number of the data disks currently on the appliance, or sign in to the appliance, go to **Event Viewer**, and open logs for **Azure Site Recovery** under **Applications and Services Logs**:
48
48
@@ -134,10 +134,10 @@ When replicating multiple VMs, you might see the **Protected item health changed
134
134
135
135
:::image type="content" source="../operator/media/azure-site-recovery/known-issues/mobility-service-agent-warning.png" alt-text="Sample screenshot of the Protected item health change warning."lightbox="media/azure-site-recovery/known-issues/mobility-service-agent-warning.png":::
136
136
137
-
This error message should only be a warning and is not a blocking issue for the actual replication or failover processes.
137
+
This error message should only be a warning and isn't a blocking issue for the actual replication or failover processes.
138
138
139
139
>[!TIP]
140
-
>You can check the the state of the respective VM to ensure it's healthy.
140
+
>You can check the state of the respective VM to ensure it's healthy.
141
141
142
142
## Deleting the appliance VM (source) blocks the deletion of the vault (target)
Copy file name to clipboardExpand all lines: azure-stack/user/overview-patterns-solution-examples.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.topic: overview
6
6
ms.date: 05/24/2021
7
7
ms.author: robess
8
8
ms.reviewer: anajod
9
-
ms.lastreviewed: 05/24/2021
9
+
ms.lastreviewed: 04/03/2025
10
10
11
11
# Intent: As an Azure Stack user, I want an overview of hybrid patterns and solution examples so I can learn about building hybrid solutions on Azure and Azure Stack.
@@ -41,7 +41,7 @@ There are two types of pattern articles:
41
41
42
42
## Solution deployment guides
43
43
44
-
Step-by-step deployment guides assist in deploying a solution example. The guide may also refer to a companion code sample, stored in the GitHub [solutions sample repo](https://github.com/Azure-Samples/azure-intelligent-edge-patterns).
44
+
Step-by-step deployment guides help you deploy a solution example. The guide may also refer to a companion code sample, stored in the GitHub [solutions sample repo](https://github.com/Azure-Samples/azure-intelligent-edge-patterns).
Copy file name to clipboardExpand all lines: azure-stack/user/pattern-cicd-pipeline.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: The DevOps pattern in Azure Stack Hub
3
3
description: Learn about the DevOps pattern so you can ensure consistency across deployments in Azure and Azure Stack Hub.
4
4
author: ronmiab
5
5
ms.topic: article
6
-
ms.date: 11/05/2019
6
+
ms.date: 04/03/2025
7
7
ms.author: robess
8
8
ms.reviewer: anajod
9
9
ms.lastreviewed: 11/05/2019
@@ -21,7 +21,7 @@ Code from a single location and deploy to multiple targets in development, test,
21
21
22
22
Application deployment continuity, security, and reliability are essential to organizations and critical to development teams.
23
23
24
-
Apps often require refactored code to run in each target environment. This means that an app isn't completely portable. It must be updated, tested, and validated as it moves through each environment. For example, code written in a development environment must then be rewritten to work in a test environment and rewritten when it finally lands in a production environment. Furthermore, this code is specifically tied to the host. This increases the cost and complexity of maintaining your app. Each version of the app is tied to each environment. The increased complexity and duplication increase the risk of security and code quality. In addition, the code can't be readily redeployed when you remove restore failed hosts or deploy additional hosts to handle increases in demand.
24
+
Apps often require refactored code to run in each target environment. This means that an app isn't completely portable. It must be updated, tested, and validated as it moves through each environment. For example, code written in a development environment must then be rewritten to work in a test environment and rewritten when it finally lands in a production environment. Furthermore, this code is tied to the host. This increases the cost and complexity of maintaining your app. Each version of the app is tied to each environment. The increased complexity and duplication increase the risk of security and code quality. In addition, the code can't be readily redeployed when you remove restore failed hosts or deploy additional hosts to handle increases in demand.
description: Learn how to build a scalable cross-cloud app that uses on-premises data in Azure and Azure Stack Hub.
4
4
author: ronmiab
5
5
ms.topic: article
6
-
ms.date: 11/05/2019
6
+
ms.date: 04/03/2025
7
7
ms.author: robess
8
8
ms.reviewer: anajod
9
9
ms.lastreviewed: 11/05/2019
@@ -40,7 +40,7 @@ This solution uses the following components:
40
40
|| Azure Traffic Manager |[Azure Traffic Manager](/azure/traffic-manager/traffic-manager-overview) is a DNS-based traffic load balancer. It allows you to control the distribution of user traffic for service endpoints in different datacenters. |
41
41
|| Azure Application Insights |[Application Insights](/azure/azure-monitor/app/app-insights-overview) is an extensible Application Performance Management service for web developers building and managing apps on multiple platforms.|
42
42
|| Azure Functions |[Azure Functions](/azure/azure-functions/) allows you to execute your code in a serverless environment without having to first create a VM or publish a web app. |
43
-
|| Azure Autoscale |[Autoscale](/azure/azure-monitor/platform/autoscale-overview) is a built-in feature of Cloud Services, VMs, and web apps. The feature allows apps to perform their best when demand changes. Apps will adjust for traffic spikes, notifying you when metrics change and scaling as needed. |
43
+
|| Azure Autoscale |[Autoscale](/azure/azure-monitor/platform/autoscale-overview) is a built-in feature of Cloud Services, VMs, and web apps. The feature allows apps to perform their best when demand changes. Apps adjust for traffic spikes, notifying you when metrics change and scaling as needed. |
44
44
| Azure Stack Hub | IaaS Compute | Azure Stack Hub allows you to use the same app model, self-service portal, and APIs enabled by Azure. Azure Stack Hub IaaS allows a broad range of open-source technologies for consistent hybrid cloud deployments. The solution example uses a Windows Server VM to SQL Server, for example.|
45
45
|| Azure App Service | Just like the Azure web app, the solution uses [Azure App Service on Azure Stack Hub](/azure-stack/operator/azure-stack-app-service-overview) to host the web app. |
46
46
| | Networking | The Azure Stack Hub Virtual Network works exactly like the Azure Virtual Network. It uses many of the same networking components, including custom hostnames.
@@ -58,7 +58,7 @@ Azure and Azure Stack Hub are uniquely suited to support the needs of today's gl
58
58
59
59
#### Hybrid cloud without the hassle
60
60
61
-
Microsoft offers an unrivaled integration of on-premises assets with Azure Stack Hub and Azure in one unified solution. This integration eliminates the hassle of managing multiple point solutions and a mix of cloud providers. With cross-cloud scaling, the power of Azure is just a few clicks away. Just connect your Azure Stack Hub to Azure with cloud bursting and your data and apps will be available in Azure when needed.
61
+
Microsoft offers an unrivaled integration of on-premises assets with Azure Stack Hub and Azure in one unified solution. This integration eliminates the hassle of managing multiple point solutions and a mix of cloud providers. With cross-cloud scaling, the power of Azure is just a few clicks away. Just connect your Azure Stack Hub to Azure with cloud bursting and your data and apps are available in Azure when needed.
62
62
63
63
- Eliminate the need to build and maintain a secondary DR site.
64
64
- Save time and money by eliminating tape backup and house up to 99 years of backup data in Azure.
0 commit comments