Skip to content

Commit 4748e9f

Browse files
committed
Last few
1 parent 596bd83 commit 4748e9f

File tree

4 files changed

+78
-77
lines changed

4 files changed

+78
-77
lines changed

azure-local/manage/azure-benefits.md

Lines changed: 18 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: overview
77
ms.custom:
88
- devx-track-azurepowershell
99
ms.reviewer: jlei
10-
ms.date: 11/28/2023
10+
ms.date: 02/21/2025
1111
ms.lastreviewed: 02/23/2024
1212
---
1313

@@ -18,11 +18,11 @@ ms.lastreviewed: 02/23/2024
1818
[!INCLUDE [azure-local-banner-22h2](../includes/azure-local-banner-22h2.md)]
1919

2020
> [!NOTE]
21-
> This article is for Azure Stack HCI version 22H2 and earlier only. For a list of benefits associated with version 23H2 and later, see [Azure verification for VMs](../deploy/azure-verification.md).
21+
> This article is only for Azure Stack HCI version 22H2 and earlier. For a list of benefits associated with version 23H2 and later, see [Azure verification for VMs](../deploy/azure-verification.md).
2222
2323
Microsoft Azure offers a range of differentiated workloads and capabilities that are designed to run only on Azure. Azure Stack HCI extends many of the same benefits you get from Azure, while running on the same familiar and high-performance on-premises or edge environments.
2424

25-
*Azure Benefits* makes it possible for supported Azure-exclusive workloads to work outside of the cloud. You can enable Azure Benefits on Azure Stack HCI at no extra cost. If you have Windows Server workloads, we recommend turning it on.
25+
*Azure Benefits* makes it possible for supported Azure-exclusive workloads to work outside of the cloud. You can enable Azure Benefits on Azure Stack HCI at no extra cost. If you have Windows Server workloads, we recommend turning it on.
2626

2727
Take a few minutes to watch the introductory video on Azure Benefits:
2828

@@ -56,12 +56,12 @@ Turning on Azure Benefits starts the service running on your Azure Stack HCI clu
5656
> [!NOTE]
5757
> Certificates are renewed every time the Azure Stack HCI cluster syncs with Azure, and each renewal is valid for 30 days. As long as you maintain the usual 30 day connectivity requirements for Azure Stack HCI, no user action is required.
5858
59-
2. HciSvc exposes a private and non-routable REST endpoint, accessible only to VMs on the same server. To enable this endpoint, an internal vSwitch is configured on the Azure Stack HCI host (named *AZSHCI_HOST-IMDS_DO_NOT_MODIFY*). VMs then must have a NIC configured and attached to the same vSwitch (*AZSHCI_GUEST-IMDS_DO_NOT_MODIFY*).
59+
1. HciSvc exposes a private and non-routable REST endpoint, accessible only to VMs on the same server. To enable this endpoint, an internal vSwitch is configured on the Azure Stack HCI host (named **AZSHCI_HOST-IMDS_DO_NOT_MODIFY**). VMs then must have a NIC configured and attached to the same vSwitch (**AZSHCI_GUEST-IMDS_DO_NOT_MODIFY**).
6060

6161
> [!NOTE]
6262
> Modifying or deleting this switch and NIC prevents Azure Benefits from working properly. If errors occur, disable Azure Benefits using Windows Admin Center or the PowerShell instructions that follow, and then try again.
6363
64-
3. Consumer workloads (for example, Windows Server Azure Edition guests) request attestation. HciSvc then signs the response with an Azure certificate.
64+
1. Consumer workloads (for example, Windows Server Azure Edition guests) request attestation. HciSvc then signs the response with an Azure certificate.
6565

6666
> [!NOTE]
6767
> You must manually enable access for each VM that needs Azure Benefits.
@@ -89,15 +89,15 @@ You can enable Azure Benefits on Azure Stack HCI using Windows Admin Center, Pow
8989

9090
1. In Windows Admin Center, select **Cluster Manager** from the top drop-down menu, navigate to the cluster that you want to activate, then under **Settings**, select **Azure Benefits**.
9191

92-
2. In the **Azure Benefits** pane, select **Turn on**. By default, the checkbox to turn on for all existing VMs is selected. You can deselect it and manually add VMs later.
92+
1. In the **Azure Benefits** pane, select **Turn on**. By default, the checkbox to turn on for all existing VMs is selected. You can deselect it and manually add VMs later.
9393

94-
3. Select **Turn on** again to confirm setup. It may take a few minutes for servers to reflect the changes.
94+
1. Select **Turn on** again to confirm setup. It may take a few minutes for servers to reflect the changes.
9595

96-
4. When Azure Benefits setup is successful, the page updates to show the Azure Benefits dashboard. To check Azure Benefits for the host:
96+
1. When Azure Benefits setup is successful, the page updates to show the Azure Benefits dashboard. To check Azure Benefits for the host:
9797
1. Check that **Azure Benefits cluster status** appears as **On**.
9898
2. Under the **Cluster** tab in the dashboard, check that Azure Benefits for every server shows as **Active** in the table.
9999

100-
5. To check access to Azure Benefits for VMs: Check the status for VMs with Azure Benefits turned on. It's recommended that all of your existing VMs have Azure Benefits turned on; for example, 3 out of 3 VMs.
100+
1. To check access to Azure Benefits for VMs: Check the status for VMs with Azure Benefits turned on. It's recommended that all of your existing VMs have Azure Benefits turned on; for example, 3 out of 3 VMs.
101101

102102
:::image type="content" source="media/azure-benefits/manage-benefits.gif" alt-text="Screenshot of Azure Benefits in Windows Admin Center.":::
103103

@@ -115,7 +115,7 @@ You can enable Azure Benefits on Azure Stack HCI using Windows Admin Center, Pow
115115
Enable-AzStackHCIAttestation -AddVM
116116
```
117117

118-
2. When Azure Benefits setup is successful, you can view the Azure Benefits status. Check the cluster property **IMDS Attestation** by running the following command:
118+
1. When Azure Benefits setup is successful, you can view the Azure Benefits status. Check the cluster property **IMDS Attestation** by running the following command:
119119

120120
```powershell
121121
Get-AzureStackHCI
@@ -127,15 +127,16 @@ You can enable Azure Benefits on Azure Stack HCI using Windows Admin Center, Pow
127127
Get-AzureStackHCIAttestation [[-ComputerName] <string>]
128128
```
129129

130-
3. To check access to Azure Benefits for VMs, run the following command:
130+
1. To check access to Azure Benefits for VMs, run the following command:
131131

132132
```powershell
133133
Get-AzStackHCIVMAttestation
134134
```
135135

136136
## [Azure portal](#tab/azureportal)
137+
137138
1. In your Azure Stack HCI cluster resource page, navigate to the **Configuration** tab.
138-
2. Under the feature **Enable Azure Benefits**, view the host attestation status:
139+
1. Under the feature **Enable Azure Benefits**, view the host attestation status:
139140

140141
:::image type="content" source="media/azure-benefits/attestation-status.png" alt-text="Screenshot of Azure Benefit Attestation status." lightbox="media/azure-benefits/attestation-status.png":::
141142

@@ -145,7 +146,8 @@ Azure CLI is available to install in Windows, macOS, and Linux environments. It
145146

146147
Launch [Azure Cloud Shell](https://shell.azure.com/) and use Azure CLI to configure Azure Benefits following these steps:
147148

148-
1. Set up parameters from your subscription, resource group, and cluster name
149+
1. Set up parameters from your subscription, resource group, and cluster name:
150+
149151
```azurecli
150152
subscription="00000000-0000-0000-0000-000000000000" # Replace with your subscription ID
151153
resourceGroup="hcicluster-rg" # Replace with your resource group name
@@ -155,7 +157,8 @@ Launch [Azure Cloud Shell](https://shell.azure.com/) and use Azure CLI to config
155157
```
156158
157159
1. To view Azure Benefits status on a cluster, run the following command:
158-
```azurecli
160+
161+
```azurecli
159162
az stack-hci cluster list \
160163
--resource-group "${resourceGroup}" \
161164
--query "[?name=='${clusterName}'].{Name:name, AzureBenefitsHostAttestation:reportedProperties.imdsAttestation}" \
@@ -183,6 +186,7 @@ To turn on Azure Benefits for VMs, select the **VMs** tab, then select the VM(s)
183186
```powershell
184187
Add-AzStackHCIVMAttestation -AddAll
185188
```
189+
186190
- Optionally, to check that the VMs can access Azure Benefits on the host, run the following command on the VM:
187191

188192
```powershell

azure-local/manage/collect-diagnostic-data.md

Lines changed: 39 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Understanding Storage Spaces Direct diagnostic data collection tool
44
ms.author: sethm
55
ms.topic: article
66
author: sethmanheim
7-
ms.date: 02/26/2024
7+
ms.date: 02/21/2025
88
---
99
# Collect diagnostic data for clusters
1010

@@ -20,33 +20,33 @@ Because the logs and other information are dense, the information presented in t
2020

2121
You can use Windows Admin Center (version 1812 onwards) to:
2222

23-
- Install SDDC diagnostic tools and keep them up to date
24-
- Schedule daily diagnostic runs (these have a low impact on your system, usually take less than five minutes to run in the background, and won't take up more than 500MB on your cluster)
25-
- View previously collected diagnostic information if you need to give it to support or analyze it yourself
23+
- Install SDDC diagnostic tools and keep them up to date.
24+
- Schedule daily diagnostic runs (these have a low impact on your system, usually take less than five minutes to run in the background, and won't take up more than 500MB on your cluster).
25+
- View previously collected diagnostic information if you need to give it to support personnel, or to analyze it yourself.
2626

2727
To install SDDC diagnostic tools and begin collecting data, follow these steps:
2828

2929
1. Launch Windows Admin Center and select **Tools > Diagnostics**. If diagnostics tools are not already installed, click the **Install** button.
30-
30+
3131
:::image type="content" source="media/collect-diagnostic-data/install-diagnostic-tools.png" alt-text="Click Install to install SDDC diagnostic tools." lightbox="media/collect-diagnostic-data/install-diagnostic-tools.png":::
32-
33-
2. To begin collecting diagnostic data, click **Collect**. You should see a message that says "Collecting diagnostic information. This may take a few minutes." After the initial data collection, if you want to automatically collect data every 24 hours, change the slider to **On**.
34-
32+
33+
1. To begin collecting diagnostic data, click **Collect**. You should see a message that says "Collecting diagnostic information. This may take a few minutes." After the initial data collection, if you want to automatically collect data every 24 hours, change the slider to **On**.
34+
3535
:::image type="content" source="media/collect-diagnostic-data/collect-diagnostic-data.png" alt-text="Click Collect to being collecting diagnostic data." lightbox="media/collect-diagnostic-data/collect-diagnostic-data.png":::
36-
37-
3. Data collection is not complete until you see the screenshot below. To view collected diagnostic information, choose **Download (.zip)** or **Open in Files tool**.
38-
36+
37+
1. Data collection is not complete until you see the screenshot below. To view collected diagnostic information, choose **Download (.zip)** or **Open in Files tool**.
38+
3939
:::image type="content" source="media/collect-diagnostic-data/view-diagnostic-information.png" alt-text="To view diagnostic information, you can either download a .zip file or open in Files tool." lightbox="media/collect-diagnostic-data/view-diagnostic-information.png":::
40-
41-
## Installing Get-SDDCDiagnosticInfo with PowerShell
40+
41+
## Install Get-SDDCDiagnosticInfo with PowerShell
4242

4343
You can use the `Get-SDDCDiagnosticInfo` PowerShell cmdlet (also known as `Get-PCStorageDiagnosticInfo`, previously known as `Test-StorageHealth`) to gather logs for and perform health checks for Failover Clustering (cluster, resources, networks, nodes), Storage Spaces (physical disks, enclosures, virtual disks), Cluster Shared Volumes, SMB file shares, and Deduplication.
4444

4545
There are two methods of installing the script: PowerShell Gallery and GitHub. Both are outlined below.
4646

4747
### PowerShell Gallery
4848

49-
The [PowerShell Gallery](https://www.powershellgallery.com/packages/PrivateCloud.DiagnosticInfo) is a snapshot of the GitHub Repo. Note that installing items from the PowerShell Gallery requires the latest version of the PowerShellGet module, which is available in Windows 10, in Windows Management Framework (WMF) 5.0, or in the MSI-based installer (for PowerShell 3 and 4).
49+
The [PowerShell Gallery](https://www.powershellgallery.com/packages/PrivateCloud.DiagnosticInfo) is a snapshot of the GitHub repo. Note that installing items from the PowerShell Gallery requires the latest version of the **PowerShellGet** module, which is available in Windows 10, in Windows Management Framework (WMF) 5.0, or in the MSI-based installer (for PowerShell 3 and 4).
5050

5151
We install the latest version of the [Microsoft Networking Diagnostics tools](https://www.powershellgallery.com/packages/MSFT.Network.Diag) during this process as well since `Get-SDDCDiagnosticInfo` relies on this. This manifest module contains network diagnostic and troubleshooting tool, which are maintained by the Microsoft Core Networking Product Group at Microsoft.
5252

@@ -67,7 +67,7 @@ Update-Module PrivateCloud.DiagnosticInfo
6767

6868
### GitHub
6969

70-
The [GitHub Repo](https://github.com/PowerShell/PrivateCloud.DiagnosticInfo/) is the most up-to-date version of the module, since we are continually iterating here. To install the module from GitHub, download the latest module from the [archive](https://github.com/PowerShell/PrivateCloud.DiagnosticInfo/archive/master.zip) and extract the PrivateCloud.DiagnosticInfo directory to the correct PowerShell modules path pointed by ```$env:PSModulePath```
70+
The [GitHub repo](https://github.com/PowerShell/PrivateCloud.DiagnosticInfo/) is the most up-to-date version of the module, since we are continually iterating here. To install the module from GitHub, download the latest module from the [archive](https://github.com/PowerShell/PrivateCloud.DiagnosticInfo/archive/master.zip) and extract the **PrivateCloud.DiagnosticInfo** directory to the correct PowerShell modules path pointed to by `$env:PSModulePath`:
7171

7272
``` PowerShell
7373
# Allowing Tls12 and Tls11 -- e.g. github now requires Tls12
@@ -95,17 +95,17 @@ Import-Module $module -Force
9595
9696
```
9797

98-
If you need to get this module on an offline cluster, download the zip, move it to your target server node, and install the module.
98+
If you need to get this module on an offline cluster, download the zip file, move it to your target server node, and install the module.
9999

100100
## Gathering logs with PowerShell
101101

102-
After you have enabled event channels and completed the installation process, you can use the `Get-SDDCDiagnosticInfo` PowerShell cmdlet in the module to get:
102+
After you enable event channels and complete the installation process, you can use the `Get-SDDCDiagnosticInfo` PowerShell cmdlet in the module to get:
103103

104-
- Reports on storage health, plus details on unhealthy components
105-
- Reports of storage capacity by pool, volume, and deduplicated volume
106-
- Event logs from all cluster nodes and a summary error report
104+
- Reports on storage health, plus details on unhealthy components.
105+
- Reports of storage capacity by pool, volume, and deduplicated volume.
106+
- Event logs from all cluster nodes and a summary error report.
107107

108-
Assume that your storage cluster has the name *"CLUS01".*
108+
Assume that your storage cluster has the name **CLUS01**.
109109

110110
To execute against a remote storage cluster:
111111

@@ -132,19 +132,19 @@ New-Item -Name SDDCDiagTemp -Path d:\ -ItemType Directory -Force
132132
Get-SddcDiagnosticInfo -ClusterName S2D-Cluster -WriteToPath d:\SDDCDiagTemp
133133
```
134134

135-
As you can see, the script will also do validation of current cluster state:
135+
As you can see, the script also does validation of the current cluster state:
136136

137137
:::image type="content" source="media/collect-diagnostic-data/collect-data.png" alt-text="Data collection PowerShell screenshot." lightbox="media/collect-diagnostic-data/collect-data.png":::
138138

139-
All data is being written to SDDCDiagTemp folder:
139+
All data is written to the **SDDCDiagTemp** folder:
140140

141141
:::image type="content" source="media/collect-diagnostic-data/collect-data-folder.png" alt-text="Data in File Explorer screenshot." lightbox="media/collect-diagnostic-data/collect-data-folder.png":::
142142

143-
After the script finishes, it will create a ZIP in your user directory:
143+
After the script finishes, it creates a zip file in your user directory:
144144

145145
:::image type="content" source="media/collect-diagnostic-data/collect-data-result.png" alt-text="Data zip in PowerShell screenshot." lightbox="media/collect-diagnostic-data/collect-data-result.png":::
146146

147-
Let's generate a report into a text file:
147+
Generate a report into a text file:
148148

149149
```PowerShell
150150
#find the latest diagnostic zip in UserProfile
@@ -163,32 +163,32 @@ For reference, here is a link to the [sample report](https://github.com/Microsof
163163

164164
## Get-SDDCDiagnosticInfo output
165165

166-
The following are the files included in the zipped output of `Get-SDDCDiagnosticInfo`.
166+
The following files are included in the zipped output of `Get-SDDCDiagnosticInfo`.
167167

168168
### Health summary Report
169169

170-
The health summary report is saved as:
171-
- 0_CloudHealthSummary.log
170+
The health summary report is saved as **0_CloudHealthSummary.log**.
172171

173172
This file is generated after parsing all the data collected and is meant to provide a quick summary of your system. It contains:
174173

175-
- System information
176-
- Storage health overview (number of nodes up, resources online, cluster shared volumes online, unhealthy components, etc.)
177-
- Details on unhealthy components (cluster resources that are offline, failed, or online pending)
178-
- Firmware and driver information
179-
- Pool, physical disk, and volume details
180-
- Storage Performance (performance counters are collected)
174+
- System information.
175+
- Storage health overview (number of nodes up, resources online, cluster shared volumes online, unhealthy components, etc.).
176+
- Details on unhealthy components (cluster resources that are offline, failed, or online pending).
177+
- Firmware and driver information.
178+
- Pool, physical disk, and volume details.
179+
- Storage performance (performance counters are collected).
181180

182-
This report is being continually updated to include more useful information. For the latest information, see the [GitHub README](https://github.com/PowerShell/PrivateCloud.DiagnosticInfo/edit/master/README.md).
181+
This report is continually updated to include more useful information. For the latest information, see the [GitHub readme](https://github.com/PowerShell/PrivateCloud.DiagnosticInfo/edit/master/README.md).
183182

184183
### Logs and XML files
185184

186-
The script runs various log gathering scripts and saves the output as xml files. We collect cluster and health logs, system information (MSInfo32), unfiltered event logs (failover clustering, dis diagnostics, Hyper-V, storage spaces, and more), and storage diagnostics information (operational logs). For the latest information on what information is collected, see the [GitHub README (what we collect)](https://github.com/PowerShell/PrivateCloud.DiagnosticInfo/blob/master/README.md#what-does-the-cmdlet-output-include).
185+
The script runs various log gathering scripts and saves the output as xml files. We collect cluster and health logs, system information (MSInfo32), unfiltered event logs (failover clustering, dis diagnostics, Hyper-V, storage spaces, and more), and storage diagnostics information (operational logs). For the latest information about what information is collected, see the [GitHub readme (what we collect)](https://github.com/PowerShell/PrivateCloud.DiagnosticInfo/blob/master/README.md#what-does-the-cmdlet-output-include).
187186

188187
## How to consume XML files from Get-SDDCDiagnosticInfo
188+
189189
You can consume the data from the XML files provided in data collected by the `Get-SDDCDiagnosticInfo` cmdlet. These files have information about the virtual disks, physical disks, basic cluster information, and other PowerShell related outputs.
190190

191-
To see the results of these outputs, open a PowerShell window and run the following steps.
191+
To see the results of these outputs, open a PowerShell window and run the following commands:
192192

193193
```PowerShell
194194
ipmo storage
@@ -197,4 +197,5 @@ $d
197197
```
198198

199199
## Next steps
200-
Provide feedback on what you'd like to see by filing issues [here](https://github.com/PowerShell/PrivateCloud.DiagnosticInfo/issues). Also, feel free to contribute helpful changes to the script by submitting a [pull request](https://github.com/PowerShell/PrivateCloud.DiagnosticInfo/pulls).
200+
201+
Provide feedback on what you'd like to see by [filing issues here](https://github.com/PowerShell/PrivateCloud.DiagnosticInfo/issues). Also, feel free to contribute helpful changes to the script by [submitting a pull request](https://github.com/PowerShell/PrivateCloud.DiagnosticInfo/pulls).

0 commit comments

Comments
 (0)