Skip to content

Commit 6182dfa

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-stack-docs-pr (branch live)
2 parents 161b662 + b3b37e9 commit 6182dfa

24 files changed

+741
-631
lines changed

AKS-Arc/workload-identity.md

Lines changed: 21 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ description: Learn how to deploy and configure an AKS Arc cluster with workload
44
author: sethmanheim
55
ms.author: sethm
66
ms.topic: how-to
7-
ms.date: 11/08/2024
7+
ms.date: 01/23/2025
8+
ms.reviewer: leslielin
89

910
---
1011

@@ -167,16 +168,32 @@ $MSIPrincipalId=$(az identity show --resource-group $resource_group_name --name
167168

168169
### Create a Kubernetes service account
169170

170-
Create a Kubernetes service account and annotate it with the client ID of the managed identity created in the previous step:
171+
In this step, you create a Kubernetes service account and annotate it with the client ID of the managed identity you created in the previous step.
172+
173+
Use cluster connect to access your cluster from a client device. For more information, see [Access your cluster from a client device](/azure/azure-arc/kubernetes/cluster-connect?tabs=azure-cli%2Cagent-version#access-your-cluster-from-a-client-device):
171174

172175
```azurecli
173176
az connectedk8s proxy -n $aks_cluster_name -g $resource_group_name
174177
```
175178

176-
Open a new window. Copy and paste the following CLI commands:
179+
Open a new CLI command window. Copy and paste the following commands:
177180

178181
```azurecli
179-
$yaml = @" apiVersion: v1 kind: ServiceAccount metadata: annotations: azure.workload.identity/client-id: $MSIId name: $SERVICE_ACCOUNT_NAME namespace: $SERVICE_ACCOUNT_NAMESPACE "@ $yaml = $yaml -replace '\$MSIId', $MSIId ` -replace '\$SERVICE_ACCOUNT_NAME', $SERVICE_ACCOUNT_NAME ` -replace '\$SERVICE_ACCOUNT_NAMESPACE', $SERVICE_ACCOUNT_NAMESPACE $yaml | kubectl apply -f -
182+
$yaml = @"
183+
apiVersion: v1
184+
kind: ServiceAccount
185+
metadata:
186+
annotations:
187+
azure.workload.identity/client-id: $MSIId
188+
name: $SERVICE_ACCOUNT_NAME
189+
namespace: $SERVICE_ACCOUNT_NAMESPACE
190+
"@
191+
192+
$yaml = $yaml -replace '\$MSIId', $MSIId `
193+
-replace '\$SERVICE_ACCOUNT_NAME', $SERVICE_ACCOUNT_NAME `
194+
-replace '\$SERVICE_ACCOUNT_NAMESPACE', $SERVICE_ACCOUNT_NAMESPACE
195+
196+
$yaml | kubectl apply -f -
180197
```
181198

182199
The following output shows successful creation of the service account:

azure-local/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -590,6 +590,8 @@ items:
590590
href: migrate/migrate-vmware-migrate.md
591591
- name: Enable guest management
592592
href: migrate/migrate-enable-guest-management.md
593+
- name: Maintain static IP addresses
594+
href: migrate/migrate-maintain-ip-addresses.md
593595
- name: FAQ
594596
href: migrate/migrate-faq.yml
595597
- name: Troubleshoot

azure-local/deploy/deployment-azure-arc-gateway-overview.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -102,25 +102,25 @@ As part of the Azure Local version 2411.1 preview update, the endpoints from the
102102
| 6 | `http://gbl.his.arc.azure.com:443` | Arc registration |
103103
| 7 | `http://<region>.his.arc.azure.com:443` | Arc registration |
104104
| 8 | `http://dc.services.visualstudio.com:443` | Arc registration |
105-
| 9 | `http://<yourarcgatewayId>.gw.arc.azure.com:443` | Arc gateway |
106-
| 10 | `http://<yourkeyvaultname>.vault.azure.net:443` | Azure Key Vault |
107-
| 11 | `http://<yourblobstorageforcloudwitnessname>.blob.core.windows.net:443` | Cloud Witness Storage Account |
108-
| 12 | `http://files.pythonhosted.org:443` | Microsoft On-premises Cloud/ARB/AKS |
109-
| 13 | `http://pypi.org:443` | Microsoft On-premises Cloud/ARB/AKS |
110-
| 14 | `http://raw.githubusercontent.com:443` | Microsoft On-premises Cloud/ARB/AKS |
111-
| 15 | `http://pythonhosted.org:443` | Microsoft On-premises Cloud/ARB/AKS |
112-
| 16 | `http://ocsp.digicert.com` | Certificate Revocation List for Arc extensions |
113-
| 17 | `http://s.symcd.com` | Certificate Revocation List for Arc extensions |
114-
| 18 | `http://ts-ocsp.ws.symantec.com` | Certificate Revocation List for Arc extensions |
115-
| 19 | `http://ocsp.globalsign.com` | Certificate Revocation List for Arc extensions |
116-
| 20 | `http://ocsp2.globalsign.com` | Certificate Revocation List for Arc extensions |
117-
| 21 | `http://oneocsp.microsoft.com` | Certificate Revocation List for Arc extensions |
118-
| 22 | `http://dl.delivery.mp.microsoft.com` | Windows Update |
119-
| 23 | `http://*.tlu.dl.delivery.mp.microsoft.com` | Windows Update |
120-
| 24 | `http://*.windowsupdate.com` | Windows Update |
121-
| 25 | `http://*.windowsupdate.microsoft.com` | Windows Update |
122-
| 26 | `http://*.update.microsoft.com` | Windows Update |
123-
105+
| 9 | `https://<region>.obo.arc.azure.com:8084` | AKS extensions |
106+
| 10 | `http://<yourarcgatewayId>.gw.arc.azure.com:443` | Arc gateway |
107+
| 11 | `http://<yourkeyvaultname>.vault.azure.net:443` | Azure Key Vault |
108+
| 12 | `http://<yourblobstorageforcloudwitnessname>.blob.core.windows.net:443` | Cloud Witness Storage Account |
109+
| 13 | `http://files.pythonhosted.org:443` | Microsoft On-premises Cloud/ARB/AKS |
110+
| 14 | `http://pypi.org:443` | Microsoft On-premises Cloud/ARB/AKS |
111+
| 15 | `http://raw.githubusercontent.com:443` | Microsoft On-premises Cloud/ARB/AKS |
112+
| 16 | `http://pythonhosted.org:443` | Microsoft On-premises Cloud/ARB/AKS |
113+
| 17 | `http://ocsp.digicert.com` | Certificate Revocation List for Arc extensions |
114+
| 18 | `http://s.symcd.com` | Certificate Revocation List for Arc extensions |
115+
| 19 | `http://ts-ocsp.ws.symantec.com` | Certificate Revocation List for Arc extensions |
116+
| 20 | `http://ocsp.globalsign.com` | Certificate Revocation List for Arc extensions |
117+
| 21 | `http://ocsp2.globalsign.com` | Certificate Revocation List for Arc extensions |
118+
| 22 | `http://oneocsp.microsoft.com` | Certificate Revocation List for Arc extensions |
119+
| 23 | `http://dl.delivery.mp.microsoft.com` | Windows Update |
120+
| 24 | `http://*.tlu.dl.delivery.mp.microsoft.com` | Windows Update |
121+
| 25 | `http://*.windowsupdate.com` | Windows Update |
122+
| 26 | `http://*.windowsupdate.microsoft.com` | Windows Update |
123+
| 27 | `http://*.update.microsoft.com` | Windows Update |
124124

125125
## Restrictions and limitations
126126

113 KB
Loading
53 KB
Loading
205 KB
Loading
134 KB
Loading
30.6 KB
Loading
107 KB
Loading

azure-local/migrate/migrate-faq.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
author: alkohli
77
ms.author: alkohli
88
ms.service: azure-local
9-
ms.date: 12/10/2024
9+
ms.date: 01/23/2025
1010

1111
title: FAQ - Migration of Hyper-V and VMware VMs to Azure Local using Azure Migrate (preview)
1212

@@ -86,7 +86,7 @@ sections:
8686
8787
### My source VMs use static IP addresses. Are these addresses preserved when I migrate my VMs to Azure Local?
8888
89-
Currently both VMware and Hyper-V migrations only support VMs configured with DHCP. For a source VM with a static IP address, first migrate it to the target Azure Local system. After the migration, connect to the VM using Hyper-V Manager and manually change the IP configuration.
89+
In this release, static IP addresses can be preserved during migration for Windows VMs on VMware and Hyper-V. Linux VMs are not supported. For more details, see [Maintain static IP addresses](migrate-maintain-ip-addresses.md).
9090
9191
### I use DHCP reservation for IP addresses for my source VMs. Does migration ensure that the MAC address is preserved so that my migrated VM can get the same IP address?
9292
@@ -114,12 +114,12 @@ sections:
114114
115115
Within the Azure Migrate portal, you can select up to 10 machines at once for replication. To replicate more machines, add in batches of 10 (agentless migration overview).
116116
117-
Each Azure migrate appliance supports replication of 52 disks in parallel (scheduling logic).
117+
Each Azure Migrate appliance supports replication of 52 disks in parallel (scheduling logic).
118118
119-
For example, if you selected to replicate 100 VMs (in batches of 10), with each VM containing two disks each, resulting in 200 (100 x 2) disks in total. The Azure migrate appliance starts replicating 52 disks in parallel. As soon as one disk finishes initial replication, the next disk immediately takes its spot in the queue, while still continuously replicating the remaining 52 disks. This continues with all the remaining disks until all 200 disks have been replicated.
119+
For example, if you selected to replicate 100 VMs (in batches of 10), with each VM containing two disks each, resulting in 200 (100 x 2) disks in total. The Azure Migrate appliance starts replicating 52 disks in parallel. As soon as one disk finishes initial replication, the next disk immediately takes its spot in the queue, while still continuously replicating the remaining 52 disks. This continues with all the remaining disks until all 200 disks have been replicated.
120120
121121
## [Hyper-V VMs only](#tab/hyper-v-vms)
122122
123-
### I have a VM running on an older Hyper-V servers - for example, Windows Server 2012 or Windows Server 2008 R2. Can I migrate this VM to Azure Local?
123+
### I have a VM running on an older Hyper-V server - for example, Windows Server 2012 or Windows Server 2008 R2. Can I migrate this VM to Azure Local?
124124
125125
Yes. The migration solution discovers VMs on all the Windows Server hosts starting from Windows Server 2012 R2 and up to Windows Server 2022.

0 commit comments

Comments
 (0)