Skip to content

Commit 687988d

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-stack-docs-pr (branch live)
2 parents e47e654 + adea9d7 commit 687988d

File tree

5 files changed

+22
-12
lines changed

5 files changed

+22
-12
lines changed

AKS-Arc/aks-arc-diagnostic-checker.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,6 @@ $urlArray = @(
105105
"https://k8connecthelm.azureedge.net",
106106
"https://guestnotificationservice.azure.com",
107107
"https://sts.windows.net",
108-
"https://k8sconnectcsp.azureedge.net",
109108
"https://graph.microsoft.com"
110109
)
111110
$urlList=$urlArray -join ","

AKS-Arc/aks-hci-network-system-requirements.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Kubernetes nodes are deployed as specialized virtual machines in AKS enabled by
3030
3131
The following parameters are required in order to use a logical network for AKS Arc cluster create operation:
3232

33-
| Logical network parameter| Description| Required parameter for AKS Arc cluster|
33+
| [Az CLI logical networks parameter](/azure-stack/hci/manage/create-logical-networks?tabs=azurecli) | Description| Required parameter for AKS Arc cluster|
3434
|------------------|---------|-----------|
3535
| `--address-prefixes` | AddressPrefix for the network. Currently only 1 address prefix is supported. Usage: `--address-prefixes "10.220.32.16/24"`. | ![Supported](media/aks-hybrid-networks/check.png) |
3636
| `--dns-servers` | Space-separated list of DNS server IP addresses. Usage: `--dns-servers 10.220.32.16 10.220.32.17`. | ![Supported](media/aks-hybrid-networks/check.png) |
@@ -76,12 +76,12 @@ You need to ensure that the DNS server of the logical network can resolve the FQ
7676

7777
When you deploy Azure Local, you allocate a contiguous block of at least [six static IP addresses on your management network's subnet](/azure-stack/hci/deploy/deploy-via-portal#specify-network-settings), omitting addresses already used by the physical machines. These IPs are used by Azure Local and internal infrastructure (Arc Resource Bridge) for Arc VM management and AKS Arc. If your management network that provides IP addresses to Arc Resource Bridge related Azure Local services are on a different VLAN than the logical network you used to create AKS clusters, you need to ensure that the following ports are opened to successfully create and operate an AKS cluster.
7878

79-
| Destination Port | Destination | Source | Description | Cross VLAN networking notes |
79+
| Destination Port | Destination | Source | Description | Bi-directional cross VLAN networking notes |
8080
|------------------|-------------|--------|-------------|----------------|
81-
| 22 | Logical network used for AKS Arc VMs | IP addresses in management network | Required to collect logs for troubleshooting. | If you use separate VLANs, IP addresses in management network used for Azure Local and Arc Resource Bridge need to access the AKS Arc cluster VMs on this port.|
82-
| 6443 | Logical network used for AKS Arc VMs | IP addresses in management network | Required to communicate with Kubernetes APIs. | If you use separate VLANs, IP addresses in management network used for Azure Local and Arc Resource Bridge need to access the AKS Arc cluster VMs on this port.|
83-
| 55000 | IP addresses in management network | Logical network used for AKS Arc VMs | Cloud Agent gRPC server | If you use separate VLANs, the AKS Arc VMs need to access the IP addresses in management network used for cloud agent IP and cluster IP on this port. |
84-
| 65000 | IP addresses in management network | Logical network used for AKS Arc VMs | Cloud Agent gRPC authentication | If you use separate VLANs, the AKS Arc VMs need to access the IP addresses in management network used for cloud agent IP and cluster IP on this port. |
81+
| 22 | Logical network used for AKS Arc VMs | IP addresses in management network | Required to collect logs for troubleshooting. | If you use separate VLANs, IP addresses in management network used for Azure Local and Arc Resource Bridge need to access the AKS Arc cluster VMs on this port and vice-versa.|
82+
| 6443 | Logical network used for AKS Arc VMs | IP addresses in management network | Required to communicate with Kubernetes APIs. | If you use separate VLANs, IP addresses in management network used for Azure Local and Arc Resource Bridge need to access the AKS Arc cluster VMs on this port and vice-versa.|
83+
| 55000 | IP addresses in management network | Logical network used for AKS Arc VMs | Cloud Agent gRPC server | If you use separate VLANs, the AKS Arc VMs need to access the IP addresses in management network used for cloud agent IP and cluster IP on this port and vice-versa. |
84+
| 65000 | IP addresses in management network | Logical network used for AKS Arc VMs | Cloud Agent gRPC authentication | If you use separate VLANs, the AKS Arc VMs need to access the IP addresses in management network used for cloud agent IP and cluster IP on this port and vice-versa. |
8585

8686
## Next steps
8787
[IP address planning and considerations for Kubernetes clusters and applications](aks-hci-ip-address-planning.md)

azure-local/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ items:
182182
- name: About security features
183183
href: concepts/security-features.md
184184
- name: Download Azure Local security book
185-
href: https://assetsprod.microsoft.com/mpn/azure-stack-hci-security-book.pdf
185+
href: https://github.com/Azure-Samples/AzureLocal/blob/main/SecurityBook/Azure%20Local%20Security%20Book_01172025.pdf
186186
- name: Assess environment readiness
187187
href: manage/use-environment-checker.md
188188
- name: Configure advanced Active Directory settings

azure-local/concepts/security-features.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ For more information, see the full [List of option rules](/windows/security/appl
8888
Allow rules in the base policy allow all Microsoft components delivered by the OS and the cloud deployments to be trusted. Deny rules block user mode applications and kernel components considered unsafe for the security posture of the solution.
8989

9090
> [!NOTE]
91-
> The Allow and Deny rules in the base policy are updated regularly to improve product funtionality and maximize protection of your solution.
91+
> The Allow and Deny rules in the base policy are updated regularly to improve product functionality and maximize protection of your solution.
9292
9393
To learn more about Deny rules, see:
9494

@@ -134,7 +134,7 @@ In this release, the following capabilities are enabled:
134134
- The ability to monitor and alert whether certificates are still valid.
135135

136136
> [!NOTE]
137-
> Secret creation and rotation operations take about ten minutes to complete, depending on the size of the system.
137+
> Secret creation and rotation operations take about 10 minutes to complete, depending on the size of the system.
138138
139139
For more information, see [Manage secrets rotation](../manage/manage-secrets-rotation.md).
140140

@@ -154,6 +154,17 @@ The syslog forwarder in Azure Local supports various configurations based on whe
154154

155155
For more information, see [Manage syslog forwarding](../manage/manage-syslog-forwarding.md).
156156

157+
## Microsoft Defender Antivirus
158+
159+
Azure Local comes with Microsoft Defender Antivirus enabled and configured by default. We strongly recommend that you use Microsoft Defender Antivirus with your Azure Local instances. Microsoft Defender Antivirus provides real-time protection, cloud-delivered protection, and automatic sample submission.
160+
161+
Although we recommend using Microsoft Defender Antivirus for Azure Local, if you prefer third-party antivirus and security software, we advise selecting one that your Independent Software Vendor (ISV) has validated for Azure Local to minimize potential functionality issues.
162+
163+
For more information, see [Microsoft Defender Antivirus compatibility with other security products](/defender-endpoint/microsoft-defender-antivirus-compatibility).
164+
165+
> [!NOTE]
166+
> If you remove the Microsoft Defender Antivirus feature, leave the settings associated with the feature from the security baseline as-is. You don't need to remove these settings.
167+
157168
## Microsoft Defender for Cloud (preview)
158169

159170
Microsoft Defender for Cloud is a security posture management solution with advanced threat protection capabilities. It provides you with tools to assess the security status of your infrastructure, protect workloads, raise security alerts, and follow specific recommendations to remediate attacks and address future threats. It performs all these services at high speed in the cloud through autoprovisioning and protection with Azure services, with no deployment overhead.

azure-local/manage/virtual-machine-image-linux-sysprep.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
88
ms.custom: devx-track-azurecli, linux-related-content
9-
ms.date: 11/25/2024
9+
ms.date: 01/23/2025
1010
---
1111

1212
# Prepare an Ubuntu image for Azure Local virtual machines
@@ -20,7 +20,7 @@ This article describes how to prepare an Ubuntu image to create a virtual machin
2020
Before you begin, meet the following prerequisites:
2121

2222
- Have access to an Azure Local instance. This system is deployed, registered, and connected to Azure Arc. Go to the **Overview** page in the Azure Local resource. On the **Server** tab on the right pane, **Azure Arc** should appear as **Connected**.
23-
- [Download the latest supported Ubuntu server image](https://ubuntu.com/download/server) on your Azure Local system. The supported OS versions are *Ubuntu 18.04*, *20.04*, and *22.04 LTS*. You prepare this image to create a VM image.
23+
- [Download the latest supported Ubuntu server image](https://ubuntu.com/download/server) on your Azure Local system. The supported OS versions are *20.04*, *22.04*, *24.04 LTS*. You prepare this image to create an Azure Local VM image.
2424

2525
## Workflow
2626

0 commit comments

Comments
 (0)