Skip to content

Commit 77bd8e8

Browse files
Fixed last minute doc issues discovered in testing
1 parent 70e21e1 commit 77bd8e8

File tree

3 files changed

+26
-11
lines changed

3 files changed

+26
-11
lines changed

azure-local/manage/disconnected-operations-deploy.md

Lines changed: 15 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -239,6 +239,8 @@ To prepare the first machine for the disconnected operations appliance, follow t
239239
240240
```powershell
241241
Import-Module "$applianceConfigBasePath\OperationsModule\Azure.Local.DisconnectedOperations.psd1" -Force
242+
Import-Module "$applianceConfigBasePath\OperationsModule\ExternalIdentityConfigurationModule.psm1" -Force
243+
242244
$mgmntCertFolderPath = "$certspath\ManagementEndpointCerts"
243245
$ingressCertFolderPath = "$certspath\IngressEndpointsCerts"
244246
```
@@ -289,8 +291,9 @@ Populate the required parameters based on your deployment planning. Modify the e
289291
1. Populate the identity configuration object.
290292
291293
```powershell
292-
$oidcCertChain = Get-CertificateChainFromEndpoint -endpoint 'https://adfs.azurestack.local'
293-
$ldapsCertChain = Get-CertificateChainFromEndpoint -endpoint 'https://dc01.azurestack.local'
294+
$oidcCertChain = Get-CertificateChainFromEndpoint -requestUri 'https://adfs.azurestack.local/adfs'
295+
# Omit ldapsCertChain in this preview release
296+
# $ldapsCertChain = Get-CertificateChainFromEndpoint -requestUri 'https://dc01.azurestack.local'
294297
$ldapPassword = 'RETRACTED'|ConvertTo-SecureString -AsPlainText -Force
295298
296299
$identityParams = @{
@@ -300,7 +303,6 @@ Populate the required parameters based on your deployment planning. Modify the e
300303
LdapServer = "adfs.azurestack.local"
301304
LdapCredential = New-Object PSCredential -ArgumentList @("ldap", $ldapPassword)
302305
SyncGroupIdentifier = "7d67fcd5-c2f4-4948-916c-b77ea7c2712f"
303-
LdapsCertChainInfo=$ldapsCertChainInfo
304306
OidcCertChainInfo=$oidcCertChainInfo
305307
}
306308
$identityConfiguration = New-ApplianceExternalIdentityConfiguration @identityParams
@@ -350,7 +352,7 @@ $installAzureLocalParams = @{
350352
IdentityConfiguration = $identityConfiguration
351353
CertificatesConfiguration = $CertificatesConfiguration
352354
TimeoutSec = 7200
353-
DisableCheckSum = $false
355+
DisableCheckSum = $true
354356
AutoScaleVMToHostHW = $false
355357
}
356358
@@ -361,10 +363,12 @@ Install-Appliance @installAzureLocalParams -disconnectMachineDeploy -Verbose
361363

362364
> [!NOTE]
363365
> Install the appliance on the first machine (seed node) to ensure Azure Local deploys correctly. The setup takes a few hours and must finish successfully before you move on. Once it’s complete, you have a local control plane running in your datacenter.
364-
365-
If the installation fails because of incorrect network, identity, or observability settings, update the configuration object and run the `Install-appliance` command again.
366-
367-
You can also specify the -clean switch to start installation from scratch. This switch resets any existing installation state and starts from the beginning
366+
>
367+
> If the installation fails because of incorrect network, identity, or observability settings, update the configuration object and run the `Install-appliance` command again.
368+
>
369+
> You can also specify the -clean switch to start installation from scratch. This switch resets any existing installation state and starts from the beginning
370+
>
371+
> DisableChecksum = $true will skip validating the signature of the Appliance. Use this when deploying an air-gapped environment in this release. If checksum validation is enabled - the node needs to be able to reach and validate the Microsoft cert signing certificates used for signing this build.
368372
369373
1. Modify the configuration object.
370374

@@ -656,7 +660,9 @@ To use the management endpoint for troubleshooting and reconfiguration, you need
656660
From a client with network access to the management endpoint, import the **OperationsModule** and set the context (modify the script to match your configuration):
657661

658662
```powershell
659-
Import-Module "C:\azurelocal\OperationsModule\Azure.Local.DisconnectedOperations.psd1" -Force
663+
Import-Module "$applianceConfigBasePath\OperationsModule\Azure.Local.DisconnectedOperations.psd1" -Force
664+
Import-Module "$applianceConfigBasePath\OperationsModule\ExternalIdentityConfigurationModule.psm1" -Force
665+
660666
$password = ConvertTo-SecureString 'RETRACTED' -AsPlainText -Force
661667
$context = Set-DisconnectedOperationsClientContext -ManagementEndpointClientCertificatePath "${env:localappdata}\AzureLocalOpModuleDev\certs\ManagementEndpoint\ManagementEndpointClientAuth.pfx" -ManagementEndpointClientCertificatePassword $password -ManagementEndpointIpAddress "169.254.53.25"
662668
```

azure-local/manage/disconnected-operations-known-issues.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,11 @@ These release notes update continuously, and we add critical issues that need a
2020

2121
## Known issues in the preview release
2222

23+
### Air-gapped deployment when local DNS forwards and resolves external domain requests
24+
There is a known issue if you try to deploy an air-gapped enviroment - in the rare condition you would have a local DNS server that is able to resolve public (Microsoft.com) endpoints.
25+
26+
Mitigation: Disable DNS forwarding for microsoft.com and azure.com zones. The appliance should not be able to resolve these DNS endpoint and will fail if it receives an IP address.
27+
2328
### Azure Local deployment with Azure Keyvault
2429

2530
Role-Based Access Control (RBAC) permissions on a newly created Azure Key Vault can take up to 20 minutes to propagate. If you create the Azure Key Vault in the local portal and try to finish the cloud deployment, you might run into permission issues when validating the cluster before deployment.

azure-local/manage/disconnected-operations-pki.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -314,8 +314,12 @@ You have a helper method in the **OperationsModule** that can help you populate
314314
Here's an example on how to populate the required parameters:
315315

316316
```powershell
317-
$oidcCertChain = Get-CertificateChainFromEndpoint -endpoint 'https://adfs.azurestack.local'
318-
$ldapsCertChain = Get-CertificateChainFromEndpoint -endpoint 'https://dc01.azurestack.local'
317+
Import-Module "$applianceConfigBasePath\OperationsModule\Azure.Local.DisconnectedOperations.psd1" -Force
318+
Import-Module "$applianceConfigBasePath\OperationsModule\ExternalIdentityConfigurationModule.psm1" -Force
319+
320+
$oidcCertChain = Get-CertificateChainFromEndpoint -requestUri 'https://adfs.azurestack.local/adfs'
321+
# Omit LDAPSCertChain in this preview releases
322+
# $ldapsCertChain = Get-CertificateChainFromEndpoint -requestUri 'https://dc01.azurestack.local'
319323
```
320324

321325
Here's an example of the output from Get-CertificateChainFromEndpoint

0 commit comments

Comments
 (0)