Skip to content

Commit 7e13443

Browse files
authored
Merge pull request #17575 from MicrosoftDocs/main
4/7/2025 AM Publish
2 parents c804704 + 9bfc9d0 commit 7e13443

File tree

4 files changed

+9
-7
lines changed

4 files changed

+9
-7
lines changed

azure-local/deploy/deployment-azure-resource-manager-template.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -200,9 +200,11 @@ This section contains known issues and workarounds for ARM template deployment.
200200
201201
**Issue**: In this release, you may see *Role assignment already exists* error. This error occurs if the Azure Local instance deployment was attempted from the portal first and the same resource group was used for ARM template deployment. You see this error on the **Overview > Deployment details** page for the applicable resource. This error indicates that an equivalent role assignment was already done by another identity for the same resource group scope and the ARM template deployment is unable to perform role assignment.
202202
203-
:::image type="content" source="./media/deployment-azure-resource-manager-template/error-role-assignment-already-exists-1.png" alt-text="Screenshot showing the role assignment exists message in the Errors blade." lightbox="./media/deployment-azure-resource-manager-template/error-role-assignment-already-exists-1.png":::
203+
:::image type="content" source="./media/deployment-azure-resource-manager-template/select-view-error-details-3.png" alt-text="Screenshot showing the role assignment error in the Errors blade." lightbox="./media/deployment-azure-resource-manager-template/select-view-error-details-3.png":::
204204
205-
**Workaround**: Although these errors can be disregarded and deployment can proceed via the ARM template, we strongly recommend that you don't interchange deployment modes between the portal and ARM template.
205+
**Workaround**: The failed resource on the Deployment details page specifies the role assignment name. If the resource name is **AzureStackHCIDeviceManagementRole-RoleAssignment** then role assignment failed for the **Azure Stack HCI Device Management Role**. Note this role name and go to **Resource Group > Access Control (IAM) > Role Assignments**. Search for the corresponding name and delete the existing role assignments there. Redeploy your template.
206+
207+
:::image type="content" source="./media/deployment-azure-resource-manager-template/workaround-details-2.png" alt-text="Screenshot showing the role assignment name on the Details page." lightbox="./media/deployment-azure-resource-manager-template/workaround-details-2.png":::
206208
207209
#### Tenant ID, application ID, principal ID, and scope aren't allowed to be updated
208210
321 KB
Loading
275 KB
Loading

azure-stack/user/azure-stack-network-differences.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: Azure Stack Hub networking differences
33
description: Learn about differences and considerations when working with networking in Azure Stack Hub.
44
author: sethmanheim
5-
ms.date: 09/03/2024
5+
ms.date: 04/07/2025
66
ms.topic: article
77
ms.author: sethm
88
ms.reviewer: rtiberiu
9-
ms.lastreviewed: 07/10/2019
9+
ms.lastreviewed: 04/07/2025
1010

1111
# Intent: As an Azure Stack user, I want to know the networking differences between Azure and Azure Stack
1212
# Keyword: azure stack networking differences
@@ -40,11 +40,11 @@ This article provides an overview of the unique considerations for Azure Stack H
4040
| | Service Endpoints | Supported for internal (non-Internet) connection to Azure Services. | Not yet supported. |
4141
| | Service Endpoint Policies | Supported | Not yet supported. |
4242
| | Service Tunnels | Supported | Not yet supported. |
43-
| Network Security Groups | Augmented Security Rules | Supported | Supported. |
43+
| Network Security Groups | Augmented Security Rules | Supported. | Supported. |
4444
| | Effective Security Rules | Supported | Not yet supported. |
4545
| | Application Security Groups | Supported | Not yet supported. |
4646
| | Rule Protocols | TCP, UDP, ICMP, Any | Only TCP, UDP or Any |
47-
| Virtual Network Gateways | Point-to-Site VPN Gateway | Supported | Not yet supported. |
47+
| Virtual Network Gateways | Point-to-Site VPN Gateway | Supported. | Not yet supported. |
4848
| | Vnet-to-Vnet Gateway | Supported | Not yet supported. |
4949
| | Virtual Network Gateway Type | Azure Supports VPN<br> Express Route <br> Hyper Net. | Azure Stack Hub currently supports only VPN type. |
5050
| | VPN Gateway SKUs | Support for Basic, GW1, GW2, GW3, Standard High Performance, Ultra-High Performance. | Support for Basic, Standard, and High-Performance SKUs. |
@@ -56,7 +56,7 @@ This article provides an overview of the unique considerations for Azure Stack H
5656
| | UsePolicyBasedTrafficSelectors | Azure supports using policy-based traffic selectors with route-based gateway connections. | Not yet supported. |
5757
| | Monitoring and Alerts | Azure uses Azure Monitor to set up alerts for VPN resources. | Not yet supported.|
5858
| | ASN | Azure supports 4-byte ASNs. | Azure Stack Hub only supports 2-byte ASNs (up to 65535).|
59-
| Load balancer | SKU | Basic and Standard Load Balancers are supported | Only the Basic Load Balancer is supported. The Standard Load Balancer is currently in public preview. For information, see [Standard Load Balancer considerations](standard-load-balancer-considerations.md).<br>The SKU property isn't supported.<br>The Basic SKU load balancer supports 200 front-end IP configurations per load balancer. |
59+
| Load balancer | SKU | The Basic and Standard load balancers are supported. | The Basic and Standard load balancers are supported. While the Standard Load Balancer enables customer scenarios, there are certain differences. For more information, see [Standard Load Balancer considerations](standard-load-balancer-considerations.md). |
6060
| | Zones | Availability Zones are Supported. | Not yet supported |
6161
| | Inbound NAT rules support for service endpoints | Azure supports specifying Service Endpoints for inbound NAT rules. | Azure Stack Hub doesn't yet support service endpoints, so these rules can't be specified. |
6262
| | Protocol | Azure Supports specifying GRE or ESP. | Protocol Class isn't supported in Azure Stack Hub. |

0 commit comments

Comments
 (0)