You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: AKS-Arc/aks-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: What is AKS enabled by Azure Arc?
3
3
description: Learn about AKS enabled by Azure Arc and available deployment options.
4
4
ms.topic: overview
5
-
ms.date: 05/28/2024
5
+
ms.date: 04/10/2025
6
6
author: sethmanheim
7
7
ms.author: sethm
8
8
ms.reviewer: abha
@@ -41,7 +41,7 @@ The available deployment options are as follows:
41
41
42
42
-**AKS on Azure Local**: AKS on Azure Local uses Azure Arc to create new Kubernetes clusters on Azure Local directly from Azure. It enables you to use familiar tools like the Azure portal and Azure Resource Manager templates to create and manage your Kubernetes clusters running on Azure Local.
43
43
-**AKS Edge Essentials**: AKS Edge Essentials includes a lightweight Kubernetes distribution with a small footprint and simple installation experience, making it easy for you to deploy Kubernetes on PC-class or "light" edge hardware.
44
-
-**AKS on Windows Server**: Azure Kubernetes Service on Windows Server (and on Azure Local 22H2) is an on-premises Kubernetes implementation of AKS that automates running containerized applications at scale, using Windows PowerShell and Windows Admin Center. It simplifies deployment and management of AKS on Windows Server 2019/2022 Datacenter and Azure Local 22H2.
44
+
-**AKS on Windows Server**: Azure Kubernetes Service on Windows Server (and on Azure Local) is an on-premises Kubernetes implementation of AKS that automates running containerized applications at scale, using Windows PowerShell and Windows Admin Center. It simplifies deployment and management of AKS on Windows Server 2019/2022 Datacenter and Azure Local.
45
45
-**AKS on VMWare (preview)**: AKS on VMware (preview) enables you to use Azure Arc to create new Kubernetes clusters on VMware vSphere. With AKS on VMware, you can manage your AKS clusters running on VMware vSphere using familiar tools like Azure CLI.
Copy file name to clipboardExpand all lines: azure-local/deploy/deployment-azure-resource-manager-template.md
+1-47Lines changed: 1 addition & 47 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Azure Resource Manager template deployment for Azure Local, version 23H2
3
3
description: Learn how to prepare and then deploy Azure Local instance, version 23H2 using the Azure Resource Manager template.
4
4
author: alkohli
5
5
ms.topic: how-to
6
-
ms.date: 04/03/2025
6
+
ms.date: 04/10/2025
7
7
ms.author: alkohli
8
8
ms.reviewer: alkohli
9
9
ms.service: azure-local
@@ -30,52 +30,6 @@ This article details how to use an Azure Resource Manager template in the Azure
30
30
31
31
Follow these steps to prepare the Azure resources you need for the deployment:
32
32
33
-
### Create a service principal and client secret
34
-
35
-
To authenticate your system, you need to create a service principal and a corresponding **Client secret** for Arc Resource Bridge (ARB).
36
-
37
-
### Create a service principal for ARB
38
-
39
-
Follow the steps in [Create a Microsoft Entra application and service principal that can access resources via Azure portal](/entra/identity-platform/howto-create-service-principal-portal) to create the service principal and assign the roles. Alternatively, use the PowerShell procedure to [Create an Azure service principal with Azure PowerShell](/powershell/azure/create-azure-service-principal-azureps).
40
-
41
-
The steps are also summarized here:
42
-
43
-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/) as at least a Cloud Application Administrator. Browse to **Identity > Applications > App registrations** then select **New registration**.
44
-
45
-
1. Provide a **Name** for the application, select a **Supported account type**, and then select **Register**.
46
-
47
-
:::image type="content" source="./media/deployment-azure-resource-manager-template/create-service-principal-1a.png" alt-text="Screenshot showing Register an application for service principal creation." lightbox="./media/deployment-azure-resource-manager-template/create-service-principal-1a.png":::
48
-
49
-
1. Once the service principal is created, go to the **Enterprise applications** page. Search for and select the SPN you created.
50
-
51
-
:::image type="content" source="./media/deployment-azure-resource-manager-template/create-service-principal-2a.png" alt-text="Screenshot showing search results for the service principal created." lightbox="./media/deployment-azure-resource-manager-template/create-service-principal-2a.png":::
52
-
53
-
1. Under properties, copy the **Application (client) ID** and the **Object ID** for this service principal.
54
-
55
-
:::image type="content" source="./media/deployment-azure-resource-manager-template/create-service-principal-2b.png" alt-text="Screenshot showing Application (client) ID and the object ID for the service principal created." lightbox="./media/deployment-azure-resource-manager-template/create-service-principal-2b.png":::
56
-
57
-
You use the **Application (client) ID** against the `arbDeploymentAppID` parameter and the **Object ID** against the `arbDeploymentSPNObjectID` parameter in the Resource Manager template.
58
-
59
-
### Create a client secret for ARB service principal
60
-
61
-
1. Go to the application registration that you created and browse to **Certificates & secrets > Client secrets**.
62
-
1. Select **+ New client** secret.
63
-
64
-
:::image type="content" source="./media/deployment-azure-resource-manager-template/create-client-secret-1.png" alt-text="Screenshot showing creation of a new client secret." lightbox="./media/deployment-azure-resource-manager-template/create-client-secret-1.png":::
65
-
66
-
1. Add a **Description** for the client secret and provide a timeframe when it **Expires**. Select **Add**.
1. Copy the **client secret value** as you use it later.
71
-
72
-
> [!Note]
73
-
> For the application client ID, you will need it's secret value. Client secret values can't be viewed except for immediately after creation. Be sure to save this value when created before leaving the page.
Copy file name to clipboardExpand all lines: azure-local/manage/azure-arc-vm-management-overview.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: alkohli
6
6
ms.topic: how-to
7
7
ms.service: azure-local
8
8
ms.custom: linux-related-content
9
-
ms.date: 03/18/2025
9
+
ms.date: 04/09/2025
10
10
---
11
11
12
12
# What is Azure Local VM management?
@@ -43,7 +43,9 @@ Consider the following limitations when you're managing VMs on Azure Local:
43
43
- Taking checkpoints on VMs running on Azure Local by using on-premises tools, such as Windows Admin Center or Hyper-V Manager, will adversely affect the management of these VMs from Azure.
44
44
- Updates to VM configurations, such as vCPU, memory, network interface, or data disk via on-premises tools, won't be reflected on the Azure management plane.
45
45
- Moving a resource group isn't supported for VMs on Azure Local and its associated resources (such as network interfaces and disks).
46
-
- Creation of VMs by using Windows Server 2012 and Windows Server 2012 R2 images isn't supported via the Azure portal. You can do it only via the Azure CLI. For more information, see [Additional parameters for Windows Server 2012 and Windows Server 2012 R2 images](./create-arc-virtual-machines.md#additional-parameters-for-windows-server-2012-and-windows-server-2012-r2-images).
46
+
- Creation of VMs by using Windows Server 2012 and Windows Server 2012 R2 images isn't supported via the Azure portal. You can do it only via the Azure CLI. For more information, see [Additional parameters for Windows Server 2012 and Windows Server 2012 R2 images](./create-arc-virtual-machines.md#additional-parameters-for-windows-server-2012-and-windows-server-2012-r2-images).
47
+
48
+
- Azure Local VMs only support IPv4 addresses. IPv6 addresses aren't supported.
Copy file name to clipboardExpand all lines: azure-local/manage/create-logical-networks.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: alkohli
5
5
ms.author: alkohli
6
6
ms.topic: how-to
7
7
ms.service: azure-local
8
-
ms.date: 03/30/2025
8
+
ms.date: 04/09/2025
9
9
---
10
10
11
11
# Create logical networks for Azure Local VMs enabled by Azure Arc
@@ -14,6 +14,9 @@ ms.date: 03/30/2025
14
14
15
15
This article describes how to create or add logical networks for your Azure Local instance. Any Azure Local virtual machines (VMs) that you create use these logical networks.
16
16
17
+
> [!NOTE]
18
+
> Azure Local VMs only support IPv4 addresses. IPv6 addresses aren't supported.
19
+
17
20
## Prerequisites
18
21
19
22
Before you begin, make sure to complete the following prerequisites:
Copy file name to clipboardExpand all lines: azure-local/whats-new.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.topic: overview
5
5
author: alkohli
6
6
ms.author: alkohli
7
7
ms.service: azure-local
8
-
ms.date: 04/03/2025
8
+
ms.date: 04/09/2025
9
9
---
10
10
11
11
# What's new in Azure Local?
@@ -34,12 +34,14 @@ This is a baseline release with the following features and improvements:
34
34
- Environment checker validates the composed image used for bootstrap.
35
35
- Environment checker validates PowerShell modules as per the validated solution recipe in the Pre-Update checks.
36
36
-**Updates and upgrade improvements**
37
-
- The differentiation of SKUs is supported when considering the applicability of a Solution Builder Extension update.
38
-
- A tag is added to indicate a superseded update.
39
-
- The Download Service is now used to download HTTP content.
40
-
- A URL-based platform update package is now supported.
41
-
- Azure Local rebranding changes were made for Update.
37
+
- The Solution Builder Extension update now supports both supported and non-supported SKUs for a given model.
38
+
- A tag has been added to indicate whether an update is the latest or has been superseded.
39
+
- HTTP content will now be downloaded using a more resilient service (Download Service).
40
+
- OS content will be packaged with the release, rather than determining appliable content on the device at runtime. This change is aimed at minimizing failure points and supporting [sideloading](update/update-via-powershell-23h2.md#step-3-import-and-rediscover-updates).
41
+
- OS content will be installed using the CAU plug-ins that are shipped with OS.
42
+
- Azure Local rebranding changes were made for this update.
42
43
-**Azure Local VM changes**: You can now connect to an Azure Local VM using the SSH/RDP protocol without the need for line of sight (inside the host network). For more information, see [Connect to an Azure Local VM using SSH](./manage/connect-arc-vm-using-ssh.md).
44
+
-**What's new for migration**: Documentation for improvements and features for VM migration to Azure Local is now available. For more information, see [What's new in migration](./migrate/migrate-whats-new.md).
0 commit comments