Skip to content

Commit 9507c42

Browse files
author
Manika Dhiman
committed
resolved merge conflict
2 parents 0daae6f + b30f232 commit 9507c42

14 files changed

+129
-21
lines changed

AKS-Arc/TOC.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,11 +181,12 @@
181181
href: check-vm-sku.md
182182
- name: Connectivity issues with MetalLB
183183
href: load-balancer-issues.md
184-
185184
- name: Reference
186185
items:
187186
- name: Azure CLI
188187
href: /cli/azure/aksarc
188+
- name: Azure PowerShell
189+
href: /powershell/module/az.aksarc/
189190
- name: REST API reference
190191
href: /rest/api/hybridcontainer/operation-groups
191192
- name: Resources

azure-local/concepts/observability.md

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Local observability
33
description: Learn about observability in Azure Local.
44
author: alkohli
55
ms.author: alkohli
6-
ms.date: 10/18/2024
6+
ms.date: 04/25/2025
77
ms.topic: conceptual
88
ms.service: azure-local
99
---
@@ -109,6 +109,36 @@ The following table describes the types of data, their storage location, default
109109
| Metrics | Metrics are numerical values collected at regular intervals, describing aspects of a system. | Metrics data is sent to the respective region in which resource is deployed. | Enabled by default and can be disabled anytime. | Platform metrics are stored for 93 days, however, you can only query (in the Metrics tile) for a maximum of 30 days' worth of data on any single chart. | You can use metrics explorer to interactively analyze the data in your metric database. |
110110
| Billing and census | Billing data includes the system ID and the number of physical cores and hours used. Census data is required to enable basic management from Azure and includes system information (system name and ID, system connection status, storage pool ID, trial days remaining and billing model), machine information (number of machines, machine name, OS version, machine manufacturer, model and serial number, number of physical cores and memory size), and basic configuration such as, enablement of Azure verification for VMs, Azure managed identity and diagnostics level setting. | Billing and census data is sent to the respective resource region where the customer registered the device. | Billing is always enabled as it is required to charge for Azure Local usage. Census data is also always enabled, as it includes the minimal information required to manage Azure Local from Azure. | Data is deleted when the resource is deleted, except for billing data, which is retained. | To view billing data, navigate to the Azure Local system resource page in Azure portal, select **Overview** in the left pane, in the Essentials section select the **Billing status** link, followed by **View Cost Management**. To view census data, select **JSON View** located in the top right corner of the Essentials section. |
111111

112+
## Crash dump collection
113+
114+
Crash dump collection is a feature in Azure Local that allows for the automatic collection, analysis, and debugging of crashes. The data collected from a crash, referred to as the crash dump, is used for analysis and debugging.
115+
116+
### Key features
117+
118+
Here are the key features of crash dump collection for Azure Local:
119+
120+
- **Automatic collection and analysis.** Automatically gathers data from Azure Local crashes and analyzes it to pinpoint the root causes of failures, aiding in quick diagnosis and resolution. This minimizes downtime and enhances service reliability.
121+
- **Compliance and security.** Ensures crash data is handled securely and in compliance with data protection regulations across all Azure regions and national clouds.
122+
- **Customizable settings.** Enabled by default for optimal performance and reliability, but can be disabled using specific commands if necessary. However, we recommend to keep it enabled to benefit from its diagnostic capabilities.
123+
124+
### Prerequisites
125+
126+
To use the crash dump collection feature, install the `AzureEdgeTelemetryAndDiagnostics` extension, version 2.0.18 or later. For information about the extension, see [Azure Local telemetry and diagnostics extension overview](./telemetry-and-diagnostics-overview.md).
127+
128+
### Disable crash dump collection
129+
130+
To disable the crash dump collection capability, use the following command:
131+
132+
```powershell
133+
Set-EdgeCrashDumpCollection -SetState Disable
134+
```
135+
136+
To re-enable it, use the following command:
137+
138+
```powershell
139+
Set-EdgeCrashDumpCollection -SetState Enable
140+
```
141+
112142
## Next steps
113143

114144
- [Azure Local telemetry and diagnostics extension](./telemetry-and-diagnostics-overview.md)

azure-local/concepts/system-requirements-23h2.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
88
ms.custom: references_regions
9-
ms.date: 04/03/2025
9+
ms.date: 04/25/2025
1010
---
1111

1212
# System requirements for Azure Local
@@ -32,6 +32,10 @@ Here are the Azure requirements for your Azure Local instance:
3232

3333
- **Azure regions**: Azure Local is supported for the following regions:
3434

35+
# [Azure public](#tab/azure-public)
36+
37+
These public regions support geographic locations worldwide, for clusters deployed anywhere in the world:
38+
3539
- East US
3640
- West Europe
3741
- Australia East
@@ -41,6 +45,15 @@ Here are the Azure requirements for your Azure Local instance:
4145
- Japan East
4246
- South Central US
4347

48+
49+
# [Azure Government (Preview)](#tab/azure-government)
50+
51+
Regions supported in the Azure Government cloud:
52+
53+
- US Gov Virginia
54+
55+
---
56+
4457
- **Azure Key Vault**: Make sure to enable public network access when you set up a key vault. This setting allows Azure Local instances to connect to the key vault without any access issues.
4558

4659
## Machine and storage requirements

azure-local/deploy/download-23h2-software.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
8-
ms.date: 04/23/2025
8+
ms.date: 04/28/2025
99
---
1010

1111
# Download operating system for Azure Local deployment
@@ -34,7 +34,8 @@ Before you begin the download of the software from Azure portal, ensure that you
3434
## Download the software from the Azure portal
3535

3636
> [!IMPORTANT]
37-
> English is the only supported language for the deployment.
37+
> - English is the only supported language for the deployment.
38+
> - For deployments in Azure Government only, download the OS image from the following location: [OS image](https://aka.ms/hcireleaseimage).
3839
3940
Follow these steps to download the software:
4041

azure-local/deploy/single-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Currently you can't use Windows Admin Center to deploy Azure Stack HCI on a sing
2323

2424
## Prerequisites
2525

26-
- A server from the [Azure Stack HCI Catalog](https://hcicatalog.azurewebsites.net/#/catalog) certified for use as a single-node cluster and configured with all NVMe or all SSD drives.
26+
- A server from the [Azure Stack HCI Catalog](https://azurelocalsolutions.azure.microsoft.com/#/catalog) certified for use as a single-node cluster and configured with all NVMe or all SSD drives.
2727
- For network, hardware and other requirements, see [Azure Stack HCI network and domain requirements](../deploy/operating-system.md#determine-hardware-and-network-requirements).
2828
- Optionally, [install Windows Admin Center](/windows-server/manage/windows-admin-center/deploy/install) to register and manage the server after it's deployed.
2929

azure-local/known-issues.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Release notes with fixed and known issues in Azure Local
33
description: Read about the known issues and fixed issues in Azure Local.
44
author: alkohli
55
ms.topic: conceptual
6-
ms.date: 04/29/2025
6+
ms.date: 04/28/2025
77
ms.author: alkohli
88
ms.reviewer: alkohli
99
---
@@ -58,6 +58,7 @@ The following table lists the known issues in this release:
5858
|---------|---------|---------|
5959
| Add server <br> Repair server <!--32447442--> | The `Add-server` and `Repair-server` cmdlets fail with the error: <br> `Cluster Build ID matches node to add's Build ID`. | Use the OS image of the same solution version as that running on the existing cluster. To get the OS image, contact Microsoft Support or OEM Support. |
6060

61+
6162
## Known issues from previous releases
6263

6364
The following table lists the known issues from previous releases:
@@ -92,7 +93,7 @@ The following table lists the known issues from previous releases:
9293

9394
## Expected system behavior
9495

95-
The following table lists the expected behavior of Azure Local solution, which are not bugs or limitations.
96+
The following table lists the system behavior, which is by design and shouldn't be considered as bugs or limitations.
9697

9798
| Feature | Behavior | Workaround |
9899
|---------|---------|---------|
@@ -153,6 +154,8 @@ The following table lists the known issues in this release:
153154
| Updates <!--32073115--> | Updating to 2503.0.13 failed `Update PreRequisites` for Role 'MocArb' with exception: `SyntaxWarning: invalid escape sequence '\W' at CheckAndInstall-CliExtensions`. | For detailed steps on how to resolve this issue, see the [Troubleshooting guide](https://github.com/Azure/AzureLocal-Supportability/blob/main/TSG/Update/). |
154155
| Security vulnerability <!--32074481--> | There is a known security vulnerability in this release that may affect security scans for the updates. For more information, see [Azure Arc Installer vulnerability CVE-2025-26627 - Host](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26627) | |
155156
| Azure Local VMs <!--32074457O--> | There is a known security vulnerability in this release that may affect security scans for the updates. For more information, see [Azure Arc Installer vulnerability CVE-2025-26627 - Guest](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26627) | |
157+
| Microsoft Defender for Cloud <br><br> Azure Government <!--32555179-->| In the Azure Government cloud, Microsoft Defender for Cloud recommendations for Azure Local do not show up in the Microsoft Defender for Cloud portal.| |
158+
| Metrics <br><br> Azure Government <!--IcM-620345316-->| Metrics from Azure Local clusters in the Azure Government cloud fail to reach Azure. As a result, metrics don't show up in the Monitoring, Metrics, or workbook graphs. Metrics based alerts aren't triggered and new alerts can't be set up.| |
156159

157160

158161
## Known issues from previous releases

azure-local/manage/manage-security-with-defender-for-cloud.md

Lines changed: 25 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ description: This article describes how to use Microsoft Defender for Cloud to s
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 04/09/2025
7+
ms.date: 04/23/2025
8+
89
ms.service: azure-local
910
---
1011

@@ -32,15 +33,16 @@ Before you begin, make sure that the following prerequisites are completed:
3233
Follow these steps to enable Defender for Cloud for Azure Local.
3334

3435
- Step 1: Turn on Foundational CSPM.
35-
- Step 2: Turn on Defender for Servers for individual machines and Azure Local VMs enabled by Arc.
36+
- Step 2: Turn on Defender for Servers for individual machines and Azure Local virtual machines (VMs) enabled by Azure Arc.
37+
3638

3739
### Step 1: Turn on Foundational CSPM
3840

3941
This step turns on the basic Defender for Cloud plan—at no extra cost. This plan lets you monitor and identify the steps that you can take to secure Azure Local, along with other Azure and Arc resources. For instructions, see [Enable Defender for Cloud on your Azure subscription](/azure/defender-for-cloud/connect-azure-subscription#enable-defender-for-cloud-on-your-azure-subscription).
4042

4143
### Step 2: Turn on Defender for Servers for individual machines and Azure Local VMs
4244

43-
This step gets you enhanced security features including security alerts for individual machines and VMs.
45+
This step gets you enhanced security features including security alerts for individual machines and Azure Local VMs.
4446

4547
To do so, follow all the instructions in the [Enable the Defender for Servers plan](/azure/defender-for-cloud/tutorial-enable-servers-plan#enable-the-defender-for-servers-plan) section, which includes:
4648

@@ -100,11 +102,27 @@ After you've [enabled Defender for Cloud for Azure Local](#enable-defender-for-c
100102
101103
To learn more about the security recommendations specific to Azure Local, refer to the [Azure compute recommendations](/azure/defender-for-cloud/recommendations-reference-compute#azure-compute-recommendations) section in the [Compute security recommendations](/azure/defender-for-cloud/recommendations-reference-compute) article.
102104

103-
## Monitor servers and Azure Local VMs
105+
### Security recommendation exclusions
106+
107+
You can ignore the Windows Defender for Cloud recommendations below for storage accounts and Azure Key Vaults that are associated with Azure Local instances. However, don't ignore these recommendations for other storage accounts and Azure Key Vaults you may have.
108+
109+
| Affected resource | Recommendation | Exclusion reason |
110+
| --- | --- | --- |
111+
| Storage account | Storage accounts should have infrastructure encryption. | Storage account encryption isn't supported for Azure Local instances because it doesn't allow passing in an encryption key. |
112+
| Storage account | Storage accounts should prevent shared key access. | Azure Local supports accessing storage accounts exclusively through shared keys. |
113+
| Storage account | Storage account should use a private link connection. | Azure Local doesn't currently support private link connections. |
114+
| Azure Key Vault | Azure Key Vaults should use a private link. | Azure Local doesn't currently support private link connections. |
115+
| Machine – Azure Arc | Windows Defender Exploit Guard should be enabled on Azure Local machines. | Windows Defender Exploit Guard isn't applicable to server-core SKUs without a GUI such as the Azure Local OS. |
116+
| Machine – Azure Arc | Azure Local machines should be configured to periodically check for missing system updates. | Azure Local machines shouldn't be updated individually. Use the Azure Local section in Azure Update Manager to update multiple systems or the Updates page on the Azure Local resource view whenever an update is available for the Azure Local instance. Updating individual machines could result in a mixed-mode state, which isn't supported. |
117+
| Machine – Azure Arc | System updates should be installed on your Azure Local machines using Azure Update Manager. | Azure Local machines shouldn't be updated individually. Utilize the Azure Local section in Azure Update Manager to update multiple systems or the Updates page on the Azure Local resource view whenever an update is available for the Azure Local instance. Updating individual machines could result in a mixed-mode state, which isn't supported. |
118+
| Machine – Azure Arc | Azure Local machines should have a vulnerability assessment solution. | Microsoft Defender Vulnerability Management doesn't currently support Azure Local. |
104119

105-
Go to the Microsoft Defender for Cloud portal to monitor alerts for individual servers and VMs running on Azure Local. You can utilize the regulatory compliance and attack path analysis features, among other enhanced security features.
120+
## Monitor Azure Local machines and Azure Local VMs
121+
122+
Go to the Microsoft Defender for Cloud portal to monitor alerts for individual Azure Local machines and Azure Local VMs.
123+
124+
Follow these steps to access the Microsoft Defender for Cloud portal's pages to monitor individual servers and Azure Local VMs:
106125

107-
Follow these steps to access the Microsoft Defender for Cloud portal's pages to monitor individual servers and VMs:
108126

109127
1. Sign into the Azure portal, and search for and select **Microsoft Defender for Cloud**.
110128

@@ -114,6 +132,7 @@ Follow these steps to access the Microsoft Defender for Cloud portal's pages to
114132

115133
:::image type="content" source="./media/manage-security-with-defender-for-cloud/defender-for-cloud-overview.png" alt-text="Screenshot of the Defender for Cloud Overview page." lightbox="./media/manage-security-with-defender-for-cloud/defender-for-cloud-overview.png" :::
116134

135+
117136
## Next steps
118137

119138
- [Review the deployment checklist and install Azure Local](../deploy/deployment-checklist.md).

azure-local/security-update/security-update.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ This security update includes quality improvements. Below is a summary of the ke
143143

144144
Data to be set: 1
145145

146-
For more information about security vulnerabilities, see the [Security Update Guide](https://portal.msrc.microsoft.com/security-guidance) and the [February 2025 Security Updates](https://msrc.microsoft.com/update-guide/releaseNote/2025-Feb).
146+
For more information about security vulnerabilities, see the [Security Update Guide](https://portal.msrc.microsoft.com/security-guidance) and the [March 2025 Security Updates](https://msrc.microsoft.com/update-guide/releaseNote/2025-Mar).
147147

148148
## Known issues
149149

@@ -171,7 +171,7 @@ To install the LCU on your Azure Local instance, see [Update Azure Stack Local i
171171

172172
## File list
173173

174-
For a list of the files that are provided in this update, download the file information for [Cumulative update KB 5053599](security-update.md).
174+
For a list of the files that are provided in this update, download the file information for [Cumulative update KB 5053599](https://go.microsoft.com/fwlink/?linkid=2309855).
175175

176176
::: moniker-end
177177

azure-local/upgrade/install-solution-upgrade.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ You install the solution upgrade via the Azure portal.
4545
> [!IMPORTANT]
4646
> - Microsoft only supports upgrade applied from Azure Local resource page. Use of 3rd party tools to install upgrades is not supported.
4747
> - If you have Azure Kubernetes Service (AKS) workloads on Azure Local, wait for the solution upgrade banner to appear on the Azure Local resource page. Then, remove AKS and all AKS hybrid settings before you apply the solution upgrade.
48+
> - By installing the solution upgrade, existing Hyper-V VMs won't automatically become Azure Arc VMs.
4849
4950
Follow these steps to install the solution upgrade:
5051

azure-local/upgrade/upgrade-22h2-to-23h2-other-methods.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Upgrade Azure Stack HCI OS, version 22H2 to version 23H2 via other method
33
description: Learn how to upgrade from Azure Stack HCI OS, version 22H2 to version 23H2 using other manual methods on Azure Local.
44
author: alkohli
55
ms.topic: how-to
6-
ms.date: 04/14/2025
6+
ms.date: 04/25/2025
77
ms.author: alkohli
88
ms.reviewer: alkohli
99
ms.service: azure-local
@@ -49,6 +49,16 @@ Before you begin, make sure that:
4949
- You shut down virtual machines (VMs). We recommend shutting down VMs before performing the OS upgrade to prevent unexpected outages and damages to databases.
5050
- You have access to the Azure Stack HCI OS, version 23H2 software update. This update is available via Windows Update or as a downloadable media. The media is an ISO file that you can download from the [Azure portal](https://portal.azure.com/#view/Microsoft_Azure_HybridCompute/AzureArcCenterBlade/~/hciGetStarted).
5151
- You have access to a client that can connect to your Azure Local. This client should be running PowerShell 5.0 or later.
52+
- (Recommended) You enable [Secure Boot](/windows-hardware/design/device-experiences/oem-secure-boot) on Azure Local machines before you upgrade the OS.
53+
To enable Secure Boot, follow these steps:
54+
1. Drain the cluster node.
55+
1. Restart the OS.
56+
1. Enter the BIOS/UEFI menu.
57+
1. Review the **Boot** or **Security** section of the UEFI configuration options Locate the Secure Boot option.
58+
1. Set the option to **Enabled** or **On**.
59+
1. Save the changes and restart your computer.
60+
61+
Consult with your hardware vendor for assistance if required.
5262

5363
## Step 0: Update registry keys
5464

0 commit comments

Comments
 (0)