You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-local/manage/disconnected-operations-known-issues.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,13 +16,13 @@ ms.reviewer: hafianba
16
16
17
17
This article lists critical known issues and their workarounds in disconnected operations for Azure Local.
18
18
19
-
These release notes update continuously, and we add critical issues that require a workaround as we find them. Before you deploy disconnected operations with Azure Local, review the information here.
19
+
These release notes update continuously, and we add critical issues that need a workaround as we find them. Before you deploy disconnected operations with Azure Local, review the information here.
20
20
21
21
## Known issues in the preview release
22
22
23
23
### Azure Local deployment with Azure Keyvault
24
24
25
-
Role-Based Access Control (RBAC) permissions on a newly created Azure Key Vault take up to 20 minutes to propagate. If you create the Azure Key Vault in the local portal and try to finish the cloud deployment, you might encounter permission issues when validating the cluster before deployment.
25
+
Role-Based Access Control (RBAC) permissions on a newly created Azure Key Vault can take up to 20 minutes to propagate. If you create the Azure Key Vault in the local portal and try to finish the cloud deployment, you might run into permission issues when validating the cluster before deployment.
26
26
27
27
**Mitigation**: Wait 20 minutes after you create the Azure Key Vault to finish deploying the cluster, or create the key vault ahead of time. Assign the managed identity for each node, the key vault admin, and the user deploying to the cloud explicit roles on the key vault: **Key Vault Secrets Officer** and **Key Vault Data Access Administrator**.
Write-Verbose "Assigning permissions to $($accountInfo.user.name) on the Key Vault"
48
-
# Assign the secrets officer role to the resource group (could use KV explicit).
48
+
# Assign the secrets officer role to the resource group (you can use KV explicit).
49
49
az role assignment create --assignee $accountInfo.user.name --role "Key Vault Secrets Officer" --scope $kv.Id
50
50
az role assignment create --assignee $accountInfo.user.name --role "Key Vault Data Access Administrator" --scope $kv.Id
51
51
52
52
$machines = (az connectedmachine list -g $resourceGroupName)|ConvertFrom-Json
53
53
54
-
# For now only supporting minimum 3 machines for ALDO
54
+
# For now, only support a minimum of 3 machines for Azure Local disconnected operations
55
55
if($machines.Count -lt 3){
56
56
Write-Error "No machines found in the resource group $resourceGroupName. Please check the resource group and try again. Please use the same resource group as where your Azure Local nodes are"
0 commit comments