Skip to content

Commit 9bfab47

Browse files
authored
Update disconnected-operations-known-issues.md
Minor tweaks for clarity and conciseness.
1 parent 0a082f6 commit 9bfab47

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

azure-local/manage/disconnected-operations-known-issues.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,13 @@ ms.reviewer: hafianba
1616

1717
This article lists critical known issues and their workarounds in disconnected operations for Azure Local.
1818

19-
These release notes update continuously, and we add critical issues that require a workaround as we find them. Before you deploy disconnected operations with Azure Local, review the information here.
19+
These release notes update continuously, and we add critical issues that need a workaround as we find them. Before you deploy disconnected operations with Azure Local, review the information here.
2020

2121
## Known issues in the preview release
2222

2323
### Azure Local deployment with Azure Keyvault
2424

25-
Role-Based Access Control (RBAC) permissions on a newly created Azure Key Vault take up to 20 minutes to propagate. If you create the Azure Key Vault in the local portal and try to finish the cloud deployment, you might encounter permission issues when validating the cluster before deployment.
25+
Role-Based Access Control (RBAC) permissions on a newly created Azure Key Vault can take up to 20 minutes to propagate. If you create the Azure Key Vault in the local portal and try to finish the cloud deployment, you might run into permission issues when validating the cluster before deployment.
2626

2727
**Mitigation**: Wait 20 minutes after you create the Azure Key Vault to finish deploying the cluster, or create the key vault ahead of time. Assign the managed identity for each node, the key vault admin, and the user deploying to the cloud explicit roles on the key vault: **Key Vault Secrets Officer** and **Key Vault Data Access Administrator**.
2828

@@ -33,8 +33,8 @@ param($resourceGroupName = "aldo-disconnected", $keyVaultName = "aldo-kv", $subs
3333
3434
$location = "autonomous"
3535
36-
Write-Verbose "Login interactive with user that will do cloud deployment"
37-
# Login to Azure CLI (use the user you will run the portal deployment flow)"
36+
Write-Verbose "Sign in interactive with the user who does cloud deployment"
37+
# Sign in to Azure CLI (se the user you run the portal deployment flow with)"
3838
az login
3939
az account set --subscription $subscriptionName
4040
$accountInfo = (az account show)|convertfrom-json
@@ -45,13 +45,13 @@ $rg = (az group create --name $resourceGroupName --location $location)|Convertfr
4545
$kv = (az keyvault create --name $keyVaultName --resource-group $resourceGroupName --location $location --enable-rbac-authorization $true)|Convertfrom-json
4646
4747
Write-Verbose "Assigning permissions to $($accountInfo.user.name) on the Key Vault"
48-
# Assign the secrets officer role to the resource group (could use KV explicit).
48+
# Assign the secrets officer role to the resource group (you can use KV explicit).
4949
az role assignment create --assignee $accountInfo.user.name --role "Key Vault Secrets Officer" --scope $kv.Id
5050
az role assignment create --assignee $accountInfo.user.name --role "Key Vault Data Access Administrator" --scope $kv.Id
5151
5252
$machines = (az connectedmachine list -g $resourceGroupName)|ConvertFrom-Json
5353
54-
# For now only supporting minimum 3 machines for ALDO
54+
# For now, only support a minimum of 3 machines for Azure Local disconnected operations
5555
if($machines.Count -lt 3){
5656
Write-Error "No machines found in the resource group $resourceGroupName. Please check the resource group and try again. Please use the same resource group as where your Azure Local nodes are"
5757
return 1

0 commit comments

Comments
 (0)