Skip to content

Commit a4486f1

Browse files
Merge pull request #18480 from MicrosoftDocs/main
Auto Publish – main to live - 2025-07-17 22:00 UTC
2 parents 72185f8 + 75fa390 commit a4486f1

File tree

7 files changed

+59
-11
lines changed

7 files changed

+59
-11
lines changed

.openpublishing.redirection.aks.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1489,6 +1489,11 @@
14891489
"source_path": "AKS-Arc/tutorial-kubernetes-upgrade-cluster.md",
14901490
"redirect_url": "/azure/aks/aksarc/overview",
14911491
"redirect_document_id": false
1492+
},
1493+
{
1494+
"source_path": "AKS-Arc/aks-hci-network-system-requirements.md",
1495+
"redirect_url": "/azure/aks/aksarc/network-system-requirements",
1496+
"redirect_document_id": false
14921497
}
14931498
]
14941499
}

AKS-Arc/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
- name: Networking
2626
items:
2727
- name: Networking concepts and requirements
28-
href: aks-hci-network-system-requirements.md
28+
href: network-system-requirements.md
2929
- name: IP address planning
3030
href: aks-hci-ip-address-planning.md
3131
- name: Load balancer

AKS-Arc/arc-gateway-aks-arc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.reviewer: srikantsarwa
99
ms.lastreviewed: 07/15/2025
1010
---
1111

12-
# Simplify network configuration requirements with AKS Arc Gateway (preview)
12+
# Simplify network configuration requirements with Azure Arc gateway (preview)
1313

1414
If you use enterprise proxies to manage outbound traffic, Azure Arc gateway can help simplify the process of enabling connectivity.
1515

AKS-Arc/aks-hci-network-system-requirements.md renamed to AKS-Arc/network-system-requirements.md

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: AKS enabled by Azure Arc network requirements
33
description: Learn about AKS network prerequisites.
44
ms.topic: overview
5-
ms.date: 07/02/2025
5+
ms.date: 07/17/2025
66
author: sethmanheim
77
ms.author: sethm
88
ms.reviewer: srikantsarwa
9-
ms.lastreviewed: 07/10/2025
9+
ms.lastreviewed: 07/17/2025
1010
---
1111

1212
# AKS enabled by Azure Arc network requirements
@@ -86,6 +86,22 @@ When you deploy Azure Local, you allocate a contiguous block of at least [six st
8686
| 55000 | IP addresses in management network | Logical network used for AKS Arc VMs | Cloud Agent gRPC server | If you use separate VLANs, the AKS Arc VMs need to access the IP addresses in management network used for cloud agent IP and cluster IP on this port and vice-versa. |
8787
| 65000 | IP addresses in management network | Logical network used for AKS Arc VMs | Cloud Agent gRPC authentication | If you use separate VLANs, the AKS Arc VMs need to access the IP addresses in management network used for cloud agent IP and cluster IP on this port and vice-versa. |
8888

89+
## Use Azure Arc gateway (preview) with Azure Local
90+
91+
If you use [Arc gateway](/azure/azure-local/deploy/deployment-azure-arc-gateway-overview) to deploy your Azure Local cluster infrastructure, make sure that connectivity between the AKS subnet and the cluster IP is allowed on port **40343**, as follows:
92+
93+
| Destination port | Destination | Source | Description | Bi-directional cross-VLAN networking notes |
94+
|------------------|---------------------------------|---------------------------------|-----------------------------------------------------------------------------|--------------------------------------------|
95+
| **40343** | Cluster IP address | Logical network used for AKS Arc VMs | Required only when the Azure Local cluster is configured with Arc Gateway for outbound connectivity. | If you use separate VLANs or subnets, ensure that the AKS Arc VMs can reach the Azure Local cluster IP address on port **40343**, and vice versa. |
96+
97+
### Retrieve the Azure Local cluster IP address
98+
99+
You can run the following PowerShell commands on the cluster to get the IP address of the Azure Local cluster:
100+
101+
```powershell
102+
Get-ClusterResource -Name "Cluster IP Address" | Get-ClusterParameter -Name Address | Select-Object -Property Value
103+
```
104+
89105
## Next steps
90106

91107
[IP address planning and considerations for Kubernetes clusters and applications](aks-hci-ip-address-planning.md)

AKS-Arc/network-validation-errors.md

Lines changed: 29 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ description: Learn how to troubleshoot general network validation errors in AKS
44
author: sethmanheim
55
ms.author: sethm
66
ms.topic: troubleshooting
7-
ms.date: 05/07/2025
8-
ms.reviewer: pradwivedi
9-
ms.lastreviewed: 05/06/2025
7+
ms.date: 07/17/2025
8+
ms.reviewer: srikantsarwa
9+
ms.lastreviewed: 07/16/2025
1010

1111
---
1212

@@ -60,6 +60,32 @@ This error indicates that the required URLs are not reachable from the AKS clust
6060

6161
To resolve this error, ensure that the logical network IP addresses have outbound internet access. If there's a firewall, ensure that the [AKS required URLs](aks-hci-network-system-requirements.md#firewall-url-exceptions) are accessible from the Arc VM logical network.
6262

63+
## InternetConnectivityError (in Arc Gateway scenario)
64+
65+
Error: Network validation failed during cluster creation.
66+
67+
### Description
68+
69+
Detailed message: `Not able to connect to https://mcr.microsoft.com. Error returned: action failed after 5 attempts: Get "https://mcr.microsoft.com": proxyconnect tcp: dial tcp 192.168.2.100:40343: connect: connection refused`.
70+
71+
### Causes of failure
72+
73+
- The control plane VM can't reach the Azure Local cluster IP on port **40343**, which is required when Arc Gateway is enabled.
74+
- The firewall or network security rules block traffic between the AKS subnet and the cluster IP.
75+
- Proxy settings are incorrect, or the proxy does not allow connections to `mcr.microsoft.com`.
76+
77+
### Mitigation
78+
79+
To resolve this error, you can take the following steps:
80+
81+
- Ensure that the **AKS subnet has connectivity to the Azure Local Cluster IP on port `40343`**.
82+
- Verify that the Arc Gateway service on the Azure Local Cluster is running and listening on port `40343`.
83+
- Check firewall or NSG rules to ensure that traffic between the AKS VMs and the Cluster IP on `40343` is allowed.
84+
- Confirm that proxy settings (if used) are correct and that the proxy can forward requests to `https://mcr.microsoft.com`.
85+
- Test connectivity to `https://mcr.microsoft.com` from the control plane VM, either directly or via the configured proxy.
86+
87+
For more information, see [Use Azure Arc Gateway with Azure Local](aks-hci-network-system-requirements.md#use-azure-arc-gateway-preview-with-azure-local).
88+
6389
## VMNotReachableError
6490

6591
Error: Network validation failed during cluster creation.

azure-local/deploy/azure-verification.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: overview
77
ms.custom:
88
- devx-track-azurepowershell
99
ms.reviewer: jlei
10-
ms.date: 03/30/2025
10+
ms.date: 07/08/2025
1111
ms.lastreviewed: 03/05/2024
1212
ms.service: azure-local
1313
---
@@ -28,6 +28,7 @@ Azure verification for VM enables you to use these benefits available only on Az
2828

2929
| Workload | What it is | How to get benefits |
3030
|------------------------------------------|----------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------------------|
31+
| Azure Machine Configuration | Azure Machine Configuration (formerly known as Azure Policy Guest Configuration) is provided by Azure Instance Metadata Service (IMDS). | IMDS requires you to enable [Legacy OS support](#legacy-os-support). |
3132
| Extended Security Update (ESUs) | Get security updates at no extra cost for end-of-support SQL and Windows Server VMs on Azure Local. <br/> For more information, see [Free Extended Security Updates (ESU) on Azure Local](../manage/azure-benefits-esu.md). | You must enable [Legacy OS support](#legacy-os-support) for older VMs running version Windows Server 2012 or earlier with [Latest Servicing Stack Updates](https://msrc.microsoft.com/update-guide/advisory/ADV990001).|
3233
| Azure Virtual Desktop (AVD) | AVD session hosts can run only on Azure infrastructure. Activate your Windows multi-session VMs on Azure Local using Azure VM verification. <br/> Licensing requirements for AVD still apply. See [Azure Virtual Desktop pricing](/azure/virtual-desktop/azure-stack-hci-overview#pricing). | Activated automatically for VMs running version Windows 11 multi-session with 4B update released on April 9, 2024 (22H2: [KB5036893](https://support.microsoft.com/topic/april-9-2024-kb5036893-os-builds-22621-3447-and-22631-3447-a674a67b-85f5-4a40-8d74-5f8af8ead5bb), 21H2: [KB5036894](https://support.microsoft.com/topic/april-9-2024-kb5036894-os-build-22000-2899-165dd6e1-74be-45b7-84e3-0f2a25d375f3)) or later. You must enable [legacy OS support](#legacy-os-support) for VMs running version Windows 10 multi-session with 4B update released on April 9, 2024 [KB5036892](https://support.microsoft.com/topic/april-9-2024-kb5036892-os-builds-19044-4291-and-19045-4291-cb5d2d42-6b10-48f7-829a-be7d416a811b) or later. |
3334
| Windows Server Datacenter: Azure Edition | Azure Edition VMs can run only on Azure infrastructure, including Azure Local. Activate your [Windows Server Azure Edition](/windows-server/get-started/azure-edition) VMs and use the latest Windows Server innovations and other exclusive features. <br/> Licensing requirements still apply. See ways to [license Windows Server VMs on Azure Local](../manage/vm-activate.md?tabs=azure-portal). | Activated automatically for VMs running Windows Server Azure Edition 2022 with 4B update released on April 9, 2024 ([KB5036909](https://support.microsoft.com/topic/april-9-2024-kb5036909-os-build-20348-2402-36062ce9-f426-40c6-9fb9-ee5ab428da8c)) or later. |

azure-local/manage/health-service-faults.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn more about Health Service faults
44
ms.author: alkohli
55
ms.topic: how-to
66
author: alkohli
7-
ms.date: 07/15/2025
7+
ms.date: 07/16/2025
88
---
99

1010
# View Health Service faults
@@ -319,8 +319,8 @@ For a detailed overview of health faults, including fault severity mappings, hea
319319

320320
Considerations for Health Service faults:
321321

322-
- Some faults are disabled by default. To enable a fault, set the corresponding health setting to true.
323-
- For example, fault type `Microsoft.Health.FaultType.PhysicalDisk.HighLatency.AverageIO` is disabled by default. To enable it, set the health setting `System.Storage.PhysicalDisk.HighLatency.Threshold.Tail.Enabled` to true.
322+
- Some faults are disabled by default. To enable a fault, set the corresponding health setting to true. For example, fault type `Microsoft.Health.FaultType.PhysicalDisk.HighLatency.AverageIO` is disabled by default. To enable it, set the health setting `System.Storage.PhysicalDisk.HighLatency.Threshold.Tail.Enabled` to true.
323+
324324
- The health of storage enclosure components, such as fans, power supplies, and sensors are derived from SCSI Enclosure Services (SES). If your vendor doesn't provide this information, the Health Service cannot display it.
325325

326326
## Additional references

0 commit comments

Comments
 (0)