Skip to content

Commit c1cccfa

Browse files
Merge pull request #18642 from alkohli/1-do
Pull changes from Harald's PR 18641
2 parents a867a4b + 4a1a422 commit c1cccfa

File tree

3 files changed

+26
-11
lines changed

3 files changed

+26
-11
lines changed

azure-local/manage/disconnected-operations-deploy.md

Lines changed: 15 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -238,6 +238,8 @@ To prepare the first machine for the disconnected operations appliance, follow t
238238
239239
```powershell
240240
Import-Module "$applianceConfigBasePath\OperationsModule\Azure.Local.DisconnectedOperations.psd1" -Force
241+
Import-Module "$applianceConfigBasePath\OperationsModule\ExternalIdentityConfigurationModule.psm1" -Force
242+
241243
$mgmntCertFolderPath = "$certspath\ManagementEndpointCerts"
242244
$ingressCertFolderPath = "$certspath\IngressEndpointsCerts"
243245
```
@@ -288,8 +290,9 @@ Populate the required parameters based on your deployment planning. Modify the e
288290
1. Populate the identity configuration object.
289291
290292
```powershell
291-
$oidcCertChain = Get-CertificateChainFromEndpoint -endpoint 'https://adfs.azurestack.local'
292-
$ldapsCertChain = Get-CertificateChainFromEndpoint -endpoint 'https://dc01.azurestack.local'
293+
$oidcCertChain = Get-CertificateChainFromEndpoint -requestUri 'https://adfs.azurestack.local/adfs'
294+
# Omit ldapsCertChain in this preview release
295+
# $ldapsCertChain = Get-CertificateChainFromEndpoint -requestUri 'https://dc01.azurestack.local'
293296
$ldapPassword = 'RETRACTED'|ConvertTo-SecureString -AsPlainText -Force
294297
295298
$identityParams = @{
@@ -299,7 +302,6 @@ Populate the required parameters based on your deployment planning. Modify the e
299302
LdapServer = "adfs.azurestack.local"
300303
LdapCredential = New-Object PSCredential -ArgumentList @("ldap", $ldapPassword)
301304
SyncGroupIdentifier = "7d67fcd5-c2f4-4948-916c-b77ea7c2712f"
302-
LdapsCertChainInfo=$ldapsCertChainInfo
303305
OidcCertChainInfo=$oidcCertChainInfo
304306
}
305307
$identityConfiguration = New-ApplianceExternalIdentityConfiguration @identityParams
@@ -348,7 +350,7 @@ $installAzureLocalParams = @{
348350
IdentityConfiguration = $identityConfiguration
349351
CertificatesConfiguration = $CertificatesConfiguration
350352
TimeoutSec = 7200
351-
DisableCheckSum = $false
353+
DisableCheckSum = $true
352354
AutoScaleVMToHostHW = $false
353355
}
354356
@@ -359,10 +361,12 @@ Install-Appliance @installAzureLocalParams -disconnectMachineDeploy -Verbose
359361

360362
> [!NOTE]
361363
> Install the appliance on the first machine (seed node) to ensure Azure Local deploys correctly. The setup takes a few hours and must finish successfully before you move on. Once it’s complete, you have a local control plane running in your datacenter.
362-
363-
If the installation fails because of incorrect network, identity, or observability settings, update the configuration object and run the `Install-appliance` command again.
364-
365-
You can also specify the -clean switch to start installation from scratch. This switch resets any existing installation state and starts from the beginning
364+
>
365+
> If the installation fails because of incorrect network, identity, or observability settings, update the configuration object and run the `Install-appliance` command again.
366+
>
367+
> You can also specify the -clean switch to start installation from scratch. This switch resets any existing installation state and starts from the beginning
368+
>
369+
> DisableChecksum = $true will skip validating the signature of the Appliance. Use this when deploying an air-gapped environment in this release. If checksum validation is enabled - the node needs to be able to reach and validate the Microsoft cert signing certificates used for signing this build.
366370
367371
1. Modify the configuration object.
368372

@@ -653,7 +657,9 @@ To use the management endpoint for troubleshooting and reconfiguration, you need
653657
From a client with network access to the management endpoint, import the **OperationsModule** and set the context (modify the script to match your configuration):
654658

655659
```powershell
656-
Import-Module "C:\azurelocal\OperationsModule\Azure.Local.DisconnectedOperations.psd1" -Force
660+
Import-Module "$applianceConfigBasePath\OperationsModule\Azure.Local.DisconnectedOperations.psd1" -Force
661+
Import-Module "$applianceConfigBasePath\OperationsModule\ExternalIdentityConfigurationModule.psm1" -Force
662+
657663
$password = ConvertTo-SecureString 'RETRACTED' -AsPlainText -Force
658664
$context = Set-DisconnectedOperationsClientContext -ManagementEndpointClientCertificatePath "${env:localappdata}\AzureLocalOpModuleDev\certs\ManagementEndpoint\ManagementEndpointClientAuth.pfx" -ManagementEndpointClientCertificatePassword $password -ManagementEndpointIpAddress "169.254.53.25"
659665
```

azure-local/manage/disconnected-operations-known-issues.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,11 @@ These release notes update continuously, and we add critical issues that need a
2121

2222
## Known issues in the preview release
2323

24+
### Air-gapped deployment when local DNS forwards and resolves external domain requests
25+
There is a known issue if you try to deploy an air-gapped enviroment - in the rare condition you would have a local DNS server that is able to resolve public (Microsoft.com) endpoints.
26+
27+
Mitigation: Disable DNS forwarding for microsoft.com and azure.com zones. The appliance should not be able to resolve these DNS endpoint and will fail if it receives an IP address.
28+
2429
### Azure Local deployment with Azure Keyvault
2530

2631
Role-Based Access Control (RBAC) permissions on a newly created Azure Key Vault can take up to 20 minutes to propagate. If you create the Azure Key Vault in the local portal and try to finish the cloud deployment, you might run into permission issues when validating the cluster before deployment.

azure-local/manage/disconnected-operations-pki.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -313,8 +313,12 @@ You have a helper method in the **OperationsModule** that can help you populate
313313
Here's an example of how to populate the required parameters:
314314

315315
```powershell
316-
$oidcCertChain = Get-CertificateChainFromEndpoint -endpoint 'https://adfs.azurestack.local'
317-
$ldapsCertChain = Get-CertificateChainFromEndpoint -endpoint 'https://dc01.azurestack.local'
316+
Import-Module "$applianceConfigBasePath\OperationsModule\Azure.Local.DisconnectedOperations.psd1" -Force
317+
Import-Module "$applianceConfigBasePath\OperationsModule\ExternalIdentityConfigurationModule.psm1" -Force
318+
319+
$oidcCertChain = Get-CertificateChainFromEndpoint -requestUri 'https://adfs.azurestack.local/adfs'
320+
# Omit LDAPSCertChain in this preview releases
321+
# $ldapsCertChain = Get-CertificateChainFromEndpoint -requestUri 'https://dc01.azurestack.local'
318322
```
319323

320324
Here's an example of the output from Get-CertificateChainFromEndpoint

0 commit comments

Comments
 (0)