Skip to content

Commit e7364a5

Browse files
authored
Sync release-hotfixes with main
Sync release-hotfixes with main
2 parents a6c6b17 + 1341b0f commit e7364a5

9 files changed

+87
-92
lines changed

AKS-Arc/azure-rbac-local.md

Lines changed: 22 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ ms.custom: devx-track-azurecli
66
author: sethmanheim
77
ms.author: sethm
88
ms.reviewer: leslielin
9-
ms.date: 02/21/2025
10-
ms.lastreviewed: 02/21/2025
9+
ms.date: 05/21/2025
10+
ms.lastreviewed: 05/21/2025
1111

1212
# Intent: As an IT Pro, I want to use Azure RBAC to authenticate connections to my AKS clusters over the Internet or on a private network.
1313
# Keyword: Kubernetes role-based access control AKS Azure RBAC AD
@@ -31,7 +31,7 @@ For a conceptual overview, see [Azure RBAC for Kubernetes Authorization](concept
3131
Before you begin, make sure you have the following prerequisites:
3232

3333
- AKS on Azure Local currently supports enabling Azure RBAC only during Kubernetes cluster creation. You can't enable Azure RBAC after the Kubernetes cluster is created.
34-
- Install the latest version of the **aksarc** and **connectedk8s** Azure CLI extensions. Note that you need to run the **aksarc** extension version 1.1.1 or later to enable Azure RBAC. Run `az --version` to find the current version. If you need to install or upgrade Azure CLI, see [Install Azure CLI](/cli/azure/install-azure-cli).
34+
- You can enable Azure RBAC using either Azure CLI or the Azure portal. To use Azure CLI, you must install the latest versions of the **aksarc** and **connectedk8s** Azure CLI extensions. Note that you need the **aksarc** extension version 1.1.1 or later to enable Azure RBAC. Run `az --version` to find the current version. If you need to install or upgrade Azure CLI, see [Install Azure CLI](/cli/azure/install-azure-cli).
3535

3636
```azurecli
3737
az extension add --name aksarc
@@ -67,18 +67,30 @@ Before you begin, make sure you have the following prerequisites:
6767
6868
You can create an Azure RBAC-enabled Kubernetes cluster for authorization and a Microsoft Entra ID for authentication.
6969
70+
### [Azure CLI](#tab/azurecli)
71+
7072
```azurecli
7173
az aksarc create -n $aks_cluster_name -g $resource_group_name --custom-location $customlocation_ID --vnet-ids $logicnet_Id --generate-ssh-keys --enable-azure-rbac
7274
```
7375

7476
After a few minutes, the command completes and returns JSON-formatted information about the cluster.
7577

78+
### [Azure portal](#tab/azureportal)
79+
80+
1. Go to **Kubernetes - Azure Arc**, select the **Add** icon, and then select **Create a Kubernetes cluster with Azure Arc**.
81+
1. Under the **Access** tab, locate the authentication and authorization settings. Select **Microsoft Entra Authentication with Azure RBAC**.
82+
1. Complete all other desired configurations for your cluster.
83+
1. Select **Review + create** to create the cluster.
84+
---
85+
7686
## Step 2: Create role assignments for users to access the cluster
7787

7888
[!INCLUDE [built-in-roles](includes/built-in-roles.md)]
7989

8090
You can use the [`az role assignment create`](/cli/azure/role/assignment#az-role-assignment-create) command to create role assignments.
8191

92+
### [Azure CLI](#tab/azurecli)
93+
8294
First, get the `$ARM-ID` for the target cluster to which you want to assign a role.
8395

8496
```azurecli
@@ -95,6 +107,13 @@ az role assignment create --role "Azure Arc Kubernetes Viewer" --assignee <assig
95107

96108
In this example, the scope is the Azure Resource Manager ID of the cluster. It can also be the resource group containing the Kubernetes cluster.
97109

110+
### [Azure portal](#tab/azureportal)
111+
112+
1. Go to **Azure Arc | Kubernetes clusters** and locate your Azure RBAC-enabled cluster for which you want to assign roles.
113+
1. Navigate to **Access control (IAM)**, select the **Add** icon, and then select **Add role assignment**. If the **Add role assignment** option is disabled, verify that Azure RBAC is enabled by checking **Settings > Properties > AAD profile > Enable Azure RBAC**.
114+
1. Follow the instructions to complete the role assignment.
115+
---
116+
98117
### Create custom role definitions
99118

100119
You can choose to create your own role definition for use in role assignments.

AKS-Arc/includes/supported-gpu-models.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
author: sethmanheim
33
ms.author: sethm
44
ms.topic: include
5-
ms.date: 04/14/2025
5+
ms.date: 06/02/2025
66
ms.reviewer: abha
7-
ms.lastreviewed: 04/14/2025
7+
ms.lastreviewed: 06/02/2025
88

99
---
1010

1111
## Supported GPU models
1212

13-
The following GPU models are supported by AKS on Azure Local.
13+
The following GPU models are supported by AKS on Azure Local. Note that GPUs are only supported on Linux OS node pools. GPUs are not supported on Windows OS node pools.
1414

1515
| Manufacturer | GPU model | Supported version |
1616
|--------------|-----------|-------------------|
@@ -45,4 +45,4 @@ The following VM sizes for each GPU model are supported by AKS on Azure Local.
4545
| Standard_NC4_A16 | 1 | 16 | 4 | 8 |
4646
| Standard_NC8_A16 | 1 | 16 | 8 | 16 |
4747
| Standard_NC16_A16 | 2 | 32 | 16 | 64 |
48-
| Standard_NC32_A16 | 2 | 32 | 32 | 128 |
48+
| Standard_NC32_A16 | 2 | 32 | 32 | 128 |

azure-local/deploy/download-23h2-software.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
77
ms.service: azure-local
8-
ms.date: 04/28/2025
8+
ms.date: 06/02/2025
99
---
1010

1111
# Download operating system for Azure Local deployment
@@ -52,7 +52,7 @@ Follow these steps to download the software:
5252

5353
1. On the **Download Azure Stack HCI** page, do the following:
5454

55-
1. Select the subscription in which you intend to deploy Azure Local. Ensure that the selected subscription has the Microsoft Azure Stack HCI resource provider registered.
55+
1. Select the subscription in which you intend to deploy Azure Local. Ensure that the selected subscription has the Microsoft Azure Stack HCI resource provider registered and which you have **Reader** access at a minimum.
5656

5757
:::image type="content" source="media/download-23h2-software/download-azure-stack-hci.png" alt-text="Screenshot of the Download Azure Stack HCI OS version 23H2 page showing step 1." lightbox="media/download-23h2-software/download-azure-stack-hci.png":::
5858

azure-local/manage/azure-arc-vm-management-overview.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,9 @@ Consider the following limitations when you're managing VMs on Azure Local:
5656
- VLAN ID
5757
- Virtual switch name
5858

59+
> [!NOTE]
60+
> Taking a VM checkpoint locally is only supported for Azure Local 2504 and later.
61+
5962
## Components of Azure Local VM management
6063

6164
Azure Local VM management has several components, including:

azure-local/manage/virtual-machine-operations.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: concept-article
77
ms.service: azure-local
8-
ms.date: 04/28/2025
8+
ms.date: 06/02/2025
99
---
1010

1111
# Supported operations for Azure Local VMs enabled by Azure Arc
@@ -59,6 +59,7 @@ Perform the following VM operations only via the Azure CLI. Don't use the local
5959
- Save the VM state
6060
- Attach a GPU
6161
- Detach a GPU
62+
- Expand a data disk
6263

6364
### Local tools
6465

@@ -93,9 +94,12 @@ You perform these operations either on the VM itself or on the cluster/node. The
9394
- Change the default location of VM files
9495
- Change automatic balancing of VMs in the cluster
9596
- Change the Hyper-V MAC address range on the node
96-
- Change the size of a disk (compact or expand)
97+
- Compact a disk
9798
- Checkpoint a VM (standard or production)
9899

100+
> [!NOTE]
101+
> Taking a VM checkpoint locally is only supported for Azure Local 2504 and later.
102+
99103
#### Operations supported only via Network ATC PowerShell cmdlets
100104

101105
The following VM operations are supported only when you use the Network ATC PowerShell cmdlets. For more information, see [Customize cluster network settings](./manage-network-atc.md#customize-cluster-network-settings).
@@ -112,10 +116,11 @@ The following VM operations aren't supported.
112116
> [!IMPORTANT]
113117
> You can't perform these operations by using the Azure portal, the Azure CLI, or local tools. Performing these operations can lead to Azure Local VMs becoming unmanageable from the Azure portal.
114118
115-
- Rename a VM inside the guest operating system
119+
- Rename a VM inside the guest operating cluster
116120
- Change the IP address of a network interface
117121
- Enable or change the VLAN ID of a network interface
118122
- Live migrate a VM from one cluster to another
123+
- Storage live migration on a VM
119124
- Change the type of disk (static, dynamic, VHD, or VHDX)
120125

121126
If you need to change the IP address or the VLAN ID of a network interface, create a new network interface and delete the old one.

0 commit comments

Comments
 (0)