Skip to content

Commit ee63855

Browse files
Merge pull request #18550 from haraldfianbakken/release-local-disconnectednew
Release local disconnectednew
2 parents c185025 + 9bfab47 commit ee63855

File tree

3 files changed

+49
-34
lines changed

3 files changed

+49
-34
lines changed

azure-local/manage/disconnected-operations-cli.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -51,11 +51,10 @@ For disconnected operations:
5151
1. Understand [public key infrastructure (PKI) for Azure Local with disconnected operations (preview)](disconnected-operations-pki.md)
5252
2. Set up and configure the certificate trusts for Azure CLI using PowerShell.
5353

54-
Here's an example script:
55-
56-
```console
57-
First, import the helper method as defined in this section:
54+
Here's an example script you can run in Powershell:
5855

56+
```powershell
57+
# Define the helper method
5958
function UpdatePythonCertStore
6059
{
6160
[CmdletBinding()]
@@ -109,9 +108,8 @@ For disconnected operations:
109108
Write-Verbose "[END] Updating CLI cert store"
110109
}
111110
112-
Next, run the helper method in PowerShell:
113-
114-
UpdatePythonCertStore -ApplianceRootCertPath D:\applianceIngressRoot.cer
111+
# Run the helper method in PowerShell:
112+
UpdatePythonCertStore -ApplianceRootCertPath D:\applianceIngressRoot.cer
115113
```
116114
117115
## Set up Azure CLI for disconnected operations

azure-local/manage/disconnected-operations-deploy.md

Lines changed: 26 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,8 @@ Here's a checklist of things you need before you deploy Azure Local with disconn
5151
- DNS server to resolve IP to FQDN names.
5252
- Local credentials for Azure Local machines.
5353
- Active directory credentials for Azure Local deployment.
54+
- [Active directory OU and networking requirements](../deploy/deployment-prerequisites.md).
55+
- [Local credentials and AD credentials to meet minimum password complexity](../deploy/deployment-prerequisites.md).
5456
- [Active directory prepared for Azure Local deployment](../deploy/deployment-prep-active-directory.md).
5557
- Certificates to secure ingress endpoints (24 certificates) and the public key (root) used to create these certificates.
5658
- Certificates to secure the management endpoint (2 certificates).
@@ -561,6 +563,28 @@ In this section, verify the installation and create local Azure resources.
561563
1. Sign in to your identity provider using the credentials you configured during the deployment.
562564
- You should see a familiar Azure portal running in your network.
563565
566+
### Register required resource providers
567+
568+
Make sure you register the required resource providers before deployment. Here's an example of how to automate the resource providers registration from Azure CLI.
569+
570+
```azurecli
571+
az cloud set -n 'azure.local'
572+
az login
573+
az provider register --namespace Microsoft.AzureStackHCI
574+
az provider register --namespace Microsoft.ExtendedLocation
575+
az provider register --namespace Microsoft.ResourceConnector
576+
az provider register --namespace Microsoft.EdgeArtifact
577+
```
578+
579+
Wait until all resource providers are in the state **Registered**. Here's a sample Azure CLI command to list all resource providers and their statuses.
580+
581+
```azurecli
582+
az provider list -o table
583+
```
584+
585+
> [!NOTE]
586+
> You can also register or view resource provider statuses in the local portal. To do this, go to your **Subscription**, click the dropdown arrow for **Settings**, and select **Resource providers**.
587+
564588
### Create resource group SPN for cluster
565589

566590
Use the operator account to create an SPN for Arc initialization of each Azure Local node. To create the SPN, follow these steps:
@@ -670,7 +694,6 @@ To initialize each node, follow these steps. Modify where necessary to match you
670694
ResourceGroup = $resourcegroup
671695
SubscriptionID = $applianceSubscriptionId
672696
TenantID = $applianceTenantId
673-
Force = $true
674697
CloudFqdn = $applianceFQDN
675698
}
676699
```
@@ -693,13 +716,7 @@ To initialize each node, follow these steps. Modify where necessary to match you
693716
694717
To enable Azure Local to be air-gapped or deployed fully disconnected, you must do the following on each node:
695718
696-
- Run this command to add the required environment variable:
697-
698-
```powershell
699-
[Environment]::SetEnvironmentVariable("NUGET_CERT_REVOCATION_MODE", "offline", [System.EnvironmentVariableTarget]::Machine)
700-
```
701-
702-
- Configure the timeserver to use your domain controller, for example. Modify the script and run it from PowerShell:
719+
- Configure the timeserver to use your domain controller. Modify the script and run it from PowerShell:
703720
704721
```powershell
705722
w32tm /config /manualpeerlist:"dc.contoso.com" /syncfromflags:manual /reliable:yes /update
@@ -761,7 +778,7 @@ From a client with network access to the management endpoint, import the **Opera
761778

762779
```powershell
763780
Import-Module "C:\azurelocal\OperationsModule\Azure.Local.DisconnectedOperations.psd1" -Force
764-
$password = ConvertTo-SecureString RETRACTED -AsPlainText -Force
781+
$password = ConvertTo-SecureString 'RETRACTED' -AsPlainText -Force
765782
$context = Set-DisconnectedOperationsClientContext -ManagementEndpointClientCertificatePath "${env:localappdata}\AzureLocalOpModuleDev\certs\ManagementEndpoint\ManagementEndpointClientAuth.pfx" -ManagementEndpointClientCertificatePassword $password -ManagementEndpointIpAddress "169.254.53.25"
766783
```
767784

azure-local/manage/disconnected-operations-known-issues.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,13 @@ ms.reviewer: hafianba
1616

1717
This article lists critical known issues and their workarounds in disconnected operations for Azure Local.
1818

19-
These release notes update continuously, and we add critical issues that require a workaround as we find them. Before you deploy disconnected operations with Azure Local, review the information here.
19+
These release notes update continuously, and we add critical issues that need a workaround as we find them. Before you deploy disconnected operations with Azure Local, review the information here.
2020

21-
## Known issues for version 2506
21+
## Known issues in the preview release
2222

2323
### Azure Local deployment with Azure Keyvault
2424

25-
Role-Based Access Control (RBAC) permissions on a newly created Azure Key Vault take up to 20 minutes to propagate. If you create the Azure Key Vault in the local portal and try to finish the cloud deployment, you might encounter permission issues when validating the cluster before deployment.
25+
Role-Based Access Control (RBAC) permissions on a newly created Azure Key Vault can take up to 20 minutes to propagate. If you create the Azure Key Vault in the local portal and try to finish the cloud deployment, you might run into permission issues when validating the cluster before deployment.
2626

2727
**Mitigation**: Wait 20 minutes after you create the Azure Key Vault to finish deploying the cluster, or create the key vault ahead of time. Assign the managed identity for each node, the key vault admin, and the user deploying to the cloud explicit roles on the key vault: **Key Vault Secrets Officer** and **Key Vault Data Access Administrator**.
2828

@@ -33,8 +33,8 @@ param($resourceGroupName = "aldo-disconnected", $keyVaultName = "aldo-kv", $subs
3333
3434
$location = "autonomous"
3535
36-
Write-Verbose "Login interactive with user that will do cloud deployment"
37-
# Login to Azure CLI (use the user you will run the portal deployment flow)"
36+
Write-Verbose "Sign in interactive with the user who does cloud deployment"
37+
# Sign in to Azure CLI (se the user you run the portal deployment flow with)"
3838
az login
3939
az account set --subscription $subscriptionName
4040
$accountInfo = (az account show)|convertfrom-json
@@ -45,13 +45,13 @@ $rg = (az group create --name $resourceGroupName --location $location)|Convertfr
4545
$kv = (az keyvault create --name $keyVaultName --resource-group $resourceGroupName --location $location --enable-rbac-authorization $true)|Convertfrom-json
4646
4747
Write-Verbose "Assigning permissions to $($accountInfo.user.name) on the Key Vault"
48-
# Assign the secrets officer role to the resource group (could use KV explicit).
48+
# Assign the secrets officer role to the resource group (you can use KV explicit).
4949
az role assignment create --assignee $accountInfo.user.name --role "Key Vault Secrets Officer" --scope $kv.Id
5050
az role assignment create --assignee $accountInfo.user.name --role "Key Vault Data Access Administrator" --scope $kv.Id
5151
5252
$machines = (az connectedmachine list -g $resourceGroupName)|ConvertFrom-Json
5353
54-
# For now only supporting minimum 3 machines for ALDO
54+
# For now, only support a minimum of 3 machines for Azure Local disconnected operations
5555
if($machines.Count -lt 3){
5656
Write-Error "No machines found in the resource group $resourceGroupName. Please check the resource group and try again. Please use the same resource group as where your Azure Local nodes are"
5757
return 1
@@ -90,7 +90,7 @@ After you stop an Arc VM, the start, restart, and delete buttons in the Azure po
9090

9191
#### Unable to view the network interface or read properties on an Arc VM
9292

93-
Viewing the network interface or properties on an Arc VM in the portal isn't supported in this release.
93+
Viewing the network interface or properties on an Arc VM in the portal is unsupported in this preview release.
9494

9595
#### Portal showing unsaved change notification after updating VM size
9696

@@ -121,7 +121,7 @@ ssh-keygen -t rsa
121121

122122
#### Update or scale a node pool from the portal is disabled
123123

124-
Updating or scaling a node pool from the portal is currently not supported.
124+
Updating or scaling a node pool from the portal is unsupported in this preview release.
125125

126126
**Mitigation**: Use the CLI to update or scale a node pool.
127127

@@ -150,13 +150,13 @@ Ignore the portal warning for this release.
150150

151151
When attempting to create a Kubernetes cluster with Entra authentication, you encounter an error.
152152

153-
**Mitigation**: Only local accounts with Kubernetes RBAC are supported in this preview.
153+
**Mitigation**: Only local accounts with Kubernetes RBAC are supported in this preview release.
154154

155155
#### Arc extensions
156156

157157
When navigating to extensions on an AKS cluster the add button is disabled and there aren't any extensions listed.
158158

159-
Arc extensions are unsupported in this release.
159+
Arc extensions are unsupported in this preview release.
160160

161161
#### AKS resource shows on portal after deletion
162162

@@ -168,23 +168,23 @@ After successfully deleting an AKS cluster from portal the resource continues to
168168
az aksarc delete
169169
```
170170

171-
### Export Host Guardian Service certificates
171+
#### Export Host Guardian Service certificates
172172

173-
This feature isn't supported in this release.
173+
This feature is unsupported in this preview release.
174174

175-
### Restart a node or the control plane VM
175+
#### Restart a node or the control plane VM
176176

177177
After you restart a node or the control plane VM, the system might take up to an hour to become fully ready. If you notice issues with the local portal, missing resources, or failed deployments, check the appliance health using the **OperationsModule** to confirm that all services are fully converged.
178178

179179
### Subscriptions
180180

181-
### Operator create subscription
181+
#### Operator create subscription
182182

183183
After you create a new subscription as an operator, the subscription appears in the list as non-clickable and displays ***no access*** for the owner.
184184

185185
**Mitigation**: Refresh your browser window.
186186

187-
### Operator subscriptions view (timeout)
187+
#### Operator subscriptions view (timeout)
188188

189189
If you're signed in as an operator, you might see a timeout screen and be unable to view, list, or create subscriptions.
190190

@@ -224,9 +224,9 @@ When you select Sign-out, the request doesn't work.
224224

225225
#### Template specs
226226

227-
Template specs aren't supported in the preview release. Deployments that use ARM templates with template specs fail.
227+
Template specs are unsupported in the preview release. Deployments that use ARM templates with template specs fail.
228228

229-
## Unsupported scenarios
229+
### Unsupported scenarios
230230

231231
The following scenarios are unsupported in the preview release.
232232

0 commit comments

Comments
 (0)