Skip to content

Commit f445d7b

Browse files
Merge pull request #3548 from MicrosoftDocs/main638768997082456989sync_temp
For protected branch, push strategy should use PR and merge to target branch method to work around git push error
2 parents 5cd823f + 4706e31 commit f445d7b

30 files changed

+510
-756
lines changed

adaptive-cloud/index.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -328,8 +328,6 @@ additionalContent:
328328
# Cards
329329
- title: Azure Stack
330330
links:
331-
- url: /azure-stack/asdk
332-
text: Azure Stack development kit
333331
- url: /azure-stack/hci/guided-quick-deploy-eval
334332
text: Azure Stack HCI evaluation guide
335333
- url: https://www.youtube.com/watch?v=to8D7Xl9SU8

azure-local/concepts/security-features.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: conceptual
77
ms.service: azure-local
8-
ms.date: 03/04/2025
8+
ms.date: 03/06/2025
99
---
1010

1111
# Security features for Azure Local
@@ -160,7 +160,10 @@ Azure Local comes with Microsoft Defender Antivirus enabled and configured by de
160160

161161
Although we recommend using Microsoft Defender Antivirus for Azure Local, if you prefer non-Microsoft antivirus and security software, **we advise selecting one that your Independent Software Vendor (ISV) has validated for Azure Local** to minimize potential functionality issues.
162162

163-
For more information, see [Microsoft Defender Antivirus compatibility with other security products](/defender-endpoint/microsoft-defender-antivirus-compatibility).
163+
For more information, see:
164+
165+
- [Microsoft Defender Antivirus compatibility with other security products](/defender-endpoint/microsoft-defender-antivirus-compatibility).
166+
- [Microsoft Defender Antivirus and non-Microsoft antivirus solutions without Defender for Endpoint](/defender-endpoint/defender-antivirus-compatibility-without-mde).
164167

165168
In the rare instance that you experience any functionality issues with Azure Local using non-Microsoft antivirus software, you can exclude the following paths:
166169

@@ -186,7 +189,6 @@ With the basic Defender for Cloud plan, you get recommendations on how to improv
186189
For more information, see:
187190

188191
- [Manage system security with Microsoft Defender for Cloud (preview)](../manage/manage-security-with-defender-for-cloud.md).
189-
- [Microsoft Defender Antivirus and non-Microsoft antivirus solutions without Defender for Endpoint](/defender-endpoint/defender-antivirus-compatibility-without-mde).
190192

191193
## Next steps
192194

azure-local/known-issues.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Release notes with fixed and known issues in Azure Local
33
description: Read about the known issues and fixed issues in Azure Local.
44
author: alkohli
55
ms.topic: conceptual
6-
ms.date: 01/28/2025
6+
ms.date: 03/06/2025
77
ms.author: alkohli
88
ms.reviewer: alkohli
99
---
@@ -306,6 +306,7 @@ The following table lists the known issues in this release:
306306

307307
|Feature |Issue |Workaround |
308308
|---------|---------|---------|
309+
| Azure Migrate | Migration of Gen 1 (non-sysprep) VMs using Azure Migrate fails with the error: *Failed to clean up seed ISO disk from the file system for VM*. |Contact Microsoft Support to apply a patch that resolves the VM failures associated with this issue. |
309310
| Security vulnerability <!--ADO--> |Microsoft has identified a security vulnerability that could expose the local admin credentials used during the creation of Arc VMs on Azure Local to non-admin users on the VM and on the hosts. <br> Arc VMs running on releases prior to Azure Local 2411 release are vulnerable. |To identify the Arc VMs that require this change and to change the account passwords, see detailed instructions in: [Security vulnerability for Arc VMs on Azure Local](https://aka.ms/CVE-2024-49060).|
310311
| Deployment <!--30273426--><br>Upgrade |If the timezone is not set to UTC before you deploy Azure Local, an *ArcOperationTimeOut* error occurs during validation. The following error message is displayed: *OperationTimeOut, No updates received from device for operation.* |Depending on your scenario, choose one of the following workarounds for this issue: <br><br> **Scenario 1.** Before you start the deployment, make sure that the timezone is set to UTC. <br><br>Connect to each of the Azure Local nodes and change the timezone to UTC. <br><br> Run the following command: `Set-TimeZone -Id "UTC"`. <br><br> **Scenario 2.** If you started the deployment without setting the UTC timezone and received the error mentioned in the validation phase, follow these steps:<br><br> 1. Connect to each Azure Local node. Change the time zone to UTC with `Set-TimeZone -Id "UTC"`. Reboot the nodes.<br><br> 2. After the nodes have restarted, go to the Azure Local resource in Azure portal. Start the validation again to resolve the issue and continue with the deployment or upgrade.<br><br> For detailed remediation steps, see the troubleshooting guide in the [Azure Local Supportability](https://github.com/Azure/AzureLocal-Supportability/blob/main/TSG/Deployment/Triggering-deployment-settings-validation-call-results-in-OperationTimeout-2411-0.md) GitHub repository.|
311312
| Update <!--30345067--> | When updating from version 2408.2.7 to 2411.0.24, the update process could fail with the following error message: `Type 'CauPreRequisites' of Role 'CAU' raised an exception: Could not finish cau prerequisites due to error 'Cannot remove item C:\UpdateDistribution\<any_file_name>: Access to the path is denied.'` |For detailed steps on how to mitigate this issue, see [Azure Local Troubleshooting Guide for Update](https://github.com/Azure/AzureLocal-Supportability/blob/main/TSG/Update/mitigation-for-cannot-remove-c-update-distribution-with-access-denied.md).|

azure-local/update/about-updates-23h2.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,9 @@ Solution updates managed by this feature contain new versions of the Azure Stack
8282
This solution is the recommended way to update your Azure Local.
8383

8484
> [!NOTE]
85-
> Customer workloads aren't covered by this update solution.
85+
86+
> - Azure Local update includes updates for all components, including Azure CLI, PowerShell, and any extensions. Microsoft does not support out of band updates for individual components. The out of band updates could lead to incompatibility with Application Control for Windows.
87+
> - Customer workloads aren't covered by this update solution.
8688
8789
## User interfaces for updates
8890

azure-stack/breadcrumb/toc.yml

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,6 @@
66
tocHref: /azure-stack/
77
topicHref: /azure-stack/index
88
items:
9-
- name: Hub ASDK
10-
tocHref: /azure-stack/asdk/
11-
topicHref: /azure-stack/asdk/index
129
- name: Hub Operator
1310
tocHref: /azure-stack/operator/
1411
topicHref: /azure-stack/operator/index

azure-stack/docfx.json

Lines changed: 1 addition & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,6 @@
11
{
22
"build": {
33
"content": [
4-
{
5-
"group": "version-ash",
6-
"src" : "asdk",
7-
"dest" : "asdk",
8-
"files": [
9-
"**/*.md",
10-
"**/*.yml"
11-
],
12-
"exclude": [
13-
"**/obj/**",
14-
"**/includes/**",
15-
"_themes/**",
16-
"_themes.pdf/**",
17-
"README.md",
18-
"LICENSE",
19-
"LICENSE-CODE",
20-
"ThirdPartyNotices"
21-
]
22-
},
234
{
245
"group": "version-ash",
256
"src" : "operator",
@@ -85,7 +66,6 @@
8566
"**/*.yml"
8667
],
8768
"exclude": [
88-
"asdk/**",
8969
"operator/**",
9070
"partner/**",
9171
"user/**",
@@ -101,22 +81,6 @@
10181
}
10282
],
10383
"resource": [
104-
{
105-
"files": [
106-
"**/*.png",
107-
"**/*.jpg",
108-
"**/*.svg",
109-
"**/*.gif"
110-
],
111-
"src": "asdk",
112-
"dest": "asdk",
113-
"group": "version-ash",
114-
"exclude": [
115-
"**/obj/**",
116-
"_themes/**",
117-
"_themes.pdf/**"
118-
]
119-
},
12084
{
12185
"files": [
12286
"**/*.png",
@@ -176,7 +140,6 @@
176140
"**/*.json"
177141
],
178142
"exclude": [
179-
"asdk/**",
180143
"operator/**",
181144
"partner/**",
182145
"user/**",
@@ -207,28 +170,23 @@
207170
},
208171
"fileMetadata": {
209172
"ms.service": {
210-
"asdk/**/*.md": "azure-stack-hub",
211173
"mdc/**/*.md": "azure-stack-hub",
212174
"operator/**/*.md": "azure-stack-hub",
213175
"partner/**/*.md": "azure-stack-hub",
214176
"reference/**/*.md": "azure-stack-hub",
215177
"user/**/*.md": "azure-stack-hub"
216178
},
217179
"titleSuffix": {
218-
"**/*.md": "Azure Stack Hub",
219-
"asdk/**/*.md": "Azure Stack Development Kit (ASDK)",
220-
"hybrid/**/*.md": "Azure Stack"
180+
"**/*.md": "Azure Stack Hub"
221181
},
222182
"feedback_help_link_url": {
223183
"operator/**/*.md": "https://learn.microsoft.com/answers/tags/205/azure-stack-hub",
224184
"user/**/*.md": "https://learn.microsoft.com/answers/tags/205/azure-stack-hub",
225185
"mdc/**/*.md": "https://learn.microsoft.com/answers/tags/205/azure-stack-hub",
226-
"asdk/**/*.md": "https://learn.microsoft.com/answers/tags/205/azure-stack-hub",
227186
"partner/**/*.md": "https://learn.microsoft.com/answers/tags/205/azure-stack-hub",
228187
"reference/**/*.md": "https://learn.microsoft.com/answers/tags/205/azure-stack-hub"
229188
},
230189
"ms.subservice": {
231-
"asdk/**/*.md": "azure-stack-hub-asdk",
232190
"mdc/**/*.md": "azure-stack-hub-mdc"
233191
}
234192
},

azure-stack/mdc/azure-stack-vm-considerations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: sethmanheim
66
manager: lizross
77
ms.service: azure-stack-hub
88
ms.topic: article
9-
ms.date: 2/1/2021
9+
ms.date: 03/06/2025
1010
ms.author: sethm
1111
ms.reviewer: kivenkat
1212
ms.lastreviewed: 12/20/2019
@@ -25,7 +25,7 @@ Azure Stack virtual machines (VMs) provide on-demand, scalable computing resourc
2525
| Virtual machine sizes | Azure supports a wide variety of sizes for VMs. To learn about the available sizes and options, refer to the [Windows VMs sizes](/azure/virtual-machines/sizes) and [Linux VM sizes](/azure/virtual-machines/linux/sizes) topics. | Azure Stack supports a subset of VM sizes that are available in Azure. To view the list of supported sizes, refer to the [VM sizes](#vm-sizes) section of this article. |
2626
| Virtual machine quotas | [Quota limits](/azure/azure-subscription-service-limits#service-specific-limits) are set by Microsoft. | The Azure Stack cloud admin must assign quotas before they offer VM to their users. |
2727
| Virtual machine extensions |Azure supports a wide variety of VM extensions. To learn about the available extensions, refer to the [VM extensions and features](/azure/virtual-machines/windows/extensions-features) article.| Azure Stack supports a subset of extensions that are available in Azure and each of the extensions have specific versions. The Azure Stack cloud admin can choose which extensions to be made available to for their users. To view the list of supported extensions, refer to the [VM extensions](#vm-extensions) section of this article. |
28-
| Virtual machine network | Public IP addresses assigned to a tenant VM are accessible over the Internet.<br><br><br>Azure VMs have a fixed DNS name. | Public IP addresses assigned to a tenant VM are accessible within the Azure Stack Development Kit environment only. A user must have access to the Azure Stack Development Kit via [RDP](../asdk/asdk-connect.md#connect-to-azure-stack-using-rdp) or [VPN](../asdk/asdk-connect.md#connect-to-azure-stack-using-vpn) to connect to a VM that is created in Azure Stack.<br><br>VMs created within a specific Azure Stack instance have a DNS name based on the value that is configured by the cloud admin. |
28+
| Virtual machine network | Public IP addresses assigned to a tenant VM are accessible over the Internet.<br><br><br>Azure VMs have a fixed DNS name. | Public IP addresses assigned to a tenant VM are accessible within the Azure Stack Development Kit environment only. A user must have access to VPN to connect to a VM that is created in Azure Stack.<br><br>VMs created within a specific Azure Stack instance have a DNS name based on the value that is configured by the cloud admin. |
2929
| Virtual machine storage | Supports [managed disks.](/azure/virtual-machines/windows/managed-disks-overview) | Managed disks are supported in Azure Stack with version 1808 and later. |
3030
| Virtual machine disk performance | Depends on disk type and size. | Depends on VM size of the VM, which the disks are attached to. For more info, refer to the [VM sizes supported in Azure Stack](azure-stack-vm-sizes.md) article.
3131
| API versions | Azure always has the latest API versions for all the VM features. | Azure Stack supports specific Azure services and specific API versions for these services. To view the list of supported API versions, refer to the [API versions](#api-versions) section of this article. |

azure-stack/operator/azure-stack-app-service-before-you-get-started.md

Lines changed: 3 additions & 64 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,10 @@
22
title: Prerequisites to deploy Azure App Service on Azure Stack Hub
33
description: Learn the prerequisite steps to complete before you deploy Azure App Service on Azure Stack Hub.
44
author: sethmanheim
5-
65
ms.topic: article
76
ms.custom:
87
- devx-track-arm-template
9-
ms.date: 10/24/2022
8+
ms.date: 03/06/2025
109
ms.author: sethm
1110
ms.reviewer: anwestg
1211
ms.lastreviewed: 10/28/2019
@@ -24,7 +23,7 @@ Before you deploy Azure App Service on Azure Stack Hub, you must complete the pr
2423

2524
## Before you get started
2625

27-
This section lists the prerequisites for both integrated system and Azure Stack Development Kit (ASDK) deployments.
26+
This section lists the prerequisites for Azure Stack Hub integrated systems deployments.
2827

2928
### Resource provider prerequisites
3029

@@ -260,66 +259,6 @@ RECONFIGURE;
260259
GO
261260
```
262261

263-
<!-- ASDK Only --->
264-
## Certificates and server configuration (ASDK)
265-
266-
This section lists the prerequisites for ASDK deployments.
267-
268-
### Certificates required for ASDK deployment of Azure App Service
269-
270-
The *Create-AppServiceCerts.ps1* script works with the Azure Stack Hub certificate authority to create the four certificates that App Service needs.
271-
272-
| File name | Use |
273-
| --- | --- |
274-
| _.appservice.local.azurestack.external.pfx | App Service default SSL certificate |
275-
| api.appservice.local.azurestack.external.pfx | App Service API SSL certificate |
276-
| ftp.appservice.local.azurestack.external.pfx | App Service publisher SSL certificate |
277-
| sso.appservice.local.azurestack.external.pfx | App Service identity application certificate |
278-
279-
To create the certificates, follow these steps:
280-
281-
1. Sign in to the ASDK host using the AzureStack\AzureStackAdmin account.
282-
2. Open an elevated PowerShell session.
283-
3. Run the *Create-AppServiceCerts.ps1* script from the folder where you extracted the helper scripts. This script creates four certificates in the same folder as the script that App Service needs for creating certificates.
284-
4. Enter a password to secure the .pfx files, and make a note of it. You must enter it later, in the App Service on Azure Stack Hub installer.
285-
286-
#### Create-AppServiceCerts.ps1 script parameters
287-
288-
| Parameter | Required or optional | Default value | Description |
289-
| --- | --- | --- | --- |
290-
| pfxPassword | Required | Null | Password that helps protect the certificate private key |
291-
| DomainName | Required | local.azurestack.external | Azure Stack Hub region and domain suffix |
292-
293-
### Quickstart template for file server for deployments of Azure App Service on ASDK.
294-
295-
For ASDK deployments only, you can use the [example Azure Resource Manager deployment template](https://aka.ms/appsvconmasdkfstemplate) to deploy a configured single-node file server. The single-node file server will be in a workgroup.
296-
297-
> [!NOTE]
298-
> The ASDK instance must be able to download resources from GitHub in order to complete the deployment.
299-
300-
### SQL Server instance
301-
302-
For the Azure App Service on Azure Stack Hub hosting and metering databases, you must prepare a SQL Server instance to hold the App Service databases.
303-
304-
For ASDK deployments, you can use SQL Server Express 2014 SP2 or later. SQL Server must be configured to support **Mixed Mode** authentication because App Service on Azure Stack Hub **DOES NOT** support Windows Authentication.
305-
306-
The SQL Server instance for Azure App Service on Azure Stack Hub must be accessible from all App Service roles. You can deploy SQL Server within the Default Provider Subscription in Azure Stack Hub. Or you can make use of the existing infrastructure within your organization (as long as there's connectivity to Azure Stack Hub). If you're using an Azure Marketplace image, remember to configure the firewall accordingly.
307-
308-
> [!NOTE]
309-
> A number of SQL IaaS VM images are available through the Marketplace Management feature. Make sure you always download the latest version of the SQL IaaS Extension before you deploy a VM using a Marketplace item. The SQL images are the same as the SQL VMs that are available in Azure. For SQL VMs created from these images, the IaaS extension and corresponding portal enhancements provide features such as automatic patching and backup capabilities.
310-
>
311-
> For any of the SQL Server roles, you can use a default instance or a named instance. If you use a named instance, be sure to manually start the SQL Server Browser service and open port 1434.
312-
313-
The App Service installer will check to ensure the SQL Server has database containment enabled. To enable database containment on the SQL Server that will host the App Service databases, run these SQL commands:
314-
315-
```sql
316-
sp_configure 'contained database authentication', 1;
317-
GO
318-
RECONFIGURE;
319-
GO
320-
321-
```
322-
323262
## Licensing concerns for required file server and SQL Server
324263

325264
Azure App Service on Azure Stack Hub requires a file server and SQL Server to operate. You're free to use pre-existing resources located outside of your Azure Stack Hub deployment or deploy resources within their Azure Stack Hub Default Provider Subscription.
@@ -335,7 +274,7 @@ Cloud operators are responsible for the maintenance and operation of the File Se
335274

336275
## Retrieve the Azure Resource Manager root certificate for Azure Stack Hub
337276

338-
Open an elevated PowerShell session on a computer that can reach the privileged endpoint on the Azure Stack Hub Integrated System or ASDK Host.
277+
Open an elevated PowerShell session on a computer that can reach the privileged endpoint on the Azure Stack Hub integrated system.
339278

340279
Run the *Get-AzureStackRootCert.ps1* script from the folder where you extracted the helper scripts. The script creates a root certificate in the same folder as the script that App Service needs for creating certificates.
341280

azure-stack/operator/azure-stack-app-service-capacity-planning.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,8 @@
22
title: Plan App Service server roles capacity - Azure Stack Hub
33
description: Learn about capacity planning for App Service server roles in Azure Stack Hub.
44
author: sethmanheim
5-
65
ms.topic: article
7-
ms.date: 05/05/2020
6+
ms.date: 03/06/2025
87
ms.author: sethm
98
ms.reviewer: anwestg
109
ms.lastreviewed: 04/13/2020
@@ -99,7 +98,7 @@ Cloud admins can monitor their worker tier allocation in the App Service admin a
9998

10099
## File server role
101100

102-
For the file server role, you can use a standalone file server for development and testing. For example, when deploying Azure App Service on the Azure Stack Development Kit (ASDK) you can use this [template](https://aka.ms/appsvconmasdkfstemplate). For production purposes, you should use a pre-configured Windows file server, or a pre-configured non-Windows file server.
101+
For the file server role, you can use a standalone file server for development and testing. For production purposes, you should use a pre-configured Windows file server, or a pre-configured non-Windows file server.
103102

104103
In production environments, the file server role experiences intensive disk I/O. Because it houses all of the content and app files for user web sites, you should preconfigure one of the following resources for this role:
105104

@@ -115,5 +114,4 @@ For more information, see [Provision a file server](azure-stack-app-service-befo
115114

116115
[Prerequisites for deploying App Service on Azure Stack Hub](azure-stack-app-service-before-you-get-started.md)
117116

118-
<!--Image references-->
119-
[1]: ./media/azure-stack-app-service-capacity-planning/worker-tier-allocation.png
117+
[1]: ./media/azure-stack-app-service-capacity-planning/worker-tier-allocation.png

0 commit comments

Comments
 (0)