A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://learn.microsoft.com/en-us/azure/azure-vmware/deploy-arc-for-azure-vmware-solution below:

Deploy Arc-enabled VMware vSphere for Azure VMware Solution private cloud - Azure VMware Solution

In this article, learn how to deploy Arc-enabled VMware vSphere for Azure VMware Solution private cloud. Once you set up the components needed, you're ready to execute operations in Azure VMware Solution vCenter Server from the Azure portal.

Arc-enabled Azure VMware Solution allows you to do the following actions:

Prerequisites

To deploy Arc for Azure VMware Solution, you need to ensure the following prerequisites are met.

  az provider register --namespace Microsoft.ConnectedVMwarevSphere   
  az provider register --namespace Microsoft.ExtendedLocation  
  az provider register --namespace Microsoft.KubernetesConfiguration   
  az provider register --namespace Microsoft.ResourceConnector    
  az provider register --namespace Microsoft.AVS  
  1. Navigate to the Resource providers tab.
  2. Register the resource providers mentioned above.

Important

You can't create the resources in a separate resource group. Ensure you use the same resource group from where the Azure VMware Solution private cloud was created to create your resources.

You need the following items to ensure you're set up to begin the onboarding process to deploy Arc Resource Bridge for Azure VMware Solution.

If you want to use a custom DNS, use the following steps:

  1. In your Azure VMware Solution private cloud, navigate to the DNS page, under Workload networking, select **DNS, and identify the default forwarder-zones under the DNS zones tab.
  2. Edit the forwarder zone to add the custom DNS server IP. By adding the custom DNS as the first IP, it allows requests to be directly forwarded to the first IP and decreases the number of retries.
Deployment considerations

When you run software in Azure VMware Solution, as a private cloud in Azure, there are benefits not realized by operating your environment outside of Azure. For software running in a virtual machine (VM) like, SQL Server and Windows Server, running in Azure VMware Solution provides more value such as free Extended Security Updates (ESUs).

To take advantage of the benefits of running in an Azure VMware Solution, use this article to enable Arc and fully integrate the experience with the Azure VMware Solution private cloud. Alternatively, Arc-enabling VMs through the following mechanisms cannot create the necessary attributes to register the VM and software as part of Azure VMware Solution and results in billing for SQL Server ESUs for:

Azure roles and permissions

The minimum Azure roles required for operations related to Arc-enabled VMware vSphere are as follows:

Operation Minimum role required Scope Onboarding your vCenter Server to Arc Azure Arc VMware Private Clouds Onboarding On the subscription or resource group into which you want to onboard Administering Arc-enabled VMware vSphere Azure Arc VMware Administrator On the subscription or resource group where vCenter server resource is created VM Provisioning Azure Arc VMware Private Cloud User On the subscription or resource group that contains the resource pool/cluster/host, datastore, and virtual network resources, or on the resources themselves VM Provisioning Azure Arc VMware VM Contributor On the subscription or resource group where you want to provision VMs VM Operations Azure Arc VMware VM Contributor On the subscription or resource group that contains the VM, or on the VM itself

Any roles with higher permissions on the same scope, such as Owner or Contributor, can also allow you to perform the operations listed above.

Onboard process

Use the following steps to guide you through the process to onboard Azure Arc for Azure VMware Solution.

  1. Sign in to the Management VM and extract the contents from the compressed file from the following location. The extracted file contains the scripts to install the software.

  2. Open the 'config_avs.json' file and populate all the variables.

    Config JSON

    {
      "subscriptionId": "",
      "resourceGroup": "",
      "applianceControlPlaneIpAddress": "",
      "privateCloud": "",
      "isStatic": true,
      "staticIpNetworkDetails": {
       "networkForApplianceVM": "",
       "networkCIDRForApplianceVM": "",
       "k8sNodeIPPoolStart": "",
       "k8sNodeIPPoolEnd": "",
       "gatewayIPAddress": ""
      }
    }
    

    JSON example

    { 
      "subscriptionId": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx", 
      "resourceGroup": "test-rg", 
      "privateCloud": "test-pc", 
      "isStatic": true, 
      "staticIpNetworkDetails": { 
       "networkForApplianceVM": "arc-segment", 
       "networkCIDRForApplianceVM": "10.14.10.1/28" 
      } 
    } 
    
  3. Run the installation scripts. You can optionally set up this preview from a Windows or Linux-based jump box/VM.

    Run the following commands to execute the installation script.

    Script isn't signed so we need to bypass Execution Policy in PowerShell. Run the following commands.

    Set-ExecutionPolicy -Scope Process -ExecutionPolicy ByPass; .\run.ps1 -Operation onboard -FilePath {config-json-path}
    

    Add execution permission for the script and run the following commands.

    $ chmod +x run.sh  
    $ sudo bash run.sh onboard {config-json-path} 
    
  4. More Azure resources are created in your resource group.

  5. SSL proxy configuration

If using a proxy, the Arc Resource Bridge must be configured to use the proxy in order to connect to Azure services. This approach requires other parameters to be specified during the onboarding process via the script.

Important

Arc Resource Bridge supports only direct (explicit) proxies, including unauthenticated proxies, proxies with basic authentication, SSL terminating proxies, and SSL passthrough proxies.

{ 

  "subscriptionId": "", 

  "resourceGroup": "", 

  "privateCloud": "", 

  "isStatic": true, 

  "staticIpNetworkDetails": { 

    "networkForApplianceVM": "", 

    "networkCIDRForApplianceVM": "" 

  }, 

  "applianceProxyDetails": { 

    "http": "", 

    "https": "", 

    "noProxy": "", 

    "certificateFilePath": "" 

  }, 

  "managementProxyDetails": { 

    "http": "", 

    "https": "", 

    "noProxy": "", 

    "certificateFilePath": "" 

  } 

} 
 

applianceProxyDetails - Provide the proxy details that needs to be used for the deployment of Arc Appliance in the network. 

managementProxyDetails - Provide the proxy details need to be used on management VM for running of the script. Provide these details only if you want to set or override the existing proxy settings on management VM. 

"http" - Proxy server address for http requests. 

"https" - Proxy server address for https requests. 

"noProxy" - The list of addresses that should be excluded from proxy. The endpoints those need to be excluded for Arc Deployment for both appliance and management VM are -localhost,127.0.0.1,.svc,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16, <esxihost endpoints common suffix> 

"certificateFilePath" - The certificate that has to be used for authentication if it is an SSL proxy. 

For more details on proxy configuration for Arc Deployment, Please check https://learn.microsoft.com/en-us/azure/azure-arc/resource-bridge/network-requirements#ssl-proxy-configuration 

 
Example: 
{ 

{  

  "subscriptionId": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",  

  "resourceGroup": "test-rg",  

  "privateCloud": "test-pc",  

  "isStatic": true,  

  "staticIpNetworkDetails": {  

   "networkForApplianceVM": "arc-segment",  

   "networkCIDRForApplianceVM": "10.14.10.1/28"  

  }  

} , 

 "applianceProxyDetails": { 

    "http": "http://contoso-proxy.com", 

    "https": "https://contoso-proxysecured.com", 

    "noProxy": "localhost,127.0.0.1,.svc,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,.5edef8ac24a6b4567785cd.australiaeast.avs.azure.com", 

    "certificateFilePath": "C:\Users\sampleUser.sslProxy.crt" 

  }, 

  "managementProxyDetails": { 

    "http": " http://contoso-proxy.com ", 

    "https": "https://contoso-proxysecured.com", 

    "noProxy": "localhost,127.0.0.1,.svc,10.0.0.0/8,172.16.0.0/12,192.168.0.0/16,.5edef8ac24a6b4567785cd.australiaeast.avs.azure.com", 

    "certificateFilePath": “C:\Users\sampleUser.sslProxy.crt" 

} 

} 

Important

After the successful installation of Azure Arc Resource Bridge, it's recommended to retain a copy of the resource bridge config.yaml files in a place that facilitates easy retrieval. These files could be needed later to run commands to perform management operations (for example, az arc appliance upgrade) on the resource bridge. You can find the three .yaml files (config files) in the same folder where you ran the script.

When the script is run successfully, check the status to see if Azure Arc is now configured. To verify if your private cloud is Arc-enabled, do the following actions:

To recover from failed deployments:

If the Azure Arc resource bridge deployment fails, consult the Azure Arc resource bridge troubleshooting guide. While there can be many reasons why the Azure Arc resource bridge deployment fails, one of them is KVA timeout error. Learn more about the KVA timeout error and how to troubleshoot.

Discover and project your VMware vSphere infrastructure resources to Azure

When Arc appliance is successfully deployed on your private cloud, you can do the following actions.

Enable virtual machines, resource pools, clusters, hosts, datastores, networks, and VM templates in Azure

Once you connected your Azure VMware Solution private cloud to Azure, you can browse your vCenter Server inventory from the Azure portal. This section shows you how to make these resources Azure enabled.

Note

Enabling Azure Arc on a VMware vSphere resource is a read-only operation on vCenter Server. It doesn't make changes to your resource in vCenter Server.

  1. On your Azure VMware Solution private cloud, in the left navigation, locate vCenter Server Inventory.
  2. Select the resources you want to enable, then select Enable in Azure.
  3. Select your Azure Subscription and Resource Group, then select Enable.

The enable action starts a deployment and creates a resource in Azure, creating representative objects in Azure for your VMware vSphere resources. It allows you to manage who can access those resources through Role-based access control granularly.

Repeat the previous steps for one or more virtual machine, network, resource pool, and VM template resources.

Additionally, for virtual machines there's another section to configure VM extensions. This enables guest management to facilitate more Azure extensions to be installed on the VM. The steps to enable this would be:

  1. Select Enable guest management.
  2. Choose a Connectivity Method for the Arc agent.
  3. Provide an Administrator/Root access username and password for the VM.

If you choose to enable the guest management as a separate step or have issues with the VM extension install steps, see Enable guest management and install extensions on Arc-enabled VMs.

Next Steps

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4