Edit

Share via


Perform ongoing maintenance and administration for Azure Arc-enabled VMware vSphere

In this article, you learn how to perform various ongoing maintenance and administrative operations related to Azure Arc-enabled VMware vSphere, such as:

Each operation requires either an SSH key to the resource bridge VM or the kubeconfig that provides access to the Kubernetes cluster on the resource bridge VM.

Best practices to maintain the Azure Arc-enabled VMware vSphere resources

The Azure Arc resource bridge establishes line of sight between the on-premises vCenter server and Azure. The components of the resource bridge make it possible to bring the goodness of Azure to your on-premises vCenter managed virtual machines.

Follow these best practices as they fit your organization:

  • Securely maintain the .yaml and kubeconfig files: After you successfully deploy the Azure Arc resource bridge, the deployment process creates three configuration files: \<resource-bridge-name\>-resource.yaml, \<resource-bridge-name\>-appliance.yaml, and \<resource-bridge-name\>-infra.yaml. The resource bridge VM hosts a management Kubernetes cluster. By default, the deployment process generates a kubeconfig file in the current CLI directory. Use this file to maintain the resource bridge VM. Securely store and maintain these files because you need them to manage and upgrade the resource bridge.

  • Resource bridge lock: Considering the critical nature of the resource bridge, you, as an administrator, can lock the Azure resource of the resource bridge to protect it from accidental deletion and hence preventing loss of connectivity to vCenter server from Azure. To place a resource lock on your resource bridge, navigate to its Azure resource and select Locks under the Settings blade. You can add a Delete lock from here, which prevents self-service users from accidentally deleting the resource bridge.

  • Resource bridge health alert: Maintain the Azure Arc resource bridge online and healthy with a Running status to ensure the continuous functioning of the Azure Arc enabled VMware vSphere offering. The resource bridge can periodically go into an offline status due to rotation of credentials as part of your regular security practices or any change in the network. To be notified of any unintended downtime of the resource bridge, set up health alerts on the Azure resource of your resource bridge by following these steps:

    1. Sign in to the Azure portal, search and navigate to Service Health

    2. In the left pane, select Resource Health > Resource Health.

    3. In the Subscription dropdown, choose the subscription where your resource bridge is located. In the Resource type dropdown, select Azure Arc Resource Bridge. After the list of resource bridge is populated, choose the resource bridge for which you want to set up the alert and select Add resource health alert. If you want to set up alerts for all the resource bridges in your subscription, select Add resource health alert without choosing any resource bridges. This step adds health alerts for any resource bridges you might deploy in the future.
      Screenshot of Service Health.

    4. Configure the conditions in the alert rule depending on if you want to receive continuous notifications on the health status or if you want to receive notifications only when the resource bridge becomes unhealthy. To receive notifications only when the resource bridge becomes unhealthy, set the following conditions in the Condition tab:

      • Event status: Active
      • Current resource status: Unavailable
      • Previous resource status: Available
    5. In the Actions tab, configure the action group with the type of notification and the recipient of the alert.

    6. Complete creating the alert rule by filling in the details of the alert rule location, identifiers, and optional tags.

      Alternatively, you can create health alert from the Azure resource of your resource bridge. Screenshot of resource health.

  • Avoid unsupported VM operations on the Azure Arc resource bridge VM:

    • Backup and restore of the resource bridge isn't supported and affects the connectivity between vCenter and Azure if attempted.
    • Network migration of the resource bridge isn't supported as it might involve changing the resource bridge VM’s virtual network or subnet, reassigning the VM’s IP address, or network interfaces.

Update the vSphere account credentials (use a new password or a new vSphere account after onboarding)

Azure Arc-enabled VMware vSphere uses the vSphere account credentials you provide during onboarding to communicate with your vCenter server. The Arc resource bridge VM persists these credentials only locally.

As part of your security practices, you might need to rotate credentials for your vCenter accounts. As you rotate credentials, update the credentials you provide to Azure Arc to ensure Azure Arc-enabled VMware vSphere continues functioning. You can also use the same steps if you need to use a different vSphere account after onboarding. Make sure the new account has all the required vSphere permissions.

The Arc resource bridge stores two different sets of credentials. You can use the same account credentials for both.

Use this account to deploy the Arc resource bridge VM. It also serves as the upgrade account.

Update the credentials for the account for Arc resource bridge

Run the following Azure CLI commands to update the credentials for the account for Arc resource bridge. Run the commands from a workstation that can access the cluster configuration IP address of the Arc resource bridge locally:

az account set -s <subscription id>
az arcappliance get-credentials -n <name of the appliance> -g <resource group name> 
az arcappliance update-infracredentials vmware --kubeconfig kubeconfig

For more information on the commands, see az arcappliance get-credentials and az arcappliance update-infracredentials scvmm.

Collect logs from the Arc resource bridge

If you encounter any issues with the Azure Arc resource bridge, collect logs for further investigation. To collect the logs, use the Azure CLI Az arcappliance log command.

To save the logs to a destination folder, run the following commands. These commands need connectivity to cluster configuration IP address.

az account set -s <subscription id>
az arcappliance get-credentials -n <name of the appliance> -g <resource group name> 
az arcappliance logs vmware --kubeconfig kubeconfig --out-dir <path to specified output directory>

If the Kubernetes cluster on the resource bridge isn't in functional state, you can use the following commands. These commands require connectivity to IP address of the Azure Arc resource bridge VM via SSH

az account set -s <subscription id>
az arcappliance get-credentials -n <name of the appliance> -g <resource group name> 
az arcappliance logs vmware --out-dir <path to specified output directory> --ip XXX.XXX.XXX.XXX

Next steps