Edit

Share via


Perform ongoing maintenance and administration for Azure Arc-enabled VMware vSphere

In this article, you learn how to perform various ongoing maintenance and administrative operations related to Azure Arc-enabled VMware vSphere such as:

Each of these operations requires either SSH key to the resource bridge VM or the kubeconfig that provides access to the Kubernetes cluster on the resource bridge VM.

Best practices to maintain the Azure Arc-enabled VMware vSphere resources

The Azure Arc resource bridge establishes line of sight between the on-premises vCenter server and Azure. The components of the resource bridge make it possible to bring the goodness of Azure to your on-premises vCenter managed virtual machines.

The following are a few best practices that you can follow as it deems fit for your organization:

  • Securely maintain the .yaml and kubeconfig files: After the successful deployment of the Azure Arc resource bridge, three configuration files are created: \<resource-bridge-name\>-resource.yaml, \<resource-bridge-name\>-appliance.yaml and \<resource-bridge-name\>-infra.yaml. The resource bridge VM hosts a management Kubernetes cluster. By default, a kubeconfig file, which is used to maintain the resource bridge VM, is generated in the current CLI directory during the resource bridge deployment process. It's mandatory to securely store and maintain these files since they're required for the management and upgrade of the resource bridge.

  • Resource bridge lock: Considering the critical nature of the resource bridge, you, as an administrator, can lock the Azure resource of the resource bridge to protect it from accidental deletion and hence preventing loss of connectivity to vCenter server from Azure. To place a resource lock on your resource bridge, navigate to its Azure resource and select Locks under the Settings blade. You can add a Delete lock from here, which prevents self-service users from accidentally deleting the resource bridge.

  • Resource bridge health alert: The Azure Arc resource bridge needs to be maintained online and healthy with a Running status to ensure the continuous functioning of the Azure Arc enabled VMware vSphere offering. The resource bridge can periodically get into an offline status due to rotation of credentials as part of your regular security practices or any change in the network. To be notified of any unintended downtime of the resource bridge, you can set up health alerts on the Azure resource of your resource bridge by following these steps:

    1. Sign in to the Azure portal, search and navigate to Service Health

    2. In the left pane, select Resource Health > Resource Health.

    3. In the Subscription dropdown, choose the subscription in which your resource bridge is located. In the Resource type dropdown, select Azure Arc Resource Bridge. After the list of resource bridge is populated, choose the resource bridge for which you want to set up the alert and select Add resource health alert. If you want to set up alerts for all the resource bridges in your subscription, you can select Add resource health alert without choosing any resource bridges. This adds health alerts for any resource bridges you may deploy in the future.
      Screenshot of Service Health.

    4. Configure the conditions in the alert rule depending on if you want to receive continuous notifications on the health status or if you want to receive notifications only when the resource bridge becomes unhealthy. To receive notifications only when the resource bridge becomes unhealthy, set the following conditions in the Condition tab:

      • Event status: Active
      • Current resource status: Unavailable
      • Previous resource status: Available
    5. In the Actions tab, configure the action group with the type of notification and the recipient of the alert.

    6. Complete creating the alert rule by filling in the details of the alert rule location, identifiers, and optional tags.

      Alternatively, you can create health alert from the Azure resource of your resource bridge. Screenshot of resource health.

  • Avoid unsupported VM operations on the Azure Arc resource bridge VM:

    • Backup and restore of the resource bridge isn't supported and will impact the connectivity between vCenter and Azure if attempted.
    • Network migration of the resource bridge isn't supported as it may involve changing the resource bridge VM’s virtual network or subnet, reassigning the VM’s IP address or network interfaces.

Update the vSphere account credentials (using a new password or a new vSphere account after onboarding)

Azure Arc-enabled VMware vSphere uses the vSphere account credentials you provided during the onboarding to communicate with your vCenter server. These credentials are only persisted locally on the Arc resource bridge VM.

As part of your security practices, you might need to rotate credentials for your vCenter accounts. As credentials are rotated, you must also update the credentials provided to Azure Arc to ensure the functioning of Azure Arc-enabled VMware vSphere. You can also use the same steps in case you need to use a different vSphere account after onboarding. You must ensure the new account also has all the required vSphere permissions.

There are two different sets of credentials stored on the Arc resource bridge. You can use the same account credentials for both.

This account is used for deploying the Arc resource bridge VM and will be used for upgrade.

Update the credentials of the account for Arc resource bridge

To update the credentials of the account for Arc resource bridge, run the following Azure CLI commands. Run the commands from a workstation that can access cluster configuration IP address of the Arc resource bridge locally:

az account set -s <subscription id>
az arcappliance get-credentials -n <name of the appliance> -g <resource group name> 
az arcappliance update-infracredentials vmware --kubeconfig kubeconfig

For more information on the commands, see az arcappliance get-credentials and az arcappliance update-infracredentials scvmm.

Collect logs from the Arc resource bridge

For any issues encountered with the Azure Arc resource bridge, you can collect logs for further investigation. To collect the logs, use the Azure CLI Az arcappliance log command.

To save the logs to a destination folder, run the following commands. These commands need connectivity to cluster configuration IP address.

az account set -s <subscription id>
az arcappliance get-credentials -n <name of the appliance> -g <resource group name> 
az arcappliance logs vmware --kubeconfig kubeconfig --out-dir <path to specified output directory>

If the Kubernetes cluster on the resource bridge isn't in functional state, you can use the following commands. These commands require connectivity to IP address of the Azure Arc resource bridge VM via SSH

az account set -s <subscription id>
az arcappliance get-credentials -n <name of the appliance> -g <resource group name> 
az arcappliance logs vmware --out-dir <path to specified output directory> --ip XXX.XXX.XXX.XXX

Next steps