in behalf of Altaro, I would like to a free Webinar with three top of the edge speaker around Microsoft Software Defined Datacenter.
The transition to adopting cloud services is unique for every organization. What does yours look like?
Join Microsoft MVPs Andy Syrewicze (Technical Evangelist – Altaro), Didier Van Hoye (Infrastructure Architect – FGIA), and Thomas Maurer (Cloud Architect – itnetX) for a crash course on the possibilities of cloud technologies coming out of Microsoft including:
- Windows Server 2019 and the Software-Defined Datacenter
- New Management Experiences for Infrastructure with Windows Admin Center
- Hosting an Enterprise Grade Cloud in your datacenter with Azure Stack
- Taking your first steps into the public cloud with Azure IaaS
After watching the experts discuss the details, you’ll see that the cloud doesn’t have to be an all or nothing discussion. This webinar will prepare you for your journey by revealing the available options and how to make the most out of them!
Wednesday June 13th 2018 –
Presented live twice on the day – Registration
- Session 1: 2pm CEST – 5am PDT – 8am EDT
- Session 2: 6pm CEST – 9am PDT – 12pm EDT
maybe you encounter the following issue already.
When deploying the Azure Stack PoC RTM on a HPE Server, the deployment stop without any error or something at step 60.140.149.
After one week troubleshooting together with the customer and no solution, my dear coworker Alexander Ortha gave me an hint what the issue could be.
He previously hab the same issue with an HPE and he needed to update the Firmware and BIOS of the system. Afterwards the installation went through smoothly.
So I tried and he was right. So just try it yourself and update the firmware of your systems to lastest version.
some of you maybe encountered following issue during the deployment of the Azure Stack RTM PoC.
Lets look on the field configuration:
- One server HP DL360 G8
- NIC Type 1GBE Intel i360 (HP OEM Label)
- Two Public IPv4 Adresses published directly to the host and host configured as exposed host in the border gateway firewalls
- No Firewall Rules for that host on the gateways
- Switchports for that host configured as Trunk/Uplink ports with VLAN tagging enabled
- We use Azure AD for Authentication
In my case, the important point is the port trunk and the VLAN tagging.
Normally VLAN tagging is no issue because the deployment toolkit should set the tag automatically during deployment for all VMs required and the host system.
In my case and during many test and validation deployments, that didn’t happen. After I start the deployment, a new virtual switch will be deployed and a virtual NIC named “deployment” will be configured for the host. Afterwards the deployment starts. Around 3 hours later, the deployment stops in step 60.120.121 and could not connect to the identity provider.
Whats the reason for the failure?
First you should know, that the Azure Stack Deployment switches between host and BGPNAT VM for internet communication. Mostly all traffic runs through the NAT VM but in that case, the host communicates directly with the internet.
So what happend? After creating the “deployment” NIC for the host, the deployment tool didn’t set the VLAN Tag on that virtual NIC. That breaks the network communication for the host, for the VMs there isn’t any issue because the VLAN is set for the NAT VM correctly.
What is the Workaround?
- Start the deployment and configure it like normal
- Let the deployment run into the failure
- Open a new PowerShell with admin permissions (Run as Administrator)
- Type in following Command:
<span lang="EN-US" style="margin: 0px; color: black; font-family: 'Lucida Console'; font-size: 9pt;">Set-VMNetworkAdapterVlan -ManagementOS -VMNetworkAdapterName "Deployment" -Access -VlanId "VLAN ID" </span>
- Rerun the deployment with
<span lang="EN-US">.\InstallAzureStackPOC.ps1 -rerun</span>
From the installation folder.
Afterwards the deployment runs smoothly.
Please be aware, after the installation, the VLAN ID is removed again. So you need to set it one more time.
Many things happen short after another. After I needed to lay down the MVP title on the 1st of July, something awesome happened last night.
Short before midnight, I got a mail from the MVP Reconnect program which invited to join the group of reconnected MVP 🙂
I’m extremely happy about and very thankful 🙂 I really loved to be part of the MVP Community and that’s the chance to be part again, even as a Microsoft employee.
it’s more than one year since I became an MVP and join that awesome program but it will be my first and last year as regular MVP. I decided to leave the program and join Microsoft itself.
With the beginning of July I will start my career at Microsoft Germany. I will start as Cloud Solutions Architect and follow awesome guy’s and friends like Daniel Neumann, Anton Staykov or Alessandro Cardoso. Aidan Finn would say “I will go blue” referring to my new batch color which is changing from purple (Microsoft Partner) to blue (Microsoft Employee).
Even as Microsoft FTE I will continue my community and try to support you with the new experiences I will make in the future.
Thank you for your great support over last years and thank you to all my MVP Friends, Microsoft PG and the MVP Program Leads. 🙂