This repo will be used to deliver FastTrack for Azure sessions to Hybrid customers in Asia. Technologies include Azure Stack HCI and Azure Arc.
- Building an Azure Stack HCI lab for PoC or Readiness purposes. Two options:
- Evaluate Azure Stack HCI using an Azure VM
- No hardware required
- An Azure VM is used as a Hyper-V Host with guest VMs:
- 1x VM as the Windows Admin Center
- 2x VMs as HCI Cluster Nodes
- VM-based
- Non-Azure Hyper-V Host
- Evaluate Azure Stack HCI using an Azure VM
- Azure Stack HCI architecture review
- Delivery outline
- Review Architecture
- Review Hardware configuration
- Discuss Architecture changes
- References
- Delivery outline
- HCI Datacenter Integration
- Delivery outline
- Discuss Network and Active Directory Integration
- Deployment Best Practice
- Windows Admin Center for Azure Stack HCI
- Discuss Storage Best Practices
- References
- Delivery outline
- Azure Stack HCI governance
- Delivery outline
- CAF & Hybrid
- Windows Admin Center and Azure Portal
- Naming / Tagging / RBAC & Policy
- Cost Management
- References
- Delivery outline
- Cluster Config and Azure integration Review
- Delivery outline
- HCI Cluster Create
- Review deployed cluster config and cluster health
- Review Azure AD integration HCI
- Review Azure AD integration Admin Center
- References
- Delivery outline
- Azure Stack Migration
- Azure review-checklist package for HCI
- Cloud Roles and Operations Management package for HCI
This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.
When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.
This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.
This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft's Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.
Microsoft takes the security of our software products and services seriously, which includes all source code repositories managed through our GitHub organizations, which include Microsoft, Azure, DotNet, AspNet, Xamarin, and our GitHub organizations.
If you believe you have found a security vulnerability in any Microsoft-owned repository that meets Microsoft's definition of a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them to the Microsoft Security Response Center (MSRC) at https://msrc.microsoft.com/create-report.
If you prefer to submit without logging in, send email to secure@microsoft.com. If possible, encrypt your message with our PGP key; please download it from the Microsoft Security Response Center PGP Key page.
You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at microsoft.com/msrc.
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
- Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit the issue
This information will help us triage your report more quickly.
If you are reporting for a bug bounty, more complete reports can contribute to a higher bounty award. Please visit our Microsoft Bug Bounty Program page for more details about our active programs.
We prefer all communications to be in English.
Microsoft follows the principle of Coordinated Vulnerability Disclosure.