With Microsoft's and Amazon's decision to end support for the Amazon AppStore on Windows 11, this means users will no longer have access to Field Maps on Windows 11 devices. This very sudden and abrupt decision means that organizations will have to come up with other solutions for users on Windows 11 devices (such as running an Android emulator or changing to Android or iOS which is might be cost prohibitive for organizations who have already invested in Windows 11 devices).
Considering that other Esri COTS apps have Windows 11 support, it just makes sense that Field Maps would also have Windows 11 support. I'm not sure why some parts of the Esri ecosystem support some platforms, while others do not, especially considering that the apps are often integrated with each other with app launch link URLs.
Furthermore, the predecessor apps to Field Maps (Collector and Explorer) both had Windows support, and Esri's official guidance written just 4 months ago ( -blog/products/collector/field-mobility/deprecation-notice-arcgis-collect...) on how to migrate off of Collector and Explorer encouraged users to use Field Maps on Windows 11. But now with Field Maps no longer being supported on Windows 11, users who followed this guidance will now be completely forced off Windows 11.
I've been surprised by this news and will have to make some significant changes to our deployment plans for field maps. This needs to be addressed as formally from ESRI as i'd say there is a lot of organisations that are in a similar place that are trying to find Windows based solutions for their field workers.
@SarahSaint-Ruth , this shouldn't be closed, it's a new idea.
The linked idea you closed this for shows it "In Product Plan", but the entire thread/plan is about using the Windows Subsystem for Android (WSA), and the Amazon App Store to use the Android App in Windows, not for a Windows 11 program.
WSA is being depreciated in March of 2025, and Amazon just pulled it's app store from the Microsoft Store yesterday, there's been a lot of discussion about it.
The "In Product Plan" intent is nice, but it's not going to happen and is not available anymore.
Thank you for the feedback. This post will remain closed. Whilst the thread reflects the technical direction we were taking, the original post is the request for Windows support for Field Maps regardless of the deployment pattern. Having duplicate idea's on the same topic obfuscate the demand for the idea. The original post has been changed to open.
Can we do a thread merge? This is a pretty huge topic for many private organizations, most government organizations, and all users who remained on Collector on Windows but were planning to move to Field Maps. Thanks.
Windows nodes support one elastic network interface per node. By default, the number of Pods that you can run per Windows node is equal to the number of IP addresses available per elastic network interface for the node's instance type, minus one. For more information, see IP addresses per network interface per instance type in the Amazon EC2 User Guide.
In an Amazon EKS cluster, a single service with a load balancer can support up to 1024 back-end Pods. Each Pod has its own unique IP address. The previous limit of 64 Pods is no longer the case, after a Windows Server update starting with OS Build 17763.2746.
When specifying a custom AMI ID for Windows managed node groups, add eks:kube-proxy-windows to your AWS IAM Authenticator configuration map. For more information, see Limits and conditions when specifying an AMI ID.
An existing cluster. The cluster must be running one of the Kubernetes versions and platform versions listed in the following table. Any Kubernetes and platform versions later than those listed are also supported. If your cluster or platform version is earlier than one of the following versions, you need to enable legacy Windows support on your cluster's data plane. Once your cluster is at one of the following Kubernetes and platform versions, or later, you can remove legacy Windows support and enable Windows support on your control plane.
Your cluster must have at least one (we recommend at least two) Linux node or Fargate Pod to run CoreDNS. If you enable legacy Windows support, you must use a Linux node (you can't use a Fargate Pod) to run CoreDNS.
If your cluster isn't at, or later, than one of the Kubernetes and platform versions listed in the Prerequisites, you must enable legacy Windows support instead. For more information, see Legacy cluster support for Windows nodes.
If you enabled Windows support on a cluster that is earlier than a Kubernetes or platform version listed in the Prerequisites, then you must first remove the vpc-resource-controller and vpc-admission-webhook from your data plane. They're deprecated and no longer needed.
If you don't have Amazon Linux nodes in your cluster and use security groups for Pods, skip to the next step. Otherwise, confirm that the AmazonEKSVPCResourceController managed policy is attached to your cluster role. Replace eksClusterRole with your cluster role name.
Verify that your aws-auth ConfigMap contains a mapping for the instance role of the Windows node to include the eks:kube-proxy-windows RBAC permission group. You can verify by running the following command.
You should see eks:kube-proxy-windows listed under groups. If the group isn't specified, you need to update your ConfigMap or create it to include the required group. For more information about the aws-auth ConfigMap, see Apply the aws-auth ConfigMap to your cluster.
In Amazon EKS, each Pod is allocated an IPv4 address from your VPC. Due to this, the number of Pods that you can deploy to a node is constrained by the available IP addresses, even if there are sufficient resources to run more Pods on the node. Since only one elastic network interface is supported by a Windows node, by default, the maximum number of available IP addresses on a Windows node is equal to:
You can enable higher Pod density on Windows nodes by enabling IP prefix delegation. This feature enables you to assign a /28 IPv4 prefix to the primary network interface, instead of assigning secondary IPv4 addresses. Assigning an IP prefix increases the maximum available IPv4 addresses on the node to:
With this significantly larger number of available IP addresses, available IP addresses shouldn't limit your ability to scale the number of Pods on your nodes. For more information, see Increase the amount of available IP addresses for your Amazon EC2 nodes.
Windows applications constitute a large portion of the services and applications thatrun in many organizations. Windows containersprovide a way to encapsulate processes and package dependencies, making it easierto use DevOps practices and follow cloud native patterns for Windows applications.
Organizations with investments in Windows-based applications and Linux-basedapplications don't have to look for separate orchestrators to manage their workloads,leading to increased operational efficiencies across their deployments, regardlessof operating system.
To enable the orchestration of Windows containers in Kubernetes, include Windows nodesin your existing Linux cluster. Scheduling Windows containers inPods on Kubernetes is similar toscheduling Linux-based containers.
In order to run Windows containers, your Kubernetes cluster must includemultiple operating systems.While you can only run the control plane on Linux,you can deploy worker nodes running either Windows or Linux.
From an API and kubectl perspective, Windows containers behave in much the sameway as Linux-based containers. However, there are some notable differences in keyfunctionality which are outlined in this section.
In the above list, wildcards (*) indicate all elements in a list.For example, spec.containers[*].securityContext refers to the SecurityContext objectfor all containers. If any of these fields is specified, the Pod willnot be admitted by the API server.
Pods, workload resources, and Services are critical elements to managing Windowsworkloads on Kubernetes. However, on their own they are not enough to enablethe proper lifecycle management of Windows workloads in a dynamic cloud nativeenvironment.
Container exit codes follow the same convention where 0 is success, and nonzero is failure.The specific error codes may differ across Windows and Linux. However, exit codespassed from the Kubernetes components (kubelet, kube-proxy) are unchanged.
The kubelet can now request that pods running on Windows nodes use the host's network namespace insteadof creating a new pod network namespace. To enable this functionality pass --feature-gates=WindowsHostNetwork=true to the kubelet.
Kubernetes maintains a multi-architecture image that includes support for Windows.For Kubernetes v1.30.0 the recommended pause image is registry.k8s.io/pause:3.6.The source codeis available on GitHub.
Microsoft maintains a different multi-architecture image, with Linux and Windowsamd64 support, that you can find as mcr.microsoft.com/oss/kubernetes/pause:3.6.This image is built from the same source as the Kubernetes maintained image butall of the Windows binaries are authenticode signed by Microsoft.The Kubernetes project recommends using the Microsoft maintained image if you aredeploying to a production or production-like environment that requires signedbinaries.
On Windows nodes, strict compatibility rules apply where the host OS version mustmatch the container base image OS version. Only Windows containers with a containeroperating system of Windows Server 2019 are fully supported.
Refer toHardware requirements for Windows Server Microsoft documentationfor the most up-to-date information on minimum hardware requirements. For guidance on deciding on resources forproduction worker nodes refer to Production worker nodes Kubernetes documentation.
To optimize system resources, if a graphical user interface is not required,it may be preferable to use a Windows Server OS installation that excludesthe Windows Desktop Experienceinstallation option, as this configuration typically frees up more systemresources.
c80f0f1006