Skip to content

Commit 0bb6737

Browse files
authored
Merge pull request #103176 from solankisamir/sasolank/rpipaddress
Add new Control Plane IP Address
2 parents b880764 + 84d1c98 commit 0bb6737

File tree

2 files changed

+82
-21
lines changed

2 files changed

+82
-21
lines changed

articles/api-management/api-management-howto-disaster-recovery-backup-restore.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: api-management
1212
ms.workload: mobile
1313
ms.tgt_pltfrm: na
1414
ms.topic: article
15-
ms.date: 06/26/2019
15+
ms.date: 02/03/2020
1616
ms.author: apimpm
1717
---
1818

@@ -68,11 +68,10 @@ All of the tasks that you do on resources using the Azure Resource Manager must
6868

6969
### Add an application
7070

71-
1. Once the application is created, click **Settings**.
72-
2. Click **Required permissions**.
73-
3. Click **+Add**.
74-
4. Press **Select an API**.
75-
5. Choose **Windows** **Azure Service Management API**.
71+
1. Once the application is created, click **API permissions**.
72+
2. Click **+ Add a permission**.
73+
4. Press **Select Microsoft APIs**.
74+
5. Choose **Azure Service Management**.
7675
6. Press **Select**.
7776

7877
![Add permissions](./media/api-management-howto-disaster-recovery-backup-restore/add-app.png)
@@ -169,15 +168,18 @@ Backup is a long running operation that may take more than a minute to complete.
169168
Note the following constraints when making a backup request:
170169

171170
- **Container** specified in the request body **must exist**.
172-
- While backup is in progress, **avoid changes in service management** such as SKU upgrade or downgrade, change in domain name, and more.
171+
- While backup is in progress, **avoid management changes in the service** such as SKU upgrade or downgrade, change in domain name, and more.
173172
- Restore of a **backup is guaranteed only for 30 days** since the moment of its creation.
174173
- **Usage data** used for creating analytics reports **isn't included** in the backup. Use [Azure API Management REST API][azure api management rest api] to periodically retrieve analytics reports for safekeeping.
175174
- In addition, the following items are not part of the backup data: custom domain SSL certificates and any intermediate or root certificates uploaded by customer, developer portal content, and virtual network integration settings.
176175
- The frequency with which you perform service backups affect your recovery point objective. To minimize it, we recommend implementing regular backups and performing on-demand backups after you make changes to your API Management service.
177176
- **Changes** made to the service configuration, (for example, APIs, policies, and developer portal appearance) while backup operation is in process **might be excluded from the backup and will be lost**.
178-
- **Allow** access from control plane to Azure Storage Account. Customer should open the following set of Inbound IPs on their Storage Account for Backup.
179-
> 13.84.189.17/32, 13.85.22.63/32, 23.96.224.175/32, 23.101.166.38/32, 52.162.110.80/32, 104.214.19.224/32, 13.64.39.16/32, 40.81.47.216/32,
180-
> 51.145.179.78/32, 52.142.95.35/32, 40.90.185.46/32, 20.40.125.155/32
177+
- **Allow** access from control plane to Azure Storage Account. Customer should open the set of [Azure API Management Control Plane IP Addresses][control-plane-ip-address] on their Storage Account for Backup.
178+
179+
> [!NOTE]
180+
> If you have firewall enabled on the Storage Account and the are trying to do backup/restore from an API Management service in the same Region,
181+
> then this will not work, as the requests to Azure Storage are not SNATed to public IP from Compute deployed in the same region.
182+
181183
### <a name="step2"> </a>Restore an API Management service
182184

183185
To restore an API Management service from a previously created backup, make the following HTTP request:
@@ -238,3 +240,4 @@ Check out the following resources for different walkthroughs of the backup/resto
238240
[api-management-aad-resources]: ./media/api-management-howto-disaster-recovery-backup-restore/api-management-aad-resources.png
239241
[api-management-arm-token]: ./media/api-management-howto-disaster-recovery-backup-restore/api-management-arm-token.png
240242
[api-management-endpoint]: ./media/api-management-howto-disaster-recovery-backup-restore/api-management-endpoint.png
243+
[control-plane-ip-address]: api-management-using-with-vnet.md#control-plane-ips

articles/api-management/api-management-using-with-vnet.md

Lines changed: 69 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: api-management
1111
ms.workload: mobile
1212
ms.tgt_pltfrm: na
1313
ms.topic: article
14-
ms.date: 11/13/2019
14+
ms.date: 02/03/2020
1515
ms.author: apimpm
1616

1717
---
@@ -136,7 +136,7 @@ When an API Management service instance is hosted in a VNET, the ports in the fo
136136
|-------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
137137
| Azure Public | <ul><li>prod.warmpath.msftcloudes.com</li><li>shoebox2.metrics.nsatc.net</li><li>prod3.metrics.nsatc.net</li><li>prod3-black.prod3.metrics.nsatc.net</li><li>prod3-red.prod3.metrics.nsatc.net</li><li>prod.warm.ingestion.msftcloudes.com</li><li>`azure region`.warm.ingestion.msftcloudes.com where `East US 2` is eastus2.warm.ingestion.msftcloudes.com</li></ul> |
138138
| Azure Government | <ul><li>fairfax.warmpath.usgovcloudapi.net</li><li>shoebox2.metrics.nsatc.net</li><li>prod3.metrics.nsatc.net</li></ul> |
139-
| Azure China | <ul><li>mooncake.warmpath.chinacloudapi.cn</li><li>shoebox2.metrics.nsatc.net</li><li>prod3.metrics.nsatc.net</li></ul> |
139+
| Azure China 21Vianet | <ul><li>mooncake.warmpath.chinacloudapi.cn</li><li>shoebox2.metrics.nsatc.net</li><li>prod3.metrics.nsatc.net</li></ul> |
140140

141141
+ **SMTP Relay**: Outbound network connectivity for the SMTP Relay, which resolves under the host `smtpi-co1.msn.com`, `smtpi-ch1.msn.com`, `smtpi-db3.msn.com`, `smtpi-sin.msn.com` and `ies.global.microsoft.com`
142142

@@ -148,13 +148,7 @@ When an API Management service instance is hosted in a VNET, the ports in the fo
148148

149149
* Enable service endpoints on the subnet in which the API Management service is deployed. [Service Endpoints][ServiceEndpoints] need to be enabled for Azure Sql, Azure Storage, Azure EventHub and Azure ServiceBus. Enabling endpoints directly from API Management delegated subnet to these services allows them to use the Microsoft Azure backbone network providing optimal routing for service traffic. If you use Service Endpoints with a forced tunneled Api Management, the above Azure services traffic isn't forced tunneled. The other API Management service dependency traffic is forced tunneled and can't be lost or the API Management service would not function properly.
150150

151-
* All the control plane traffic from Internet to the management endpoint of your API Management service are routed through a specific set of Inbound IPs hosted by API Management. When the traffic is force tunneled the responses will not symmetrically map back to these Inbound source IPs. To overcome the limitation, we need to add the following user-defined routes ([UDRs][UDRs]) to steer traffic back to Azure by setting the destination of these host routes to "Internet". The set of Inbound IPs for control Plane traffic is as follows:
152-
153-
| Azure Environment | Management IP Addresses |
154-
|-------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
155-
| Azure Public | 13.84.189.17/32, 13.85.22.63/32, 23.96.224.175/32, 23.101.166.38/32, 52.162.110.80/32, 104.214.19.224/32, 52.159.16.255/32, 40.82.157.167/32, 51.137.136.0/32, 40.81.185.8/32, 40.81.47.216/32, 51.145.56.125/32, 40.81.89.24/32, 52.224.186.99/32, 51.145.179.78/32, 52.140.238.179/32, 40.66.60.111/32, 52.139.80.117/32, 20.46.144.85/32, 191.233.24.179/32, 40.90.185.46/32, 102.133.130.197/32, 52.139.20.34/32, 40.80.232.185/32, 13.71.49.1/32, 13.64.39.16/32, 20.40.160.107/32, 20.37.52.67/32, 20.44.33.246/32, 13.86.102.66/32, 20.40.125.155/32, 51.143.127.203/32, 52.253.225.124/32, 52.253.159.160/32, 20.188.77.119/32, 20.44.72.3/32, 52.142.95.35/32, 52.139.152.27/32, 20.39.80.2/32, 51.107.96.8/32, 20.39.99.81/32, 20.37.81.41/32, 51.107.0.91/32, 102.133.0.79/32, 51.116.96.0/32, 51.116.0.0/32 |
156-
| Azure Government | 52.127.42.160/32, 52.127.34.192/32 |
157-
| Azure China | 139.217.51.16/32, 139.217.171.176/32 |
151+
* All the control plane traffic from Internet to the management endpoint of your API Management service are routed through a specific set of Inbound IPs hosted by API Management. When the traffic is force tunneled the responses will not symmetrically map back to these Inbound source IPs. To overcome the limitation, we need to add the following user-defined routes ([UDRs][UDRs]) to steer traffic back to Azure by setting the destination of these host routes to "Internet". The set of Inbound IPs for control Plane traffic is documented [Control Plane IP Addresses](#control-plane-ips)
158152

159153
* For other API Management service dependencies which are force tunneled, there should be a way to resolve the hostname and reach out to the endpoint. These include
160154
- Metrics and Health Monitoring
@@ -180,7 +174,7 @@ Azure reserves some IP addresses within each subnet, and these addresses can't b
180174

181175
In addition to the IP addresses used by the Azure VNET infrastructure, each Api Management instance in the subnet uses two IP addresses per unit of Premium SKU or one IP address for the Developer SKU. Each instance reserves an additional IP address for the external load balancer. When deploying into Internal vnet, it requires an additional IP address for the internal load balancer.
182176

183-
Given the calculation above the minimum size of the subnet, in which API Management can be deployed is /29 which gives three IP addresses.
177+
Given the calculation above the minimum size of the subnet, in which API Management can be deployed is /29 that gives three usable IP addresses.
184178

185179
## <a name="routing"> </a> Routing
186180
+ A load balanced public IP address (VIP) will be reserved to provide access to all service endpoints.
@@ -194,12 +188,76 @@ Given the calculation above the minimum size of the subnet, in which API Managem
194188
* For multi-region API Management deployments configured in Internal virtual network mode, users are responsible for managing the load balancing across multiple regions, as they own the routing.
195189
* Connectivity from a resource in a globally peered VNET in another region to API Management service in Internal mode will not work due to platform limitation. For more information, see [Resources in one virtual network cannot communicate with Azure internal load balancer in peered virtual network](../virtual-network/virtual-network-manage-peering.md#requirements-and-constraints)
196190

191+
## <a name="control-plane-ips"> </a> Control Plane IP Addresses
192+
193+
The IP Addresses are divided by **Azure Environment**. When allowing inbound requests IP address marked with **Global** must be whitelisted along with the **Region** specific IP Address.
194+
195+
| **Azure Environment**| **Region**| **IP address**|
196+
|-----------------|-------------------------|---------------|
197+
| Azure Public| South Central US (Global)| 104.214.19.224|
198+
| Azure Public| North Central US (Global)| 52.162.110.80|
199+
| Azure Public| West Central US| 52.253.135.58|
200+
| Azure Public| Korea Central| 40.82.157.167|
201+
| Azure Public| UK West| 51.137.136.0|
202+
| Azure Public| Japan West| 40.81.185.8|
203+
| Azure Public| North Central US| 40.81.47.216|
204+
| Azure Public| UK South| 51.145.56.125|
205+
| Azure Public| West India| 40.81.89.24|
206+
| Azure Public| East US| 52.224.186.99|
207+
| Azure Public| West Europe| 51.145.179.78|
208+
| Azure Public| Japan East| 52.140.238.179|
209+
| Azure Public| France Central| 40.66.60.111|
210+
| Azure Public| Canada East| 52.139.80.117|
211+
| Azure Public| UAE North| 20.46.144.85|
212+
| Azure Public| Brazil South| 191.233.24.179|
213+
| Azure Public| Southeast Asia| 40.90.185.46|
214+
| Azure Public| South Africa North| 102.133.130.197|
215+
| Azure Public| Canada Central| 52.139.20.34|
216+
| Azure Public| Korea South| 40.80.232.185|
217+
| Azure Public| Central India| 13.71.49.1|
218+
| Azure Public| West US| 13.64.39.16|
219+
| Azure Public| Australia Southeast| 20.40.160.107|
220+
| Azure Public| Australia Central| 20.37.52.67|
221+
| Azure Public| South India| 20.44.33.246|
222+
| Azure Public| Central US| 13.86.102.66|
223+
| Azure Public| Australia East| 20.40.125.155|
224+
| Azure Public| West US 2| 51.143.127.203|
225+
| Azure Public| East US 2 EUAP| 52.253.229.253|
226+
| Azure Public| Central US EUAP| 52.253.159.160|
227+
| Azure Public| South Central US| 20.188.77.119|
228+
| Azure Public| East US 2| 20.44.72.3|
229+
| Azure Public| North Europe| 52.142.95.35|
230+
| Azure Public| East Asia| 52.139.152.27|
231+
| Azure Public| France South| 20.39.80.2|
232+
| Azure Public| Switzerland West| 51.107.96.8|
233+
| Azure Public| Australia Central 2| 20.39.99.81|
234+
| Azure Public| UAE Central| 20.37.81.41|
235+
| Azure Public| Switzerland North| 51.107.0.91|
236+
| Azure Public| South Africa West| 102.133.0.79|
237+
| Azure Public| Germany West Central| 51.116.96.0|
238+
| Azure Public| Germany North| 51.116.0.0|
239+
| Azure Public| Norway East| 51.120.2.185|
240+
| Azure Public| Norway West| 51.120.130.134|
241+
| Azure China 21Vianet| China North (Global)| 139.217.51.16|
242+
| Azure China 21Vianet| China East (Global)| 139.217.171.176|
243+
| Azure China 21Vianet| China North| 40.125.137.220|
244+
| Azure China 21Vianet| China East| 40.126.120.30|
245+
| Azure China 21Vianet| China North 2| 40.73.41.178|
246+
| Azure China 21Vianet| China East 2| 40.73.104.4|
247+
| Azure Government| USGov Virginia (Global)| 52.127.42.160|
248+
| Azure Government| USGov Texas (Global)| 52.127.34.192|
249+
| Azure Government| USGov Virginia| 52.227.222.92|
250+
| Azure Government| USGov Iowa| 13.73.72.21|
251+
| Azure Government| USGov Arizona| 52.244.32.39|
252+
| Azure Government| USGov Texas| 52.243.154.118|
253+
| Azure Government| USDoD Central| 52.182.32.132|
254+
| Azure Government| USDoD East| 52.181.32.192|
197255

198256
## <a name="related-content"> </a>Related content
199257
* [Connecting a Virtual Network to backend using Vpn Gateway](../vpn-gateway/vpn-gateway-about-vpngateways.md#s2smulti)
200258
* [Connecting a Virtual Network from different deployment models](../vpn-gateway/vpn-gateway-connect-different-deployment-models-powershell.md)
201259
* [How to use the API Inspector to trace calls in Azure API Management](api-management-howto-api-inspector.md)
202-
* [Virtual Network Faq](../virtual-network/virtual-networks-faq.md)
260+
* [Virtual Network Frequently asked Questions](../virtual-network/virtual-networks-faq.md)
203261
* [Service tags](../virtual-network/security-overview.md#service-tags)
204262

205263
[api-management-using-vnet-menu]: ./media/api-management-using-with-vnet/api-management-menu-vnet.png

0 commit comments

Comments
 (0)