Skip to content

Commit 1a17c91

Browse files
authored
Merge branch 'MicrosoftDocs:main' into 20220914-some-fog
2 parents 1a00689 + 2198750 commit 1a17c91

File tree

11 files changed

+142
-36
lines changed

11 files changed

+142
-36
lines changed

articles/expressroute/about-fastpath.md

Lines changed: 17 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -30,25 +30,6 @@ To configure FastPath, the virtual network gateway must be either:
3030
* Ultra Performance
3131
* ErGw3AZ
3232

33-
## Scenarios
34-
35-
### Virtual network (Vnet) Peering
36-
FastPath will send traffic directly to any VM deployed in a virtual network peered to the one connected to ExpressRoute, bypassing the ExpressRoute virtual network gateway. This feature is available for both IPv4 and IPv6 connectivity.
37-
38-
**FastPath support for vnet peering is only available for ExpressRoute Direct connections.**
39-
40-
> [!NOTE]
41-
> * FastPath Vnet peering connectivity is not supported for Azure Dedicated Host workloads.
42-
43-
## User Defined Routes (UDRs)
44-
FastPath will honor UDRs configured on the GatewaySubnet and send traffic directly to an Azure Firewall or third party NVA.
45-
46-
**FastPath support for UDRs is only available for ExpressRoute Direct connections**
47-
48-
> [!NOTE]
49-
> * FastPath UDR connectivity is not supported for Azure Dedicated Host workloads.
50-
> * FastPath UDR connectivity is not supported for IPv6 workloads.
51-
5233
## Limitations
5334

5435
While FastPath supports most configurations, it doesn't support the following features:
@@ -72,6 +53,23 @@ While FastPath supports most configurations, it doesn't support the following fe
7253

7354
The following FastPath features are in Public preview:
7455

56+
### Virtual network (Vnet) Peering
57+
FastPath will send traffic directly to any VM deployed in a virtual network peered to the one connected to ExpressRoute, bypassing the ExpressRoute virtual network gateway. This feature is available for both IPv4 and IPv6 connectivity.
58+
59+
**FastPath support for vnet peering is only available for ExpressRoute Direct connections.**
60+
61+
> [!NOTE]
62+
> * FastPath Vnet peering connectivity is not supported for Azure Dedicated Host workloads.
63+
64+
## User Defined Routes (UDRs)
65+
FastPath will honor UDRs configured on the GatewaySubnet and send traffic directly to an Azure Firewall or third party NVA.
66+
67+
**FastPath support for UDRs is only available for ExpressRoute Direct connections**
68+
69+
> [!NOTE]
70+
> * FastPath UDR connectivity is not supported for Azure Dedicated Host workloads.
71+
> * FastPath UDR connectivity is not supported for IPv6 workloads.
72+
7573
**Private Link Connectivity for 10Gbps ExpressRoute Direct Connectivity** - Private Link traffic sent over ExpressRoute FastPath will bypass the ExpressRoute virtual network gateway in the data path.
7674
This preview is available in the following Azure Regions.
7775
- Australia East

articles/expressroute/expressroute-howto-linkvnet-arm.md

Lines changed: 17 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -198,18 +198,6 @@ $connection = Get-AzVirtualNetworkGatewayConnection -Name "MyConnection" -Resour
198198
$connection.ExpressRouteGatewayBypass = $True
199199
Set-AzVirtualNetworkGatewayConnection -VirtualNetworkGatewayConnection $connection
200200
```
201-
### FastPath virtual network peering and user defined routes (UDRs).
202-
203-
With FastPath and virtual network peering, you can enable ExpressRoute connectivity directly to VMs in a local or peered virtual network, bypassing the ExpressRoute virtual network gateway in the data path.
204-
205-
With FastPath and UDR, you can configure a UDR on the GatewaySubnet to direct ExpressRoute traffic to an Azure Firewall or third party NVA. FastPath will honor the UDR and send traffic directly to the target Azure Firewall or NVA, bypassing the ExpressRoute virtual network gateway in the data path.
206-
207-
**FastPath support for virtual network peering and UDRs is only available for ExpressRoute Direct connections**.
208-
209-
> [!NOTE]
210-
> * Virtual network peering and UDR support is enabled by default for all new FastPath connections
211-
> * To enable virtual network peering and UDR support for FastPath connections configured before 9/19/2022, disable and enable FastPath on the target connection.
212-
213201
### FastPath and Private Link for 100 Gbps ExpressRoute Direct
214202

215203
With FastPath and Private Link, Private Link traffic sent over ExpressRoute bypasses the ExpressRoute virtual network gateway in the data path. This is Generally Available for connections associated to 100 Gb ExpressRoute Direct circuits. To enable this, follow the below guidance:
@@ -231,6 +219,23 @@ Register-AzProviderFeature -FeatureName ExpressRoutePrivateEndpointGatewayBypass
231219
232220
## Enroll in ExpressRoute FastPath features (preview)
233221

222+
### FastPath virtual network peering and user defined routes (UDRs).
223+
224+
With FastPath and virtual network peering, you can enable ExpressRoute connectivity directly to VMs in a local or peered virtual network, bypassing the ExpressRoute virtual network gateway in the data path.
225+
226+
With FastPath and UDR, you can configure a UDR on the GatewaySubnet to direct ExpressRoute traffic to an Azure Firewall or third party NVA. FastPath will honor the UDR and send traffic directly to the target Azure Firewall or NVA, bypassing the ExpressRoute virtual network gateway in the data path.
227+
228+
To enroll in the preview, send an email to **[email protected]**, providing the following information:
229+
* Azure Subscription ID
230+
* Virtual Network (VNet) Resource ID
231+
* ExpressRoute Circuit Resource ID
232+
233+
**FastPath support for virtual network peering and UDRs is only available for ExpressRoute Direct connections**.
234+
235+
> [!NOTE]
236+
> * Virtual network peering and UDR support is enabled by default for all new FastPath connections
237+
> * To enable virtual network peering and UDR support for FastPath connections configured before 9/19/2022, disable and enable FastPath on the target connection.
238+
234239
### FastPath and Private Link for 10 Gbps ExpressRoute Direct
235240

236241
With FastPath and Private Link, Private Link traffic sent over ExpressRoute bypasses the ExpressRoute virtual network gateway in the data path. This preview supports connections associated to 10 Gbps ExpressRoute Direct circuits. This preview doesn't support ExpressRoute circuits managed by an ExpressRoute partner.

articles/lab-services/administrator-guide.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -229,10 +229,7 @@ When you're assigning roles, it helps to follow these tips:
229229

230230
Your school may need to do content filtering to prevent students from accessing inappropriate websites. For example, to comply with the [Children's Internet Protection Act (CIPA)](https://www.fcc.gov/consumers/guides/childrens-internet-protection-act). Lab Services doesn't offer built-in support for content filtering.
231231

232-
There are two approaches that schools typically consider for content filtering:
233-
234-
- Configure a firewall to filter content at the network level.
235-
- Install third-party software directly on each computer that performs content filtering.
232+
Schools typically approach content filtering by installing third-party software that performs content filtering on each computer. Azure Lab Services does not support network-level filtering.
236233

237234
By default, Azure Lab Services hosts each lab's virtual network within a Microsoft-managed Azure subscription. You'll need to use [advanced networking](how-to-connect-vnet-injection.md) in the lab plan. Make sure to check known limitations of VNet injection before proceeding.
238235

@@ -295,4 +292,4 @@ For more information about setting up and managing labs, see:
295292

296293
- [Configure a lab plan](lab-plan-setup-guide.md)
297294
- [Configure a lab](setup-guide.md)
298-
- [Manage costs for labs](cost-management-guide.md)
295+
- [Manage costs for labs](cost-management-guide.md)

articles/notification-hubs/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,6 +95,8 @@
9595
items:
9696
- name: Availability zones
9797
href: availability-zones.md
98+
- name: Cross-region disaster recovery
99+
href: cross-region-recovery.md
98100
- name: Data encryption at rest
99101
href: encrypt-at-rest.md
100102
- name: Transport Layer Security (TLS)
Lines changed: 104 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,104 @@
1+
---
2+
title: Azure Notification Hubs cross-region disaster recovery
3+
description: Learn about cross-region disaster recovery options in Azure Notification Hubs.
4+
author: sethmanheim
5+
ms.author: sethm
6+
ms.service: notification-hubs
7+
ms.topic: conceptual
8+
ms.date: 10/07/2022
9+
10+
---
11+
12+
# Cross-region disaster recovery (preview)
13+
14+
> [!NOTE]
15+
> The ability to edit your cross region disaster recovery options is available in preview. If you are interested in using this feature, contact your customer success manager at Microsoft, or create an Azure support ticket which will be triaged by the support team.
16+
17+
[Azure Notification Hubs](notification-hubs-push-notification-overview.md) provides an easy-to-use and scaled-out push engine that enables you to send notifications to any platform (iOS, Android, Windows, etc.) from any back-end (cloud or on-premises). This article describes the cross-region disaster recovery configuration options currently available.
18+
19+
Cross-region disaster recovery provides *metadata* disaster recovery coverage. This is supported in paired and flexible region recovery
20+
options. Each Azure region is paired with another region within the same geography. All Notification Hubs tiers support [Azure paired regions](/azure/availability-zones/cross-region-replication-azure#azure-cross-region-replication-pairings-for-all-geographies)
21+
(where available) or a flexible recovery region option that enables you to choose from a list of supported regions.
22+
23+
## Enable cross region disaster recovery
24+
25+
Cross-region disaster recovery options can be modified at any time.
26+
27+
### Use existing namespace
28+
29+
Use the Azure portal to edit an existing namespace:
30+
31+
1. Sign in to the [Azure portal](https://portal.azure.com).
32+
33+
2. Select **All services** on the left menu.
34+
35+
3. Select **Notification Hub Namespaces** in the **Internet of Things** section.
36+
37+
4. On the **Notification Hub Namespaces** page, select the namespace for which you want to modify the disaster recovery settings.
38+
39+
5. On the **Notification Hub Namespace** page for your namespace, you can see the current disaster recovery setting in the **Essentials** section.
40+
41+
6. In the following example, paired recovery region is enabled. To modify your disaster recovery region selection, select the **(edit)** link next to the current selection.
42+
43+
:::image type="content" source="media/cross-region-recovery/cedr1.png" alt-text="Azure portal namespace":::
44+
45+
7. On the **Edit Disaster** recovery pop-up screen, you can change your selections. Save your changes.
46+
47+
:::image type="content" source="media/cross-region-recovery/cedr2.png" alt-text="Azure portal edit recovery":::
48+
49+
### Use new namespace
50+
51+
To create a new namespace with disaster recovery, follow these steps:
52+
53+
1. Sign in to the [Azure portal](https://portal.azure.com).
54+
55+
2. Select **All services** on the left menu.
56+
57+
3. Select **Notification Hubs** in the **Mobile** section.
58+
59+
4. Select the star icon next to the service name to add the service to the **FAVORITES** section on the left menu. After you add **Notification Hubs** to **FAVORITES**, select it on the left menu.
60+
61+
:::image type="content" source="media/cross-region-recovery/cedr3.png" alt-text="Azure portal favorites":::
62+
63+
5. On the **Notification Hubs** page, select **Create** on the toolbar.
64+
65+
:::image type="content" source="media/cross-region-recovery/cedr4.png" alt-text="Create notification hub":::
66+
67+
6. In the **Basics** tab on the **Notification Hub** page, perform the following steps:
68+
69+
1. In **Subscription**, select the name of the Azure subscription you want to use, and then select an existing resource group, or create a
70+
new one.
71+
1. Enter a unique name for the new namespace in **Namespace Details**.
72+
1. A namespace contains one or more notification hubs, so type a name for the hub in **Notification Hub Details**. Or, select an existing
73+
namespace from the drop-down.
74+
1. Select a value from the **Location** drop-down list box. This value specifies the location in which you want to create the hub.
75+
1. Choose your **Disaster recovery** option – None, Paired recovery region or Flexible recovery region. If you choose **Paired recovery region**, the failover region is displayed.
76+
77+
:::image type="content" source="media/cross-region-recovery/cedr5.png" alt-text="Notification hub properties":::
78+
79+
1. If you select **Flexible recovery region**, use the drop-down to choose from a list of recovery regions.
80+
81+
:::image type="content" source="media/cross-region-recovery/cedr6.png" alt-text="Select region":::
82+
83+
1. Select **Create**.
84+
85+
### Add resiliency
86+
87+
Paired and flexible region recovery only backs up metadata. You must implement a solution to repopulate the registration data into your new
88+
hub post-recovery:
89+
90+
1. Create a secondary notification hub in a different datacenter. We recommend creating one from the beginning, to shield you from a disaster recovery event that might affect your management capabilities. You can also create one at the time of the disaster recovery event.
91+
92+
2. Keep the secondary notification hub in sync with the primary notification hub using one of the following options:
93+
- Use an app backend that simultaneously creates and updates installations in both notification hubs. Installations allow you to specify your own unique device identifier, making it more suitable for the replication scenario. For more information, [see this sample](https://github.com/Azure/azure-notificationhubs-dotnet/tree/main/Samples/RedundantHubSample).
94+
- Use an app backend that gets a regular dump of registrations from the primary notification hub as a backup. It can then perform a bulk insert into the secondary notification hub.
95+
96+
The secondary notification hub might end up with expired installations/registrations. When the push is made to an expired handle, Notification Hubs automatically cleans the associated installation/registration record based on the response received from the PNS server. To clean expired records from a secondary notification hub, add custom logic that processes feedback from each send. Then, expire installation/registration in the secondary notification hub.
97+
98+
If you don't have a backend, when the app starts on target devices, they perform a new registration in the secondary notification hub. Eventually the secondary notification hub will have all the active devices registered.
99+
100+
There will be a time period when devices with unopened apps won't receive notifications.
101+
102+
## Next steps
103+
104+
- [Azure Notification Hubs](notification-hubs-push-notification-overview.md)
14.8 KB
Loading
27.8 KB
Loading
31.5 KB
Loading
116 KB
Loading
54.7 KB
Loading

0 commit comments

Comments
 (0)