Skip to content

Commit 1b50fdb

Browse files
committed
Reconfiguring article.
1 parent 3e85faf commit 1b50fdb

File tree

2 files changed

+23
-49
lines changed

2 files changed

+23
-49
lines changed

articles/storage/elastic-san/elastic-san-configure-service-endpoints.md

Lines changed: 19 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -139,29 +139,23 @@ You can manage virtual network rules for volume groups through the Azure portal,
139139
### [PowerShell](#tab/azure-powershell)
140140

141141
- List virtual network rules.
142+
- Enable service endpoint for Azure Storage on an existing virtual network and subnet.
143+
- Add a network rule for a virtual network and subnet.
144+
145+
> [!TIP]
146+
> To add a network rule for a subnet in a virtual network belonging to another Microsoft Entra tenant, use a fully qualified **VirtualNetworkResourceId** parameter in the form "/subscriptions/subscription-ID/resourceGroups/resourceGroup-Name/providers/Microsoft.Network/virtualNetworks/vNet-name/subnets/subnet-name".
142147
143148
```azurepowershell
144149
$Rules = Get-AzElasticSanVolumeGroup -ResourceGroupName $RgName -ElasticSanName $sanName -Name $volGroupName
145150
$Rules.NetworkAclsVirtualNetworkRule
146-
```
147-
148-
- Enable service endpoint for Azure Storage on an existing virtual network and subnet.
149151
150-
```azurepowershell
151152
Get-AzVirtualNetwork -ResourceGroupName "myresourcegroup" -Name "myvnet" | Set-AzVirtualNetworkSubnetConfig -Name "mysubnet" -AddressPrefix "10.0.0.0/24" -ServiceEndpoint "Microsoft.Storage.Global" | Set-AzVirtualNetwork
152-
```
153-
154-
- Add a network rule for a virtual network and subnet.
155153
156-
```azurepowershell
157154
$rule = New-AzElasticSanVirtualNetworkRuleObject -VirtualNetworkResourceId $Subnet.Id -Action Allow
158155
159156
Add-AzElasticSanVolumeGroupNetworkRule -ResourceGroupName $RgName -ElasticSanName $EsanName -VolumeGroupName $EsanVgName -NetworkAclsVirtualNetworkRule $rule
160157
```
161158
162-
> [!TIP]
163-
> To add a network rule for a subnet in a virtual network belonging to another Microsoft Entra tenant, use a fully qualified **VirtualNetworkResourceId** parameter in the form "/subscriptions/subscription-ID/resourceGroups/resourceGroup-Name/providers/Microsoft.Network/virtualNetworks/vNet-name/subnets/subnet-name".
164-
165159
- Remove a virtual network rule.
166160
167161
```azurepowershell
@@ -177,17 +171,7 @@ You can manage virtual network rules for volume groups through the Azure portal,
177171
### [Azure CLI](#tab/azure-cli)
178172
179173
- List information from a particular volume group, including their virtual network rules.
180-
181-
```azurecli
182-
az elastic-san volume-group show -e $sanName -g $RgName -n $volumeGroupName
183-
```
184-
185174
- Enable service endpoint for Azure Storage on an existing virtual network and subnet.
186-
187-
```azurecli
188-
az network vnet subnet update --resource-group "myresourcegroup" --vnet-name "myvnet" --name "mysubnet" --service-endpoints "Microsoft.Storage.Global"
189-
```
190-
191175
- Add a network rule for a virtual network and subnet.
192176
193177
> [!TIP]
@@ -196,13 +180,18 @@ You can manage virtual network rules for volume groups through the Azure portal,
196180
> You can use the **subscription** parameter to retrieve the subnet ID for a virtual network belonging to another Microsoft Entra tenant.
197181
198182
```azurecli
199-
# First, get the current length of the list of virtual networks. This is needed to ensure you append a new network instead of replacing existing ones.
183+
az elastic-san volume-group show -e $sanName -g $RgName -n $volumeGroupName
184+
185+
az network vnet subnet update --resource-group "myresourcegroup" --vnet-name "myvnet" --name "mysubnet" --service-endpoints "Microsoft.Storage.Global"
186+
187+
# First, get the current length of the list of virtual networks to ensure you append a new network instead of replacing existing ones.
200188
virtualNetworkListLength = az elastic-san volume-group show -e $sanName -n $volumeGroupName -g $RgName --query 'length(networkAcls.virtualNetworkRules)'
201189
202190
az elastic-san volume-group update -e $sanName -g $RgName --name $volumeGroupName --network-acls virtual-network-rules[$virtualNetworkListLength] "{virtualNetworkRules:[{id:/subscriptions/subscriptionID/resourceGroups/RGName/providers/Microsoft.Network/virtualNetworks/$VnetName/subnets/default, action:Allow}]}"
203191
```
204192
205-
- Remove a network rule. The following command removes the first network rule, modify it to remove the network rule you'd like.
193+
194+
If you need to, you can remove network rules. As an example, the following command removes the first network rule, modify it to remove the network rule you'd like.
206195
207196
```azurecli
208197
az elastic-san volume-group update -e $sanName -g $RgName -n $volumeGroupName --network-acls virtual-network-rules[1]=null
@@ -231,21 +220,15 @@ You can manage virtual network rules for volume groups through the Azure portal,
231220
### [PowerShell](#tab/azure-powershell)
232221
233222
- List virtual network rules.
223+
- Enable service endpoint for Azure Storage on an existing virtual network and subnet.
224+
- Add a network rule for a virtual network and subnet.
234225
235226
```azurepowershell
236227
$Rules = Get-AzElasticSanVolumeGroup -ResourceGroupName $RgName -ElasticSanName $sanName -Name $volGroupName
237228
$Rules.NetworkAclsVirtualNetworkRule
238-
```
239229
240-
- Enable service endpoint for Azure Storage on an existing virtual network and subnet.
241-
242-
```azurepowershell
243230
Get-AzVirtualNetwork -ResourceGroupName "myresourcegroup" -Name "myvnet" | Set-AzVirtualNetworkSubnetConfig -Name "mysubnet" -AddressPrefix "10.0.0.0/24" -ServiceEndpoint "Microsoft.Storage.Global" | Set-AzVirtualNetwork
244-
```
245231
246-
- Add a network rule for a virtual network and subnet.
247-
248-
```azurepowershell
249232
$rule = New-AzElasticSanVirtualNetworkRuleObject -VirtualNetworkResourceId $Subnet.Id -Action Allow
250233
251234
Add-AzElasticSanVolumeGroupNetworkRule -ResourceGroupName $RgName -ElasticSanName $EsanName -VolumeGroupName $EsanVgName -NetworkAclsVirtualNetworkRule $rule
@@ -269,17 +252,7 @@ You can manage virtual network rules for volume groups through the Azure portal,
269252
### [Azure CLI](#tab/azure-cli)
270253
271254
- List information from a particular volume group, including their virtual network rules.
272-
273-
```azurecli
274-
az elastic-san volume-group show -e $sanName -g $RgName -n $volumeGroupName
275-
```
276-
277255
- Enable service endpoint for Azure Storage on an existing virtual network and subnet.
278-
279-
```azurecli
280-
az network vnet subnet update --resource-group "myresourcegroup" --vnet-name "myvnet" --name "mysubnet" --service-endpoints "Microsoft.Storage.Global"
281-
```
282-
283256
- Add a network rule for a virtual network and subnet.
284257
285258
> [!TIP]
@@ -288,6 +261,10 @@ You can manage virtual network rules for volume groups through the Azure portal,
288261
> You can use the **subscription** parameter to retrieve the subnet ID for a virtual network belonging to another Microsoft Entra tenant.
289262
290263
```azurecli
264+
az elastic-san volume-group show -e $sanName -g $RgName -n $volumeGroupName
265+
266+
az network vnet subnet update --resource-group "myresourcegroup" --vnet-name "myvnet" --name "mysubnet" --service-endpoints "Microsoft.Storage.Global"
267+
291268
# First, get the current length of the list of virtual networks. This is needed to ensure you append a new network instead of replacing existing ones.
292269
virtualNetworkListLength = az elastic-san volume-group show -e $sanName -n $volumeGroupName -g $RgName --query 'length(networkAcls.virtualNetworkRules)'
293270
@@ -308,7 +285,7 @@ You can manage virtual network rules for volume groups through the Azure portal,
308285
After you have enabled the desired endpoints and granted access in your network rules, you're ready to configure your clients to connect to the appropriate Elastic SAN volumes.
309286
310287
> [!NOTE]
311-
> If a connection between a virtual machine (VM) and an Elastic SAN volume is lost, the connection will retry for 90 seconds until terminating. Losing a connection to an Elastic SAN volume won't cause the VM to restart.
288+
> If a connection between a virtual machine (VM) and an Elastic SAN volume is lost, the connection retries for 90 seconds until terminating. Losing a connection to an Elastic SAN volume won't cause the VM to restart.
312289
313290
## Next steps
314291

articles/storage/elastic-san/elastic-san-connect-windows.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -70,17 +70,12 @@ Use the following script to create your connections. To execute it, collect or d
7070
and other volume names that you might require
7171
- 32: Number of sessions to each volume
7272

73-
Copy the script from [here](https://github.com/Azure-Samples/azure-elastic-san/blob/main/PSH%20(Windows)%20Multi-Session%20Connect%20Scripts/ElasticSanDocScripts0523/connect.ps1) and save it as a .ps1 file, for example, connect.ps1. Then execute it with the required parameters. The following is an example of how to run the script:
73+
Copy the script from [here](https://github.com/Azure-Samples/azure-elastic-san/blob/main/PSH%20(Windows)%20Multi-Session%20Connect%20Scripts/ElasticSanDocScripts0523/connect.ps1) and save it as a .ps1 file, for example, connect.ps1.
7474

75-
```bash
76-
./connect.ps1 $rgname $esanname $vgname $vol1,$vol2,$vol3 32
77-
```
78-
79-
Verify the number of sessions your volume has with either `iscsicli SessionList` or `mpclaim -s -d`
8075

8176
### Set session number
8277

83-
You need to use 32 sessions to each target volume to achieve its maximum IOPS and/or throughput limits. Windows iSCSI initiator has a limit of maximum 256 sessions. If you need to connect more than 8 volumes to a Windows client, reduce the number of sessions to each volume.
78+
Before you run the script, determine how many sessions your volume needs. To be able to reach a volume's highest IOPS and throughput capacities, you'll need 32 sessions. But, because Windows iSCSI initatior has a maximum of 256 sessions, you may need to use less than 32 sessions if you're connecting more than eight volumes to a Windows client.
8479

8580
> [!NOTE]
8681
> Use the `-NumSession` parameter to set the number of sessions. The parameter accepts values from 1 to 32, and has a default value of 32.
@@ -100,6 +95,8 @@ You need to use 32 sessions to each target volume to achieve its maximum IOPS an
10095
-NumSession “<value>
10196
```
10297

98+
Verify the number of sessions your volume has with either `iscsicli SessionList` or `mpclaim -s -d`
99+
103100
## Next steps
104101

105102
[Configure Elastic SAN networking](elastic-san-networking.md)

0 commit comments

Comments
 (0)