Skip to content

Commit 1d69221

Browse files
authored
Merge pull request #222249 from rvandenbedem/patch-41
Corrected a series of inaccuracies
2 parents e4c4323 + 6949dde commit 1d69221

9 files changed

+54
-85
lines changed

articles/azure-vmware/azure-vmware-solution-platform-updates.md

Lines changed: 28 additions & 25 deletions
Large diffs are not rendered by default.

articles/azure-vmware/concepts-network-design-considerations.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Concepts - Network design considerations
33
description: Learn about network design considerations for Azure VMware Solution
44
ms.topic: conceptual
55
ms.service: azure-vmware
6-
ms.date: 08/19/2022
6+
ms.date: 12/22/2022
77
---
88

99
# Azure VMware Solution network design considerations
@@ -12,14 +12,14 @@ Azure VMware Solution offers a VMware private cloud environment accessible for u
1212

1313
## Azure VMware Solution compatibility with AS-Path Prepend
1414

15-
Azure VMware Solution is incompatible with AS-Path Prepend for redundant ExpressRoute configurations and doesn't honor the outbound path selection from Azure towards on-premises. If you're running 2 or more ExpressRoute paths between on-premises and Azure, and the listed [Prerequisites](#prerequisites) are true; you may experience impaired connectivity or no connectivity between your on-premises networks and Azure VMware Solution. The connectivity issue is caused when Azure VMware Solution doesn't see the AS-Path Prepend and uses ECMP to send traffic towards your environment over both ExR circuits. That action causes issues with stateful firewall inspection.
15+
Azure VMware Solution is incompatible with AS-Path Prepend for redundant ExpressRoute configurations and doesn't honor the outbound path selection from Azure towards on-premises. If you're running two or more ExpressRoute paths between on-premises and Azure, and the listed [Prerequisites](#prerequisites) are not met, you may experience impaired connectivity or no connectivity between your on-premises networks and Azure VMware Solution. The connectivity issue is caused when Azure VMware Solution doesn't see the AS-Path Prepend and uses equal cost multi-pathing (ECMP) to send traffic towards your environment over both ExpressRoute circuits. That action causes issues with stateful firewall inspection.
1616

1717
### Prerequisites
1818

1919
For AS-Path Prepend, you'll need to verify that all of the following listed connections are true:
2020

2121
> [!div class="checklist"]
22-
> * Both or all circuits are connected to Azure VMware Solution with global reach.
22+
> * Both or all circuits are connected to Azure VMware Solution with ExpressRoute Global Reach.
2323
> * The same netblocks are being advertised from two or more circuits.
2424
> * Stateful firewalls are in the network path.
2525
> * You're using AS-Path Prepend to force Azure to prefer one path over others.
@@ -29,7 +29,7 @@ Either 2 or 4 byte Public ASN numbers should be used and be compatible with Azur
2929
## Management VMs and default routes from on-premises
3030

3131
> [!IMPORTANT]
32-
> Azure VMware Solution Management VMs don't honor a default route from on-premises.
32+
> Azure VMware Solution Management VMs will not honor a default route from on-premises.
3333
3434
If you're routing back to your on-premises networks using only a default route advertised towards Azure, the vCenter Server and NSX-T Manager VMs won't be compatible with that route.
3535

@@ -98,7 +98,7 @@ The following diagram demonstrates how a single 0.0.0.0/0 is advertised to Azure
9898
> [!IMPORTANT]
9999
> An encapsulation protocol such as VXLAN or IPsec is required between the NVAs. Encapsulation is needed because the NVA NICs would learn the routes from Azure Route Server with the NVA as next hop and create a routing loop.
100100
101-
There's an alternative to using an overlay. Apply secondary NICs in the NVA that won't learn the routes from Azure Route Server and configure UDRs so that Azure can route traffic to the remote environment over those NICs. You can find more details in [Enterprise-scale network topology and connectivity for Azure VMware Solution](https://learn.microsoft.com/azure/cloud-adoption-framework/scenarios/azure-vmware/eslz-network-topology-connectivity#scenario-2-a-third-party-nva-in-hub-azure-virtual-network-inspects-all-network-traffic).
101+
There's an alternative to using an overlay. Apply secondary NICs in the NVA that won't learn the routes from Azure Route Server and configure UDRs so that Azure can route traffic to the remote environment over those NICs. You can find more details in [Enterprise-scale network topology and connectivity for Azure VMware Solution](/azure/cloud-adoption-framework/scenarios/azure-vmware/eslz-network-topology-connectivity#scenario-2-a-third-party-nva-in-hub-azure-virtual-network-inspects-all-network-traffic).
102102

103103
**This topology requires a complex initial set-up. Once the set-up is complete, the topology works as expected with minimal management overhead. See the following list of specific set-up complexities.**
104104

articles/azure-vmware/configure-port-mirroring-azure-vmware-solution.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure port mirroring to monitor network traffic th
44
ms.topic: how-to
55
ms.custom: contperf-fy22q1
66
ms.service: azure-vmware
7-
ms.date: 04/11/2022
7+
ms.date: 12/22/2022
88

99
# Customer intent: As an Azure service administrator, I want to configure port mirroring to monitor network traffic that involves forwarding a copy of each packet from one network switch port to another.
1010

@@ -16,6 +16,9 @@ After deploying Azure VMware Solution, you can configure port mirroring from the
1616

1717
In this how-to, you'll configure port mirroring to monitor network traffic, which involves forwarding a copy of each packet from one network switch port to another.
1818

19+
>[!IMPORTANT]
20+
>Port Mirroring is intended to be used as a temporary investigative tool and not a permanent network data collection feature. This is because NSX-T Data Center does not have the resoures to port mirror all traffic continuously. The IPFIX feature should be used if a continuous meta-data network flow logging solution is required.
21+
1922
## Prerequisites
2023

2124
An Azure VMware Solution private cloud with access to the vCenter Server and NSX-T Manager interfaces. For more information, see the [Configure networking](tutorial-configure-networking.md) tutorial.

articles/azure-vmware/configure-vmware-syslogs.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure VMware syslogs for Azure VMware Solution
33
description: Learn how to configure diagnostic settings to collect VMware syslogs for your Azure VMware Solution private cloud.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 12/07/2022
6+
ms.date: 12/22/2022
77

88
#Customer intent: As an Azure service administrator, I want to collect VMware syslogs and store it in my storage account so that I can view the vCenter Server logs and analyze for any diagnostic purposes.
99

@@ -16,11 +16,12 @@ Diagnostic settings are used to configure streaming export of platform logs and
1616
In this article, you'll configure a diagnostic setting to collect VMware syslogs for your Azure VMware Solution private cloud. You'll store the syslog to a storage account to view the vCenter Server logs and analyze for diagnostic purposes.
1717
>[!IMPORTANT]
1818
>The **VMware syslogs** contains the following logs:
19-
>- NSX-T Data Center Distributed Firewall logs
19+
>- vCenter Server logs
20+
>- ESXi logs
21+
>- vSAN logs
2022
>- NSX-T Manager logs
23+
>- NSX-T Data Center Distributed Firewall logs
2124
>- NSX-T Data Center Gateway Firewall logs
22-
>- ESXi logs
23-
>- vCenter Server logs
2425
>- NSX-T Data Center Edge Appliance logs
2526
2627
## Prerequisites

articles/azure-vmware/introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Introduction
33
description: Learn the features and benefits of Azure VMware Solution to deploy and manage VMware-based workloads in Azure. Azure VMware Solution SLA guarantees that Azure VMware management tools (vCenter Server and NSX Manager) will be available at least 99.9% of the time.
44
ms.topic: overview
55
ms.service: azure-vmware
6-
ms.date: 10/28/2022
6+
ms.date: 12/22/2022
77
ms.custom: engagement-fy23
88
---
99

@@ -36,7 +36,7 @@ Frequency of 2.7Ghz and Turbo of 4.0Ghz.
3636
- 38.4TB storage capacity with all NVMe based SSDs (With Random Read of 636500 IOPS and Random Write of 223300 IOPS)
3737
- 1.5TB of NVMe Cache
3838

39-
For pricing and region availability, see the [Azure VMware Solution pricing page](https://azure.microsoft.com/pricing/details/azure-vmware/) and see the [Products available by region page](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/).
39+
For pricing and region availability, see the [Azure VMware Solution pricing page](https://azure.microsoft.com/pricing/details/azure-vmware/) and see the [Products available by region page](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=azure-vmware&regions=all).
4040

4141
## Hosts, clusters, and private clouds
4242

articles/azure-vmware/move-ea-csp-subscriptions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes how to move Azure VMware Solution subscripti
44
ms.custom: "subject-moving-resources, engagement-fy23"
55
ms.topic: how-to
66
ms.service: azure-vmware
7-
ms.date: 10/26/2022
7+
ms.date: 12/22/2022
88

99
# Customer intent: As an Azure service administrator, I want to move my Azure VMware Solution subscription to another subscription.
1010
---
@@ -18,7 +18,7 @@ This article describes how to move an Azure VMware Solution subscription to anot
1818
You should have at least contributor rights on both **source** and **target** subscriptions.
1919

2020
>[!IMPORTANT]
21-
>VNet and VNet gateway can't' be moved from one subscription to another. Additionally, moving your subscriptions has no impact on the management and workloads, like the vCenter, NSX, and workload virtual machines.
21+
>VNet and VNet gateway can't be moved from one subscription to another. Additionally, moving your subscriptions has no impact on the management and workloads, like the vCenter Server, NSX-T Data Center, vSAN, and workload virtual machines.
2222
2323
## Prepare and move
2424

articles/azure-vmware/rotate-cloudadmin-credentials.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Rotate the cloudadmin credentials for Azure VMware Solution
33
description: Learn how to rotate the vCenter Server credentials for your Azure VMware Solution private cloud.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 04/11/2022
6+
ms.date: 12/22/2022
77

88
#Customer intent: As an Azure service administrator, I want to rotate my cloudadmin credentials so that the HCX Connector has the latest vCenter Server CloudAdmin credentials.
99

@@ -12,7 +12,7 @@ ms.date: 04/11/2022
1212
# Rotate the cloudadmin credentials for Azure VMware Solution
1313

1414
>[!IMPORTANT]
15-
>Currently, rotating your NSX-T Manager *admin* credentials isn't supported. To rotate your NSX-T Manager password, submit a [support request](https://rc.portal.azure.com/#create/Microsoft.Support). This process might impact running HCX services.
15+
>Currently, rotating your NSX-T Manager *cloudadmin* credentials isn't supported. To rotate your NSX-T Manager password, submit a [support request](https://rc.portal.azure.com/#create/Microsoft.Support). This process might impact running HCX services.
1616
1717
In this article, you'll rotate the cloudadmin credentials (vCenter Server *CloudAdmin* credentials) for your Azure VMware Solution private cloud. Although the password for this account doesn't expire, you can generate a new one at any time.
1818

@@ -25,7 +25,7 @@ Consider and determine which services connect to vCenter Server as *cloudadmin@v
2525

2626
One way to determine which services authenticate to vCenter Server with the cloudadmin user is to inspect vSphere events using the vSphere Client for your private cloud. After you identify such services, and before rotating the password, you must stop these services. Otherwise, the services won't work after you rotate the password. You'll also experience temporary locks on your vCenter Server CloudAdmin account, as these services continuously attempt to authenticate using a cached version of the old credentials.
2727

28-
Instead of using the cloudadmin user to connect services to vCenter, we recommend individual accounts for each service. For more information about setting up separate accounts for connected services, see [Access and Identity Concepts](./concepts-identity.md).
28+
Instead of using the cloudadmin user to connect services to vCenter Server, we recommend individual accounts for each service. For more information about setting up separate accounts for connected services, see [Access and Identity Concepts](./concepts-identity.md).
2929

3030
## Reset your vCenter Server credentials
3131

@@ -48,7 +48,7 @@ To begin using Azure CLI:
4848

4949
1. In your Azure VMware Solution private cloud, open an Azure Cloud Shell session.
5050

51-
2. Update your vCenter *CloudAdmin* credentials. Remember to replace **{SubscriptionID}**, **{ResourceGroup}**, and **{PrivateCloudName}** with your private cloud information.
51+
2. Update your vCenter Server *CloudAdmin* credentials. Remember to replace **{SubscriptionID}**, **{ResourceGroup}**, and **{PrivateCloudName}** with your private cloud information.
5252

5353
```azurecli-interactive
5454
az resource invoke-action --action rotateVcenterPassword --ids "/subscriptions/{SubscriptionID}/resourceGroups/{ResourceGroup}/providers/Microsoft.AVS/privateClouds/{PrivateCloudName}" --api-version "2020-07-17-preview"

articles/azure-vmware/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -154,14 +154,14 @@
154154
href: deploy-arc-for-azure-vmware-solution.md
155155
- name: Deploy disaster recovery
156156
items:
157-
- name: Deploy disaster recovery using JetStream DR software
158-
href: deploy-disaster-recovery-using-jetstream.md
159157
- name: Deploy VMware HCX for disaster recovery
160158
href: deploy-disaster-recovery-using-vmware-hcx.md
161159
- name: Deploy VMware SRM for disaster recovery
162160
href: disaster-recovery-using-vmware-site-recovery-manager.md
163161
- name: Deploy Zerto disaster recovery
164162
href: deploy-zerto-disaster-recovery.md
163+
- name: Deploy disaster recovery using JetStream DR software
164+
href: deploy-disaster-recovery-using-jetstream.md
165165
- name: Deploy virtual desktops
166166
items:
167167
- name: Deploy Horizon on Azure VMware Solution

0 commit comments

Comments
 (0)