You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -12,14 +12,14 @@ Azure VMware Solution offers a VMware private cloud environment accessible for u
12
12
13
13
## Azure VMware Solution compatibility with AS-Path Prepend
14
14
15
-
Azure VMware Solution is incompatible with AS-Path Prepend for redundant ExpressRoute configurations and doesn't honor the outbound path selection from Azure towards on-premises. If you're running 2 or more ExpressRoute paths between on-premises and Azure, and the listed [Prerequisites](#prerequisites) are true; you may experience impaired connectivity or no connectivity between your on-premises networks and Azure VMware Solution. The connectivity issue is caused when Azure VMware Solution doesn't see the AS-Path Prepend and uses ECMP to send traffic towards your environment over both ExR circuits. That action causes issues with stateful firewall inspection.
15
+
Azure VMware Solution is incompatible with AS-Path Prepend for redundant ExpressRoute configurations and doesn't honor the outbound path selection from Azure towards on-premises. If you're running two or more ExpressRoute paths between on-premises and Azure, and the listed [Prerequisites](#prerequisites) are not met, you may experience impaired connectivity or no connectivity between your on-premises networks and Azure VMware Solution. The connectivity issue is caused when Azure VMware Solution doesn't see the AS-Path Prepend and uses equal cost multi-pathing (ECMP) to send traffic towards your environment over both ExpressRoute circuits. That action causes issues with stateful firewall inspection.
16
16
17
17
### Prerequisites
18
18
19
19
For AS-Path Prepend, you'll need to verify that all of the following listed connections are true:
20
20
21
21
> [!div class="checklist"]
22
-
> * Both or all circuits are connected to Azure VMware Solution with global reach.
22
+
> * Both or all circuits are connected to Azure VMware Solution with ExpressRoute Global Reach.
23
23
> * The same netblocks are being advertised from two or more circuits.
24
24
> * Stateful firewalls are in the network path.
25
25
> * You're using AS-Path Prepend to force Azure to prefer one path over others.
@@ -29,7 +29,7 @@ Either 2 or 4 byte Public ASN numbers should be used and be compatible with Azur
29
29
## Management VMs and default routes from on-premises
30
30
31
31
> [!IMPORTANT]
32
-
> Azure VMware Solution Management VMs don't honor a default route from on-premises.
32
+
> Azure VMware Solution Management VMs will not honor a default route from on-premises.
33
33
34
34
If you're routing back to your on-premises networks using only a default route advertised towards Azure, the vCenter Server and NSX-T Manager VMs won't be compatible with that route.
35
35
@@ -98,7 +98,7 @@ The following diagram demonstrates how a single 0.0.0.0/0 is advertised to Azure
98
98
> [!IMPORTANT]
99
99
> An encapsulation protocol such as VXLAN or IPsec is required between the NVAs. Encapsulation is needed because the NVA NICs would learn the routes from Azure Route Server with the NVA as next hop and create a routing loop.
100
100
101
-
There's an alternative to using an overlay. Apply secondary NICs in the NVA that won't learn the routes from Azure Route Server and configure UDRs so that Azure can route traffic to the remote environment over those NICs. You can find more details in [Enterprise-scale network topology and connectivity for Azure VMware Solution](https://learn.microsoft.com/azure/cloud-adoption-framework/scenarios/azure-vmware/eslz-network-topology-connectivity#scenario-2-a-third-party-nva-in-hub-azure-virtual-network-inspects-all-network-traffic).
101
+
There's an alternative to using an overlay. Apply secondary NICs in the NVA that won't learn the routes from Azure Route Server and configure UDRs so that Azure can route traffic to the remote environment over those NICs. You can find more details in [Enterprise-scale network topology and connectivity for Azure VMware Solution](/azure/cloud-adoption-framework/scenarios/azure-vmware/eslz-network-topology-connectivity#scenario-2-a-third-party-nva-in-hub-azure-virtual-network-inspects-all-network-traffic).
102
102
103
103
**This topology requires a complex initial set-up. Once the set-up is complete, the topology works as expected with minimal management overhead. See the following list of specific set-up complexities.**
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-port-mirroring-azure-vmware-solution.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to configure port mirroring to monitor network traffic th
4
4
ms.topic: how-to
5
5
ms.custom: contperf-fy22q1
6
6
ms.service: azure-vmware
7
-
ms.date: 04/11/2022
7
+
ms.date: 12/22/2022
8
8
9
9
# Customer intent: As an Azure service administrator, I want to configure port mirroring to monitor network traffic that involves forwarding a copy of each packet from one network switch port to another.
10
10
@@ -16,6 +16,9 @@ After deploying Azure VMware Solution, you can configure port mirroring from the
16
16
17
17
In this how-to, you'll configure port mirroring to monitor network traffic, which involves forwarding a copy of each packet from one network switch port to another.
18
18
19
+
>[!IMPORTANT]
20
+
>Port Mirroring is intended to be used as a temporary investigative tool and not a permanent network data collection feature. This is because NSX-T Data Center does not have the resoures to port mirror all traffic continuously. The IPFIX feature should be used if a continuous meta-data network flow logging solution is required.
21
+
19
22
## Prerequisites
20
23
21
24
An Azure VMware Solution private cloud with access to the vCenter Server and NSX-T Manager interfaces. For more information, see the [Configure networking](tutorial-configure-networking.md) tutorial.
description: Learn how to configure diagnostic settings to collect VMware syslogs for your Azure VMware Solution private cloud.
4
4
ms.topic: how-to
5
5
ms.service: azure-vmware
6
-
ms.date: 12/07/2022
6
+
ms.date: 12/22/2022
7
7
8
8
#Customer intent: As an Azure service administrator, I want to collect VMware syslogs and store it in my storage account so that I can view the vCenter Server logs and analyze for any diagnostic purposes.
9
9
@@ -16,11 +16,12 @@ Diagnostic settings are used to configure streaming export of platform logs and
16
16
In this article, you'll configure a diagnostic setting to collect VMware syslogs for your Azure VMware Solution private cloud. You'll store the syslog to a storage account to view the vCenter Server logs and analyze for diagnostic purposes.
17
17
>[!IMPORTANT]
18
18
>The **VMware syslogs** contains the following logs:
Copy file name to clipboardExpand all lines: articles/azure-vmware/introduction.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Introduction
3
3
description: Learn the features and benefits of Azure VMware Solution to deploy and manage VMware-based workloads in Azure. Azure VMware Solution SLA guarantees that Azure VMware management tools (vCenter Server and NSX Manager) will be available at least 99.9% of the time.
4
4
ms.topic: overview
5
5
ms.service: azure-vmware
6
-
ms.date: 10/28/2022
6
+
ms.date: 12/22/2022
7
7
ms.custom: engagement-fy23
8
8
---
9
9
@@ -36,7 +36,7 @@ Frequency of 2.7Ghz and Turbo of 4.0Ghz.
36
36
- 38.4TB storage capacity with all NVMe based SSDs (With Random Read of 636500 IOPS and Random Write of 223300 IOPS)
37
37
- 1.5TB of NVMe Cache
38
38
39
-
For pricing and region availability, see the [Azure VMware Solution pricing page](https://azure.microsoft.com/pricing/details/azure-vmware/) and see the [Products available by region page](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/).
39
+
For pricing and region availability, see the [Azure VMware Solution pricing page](https://azure.microsoft.com/pricing/details/azure-vmware/) and see the [Products available by region page](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=azure-vmware®ions=all).
# Customer intent: As an Azure service administrator, I want to move my Azure VMware Solution subscription to another subscription.
10
10
---
@@ -18,7 +18,7 @@ This article describes how to move an Azure VMware Solution subscription to anot
18
18
You should have at least contributor rights on both **source** and **target** subscriptions.
19
19
20
20
>[!IMPORTANT]
21
-
>VNet and VNet gateway can't' be moved from one subscription to another. Additionally, moving your subscriptions has no impact on the management and workloads, like the vCenter, NSX, and workload virtual machines.
21
+
>VNet and VNet gateway can't be moved from one subscription to another. Additionally, moving your subscriptions has no impact on the management and workloads, like the vCenter Server, NSX-T Data Center, vSAN, and workload virtual machines.
Copy file name to clipboardExpand all lines: articles/azure-vmware/rotate-cloudadmin-credentials.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Rotate the cloudadmin credentials for Azure VMware Solution
3
3
description: Learn how to rotate the vCenter Server credentials for your Azure VMware Solution private cloud.
4
4
ms.topic: how-to
5
5
ms.service: azure-vmware
6
-
ms.date: 04/11/2022
6
+
ms.date: 12/22/2022
7
7
8
8
#Customer intent: As an Azure service administrator, I want to rotate my cloudadmin credentials so that the HCX Connector has the latest vCenter Server CloudAdmin credentials.
9
9
@@ -12,7 +12,7 @@ ms.date: 04/11/2022
12
12
# Rotate the cloudadmin credentials for Azure VMware Solution
13
13
14
14
>[!IMPORTANT]
15
-
>Currently, rotating your NSX-T Manager *admin* credentials isn't supported. To rotate your NSX-T Manager password, submit a [support request](https://rc.portal.azure.com/#create/Microsoft.Support). This process might impact running HCX services.
15
+
>Currently, rotating your NSX-T Manager *cloudadmin* credentials isn't supported. To rotate your NSX-T Manager password, submit a [support request](https://rc.portal.azure.com/#create/Microsoft.Support). This process might impact running HCX services.
16
16
17
17
In this article, you'll rotate the cloudadmin credentials (vCenter Server *CloudAdmin* credentials) for your Azure VMware Solution private cloud. Although the password for this account doesn't expire, you can generate a new one at any time.
18
18
@@ -25,7 +25,7 @@ Consider and determine which services connect to vCenter Server as *cloudadmin@v
25
25
26
26
One way to determine which services authenticate to vCenter Server with the cloudadmin user is to inspect vSphere events using the vSphere Client for your private cloud. After you identify such services, and before rotating the password, you must stop these services. Otherwise, the services won't work after you rotate the password. You'll also experience temporary locks on your vCenter Server CloudAdmin account, as these services continuously attempt to authenticate using a cached version of the old credentials.
27
27
28
-
Instead of using the cloudadmin user to connect services to vCenter, we recommend individual accounts for each service. For more information about setting up separate accounts for connected services, see [Access and Identity Concepts](./concepts-identity.md).
28
+
Instead of using the cloudadmin user to connect services to vCenter Server, we recommend individual accounts for each service. For more information about setting up separate accounts for connected services, see [Access and Identity Concepts](./concepts-identity.md).
29
29
30
30
## Reset your vCenter Server credentials
31
31
@@ -48,7 +48,7 @@ To begin using Azure CLI:
48
48
49
49
1. In your Azure VMware Solution private cloud, open an Azure Cloud Shell session.
50
50
51
-
2. Update your vCenter *CloudAdmin* credentials. Remember to replace **{SubscriptionID}**, **{ResourceGroup}**, and **{PrivateCloudName}** with your private cloud information.
51
+
2. Update your vCenter Server *CloudAdmin* credentials. Remember to replace **{SubscriptionID}**, **{ResourceGroup}**, and **{PrivateCloudName}** with your private cloud information.
52
52
53
53
```azurecli-interactive
54
54
az resource invoke-action --action rotateVcenterPassword --ids "/subscriptions/{SubscriptionID}/resourceGroups/{ResourceGroup}/providers/Microsoft.AVS/privateClouds/{PrivateCloudName}" --api-version "2020-07-17-preview"
0 commit comments