Skip to content

Commit 27737ca

Browse files
authored
Merge pull request #260587 from ankitaduttaMSFT/mstopic
updated metadata
2 parents 4d046d5 + ce26237 commit 27737ca

22 files changed

+51
-54
lines changed

articles/site-recovery/azure-to-azure-about-networking.md

Lines changed: 19 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
22
title: About networking in Azure VM disaster recovery with Azure Site Recovery
33
description: Provides an overview of networking for replication of Azure VMs using Azure Site Recovery.
4-
services: site-recovery
54
author: ankitaduttaMSFT
65
manager: rochakm
76
ms.service: site-recovery
8-
ms.topic: article
7+
ms.topic: conceptual
98
ms.date: 11/21/2021
109
ms.author: ankitadutta
1110
ms.custom: engagement-fy23
@@ -41,7 +40,7 @@ Typically, networks are protected using firewalls and network security groups (N
4140
4241
## Outbound connectivity for URLs
4342

44-
If you are using a URL-based firewall proxy to control outbound connectivity, allow these Site Recovery URLs:
43+
If you're using a URL-based firewall proxy to control outbound connectivity, allow these Site Recovery URLs:
4544

4645
**URL** | **Details**
4746
--- | ---
@@ -50,13 +49,13 @@ login.microsoftonline.com | Required for authorization and authentication to the
5049
*.hypervrecoverymanager.windowsazure.com | Required so that the Site Recovery service communication can occur from the VM.
5150
*.servicebus.windows.net | Required so that the Site Recovery monitoring and diagnostics data can be written from the VM.
5251
*.vault.azure.net | Allows access to enable replication for ADE-enabled virtual machines via portal
53-
*.automation.ext.azure.com | Allows enabling auto-upgrade of mobility agent for a replicated item via portal
52+
*.automation.ext.azure.com | Allows enabling autoupgrade of mobility agent for a replicated item via portal
5453

5554
## Outbound connectivity using Service Tags
5655

57-
Apart from controlling URLs, you can also use service tags to control connectivity. To do so, you will first need to create a [Network Security Group](../virtual-network/network-security-group-how-it-works.md) in Azure. Once created, you will need to use our existing service tags and create an NSG rule to allow access to Azure Site Recovery services.
56+
Apart from controlling URLs, you can also use service tags to control connectivity. To do so, you must first create a [Network Security Group](../virtual-network/network-security-group-how-it-works.md) in Azure. Once created, you need to use our existing service tags and create an NSG rule to allow access to Azure Site Recovery services.
5857

59-
The advantages of using service tags to control connectivity, when compared to controlling connectivity using IP addresses, is that there will be no hard dependency on a particular IP address to stay connected to our services. In such a scenario, if the IP address of one of our services changes, then the ongoing replication will not be impacted for your machines. Whereas, a dependency on hard coded IP addresses will cause the replication status to become critical and put your systems at risk. Moreover, service tags ensures better security, stability and resiliency than hard coded IP addresses.
58+
The advantages of using service tags to control connectivity, when compared to controlling connectivity using IP addresses, is that there is no hard dependency on a particular IP address to stay connected to our services. In such a scenario, if the IP address of one of our services changes, then the ongoing replication is not impacted for your machines. Whereas, a dependency on hard coded IP addresses causes the replication status to become critical and put your systems at risk. Moreover, service tags ensure better security, stability and resiliency than hard coded IP addresses.
6059

6160
While using NSG to control outbound connectivity, these service tags need to be allowed.
6261

@@ -65,9 +64,9 @@ While using NSG to control outbound connectivity, these service tags need to be
6564
- Allow these addresses so that data can be written to the cache storage account, from the VM.
6665
- Create a [Microsoft Entra service tag](../virtual-network/network-security-groups-overview.md#service-tags) based NSG rule for allowing access to all IP addresses corresponding to Microsoft Entra ID
6766
- Create an EventsHub service tag-based NSG rule for the target region, allowing access to Site Recovery monitoring.
68-
- Create an AzureSiteRecovery service tag-based NSG rule for allowing access to Site Recovery service in any region.
67+
- Create an Azure Site Recovery service tag-based NSG rule for allowing access to Site Recovery service in any region.
6968
- Create an AzureKeyVault service tag-based NSG rule. This is required only for enabling replication of ADE-enabled virtual machines via portal.
70-
- Create a GuestAndHybridManagement service tag-based NSG rule. This is required only for enabling auto-upgrade of mobility agent for a replicated item via portal.
69+
- Create a GuestAndHybridManagement service tag-based NSG rule. This is required only for enabling autoupgrade of mobility agent for a replicated item via portal.
7170
- We recommend that you create the required NSG rules on a test NSG, and verify that there are no problems before you create the rules on a production NSG.
7271

7372
## Example NSG configuration
@@ -79,17 +78,17 @@ This example shows how to configure NSG rules for a VM to replicate.
7978

8079
### NSG rules - East US
8180

82-
1. Create an outbound HTTPS (443) security rule for "Storage.EastUS" on the NSG as shown in the screenshot below.
81+
1. Create an outbound HTTPS (443) security rule for "Storage.EastUS" on the NSG as shown in the following screenshot:
8382

8483
![Screenshot shows Add outbound security rule for a network security group for Storage dot East U S.](./media/azure-to-azure-about-networking/storage-tag.png)
8584

86-
2. Create an outbound HTTPS (443) security rule for "AzureActiveDirectory" on the NSG as shown in the screenshot below.
85+
2. Create an outbound HTTPS (443) security rule for "AzureActiveDirectory" on the NSG as shown in the following screenshot:
8786

8887
![Screenshot shows Add outbound security rule for a network security group for Microsoft Entra ID.](./media/azure-to-azure-about-networking/aad-tag.png)
8988

90-
3. Similar to above security rules, create outbound HTTPS (443) security rule for "EventHub.CentralUS" on the NSG that corresponds to the target location. This allows access to Site Recovery monitoring.
89+
3. Similar to the security rules, create outbound HTTPS (443) security rule for "EventHub.CentralUS" on the NSG that corresponds to the target location. This allows access to Site Recovery monitoring.
9190

92-
4. Create an outbound HTTPS (443) security rule for "AzureSiteRecovery" on the NSG. This allows access to Site Recovery Service in any region.
91+
4. Create an outbound HTTPS (443) security rule for "Azure Site Recovery" on the NSG. This allows access to Site Recovery Service in any region.
9392

9493
### NSG rules - Central US
9594

@@ -99,16 +98,17 @@ These rules are required so that replication can be enabled from the target regi
9998

10099
2. Create an outbound HTTPS (443) security rule for "AzureActiveDirectory" on the NSG.
101100

102-
3. Similar to above security rules, create outbound HTTPS (443) security rule for "EventHub.EastUS" on the NSG that corresponds to the source location. This allows access to Site Recovery monitoring.
101+
3. Similar to the security rules, create outbound HTTPS (443) security rule for "EventHub.EastUS" on the NSG that corresponds to the source location. This allows access to Site Recovery monitoring.
103102

104-
4. Create an outbound HTTPS (443) security rule for "AzureSiteRecovery" on the NSG. This allows access to Site Recovery Service in any region.
103+
4. Create an outbound HTTPS (443) security rule for "Azure Site Recovery" on the NSG. This allows access to Site Recovery Service in any region.
105104

106105
## Network virtual appliance configuration
107106

108-
If you are using network virtual appliances (NVAs) to control outbound network traffic from VMs, the appliance might get throttled if all the replication traffic passes through the NVA. We recommend creating a network service endpoint in your virtual network for "Storage" so that the replication traffic does not go to the NVA.
107+
If you're using network virtual appliances (NVAs) to control outbound network traffic from VMs, the appliance might get throttled if all the replication traffic passes through the NVA. We recommend creating a network service endpoint in your virtual network for "Storage" so that the replication traffic doesn't go to the NVA.
109108

110109
### Create network service endpoint for Storage
111-
You can create a network service endpoint in your virtual network for "Storage" so that the replication traffic does not leave Azure boundary.
110+
111+
You can create a network service endpoint in your virtual network for "Storage" so that the replication traffic doesn't leave Azure boundary.
112112

113113
- Select your Azure virtual network and click on 'Service endpoints'
114114

@@ -118,14 +118,15 @@ You can create a network service endpoint in your virtual network for "Storage"
118118
- Select 'Microsoft.Storage' under 'Service' and the required subnets under 'Subnets' field and click 'Add'
119119

120120
>[!NOTE]
121-
>If you are using firewall enabled cache storage account or target storage account, ensure you ['Allow trusted Microsoft services'](../storage/common/storage-network-security.md). Also, ensure that you allow access to at least one subnet of source Vnet.
121+
>If you're using firewall enabled cache storage account or target storage account, ensure you ['Allow trusted Microsoft services'](../storage/common/storage-network-security.md). Also, ensure that you allow access to at least one subnet of source Vnet.
122122
123123

124124
### Forced tunneling
125125

126-
You can override Azure's default system route for the 0.0.0.0/0 address prefix with a [custom route](../virtual-network/virtual-networks-udr-overview.md#custom-routes) and divert VM traffic to an on-premises network virtual appliance (NVA), but this configuration is not recommended for Site Recovery replication. If you're using custom routes, you should [create a virtual network service endpoint](azure-to-azure-about-networking.md#create-network-service-endpoint-for-storage) in your virtual network for "Storage" so that the replication traffic does not leave the Azure boundary.
126+
You can override Azure's default system route for the 0.0.0.0/0 address prefix with a [custom route](../virtual-network/virtual-networks-udr-overview.md#custom-routes) and divert VM traffic to an on-premises network virtual appliance (NVA), but this configuration isn't recommended for Site Recovery replication. If you're using custom routes, you should [create a virtual network service endpoint](azure-to-azure-about-networking.md#create-network-service-endpoint-for-storage) in your virtual network for "Storage" so that the replication traffic doesn't leave the Azure boundary.
127127

128128
## Next steps
129+
129130
- Start protecting your workloads by [replicating Azure virtual machines](./azure-to-azure-quickstart.md).
130131
- Learn more about [IP address retention](site-recovery-retain-ip-azure-vm-failover.md) for Azure virtual machine failover.
131132
- Learn more about disaster recovery of [Azure virtual machines with ExpressRoute](azure-vm-disaster-recovery-with-expressroute.md).

articles/site-recovery/azure-to-azure-autoupdate.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
22
title: Automatic update of the Mobility service in Azure Site Recovery
33
description: Overview of automatic update of the Mobility service when replicating Azure VMs by using Azure Site Recovery.
4-
services: site-recovery
54
author: ankitaduttaMSFT
65
manager: rochakm
76
ms.service: site-recovery
8-
ms.topic: article
7+
ms.topic: how-to
98
ms.date: 03/24/2023
109
ms.author: ankitadutta
1110
ms.custom: engagement-fy23

articles/site-recovery/azure-to-azure-customize-networking.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
22
title: Customize networking configurations for a failover VM | Microsoft Docs
33
description: Provides an overview of customize networking configurations for a failover VM in the replication of Azure VMs using Azure Site Recovery.
4-
services: site-recovery
54
author: ankitaduttaMSFT
65
manager: gaggupta
76
ms.service: site-recovery
8-
ms.topic: article
7+
ms.topic: tutorial
98
ms.date: 03/27/2023
109
ms.author: ankitadutta
1110
ms.custom: engagement-fy23

articles/site-recovery/azure-to-azure-enable-global-disaster-recovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Enable disaster recovery across Azure regions across the globe
33
description: This article describes the global disaster recovery feature in Azure Site Recovery.
44
manager: evansma
55
ms.service: site-recovery
6-
ms.topic: article
6+
ms.topic: tutorial
77
ms.date: 08/09/2021
88
ms.author: ankitadutta
99
author: ankitaduttaMSFT

articles/site-recovery/azure-to-azure-how-to-enable-replication-ade-vms.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes how to configure replication for Azure Disk
44
author: ankitaduttaMSFT
55
manager: gaggupta
66
ms.service: site-recovery
7-
ms.topic: article
7+
ms.topic: how-to
88
ms.date: 10/19/2022
99
ms.author: ankitadutta
1010

articles/site-recovery/azure-to-azure-how-to-enable-replication-cmk-disks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ankitaduttaMSFT
55
manager: rochakm
66
ms.service: site-recovery
77
ms.custom: devx-track-azurepowershell
8-
ms.topic: article
8+
ms.topic: how-to
99
ms.date: 10/09/2023
1010
ms.author: ankitadutta
1111
---

articles/site-recovery/azure-to-azure-how-to-enable-replication-private-endpoints.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes how to configure replication for VMs with pr
44
author: ankitaduttaMSFT
55
ms.author: ankitadutta
66
ms.service: site-recovery
7-
ms.topic: article
7+
ms.topic: how-to
88
ms.date: 04/23/2022
99
ms.custom: references_regions, subject-rbac-steps, engagement-fy23
1010
---

articles/site-recovery/azure-to-azure-how-to-enable-zone-to-zone-disaster-recovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes when and how to use zone-to-zone disaster re
44
author: ankitaduttaMSFT
55
manager: aravindang
66
ms.service: site-recovery
7-
ms.topic: article
7+
ms.topic: tutorial
88
ms.date: 10/09/2023
99
ms.author: ankitadutta
1010
ms.custom: references_regions

articles/site-recovery/azure-to-azure-how-to-reprotect.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,8 @@ title: Reprotect Azure VMs to the primary region with Azure Site Recovery
33
description: Describes how to reprotect Azure VMs after failover, the secondary to primary region, using Azure Site Recovery.
44
services: site-recovery
55
author: ankitaduttaMSFT
6-
manager: jsuri
76
ms.service: site-recovery
8-
ms.topic: article
7+
ms.topic: tutorial
98
ms.date: 07/14/2023
109
ms.author: ankitadutta
1110
---

articles/site-recovery/azure-to-azure-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Disaster recovery for Azure VMs using Azure PowerShell and Azure Site Recovery
33
description: Learn how to set up disaster recovery for Azure virtual machines with Azure Site Recovery using Azure PowerShell.
4-
services: site-recovery
4+
ms.service: site-recovery
55
author: ankitaduttaMSFT
66
manager: rochakm
7-
ms.topic: article
7+
ms.topic: how-to
88
ms.date: 07/14/2023
99
ms.author: ankitadutta
1010
ms.custom: devx-track-azurepowershell

0 commit comments

Comments
 (0)