Skip to content

Commit 291b297

Browse files
authored
Merge pull request #113694 from MicrosoftDocs/master
merge master to live (Sunday PM publish)
2 parents 4499035 + 15f8af5 commit 291b297

11 files changed

+162
-33
lines changed

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ For more information, see the [Code of Conduct FAQ](https://opensource.microsoft
1111

1212
## How can I contribute?
1313

14-
There are a variety of ways to contribute to the documentation, review the sections below to find out which one is right for you.
14+
There are many ways to contribute to the documentation, review the sections below to find out which one is right for you.
1515

1616
### Reporting Bugs and Suggesting Enhancements
1717

articles/app-service/web-sites-monitor.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: btardif
55

66
ms.assetid: d273da4e-07de-48e0-b99d-4020d84a425e
77
ms.topic: article
8-
ms.date: 01/11/2019
8+
ms.date: 04/23/2020
99
ms.author: byvinyal
1010
ms.custom: seodec18
1111

@@ -48,7 +48,7 @@ If an app exceeds the *CPU (short)*, *CPU (Day)*, or *bandwidth* quota, the app
4848

4949
![403 error message][http403]
5050

51-
If the app Memory quota is exceeded, the app is restarted.
51+
If the app Memory quota is exceeded, the app is stopped temporarily.
5252

5353
If the Filesystem quota is exceeded, any write operation fails. Write operation failures include any writes to logs.
5454

@@ -130,8 +130,7 @@ There are two metrics that reflect CPU usage:
130130
**CPU percentage**: Useful for apps hosted in Basic, Standard, and Premium plans, because they can be scaled out. CPU percentage is a good indication of the overall usage across all instances.
131131

132132
## Metrics granularity and retention policy
133-
134-
Metrics for an app and app service plan are logged and aggregated by the service. Metrics are retained for 90 days.
133+
Metrics for an app and app service plan are logged and aggregated by the service and [retained according to these rules](../azure-monitor/platform/data-platform-metrics.md#retention-of-metrics).
135134

136135
## Monitoring quotas and metrics in the Azure portal
137136
To review the status of the various quotas and metrics that affect an app, go to the [Azure portal](https://portal.azure.com).
@@ -164,4 +163,4 @@ For more information about autoscale, see [How to scale](../monitoring-and-diagn
164163
<!-- Images. -->
165164
[http403]: ./media/web-sites-monitor/http403.png
166165
[quotas]: ./media/web-sites-monitor/quotas.png
167-
[metrics]: ./media/web-sites-monitor/metrics.png
166+
[metrics]: ./media/web-sites-monitor/metrics.png

articles/azure-monitor/log-query/logs-structure.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -50,16 +50,17 @@ Unlike a Log Analytics workspace, an Application Insights application has a fixe
5050

5151
| Table | Description |
5252
|:---|:---|
53-
| availabilityResults | Summary data from availability tests. |
54-
| browserTimings | Data about client performance, such as the time taken to process the incoming data. |
55-
| customEvents | Custom events created by your application. |
56-
| customMetrics | Custom metrics created by your application. |
57-
| dependencies | Calls from the application to external components. |
58-
| exceptions | Exceptions thrown by the application runtime. |
59-
| pageViews | Data about each website view with browser information. |
60-
| performanceCounters | Performance measurements from the compute resources supporting the application. |
61-
| requests | Details of each application request. |
62-
| traces | Results from distributed tracing. |
53+
| availabilityResults | Summary data from availability tests.
54+
| browserTimings | Data about client performance, such as the time taken to process the incoming data.
55+
| customEvents | Custom events created by your application.
56+
| customMetrics | Custom metrics created by your application.
57+
| dependencies | Calls from the application to other components (including external components) recorded via TrackDependency() – for example, calls to REST API, database or a file system.
58+
| exceptions | Exceptions thrown by the application runtime, captures both server side and client-side (browsers) exceptions.
59+
| pageViews | Data about each website view with browser information.
60+
| performanceCounters | Performance measurements from the compute resources supporting the application, for example, Windows performance counters.
61+
| requests | Requests received by your application. For example, a separate request record is logged for each HTTP request that your web app receives.
62+
| traces | Detailed logs (traces) emitted through application code/logging frameworks recorded via TrackTrace().
63+
6364

6465
You can view the schema for each table in the **Schema** tab in Log Analytics for the application.
6566

articles/azure-monitor/platform/diagnostic-settings.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: bwren
55
ms.author: bwren
66
services: azure-monitor
77
ms.topic: conceptual
8-
ms.date: 04/15/2020
8+
ms.date: 04/27/2020
99
ms.subservice: logs
1010
---
1111

@@ -26,7 +26,13 @@ Each Azure resource requires its own diagnostic setting, which defines the follo
2626
A single diagnostic setting can define no more than one of each of the destinations. If you want to send data to more than one of a particular destination type (for example, two different Log Analytics workspaces), then create multiple settings. Each resource can have up to 5 diagnostic settings.
2727

2828
> [!NOTE]
29-
> [Platform metrics](metrics-supported.md) are collected automatically to [Azure Monitor Metrics](data-platform-metrics.md). Diagnostic settings can be used to collect metrics for certain Azure services into Azure Monitor Logs for analysis with other monitoring data using [log queries](../log-query/log-query-overview.md).
29+
> [Platform metrics](metrics-supported.md) are collected automatically to [Azure Monitor Metrics](data-platform-metrics.md). Diagnostic settings can be used to collect metrics for certain Azure services into Azure Monitor Logs for analysis with other monitoring data using [log queries](../log-query/log-query-overview.md) with certain limitations.
30+
>
31+
>
32+
> Sending multi-dimensional metrics via diagnostic settings is not currently supported. Metrics with dimensions are exported as flattened single dimensional metrics, aggregated across dimension values. *For example*: The 'IOReadBytes' metric on an Blockchain can be explored and charted on a per node level. However, when exported via diagnostic settings, the metric exported represents as all read bytes for all nodes. In addition, due to internal limitations not all metrics are exportable to Azure Monitor Logs / Log Analytics. For more information, see the [list of exportable metrics](metrics-supported-export-diagnostic-settings.md).
33+
>
34+
>
35+
> To get around these limitations for specific metrics, we suggest you manually extract them using the [Metrics REST API](https://docs.microsoft.com/rest/api/monitor/metrics/list) and import them into Azure Monitor Logs using the [Azure Monitor Data collector API](data-collector-api.md).
3036
3137
## Destinations
3238

@@ -73,9 +79,8 @@ You can configure diagnostic settings in the Azure portal either from the Azure
7379
- **AllMetrics** routes a resource's platform metrics into the Azure Logs store, but in log form. These metrics are usually sent only to the Azure Monitor metrics time-series database. Sending them to the Azure Monitor Logs store (which is searchable via Log Analytics) you to integrate them into queries which search across other logs. This option may not be available for all resource types. When it is supported, [Azure Monitor supported metrics](metrics-supported.md) lists what metrics are collected for what resource types.
7480

7581
> [!NOTE]
76-
> Sending multi-dimensional metrics via diagnostic settings is not currently supported. Metrics with dimensions are exported as flattened single dimensional metrics, aggregated across dimension values.
77-
>
78-
> *For example*: The 'IOReadBytes' metric on an Blockchain can be explored and charted on a per node level. However, when exported via diagnostic settings, the metric exported represents as all read bytes for all nodes.
82+
> See limitatation for routing metrics to Azure Monitor Logs earlier in this article.
83+
7984

8085
- **Logs** lists the different categories available depending on the resource type. Check any categories that you would like to route to a destination.
8186

articles/site-recovery/azure-to-azure-common-questions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -189,11 +189,11 @@ You can replicate 16 virtual machines together in a replication group.
189189
Because multi-VM consistency is CPU intensive, enabling it can affect workload performance. Use multi-VM consistency only if machines are running the same workload and you need consistency across multiple machines. For example, if you have two SQL Server instances and two web servers in an application, you should have multi-VM consistency for the SQL Server instances only.
190190

191191
### Can you add an already replicating VM to a replication group?
192-
193192
You can add a VM to a new replication group while enabling replication. You can also add a VM to an existing replication group while enabling replication. However, you cannot add an already replicating VM to a new replication group or existing replication group.
194-
193+
195194
## Failover
196195

196+
197197
### How is capacity ensured in the target region for Azure VMs?
198198

199199
The Site Recovery team and Azure capacity management team plan for sufficient infrastructure capacity. When you start a failover, the teams also help ensure VM instances that are protected by Site Recovery will deploy to the target region.
Lines changed: 125 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,125 @@
1+
---
2+
title: Enable Zone to Zone Disaster Recovery for Azure Virtual Machines
3+
description: This article describes when and how to use Zone to Zone Disaster Recovery for Azure virtual machines.
4+
author: sideeksh
5+
manager: gaggupta
6+
ms.service: site-recovery
7+
ms.topic: article
8+
ms.date: 04/28/2020
9+
ms.author: sideeksh
10+
11+
---
12+
13+
# Enable Zone to Zone Disaster Recovery for Azure virtual machines
14+
15+
This article describes how to replicate, failover, and failback Azure virtual machines from one Availability Zone to another within the same Azure region.
16+
17+
>[!NOTE]
18+
>
19+
>- Site Recovery currently does not support Recovery Plans for Zone to Zone Disaster Recovery.
20+
>- Support for Zone to Zone disaster recovery is currently limited to two regions: Southeast Asia and UK South.
21+
22+
Site Recovery service contributes to your business continuity and disaster recovery strategy by keeping your business apps up and running, during planned and unplanned outages. It is the recommended Disaster Recovery option to keep your applications up and running if there are regional outages.
23+
24+
Availability Zones are unique physical locations within an Azure region. Each zone has one or more datacenters.
25+
26+
## Using Availability Zones for Disaster Recovery
27+
28+
Typically, Availability Zones are used to deploy VMs in a High Availability configuration. They may be too close to each other to serve as a Disaster Recovery solution in case of natural disaster.
29+
30+
However, in some scenarios, Availability Zones can be leveraged for Disaster Recovery:
31+
32+
- Many customers who had a metro Disaster Recovery strategy while hosting applications on premise sometimes look to mimic this strategy once they migrate applications over to Azure. These customers acknowledge the fact that metro Disaster Recovery strategy may not work in case of a large-scale physical disaster and accept this risk. For such customers, Zone to Zone Disaster Recovery can be used as a Disaster Recovery option.
33+
34+
- Many other customers have complicated networking infrastructure and do not wish to recreate it in a secondary region due to the associated cost and complexity. Zone to Zone Disaster Recovery reduces complexity as it leverages redundant networking concepts across Availability Zones making configuration much simpler. Such customers prefer simplicity and can also use Availability Zones for Disaster Recovery.
35+
36+
- In some regions that do not have a paired region within the same legal jurisdiction (for example, Southeast Asia), Zone to Zone Disaster Recovery can serve as the de-facto Disaster Recovery solution as it helps ensure legal compliance, since your applications and data do not cross national boundaries.
37+
38+
- Zone to Zone Disaster Recovery implies replication of data across shorter distances when compared with Azure to Azure Disaster Recovery and therefore, you may see lower latency and consequently lower RPO.
39+
40+
While these are strong advantages, there is a possibility that Zone to Zone Disaster Recovery may fall short of resilience requirements in the event of a region-wide natural disaster.
41+
42+
## Networking for Zone to Zone Disaster Recovery
43+
44+
As mentioned above, Zone to Zone Disaster Recovery reduces complexity as it leverages redundant networking concepts across Availability Zones making configuration much simpler. The behavior of networking components in the Zone to Zone Disaster Recovery scenario is outlined below:
45+
46+
- Virtual Network: You may use the same virtual network as the source network for actual failovers. Use a different virtual network to the source virtual network for test failovers.
47+
48+
- Subnet: Failover into the same subnet is supported.
49+
50+
- Private IP address: If you are using static IP addresses, you can use the same IPs in the target zone if you choose to configure them in such a manner.
51+
52+
- Accelerated Networking: Similar to Azure to Azure Disaster Recovery, you may enable Accelerated Networking if the VM SKU supports it.
53+
54+
- Public IP address: You can attach a previously created standard public IP address in the same region to the target VM. Basic public IP addresses do not support Availability Zone related scenarios.
55+
56+
- Load balancer: Standard load balancer is a regional resource and therefore the target VM can be attached to the backend pool of the same load balancer. A new load balancer is not required.
57+
58+
- Network Security Group: You may use the same network security groups as applied to the source VM.
59+
60+
## Pre-requisites
61+
62+
Before deploying Zone to Zone Disaster Recovery for your VMs, it is important to ensure that other features enabled on the VM are interoperable with zone to zone disaster recovery.
63+
64+
|Feature | Support statement |
65+
|---------|---------|
66+
|Classic VMs | Not supported |
67+
|ARM VMs | Supported |
68+
|Azure Disk Encryption v1 (dual pass, with AAD) | Supported |
69+
|Azure Disk Encryption v2 (single pass, without AAD) | Supported |
70+
|Unmanaged disks | Not supported |
71+
|Managed disks | Supported |
72+
|Customer managed keys | Supported |
73+
|Proximity placement groups | Supported |
74+
|Backup interoperability | File level backup and restore are supported. Disk and VM level backup and restore and not supported. |
75+
|Hot add/remove | Disks can be added after enabling zone to zone replication. Removal of disks after enabling zone to zone replication is not supported. |
76+
77+
## Set up Site Recovery Zone to Zone Disaster Recovery
78+
79+
### Log in
80+
81+
Login to the Azure portal.
82+
83+
### Enable replication for the zonal Azure virtual machine
84+
85+
1. On the Azure portal menu, select Virtual machines, or search for and select Virtual machines on any page. Select the VM you want to replicate. For zone to zone disaster recovery, this VM must already be in an availability zone.
86+
87+
2. In Operations, select Disaster recovery.
88+
89+
3. As shown below, in the Basics tab, select ‘Yes’ for ‘Disaster Recovery between Availability Zones?’
90+
91+
![Basic Settings page](./media/azure-to-azure-how-to-enable-zone-to-zone-disaster-recovery/zonal-disaster-recovery-basic-settings-blade.png)
92+
93+
4. If you accept all defaults, click ‘Review + Start replication’ followed by ‘Start replication’.
94+
95+
5. If you want to make changes to the replication settings, click on ‘Next: Advanced settings’.
96+
97+
6. Change the settings away from default wherever appropriate. For users of Azure to Azure Disaster Recovery, this page might seem familiar. More details on the options presented on this blade can be found [here](https://docs.microsoft.com/azure/site-recovery/azure-to-azure-tutorial-enable-replication)
98+
99+
![Advanced Settings page](./media/azure-to-azure-how-to-enable-zone-to-zone-disaster-recovery/zonal-disaster-recovery-advanced-settings-blade.png)
100+
101+
7. Click on ‘Next: Review + Start replication’ and then ‘Start replication’.
102+
103+
## FAQs
104+
105+
1. How does pricing work for Zone to Zone Disaster Recovery?
106+
Pricing for Zone to Zone Disaster Recovery is identical to the pricing of Azure to Azure Disaster Recovery. You can find more details on the pricing page [here](https://azure.microsoft.com/pricing/details/site-recovery/) and [here](https://azure.microsoft.com/blog/know-exactly-how-much-it-will-cost-for-enabling-dr-to-your-azure-vm/). Note that the egress charges that you would see in zone to zone disaster recovery would be lower than region to region disaster recovery.
107+
108+
2. What is the SLA for RTO and RPO?
109+
The RTO SLA is the same as that for Site Recovery overall. We promise RTO <= 2 hours. There is no defined SLA for RPO.
110+
111+
3. Is capacity guaranteed in the secondary zone?
112+
The Site Recovery team and Azure capacity management team plan for sufficient infrastructure capacity. When you start a failover, the teams also help ensure VM instances that are protected by Site Recovery will deploy to the target zone.
113+
114+
4. Which operating systems are supported?
115+
Zone to Zone Disaster Recovery supports the same operating systems as Azure to Azure Disaster Recovery. Refer to the support matrix [here](https://docs.microsoft.com/azure/site-recovery/azure-to-azure-support-matrix).
116+
117+
## Next steps
118+
119+
The steps that need to be followed to run a Disaster Recovery drill, fail over, re-protect, and failback are the same as the steps in Azure to Azure Disaster Recovery scenario.
120+
121+
To perform a Disaster Recovery drill, please follow the steps outlined [here](https://docs.microsoft.com/azure/site-recovery/azure-to-azure-tutorial-dr-drill).
122+
123+
To perform a fail over and re-protect VMs in the secondary zone, follow the steps outlined [here](https://docs.microsoft.com/azure/site-recovery/azure-to-azure-tutorial-failover-failback).
124+
125+
To failback to the primary zone, follow the steps outlined [here](https://docs.microsoft.com/azure/site-recovery/azure-to-azure-tutorial-failback).

articles/site-recovery/azure-to-azure-how-to-reprotect.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,10 @@ When the VM is re-protected after failing back to the primary region (i.e., if t
9393

9494
When the VM is re-protected from the DR region to the primary region, we do not delete the erstwhile primary VM and associated NIC(s).
9595

96+
When the VM is re-protected after failing back to the primary region (i.e., if the VM is re-protected from primary region to DR region), the target VM and associated NIC(s) are deleted.
97+
98+
When the VM is re-protected from the DR region to the primary region, we do not delete the erstwhile primary VM and associated NIC(s).
99+
96100
## Next steps
97101

98102
After the VM is protected, you can initiate a failover. The failover shuts down the VM in the secondary region and creates and boots the VM in the primary region, with brief downtime during this process. We recommend you choose an appropriate time for this process and that you run a test failover before initiating a full failover to the primary site. [Learn more](site-recovery-failover.md) about Azure Site Recovery failover.

articles/site-recovery/azure-to-azure-troubleshoot-errors.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -168,8 +168,6 @@ Because SUSE Linux uses symbolic links, or symlinks, to maintain a certificate l
168168

169169
For Site Recovery replication to work, outbound connectivity to specific URLs is required from the VM. If your VM is behind a firewall or uses network security group (NSG) rules to control outbound connectivity, you might face one of these issues. While we continue to support outbound access via URLs, using an allow list of IP ranges is no longer supported.
170170

171-
### Issue 1: Failed to register Azure VM with Site Recovery (151195)
172-
173171
#### Possible causes
174172

175173
- A connection can't be established to Site Recovery endpoints because of a Domain Name System (DNS) resolution failure.
Loading
Loading

0 commit comments

Comments
 (0)