Skip to content

Commit 31236bc

Browse files
committed
edit
1 parent 436a019 commit 31236bc

File tree

1 file changed

+17
-17
lines changed

1 file changed

+17
-17
lines changed

articles/reliability/reliability-event-hubs.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -61,16 +61,15 @@ Need Info. Any pricing considerations when using availability zones?
6161

6262
[!INCLUDE [introduction to disaster recovery](includes/reliability-disaster-recovery-description-include.md)]
6363

64-
The all-active Azure Event Hubs cluster model with availability zone support provides resiliency against hardware and datacenter outages. However, in the case of a disaster where an entire region and all its zones are unavailable for a period of time, you can use Geo-disaster recovery to recover your workload and application configuration.
64+
The all-active Azure Event Hubs cluster model with availability zone support provides resiliency against hardware and datacenter outages. However, if a disaster where an entire region and all zones are unavailable , you can use Geo-disaster recovery to recover your workload and application configuration.
6565

6666
Geo-Disaster recovery ensures that the entire configuration of a namespace (Event Hubs, Consumer Groups, and settings) is continuously replicated from a primary namespace to a secondary namespace when paired.
67+
The Geo-disaster recovery feature of Azure Event Hubs is a disaster recovery solution. The concepts and workflow described in this article apply to disaster scenarios, and not to temporary outages. For a detailed discussion of disaster recovery in Microsoft Azure, see [this article](/azure/architecture/resiliency/disaster-recovery-azure-applications).
6768

68-
The Geo-disaster recovery feature of Azure Event Hubs is a disaster recovery solution. The concepts and workflow described in this article apply to disaster scenarios, and not to transient, or temporary outages.For a detailed discussion of disaster recovery in Microsoft Azure, see [this article](/azure/architecture/resiliency/disaster-recovery-azure-applications).
69-
70-
With Geo-Disaster recovery, you can initiate a once-only failover move from the primary to the secondary at any time. The failover move re-points the chosen alias name for the namespace to the secondary namespace. After the move, the pairing is then removed. The failover is nearly instantaneous once initiated.
69+
With Geo-Disaster recovery, you can initiate a once-only failover move from the primary to the secondary at any time. The failover move points the chosen alias name for the namespace to the secondary namespace. After the move, the pairing is then removed. The failover is nearly instantaneous once initiated.
7170

7271
> [!IMPORTANT]
73-
> - Geo-Disaster recovery **does not replicate the event data**. In learn how to recover event data from the primary Event Hub after the downed region is restored, see [replication guidance](../event-hubs/event-hubs-federation-overview.md)
72+
> - Geo-Disaster recovery **doesn't replicate the event data**. In learn how to recover event data from the primary Event Hub after the downed region is restored, see [replication guidance](../event-hubs/event-hubs-federation-overview.md)
7473
> - Microsoft Entra role-based access control (RBAC) assignments to entities in the primary namespace aren't replicated to the secondary namespace. You'll need to create role assignments manually in the secondary namespace to secure access to them.
7574
7675

@@ -94,21 +93,22 @@ This section provides more considerations when using Geo-disaster recovery with
9493

9594

9695
### New pairings
97-
If you try to create a pairing between a primary namespace with a private endpoint and a secondary namespace without a private endpoint, the pairing will fail. The pairing will succeed only if both primary and secondary namespaces have private endpoints. We recommend that you use same configurations on the primary and secondary namespaces and on virtual networks in which private endpoints are created.
96+
If you try to create a pairing between a primary namespace with a private endpoint and a secondary namespace without a private endpoint, the pairing fails. The pairing succeeds only if both primary and secondary namespaces have private endpoints. We recommend that you use same configurations on the primary and secondary namespaces and on virtual networks in which private endpoints are created.
9897

9998
> [!NOTE]
100-
> When you try to pair the primary namespace with private endpoint and a secondary namespace, the validation process only checks whether a private endpoint exists on the secondary namespace. It doesn't check whether the endpoint works or will work after failover. It's your responsibility to ensure that the secondary namespace with private endpoint will work as expected after failover.
99+
> When you try to pair the primary namespace with private endpoint and a secondary namespace, the validation process only checks whether a private endpoint exists on the secondary namespace. It doesn't check whether the endpoint works after failover. It's your responsibility to ensure that the secondary namespace with private endpoint work as expected after failover.
101100
>
102101
> To test that the private endpoint configurations are same on primary and secondary namespaces, send a read request (for example: [Get Event Hub](/rest/api/eventhub/get-event-hub)) to the secondary namespace from outside the virtual network, and verify that you receive an error message from the service.
103102
104103
### Existing pairings
105-
If pairing between primary and secondary namespace already exists, private endpoint creation on the primary namespace will fail. To resolve, create a private endpoint on the secondary namespace first and then create one for the primary namespace.
104+
If pairing between primary and secondary namespace already exists, private endpoint creation on the primary namespace fails. To resolve, create a private endpoint on the secondary namespace first and then create one for the primary namespace.
106105

107106
> [!NOTE]
108107
> While we allow read-only access to the secondary namespace, updates to the private endpoint configurations are permitted.
109108
110109
### Recommended configuration
111-
When creating a disaster recovery configuration for your application and Event Hubs namespaces, you must create private endpoints for both primary and secondary Event Hubs namespaces against virtual networks hosting both primary and secondary instances of your application.
110+
111+
You must create private endpoints for both primary and secondary Event Hubs namespaces against the virtual networks that host both of those instances of your application.
112112

113113
Let's say you have two virtual networks: VNET-1, VNET-2 and these primary and secondary namespaces: EventHubs-Namespace1-Primary, EventHubs-Namespace2-Secondary. You need to do the following steps:
114114

@@ -119,16 +119,16 @@ Let's say you have two virtual networks: VNET-1, VNET-2 and these primary and se
119119

120120
Advantage of this approach is that failover can happen at the application layer independent of Event Hubs namespace. Consider the following scenarios:
121121

122-
**Application-only failover:** Here, the application won't exist in VNET-1 but will move to VNET-2. As both private endpoints are configured on both VNET-1 and VNET-2 for both primary and secondary namespaces, the application will just work.
122+
**Application-only failover:** The application doesn't exist in VNET-1 but moves to VNET-2. The application works because both private endpoints are configured on both VNET-1 and VNET-2 for both primary and secondary namespaces.
123123

124-
**Event Hubs namespace-only failover**: Here again, since both private endpoints are configured on both virtual networks for both primary and secondary namespaces, the application will just work.
124+
**Event Hubs namespace-only failover**: The application works because both private endpoints are configured on both virtual networks for both primary and secondary namespaces.
125125

126126
> [!NOTE]
127127
> For guidance on geo-disaster recovery of a virtual network, see [Virtual Network - Business Continuity](../virtual-network/virtual-network-disaster-recovery-guidance.md).
128128
129129

130130
## Role-based access control
131-
Microsoft Entra role-based access control (RBAC) assignments to entities in the primary namespace aren't replicated to the secondary namespace. Create role assignments manually in the secondary namespace to secure access to them.
131+
Microsoft Entra role-based access control (RBAC) assignments to entities in the primary namespace aren't replicated to the secondary namespace. To secure access to role assignments, create them manually in the secondary namespace.
132132

133133
## Supported namespace pairs
134134
The following combinations of primary and secondary namespaces are supported:
@@ -174,7 +174,7 @@ You first create or use an existing primary namespace, and a new secondary names
174174
1. Manually fail over to the secondary namespace. Select **Failover** on the toolbar.
175175

176176
> [!WARNING]
177-
> Failing over will activate the secondary namespace and remove the primary namespace from the Geo-Disaster Recovery pairing. Create another namespace to have a new geo-disaster recovery pair.
177+
> Failing over activates the secondary namespace and remove the primary namespace from the Geo-Disaster Recovery pairing. Create another namespace to have a new geo-disaster recovery pair.
178178
179179
Finally, you should add some monitoring to detect if a failover is necessary. In most cases, the service is one part of a large ecosystem, thus automatic failovers are rarely possible, as often failovers must be performed in sync with the remaining subsystem or infrastructure.
180180

@@ -207,7 +207,7 @@ This section shows how to manually fail over using Azure portal, CLI, PowerShell
207207
1. Manually fail over to the secondary namespace. Select **Failover** on the toolbar.
208208

209209
> [!WARNING]
210-
> Failing over will activate the secondary namespace and remove the primary namespace from the Geo-Disaster Recovery pairing. Create another namespace to have a new geo-disaster recovery pair.
210+
> Failing over activates the secondary namespace and remove the primary namespace from the Geo-Disaster Recovery pairing. Create another namespace to have a new geo-disaster recovery pair.
211211
212212
# [Azure CLI](#tab/cli)
213213
Use the [az eventhubs georecovery-alias fail-over](/cli/azure/eventhubs/georecovery-alias#az-eventhubs-georecovery-alias-fail-over) command.
@@ -230,23 +230,23 @@ If you made a mistake; for example, you paired the wrong regions during the init
230230

231231
Note the following considerations to keep in mind:
232232

233-
1. By design, Event Hubs geo-disaster recovery does not replicate data, and therefore you cannot reuse the old offset value of your primary event hub on your secondary event hub. We recommend restarting your event receiver with one of the following methods:
233+
1. By design, Event Hubs geo-disaster recovery doesn't replicate data, and therefore you can't reuse the old offset value of your primary event hub on your secondary event hub. We recommend restarting your event receiver with one of the following methods:
234234

235235
- *EventPosition.FromStart()* - If you wish read all data on your secondary event hub.
236236
- *EventPosition.FromEnd()* - If you wish to read all new data from the time of connection to your secondary event hub.
237237
- *EventPosition.FromEnqueuedTime(dateTime)* - If you wish to read all data received in your secondary event hub starting from a given date and time.
238238

239239
2. In your failover planning, you should also consider the time factor. For example, if you lose connectivity for longer than 15 to 20 minutes, you might decide to initiate the failover.
240240

241-
3. The fact that no data is replicated means that current active sessions aren't replicated. Additionally, duplicate detection and scheduled messages may not work. New sessions, scheduled messages, and new duplicates will work.
241+
3. The fact that no data is replicated means that current active sessions aren't replicated. Additionally, duplicate detection and scheduled messages may not work. New sessions, scheduled messages, and new duplicates work.
242242

243243
4. Failing over a complex distributed infrastructure should be [rehearsed](/azure/architecture/reliability/disaster-recovery#disaster-recovery-plan) at least once.
244244

245245
5. Synchronizing entities can take some time, approximately 50-100 entities per minute.
246246

247247
6. Some aspects of the management plane for the secondary namespace become read-only while geo-recovery pairing is active.
248248

249-
7. The data plane of the secondary namespace will be read-only while geo-recovery pairing is active. The data plane of the secondary namespace will accept GET requests to enable validation of client connectivity and access controls.
249+
7. The data plane of the secondary namespace is read-only while geo-recovery pairing is active. The data plane of the secondary namespace accepts GET requests to enable validation of client connectivity and access controls.
250250

251251

252252
## Next steps

0 commit comments

Comments
 (0)