Skip to content

Commit 35f1315

Browse files
authored
Merge pull request #107600 from mayurigupta13/master
two new service tags and DP internet access
2 parents 69278ab + d763f52 commit 35f1315

5 files changed

+18
-8
lines changed

articles/site-recovery/azure-to-azure-about-networking.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: sujayt
66
manager: rochakm
77
ms.service: site-recovery
88
ms.topic: article
9-
ms.date: 1/23/2020
9+
ms.date: 3/13/2020
1010
ms.author: sutalasi
1111

1212
---
@@ -47,6 +47,8 @@ If you are using a URL-based firewall proxy to control outbound connectivity, al
4747
login.microsoftonline.com | Required for authorization and authentication to the Site Recovery service URLs.
4848
*.hypervrecoverymanager.windowsazure.com | Required so that the Site Recovery service communication can occur from the VM.
4949
*.servicebus.windows.net | Required so that the Site Recovery monitoring and diagnostics data can be written from the VM.
50+
*.vault.azure.net | Allows access to enable replication for ADE-enabled virtual machines via portal
51+
*.automation.ext.azure.com | Allows enabling auto-upgrade of mobility agent for a replicated item via portal
5052

5153
## Outbound connectivity for IP address ranges
5254

@@ -58,6 +60,8 @@ If you are using an NSG to control outbound connectivity, these service tags nee
5860
- Create a [Azure Active Directory (AAD) service tag](../virtual-network/security-overview.md#service-tags) based NSG rule for allowing access to all IP addresses corresponding to AAD
5961
- Create an EventsHub service tag based NSG rule for the target region, allowing access to Site Recovery monitoring.
6062
- Create an AzureSiteRecovery service tag based NSG rule for allowing access to Site Recovery service in any region.
63+
- Create an AzureKeyVault service tag based NSG rule. This is required only for enabling replication of ADE-enabled virtual machines via portal.
64+
- Create a GuestAndHybridManagement service tag based NSG rule. This is required only for enabling auto-upgrade of mobility agent for a replicated item via portal.
6165
- We recommend that you create the required NSG rules on a test NSG, and verify that there are no problems before you create the rules on a production NSG.
6266

6367
## Example NSG configuration

articles/site-recovery/azure-to-azure-architecture.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: rayne-wiselman
66
manager: carmonm
77
ms.service: site-recovery
88
ms.topic: conceptual
9-
ms.date: 1/23/2020
9+
ms.date: 3/13/2020
1010
ms.author: raynew
1111
---
1212

@@ -131,6 +131,8 @@ If outbound access for VMs is controlled with URLs, allow these URLs.
131131
| login.microsoftonline.com | Provides authorization and authentication to Site Recovery service URLs. |
132132
| *.hypervrecoverymanager.windowsazure.com | Allows the VM to communicate with the Site Recovery service. |
133133
| *.servicebus.windows.net | Allows the VM to write Site Recovery monitoring and diagnostics data. |
134+
| *.vault.azure.net | Allows access to enable replication for ADE-enabled virtual machines via portal
135+
| *.automation.ext.azure.com | Allows enabling auto-upgrade of mobility agent for a replicated item via portal
134136

135137
### Outbound connectivity for IP address ranges
136138

@@ -145,6 +147,8 @@ Allow HTTPS outbound: port 443 | Allow ranges that correspond to storage account
145147
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Active Directory (Azure AD) | AzureActiveDirectory
146148
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Events Hub in the target region. | EventsHub.\<region-name>
147149
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Site Recovery | AzureSiteRecovery
150+
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Key Vault (This is required only for enabling replication of ADE-enabled virtual machines via portal) | AzureKeyVault
151+
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Automation Controller (This is required only for enabling auto-upgrade of mobility agent for a replicated item via portal) | GuestAndHybridManagement
148152

149153
#### Target region rules
150154

@@ -154,6 +158,8 @@ Allow HTTPS outbound: port 443 | Allow ranges that correspond to storage account
154158
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure AD | AzureActiveDirectory
155159
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Events Hub in the source region. | EventsHub.\<region-name>
156160
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Site Recovery | AzureSiteRecovery
161+
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Key Vault (This is required only for enabling replication of ADE-enabled virtual machines via portal) | AzureKeyVault
162+
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Automation Controller (This is required only for enabling auto-upgrade of mobility agent for a replicated item via portal) | GuestAndHybridManagement
157163

158164

159165
#### Control access with NSG rules

articles/site-recovery/hyper-v-deployment-planner-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: mayurigupta13
55
manager: rochakm
66
ms.service: site-recovery
77
ms.topic: conceptual
8-
ms.date: 7/29/2019
8+
ms.date: 3/13/2020
99
ms.author: mayg
1010

1111
---
@@ -79,7 +79,7 @@ The tool has three main phases for Hyper-V: get VM list, profiling, and report g
7979

8080
| Server requirement | Description |
8181
|---|---|
82-
|Get VM list, profiling, and throughput measurement |<ul><li>Operating system: Microsoft Windows Server 2016 or Microsoft Windows Server 2012 R2 </li><li>Machine configuration: 8 vCPUs, 16 GB RAM, 300 GB HDD</li><li>[Microsoft .NET Framework 4.5](https://aka.ms/dotnet-framework-45)</li><li>[Microsoft Visual C++ Redistributable for Visual Studio 2012](https://aka.ms/vcplusplus-redistributable)</li><li>Internet access to Azure from this server</li><li>Azure storage account</li><li>Administrator access on the server</li><li>Minimum 100 GB of free disk space (assuming 1000 VMs with an average of three disks each, profiled for 30 days)</li><li>The VM from where you are running the Azure Site Recovery deployment planner tool must be added to TrustedHosts list of all the Hyper-V servers.</li><li>All Hyper-V servers to be profiled must be added to TrustedHosts list of the client VM from where the tool is being run. [Learn more to add servers into TrustedHosts list](#steps-to-add-servers-into-trustedhosts-list). </li><li> The tool should be run from Administrative privileges from PowerShell or command-line console on the client</ul></ul>|
82+
|Get VM list, profiling, and throughput measurement |<ul><li>Operating system: Microsoft Windows Server 2016 or Microsoft Windows Server 2012 R2 </li><li>Machine configuration: 8 vCPUs, 16 GB RAM, 300 GB HDD</li><li>[Microsoft .NET Framework 4.5](https://aka.ms/dotnet-framework-45)</li><li>[Microsoft Visual C++ Redistributable for Visual Studio 2012](https://aka.ms/vcplusplus-redistributable)</li><li>Internet access to Azure (*.blob.core.windows.net) from this server, port 443<br>[This is optional. You can choose to provide the available bandwidth during Report Generation manually.]</li><li>Azure storage account</li><li>Administrator access on the server</li><li>Minimum 100 GB of free disk space (assuming 1000 VMs with an average of three disks each, profiled for 30 days)</li><li>The VM from where you are running the Azure Site Recovery deployment planner tool must be added to TrustedHosts list of all the Hyper-V servers.</li><li>All Hyper-V servers to be profiled must be added to TrustedHosts list of the client VM from where the tool is being run. [Learn more to add servers into TrustedHosts list](#steps-to-add-servers-into-trustedhosts-list). </li><li> The tool should be run from Administrative privileges from PowerShell or command-line console on the client</ul></ul>|
8383
| Report generation | A Windows PC or Windows Server with Microsoft Excel 2013 or later |
8484
| User permissions | Administrator account to access Hyper-V cluster/Hyper-V host during get VM list and profiling operations.<br>All the hosts that need to be profiled should have a domain administrator account with the same credentials i.e. user name and password
8585
|

articles/site-recovery/site-recovery-deployment-planner.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: mayurigupta13
55
manager: rochakm
66
ms.service: site-recovery
77
ms.topic: conceptual
8-
ms.date: 07/29/2019
8+
ms.date: 03/13/2020
99
ms.author: mayg
1010
---
1111

@@ -72,7 +72,7 @@ The tool has two main phases: profiling and report generation. There is also a t
7272

7373
| Server requirement | Description|
7474
|---|---|
75-
|Profiling and throughput measurement| <ul><li>Operating system: Windows Server 2016 or Windows Server 2012 R2<br>(ideally matching at least the [size recommendations for the configuration server](https://aka.ms/asr-v2a-on-prem-components))</li><li>Machine configuration: 8 vCPUs, 16 GB RAM, 300 GB HDD</li><li>[.NET Framework 4.5](https://aka.ms/dotnet-framework-45)</li><li>[VMware vSphere PowerCLI 6.0 R3](https://aka.ms/download_powercli)</li><li>[Visual C++ Redistributable for Visual Studio 2012](https://aka.ms/vcplusplus-redistributable)</li><li>Internet access to Azure from this server</li><li>Azure storage account</li><li>Administrator access on the server</li><li>Minimum 100 GB of free disk space (assuming 1,000 VMs with an average of three disks each, profiled for 30 days)</li><li>VMware vCenter statistics level settings can be 1 or higher level</li><li>Allow vCenter port (default 443): Site Recovery Deployment Planner uses this port to connect to the vCenter server/ESXi host</ul></ul>|
75+
|Profiling and throughput measurement| <ul><li>Operating system: Windows Server 2016 or Windows Server 2012 R2<br>(ideally matching at least the [size recommendations for the configuration server](https://aka.ms/asr-v2a-on-prem-components))</li><li>Machine configuration: 8 vCPUs, 16 GB RAM, 300 GB HDD</li><li>[.NET Framework 4.5](https://aka.ms/dotnet-framework-45)</li><li>[VMware vSphere PowerCLI 6.0 R3](https://aka.ms/download_powercli)</li><li>[Visual C++ Redistributable for Visual Studio 2012](https://aka.ms/vcplusplus-redistributable)</li><li>Internet access to Azure (*.blob.core.windows.net) from this server, port 443<br>[This is optional. You can choose to provide the available bandwidth during Report Generation manually.]</li><li>Azure storage account</li><li>Administrator access on the server</li><li>Minimum 100 GB of free disk space (assuming 1,000 VMs with an average of three disks each, profiled for 30 days)</li><li>VMware vCenter statistics level settings can be 1 or higher level</li><li>Allow vCenter port (default 443): Site Recovery Deployment Planner uses this port to connect to the vCenter server/ESXi host</ul></ul>|
7676
| Report generation | A Windows PC or Windows Server with Excel 2013 or later.<li>[.NET Framework 4.5](https://aka.ms/dotnet-framework-45)</li><li>[Visual C++ Redistributable for Visual Studio 2012](https://aka.ms/vcplusplus-redistributable)</li><li>[VMware vSphere PowerCLI 6.0 R3](https://aka.ms/download_powercli) is required only when you pass -User option in the report generation command to fetch the latest VM configuration information of the VMs. The Deployment Planner connects to vCenter server. Allow vCenter port (default 443) port to connect to vCenter server.</li>|
7777
| User permissions | Read-only permission for the user account that's used to access the VMware vCenter server/VMware vSphere ESXi host during profiling |
7878

articles/site-recovery/vmware-physical-azure-support-matrix.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Support matrix for VMware/physical disaster recovery in Azure Site Recove
33
description: Summarizes support for disaster recovery of VMware VMs and physical server to Azure using Azure Site Recovery.
44
ms.service: site-recovery
55
ms.topic: conceptual
6-
ms.date: 1/21/2020
6+
ms.date: 2/24/2020
77
ms.author: raynew
88

99
---
@@ -130,7 +130,7 @@ SUSE Linux Enterprise Server 15 and 15 SP1 | 9.32 | All [stock SUSE 15 and 15 ke
130130

131131
**Component** | **Supported**
132132
--- | ---
133-
File systems | ext3, ext4, XFS
133+
File systems | ext3, ext4, XFS, BTRFS (conditions applicable as per this table)
134134
Volume manager | - LVM is supported.<br/> - /boot on LVM is supported from [Update Rollup 31](https://support.microsoft.com/help/4478871/) (version 9.20 of the Mobility service) onwards. It isn't supported in earlier Mobility service versions.<br/> - Multiple OS disks aren't supported.
135135
Paravirtualized storage devices | Devices exported by paravirtualized drivers aren't supported.
136136
Multi-queue block IO devices | Not supported.

0 commit comments

Comments
 (0)