You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/site-recovery/azure-to-azure-about-networking.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: sujayt
6
6
manager: rochakm
7
7
ms.service: site-recovery
8
8
ms.topic: article
9
-
ms.date: 1/23/2020
9
+
ms.date: 3/13/2020
10
10
ms.author: sutalasi
11
11
12
12
---
@@ -47,6 +47,8 @@ If you are using a URL-based firewall proxy to control outbound connectivity, al
47
47
login.microsoftonline.com | Required for authorization and authentication to the Site Recovery service URLs.
48
48
*.hypervrecoverymanager.windowsazure.com | Required so that the Site Recovery service communication can occur from the VM.
49
49
*.servicebus.windows.net | Required so that the Site Recovery monitoring and diagnostics data can be written from the VM.
50
+
*.vault.azure.net | Allows access to enable replication for ADE-enabled virtual machines via portal
51
+
*.automation.ext.azure.com | Allows enabling auto-upgrade of mobility agent for a replicated item via portal
50
52
51
53
## Outbound connectivity for IP address ranges
52
54
@@ -58,6 +60,8 @@ If you are using an NSG to control outbound connectivity, these service tags nee
58
60
- Create a [Azure Active Directory (AAD) service tag](../virtual-network/security-overview.md#service-tags) based NSG rule for allowing access to all IP addresses corresponding to AAD
59
61
- Create an EventsHub service tag based NSG rule for the target region, allowing access to Site Recovery monitoring.
60
62
- Create an AzureSiteRecovery service tag based NSG rule for allowing access to Site Recovery service in any region.
63
+
- Create an AzureKeyVault service tag based NSG rule for enabling replication of ADE-enabled virtual machines via portal (if required)
64
+
- Create a GuestAndHybridManagement service tag based NSG rule for enabling auto-upgrade of mobility agent for a replicated item via portal (if required)
61
65
- We recommend that you create the required NSG rules on a test NSG, and verify that there are no problems before you create the rules on a production NSG.
Copy file name to clipboardExpand all lines: articles/site-recovery/azure-to-azure-architecture.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: rayne-wiselman
6
6
manager: carmonm
7
7
ms.service: site-recovery
8
8
ms.topic: conceptual
9
-
ms.date: 1/23/2020
9
+
ms.date: 3/13/2020
10
10
ms.author: raynew
11
11
---
12
12
@@ -131,6 +131,8 @@ If outbound access for VMs is controlled with URLs, allow these URLs.
131
131
| login.microsoftonline.com | Provides authorization and authentication to Site Recovery service URLs. |
132
132
|*.hypervrecoverymanager.windowsazure.com | Allows the VM to communicate with the Site Recovery service. |
133
133
|*.servicebus.windows.net | Allows the VM to write Site Recovery monitoring and diagnostics data. |
134
+
| *.vault.azure.net | Allows access to enable replication for ADE-enabled virtual machines via portal
135
+
| *.automation.ext.azure.com | Allows enabling auto-upgrade of mobility agent for a replicated item via portal
134
136
135
137
### Outbound connectivity for IP address ranges
136
138
@@ -145,6 +147,8 @@ Allow HTTPS outbound: port 443 | Allow ranges that correspond to storage account
145
147
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Active Directory (Azure AD) | AzureActiveDirectory
146
148
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Events Hub in the target region. | EventsHub.\<region-name>
147
149
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Site Recovery | AzureSiteRecovery
150
+
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Key Vault (This is required only for enabling replication of ADE-enabled virtual machines via portal) | AzureKeyVault
151
+
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Automation Controller (This is required only for enabling auto-upgrade of mobility agent for a replicated item via portal) | GuestAndHybridManagement
148
152
149
153
#### Target region rules
150
154
@@ -154,6 +158,8 @@ Allow HTTPS outbound: port 443 | Allow ranges that correspond to storage account
154
158
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure AD | AzureActiveDirectory
155
159
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Events Hub in the source region. | EventsHub.\<region-name>
156
160
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Site Recovery | AzureSiteRecovery
161
+
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Key Vault (This is required only for enabling replication of ADE-enabled virtual machines via portal) | AzureKeyVault
162
+
Allow HTTPS outbound: port 443 | Allow ranges that correspond to Azure Automation Controller (This is required only for enabling auto-upgrade of mobility agent for a replicated item via portal) | GuestAndHybridManagement
Copy file name to clipboardExpand all lines: articles/site-recovery/hyper-v-deployment-planner-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: mayurigupta13
5
5
manager: rochakm
6
6
ms.service: site-recovery
7
7
ms.topic: conceptual
8
-
ms.date: 7/29/2019
8
+
ms.date: 3/13/2020
9
9
ms.author: mayg
10
10
11
11
---
@@ -79,7 +79,7 @@ The tool has three main phases for Hyper-V: get VM list, profiling, and report g
79
79
80
80
| Server requirement | Description |
81
81
|---|---|
82
-
|Get VM list, profiling, and throughput measurement |<ul><li>Operating system: Microsoft Windows Server 2016 or Microsoft Windows Server 2012 R2 </li><li>Machine configuration: 8 vCPUs, 16 GB RAM, 300 GB HDD</li><li>[Microsoft .NET Framework 4.5](https://aka.ms/dotnet-framework-45)</li><li>[Microsoft Visual C++ Redistributable for Visual Studio 2012](https://aka.ms/vcplusplus-redistributable)</li><li>Internet access to Azure from this server</li><li>Azure storage account</li><li>Administrator access on the server</li><li>Minimum 100 GB of free disk space (assuming 1000 VMs with an average of three disks each, profiled for 30 days)</li><li>The VM from where you are running the Azure Site Recovery deployment planner tool must be added to TrustedHosts list of all the Hyper-V servers.</li><li>All Hyper-V servers to be profiled must be added to TrustedHosts list of the client VM from where the tool is being run. [Learn more to add servers into TrustedHosts list](#steps-to-add-servers-into-trustedhosts-list). </li><li> The tool should be run from Administrative privileges from PowerShell or command-line console on the client</ul></ul>|
82
+
|Get VM list, profiling, and throughput measurement |<ul><li>Operating system: Microsoft Windows Server 2016 or Microsoft Windows Server 2012 R2 </li><li>Machine configuration: 8 vCPUs, 16 GB RAM, 300 GB HDD</li><li>[Microsoft .NET Framework 4.5](https://aka.ms/dotnet-framework-45)</li><li>[Microsoft Visual C++ Redistributable for Visual Studio 2012](https://aka.ms/vcplusplus-redistributable)</li><li>Internet access to Azure (*.blob.core.windows.net) from this server, port 443<br>[This is optional. You can choose to provide the available bandwidth during Report Generation manually.]</li><li>Azure storage account</li><li>Administrator access on the server</li><li>Minimum 100 GB of free disk space (assuming 1000 VMs with an average of three disks each, profiled for 30 days)</li><li>The VM from where you are running the Azure Site Recovery deployment planner tool must be added to TrustedHosts list of all the Hyper-V servers.</li><li>All Hyper-V servers to be profiled must be added to TrustedHosts list of the client VM from where the tool is being run. [Learn more to add servers into TrustedHosts list](#steps-to-add-servers-into-trustedhosts-list). </li><li> The tool should be run from Administrative privileges from PowerShell or command-line console on the client</ul></ul>|
83
83
| Report generation | A Windows PC or Windows Server with Microsoft Excel 2013 or later |
84
84
| User permissions | Administrator account to access Hyper-V cluster/Hyper-V host during get VM list and profiling operations.<br>All the hosts that need to be profiled should have a domain administrator account with the same credentials i.e. user name and password
Copy file name to clipboardExpand all lines: articles/site-recovery/site-recovery-deployment-planner.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: mayurigupta13
5
5
manager: rochakm
6
6
ms.service: site-recovery
7
7
ms.topic: conceptual
8
-
ms.date: 07/29/2019
8
+
ms.date: 03/13/2020
9
9
ms.author: mayg
10
10
---
11
11
@@ -72,7 +72,7 @@ The tool has two main phases: profiling and report generation. There is also a t
72
72
73
73
| Server requirement | Description|
74
74
|---|---|
75
-
|Profiling and throughput measurement| <ul><li>Operating system: Windows Server 2016 or Windows Server 2012 R2<br>(ideally matching at least the [size recommendations for the configuration server](https://aka.ms/asr-v2a-on-prem-components))</li><li>Machine configuration: 8 vCPUs, 16 GB RAM, 300 GB HDD</li><li>[.NET Framework 4.5](https://aka.ms/dotnet-framework-45)</li><li>[VMware vSphere PowerCLI 6.0 R3](https://aka.ms/download_powercli)</li><li>[Visual C++ Redistributable for Visual Studio 2012](https://aka.ms/vcplusplus-redistributable)</li><li>Internet access to Azure from this server</li><li>Azure storage account</li><li>Administrator access on the server</li><li>Minimum 100 GB of free disk space (assuming 1,000 VMs with an average of three disks each, profiled for 30 days)</li><li>VMware vCenter statistics level settings can be 1 or higher level</li><li>Allow vCenter port (default 443): Site Recovery Deployment Planner uses this port to connect to the vCenter server/ESXi host</ul></ul>|
75
+
|Profiling and throughput measurement| <ul><li>Operating system: Windows Server 2016 or Windows Server 2012 R2<br>(ideally matching at least the [size recommendations for the configuration server](https://aka.ms/asr-v2a-on-prem-components))</li><li>Machine configuration: 8 vCPUs, 16 GB RAM, 300 GB HDD</li><li>[.NET Framework 4.5](https://aka.ms/dotnet-framework-45)</li><li>[VMware vSphere PowerCLI 6.0 R3](https://aka.ms/download_powercli)</li><li>[Visual C++ Redistributable for Visual Studio 2012](https://aka.ms/vcplusplus-redistributable)</li><li>Internet access to Azure (*.blob.core.windows.net) from this server, port 443<br>[This is optional. You can choose to provide the available bandwidth during Report Generation manually.]</li><li>Azure storage account</li><li>Administrator access on the server</li><li>Minimum 100 GB of free disk space (assuming 1,000 VMs with an average of three disks each, profiled for 30 days)</li><li>VMware vCenter statistics level settings can be 1 or higher level</li><li>Allow vCenter port (default 443): Site Recovery Deployment Planner uses this port to connect to the vCenter server/ESXi host</ul></ul>|
76
76
| Report generation | A Windows PC or Windows Server with Excel 2013 or later.<li>[.NET Framework 4.5](https://aka.ms/dotnet-framework-45)</li><li>[Visual C++ Redistributable for Visual Studio 2012](https://aka.ms/vcplusplus-redistributable)</li><li>[VMware vSphere PowerCLI 6.0 R3](https://aka.ms/download_powercli) is required only when you pass -User option in the report generation command to fetch the latest VM configuration information of the VMs. The Deployment Planner connects to vCenter server. Allow vCenter port (default 443) port to connect to vCenter server.</li>|
77
77
| User permissions | Read-only permission for the user account that's used to access the VMware vCenter server/VMware vSphere ESXi host during profiling |
Copy file name to clipboardExpand all lines: articles/site-recovery/vmware-physical-azure-support-matrix.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Support matrix for VMware/physical disaster recovery in Azure Site Recove
3
3
description: Summarizes support for disaster recovery of VMware VMs and physical server to Azure using Azure Site Recovery.
4
4
ms.service: site-recovery
5
5
ms.topic: conceptual
6
-
ms.date: 1/21/2020
6
+
ms.date: 2/24/2020
7
7
ms.author: raynew
8
8
9
9
---
@@ -124,7 +124,7 @@ SUSE Linux Enterprise Server 12 (SP1,SP2,SP3,SP4) | [9.28][9.28 UR] | SP1 3.12.4
124
124
125
125
**Component** | **Supported**
126
126
--- | ---
127
-
File systems | ext3, ext4, XFS
127
+
File systems | ext3, ext4, XFS, BTRFS (conditions applicable as per this table)
128
128
Volume manager | - LVM is supported.<br/> - /boot on LVM is supported from [Update Rollup 31](https://support.microsoft.com/help/4478871/) (version 9.20 of the Mobility service) onwards. It isn't supported in earlier Mobility service versions.<br/> - Multiple OS disks aren't supported.
0 commit comments