Skip to content

Commit 4d2bb3b

Browse files
committed
fix links, add somil as the author, and format the lists
1 parent c0abd84 commit 4d2bb3b

12 files changed

+80
-84
lines changed

articles/azure-resource-manager/management/relocation/relocation-backup.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -91,18 +91,16 @@ When an Azure Virtual Machine (VM) protected by a Recovery Services vault is mov
9191
You can also choose to write a customized script for bulk VM protection:
9292

9393
```azurepowershell
94-
9594
https://management.azure.com/Subscriptions/{subscriptionId}/resourceGroups/{vaultresourceGroupName}/providers/Microsoft.RecoveryServices/vaults/{vaultName}/backupFabrics/{fabricName}/protectionContainers/{containerName}/protectedItems/{protectedItemName}?api-version=2019-05-13
96-
9795
```
9896

9997
1. Prepare Azure Virtual Machines (VMs) for relocation:
10098

10199
1. See the [prerequisites associated with VM relocation](../../../resource-mover/tutorial-move-region-virtual-machines.md#prerequisites) and ensure that the VM is eligible for relocation.
102100
1. [Select the VM on the **Backup Items** tab](../../../backup/backup-azure-delete-vault.md#delete-protected-items-in-the-cloud) of existing vault’s dashboard and select **Stop protection** followed by retain/delete data as per your requirement. When the backup data for a VM is stopped with retain data, the recovery points remain forever and don’t adhere to any policy.
103101

104-
>[!Note]
105-
>Retaining data in the older vault will incur backup charges. If you no longer wish to retain data to avoid billing, you need to delete the retained backup data using the [Delete data option](../../../backup/backup-azure-manage-vms.md#delete-backup-data).
102+
> [!NOTE]
103+
> Retaining data in the older vault will incur backup charges. If you no longer wish to retain data to avoid billing, you need to delete the retained backup data using the [Delete data option](../../../backup/backup-azure-manage-vms.md#delete-backup-data).
106104
107105
1. Ensure that the VMs are turned on. All VMs’ disks that need to be available in the destination region are attached and initialized in the VMs.
108106
1. Ensure that VMs have the latest trusted root certificates, and an updated certificate revocation list (CRL). To do so:
@@ -126,8 +124,8 @@ https://management.azure.com/Subscriptions/{subscriptionId}/resourceGroups/{vaul
126124
1. When Azure File Share is copied across regions, its associated snapshots don’t relocate along with it. To relocate the snapshots data to the new region, you need to relocate the individual files and directories of the snapshots to the Storage Account in the new region by using [AzCopy](../../../storage/common/storage-use-azcopy-files.md#copy-all-file-shares-directories-and-files-to-another-storage-account).
127125
1. Choose whether you want to retain or delete the snapshots (and the corresponding recovery points) of the original Azure File Share by selecting your file share on the [Backup Items tab](../../../backup/backup-azure-delete-vault.md#delete-protected-items-in-the-cloud) of the original vault’s dashboard. When the backup data for Azure File Share is stopped with retain data, the recovery points remain forever and don’t adhere to any policy.
128126

129-
>[!NOTE]
130-
>While configuring File Share, if the Recovery Service Vault isn't available, check to see whether it is associated with another Recovery Service vault.
127+
> [!NOTE]
128+
> While configuring File Share, if the Recovery Service Vault isn't available, check to see whether it is associated with another Recovery Service vault.
131129
132130
### Back up SQL Server/SAP HANA in Azure VM
133131

@@ -157,6 +155,6 @@ When you relocate a VM that runs SQL or SAP HANA servers, you will no longer be
157155

158156
1. To backup files, folders, and system state for VMs (Hyper-V & VMware) and other on-premises workloads, see [About the Microsoft Azure Recovery Services (MARS)](../../../backup/backup-azure-about-mars.md).
159157
1. Download vault credentials to register the server in the vault.
160-
:::image type="content" source="media\relocation\backup\mars-agent-credential-download.png" alt-text="Screenshot showing how to download vault credentials to register the server in the vault.":::
158+
:::image type="content" source="./media/backup/mars-agent-credential-download.png" alt-text="Screenshot showing how to download vault credentials to register the server in the vault.":::
161159
1. Reconfigure backup agent on on-premises virtual machine.
162-
:::image type="content" source="media\relocation\backup\mars-register-to-target-rsv.png" alt-text="Screenshot showing how to reconfigure an on premise virtual machine.":::
160+
:::image type="content" source="./media/backup/mars-register-to-target-rsv.png" alt-text="Screenshot showing how to reconfigure an on premise virtual machine.":::

articles/azure-resource-manager/management/relocation/relocation-container-registry.md

Lines changed: 24 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ This article shows you how to relocate Azure Container Registry resources to ano
1515
## Prerequisites
1616

1717
- You can only relocate a registry within the same Active Directory tenant. This limitation applies to registries that are encrypted and unencrypted with a [customer-managed key](/azure/container-registry/tutorial-enable-customer-managed-keys).
18-
1918
- If the source registry has [availability zones](../../../reliability/availability-zones-overview.md) enabled, then the target region must also support availability zones. For more information on availability zone support for Azure Container Registry, see [Enable zone redundancy in Azure Container Registry](/azure/container-registry/zone-redundancy).
2019

2120
## Considerations for Service Endpoints
@@ -115,8 +114,10 @@ az group create --name myResourceGroup --location eastus
115114
Use the [az deployment group create](/cli/azure/deployment/group#az-deployment-group-create) command to deploy the target registry, using the template:
116115

117116
```azurecli
118-
az deployment group create --resource-group myResourceGroup \
119-
--template-file template.json --name mydeployment
117+
az deployment group create \
118+
--name mydeployment \
119+
--resource-group myResourceGroup \
120+
--template-file template.json
120121
```
121122

122123
> [!NOTE]
@@ -130,27 +131,27 @@ After creating the registry in the target region:
130131
1. Use the Azure CLI commands [az acr repository list](/cli/azure/acr/repository#az-acr-repository-list) and [az acr repository show-tags](/cli/azure/acr/repository#az-acr-repository-show-tags), or Azure PowerShell equivalents, to help enumerate the contents of your source registry.
131132
1. Run the import command for individual artifacts, or script it to run over a list of artifacts.
132133

133-
The following sample Azure CLI script enumerates the source repositories and tags and then imports the artifacts to a target registry in the same Azure subscription. Modify as needed to import specific repositories or tags. To import from a registry in a different subscription or tenant, see examples in [Import container images to a container registry](/azure/container-registry/container-registry-import-images).
134-
135-
```azurecli
136-
#!/bin/bash
137-
# Modify registry names for your environment
138-
SOURCE_REG=myregistry
139-
TARGET_REG=targetregistry
140-
141-
# Get list of source repositories
142-
REPO_LIST=$(az acr repository list \
143-
--name $SOURCE_REG --output tsv)
144-
145-
# Enumerate tags and import to target registry
146-
for repo in $REPO_LIST; do
147-
TAGS_LIST=$(az acr repository show-tags --name $SOURCE_REG --repository $repo --output tsv);
148-
for tag in $TAGS_LIST; do
149-
echo "Importing $repo:$tag";
150-
az acr import --name $TARGET_REG --source $SOURCE_REG.azurecr.io/$repo":"$tag;
134+
The following sample Azure CLI script enumerates the source repositories and tags and then imports the artifacts to a target registry in the same Azure subscription. Modify as needed to import specific repositories or tags. To import from a registry in a different subscription or tenant, see examples in [Import container images to a container registry](/azure/container-registry/container-registry-import-images).
135+
136+
```azurecli
137+
#!/bin/bash
138+
# Modify registry names for your environment
139+
SOURCE_REG=myregistry
140+
TARGET_REG=targetregistry
141+
142+
# Get list of source repositories
143+
REPO_LIST=$(az acr repository list \
144+
--name $SOURCE_REG --output tsv)
145+
146+
# Enumerate tags and import to target registry
147+
for repo in $REPO_LIST; do
148+
TAGS_LIST=$(az acr repository show-tags --name $SOURCE_REG --repository $repo --output tsv);
149+
for tag in $TAGS_LIST; do
150+
echo "Importing $repo:$tag";
151+
az acr import --name $TARGET_REG --source $SOURCE_REG.azurecr.io/$repo":"$tag;
152+
done
151153
done
152-
done
153-
```
154+
```
154155
155156
1. Associate the dependent resources to the target Azure Container Registry such as log analytics workspace in Diagnostic settings.
156157
1. Configure Azure Container Registry integration with both type of AKS clusters, provisioned or yet to be provisioned by running the following command:

articles/azure-resource-manager/management/relocation/relocation-cosmos-db.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,6 @@ This article describes how to either:
2626
- When you add or remove locations to an Azure Cosmos account, you can’t simultaneously modify other properties.
2727
- Identify all Cosmos DB dependent resources.
2828

29-
## Downtime
30-
3129
## Considerations for Service Endpoints
3230

3331
The virtual network service endpoints for Azure Cosmos DB restrict access to a specified virtual network. The endpoints can also restrict access to a list of IPv4 (internet protocol version 4) address ranges. Any user connecting to the Event Hubs from outside those sources is denied access. If Service endpoints were configured in the source region for the Event Hubs resource, the same would need to be done in the target one.

articles/azure-resource-manager/management/relocation/relocation-event-hub-cluster.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ To get started, export a Resource Manager template. This template contains setti
3131
1. Choose **Download** in the **Export template** page.
3232

3333
:::image type="content" source="../../../event-hubs/media/move-cluster-across-regions/download-template.png" alt-text="Screenshot showing where to download Resource Manager template" lightbox="../../../event-hubs/media/move-cluster-across-regions/download-template.png":::
34+
3435
1. Locate the .zip file that you downloaded from the portal, and unzip that file to a folder of your choice.
3536

3637
This zip file contains the .json files that include the template and scripts to deploy the template.

articles/azure-resource-manager/management/relocation/relocation-event-hub.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,8 @@ If you have other resources in the Azure resource group that contains the Event
1515
## Prerequisites
1616

1717
- Ensure that the services and features that your account uses are supported in the target region.
18-
1918
- If you have **capture feature** enabled for event hubs in the namespace, move [Azure Storage or Azure Data Lake Store Gen 2](../../../storage/common/storage-account-move.md) accounts before moving the Event Hubs namespace. You can also move the resource group that contains both Storage and Event Hubs namespaces to the other region by following steps similar to the ones described in this article.
20-
2119
- If the Event Hubs namespace is in an **Event Hubs cluster**, [move the dedicated cluster](../../../event-hubs/move-cluster-across-regions.md) to the **target region** before you go through steps in this article. You can also use the [quickstart template on GitHub](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.eventhub/eventhubs-create-cluster-namespace-eventhub/) to create an Event Hubs cluster. In the template, remove the namespace portion of the JSON to create only the cluster.
22-
2320
- Identify all resources dependencies. Depending on how you've deployed Event Hubs, the following services *may* need deployment in the target region:
2421

2522
- [Public IP](/azure/virtual-network/move-across-regions-publicip-portal)

articles/azure-resource-manager/management/relocation/relocation-firewall.md

Lines changed: 35 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -56,29 +56,29 @@ To prepare for relocation, you need to first export and modify the template from
5656

5757
1. Sign in to your Azure subscription with the `Connect-AzAccount` command and follow the on-screen directions:
5858

59-
```azurecli
60-
Connect-AzAccount
61-
```
59+
```azurecli
60+
Connect-AzAccount
61+
```
6262
6363
1. If your identity is associated with more than one subscription, then set your active subscription to subscription of the Azure Firewall resource that you want to move.
6464
65-
```azurepowershell
66-
$context = Get-AzSubscription -SubscriptionId <subscription-id>
67-
Set-AzContext $context
68-
```
65+
```azurepowershell
66+
$context = Get-AzSubscription -SubscriptionId <subscription-id>
67+
Set-AzContext $context
68+
```
6969
7070
1. Export the template of your source Azure Firewall resource by running the following commands:
7171
72-
```azurepowershell
73-
$resource = Get-AzResource `
74-
-ResourceGroupName <resource-group-name> `
75-
-ResourceName <resource-name> `
76-
-ResourceType <resource-type>
77-
78-
Export-AzResourceGroup `
79-
-ResourceGroupName <resource-group-name> `
80-
-Resource $resource.ResourceId
81-
```
72+
```azurepowershell
73+
$resource = Get-AzResource `
74+
-ResourceGroupName <resource-group-name> `
75+
-ResourceName <resource-name> `
76+
-ResourceType <resource-type>
77+
78+
Export-AzResourceGroup `
79+
-ResourceGroupName <resource-group-name> `
80+
-Resource $resource.ResourceId
81+
```
8282
8383
1. Locate the `template.json` in your current directory.
8484
@@ -124,14 +124,14 @@ If you're running classic firewall rules without Firewall policy, migrate to Fir
124124
125125
1. Edit the `location` property in the `template.json` file to the target region (The following example sets the target region to `centralus`.):
126126
127-
```json
128-
"resources": [
129-
{
130-
"type": "Microsoft.Network/azureFirewalls",
131-
"apiVersion": "2023-09-01",
132-
"name": "[parameters('azureFirewalls_fw_name')]",
133-
"location": "centralus",}]
134-
```
127+
```json
128+
"resources": [
129+
{
130+
"type": "Microsoft.Network/azureFirewalls",
131+
"apiVersion": "2023-09-01",
132+
"name": "[parameters('azureFirewalls_fw_name')]",
133+
"location": "centralus",}]
134+
```
135135
136136
To find the location code for your target region, see [Data residency in Azure](https://azure.microsoft.com/explore/global-infrastructure/data-residency/#overview).
137137
@@ -165,16 +165,16 @@ To find the location code for your target region, see [Data residency in Azure](
165165
166166
1. Edit the `location` property in the `template.json` file to the target region (The following example sets the target region to `centralus`.):
167167
168-
```json
169-
"resources": [
170-
{
171-
"type": "Microsoft.Network/azureFirewalls",
172-
"apiVersion": "2023-09-01",
173-
"name": "[parameters('azureFirewalls_fw_name')]",
174-
"location": "centralus",
175-
}
176-
]
177-
```
168+
```json
169+
"resources": [
170+
{
171+
"type": "Microsoft.Network/azureFirewalls",
172+
"apiVersion": "2023-09-01",
173+
"name": "[parameters('azureFirewalls_fw_name')]",
174+
"location": "centralus",
175+
}
176+
]
177+
```
178178
179179
To find the location code for your target region, see [Data residency in Azure](https://azure.microsoft.com/explore/global-infrastructure/data-residency/#overview).
180180

articles/azure-resource-manager/management/relocation/relocation-kubernetes-service.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -57,14 +57,14 @@ Before you begin the relocation planning stage, first review the following prere
5757

5858
Before you begin the cluster relocation process, make sure to complete the following preparations:
5959

60-
-. To accommodate the AKS cluster nodes and pods, if using Azure CNI networking, deploy the virtual network with many subnets of sufficient size.
61-
-. If you're using Azure Key Vault, [Deploy the Key Vault](./relocation-key-vault.md).
62-
-. Ensure that the relevant TLS ingress certificates are available for deployment, ideally in a secure store such as Azure Key Vault.
63-
-. Deploy a container registry. Either sync the source registry images automatically or rebuild and push new images to the target registry using a CI/CD pipeline or script.
64-
-. [Deploy an Azure Monitor workspace](./relocation-log-analytics.md).
65-
-. (Optional) [Deploy Azure Application Gateway](./relocation-app-gateway.md) to handle ingress traffic Application Gateway Ingress Controller (AGIC) can tightly integrate with the cluster
66-
-. Deploy any data sources required by the cluster workload and restore or sync the source data.
67-
-. Execute existing IaC artifacts defined in a CI/CD pipeline that were used to deploy the source cluster and the services it depends upon. Change the code or template input parameters to redeploy to a different resource group and Azure region.
60+
- To accommodate the AKS cluster nodes and pods, if using Azure CNI networking, deploy the virtual network with many subnets of sufficient size.
61+
- If you're using Azure Key Vault, [Deploy the Key Vault](./relocation-key-vault.md).
62+
- Ensure that the relevant TLS ingress certificates are available for deployment, ideally in a secure store such as Azure Key Vault.
63+
- Deploy a container registry. Either sync the source registry images automatically or rebuild and push new images to the target registry using a CI/CD pipeline or script.
64+
- [Deploy an Azure Monitor workspace](./relocation-log-analytics.md).
65+
- (Optional) [Deploy Azure Application Gateway](./relocation-app-gateway.md) to handle ingress traffic Application Gateway Ingress Controller (AGIC) can tightly integrate with the cluster
66+
- Deploy any data sources required by the cluster workload and restore or sync the source data.
67+
- Execute existing IaC artifacts defined in a CI/CD pipeline that were used to deploy the source cluster and the services it depends upon. Change the code or template input parameters to redeploy to a different resource group and Azure region.
6868

6969
## Redeploy
7070

articles/azure-resource-manager/management/relocation/relocation-postgresql-flexible-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ For an overview of the region pairs supported by native replication, see [cross-
2222
Prerequisites only apply to [redeployment with data](#redeploy-with-data). To move your database without data, you can skip to [Prepare](#prepare).
2323

2424
- To relocate PostgreSQL with data from one region to another, you must have an additional compute resource to run the backup and restore tools. The examples in this guide use an Azure VM running Ubuntu 20.04 LTS. The compute resources must:
25-
-
25+
2626
- Have network access to both the source and the target server, either on a private network or by inclusion in the firewall rules.
2727
- Be located in either the source or target region.
2828
- Use [Accelerated Networking](/azure/virtual-network/accelerated-networking-overview) (if available).

articles/azure-resource-manager/management/relocation/relocation-private-link.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Identify all resources that are used by Private Link Service, such as Standard l
3636
1. Redeploy the private endpoint into the relocated virtual network.
3737
1. Configure your DNS settings by following guidance in [Private DNS zone values](/azure/private-link/private-endpoint-dns?branch=main).
3838

39-
:::image type="content" source="media/consumer-provider-endpoint.png" alt-text="Diagram that illustrates relocation process for Private Link service.":::
39+
:::image type="content" source="media/consumer-provider-endpoint.png" alt-text="Diagram that illustrates relocation process for Private Link service.":::
4040

4141
## Next steps
4242

articles/azure-resource-manager/management/relocation/relocation-virtual-machine-scale-sets.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ In this section, follow the instructions to prepare for relocating a Virtual Mac
4545

4646
1. Locate the image reference used by the source Virtual Machine Scale Set and replicate it to the Image Gallery in the target region.
4747

48-
:::image type="content" source="media\relocation\virtual-machine-scale-sets\image-replication.png" alt-text="Screenshot showing how to locate image of virtual machine.":::
48+
:::image type="content" source="media/virtual-machine-scale-sets/image-replication.png" alt-text="Screenshot showing how to locate image of virtual machine.":::
4949

5050
1. Relocate the Load Balancer, along with the public IP by doing one of the following methods:
5151

@@ -57,7 +57,7 @@ In this section, follow the instructions to prepare for relocating a Virtual Mac
5757
5858
1. Manually set the source Virtual Machine Scale Set instance count to 0.
5959

60-
:::image type="content" source="media\relocation\virtual-machine-scale-sets\set-instance-count.png" alt-text="Screenshot showing how to set Virtual Machine Scale Set instance count to 0.":::
60+
:::image type="content" source="media/virtual-machine-scale-sets/set-instance-count.png" alt-text="Screenshot showing how to set Virtual Machine Scale Set instance count to 0.":::
6161

6262
1. Export the source Virtual Machine Scale Set template from Azure portal:
6363

0 commit comments

Comments
 (0)