Skip to content

Commit 507a3ae

Browse files
authored
Merge pull request #298895 from roygara/avesanRefresh
Elastic San VMware Solution refresh
2 parents 8bb1ae6 + 78887e9 commit 507a3ae

File tree

3 files changed

+49
-52
lines changed

3 files changed

+49
-52
lines changed

articles/azure-vmware/configure-azure-elastic-san.md

Lines changed: 49 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -21,64 +21,65 @@ To accompany the steps below, you can use this [interactive demo](https://regale
2121

2222
The following prerequisites are required to continue.
2323

24-
- Verify you have a private cloud in a [region that Elastic SAN is available in](../storage/elastic-san/elastic-san-create.md).
24+
- Have a fully configured Azure VMware solution private cloud in a [region that Elastic SAN is available in](../storage/elastic-san/elastic-san-create.md).
25+
- Size your ExpressRoute gateways to handle your elastic SAN's bandwidth capabilities. For example, a single ultra performance ExpressRoute gateway supports a bandwidth of 1,280 mbps. An individual elastic SAN datastore used to its full potential would use the entirety of that bandwidth. Multiple gateways might be required depending on your needs.
2526
- Know the availability zone your private cloud is in.
2627
- In the UI, select an Azure VMware Solution host.
2728
> [!NOTE]
28-
> The host exposes its Availability Zone. You should use that AZ when deploying other Azure resources for the same subscription.
29-
30-
- You have permission to set up new resources in the subscription your private cloud is in.
29+
> The host exposes its availability zone. Use that availability zone when deploying other Azure resources for the same subscription.
3130
31+
- Have permission to set up new resources in the subscription your private cloud is in.
3232
- Reserve a dedicated address block for your external storage.
33+
- Use either the [Azure portal](/azure/storage/elastic-san/elastic-san-create?tabs=azure-portal), [Azure PowerShell module](/azure/storage/elastic-san/elastic-san-create?tabs=azure-powershell), or [Azure CLI](/azure/storage/elastic-san/elastic-san-create?tabs=azure-cli) to create an Elastic SAN that has at least 16 TiB base size and that is in the same region and availability zone as your private cloud.
34+
> [!NOTE]
35+
> Make sure CRC protection on your volume groups is disabled since it's not currently supported for Azure VMware Solution.
36+
3337

3438
## Supported host types
3539

36-
To use Elastic SAN with Azure VMware Solution, you can use any of these host types:
40+
You can use the following host types when Azure Elastic SAN is the backing storage for Azure VMware solution:
3741

38-
- AV36 
42+
- AV36
43+
- AV36P
44+
- AV52
45+
- AV64
3946

40-
- AV36P 
47+
## Configuration recommendations
4148

42-
- AV52 
49+
Use multiple private endpoints to establish multiple sessions between an Elastic SAN and each volume you intend to connect to your software defined data center (SDDC). Having multiple sessions provides better performance due to parallelization, and better reliability to handle single session disconnects. When you establish multiple sessions, it also mitigates the impact of session disconnects, as long as the connection is re-established within a few seconds, your other sessions help load-balance traffic.
4350

44-
- AV64
51+
> [!NOTE]
52+
> Session disconnects might show up as "All Paths Down" or "APD" events, which can be seen in the Events section of the ESXi Host at vCenter. You can also see them in the logs: it shows the identifier of a device or filesystem, and states it entered the All Paths Down state.
4553
46-
- AV48
47-
48-
## Set up Elastic SAN
49-
50-
In this section, you create a virtual network for your Elastic SAN. Then you create the Elastic SAN that includes creating at least one volume group and one volume that becomes your VMFS datastore. Next, you set up private endpoints for your Elastic SAN that allows your private cloud to connect to the Elastic SAN volume. Then you're ready to add an Elastic SAN volume as a datastore in your private cloud.
51-
52-
1. Use one of the following instruction options to set up a dedicated virtual network for your Elastic SAN:
53-
- [Azure portal](../virtual-network/quick-create-portal.md)
54-
- [Azure PowerShell module](../virtual-network/quick-create-powershell.md)
55-
- [Azure CLI](../virtual-network/quick-create-cli.md)
56-
1. Use one of the following instruction options to set up an Elastic SAN, your dedicated volume group, and initial volume in that group:
57-
> [!IMPORTANT]
58-
>
59-
> Create your Elastic SAN in the same region and availability zone as your private cloud for best performance.
60-
- [Azure portal](/azure/storage/elastic-san/elastic-san-create?tabs=azure-portal)
61-
- [PowerShell](/azure/storage/elastic-san/elastic-san-create?tabs=azure-powershell)
62-
- [Azure CLI](/azure/storage/elastic-san/elastic-san-create?tabs=azure-cli)
63-
1. Use one of the following instructions to configure a Private Endpoint (PE) for your Elastic SAN:
64-
> [!IMPORTANT]
65-
>
66-
> You must have a Private Endpoint set up for your dedicated volume group to be able to connect your SDDC to the Elastic SAN.
67-
- [Azure Portal](/azure/storage/elastic-san/elastic-san-networking?tabs=azure-portal#tabpanel_2_azure-portal)
68-
- [PowerShell](/azure/storage/elastic-san/elastic-san-networking?tabs=azure-powershell#configure-a-private-endpoint)
69-
- [Azure CLI](/azure/storage/elastic-san/elastic-san-networking?tabs=azure-cli#tabpanel_2_azure-cli)
54+
When an Elastic SAN volume is attached to a cluster, it automatically attaches to all nodes. If you have 16 nodes and each node is configured to use eight iSCSI sessions that use the maximum number of connections (128). This would prevent you from attaching an additional node for maintenance. The following recommendations help you avoid this situation:
7055

71-
## Configuration recommendations
56+
If your Elastic SAN is only connecting to a single cluster, and will only ever have 16 nodes in a cluster, use one of the following configurations:
57+
- AV36, AV36P, AV52 - Six iSCSI sessions over three Private Endpoints
58+
- AV64 - Seven iSCSI sessions over seven Private Endpoints
7259

73-
You should use multiple private endpoints to establish multiple sessions between an Elastic SAN and each volume group you intend to connect to your SDDC. Because of how Elastic SAN handles sessions, having multiple sessions comes with two benefits: increased performance thanks to parallelization, and increased reliability to handle single session disconnects due to unexpected factors like network glitches. When you establish multiple sessions, it mitigates the impact of session disconnects, as long as the connection re-established within a few seconds, your other sessions help load-balance traffic.
60+
If your Elastic SAN is connecting to a single cluster that won't have 16 nodes, use one of the following configurations.
61+
- AV36, AV36P, AV52 - Eight iSCSI sessions over four Private Endpoints
62+
- AV64 - Eight iSCSI sessions over eight Private Endpoints
7463

75-
> [!NOTE]
76-
> Session disconnects may still show up as "All Paths Down" or "APD" events, which can be seen in the Events section of the ESXi Host at vCenter. You can also see them in the logs: it will show the identifier of a device or filesystem, and state it has entered the All Paths Down state.
64+
If you're planning on connecting an Elastic SAN datastore to multiple clusters, you must calculate the number of hosts, sessions, and connections per cluster. An Elastic SAN datastore only supports a maximum of 128 connections, and each time you connect an Elastic SAN datastore to a cluster, it automatically connects to all nodes in that cluster. This can rapidly use up the available connections when each node in a cluster is establishing multiple connections.
65+
66+
## Configure Private Endpoint
67+
68+
Using the guidance from the previous section, create as many private endpoints for your volume groups as you need.
69+
70+
Edit your volume group, or create a new one. Then select **Networking**, then select **+ Create a private endpoint** under **Private endpoint connections**. You don't need to configure a dedicated virtual network for your Elastic SAN, since you're using private endpoint connections to access your Elastic SAN volumes.
71+
72+
Fill out the values in the menu that pops up, select the virtual network that has your [ExpressRoute connection configured](/azure/azure-vmware/tutorial-configure-networking#connect-expressroute-to-the-virtual-network-gateway), and the subnet that your applications are going to use to connect. When you're done, select **Add**, and **Save**.
73+
74+
Repeat these steps to create as many private endpoints as you need.
75+
76+
:::image type="content" source="../storage/elastic-san/media/elastic-san-create/elastic-san-edit-volume-network.png" alt-text="Screenshot of the volume group private endpoint creation experience." lightbox="../storage/elastic-san/media/elastic-san-create/elastic-san-edit-volume-network.png":::
77+
78+
> [!NOTE]
79+
> Using Private Endpoints provides the highest network security. However, since your private cloud connects to Elastic SAN in Azure through an ExpressRoute virtual network gateway, you might experience intermittent connectivity issues during [gateway maintenance](/azure/expressroute/expressroute-about-virtual-network-gateways).
80+
> These connectivity issues aren't expected to impact the availability of the datastore backed by Elastic SAN as the connection is re-established within seconds. The potential impact from gateway maintenance is covered under the [Service Level Agreement](https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services?lang=1) for ExpressRoute virtual network gateways and private endpoints.
7781
78-
Each private endpoint provides two sessions to Elastic SAN per host. The recommended number of sessions to Elastic SAN per host is 8, but because the maximum number of sessions an Elastic SAN datastore can handle is 128, the ideal number for your setup depends on the number of hosts in your private cloud.
7982

80-
> [!IMPORTANT]
81-
> You should configure all Private Endpoints before attaching a volume as a datastore. Adding Private Endpoints after a volume is attached as a datastore will require detaching the datastore and reconnecting it to the cluster.
8283
## Configure external storage address block
8384

8485
Start by providing an IP block for deploying external storage. Navigate to the **Storage** tab in your Azure VMware Solution private cloud in the Azure portal. The address block should be a /24 network.
@@ -88,34 +89,30 @@ Start by providing an IP block for deploying external storage. Navigate to the *
8889
- The address block must be unique and not overlap with the /22 used to create your Azure VMware Solution private cloud or any other connected Azure virtual networks or on-premises network.
8990
- The address block must fall within the following allowed network blocks: 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16. If you want to use a non-RFC 1918 address block, submit a support request.
9091
- The address block can't overlap any of the following restricted network blocks: 100.72.0.0/15
91-
- The address block provided is used to enable multipathing from the ESXi hosts to the target, it can’t be edited or changed. If you do need to change it, submit a support request.
92-
93-
## Connect Elastic SAN
92+
- The address block provided is used to enable multipathing from the ESXi hosts to the target, it can’t be edited or changed. If you do need to change it, submit a support request.
9493

95-
After you provide an External storage address block, you need to connect your private cloud express route with the private endpoint(s) you set up for your Elastic SAN volume group(s). To learn how to establish these connections, see [Configure networking for your VMware private cloud in Azure](../azure-vmware/tutorial-configure-networking.md).
96-
97-
> [!NOTE]
98-
> Connection to Elastic SAN from Azure VMware Solution happens via private endpoints to provide the highest network security. Since your private cloud connects to Elastic SAN in Azure through an ExpressRoute virtual network gateway, you may experience intermittent connectivity issues during [gateway maintenance](/azure/expressroute/expressroute-about-virtual-network-gateways).
99-
> These connectivity issues aren't expected to impact the availability of the datastore backed by Elastic SAN as the connection will be re-established within seconds. The potential impact from gateway maintenance is covered under the [Service Level Agreement](https://www.microsoft.com/licensing/docs/view/Service-Level-Agreements-SLA-for-Online-Services?lang=1) for ExpressRoute virtual network gateways and private endpoints.
10094
## Add an Elastic SAN volume as a datastore
10195

96+
Configure all Private Endpoints before attaching a volume as a datastore. Adding Private Endpoints after a volume is attached as a datastore requires detaching the datastore and reconnecting it to the cluster.
97+
10298
Once your SDDC express route is connected with the private endpoint for your Elastic SAN volume group, use the following steps to connect the volume to your SDDC:
10399

104100
1. From the left navigation in your Azure VMware Solution private cloud, select **Storage**, then **+ Connect Elastic SAN**.
105101
1. Select your **Subscription**, **Resource**, **Volume Group**, **Volume(s)**, and **Client cluster**.
106102
1. From section, "Rename datastore as per VMware requirements", under **Volume name** > **Data store name**, give names to the Elastic SAN volumes.
107-
> [!NOTE]
108-
> For best performance, verify that your Elastic SAN volume and private cloud are in the same Region and Availability Zone.
103+
> [!NOTE]
104+
> When creating virtual disks, use eager zeroed thick provisioning.
105+
> This means setting up virtual disks where all the space is reserved and cleaned out in advance, so they're ready for fast and secure use.
109106
110107
## Disconnect and delete an Elastic SAN-based datastore
111108

112109
To delete the Elastic SAN-based datastore, use the following steps from the Azure portal.
113110

114111
1. From the left navigation in your Azure VMware Solution private cloud, select **Storage**, then **Datastore list**.
115-
1. On the far right is an **ellipsis**. Select **Delete** to disconnect the datastore from the Cluster(s).
112+
1. On the far right is an **ellipsis**. Select **Delete** to disconnect the datastore from the clusters.
116113

117114
:::image type="content" source="media/configure-azure-elastic-san/elastic-san-datastore-list-ellipsis-removal.png" alt-text="Screenshot showing Elastic SAN volume removal." border="false"lightbox="media/configure-azure-elastic-san/elastic-san-datastore-list-ellipsis-removal.png":::
118115

119-
1. Optionally you can delete the volume you previously created in your Elastic SAN.
116+
1. Optionally, you can delete the volume you previously created in your Elastic SAN.
120117
> [!NOTE]
121118
> This operation can't be completed if virtual machines or virtual disks reside on an Elastic SAN VMFS Datastore.
208 KB
Loading
412 KB
Loading

0 commit comments

Comments
 (0)