You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/automation/how-to/move-account.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -130,5 +130,7 @@ When the move is complete, verify that the capabilities listed below are enabled
130
130
131
131
## Next steps
132
132
133
-
- To learn how to move Automation to a new region, see [Move Automation account to another region](../../azure-resource-manager/management/relocation/relocation-automation.md).
134
-
- To learn about moving resources in Azure, see [Move resources in Azure](../../azure-resource-manager/management/move-support-resources.md).
133
+
134
+
To learn how to move Automation to a new region, see [Move Automation account to another region](../../operational-excellence/relocation-automation.md).
135
+
136
+
To learn about moving resources in Azure, see [Move resources in Azure](../../azure-resource-manager/management/move-support-resources.md).
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/management/relocation/relocation-app-service.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,30 +73,30 @@ This section is a planning checklist in the following areas:
73
73
74
74
Some further points to consider:
75
75
76
-
- App Assigned Addresses, where an App Service app’s SSL connection is bound to a specific app designated IP, can be used for allow-listing calls from third party networks into App Service. For example, a network / IT admin may want to lock down outbound calls from an on-premises network or virtual network to use a static, well-known address. As such, if the App Assigned Address feature is in use, upstream firewall rules - such as internal, external, or third parties - for the callers into the app should be checked and informed of the new address. Firewall rules can be internal, external, or third parties, such as partners or well-known customers.
76
+
- App Assigned Addresses, where an App Service app's SSL connection is bound to a specific app designated IP, can be used for allow-listing calls from third party networks into App Service. For example, a network / IT admin may want to lock down outbound calls from an on-premises network or virtual network to use a static, well-known address. As such, if the App Assigned Address feature is in use, upstream firewall rules - such as internal, external, or third parties - for the callers into the app should be checked and informed of the new address. Firewall rules can be internal, external, or third parties, such as partners or well-known customers.
77
77
- Consider any upstream Network Virtual Appliance (NVA) or Reverse Proxy. The NVA config may need to change if you're rewriting the host header or and/or SSL terminating.
78
78
79
79
> [!NOTE]
80
80
> App Service Environment is the only App Service offering allows downstream calls to downstream application dependencies over SSL, where the SSL relies on self-signed/PKI with built with [nonstandard Root CA certificates](/azure/app-service/environment/overview-certificates#private-client-certificate). The multitenant service doesn't provide access for customers to upload to the trusted certificate store.
81
81
>
82
-
> App Service Environment today doesn't allow SSL certificate purchase, only Bring Your Own certificates. IP-SSL isn't possible (and doesn’t make sense), but SNI is. Internal App Service Environment wouldn't be associated with a public domain and therefore the SSL certs used must be provided by the customer and are therefore transportable, for example certs for internal use generated using PKI. App Service Environment v3 in external mode shares the same features as the regular multitenant App Service.
82
+
> App Service Environment today doesn't allow SSL certificate purchase, only Bring Your Own certificates. IP-SSL isn't possible (and doesn't make sense), but SNI is. Internal App Service Environment wouldn't be associated with a public domain and therefore the SSL certs used must be provided by the customer and are therefore transportable, for example certs for internal use generated using PKI. App Service Environment v3 in external mode shares the same features as the regular multitenant App Service.
- Make sure to check any disk file configuration, which may or may not be overridden by application settings.
87
87
88
-
### VNet Connectivity / Custom Names / DNS
88
+
### Virtual network Connectivity / Custom Names / DNS
89
89
90
-
- App Service Environment is a VNet-Injected single tenant service. App Service Environment networking differs from the multitenant App Service, which requires one or both “Private Endpoints” or “Regional VNet integration”. Other options that may be in play include the legacy P2S VPN based VNet integration and Hybrid Connections (an Azure Relay service).
90
+
- App Service Environment is a VNet-Injected single tenant service. App Service Environment networking differs from the multitenant App Service, which requires one or both "Private Endpoints" or "Regional VNet integration". Other options that may be in play include the legacy P2S VPN based VNet integration and Hybrid Connections (an Azure Relay service).
91
91
92
92
> [!NOTE]
93
93
> ASEv3 Networking is simplified - the Azure Management traffic and the App Service Environments own downstream dependencies aren't visible to the customer Virtual Network, greatly simplifying the configuration required where the customer is using a force-tunnel for all traffic, or sending a subset of outbound traffic, through a Network Virtual Appliance/Firewall.
94
94
>
95
-
> Hybrid Connections (Azure Relay) are regional. If Hybrid Connections are used and although an Azure Relay Namespace can be moved to another region, it would be simpler to redeploy the Hybrid Connection (ensure the Hybrid connection is setup in the new region on deploy of the target resources) and relink it to the Hybrid Connection Manager. The Hybrid Connection Manager location should be carefully considered.
95
+
> Hybrid Connections (Azure Relay) are regional. If you're using Hybrid Connections, it's often simpler to redeploy them rather than move the Azure Relay Namespace to another region—even though moving is possible. Ensure the Hybrid Connection is configured in the new region when deploying the target resources, and relink it to the Hybrid Connection Manager. Be sure to carefully consider the location of the Hybrid Connection Manager.
96
96
97
97
-**Follow the strategy for a warm standby region.** Ensure that core networking and connectivity, Hub network, domain controllers, DNS, VPN or Express Route, etc., are present and tested prior to the resource relocation.
98
98
-**Validate any upstream or downstream network ACLs and configuration**. For example, consider an external downstream service that allowlists only your App traffic. A relocation to a new Application Plan for a multitenant App Service would then also be a change in outbound IP addresses.
99
-
- In most cases, it's best to **ensure that the target region VNets have unique address space**. A unique address space facilitates virtual network connectivity if it’s required, for example, to replicate data. Therefore, in these scenarios there's an implicit requirement to change:
99
+
- In most cases, it's best to **ensure that the target region VNets have unique address space**. A unique address space facilitates virtual network connectivity if it's required, for example, to replicate data. Therefore, in these scenarios there's an implicit requirement to change:
100
100
101
101
- Private DNS
102
102
- Any hard coded or external configuration that references resources by IP address (without a hostname)
@@ -127,7 +127,7 @@ Some further points to consider:
127
127
128
128
The virtual network service endpoints for Azure App Service restrict access to a specified virtual network. The endpoints can also restrict access to a list of IPv4 (internet protocol version 4) address ranges. Any user connecting to the Event Hubs from outside those sources is denied access. If Service endpoints were configured in the source region for the Event Hubs resource, the same would need to be done in the target one.
129
129
130
-
For a successful recreation of the Azure App Service to the target region, the virtual network and subnet must be created beforehand. In case the move of these two resources is being carried out with the Azure Resource Mover tool, the service endpoints won’t be configured automatically. Hence, they need to be configured manually, which can be done through the [Azure portal](/azure/key-vault/general/quick-create-portal), the [Azure CLI](/azure/key-vault/general/quick-create-cli), or [Azure PowerShell](/azure/key-vault/general/quick-create-powershell).
130
+
For a successful recreation of the Azure App Service to the target region, the virtual network and subnet must be created beforehand. In case the move of these two resources is being carried out with the Azure Resource Mover tool, the service endpoints won't be configured automatically. Hence, they need to be configured manually, which can be done through the [Azure portal](/azure/key-vault/general/quick-create-portal), the [Azure CLI](/azure/key-vault/general/quick-create-cli), or [Azure PowerShell](/azure/key-vault/general/quick-create-powershell).
131
131
132
132
## Relocate
133
133
@@ -152,7 +152,7 @@ Keep in mind that for App Service Environment (Isolated) tiers, you need to rede
152
152
153
153
Use IaC when an existing Continuous Integration and Continuous Delivery/Deployment(CI/CD) pipeline exists, or can be created. With an CI/CD pipeline in place, your App Service resource can be created in the target region with a deployment action or a Kudu zip deployment.
154
154
155
-
SLA requirements should determine how much additional effort is required. For example: Is this a redeploy with limited downtime, or is it a near realtime cut-over required with minimal to no downtime?
155
+
The SLA requirements should determine how much additional effort is required. For example: Is this a redeployment with limited downtime, or does it require a near real-time cutover with minimal to no downtime?
156
156
157
157
The inclusion of external, global traffic routing edge services, such as Traffic Manager, or Azure Front Door help to facilitate cut-over for external users and applications.
158
158
@@ -168,8 +168,8 @@ Once the relocation is completed, test and validate Azure App Service with the r
168
168
- Perform integration testing on the target region deployment, including all formal regression testing. Integration testing should align with the usual Rhythm of Business deployment and test processes applicable to the workload.
169
169
- In some scenarios, particularly where the relocation includes updates, changes to the applications or Azure Resources, or a change in usage profile, use load testing to validate that the new workload is fit for purpose. Load testing is also an opportunity to validate operations and monitoring coverage. For example, use load testing to validate that the required infrastructure and application logs are being generated correctly. Load tests should be measured against established workload performance baselines.
170
170
171
-
>[!TIP]
172
-
>An App Service relocation is also an opportunity to reassess Availability and Disaster Recovery planning. App Service and App Service Environment (App Service Environment v3) supports[availability zones](/azure/reliability/availability-zones-overview) and it's recommended that configure with an availability zone configuration. Keep in mind the prerequisites for deployment, pricing, and limitations and factor these into the resource move planning. For more information on availability zones and App Service, see [Reliability in Azure App Service](/azure/reliability/reliability-app-service).
171
+
>[!TIP]
172
+
>An App Service relocation is also an opportunity to reassess availability and disaster recovery planning. App Service and App Service Environment (App Service Environment v3) support[availability zones](/azure/reliability/availability-zones-overview) and it's recommended that configure with an availability zone configuration. Keep in mind the prerequisites for deployment, pricing, and limitations and factor these into the resource move planning. For more information on availability zones and App Service, see [Reliability in Azure App Service](/azure/reliability/reliability-app-service).
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/management/relocation/relocation-automation.md
+4-8Lines changed: 4 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Relocate Azure Automation to another region
3
-
description: Learn how to relocate an Azure Automation to a another region
3
+
description: Learn how to relocate an Azure Automation to another region
4
4
ms.date: 01/19/2024
5
5
ms.topic: how-to
6
6
ms.custom: subject-relocation
@@ -19,7 +19,7 @@ If your Azure Automation instance doesn't have any configuration and the instanc
19
19
- Identify all Automation dependant resources.
20
20
- If the system-assigned managed identity isn't being used at source, you must map user-assigned managed identity at the target.
21
21
- If the target Azure Automation needs to be enabled for private access, associate with Virtual Network for private endpoint.
22
-
- If the source Azure Automation is enabled with a private connection, create a private link and configure the private link with DNS at target.
22
+
- If the source Azure Automation is enabled with a private connection, create a private link and configure the private link with Domain Name System (DNS) at target.
23
23
- For Azure Automation to communicate with Hybrid RunBook Worker, Azure Update Manager, Change Tracking, Inventory Configuration, and Automation State Configuration, you must enable port 443 for both inbound and outbound internet access.
24
24
25
25
## Downtime
@@ -40,20 +40,16 @@ To get started, export a Resource Manager template. This template contains setti
40
40
41
41
## Redeploy
42
42
43
-
In the diagram below, the red flow lines illustrate redeployment of the target instance along with configuration movement.
43
+
In the following diagram, the red flow lines illustrate redeployment of the target instance along with configuration movement.
**To deploy the template to create an Automation instance in the target region:**
48
48
49
49
1. Reconfigure the template parameters for the target.
50
-
51
-
1. Deploy the template using [ARM](/azure/automation/quickstart-create-automation-account-template), [Portal](/azure/automation/automation-create-standalone-account?tabs=azureportal) or [PowerShell](/powershell/module/az.automation/import-azautomationrunbook?view=azps-11.2.0&preserve-view=true).
52
-
50
+
1. Deploy the template using [Azure Resource Manager](/azure/automation/quickstart-create-automation-account-template), [Azure portal](/azure/automation/automation-create-standalone-account?tabs=azureportal), or [Azure PowerShell](/powershell/module/az.automation/import-azautomationrunbook?view=azps-11.2.0&preserve-view=true).
53
51
1. Use PowerShell to export all associated runbooks from the source Azure Automation instance and import them to the target instance. Reconfigure the properties as per target. For more information, see [Export-AzAutomationRunbook](/powershell/module/az.automation/export-azautomationrunbook?view=azps-11.2.0&viewFallbackFrom=azps-9.4.0&preserve-view=true).
54
-
55
52
1. Associate the relocated Azure Automation instance to the target Log Analytics workspace.
56
-
57
53
1. Configure the target virtual machines with desired state configuration from the relocated Azure Automation instance as per source.
0 commit comments