Skip to content

Commit 718e0a4

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ip-upgrade-cli
2 parents 435128d + 5b8524e commit 718e0a4

File tree

8 files changed

+136
-73
lines changed

8 files changed

+136
-73
lines changed

articles/storage/elastic-san/elastic-san-connect-linux.md

Lines changed: 27 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,17 @@ description: Learn how to connect to an Azure Elastic SAN (preview) volume from
44
author: roygara
55
ms.service: storage
66
ms.topic: how-to
7-
ms.date: 10/24/2022
7+
ms.date: 10/25/2022
88
ms.author: rogarana
99
ms.subservice: elastic-san
1010
ms.custom: references_regions, ignite-2022
1111
---
1212

1313
# Connect to Elastic SAN (preview) volumes - Linux
1414

15-
This article explains how to connect to an elastic storage area network (SAN) volume from a Linux client. For details on connecting from a Windows client, see [Connect to Elastic SAN (preview) volumes - Windows](elastic-san-connect-windows.md)
15+
This article explains how to connect to an Elastic storage area network (SAN) volume from a Linux client. For details on connecting from a Windows client, see [Connect to Elastic SAN (preview) volumes - Windows](elastic-san-connect-windows.md).
16+
17+
In this article, you'll add the Storage service endpoint to an Azure virtual network's subnet, then you'll configure your volume group to allow connections from your subnet. Finally, you'll configure your client environment to connect to an Elastic SAN volume and establish a connection.
1618

1719
## Prerequisites
1820

@@ -23,9 +25,16 @@ This article explains how to connect to an elastic storage area network (SAN) vo
2325

2426
[!INCLUDE [elastic-san-regions](../../../includes/elastic-san-regions.md)]
2527

26-
## Enable Storage service endpoint
28+
## Networking configuration
29+
30+
To connect to a SAN volume, you need to enable the storage service endpoint on your Azure virtual network subnet, and then connect your volume groups to your Azure virtual network subnets.
31+
32+
### Enable Storage service endpoint
33+
34+
In your virtual network, enable the Storage service endpoint on your subnet. This ensures traffic is routed optimally to your Elastic SAN. To enable service point for Azure Storage, you must have the appropriate permissions for the virtual network. This operation can be performed by a user that has been given permission to the Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action [Azure resource provider operation](../../role-based-access-control/resource-provider-operations.md#microsoftnetwork) via a custom Azure role. An Elastic SAN and the virtual networks granted access may be in different subscriptions, including subscriptions that are a part of a different Azure AD tenant.
2735

28-
In your virtual network, enable the Storage service endpoint on your subnet. This ensures traffic is routed optimally to your Elastic SAN.
36+
> [!NOTE]
37+
> Configuration of rules that grant access to subnets in virtual networks that are a part of a different Azure Active Directory tenant are currently only supported through PowerShell, CLI and REST APIs. These rules cannot be configured through the Azure portal, though they may be viewed in the portal.
2938
3039
# [Portal](#tab/azure-portal)
3140

@@ -56,11 +65,11 @@ az network vnet subnet update --resource-group "myresourcegroup" --vnet-name "my
5665
```
5766
---
5867

59-
## Configure networking
68+
### Configure volume group networking
6069

6170
Now that you've enabled the service endpoint, configure the network security settings on your volume groups. You can grant network access to a volume group from one or more Azure virtual networks.
6271

63-
By default, no network access is allowed to any volumes in a volume group. Adding a virtual network to your volume group lets you establish iSCSI connections from clients in the same virtual network and subnet to the volumes in the volume group. For more information on networking, see [Configure Elastic SAN networking (preview)](elastic-san-networking.md).
72+
By default, no network access is allowed to any volumes in a volume group. Adding a virtual network to your volume group lets you establish iSCSI connections from clients in the same virtual network and subnet to the volumes in the volume group. For details on accessing your volumes from another region, see [Enabling access to virtual networks in other regions (preview)](elastic-san-networking.md#enabling-access-to-virtual-networks-in-other-regions-preview).
6473

6574
# [Portal](#tab/azure-portal)
6675

@@ -89,19 +98,19 @@ You can either create single sessions or multiple-sessions to every Elastic SAN
8998

9099
When using multiple sessions, generally, you should aggregate them with Multipath I/O. It allows you to aggregate multiple sessions from an iSCSI initiator to the target into a single device, and can improve performance by optimally distributing I/O over all available paths based on a load balancing policy.
91100

92-
## Environment setup
101+
### Environment setup
93102

94103
To create iSCSI connections from a Linux client, install the iSCSI initiator package. The exact command may vary depending on your distribution, and you should consult their documentation if necessary.
95104

96105
As an example, with Ubuntu you'd use `sudo apt -y install open-iscsi` and with Red Hat Enterprise Linux (RHEL) you'd use `sudo yum install iscsi-initiator-utils -y`.
97106

98-
### Multipath I/O
107+
#### Multipath I/O - for multi-session connectivity
99108

100109
Install the Multipath I/O package for your Linux distribution. The installation will vary based on your distribution, and you should consult their documentation. As an example, on Ubuntu the command would be `sudo apt install multipath-tools` and for RHEL the command would be `sudo yum install device-mapper-multipath`.
101110

102-
Once you've installed the package, check if **/etc/multipath.conf** exists. If **/etc/multipath.conf** doesn't exist, create an empty file and use the settings in the following example for a general configuration. As an example, `mpathconf --enable` to create **/etc/multipath.conf** will create the file on RHEL.
111+
Once you've installed the package, check if **/etc/multipath.conf** exists. If **/etc/multipath.conf** doesn't exist, create an empty file and use the settings in the following example for a general configuration. As an example, `mpathconf --enable` will create **/etc/multipath.conf** on RHEL.
103112

104-
You'll need to make some modifications to **/etc/multipath.conf**. You'll need to add the devices section in the following example, and the defaults section in the following example sets some defaults that'll generally be applicable. If you need to make any other specific configurations, such as excluding volumes from the multipath topology, see the man page for multipath.conf.
113+
You'll need to make some modifications to **/etc/multipath.conf**. You'll need to add the devices section in the following example, and the defaults section in the following example sets some defaults are generally applicable. If you need to make any other specific configurations, such as excluding volumes from the multipath topology, see the man page for multipath.conf.
105114

106115
```
107116
defaults {
@@ -138,7 +147,13 @@ You should see a list of output that looks like the following:
138147

139148
Note down the values for **targetIQN**, **targetPortalHostName**, and **targetPortalPort**, you'll need them for the next sections.
140149

141-
## Multi-session connections
150+
## Determine sessions to create
151+
152+
You can either create single sessions or multiple-sessions to every Elastic SAN volume based on your application's multi-threaded capabilities and performance requirements. To achieve higher IOPS and throughput to a volume and reach its maximum limits, use multiple sessions and adjust the queue depth and IO size as needed, if your workload allows.
153+
154+
For multi-session connections, install [Multipath I/O - for multi-session connectivity](#multipath-io---for-multi-session-connectivity).
155+
156+
### Multi-session connections
142157

143158
To establish multiple sessions to a volume, first you'll need to create a single session with particular parameters.
144159

@@ -168,7 +183,7 @@ for i in `seq 1 numberOfAdditionalSessions`; do sudo iscsiadm -m session -r sess
168183

169184
You can verify the number of sessions using `sudo multipath -ll`
170185

171-
## Single-session connections
186+
### Single-session connections
172187

173188
To establish persistent iSCSI connections, modify **node.startup** in **/etc/iscsi/iscsid.conf** from **manual** to **automatic**.
174189

articles/storage/elastic-san/elastic-san-connect-windows.md

Lines changed: 25 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,17 @@ description: Learn how to connect to an Azure Elastic SAN (preview) volume from
44
author: roygara
55
ms.service: storage
66
ms.topic: how-to
7-
ms.date: 10/24/2022
7+
ms.date: 10/25/2022
88
ms.author: rogarana
99
ms.subservice: elastic-san
1010
ms.custom: references_regions, ignite-2022
1111
---
1212

1313
# Connect to Elastic SAN (preview) volumes - Windows
1414

15-
This article explains how to connect to an elastic storage area network (SAN) volume from a Windows client. For details on connecting from a Linux client, see [Connect to Elastic SAN (preview) volumes - Linux](elastic-san-connect-linux.md).
15+
This article explains how to connect to an Elastic storage area network (SAN) volume from a Windows client. For details on connecting from a Linux client, see [Connect to Elastic SAN (preview) volumes - Linux](elastic-san-connect-linux.md).
16+
17+
In this article, you'll add the Storage service endpoint to an Azure virtual network's subnet, then you'll configure your volume group to allow connections from your subnet. Finally, you'll configure your client environment to connect to an Elastic SAN volume and establish a connection.
1618

1719
## Prerequisites
1820

@@ -23,9 +25,16 @@ This article explains how to connect to an elastic storage area network (SAN) vo
2325

2426
[!INCLUDE [elastic-san-regions](../../../includes/elastic-san-regions.md)]
2527

26-
## Enable Storage service endpoint
28+
## Configure networking
29+
30+
To connect to a SAN volume, you need to enable the storage service endpoint on your Azure virtual network subnet, and then connect your volume groups to your Azure virtual network subnets.
2731

28-
In your virtual network, enable the Storage service endpoint on your subnet. This ensures traffic is routed optimally to your Elastic SAN.
32+
### Enable Storage service endpoint
33+
34+
In your virtual network, enable the Storage service endpoint on your subnet. This ensures traffic is routed optimally to your Elastic SAN. To enable service point for Azure Storage, you must have the appropriate permissions for the virtual network. This operation can be performed by a user that has been given permission to the Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action [Azure resource provider operation](../../role-based-access-control/resource-provider-operations.md#microsoftnetwork) via a custom Azure role. An Elastic SAN and the virtual networks granted access may be in different subscriptions, including subscriptions that are a part of a different Azure AD tenant.
35+
36+
> [!NOTE]
37+
> Configuration of rules that grant access to subnets in virtual networks that are a part of a different Azure Active Directory tenant are currently only supported through PowerShell, CLI and REST APIs. These rules cannot be configured through the Azure portal, though they may be viewed in the portal.
2938
3039
# [Portal](#tab/azure-portal)
3140

@@ -56,11 +65,11 @@ az network vnet subnet update --resource-group "myresourcegroup" --vnet-name "my
5665
```
5766
---
5867

59-
## Configure networking
68+
### Configure volume group networking
6069

6170
Now that you've enabled the service endpoint, configure the network security settings on your volume groups. You can grant network access to a volume group from one or more Azure virtual networks.
6271

63-
By default, no network access is allowed to any volumes in a volume group. Adding a virtual network to your volume group lets you establish iSCSI connections from clients in the same virtual network and subnet to the volumes in the volume group. For more information on networking, see [Configure Elastic SAN networking (preview)](elastic-san-networking.md).
72+
By default, no network access is allowed to any volumes in a volume group. Adding a virtual network to your volume group lets you establish iSCSI connections from clients in the same virtual network and subnet to the volumes in the volume group. For details on accessing your volumes from another region, see [Enabling access to virtual networks in other regions (preview)](elastic-san-networking.md#enabling-access-to-virtual-networks-in-other-regions-preview).
6473

6574
# [Portal](#tab/azure-portal)
6675

@@ -89,7 +98,7 @@ You can either create single sessions or multiple-sessions to every Elastic SAN
8998

9099
When using multiple sessions, generally, you should aggregate them with Multipath I/O. It allows you to aggregate multiple sessions from an iSCSI initiator to the target into a single device, and can improve performance by optimally distributing I/O over all available paths based on a load balancing policy.
91100

92-
## Set up your environment
101+
### Set up your environment
93102

94103
To create iSCSI connections from a Windows client, confirm the iSCSI service is running. If it's not, start the service, and set it to start automatically.
95104

@@ -104,9 +113,7 @@ Start-Service -Name MSiSCSI
104113
Set-Service -Name MSiSCSI -StartupType Automatic
105114
```
106115

107-
### Multipath I/O
108-
109-
Multipath I/O enables highly available and fault-tolerant iSCSI network connections. It allows you to aggregate multiple sessions from an iSCSI initiator to the target into a single device, and can improve performance by optimally distributing I/O over all available paths based on a load balancing policy.
116+
#### Multipath I/O - for multi-session connectivity
110117

111118
Install Multipath I/O, enable multipath support for iSCSI devices, and set a default load balancing policy.
112119

@@ -141,7 +148,13 @@ $connectVolume.storagetargetportalport
141148

142149
Note down the values for **StorageTargetIQN**, **StorageTargetPortalHostName**, and **StorageTargetPortalPort**, you'll need them for the next sections.
143150

144-
## Multi-session configuration
151+
## Determine sessions to create
152+
153+
You can either create single sessions or multiple-sessions to every Elastic SAN volume based on your application's multi-threaded capabilities and performance requirements. To achieve higher IOPS and throughput to a volume and reach its maximum limits, use multiple sessions and adjust the queue depth and IO size as needed, if your workload allows.
154+
155+
For multi-session connections, install [Multipath I/O - for multi-session connectivity](#multipath-io---for-multi-session-connectivity).
156+
157+
### Multi-session configuration
145158

146159
To create multiple sessions to each volume, you must configure the target and connect to it multiple times, based on the number of sessions you want to that volume.
147160

@@ -213,7 +226,7 @@ foreach ($Target in $TargetConfig.Targets.Target)
213226

214227
Verify the number of sessions your volume has with either `iscsicli SessionList` or `mpclaim -s -d`
215228

216-
## Single-session configuration
229+
### Single-session configuration
217230

218231
Replace **yourStorageTargetIQN**, **yourStorageTargetPortalHostName**, and **yourStorageTargetPortalPort** with the values you kept, then run the following commands from your compute client to connect an Elastic SAN volume. If you'd like to modify these commands, run `iscsicli commandHere -?` for information on the command and its parameters.
219232

articles/storage/elastic-san/elastic-san-networking.md

Lines changed: 33 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: An overview of Azure Elastic SAN (preview), a service that enables
44
author: roygara
55
ms.service: storage
66
ms.topic: how-to
7-
ms.date: 10/24/2022
7+
ms.date: 10/25/2022
88
ms.author: rogarana
99
ms.subservice: elastic-san
1010
ms.custom: ignite-2022
@@ -23,14 +23,41 @@ Each volume group supports up to 200 virtual network rules.
2323
> [!IMPORTANT]
2424
> If you delete a subnet that has been included in a network rule, it will be removed from the network rules for the volume group. If you create a new subnet with the same name, it won't have access to the volume group. To allow access, you must explicitly authorize the new subnet in the network rules for the volume group.
2525
26-
## Required permissions
26+
## Enable Storage service endpoint
2727

28-
To enable service point for Azure Storage, the user must have the appropriate permissions for the virtual network. This operation can be performed by a user that has been given permission to the Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action [Azure resource provider operation](../../role-based-access-control/resource-provider-operations.md#microsoftnetwork) via a custom Azure role.
29-
30-
An Elastic SAN and the virtual networks granted access may be in different subscriptions, including subscriptions that are a part of a different Azure AD tenant.
28+
In your virtual network, enable the Storage service endpoint on your subnet. This ensures traffic is routed optimally to your Elastic SAN. To enable service point for Azure Storage, you must have the appropriate permissions for the virtual network. This operation can be performed by a user that has been given permission to the Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action [Azure resource provider operation](../../role-based-access-control/resource-provider-operations.md#microsoftnetwork) via a custom Azure role. An Elastic SAN and the virtual networks granted access may be in different subscriptions, including subscriptions that are a part of a different Azure AD tenant.
3129

3230
> [!NOTE]
33-
> Configuration of rules that grant access to subnets in virtual networks that are a part of a different Azure Active Directory tenant are currently only supported through PowerShell, CLI and REST APIs. Such rules cannot be configured through the Azure portal, though they may be viewed in the portal.
31+
> Configuration of rules that grant access to subnets in virtual networks that are a part of a different Azure Active Directory tenant are currently only supported through PowerShell, CLI and REST APIs. These rules cannot be configured through the Azure portal, though they may be viewed in the portal.
32+
33+
# [Portal](#tab/azure-portal)
34+
35+
1. Navigate to your virtual network and select **Service Endpoints**.
36+
1. Select **+ Add** and for **Service** select **Microsoft.Storage**.
37+
1. Select any policies you like, and the subnet you deploy your Elastic SAN into and select **Add**.
38+
39+
:::image type="content" source="media/elastic-san-create/elastic-san-service-endpoint.png" alt-text="Screenshot of the virtual network service endpoint page, adding the storage service endpoint." lightbox="media/elastic-san-create/elastic-san-service-endpoint.png":::
40+
41+
# [PowerShell](#tab/azure-powershell)
42+
43+
```powershell
44+
$resourceGroupName = "yourResourceGroup"
45+
$vnetName = "yourVirtualNetwork"
46+
$subnetName = "yourSubnet"
47+
48+
$virtualNetwork = Get-AzVirtualNetwork -ResourceGroupName $resourceGroupName -Name $vnetName
49+
50+
$subnet = Get-AzVirtualNetworkSubnetConfig -VirtualNetwork $virtualNetwork -Name $subnetName
51+
52+
$virtualNetwork | Set-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix $subnet.AddressPrefix -ServiceEndpoint "Microsoft.Storage" | Set-AzVirtualNetwork
53+
```
54+
55+
# [Azure CLI](#tab/azure-cli)
56+
57+
```azurecli
58+
az network vnet subnet update --resource-group "myresourcegroup" --vnet-name "myvnet" --name "mysubnet" --service-endpoints "Microsoft.Storage"
59+
```
60+
---
3461

3562
## Available virtual network regions
3663

articles/virtual-machines/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -455,8 +455,8 @@
455455
- name: Windows client images
456456
displayName: Windows, Client, find
457457
href: ./windows/client-images.md
458-
- name: Windows 10 images
459-
displayName: MTHR, multi-tenant, multitenant, hosting, rights, windows 10, windows, find
458+
- name: Windows 11 images
459+
displayName: MTHR, multi-tenant, multitenant, hosting, rights, windows 10, windows 11, find
460460
href: ./windows/windows-desktop-multitenant-hosting-deployment.md
461461
- name: Linux custom images
462462
items:

0 commit comments

Comments
 (0)