Skip to content

Commit 7973c95

Browse files
committed
update
1 parent 21246a8 commit 7973c95

File tree

4 files changed

+26
-25
lines changed

4 files changed

+26
-25
lines changed

articles/azure-resource-manager/management/relocation/relocation-firewall.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -13,16 +13,16 @@ This article shows you how to relocate an Azure Firewall that protects an Azure
1313

1414
## Prerequisites
1515

16-
- We highly recommend that you use Premium SKU. If you are on Standard SKU, consider [migrating from an existing Standard SKU Azure Firewall to Premium SKU](/azure/firewall-manager/migrate-to-policy) before you being relocation.
16+
- We highly recommend that you use Premium SKU. If you are on Standard SKU, consider [migrating from an existing Standard SKU Azure Firewall to Premium SKU](/azure/firewall-manager/migrate-to-policy) before relocation.
1717
- The following information must be collected in order to properly plan and execute an Azure Firewall relocation:
1818

1919
- **Deployment model.** *Classic Firewall Rules* or *Firewall policy*.
2020
- **Firewall policy name.** (If *Firewall policy* deployment model is used).
2121
- **Diagnostic setting at the firewall instance level.** (If Log Analytics workspace is used).
22-
- **TLS (Transport Layer Security) Inspection configuration.**: (If Azure Key Vault, Certificate and Managed Identity is used.)
22+
- **TLS (Transport Layer Security) Inspection configuration.**: (If Azure Key Vault, Certificate and Managed Identity are used.)
2323
- **Public IP control.** Assess that any external identity relying on Azure Firewall public IP remains fixed and trusted.
2424

25-
- Azure Firewall Standard and Premium tiers have the following dependencies that you may need to be deploy in the target region:
25+
- Azure Firewall Standard and Premium tiers have the following dependencies that can be deployed in the target region:
2626

2727
- [Azure Virtual Network](./relocation-virtual-network.md)
2828
- (If used) [Log Analytics Workspace](./relocation-log-analytics.md)
@@ -86,7 +86,7 @@ To prepare for relocation, you need to first export and modify the template from
8686
8787
### Modify template
8888
89-
In this section, you learn how to modify the template that you generated in the previous section.
89+
In this section, you learn how to modify the template that you generated in the previous section.
9090
9191
If you're running classic firewall rules without Firewall policy, migrate to Firewall policy before proceeding with the steps in this section. To learn how to migrate from classic firewall rules to Firewall policy, see [Migrate Azure Firewall configuration to Azure Firewall policy using PowerShell](/azure/firewall-manager/migrate-to-policy).
9292
@@ -95,7 +95,7 @@ If you're running classic firewall rules without Firewall policy, migrate to Fir
9595
1. Sign in to the [Azure portal](https://portal.azure.com).
9696
1. If you're using Premium SKU with TLS Inspection enabled,
9797
98-
1. [Relocate the key vault](./relocation-key-vault.md) that's used for TLS inspection into the new target region. Then, follow [the procedures](../../../application-gateway/key-vault-certs.md) to move certificates or generate new certificates for TLS inspection into the new key vault in the target region.
98+
1. [Relocate the key vault](./relocation-key-vault.md) that's used for TLS inspection into the new target region. Then, follow [the procedures](../../../application-gateway/key-vault-certs.md) to move certificates or generate new certificates for TLS inspection into the new key vault in the target region.
9999
1. [Relocate managed identity](/entra/identity/managed-identities-azure-resources/how-to-managed-identity-regional-move) into the new target region. Reassign the corresponding roles for the key vault in the target region and subscription.
100100
101101
1. In the Azure portal, select **Create a resource**.
@@ -112,15 +112,15 @@ If you're running classic firewall rules without Firewall policy, migrate to Fir
112112
113113
1. [Create a new firewall policy](/azure/firewall-manager/create-policy-powershell) using the configuration of the source region and reflect changes introduced by the new target region (IP Address Ranges, Public IP, Rule Collections).
114114
1. If you're using Premium SKU and you want to enable TLS Inspection, update the newly created firewall policy and enable TLS inspection by following [the instructions here](https://techcommunity.microsoft.com/t5/azure-network-security-blog/building-a-poc-for-tls-inspection-in-azure-firewall/ba-p/3676723).
115-
1. Review and update the configuration for the topics below to reflect the changes required for the target region.
115+
1. Review and update the following settings to reflect the changes required for the target region.
116116
117117
- **IP Groups.** To include IP addresses from the target region, if different from the source, *IP Groups* should be reviewed. The IP addresses included in the groups must be modified.
118118
- **Zones.** Configure the [availability Zones (AZ)](../../../reliability/availability-zones-overview.md) in the target region.
119119
- **Forced Tunneling.** [Ensure that you've relocated the virtual network](./relocation-virtual-network.md) and that the firewall *Management Subnet* is present before the Azure Firewall is relocated. Update the IP Address in the target region of the Network Virtual Appliance (NVA) to which the Azure Firewall should redirect the traffic, in the User Defined Route (UDR).
120-
- **DNS.** Review IP Addresses for your custom custom *DNS Servers* to reflect your target region. If the *DNS Proxy* feature is enabled, be sure to configure your virtual network DNS server settings and set the Azure Firewall's private IP address as a *Custom DNS server*.
120+
- **DNS.** Review IP Addresses for your custom *DNS Servers* to reflect your target region. If the *DNS Proxy* feature is enabled, be sure to configure your virtual network DNS server settings and set the Azure Firewall's private IP address as a *Custom DNS server*.
121121
- **Private IP ranges (SNAT).** - If custom ranges are defined for SNAT, it's recommended that you review and eventually adjust to include the target region address space.
122-
- **Tags.** - Verify and eventually update any tag that may reflect or refer to the new firewall location.
123-
- **Diagnostic Settings.** When recreating the Azure Firewall in the target region, be sure to review the *Diagnostic Setting* adn configure it to reflect the target region (Log Analytics workspace, storage account, Event Hub, or 3rd-party partner solution).
122+
- **Tags.** - Verify and update any tags that reflect or refer to the new firewall location.
123+
- **Diagnostic Settings.** When recreating the Azure Firewall in the target region, be sure to review the *Diagnostic Setting* and configure it to reflect the target region (Log Analytics workspace, storage account, event hubs, or 3rd-party partner solution).
124124
125125
1. Edit the `location` property in the `template.json` file to the target region (The following example sets the target region to `centralus`.):
126126
@@ -133,7 +133,7 @@ If you're running classic firewall rules without Firewall policy, migrate to Fir
133133
"location": "centralus",}]
134134
```
135135
136-
To find the location code for your target region, see [Data residency in Azure](https://azure.microsoft.com/explore/global-infrastructure/data-residency/#overview).
136+
To find the location code for your target region, see [Data residency in Azure](https://azure.microsoft.com/explore/global-infrastructure/data-residency/#overview).
137137
138138
1. Save the `template.json` file.
139139
@@ -153,15 +153,15 @@ To find the location code for your target region, see [Data residency in Azure](
153153
- `firewallPolicy.id` with your policy ID.
154154
155155
1. [Create a new firewall policy](/azure/firewall-manager/create-policy-powershell) using the configuration of the source region and reflect changes introduced by the new target region (IP Address Ranges, Public IP, Rule Collections).
156-
1. Review and update the configuration for the topics below to reflect the changes required for the target region.
156+
1. Review and update the following properties to reflect the changes required for the target region.
157157
158158
- **IP Groups.** To include IP addresses from the target region, if different from the source, *IP Groups* should be reviewed. The IP addresses included in the groups must be modified.
159159
- **Zones.** Configure the [availability Zones (AZ)](../../../reliability/availability-zones-overview.md) in the target region.
160160
- **Forced Tunneling.** [Ensure that you've relocated the virtual network](./relocation-virtual-network.md) and that the firewall *Management Subnet* is present before the Azure Firewall is relocated. Update the IP Address in the target region of the Network Virtual Appliance (NVA) to which the Azure Firewall should redirect the traffic, in the User Defined Route (UDR).
161-
- **DNS.** Review IP Addresses for your custom custom *DNS Servers* to reflect your target region. If the *DNS Proxy* feature is enabled, be sure to configure your virtual network DNS server settings and set the Azure Firewall's private IP address as a *Custom DNS server*.
161+
- **DNS.** Review IP Addresses for your custom *DNS Servers* to reflect your target region. If the *DNS Proxy* feature is enabled, be sure to configure your virtual network DNS server settings and set the Azure Firewall's private IP address as a *Custom DNS server*.
162162
- **Private IP ranges (SNAT).** - If custom ranges are defined for SNAT, it's recommended that you review and eventually adjust to include the target region address space.
163-
- **Tags.** - Verify and eventually update any tag that may reflect or refer to the new firewall location.
164-
- **Diagnostic Settings.** When recreating the Azure Firewall in the target region, be sure to review the *Diagnostic Setting* adn configure it to reflect the target region (Log Analytics workspace, storage account, Event Hub, or 3rd-party partner solution).
163+
- **Tags.** - Verify and update any tags that reflect or refer to the new firewall location.
164+
- **Diagnostic Settings.** When recreating the Azure Firewall in the target region, be sure to review the *Diagnostic Setting* and configure it to reflect the target region (Log Analytics workspace, storage account, event hub, or 3rd-party partner solution).
165165
166166
1. Edit the `location` property in the `template.json` file to the target region (The following example sets the target region to `centralus`.):
167167

articles/azure-resource-manager/management/relocation/relocation-postgresql-flexible-server.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -100,18 +100,19 @@ Redeployment with data migration for Azure Database for PostgreSQL is based on l
100100
1. Stop all database activity on the source server.
101101
1. Replace credentials information, source server, target server, and database name in the following script:
102102
103-
```bash
104-
export USER=admin_username
105-
export PGPASSWORD=admin_password
106-
export SOURCE=pgsql-arpp-source.postgres.database.azure.com
107-
export TARGET=pgsql-arpp-target.postgres.database.azure.com
108-
export DATABASE=database_name
109-
pg_dump -h $SOURCE -U $USER --create --exclude-schema=pg_catalog $DATABASE | psql -h $TARGET -U $USER postgres
110-
```
103+
```bash
104+
export USER=admin_username
105+
export PGPASSWORD=admin_password
106+
export SOURCE=pgsql-arpp-source.postgres.database.azure.com
107+
export TARGET=pgsql-arpp-target.postgres.database.azure.com
108+
export DATABASE=database_name
109+
pg_dump -h $SOURCE -U $USER --create --exclude-schema=pg_catalog $DATABASE | psql -h $TARGET -U $USER postgres
110+
```
111111
112112
1. To migrate the database, run the script.
113113
1. Configure the clients to point to the target server.
114114
1. Perform functional tests on the applications.
115+
115116
1. Ensure that the `ignoreMissingVnetServiceEndpoint` flag is set to `False`, so the IaC fails to deploy the database when the service endpoint isn't configured in the target region.
116117
117118
## Related content

articles/azure-resource-manager/management/relocation/relocation-private-link.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Identify all resources that are used by Private Link Service, such as Standard l
2626

2727
1. Redeploy all resources that are used by Private Link Service.
2828
1. Ensure that a standard load balancer with all dependent resources is relocated to the target region.
29-
1. Create a Private Link Service that references the relocated load balancer. To create the Private Link, you can use the [Azure Portal](/azure/private-link/create-private-link-service-portal), [PowerShell](/azure/private-link/create-private-link-service-powershell), or [Azure CLI](/azure/private-link/create-private-link-service-cli).
29+
1. Create a Private Link Service that references the relocated load balancer. To create the Private Link, you can use the [Azure portal](/azure/private-link/create-private-link-service-portal), [PowerShell](/azure/private-link/create-private-link-service-powershell), or [Azure CLI](/azure/private-link/create-private-link-service-cli).
3030

3131
In the load balancer selection process:
3232
- Choose the frontend IP configuration where you want to receive the traffic.

articles/stream-analytics/move-cluster.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,10 @@ You can move a Stream Analytics cluster by exporting the cluster’s ARM templat
1919
You must have the Azure Az PowerShell module installed on your machine to complete this procedure. Install the [latest version of PowerShell](/powershell/scripting/install/installing-powershell) available for your operating system.
2020

2121
1. Open Azure Portal.
22-
1. Select the resource group that contains the Stream Analytics cluster you want to move.
22+
1. Select the resource group that contains the Stream Analytics cluster you want to move.
2323
1. Select the Azure Stream Analytics resource you want to move and then click **Export template**.
2424

25-
:::image type="content" source="./media/move-cluster/export-template.png" alt-text="Screenshot of Azure Portal, with Stream Analytics resource selected, and the Export Template button highlighted at upper right" lightbox="./media/move-cluster/export-template.png":::
25+
:::image type="content" source="./media/move-cluster/export-template.png" alt-text="Screenshot of Azure Portal, with Stream Analytics resource selected, and the Export Template button highlighted at upper right." lightbox="./media/move-cluster/export-template.png":::
2626

2727
1. Decompress the file and save the template to your local drive.
2828
1. Sign in to Azure PowerShell using your Azure credentials.

0 commit comments

Comments
 (0)