You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/management/relocation/relocation-firewall.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,16 +13,16 @@ This article shows you how to relocate an Azure Firewall that protects an Azure
13
13
14
14
## Prerequisites
15
15
16
-
- We highly recommend that you use Premium SKU. If you are on Standard SKU, consider [migrating from an existing Standard SKU Azure Firewall to Premium SKU](/azure/firewall-manager/migrate-to-policy) before you being relocation.
16
+
- We highly recommend that you use Premium SKU. If you are on Standard SKU, consider [migrating from an existing Standard SKU Azure Firewall to Premium SKU](/azure/firewall-manager/migrate-to-policy) before relocation.
17
17
- The following information must be collected in order to properly plan and execute an Azure Firewall relocation:
18
18
19
19
-**Deployment model.***Classic Firewall Rules* or *Firewall policy*.
20
20
-**Firewall policy name.** (If *Firewall policy* deployment model is used).
21
21
-**Diagnostic setting at the firewall instance level.** (If Log Analytics workspace is used).
22
-
-**TLS (Transport Layer Security) Inspection configuration.**: (If Azure Key Vault, Certificate and Managed Identity is used.)
22
+
-**TLS (Transport Layer Security) Inspection configuration.**: (If Azure Key Vault, Certificate and Managed Identity are used.)
23
23
-**Public IP control.** Assess that any external identity relying on Azure Firewall public IP remains fixed and trusted.
24
24
25
-
- Azure Firewall Standard and Premium tiers have the following dependencies that you may need to be deploy in the target region:
25
+
- Azure Firewall Standard and Premium tiers have the following dependencies that can be deployed in the target region:
@@ -86,7 +86,7 @@ To prepare for relocation, you need to first export and modify the template from
86
86
87
87
### Modify template
88
88
89
-
In this section, you learn how to modify the template that you generated in the previous section.
89
+
In this section, you learn how to modify the template that you generated in the previous section.
90
90
91
91
If you're running classic firewall rules without Firewall policy, migrate to Firewall policy before proceeding with the steps in this section. To learn how to migrate from classic firewall rules to Firewall policy, see [Migrate Azure Firewall configuration to Azure Firewall policy using PowerShell](/azure/firewall-manager/migrate-to-policy).
92
92
@@ -95,7 +95,7 @@ If you're running classic firewall rules without Firewall policy, migrate to Fir
95
95
1. Sign in to the [Azure portal](https://portal.azure.com).
96
96
1. If you're using Premium SKU with TLS Inspection enabled,
97
97
98
-
1. [Relocate the key vault](./relocation-key-vault.md) that's used for TLS inspection into the new target region. Then, follow [the procedures](../../../application-gateway/key-vault-certs.md) to move certificates or generate new certificates for TLS inspection into the new key vault in the target region.
98
+
1. [Relocate the key vault](./relocation-key-vault.md) that's used for TLS inspection into the new target region. Then, follow [the procedures](../../../application-gateway/key-vault-certs.md) to move certificates or generate new certificates for TLS inspection into the new key vault in the target region.
99
99
1. [Relocate managed identity](/entra/identity/managed-identities-azure-resources/how-to-managed-identity-regional-move) into the new target region. Reassign the corresponding roles for the key vault in the target region and subscription.
100
100
101
101
1. In the Azure portal, select **Create a resource**.
@@ -112,15 +112,15 @@ If you're running classic firewall rules without Firewall policy, migrate to Fir
112
112
113
113
1. [Create a new firewall policy](/azure/firewall-manager/create-policy-powershell) using the configuration of the source region and reflect changes introduced by the new target region (IP Address Ranges, Public IP, Rule Collections).
114
114
1. If you're using Premium SKU and you want to enable TLS Inspection, update the newly created firewall policy and enable TLS inspection by following [the instructions here](https://techcommunity.microsoft.com/t5/azure-network-security-blog/building-a-poc-for-tls-inspection-in-azure-firewall/ba-p/3676723).
115
-
1. Review and update the configuration for the topics below to reflect the changes required for the target region.
115
+
1. Review and update the following settings to reflect the changes required for the target region.
116
116
117
117
- **IP Groups.** To include IP addresses from the target region, if different from the source, *IP Groups* should be reviewed. The IP addresses included in the groups must be modified.
118
118
- **Zones.** Configure the [availability Zones (AZ)](../../../reliability/availability-zones-overview.md) in the target region.
119
119
- **Forced Tunneling.** [Ensure that you've relocated the virtual network](./relocation-virtual-network.md) and that the firewall *Management Subnet* is present before the Azure Firewall is relocated. Update the IP Address in the target region of the Network Virtual Appliance (NVA) to which the Azure Firewall should redirect the traffic, in the User Defined Route (UDR).
120
-
- **DNS.** Review IP Addresses for your custom custom *DNS Servers* to reflect your target region. If the *DNS Proxy* feature is enabled, be sure to configure your virtual network DNS server settings and set the Azure Firewall's private IP address as a *Custom DNS server*.
120
+
- **DNS.** Review IP Addresses for your custom *DNS Servers* to reflect your target region. If the *DNS Proxy* feature is enabled, be sure to configure your virtual network DNS server settings and set the Azure Firewall's private IP address as a *Custom DNS server*.
121
121
- **Private IP ranges (SNAT).** - If custom ranges are defined for SNAT, it's recommended that you review and eventually adjust to include the target region address space.
122
-
- **Tags.** - Verify and eventually update any tag that may reflect or refer to the new firewall location.
123
-
- **Diagnostic Settings.** When recreating the Azure Firewall in the target region, be sure to review the *Diagnostic Setting* adn configure it to reflect the target region (Log Analytics workspace, storage account, Event Hub, or 3rd-party partner solution).
122
+
- **Tags.** - Verify and update any tags that reflect or refer to the new firewall location.
123
+
- **Diagnostic Settings.** When recreating the Azure Firewall in the target region, be sure to review the *Diagnostic Setting* and configure it to reflect the target region (Log Analytics workspace, storage account, event hubs, or 3rd-party partner solution).
124
124
125
125
1. Edit the `location` property in the `template.json` file to the target region (The following example sets the target region to `centralus`.):
126
126
@@ -133,7 +133,7 @@ If you're running classic firewall rules without Firewall policy, migrate to Fir
133
133
"location": "centralus",}]
134
134
```
135
135
136
-
To find the location code for your target region, see [Data residency in Azure](https://azure.microsoft.com/explore/global-infrastructure/data-residency/#overview).
136
+
To find the location code for your target region, see [Data residency in Azure](https://azure.microsoft.com/explore/global-infrastructure/data-residency/#overview).
137
137
138
138
1. Save the `template.json` file.
139
139
@@ -153,15 +153,15 @@ To find the location code for your target region, see [Data residency in Azure](
153
153
- `firewallPolicy.id` with your policy ID.
154
154
155
155
1. [Create a new firewall policy](/azure/firewall-manager/create-policy-powershell) using the configuration of the source region and reflect changes introduced by the new target region (IP Address Ranges, Public IP, Rule Collections).
156
-
1. Review and update the configuration for the topics below to reflect the changes required for the target region.
156
+
1. Review and update the following properties to reflect the changes required for the target region.
157
157
158
158
- **IP Groups.** To include IP addresses from the target region, if different from the source, *IP Groups* should be reviewed. The IP addresses included in the groups must be modified.
159
159
- **Zones.** Configure the [availability Zones (AZ)](../../../reliability/availability-zones-overview.md) in the target region.
160
160
- **Forced Tunneling.** [Ensure that you've relocated the virtual network](./relocation-virtual-network.md) and that the firewall *Management Subnet* is present before the Azure Firewall is relocated. Update the IP Address in the target region of the Network Virtual Appliance (NVA) to which the Azure Firewall should redirect the traffic, in the User Defined Route (UDR).
161
-
- **DNS.** Review IP Addresses for your custom custom *DNS Servers* to reflect your target region. If the *DNS Proxy* feature is enabled, be sure to configure your virtual network DNS server settings and set the Azure Firewall's private IP address as a *Custom DNS server*.
161
+
- **DNS.** Review IP Addresses for your custom *DNS Servers* to reflect your target region. If the *DNS Proxy* feature is enabled, be sure to configure your virtual network DNS server settings and set the Azure Firewall's private IP address as a *Custom DNS server*.
162
162
- **Private IP ranges (SNAT).** - If custom ranges are defined for SNAT, it's recommended that you review and eventually adjust to include the target region address space.
163
-
- **Tags.** - Verify and eventually update any tag that may reflect or refer to the new firewall location.
164
-
- **Diagnostic Settings.** When recreating the Azure Firewall in the target region, be sure to review the *Diagnostic Setting* adn configure it to reflect the target region (Log Analytics workspace, storage account, Event Hub, or 3rd-party partner solution).
163
+
- **Tags.** - Verify and update any tags that reflect or refer to the new firewall location.
164
+
- **Diagnostic Settings.** When recreating the Azure Firewall in the target region, be sure to review the *Diagnostic Setting* and configure it to reflect the target region (Log Analytics workspace, storage account, event hub, or 3rd-party partner solution).
165
165
166
166
1. Edit the `location` property in the `template.json` file to the target region (The following example sets the target region to `centralus`.):
1. Configure the clients to point to the target server.
114
114
1. Perform functional tests on the applications.
115
+
115
116
1. Ensure that the `ignoreMissingVnetServiceEndpoint` flag is set to `False`, so the IaC fails to deploy the database when the service endpoint isn't configured in the target region.
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/management/relocation/relocation-private-link.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ Identify all resources that are used by Private Link Service, such as Standard l
26
26
27
27
1. Redeploy all resources that are used by Private Link Service.
28
28
1. Ensure that a standard load balancer with all dependent resources is relocated to the target region.
29
-
1. Create a Private Link Service that references the relocated load balancer. To create the Private Link, you can use the [Azure Portal](/azure/private-link/create-private-link-service-portal), [PowerShell](/azure/private-link/create-private-link-service-powershell), or [Azure CLI](/azure/private-link/create-private-link-service-cli).
29
+
1. Create a Private Link Service that references the relocated load balancer. To create the Private Link, you can use the [Azure portal](/azure/private-link/create-private-link-service-portal), [PowerShell](/azure/private-link/create-private-link-service-powershell), or [Azure CLI](/azure/private-link/create-private-link-service-cli).
30
30
31
31
In the load balancer selection process:
32
32
- Choose the frontend IP configuration where you want to receive the traffic.
Copy file name to clipboardExpand all lines: articles/stream-analytics/move-cluster.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,10 +19,10 @@ You can move a Stream Analytics cluster by exporting the cluster’s ARM templat
19
19
You must have the Azure Az PowerShell module installed on your machine to complete this procedure. Install the [latest version of PowerShell](/powershell/scripting/install/installing-powershell) available for your operating system.
20
20
21
21
1. Open Azure Portal.
22
-
1. Select the resource group that contains the Stream Analytics cluster you want to move.
22
+
1. Select the resource group that contains the Stream Analytics cluster you want to move.
23
23
1. Select the Azure Stream Analytics resource you want to move and then click **Export template**.
24
24
25
-
:::image type="content" source="./media/move-cluster/export-template.png" alt-text="Screenshot of Azure Portal, with Stream Analytics resource selected, and the Export Template button highlighted at upper right" lightbox="./media/move-cluster/export-template.png":::
25
+
:::image type="content" source="./media/move-cluster/export-template.png" alt-text="Screenshot of Azure Portal, with Stream Analytics resource selected, and the Export Template button highlighted at upper right." lightbox="./media/move-cluster/export-template.png":::
26
26
27
27
1. Decompress the file and save the template to your local drive.
28
28
1. Sign in to Azure PowerShell using your Azure credentials.
0 commit comments