Skip to content

Commit 8751e4c

Browse files
authored
Merge pull request #286535 from ankitaduttaMSFT/incub2
Incubation conceptual set 2
2 parents 30c7cf5 + 9515f26 commit 8751e4c

8 files changed

+56
-61
lines changed

articles/site-recovery/azure-stack-site-recovery.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Replicate Azure Stack VMs to Azure using Azure Site Recovery
33
description: Learn how to set up disaster recovery to Azure for Azure Stack VMs with the Azure Site Recovery service.
4-
ms.topic: conceptual
5-
ms.date: 02/20/2024
4+
ms.topic: how-to
5+
ms.date: 09/11/2024
66
ms.author: ankitadutta
77
ms.custom: engagement-fy23
88
ms.service: azure-site-recovery

articles/site-recovery/azure-to-azure-about-networking.md

Lines changed: 17 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -2,28 +2,27 @@
22
title: About networking in Azure VM disaster recovery with Azure Site Recovery
33
description: Provides an overview of networking for replication of Azure VMs using Azure Site Recovery.
44
author: ankitaduttaMSFT
5-
manager: rochakm
65
ms.service: azure-site-recovery
7-
ms.topic: conceptual
8-
ms.date: 11/21/2021
6+
ms.topic: how-to
7+
ms.date: 09/11/2024
98
ms.author: ankitadutta
109
ms.custom: engagement-fy23
1110
---
12-
# About networking in Azure VM disaster recovery
11+
# About networking in Azure virtual machine disaster recovery
1312

1413

1514

16-
This article provides networking guidance for platform connectivity when you're replicating Azure VMs from one region to another, using [Azure Site Recovery](site-recovery-overview.md).
15+
This article provides networking guidance for platform connectivity when you're replicating Azure virtual machines from one region to another, using [Azure Site Recovery](site-recovery-overview.md).
1716

1817
## Before you start
1918

2019
Learn how Site Recovery provides disaster recovery for [this scenario](azure-to-azure-architecture.md).
2120

2221
## Typical network infrastructure
2322

24-
The following diagram depicts a typical Azure environment, for applications running on Azure VMs:
23+
The following diagram depicts a typical Azure environment, for applications running on Azure virtual machines:
2524

26-
![Diagram that depicts a typical Azure environment for applications running on Azure VMs.](./media/site-recovery-azure-to-azure-architecture/source-environment.png)
25+
![Diagram that depicts a typical Azure environment for applications running on Azure virtual machines.](./media/site-recovery-azure-to-azure-architecture/source-environment.png)
2726

2827
If you're using Azure ExpressRoute or a VPN connection from your on-premises network to Azure, the environment is as follows:
2928

@@ -44,24 +43,24 @@ If you're using a URL-based firewall proxy to control outbound connectivity, all
4443

4544
**URL** | **Details**
4645
--- | ---
47-
*.blob.core.windows.net | Required so that data can be written to the cache storage account in the source region from the VM. If you know all the cache storage accounts for your VMs, you can allow access to the specific storage account URLs (Ex: cache1.blob.core.windows.net and cache2.blob.core.windows.net) instead of *.blob.core.windows.net
46+
*.blob.core.windows.net | Required so that data can be written to the cache storage account in the source region from the virtual machine. If you know all the cache storage accounts for your virtual machines, you can allow access to the specific storage account URLs (Ex: cache1.blob.core.windows.net and cache2.blob.core.windows.net) instead of *.blob.core.windows.net
4847
login.microsoftonline.com | Required for authorization and authentication to the Site Recovery service URLs.
49-
*.hypervrecoverymanager.windowsazure.com | Required so that the Site Recovery service communication can occur from the VM.
50-
*.servicebus.windows.net | Required so that the Site Recovery monitoring and diagnostics data can be written from the VM.
48+
*.hypervrecoverymanager.windowsazure.com | Required so that the Site Recovery service communication can occur from the virtual machine.
49+
*.servicebus.windows.net | Required so that the Site Recovery monitoring and diagnostics data can be written from the virtual machine.
5150
*.vault.azure.net | Allows access to enable replication for ADE-enabled virtual machines via portal
5251
*.automation.ext.azure.com | Allows enabling autoupgrade of mobility agent for a replicated item via portal
5352

5453
## Outbound connectivity using Service Tags
5554

5655
Apart from controlling URLs, you can also use service tags to control connectivity. To do so, you must first create a [Network Security Group](../virtual-network/network-security-group-how-it-works.md) in Azure. Once created, you need to use our existing service tags and create an NSG rule to allow access to Azure Site Recovery services.
5756

58-
The advantages of using service tags to control connectivity, when compared to controlling connectivity using IP addresses, is that there is no hard dependency on a particular IP address to stay connected to our services. In such a scenario, if the IP address of one of our services changes, then the ongoing replication is not impacted for your machines. Whereas, a dependency on hard coded IP addresses causes the replication status to become critical and put your systems at risk. Moreover, service tags ensure better security, stability and resiliency than hard coded IP addresses.
57+
The advantages of using service tags to control connectivity, when compared to controlling connectivity using IP addresses, is that there's no hard dependency on a particular IP address to stay connected to our services. In such a scenario, if the IP address of one of our services changes, then the ongoing replication isn't impacted for your machines. Whereas, a dependency on hard coded IP addresses causes the replication status to become critical and put your systems at risk. Moreover, service tags ensure better security, stability and resiliency than hard coded IP addresses.
5958

6059
While using NSG to control outbound connectivity, these service tags need to be allowed.
6160

6261
- For the storage accounts in source region:
6362
- Create a [Storage service tag](../virtual-network/network-security-groups-overview.md#service-tags) based NSG rule for the source region.
64-
- Allow these addresses so that data can be written to the cache storage account, from the VM.
63+
- Allow these addresses so that data can be written to the cache storage account, from the virtual machine.
6564
- Create a [Microsoft Entra service tag](../virtual-network/network-security-groups-overview.md#service-tags) based NSG rule for allowing access to all IP addresses corresponding to Microsoft Entra ID
6665
- Create an EventsHub service tag-based NSG rule for the target region, allowing access to Site Recovery monitoring.
6766
- Create an Azure Site Recovery service tag-based NSG rule for allowing access to Site Recovery service in any region.
@@ -71,10 +70,10 @@ While using NSG to control outbound connectivity, these service tags need to be
7170

7271
## Example NSG configuration
7372

74-
This example shows how to configure NSG rules for a VM to replicate.
73+
This example shows how to configure NSG rules for a virtual machine to replicate.
7574

7675
- If you're using NSG rules to control outbound connectivity, use "Allow HTTPS outbound" rules to port:443 for all the required IP address ranges.
77-
- The example presumes that the VM source location is "East US" and the target location is "Central US".
76+
- The example presumes that the virtual machine source location is "East US" and the target location is "Central US".
7877

7978
### NSG rules - East US
8079

@@ -104,18 +103,18 @@ These rules are required so that replication can be enabled from the target regi
104103

105104
## Network virtual appliance configuration
106105

107-
If you're using network virtual appliances (NVAs) to control outbound network traffic from VMs, the appliance might get throttled if all the replication traffic passes through the NVA. We recommend creating a network service endpoint in your virtual network for "Storage" so that the replication traffic doesn't go to the NVA.
106+
If you're using network virtual appliances (NVAs) to control outbound network traffic from virtual machines, the appliance might get throttled if all the replication traffic passes through the NVA. We recommend creating a network service endpoint in your virtual network for "Storage" so that the replication traffic doesn't go to the NVA.
108107

109108
### Create network service endpoint for Storage
110109

111110
You can create a network service endpoint in your virtual network for "Storage" so that the replication traffic doesn't leave Azure boundary.
112111

113-
- Select your Azure virtual network and click on 'Service endpoints'
112+
- Select your Azure virtual network and select **Service endpoints**.
114113

115114
![storage-endpoint](./media/azure-to-azure-about-networking/storage-service-endpoint.png)
116115

117-
- Click 'Add' and 'Add service endpoints' tab opens
118-
- Select 'Microsoft.Storage' under 'Service' and the required subnets under 'Subnets' field and click 'Add'
116+
- Select **Add** and **Add service endpoints** tab opens.
117+
- Select *Microsoft.Storage* under **Service** and the required subnets under 'Subnets' field and select **Add**.
119118

120119
>[!NOTE]
121120
>If you're using firewall enabled cache storage account or target storage account, ensure you ['Allow trusted Microsoft services'](../storage/common/storage-network-security.md). Also, ensure that you allow access to at least one subnet of source Vnet.

articles/site-recovery/azure-to-azure-common-questions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article answers common questions about Azure virtual machine d
44
ms.author: ankitadutta
55
author: ankitaduttaMSFT
66
manager: rochakm
7-
ms.date: 08/30/2024
7+
ms.date: 09/16/2024
88
ms.topic: conceptual
99
ms.service: azure-site-recovery
1010

@@ -268,7 +268,7 @@ Yes. By default, when you enable disaster recovery for Azure virtual machines, S
268268

269269
Site Recovery tries to provide the IP address at the time of failover. If another virtual machine uses that address, Site Recovery sets the next available IP address as the target.
270270

271-
[Learn more about](azure-to-azure-network-mapping.md#set-up-ip-addressing-for-target-vms) setting up network mapping and IP addressing for virtual networks.
271+
[Learn more about](azure-to-azure-network-mapping.md#set-up-ip-addressing-for-target-virtual-machines) setting up network mapping and IP addressing for virtual networks.
272272

273273
### What's the *Latest* recovery point?
274274

Lines changed: 23 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,10 @@
11
---
22
title: Map virtual networks between two regions in Azure Site Recovery
3-
description: Learn about mapping virtual networks between two Azure regions for Azure VM disaster recovery with Azure Site Recovery.
3+
description: Learn about mapping virtual networks between two Azure regions for Azure virtual machine disaster recovery with Azure Site Recovery.
44
author: ankitaduttaMSFT
5-
manager: rochakm
65
ms.service: azure-site-recovery
7-
ms.topic: conceptual
8-
ms.date: 08/31/2023
6+
ms.topic: how-to
7+
ms.date: 09/11/2024
98
ms.author: ankitadutta
109
ms.custom: engagement-fy23
1110

@@ -29,74 +28,74 @@ Map networks as follows:
2928

3029
:::image type="content" source="./media/site-recovery-network-mapping-azure-to-azure/network-mapping1.png" alt-text="Screenshot of Create a network mapping." lightbox="./media/site-recovery-network-mapping-azure-to-azure/network-mapping1.png":::
3130

32-
3. In **Add network mapping**, select the source and target locations. In our example, the source VM is running in the East Asia region, and replicates to the Southeast Asia region.
31+
3. In **Add network mapping**, select the source and target locations. In our example, the source virtual machine is running in the East Asia region, and replicates to the Southeast Asia region.
3332

3433
:::image type="content" source="./media/site-recovery-network-mapping-azure-to-azure/network-mapping2.png" alt-text="Screenshot of Select source and target." lightbox="./media/site-recovery-network-mapping-azure-to-azure/network-mapping2.png":::
35-
3. Now create a network mapping in the opposite direction. In our example, the source will now be Southeast Asia, and the target will be East Asia.
34+
3. Now create a network mapping in the opposite direction. In our example, the source is now Southeast Asia, and the target is East Asia.
3635

3736
:::image type="content" source="./media/site-recovery-network-mapping-azure-to-azure/network-mapping3.png" alt-text="Screenshot of Add network mapping pane - Select source and target locations for the target network." lightbox="./media/site-recovery-network-mapping-azure-to-azure/network-mapping3.png":::
3837

3938

4039
## Map networks when you enable replication
4140

42-
If you haven't prepared network mapping before you configure disaster recovery for Azure VMs, you can specify a target network when you [set up and enable replication](azure-to-azure-how-to-enable-replication.md). When you do this the following happens:
41+
If you haven't prepared network mapping before you configure disaster recovery for Azure virtual machines, you can specify a target network when you [set up and enable replication](azure-to-azure-how-to-enable-replication.md). When you do this, the following happens:
4342

4443
- Based on the target you select, Site Recovery automatically creates network mappings from the source to target region, and from the target to source region.
4544
- By default, Site Recovery creates a network in the target region that's identical to the source network. Site Recovery adds **-asr** as a suffix to the name of the target network. You can customize the target network. For example, if the source network name was *contoso-vnet*, then the target network is named *contoso-vnet-asr*.
4645

47-
So, if the source network name was "contoso-vnet", then the target network name will be "contoso-vnet-asr". Source network's name will not be edited by ASR.
48-
- If network mapping has already occurred for a source network, the mapped target network will always be the default at the time of enabling replications for more VMs. You can choose to change the target virtual network by choosing other available options from the dropdown.
46+
So, if the source network name was "contoso-vnet", then the target network name is `contoso-vnet-asr`. Source network's name won't be edited by Azure Site Recovery.
47+
- If network mapping has already occurred for a source network, the mapped target network is always the default at the time of enabling replications for more virtual machines. You can choose to change the target virtual network by choosing other available options from the dropdown.
4948
- To change the default target virtual network for new replications, you need to modify the existing network mapping.
5049
- If you wish to modify a network mapping from region A to region B, ensure that you first delete the network mapping from region B to region A. After reverse mapping deletion, modify the network mapping from region A to region B and then create the relevant reverse mapping.
5150

5251
>[!NOTE]
53-
>* Modifying the network mapping only changes the defaults for new VM replications. It does not impact the target virtual network selections for existing replications.
52+
>* Modifying the network mapping only changes the defaults for new virtual machine replications. It does not impact the target virtual network selections for existing replications.
5453
>* If you wish to modify the target network for an existing replication, go to **Network** Settings of the replicated item.
5554
5655
## Specify a subnet
5756

58-
The subnet of the target VM is selected based on the name of the subnet of the source VM.
57+
The subnet of the target virtual machine is selected based on the name of the subnet of the source virtual machine.
5958

60-
- If a subnet with the same name as the source VM subnet is available in the target network, that subnet is set for the target VM.
59+
- If a subnet with the same name as the source virtual machine subnet is available in the target network, that subnet is set for the target virtual machine.
6160
- If a subnet with the same name doesn't exist in the target network, the first subnet in the alphabetical order is set as the target subnet.
62-
- You can modify the target subnet in the **Network** settings for the VM.
61+
- You can modify the target subnet in the **Network** settings for the virtual machine.
6362

6463
:::image type="content" source="./media/site-recovery-network-mapping-azure-to-azure/modify-subnet.png" alt-text="Screenshot of Network compute properties window." lightbox="./media/site-recovery-network-mapping-azure-to-azure/modify-subnet.png":::
6564

66-
## Set up IP addressing for target VMs
65+
## Set up IP addressing for target virtual machines
6766

6867
The IP address for each NIC on a target virtual machine is configured as follows:
6968

70-
- **DHCP**: If the NIC of the source VM uses DHCP, the NIC of the target VM is also set to use DHCP.
71-
- **Static IP address**: If the NIC of the source VM uses static IP addressing, the target VM NIC will also use a static IP address.
69+
- **DHCP**: If the NIC of the source virtual machine uses DHCP, the NIC of the target virtual machine is also set to use DHCP.
70+
- **Static IP address**: If the NIC of the source virtual machine uses static IP addressing, the target virtual machine NIC also uses a static IP address.
7271

7372
The same holds for the Secondary IP Configurations as well.
7473

7574
## IP address assignment during failover
7675

7776
>[!Note]
78-
>The following approach is used to assign IP address to the target VM, irrespective of the NIC settings.
77+
>The following approach is used to assign IP address to the target virtual machine, irrespective of the NIC settings.
7978
8079
**Source and target subnets** | **Details**
8180
--- | ---
82-
Same address space | IP address of the source VM NIC is set as the target VM NIC IP address.<br/><br/> If the address isn't available, the next available IP address is set as the target.
83-
Different address space | The next available IP address in the target subnet is set as the target VM NIC address.
81+
Same address space | IP address of the source virtual machine NIC is set as the target virtual machine NIC IP address.<br/><br/> If the address isn't available, the next available IP address is set as the target.
82+
Different address space | The next available IP address in the target subnet is set as the target virtual machine NIC address.
8483

8584

8685

8786
## IP address assignment during test failover
8887

8988
**Target network** | **Details**
9089
--- | ---
91-
Target network is the failover VNet | - Target IP address will be static with the same IP address. <br/><br/> - If the same IP address is already assigned, then the IP address is the next one available at the end of the subnet range. For example: If the source IP address is 10.0.0.19 and failover network uses range 10.0.0.0/24, then the next IP address assigned to the target VM is 10.0.0.254.
92-
Target network isn't the failover VNet | - Target IP address will be static with the same IP address, only if it is available in the target virtual network. <br/><br/> - If the same IP address is already assigned, then the IP address is the next one available at the end of the subnet range.<br/><br/> For example: If the source static IP address is 10.0.0.19 and failover is on a network that isn't the failover network, with the range 10.0.0.0/24, then the target static IP address will be 10.0.0.19 if available, and otherwise it will be 10.0.0.254.
90+
Target network is the failover VNet | - Target IP address is static with the same IP address. <br/><br/> - If the same IP address is already assigned, then the IP address is the next one available at the end of the subnet range. For example: If the source IP address is `10.0.0.19` and failover network uses range `10.0.0.0/24`, then the next IP address assigned to the target virtual machine is `10.0.0.254`.
91+
Target network isn't the failover VNet | - Target IP address is static with the same IP address, only if it's available in the target virtual network. <br/><br/> - If the same IP address is already assigned, then the IP address is the next one available at the end of the subnet range.<br/><br/> For example: If the source static IP address is `10.0.0.19` and failover is on a network that isn't the failover network, with the range `10.0.0.0/24`, then the target static IP address is `10.0.0.19` if available. Otherwise it is `10.0.0.254`.
9392

9493
- The failover VNet is the target network that you select when you set up disaster recovery.
95-
- We recommend that you always use a non-production network for test failover.
96-
- You can modify the target IP address in the **Network** settings of the VM.
94+
- We recommend that you always use a nonproduction network for test failover.
95+
- You can modify the target IP address in the **Network** settings of the virtual machine.
9796

9897

9998
## Next steps
10099

101-
- Review [networking guidance](./azure-to-azure-about-networking.md) for Azure VM disaster recovery.
100+
- Review [networking guidance](./azure-to-azure-about-networking.md) for Azure virtual machine disaster recovery.
102101
- [Learn more](site-recovery-retain-ip-azure-vm-failover.md) about retaining IP addresses after failover.

0 commit comments

Comments
 (0)