You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Understand the key capabilities of Azure VMware Solution software-defined data centers and VMware vSphere clusters.
4
4
ms.topic: conceptual
5
5
ms.service: azure-vmware
6
-
ms.date: 5/5/2024
6
+
ms.date: 5/25/2024
7
7
ms.custom: engagement-fy23
8
8
---
9
9
@@ -59,30 +59,32 @@ The Multi-AZ capability for Azure VMware Solution Stretched Clusters is also tag
59
59
60
60
| Azure region | Availability Zone | SKU | Multi-AZ SDDC |
61
61
| :--- | :---: | :---: | :---: |
62
-
| Australia East | AZ01 | AV36P | Yes |
62
+
| Australia East | AZ01 | AV36P, AV64| Yes |
63
63
| Australia East | AZ02 | AV36 | No |
64
-
| Australia East | AZ03 | AV36P | Yes |
64
+
| Australia East | AZ03 | AV36P, AV64| Yes |
65
65
| Australia South East | AZ01 | AV36 | No |
66
-
| Brazil South | AZ02 | AV36 | No |
66
+
| Brazil South | AZ02 |**AV36**| No |
67
67
| Canada Central | AZ02 | AV36, **AV36P**| No |
68
68
| Canada East | N/A | AV36 | No |
69
+
| Central India | AZ03 | AV36P | No |
69
70
| Central US | AZ01 | AV36P | No |
70
71
| Central US | AZ02 |**AV36**| No |
71
72
| Central US | AZ03 | AV36P | No |
72
73
| East Asia | AZ01 | AV36 | No |
73
-
| East US | AZ01 | AV36P | Yes |
74
-
| East US | AZ02 |**AV36P**| Yes |
75
-
| East US | AZ03 | AV36, AV36P, AV64 | Yes |
74
+
| East US | AZ01 |**AV36P**| Yes |
75
+
| East US | AZ02 |**AV36P**, AV64| Yes |
76
+
| East US | AZ03 |**AV36**, **AV36P**, AV64 | Yes |
76
77
| East US 2 | AZ01 |**AV36**, AV64 | No |
77
78
| East US 2 | AZ02 | AV36P, **AV52**, AV64 | No |
78
-
| France Central | AZ01 | AV36 | No |
79
+
| France Central | AZ01 |**AV36**| No |
79
80
| Germany West Central | AZ01 | AV36P | Yes |
80
-
| Germany West Central | AZ02 | AV36 | Yes |
81
-
| Germany West Central | AZ03 | AV36, AV36P | Yes |
81
+
| Germany West Central | AZ02 |**AV36**| Yes |
82
+
| Germany West Central | AZ03 | AV36, **AV36P**| Yes |
83
+
| Italy North | AZ03 | AV36P | No |
82
84
| Japan East | AZ02 |**AV36**| No |
83
85
| Japan West | AZ01 |**AV36**| No |
84
-
| North Central US | AZ01 |**AV36**| No |
85
-
| North Central US | AZ02 | AV36P | No |
86
+
| North Central US | AZ01 |**AV36**, AV64| No |
87
+
| North Central US | AZ02 | AV36P, AV64| No |
86
88
| North Europe | AZ02 | AV36, AV64 | No |
87
89
| Qatar Central | AZ03 | AV36P | No |
88
90
| South Africa North | AZ03 | AV36 | No |
@@ -91,17 +93,19 @@ The Multi-AZ capability for Azure VMware Solution Stretched Clusters is also tag
91
93
| South East Asia | AZ02 |**AV36**| No |
92
94
| Sweden Central | AZ01 | AV36 | No |
93
95
| Switzerland North | AZ01 |**AV36**, AV64 | No |
96
+
| Switzerland North | AZ03 | AV36P | No |
94
97
| Switzerland West | AZ01 |**AV36**, AV64 | No |
98
+
| UAE North | AZ03 | AV36P | No |
95
99
| UK South | AZ01 | AV36, AV36P, AV52, AV64 | Yes |
96
100
| UK South | AZ02 |**AV36**, AV64 | Yes |
97
101
| UK South | AZ03 | AV36P, AV64 | Yes |
98
102
| UK West | AZ01 | AV36 | No |
99
-
| West Europe | AZ01 |**AV36**, AV36P, AV52 | Yes |
100
-
| West Europe | AZ02 |**AV36**| Yes |
103
+
| West Europe | AZ01 |**AV36**, AV36P, AV52, AV64| Yes |
104
+
| West Europe | AZ02 |**AV36**, AV64| Yes |
101
105
| West Europe | AZ03 | AV36P, AV64 | Yes |
102
106
| West US | AZ01 | AV36, AV36P | No |
103
107
| West US 2 | AZ01 | AV36 | No |
104
-
| West US 2 | AZ02 |**AV36P**| No |
108
+
| West US 2 | AZ02 | AV36P | No |
105
109
| West US 3 | AZ01 |**AV36P**| No |
106
110
| US Gov Arizona | AZ02 | AV36P | No |
107
111
| US Gov Virginia | AZ03 | AV36 | No |
@@ -126,7 +130,7 @@ Microsoft is a member of the VMware Metal-as-a-Service (MaaS) program and uses t
126
130
127
131
Azure VMware Solution continuously monitors the health of both the VMware components and underlay. When Azure VMware Solution detects a failure, it takes action to repair the failed components. When Azure VMware Solution detects a degradation or failure on an Azure VMware Solution node, it triggers the host remediation process.
128
132
129
-
Host remediation involves replacing the faulty node with a new healthy node in the cluster. Then, when possible, the faulty host is placed in VMware vSphere maintenance mode. VMware vMotion moves the VMs off the faulty host to other available servers in the cluster, potentially allowing zero downtime for live migration of workloads. If the faulty host can't be placed in maintenance mode, the host is removed from the cluster. Before the faulty host is removed, the customer workloads are migrated to a newly added host.
133
+
Host remediation involves replacing the faulty node with a new healthy node in the cluster. Then, when possible, the faulty host is placed in VMware vSphere maintenance mode. VMware vSphere vMotion moves the VMs off the faulty host to other available servers in the cluster, potentially allowing zero downtime for live migration of workloads. If the faulty host can't be placed in maintenance mode, the host is removed from the cluster. Before the faulty host is removed, the customer workloads are migrated to a newly added host.
130
134
131
135
> [!TIP]
132
136
> **Customer communication:** An email is sent to the customer's email address before the replacement is initiated and again after the replacement is successful.
@@ -153,7 +157,7 @@ Azure VMware Solution monitors the following conditions on the host:
153
157
154
158
## Backup and restore
155
159
156
-
Azure VMware Solution private cloud vCenter Server and HCX Manager (if enabled) configurations are on a daily backup schedule and NSX configuration is on hourly backup schedule. The backups are retained for a minimum of three days.Open a [support request](https://rc.portal.azure.com/#create/Microsoft.Support) in the Azure portal to request restoration.
160
+
Azure VMware Solution private cloud vCenter Server and HCX Manager (if enabled) configurations are on a daily backup schedule and NSX configuration has an hourly backup schedule. The backups are retained for a minimum of three days.Open a [support request](https://rc.portal.azure.com/#create/Microsoft.Support) in the Azure portal to request restoration.
157
161
158
162
> [!NOTE]
159
163
> Restorations are intended for catastrophic situations only.
@@ -24,7 +24,7 @@ The following table describes the maximum limits for Azure VMware Solution.
24
24
| Maximum number of HCX service meshes | 10 (any edition) |
25
25
| Maximum number of Azure VMware Solution ExpressRoute linked private clouds from a single location to a single Virtual Network Gateway | 4<br />The virtual network gateway used determines the actual max linked private clouds. For more information, see [About ExpressRoute virtual network gateways](../../expressroute/expressroute-about-virtual-network-gateways.md)<br />If you exceed this threshold use [Azure VMware Solution Interconnect](../connect-multiple-private-clouds-same-region.md) to aggregate private cloud connectivity within the Azure region. |
26
26
| Maximum Azure VMware Solution ExpressRoute port speed | 10 Gbps (use Ultra Performance Gateway SKU with FastPath enabled)<br />The virtual network gateway used determines the actual bandwidth. For more information, see [About ExpressRoute virtual network gateways](../../expressroute/expressroute-about-virtual-network-gateways.md)|
27
-
| Maximum number of Azure Public IPv4 addresses assigned to NSX-T Data Center| 2,000 |
27
+
| Maximum number of Azure Public IPv4 addresses assigned to NSX | 2,000 |
28
28
| Maximum number of Azure VMware Solution Interconnects per private cloud | 10 |
29
29
| Maximum number of Azure ExpressRoute Global Reach connections per Azure VMware Solution private cloud | 8 |
30
30
| vSAN capacity limits | 75% of total usable (keep 25% available for SLA) |
Copy file name to clipboardExpand all lines: articles/azure-vmware/includes/vmware-software-update-frequency.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,34 +3,34 @@ title: VMware software update frequency
3
3
description: Supported VMware software update frequency for Azure VMware Solution.
4
4
ms.topic: include
5
5
ms.service: azure-vmware
6
-
ms.date: 01/05/2024
6
+
ms.date: 5/25/2024
7
7
author: suzizuber
8
8
ms.author: v-szuber
9
9
ms.custom: engagement-fy23
10
10
---
11
11
12
12
<!-- Used in faq.md and concepts-private-clouds-clusters.md -->
13
13
14
-
One benefit of Azure VMware Solution private clouds is that the platform is maintained for you. Microsoft is responsible for the lifecycle management of VMware software (ESXi, vCenter Server, and vSAN) and NSX-T Data Center appliances. Microsoft is also responsible for bootstrapping the network configuration, like creating the Tier-0 gateway and enabling North-South routing. You’re responsible for the NSX-T Data Center SDN configuration: network segments, distributed firewall rules, Tier 1 gateways, and load balancers.
14
+
One benefit of Azure VMware Solution private clouds is that the platform is maintained for you. Microsoft is responsible for the lifecycle management of VMware software (ESXi, vCenter Server, and vSAN) and NSXappliances. Microsoft is also responsible for bootstrapping the network configuration, like creating the Tier-0 gateway and enabling North-South routing. You’re responsible for the NSX SDN configuration: network segments, distributed firewall rules, Tier 1 gateways, and load balancers.
15
15
16
16
> [!NOTE]
17
-
> A T0 gateway is created and configured as part of a private cloud deployment. Any modification to that logical router or the NSX-T Data Center edge node VMs could affect connectivity to your private cloud and should be avoided.
17
+
> A T0 gateway is created and configured as part of a private cloud deployment. Any modification to that logical router or the NSX edge node VMs could affect connectivity to your private cloud and should be avoided.
18
18
19
-
Microsoft is responsible for applying any patches, updates, or upgrades to ESXi, vCenter Server, vSAN, and NSX-T Data Center in your private cloud. The impact of patches, updates, and upgrades on ESXi, vCenter Server, and NSX-T Data Center has the following considerations:
19
+
Microsoft is responsible for applying any patches, updates, or upgrades to ESXi, vCenter Server, vSAN, and NSXin your private cloud. The impact of patches, updates, and upgrades on ESXi, vCenter Server, and NSX has the following considerations:
20
20
21
-
-**ESXi** - There's no impact to workloads running in your private cloud. Access to vCenter Server and NSX-T Data Center isn't blocked during this time. During this time, we recommend you don't plan other activities like: scaling up private cloud, scheduling or initiating active HCX migrations, making HCX configuration changes, and so on, in your private cloud.
21
+
-**ESXi** - There's no impact to workloads running in your private cloud. Access to vCenter Server and NSX isn't blocked during this time. During this time, we recommend you don't plan other activities like: scaling up private cloud, scheduling or initiating active HCX migrations, making HCX configuration changes, and so on, in your private cloud.
22
22
23
23
-**vCenter Server** - There's no impact to workloads running in your private cloud. During this time, vCenter Server is unavailable and you can't manage VMs (stop, start, create, or delete). We recommend you don't plan other activities like scaling up private cloud, creating new networks, and so on, in your private cloud. When you use VMware Site Recovery Manager or vSphere Replication user interfaces, we recommend you don't do either of the actions: configure vSphere Replication, and configure or execute site recovery plans during the vCenter Server upgrade.
24
24
25
-
-**NSX-T Data Center** - The workload is impacted. When a particular host is being upgraded, the VMs on that host might lose connectivity from 2 seconds to 1 minute with any of the following symptoms:
25
+
-**NSX** - The workload is impacted. When a particular host is being upgraded, the VMs on that host might lose connectivity from 2 seconds to 1 minute with any of the following symptoms:
26
26
27
27
- Ping errors
28
28
29
29
- Packet loss
30
30
31
31
- Error messages (for example, *Destination Host Unreachable* and *Net unreachable*)
32
32
33
-
During this upgrade window, all access to the NSX-T Data Center management plane is blocked. You can't make configuration changes to the NSX-T Data Center environment for the duration. Your workloads continue to run as normal, subject to the upgrade impact previously detailed.
33
+
During this upgrade window, all access to the NSXmanagement plane is blocked. You can't make configuration changes to the NSX environment for the duration. Your workloads continue to run as normal, subject to the upgrade impact previously detailed.
34
34
35
35
During the upgrade time, we recommend you don't plan other activities like, scaling up private cloud, and so on, in your private cloud. Other activities can prevent the upgrade from starting or could have adverse impacts on the upgrade and the environment.
0 commit comments