Skip to content

Commit 921e5a8

Browse files
author
Ankita Dutta
committed
removing blockers
1 parent 2d7f99e commit 921e5a8

File tree

3 files changed

+15
-15
lines changed

3 files changed

+15
-15
lines changed

articles/site-recovery/migrate-tutorial-windows-server-2008.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -109,8 +109,8 @@ The new vault is added to the **Dashboard** under **All resources**, and on the
109109

110110
### Prepare your on-premises environment for migration
111111

112-
- To migrate Windows Server 2008 virtual machines running on VMware, [setup the on-premises Configuration Server on VMware](vmware-azure-tutorial.md#set-up-the-source-environment).
113-
- If the Configuration Server cannot be setup as a VMware virtual machine, [setup the Configuration Server on an on-premises physical server or virtual machine](physical-azure-disaster-recovery.md#source-settings).
112+
- To migrate Windows Server 2008 virtual machines running on VMware, [set up the on-premises Configuration Server on VMware](vmware-azure-tutorial.md#set-up-the-source-environment).
113+
- If the Configuration Server cannot be set up as a VMware virtual machine, [set up the Configuration Server on an on-premises physical server or virtual machine](physical-azure-disaster-recovery.md#source-settings).
114114

115115
### Set up the target environment
116116

articles/site-recovery/physical-azure-disaster-recovery.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -88,9 +88,9 @@ The Mobility service must be installed on each server you want to replicate. Sit
8888

8989
[!INCLUDE [site-recovery-create-vault](../../includes/site-recovery-create-vault.md)]
9090

91-
## Prepare Infrastructure
91+
## Prepare infrastructure
9292

93-
It is important to prepare the infrastructure before you set up disaster recovery of physical VMware machines to Azure.
93+
it's important to prepare the infrastructure before you set up disaster recovery of physical VMware machines to Azure.
9494

9595
## Deployment planning
9696

@@ -133,18 +133,18 @@ Make sure the machine can access these URLs based on your environment:
133133

134134
[!INCLUDE [site-recovery-URLS](../../includes/site-recovery-URLS.md)]
135135

136-
IP address-based firewall rules should allow communication to all of the Azure URLs that are listed above over HTTPS (443) port. To simplify and limit the IP Ranges, it is recommended that URL filtering be done.
136+
IP address-based firewall rules should allow communication to all of the Azure URLs that are listed above over HTTPS (443) port. To simplify and limit the IP Ranges, it's recommended that URL filtering is done.
137137

138-
- **Commercial IPs** - Allow the [Azure Datacenter IP Ranges](https://www.microsoft.com/download/confirmation.aspx?id=41653), and the HTTPS (443) port. Allow IP address ranges for the Azure region of your subscription to support the AAD, Backup, Replication, and Storage URLs.
139-
- **Government IPs** - Allow the [Azure Government Datacenter IP Ranges](https://www.microsoft.com/en-us/download/details.aspx?id=57063), and the HTTPS (443) port for all USGov Regions (Virginia, Texas, Arizona, and Iowa) to support AAD, Backup, Replication, and Storage URLs.
138+
- **Commercial IPs** - Allow the [Azure Datacenter IP Ranges](https://www.microsoft.com/download/confirmation.aspx?id=41653), and the HTTPS (443) port. Allow IP address ranges for the Azure region of your subscription to support the Azure AD, Backup, Replication, and Storage URLs.
139+
- **Government IPs** - Allow the [Azure Government Datacenter IP Ranges](https://www.microsoft.com/en-us/download/details.aspx?id=57063), and the HTTPS (443) port for all USGov Regions (Virginia, Texas, Arizona, and Iowa) to support Azure AD, Backup, Replication, and Storage URLs.
140140

141141
#### Run setup
142142
Run Unified Setup as a Local Administrator, to install the configuration server. The process server and the master target server are also installed by default on the configuration server.
143143

144144
[!INCLUDE [site-recovery-add-configuration-server](../../includes/site-recovery-add-configuration-server.md)]
145145

146146

147-
## Target Settings
147+
## Target settings
148148

149149
Select and verify target resources.
150150

@@ -211,7 +211,7 @@ By default, a matching policy is automatically created for failback. For example
211211
It takes a few minutes for the servers to be discovered and listed.
212212
:::image type="content" source="./media/physical-azure-disaster-recovery/add-physical-machines.png" alt-text="Screenshot of add machine page.":::
213213

214-
1. Under **Replication settings** tab, select and verify the the user account details.
214+
1. Under **Replication settings** tab, select and verify the user account details.
215215
:::image type="content" source="./media/physical-azure-disaster-recovery/enable-replication-settings.png" alt-text="Screenshot of enable replication setting page.":::
216216
1. Under **Replication policy** tab, verify that the correct replication policy is selected.
217217
:::image type="content" source="./media/physical-azure-disaster-recovery/enable-replication-policy.png" alt-text="Screenshot of enable replication policy page.":::

articles/site-recovery/region-move-cross-geos.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Move Azure VMs between government and public regions with Azure Site Recovery
3-
description: Use Azure Site Recovery to move Azure VMs between Azure government and public regions.
3+
description: Use Azure Site Recovery to move Azure VMs between Azure Government and public regions.
44
author: ankitaduttaMSFT
55
ms.service: site-recovery
66
ms.topic: tutorial
@@ -40,7 +40,7 @@ This tutorial shows you how to move Azure VMs between Azure Government and Publi
4040
- Make sure that the servers you want to replicate comply with [Azure VM requirements](vmware-physical-secondary-support-matrix.md#replicated-vm-support).
4141
- Prepare an account for automatic installation of the Mobility service on each server you want to replicate.
4242

43-
- Note that after you fail over to the target region in Azure, you cannot directly perform a fail back to the source region. You will have to set up replication again back to the target.
43+
- After you fail over to the target region in Azure, you cannot directly perform a fail back to the source region. You will have to set up replication again back to the target.
4444

4545
### Verify Azure account permissions
4646

@@ -86,7 +86,7 @@ The Mobility service must be installed on each server you want to replicate. Sit
8686
3. Ensure that you create a target resource for every component identified in the source networking layout. This is important to ensure that, post cutting over to the target region, your VMs have all the functionality and features that you had in the source.
8787

8888
> [!NOTE]
89-
> Azure Site Recovery automatically discovers and creates a virtual network when you enable replication for the source VM, or you can also pre-create a network and assign to the VM in the user flow for enable replication. But for any other resources, as mentioned below, you need to manually create them in the target region.
89+
> Azure Site Recovery automatically discovers and creates a virtual network when you enable replication for the source VM, or you can also pre-create a network and assign to the VM in the user flow for enable replication. But for any other resources, you need to manually create them in the target region.
9090
9191
Please refer to the following documents to create the most commonly used network resources relevant for you, based on the source VM configuration.
9292

@@ -138,10 +138,10 @@ Make sure the machine can access these URLs based on your environment:
138138

139139
[!INCLUDE [site-recovery-URLS](../../includes/site-recovery-URLS.md)]
140140

141-
IP address-based firewall rules should allow communication to all of the Azure URLs that are listed above over HTTPS (443) port. To simplify and limit the IP Ranges, it is recommended that URL filtering be done.
141+
IP address-based firewall rules should allow communication to all of the Azure URLs that are listed above over HTTPS (443) port. To simplify and limit the IP Ranges, it is recommended that URL filtering is done.
142142

143-
- **Commercial IPs** - Allow the [Azure Datacenter IP Ranges](https://www.microsoft.com/download/confirmation.aspx?id=41653), and the HTTPS (443) port. Allow IP address ranges for the Azure region of your subscription to support the AAD, Backup, Replication, and Storage URLs.
144-
- **Government IPs** - Allow the [Azure Government Datacenter IP Ranges](https://www.microsoft.com/en-us/download/details.aspx?id=57063), and the HTTPS (443) port for all USGov Regions (Virginia, Texas, Arizona, and Iowa) to support AAD, Backup, Replication, and Storage URLs.
143+
- **Commercial IPs** - Allow the [Azure Datacenter IP Ranges](https://www.microsoft.com/download/confirmation.aspx?id=41653), and the HTTPS (443) port. Allow IP address ranges for the Azure region of your subscription to support the Azure AD, Backup, Replication, and Storage URLs.
144+
- **Government IPs** - Allow the [Azure Government Datacenter IP Ranges](https://www.microsoft.com/en-us/download/details.aspx?id=57063), and the HTTPS (443) port for all USGov Regions (Virginia, Texas, Arizona, and Iowa) to support Azure AD, Backup, Replication, and Storage URLs.
145145

146146
#### Run setup
147147
Run Unified Setup as a Local Administrator, to install the configuration server. The process server and the master target server are also installed by default on the configuration server.

0 commit comments

Comments
 (0)