You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -27,10 +29,10 @@ The minimum address space is /27 (which means /28 and above wouldn't work).
27
29
28
30
**How many subnets does the VNet need to have?**
29
31
30
-
- VNet needs two subnets.
32
+
- VNet needs two subnets.
31
33
- For SCOM Managed Instance
32
34
- For SQL Managed Instance
33
-
- The subnet for SQL Managed Instance instance will be a delegated (dedicated) subnet and won't be used by the SCOM Managed Instance. Name the subnets accordingly to avoid confusion in the future while you create the SQL Managed Instance/SCOM Managed Instance.
35
+
- The subnet for SQL Managed Instance will be a delegated (dedicated) subnet and won't be used by the SCOM Managed Instance. Name the subnets accordingly to avoid confusion in the future while you create the SQL Managed Instance/SCOM Managed Instance.
34
36
35
37
**What address range do the two subnets need?**
36
38
@@ -76,17 +78,22 @@ If you have multiple VNets created, you need to peer your VNets. If you're peeri
76
78
77
79
Azure RBAC is the role-based access control system that Azure follows while granting permissions. For more information, see [Azure role-based access control](/azure/role-based-access-control/overview).
78
80
79
-
Azure RBAC is divided into Azure roles and Azure Active Directory roles. At a high level, Azure roles control permissions to manage Azure resources, while Azure Active Directory roles control permissions to manage Azure Active Directory resources. The following table compares some of the differences.
81
+
Azure RBAC is divided into Azure roles and Microsoft Entra ID roles. At a high level, Azure roles control permissions to manage Azure resources, while Microsoft Entra ID roles control permissions to manage Microsoft Entra ID Directory resources. The following table compares some of the differences.
80
82
81
-
:::image type="Comparision of Azure roles and Azure active directory roles" source="media/operations-manager-managed-instance-common-questions/comparision-of-azure-roles-and-azure-active-directory-roles.png" alt-text="Screenshot of Azure roles and Azure active directory roles.":::
83
+
|**Azure roles**|**Microsoft Entra ID roles**|
84
+
|---|---|
85
+
|Manage access to Azure resources|Manage access to Microsoft Entra ID resources|
86
+
|Supports custom roles|Supports custom roles|
87
+
|Scope can be specified at multiple levels (management group, subscription, resource group, resource)|Scope can be specified at the tenant level (organization-wide), administrative unit, or on an individual object (for example, a specific application)|
88
+
|Role information can be accessed in Azure portal, Azure CLI, Azure PowerShell, Azure Resource Manager templates, REST API|Role information can be accessed in Azure admin portal, Microsoft 365, admin center, Microsoft Graph, Microsoft Entra ID PowerShell|
82
89
83
90
Below is the high-level view of how the classic subscription administrator roles, Azure roles, and Azure AD roles are related.
84
91
85
-
:::image type="Azure active directory roles" source="media/operations-manager-managed-instance-common-questions/azure-active-directory-roles.png" alt-text="Screenshot of Azure active directory roles.":::
92
+
:::image type="Microsoft Entra ID roles" source="media/operations-manager-managed-instance-common-questions/azure-active-directory-roles.png" alt-text="Screenshot of Microsoft Entra ID roles.":::
86
93
87
94
**What is a Global Administrator role?**
88
95
89
-
Users with the Global administrator role have access to all administrative features in Azure Active Directory and services that use Azure Active Directory identities, such as:
96
+
Users with the Global administrator role have access to all administrative features in Microsoft Entra ID and services that use Microsoft Entra ID identities, such as:
90
97
- Microsoft 365 Defender portal
91
98
- Compliance portal
92
99
- Exchange Online
@@ -97,7 +104,7 @@ Users with the Global administrator role have access to all administrative featu
97
104
98
105
**What if there's an error during the deployment?**
99
106
100
-
During the deployment phase, there can be several reasons why deploying a SCOM Managed Instance shows an error. It might be some backend error, or you might have given the wrong credentials for one of the accounts. In the scenario of an error during deployment, it's best to delete the instance and create one again. For more information, see [Troubleshoot issues with Azure Monitor SCOM Managed Instance](./troubleshoot-scom-managed-instance.md).
107
+
During the deployment phase, there can be several reasons why deploying a SCOM Managed Instance shows an error. It might be due to wrong input while creation or some backend error. Raise a support ticket in case you need any further assistance. In the scenario of an error during deployment, it's best to delete the instance and create one again. For more information, see [Troubleshoot issues with Azure Monitor SCOM Managed Instance](./troubleshoot-scom-managed-instance.md).
101
108
102
109
**What is the procedure to delete an instance?**
103
110
@@ -107,9 +114,9 @@ In the instance view, select *Delete* from the top menu and wait for the confirm
Alternatively, go to your resource group view (search for Resource Group in the Azure search bar, and in the list of results, open your resource group). If you created a separate resource group for SCOM Managed Instance, delete the resource group. Otherwise, in the resource group, search for your instance and select *Delete*.
117
+
Alternatively, go to your resource group view (search for Resource Group in the Azure search bar, and in the list of results, open your resource group). Go to the resource group where the SCOM Managed Instance resides and delete the instance.
111
118
112
-
Once the instance is deleted, you'll also have to delete the two databases created in SQL MI. In the resource view, select the two databases (depending on what name you gave to your SQL MI instance) and select **Delete**. With the two databases deleted, you can recreate your SCOM Managed Instance.
119
+
Once the instance is deleted, you'll also have to delete the two databases created in SQL MI. In the resource view, select the two databases (depending on what name you gave to your SCOM Managed Instance) and select **Delete**.
113
120
114
121
**If an Arc instance to connect to private cloud with some resources is available, will SCOM Managed Instance scale to those resources?**
115
122
@@ -122,7 +129,7 @@ SCOM Managed Instance and System Center Operations Manager share the same featur
122
129
**How is SCOM Managed Instance different from running System Center Operations Manager in Azure VMs?**
123
130
124
131
- SCOM Managed Instance is native to Azure, while running System Center Operations Manager in Azure VMs isn't a native solution. This means, SCOM Managed Instance integrates smoothly with Azure and all of Azure’s updates are available to SCOM Managed Instance.
125
-
-In terms of ease of deployment, SCOM Managed Instance is easy to deploy, while running VMs in Azure takes possibly months of effort (and requires in-depth technical knowledge).
132
+
-SCOM Managed Instance prepares the entire infra for high availability by deploying VMSS, Load Balancer, MSI, etc. To prepare such setup manually, it takes months of effort (and requires in-depth technical knowledge).
126
133
- SCOM Managed Instance uses SQL MI as the backend for database management by default.
127
134
- SCOM Managed Instance comes with built-in scaling, patching features, and integrated reports.
0 commit comments