Skip to content

Commit 93dea98

Browse files
Updated FAQ doc
1 parent a4f2c1f commit 93dea98

File tree

4 files changed

+19
-12
lines changed

4 files changed

+19
-12
lines changed

articles/azure-monitor/scom-manage-instance/common-questions.md

Lines changed: 19 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,12 @@ description: This article summarizes frequently asked questions about Azure Moni
55
author: PriskeyJeronika-MS
66
ms.author: v-gjeronika
77
manager: jsuri
8-
ms.date: 05/24/2024
8+
ms.date: 05/15/2024
9+
ms.custom: UpdateFrequency.5, engagement-fy24
910
ms.service: system-center
1011
ms.subservice: operations-manager-managed-instance
1112
ms.topic: faq
13+
monikerRange: '>=sc-om-2019'
1214
---
1315

1416
# Azure Monitor SCOM Managed Instance frequently asked questions
@@ -27,10 +29,10 @@ The minimum address space is /27 (which means /28 and above wouldn't work).
2729

2830
**How many subnets does the VNet need to have?**
2931

30-
- VNet needs two subnets.
32+
- VNet needs two subnets.
3133
- For SCOM Managed Instance
3234
- For SQL Managed Instance
33-
- The subnet for SQL Managed Instance instance will be a delegated (dedicated) subnet and won't be used by the SCOM Managed Instance. Name the subnets accordingly to avoid confusion in the future while you create the SQL Managed Instance/SCOM Managed Instance.
35+
- The subnet for SQL Managed Instance will be a delegated (dedicated) subnet and won't be used by the SCOM Managed Instance. Name the subnets accordingly to avoid confusion in the future while you create the SQL Managed Instance/SCOM Managed Instance.
3436

3537
**What address range do the two subnets need?**
3638

@@ -76,17 +78,22 @@ If you have multiple VNets created, you need to peer your VNets. If you're peeri
7678

7779
Azure RBAC is the role-based access control system that Azure follows while granting permissions. For more information, see [Azure role-based access control](/azure/role-based-access-control/overview).
7880

79-
Azure RBAC is divided into Azure roles and Azure Active Directory roles. At a high level, Azure roles control permissions to manage Azure resources, while Azure Active Directory roles control permissions to manage Azure Active Directory resources. The following table compares some of the differences.
81+
Azure RBAC is divided into Azure roles and Microsoft Entra ID roles. At a high level, Azure roles control permissions to manage Azure resources, while Microsoft Entra ID roles control permissions to manage Microsoft Entra ID Directory resources. The following table compares some of the differences.
8082

81-
:::image type="Comparision of Azure roles and Azure active directory roles" source="media/operations-manager-managed-instance-common-questions/comparision-of-azure-roles-and-azure-active-directory-roles.png" alt-text="Screenshot of Azure roles and Azure active directory roles.":::
83+
|**Azure roles**|**Microsoft Entra ID roles**|
84+
|---|---|
85+
|Manage access to Azure resources|Manage access to Microsoft Entra ID resources|
86+
|Supports custom roles|Supports custom roles|
87+
|Scope can be specified at multiple levels (management group, subscription, resource group, resource)|Scope can be specified at the tenant level (organization-wide), administrative unit, or on an individual object (for example, a specific application)|
88+
|Role information can be accessed in Azure portal, Azure CLI, Azure PowerShell, Azure Resource Manager templates, REST API|Role information can be accessed in Azure admin portal, Microsoft 365, admin center, Microsoft Graph, Microsoft Entra ID PowerShell|
8289

8390
Below is the high-level view of how the classic subscription administrator roles, Azure roles, and Azure AD roles are related.
8491

85-
:::image type="Azure active directory roles" source="media/operations-manager-managed-instance-common-questions/azure-active-directory-roles.png" alt-text="Screenshot of Azure active directory roles.":::
92+
:::image type="Microsoft Entra ID roles" source="media/operations-manager-managed-instance-common-questions/azure-active-directory-roles.png" alt-text="Screenshot of Microsoft Entra ID roles.":::
8693

8794
**What is a Global Administrator role?**
8895

89-
Users with the Global administrator role have access to all administrative features in Azure Active Directory and services that use Azure Active Directory identities, such as:
96+
Users with the Global administrator role have access to all administrative features in Microsoft Entra ID and services that use Microsoft Entra ID identities, such as:
9097
- Microsoft 365 Defender portal
9198
- Compliance portal
9299
- Exchange Online
@@ -97,7 +104,7 @@ Users with the Global administrator role have access to all administrative featu
97104

98105
**What if there's an error during the deployment?**
99106

100-
During the deployment phase, there can be several reasons why deploying a SCOM Managed Instance shows an error. It might be some backend error, or you might have given the wrong credentials for one of the accounts. In the scenario of an error during deployment, it's best to delete the instance and create one again. For more information, see [Troubleshoot issues with Azure Monitor SCOM Managed Instance](./troubleshoot-scom-managed-instance.md).
107+
During the deployment phase, there can be several reasons why deploying a SCOM Managed Instance shows an error. It might be due to wrong input while creation or some backend error. Raise a support ticket in case you need any further assistance. In the scenario of an error during deployment, it's best to delete the instance and create one again. For more information, see [Troubleshoot issues with Azure Monitor SCOM Managed Instance](./troubleshoot-scom-managed-instance.md).
101108

102109
**What is the procedure to delete an instance?**
103110

@@ -107,9 +114,9 @@ In the instance view, select *Delete* from the top menu and wait for the confirm
107114

108115
:::image type="Delete option" source="media/operations-manager-managed-instance-common-questions/delete.png" alt-text="Screenshot showing delete option.":::
109116

110-
Alternatively, go to your resource group view (search for Resource Group in the Azure search bar, and in the list of results, open your resource group). If you created a separate resource group for SCOM Managed Instance, delete the resource group. Otherwise, in the resource group, search for your instance and select *Delete*.
117+
Alternatively, go to your resource group view (search for Resource Group in the Azure search bar, and in the list of results, open your resource group). Go to the resource group where the SCOM Managed Instance resides and delete the instance.
111118

112-
Once the instance is deleted, you'll also have to delete the two databases created in SQL MI. In the resource view, select the two databases (depending on what name you gave to your SQL MI instance) and select **Delete**. With the two databases deleted, you can recreate your SCOM Managed Instance.
119+
Once the instance is deleted, you'll also have to delete the two databases created in SQL MI. In the resource view, select the two databases (depending on what name you gave to your SCOM Managed Instance) and select **Delete**.
113120

114121
**If an Arc instance to connect to private cloud with some resources is available, will SCOM Managed Instance scale to those resources?**
115122

@@ -122,7 +129,7 @@ SCOM Managed Instance and System Center Operations Manager share the same featur
122129
**How is SCOM Managed Instance different from running System Center Operations Manager in Azure VMs?**
123130

124131
- SCOM Managed Instance is native to Azure, while running System Center Operations Manager in Azure VMs isn't a native solution. This means, SCOM Managed Instance integrates smoothly with Azure and all of Azure’s updates are available to SCOM Managed Instance.
125-
- In terms of ease of deployment, SCOM Managed Instance is easy to deploy, while running VMs in Azure takes possibly months of effort (and requires in-depth technical knowledge).
132+
- SCOM Managed Instance prepares the entire infra for high availability by deploying VMSS, Load Balancer, MSI, etc. To prepare such setup manually, it takes months of effort (and requires in-depth technical knowledge).
126133
- SCOM Managed Instance uses SQL MI as the backend for database management by default.
127134
- SCOM Managed Instance comes with built-in scaling, patching features, and integrated reports.
128135

@@ -231,4 +238,4 @@ Currently, multi-homing for gateway servers isn't supported.
231238

232239
## Next steps
233240

234-
[SCOM Managed Instance overview](overview.md)
241+
[SCOM Managed Instance overview](operations-manager-managed-instance-overview.md)
Loading
Loading
25.2 KB
Loading

0 commit comments

Comments
 (0)