Skip to content

Commit 9b45992

Browse files
Update sql-database-managed-instance-vnet-configuration.md
1 parent 4f84734 commit 9b45992

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/sql-database/sql-database-managed-instance-vnet-configuration.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -38,30 +38,30 @@ For Managed Instance creation you need to dedicate a subnet inside the VNet that
3838
- **No NSG**: The subnet must not have a Network Security Group associated with it.
3939
- **Have specific route table**: The subnet must have a User Route Table (UDR) with 0.0.0.0/0 Next Hop Internet as the only route assigned to it. For more information, see [Create the required route table and associate it](#create-the-required-route-table-and-associate-it)
4040
3. **Optional custom DNS**: If custom DNS is specified on the VNet, Azure's recursive resolvers IP address (such as 168.63.129.16) must be added to the list. For more information, see [Configuring Custom DNS](sql-database-managed-instance-custom-dns.md).
41-
4. **No Service endpoints**: The subnet must not have a Service endpoints associated to it. Make sure that Service endpoints option is Disabled when creating VNet.
41+
4. **No Service endpoints**: The subnet must not have a Service endpoint associated to it. Make sure that Service endpoints option is Disabled when creating VNet.
4242
5. **Sufficient IP addresses**: The subnet must have the bare minimum of 16 IP addresses (recommended minimum is 32 IP addresses). For more information, see [Determine the size of subnet for Managed Instances](#determine-the-size-of-subnet-for-managed-instances)
4343

4444
> [!IMPORTANT]
4545
> You won’t be able to deploy new Managed Instance if the destination subnet is not compatible with all of the preceding requirements. The destination Vnet and the subnet must be kept in accordance with these Managed Instance requirements (before and after deployment), as any violation may cause instance to enter faulty state and become unavailable. Recovering from that state requires you to create new instance in a VNet with the compliant networking policies, recreate instance level data, and restore your databases. This introduces significant downtime for your applications.
4646
47-
With introduction of _Network Intent Policy_ we allow you to add Network security group (NSG) on Managed Instance subnet after the Managed Instance is created.
47+
With introduction of _Network Intent Policy_, you can add a Network security group (NSG) on a Managed Instance subnet after the Managed Instance is created.
4848

49-
You could now use NSG to narrow down the IP ranges from which applications and users could query and manage the data by filtering network traffic that goes to port 1433.
49+
You can now use an NSG to narrow down the IP ranges from which applications and users can query and manage the data by filtering network traffic that goes to port 1433.
5050

5151
> [!IMPORTANT]
52-
> When you are configuring the NSG rules that will restrain access to port 1433 you will also need to insert the highest priority inbound rules displayed in the table below. Otherwise Network Intent Policy will block the change as non compliant.
52+
> When you are configuring the NSG rules that will restrain access to port 1433, you also need to insert the highest priority inbound rules displayed in the table below. Otherwise Network Intent Policy blocks the change as non compliant.
5353
5454
| NAME |PORT |PROTOCOL|SOURCE |DESTINATION|ACTION|
5555
|------------|----------------------------|--------|-----------------|-----------|------|
5656
|management |9000, 9003, 1438, 1440, 1452|Any |Any |Any |Allow |
5757
|mi_subnet |Any |Any |MI SUBNET |Any |Allow |
5858
|health_probe|Any |Any |AzureLoadBalancer|Any |Allow |
5959

60-
We also improved routing experiance so in addition to 0.0.0.0/0 next hop type Internet route you could now add UDR to route traffic towards your on-premises private IP ranges through virtual network gateway or virtual network appliance (NVA).
60+
The routing experiance has also been improved so that in addition to the 0.0.0.0/0 next hop type Internet route, you can now add UDR to route traffic towards your on-premises private IP ranges through virtual network gateway or virtual network appliance (NVA).
6161

6262
## Determine the size of subnet for Managed Instances
6363

64-
When you create a Managed Instance, Azure allocates a number of virtual machines depending on the tier you selected during the provisioning. Because these virtual machines are associated with your subnet, they require IP addresses. To ensure high availability during regular operations and service maintenance, Azure may allocate additional virtual machines. As a result, the number of required IP addresses in a subnet is larger than the number of Managed Instances in that subnet.
64+
When you create a Managed Instance, Azure allocates a number of virtual machines depending on the tier you selected during provisioning. Because these virtual machines are associated with your subnet, they require IP addresses. To ensure high availability during regular operations and service maintenance, Azure may allocate additional virtual machines. As a result, the number of required IP addresses in a subnet is larger than the number of Managed Instances in that subnet.
6565

6666
By design, a Managed Instance needs a minimum of 16 IP addresses in a subnet and may use up to 256 IP addresses. As a result, you can use subnet masks /28 to /24 when defining your subnet IP ranges.
6767

@@ -77,7 +77,7 @@ If you plan to deploy multiple Managed Instances inside the subnet and need to o
7777
**Example**: You plan to have three General Purpose and two Business Critical Managed Instances. That means you need 5 + 3 * 2 + 2 * 4 = 19 IP addresses. As IP ranges are defined in power of 2, you need the IP range of 32 (2^5) IP addresses. Therefore, you need to reserve the subnet with subnet mask of /27.
7878

7979
> [!IMPORTANT]
80-
> Calculation displayed above will become obsolete with further improvements and for ease of use replaced with the online Managed Instance subnet size estimator
80+
> Calculation displayed above will become obsolete with further improvements. 
8181
8282
## Create a new virtual network for Managed Instance using Azure Resource Manager deployment
8383

@@ -116,7 +116,7 @@ If you would like to create new one:
116116
- Follow the steps in [Add, change, or delete a virtual network subnet](../virtual-network/virtual-network-manage-subnet.md).
117117
- Create a route table that contains single entry, **0.0.0.0/0**, as the next hop Internet and associate it with the subnet for the Managed Instance.
118118

119-
In case you would like to create a Managed Instance inside an existing subnet we recommend you to use the PowerShell script below to prepare the subnet.
119+
If you want to create a Managed Instance inside an existing subnet, we recommend the following PowerShell script to prepare the subnet.
120120
```powershell
121121
$scriptUrlBase = 'https://raw.githubusercontent.com/Microsoft/sql-server-samples/master/samples/manage/azure-sql-db-managed-instance/prepare-subnet'
122122

0 commit comments

Comments
 (0)