Skip to content

Commit bcde5f2

Browse files
committed
Merge remote-tracking branch 'upstream/master'
2 parents b8c186d + fb16631 commit bcde5f2

File tree

219 files changed

+1661
-969
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

219 files changed

+1661
-969
lines changed

articles/active-directory/enterprise-users/domains-verify-custom-subdomain.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: enterprise-users
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 10/28/2021
13+
ms.date: 11/05/2021
1414
ms.author: curtand
1515
ms.reviewer: sumitp
1616

@@ -37,7 +37,7 @@ Because subdomains inherit the authentication type of the root domain by default
3737
New-MsolDomain -Name "child.mydomain.com" -Authentication Federated
3838
```
3939

40-
1. Use [Azure AD Graph Explorer](https://graphexplorer.azurewebsites.net) to GET the domain. Because the domain isn't a root domain, it inherits the root domain authentication type. Your command and results might look as follows, using your own tenant ID:
40+
1. Use the following example to GET the domain. Because the domain isn't a root domain, it inherits the root domain authentication type. Your command and results might look as follows, using your own tenant ID:
4141

4242
```http
4343
GET https://graph.windows.net/{tenant_id}/domains?api-version=1.6
@@ -61,7 +61,7 @@ Because subdomains inherit the authentication type of the root domain by default
6161
},
6262
```
6363

64-
### Use Azure AD Graph Explorer API to make this a root domain
64+
### Use Microsoft Graph API to make this a root domain
6565

6666
Use the following command to promote the subdomain:
6767

@@ -77,7 +77,7 @@ POST https://graph.windows.net/{tenant_id}/domains/child.mydomain.com/promote?ap
7777
Set-MsolDomainAuthentication -DomainName child.mydomain.com -Authentication Managed
7878
```
7979

80-
1. Verify via GET in Azure AD Graph Explorer that subdomain authentication type is now managed:
80+
1. Verify via GET in Microsoft Graph API that subdomain authentication type is now managed:
8181

8282
```http
8383
GET https://graph.windows.net/{{tenant_id} }/domains?api-version=1.6

articles/aks/http-proxy.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ Some more complex solutions may require creating a chain of trust to establish s
2121
## Limitations and other details
2222

2323
The following scenarios are **not** supported:
24+
- Monitoring addon
2425
- Different proxy configurations per node pool
2526
- Updating proxy settings post cluster creation
2627
- User/Password authentication

articles/application-gateway/multiple-site-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Similarly, you can host multiple subdomains of the same parent domain on the sam
2929
While using multi-site listeners, to ensure that the client traffic is routed to the accurate backend, it is important to have the request routing rules be present in the correct order.
3030
For example, if you have 2 listeners with associated Host name as `*.contoso.com` and `shop.contoso.com` respectively, the listener with the `shop.contoso.com` Host name would have to be processed before the listener with `*.contoso.com`. If the listener with `*.contoso.com` is processed first, then no client traffic would be received by the more specific `shop.contoso.com` listener.
3131

32-
This ordering can be established by providing a 'Priority' field value to the request routing rules associated with the listeners. You can specify an integer value from 1 to 20000 with 1 being the highest priority and 20000 being the lowest priority. In case the incoming client traffic matches with multiple listeners, the request routing rule with highest priority will be used for serving the request.
32+
This ordering can be established by providing a 'Priority' field value to the request routing rules associated with the listeners. You can specify an integer value from 1 to 20000 with 1 being the highest priority and 20000 being the lowest priority. In case the incoming client traffic matches with multiple listeners, the request routing rule with highest priority will be used for serving the request. Each request routing rule needs to have a unique priority value.
3333

3434
The priority field only impacts the order of evaluation of a request routing rule, this will not change the order of evaluation of path based rules within a `PathBasedRouting` request routing rule.
3535

articles/automation/automation-security-overview.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article provides an overview of Azure Automation account authe
44
keywords: automation security, secure automation; automation authentication
55
services: automation
66
ms.subservice: process-automation
7-
ms.date: 10/26/2021
7+
ms.date: 11/05/2021
88
ms.topic: conceptual
99
ms.custom: devx-track-azurepowershell
1010
---
@@ -33,6 +33,9 @@ A managed identity from Azure Active Directory (Azure AD) allows your runbook to
3333

3434
Managed identities are the recommended way to authenticate in your runbooks, and is the default authentication method for your Automation account.
3535

36+
> [!NOTE]
37+
> When you create an Automation account, the option to create a Run As account is no longer available. However, we continue to support a RunAs account for existing and new Automation accounts. You can [create a Run As account](create-run-as-account.md) in your Automation account from the Azure portal or by using PowerShell.
38+
3639
Here are some of the benefits of using managed identities:
3740

3841
- Using a managed identity instead of the Automation Run As account simplifies management. You don't have to renew the certificate used by a Run As account.
@@ -63,7 +66,7 @@ To create or renew a Run As account, permissions are needed at three levels:
6366
- Automation account
6467

6568
> [!NOTE]
66-
> Azure Automation does not automatically create the Run As account. It has been replaced by using managed identities.
69+
> Azure Automation does not automatically create the Run As account, it has been replaced by using managed identities. However, we continue to support a RunAs account for existing and new Automation accounts. You can [create a Run As account](create-run-as-account.md) in your Automation account from the Azure portal or by using PowerShell.
6770
6871
### Subscription permissions
6972

articles/availability-zones/TOC.yml

Lines changed: 15 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
- name: Azure Resiliency
22
items:
33
- name: Azure Resiliency feature page
4-
href: https://azure.microsoft.com/features/resiliency
4+
href: https://azure.microsoft.com/features/
5+
- name: Resiliency in Azure
6+
href: overview.md
57
- name: Design resilient applications for Azure
68
href: /azure/architecture/framework/resiliency/app-design
79
- name: Availability Zones fundamentals
@@ -97,21 +99,26 @@
9799
items:
98100
- name: Create an Azure Active Directory Domain Services instance
99101
href: ../active-directory-domain-services/tutorial-create-instance.md
100-
- name: Azure Orbital Documentation
101-
items:
102-
- name: What is Azure Orbital?
103-
href: ../networking/azure-orbital-overview.md
102+
104103
- name: Disaster Recovery
105-
items:
104+
items:
105+
- name: Business continuity management in Azure
106+
href: business-continuity-management-program.md
107+
- name: Cross-region replication in Azure
108+
href: cross-region-replication-azure.md
106109
- name: Use Azure Site Recovery
107110
href: ../site-recovery/index.yml
108-
- name: Azure Backup
109-
items:
110111
- name: Use Azure Backup
111112
href: ../backup/index.yml
113+
- name: Microsoft Azure Well-Architected Framework
114+
href: /azure/architecture/framework/
112115
- name: Resources
113116
items:
114117
- name: Azure Roadmap
115118
href: https://azure.microsoft.com/roadmap/
116119
- name: Azure Regions
117120
href: https://azure.microsoft.com/regions/
121+
- name: Azure Orbital Documentation
122+
items:
123+
- name: What is Azure Orbital?
124+
href: ../networking/azure-orbital-overview.md

articles/availability-zones/az-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: prsandhu
55
ms.service: azure
66
ms.topic: conceptual
77
ms.date: 10/01/2021
8-
ms.author: prsandhu
8+
ms.author: rarco
99
ms.reviewer: cynthn
1010
ms.custom: references_regions
1111
---
@@ -48,8 +48,8 @@ Azure provides the most extensive global footprint of any cloud provider and is
4848
| Central US | North Europe | | Japan East |
4949
| East US | Norway East | | Korea Central |
5050
| East US 2 | UK South | | Southeast Asia |
51-
| South Central US | West Europe | | East Asia* |
52-
| US Gov Virginia | Sweden* | | |
51+
| South Central US | West Europe | | East Asia |
52+
| US Gov Virginia | Sweden | | |
5353
| West US 2 | | | |
5454
| West US 3 | | | |
5555

articles/availability-zones/az-region.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: prsandhu
55
ms.service: azure
66
ms.topic: conceptual
77
ms.date: 10/01/2021
8-
ms.author: prsandhu
8+
ms.author: rarco
99
ms.reviewer: cynthn
1010
ms.custom: references_regions
1111
---
@@ -28,8 +28,8 @@ Azure provides the most extensive global footprint of any cloud provider and is
2828
| Central US | North Europe | | Japan East |
2929
| East US | Norway East | | Korea Central |
3030
| East US 2 | UK South | | Southeast Asia |
31-
| South Central US | West Europe | | East Asia* |
32-
| US Gov Virginia | Sweden* | | |
31+
| South Central US | West Europe | | East Asia |
32+
| US Gov Virginia | Sweden | | |
3333
| West US 2 | | | |
3434
| West US 3 | | | |
3535

@@ -208,4 +208,4 @@ You can access Azure availability zones by using your Azure subscription. To lea
208208

209209
- [Building solutions for high availability using availability zones](/azure/architecture/high-availability/building-solutions-for-high-availability)
210210
- [High availability with Azure services](/azure/architecture/framework/resiliency/overview)
211-
- [Design patterns for high availability](/azure/architecture/framework/resiliency/app-design)
211+
- [Design patterns for high availability](/azure/architecture/framework/resiliency/app-design)
Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
---
2+
title: Business continuity management program in Azure
3+
description: Learn about one of the most mature business continuity management programs in the industry.
4+
author: arcorob
5+
ms.service: azure
6+
ms.topic: conceptual
7+
ms.date: 10/21/2021
8+
ms.author: rarco
9+
ms.reviewer: cynthn
10+
ms.custom: fasttrack-edit, mvc
11+
---
12+
13+
# Business continuity management in Azure
14+
15+
Azure maintains one of the most mature and respected business continuity management programs in the industry. The goal of business continuity in Azure is to build and advance recoverability and resiliency for all independently recoverable services, whether a service is customer-facing (part of an Azure offering) or an internal supporting platform service.
16+
17+
In understanding business continuity, it's important to note that many offerings are made up of multiple services. At Azure, each service is statically identified through tooling and is the unit of measure used for privacy, security, inventory, risk business continuity management, and other functions. To properly measure capabilities of a service, the three elements of people, process, and technology are included for each service, whatever the service type.
18+
19+
![An image describing how elements such as people (those who work on the service and are required to support it), process (any process to do tasks that support the service), and technology (the technology used to deliver the service or the technology provided as the service itself) combine to create a service that benefits a cloud user.](./media/people-process-technology.png)
20+
21+
For example:
22+
23+
- If there's a business process based on people, such as a help desk or team, the service delivery is what they do. The people use processes and technology to perform the service.
24+
- If there's technology as a service, such as Azure Virtual Machines, the service delivery is the technology along with the people and processes that support its operation.
25+
26+
## Shared responsibility model
27+
28+
Many of the offerings Azure provides require customers to set up disaster recovery in multiple regions and aren't the responsibility of Microsoft. Not all Azure services automatically replicate data or automatically fall back from a failed region to cross-replicate to another enabled region. In these cases, recovery and replication must be configured by the customer.
29+
30+
Microsoft does ensure that the baseline infrastructure and platform services are available. But in some scenarios, usage requires the customer to duplicate their deployments and storage in a multi-region capacity, if they opt to. These examples illustrate the shared responsibility model. It's a fundamental pillar in your business continuity and disaster recovery strategy.
31+
32+
### Division of responsibility
33+
34+
In any on-premises datacenter, you own the whole stack. As you move assets to the cloud, some responsibilities transfer to Microsoft. The following diagram illustrates areas and division of responsibility between you and Microsoft according to the type of deployment.
35+
36+
![A visual showing what responsibilities belong to the cloud customer versus the cloud provider.](./media/shared-responsibility-model.png)
37+
38+
A good example of the shared responsibility model is the deployment of virtual machines. If a customer wants to set up *cross-region replication* for resiliency if there's region failure, they must deploy a duplicate set of virtual machines in an alternate enabled region. Azure doesn't automatically replicate these services over if there's a failure. It's the customer's responsibility to deploy necessary assets. The customer must have a process to manually change primary regions, or they must use a traffic manager to detect and automatically fail over.
39+
40+
Customer-enabled disaster recovery services all have public-facing documentation to guide you. For an example of public-facing documentation for customer-enabled disaster recovery, see [Azure Data Lake Analytics](../data-lake-analytics/data-lake-analytics-disaster-recovery.md).
41+
42+
For more information on the shared responsibility model, see [Microsoft Trust Center](../security/fundamentals/shared-responsibility.md).
43+
44+
## Business continuity compliance: Service-level responsibility
45+
46+
Each service is required to complete Business Continuity Disaster Recovery records in the Azure Business Continuity Manager Tool. Service owners can use the tool to work within a federated model to complete and incorporate requirements that include:
47+
48+
- **Service properties**: Defines the service and how disaster recovery and resiliency are achieved and identifies the responsible party for disaster recovery (for technology). For details on recovery ownership, see the discussion on the shared responsibility model in the preceding section and diagram.
49+
50+
- **Business impact analysis**: This analysis helps the service owner define the recovery time objective (RTO) and recovery point objective (RPO) based on the criticality of the service across a table of impacts. Operational, legal, regulatory, brand image, and financial impacts are used as target goals for recovery.
51+
52+
> [!NOTE]
53+
> Microsoft doesn't publish RTO or RPOs for services because this data is for internal measures only. All customer promises and measures are SLA-based because it covers a wider range versus RTO or RPO, which is only applicable in catastrophic loss.
54+
55+
- **Dependencies**: Each service maps the dependencies (other services) it requires to operate no matter how critical, and is mapped to runtime, needed for recovery only, or both. If there are storage dependencies, another data is mapped that defines what's stored, and if it requires point-in-time snapshots, for example.
56+
57+
- **Workforce**: As noted in the definition of a service, it's important to know the location and quantity of workforce able to support the service, ensuring no single points of failure, and if critical employees are dispersed to avoid failures by cohabitation in a single location.
58+
59+
- **External suppliers**: Microsoft keeps a comprehensive list of external suppliers, and the suppliers deemed critical are measured for capabilities. If identified by a service as a dependency, supplier capabilities are compared to the needs of the service to ensure a third-party outage doesn't disrupt Azure services.
60+
61+
- **Recovery rating**: This rating is unique to the Azure Business Continuity Management program. This rating measures several key elements to create a resiliency score:
62+
63+
- Willingness to fail over: Although there can be a process, it might not be the first choice for short-term outages.
64+
- Automation of failover.
65+
- Automation of the decision to fail over.
66+
67+
The most reliable and shortest time to failover is a service that's automated and requires no human decision. An automated service uses heartbeat monitoring or synthetic transactions to determine a service is down and to start immediate remediation.
68+
69+
- **Recovery plan and test**: Azure requires every service to have a detailed recovery plan and to test that plan as if the service has failed because of catastrophic outage. The recovery plans are required to be written so that someone with similar skills and access can complete the tasks. A written plan avoids relying on subject matter experts being available.
70+
71+
Testing is done in several ways, including self-test in a production or near-production environment, and as part of Azure full-region down drills in canary region sets. These enabled regions are identical to production regions but can be disabled without affecting customers. Testing is considered integrated because all services are affected simultaneously.
72+
73+
- **Customer enablement**: When the customer is responsible for setting up disaster recovery, Azure is required to have public-facing documentation guidance. For all such services, links are provided to documentation and details about the process.
74+
75+
## Verify your business continuity compliance
76+
77+
When a service has completed its business continuity management record, you must submit it for approval. It's assigned to a business continuity management experienced practitioner who reviews the entire record for completeness and quality. If the record meets all requirements, it's approved. If it doesn't, it's rejected with a request for reworking. This process ensures that both parties agree that business continuity compliance has been met and that the work is only attested to by the service owner. Azure internal audit and compliance teams also do periodic random sampling to ensure the best data is being submitted.
78+
79+
## Testing of services
80+
81+
Microsoft and Azure do extensive testing for both disaster recovery and for availability zone readiness. Services are self-tested in a production or pre-production environment to demonstrate independent recoverability for services that aren't dependent on major platform failovers.
82+
83+
To ensure services can similarly recover in a true region-down scenario, "pull-the-plug"-type testing is done in canary environments that are fully deployed regions matching production. For example, the clusters, racks, and power units are literally turned off to simulate a total region failure.
84+
85+
During these tests, Azure uses the same production process for detection, notification, response, and recovery. No individuals are expecting a drill, and engineers relied on for recovery are the normal on-call rotation resources. This timing avoids depending on subject matter experts who might not be available during an actual event.
86+
87+
Included in these tests are services where the customer is responsible for setting up disaster recovery following Microsoft public-facing documentation. Service teams create customer-like instances to show that customer-enabled disaster recovery works as expected and that the instructions provided are accurate.
88+
89+
For more information on certifications, see the [Microsoft Trust Center](https://www.microsoft.com/trust-center) and the section on compliance.
90+
91+
## Next steps
92+
93+
- [Regions that support availability zones in Azure](az-overview.md)
94+
- [Quickstart templates](https://aka.ms/azqs)

0 commit comments

Comments
 (0)