Skip to content

Commit bd87f7a

Browse files
authored
Merge pull request #289383 from ankitaduttaMSFT/asrdoc1
asr doc updates
2 parents 6d90a12 + 2d62cf4 commit bd87f7a

File tree

5 files changed

+18
-5
lines changed

5 files changed

+18
-5
lines changed

articles/site-recovery/azure-to-azure-common-questions.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,10 @@ This isn't supported.
8686

8787
Support for this is limited to a few regions. [Learn more](azure-to-azure-how-to-enable-zone-to-zone-disaster-recovery.md).
8888

89+
### Can we replicate from one Zone to non-zone with Azure Site Recovery?
90+
91+
Yes, this is supported.
92+
8993
### Can I exclude disks from replication?
9094

9195
Yes, you can exclude disks when you set up replication, using PowerShell. [Learn more](azure-to-azure-exclude-disks.md) about excluding disks.

articles/site-recovery/azure-to-azure-how-to-enable-replication-ade-vms.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ankitaduttaMSFT
55
manager: gaggupta
66
ms.service: azure-site-recovery
77
ms.topic: how-to
8-
ms.date: 05/06/2024
8+
ms.date: 10/29/2024
99
ms.author: ankitadutta
1010

1111
---
@@ -70,6 +70,9 @@ To troubleshoot permissions, refer to [key vault permission issues](#trusted-roo
7070

7171
By default, Site Recovery creates a new key vault in the target region. The vault's name has an "asr" suffix that's based on the source VM disk encryption keys. If a key vault already exists that was created by Site Recovery, it's reused. Select a different key vault from the list if necessary.
7272

73+
> [!NOTE]
74+
> Alternatively, you can download the key, import it in the secondary key vault region. You can then modify your replicas disks to use the keys.
75+
7376
## Enable replication
7477

7578
Use the following procedure to replicate Azure Disk Encryption-enabled VMs to another Azure region. As an example, primary Azure region is East Asia, and the secondary is Southeast Asia.

articles/site-recovery/azure-to-azure-support-matrix.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,8 @@ As average churn on the disks increases, the number of disks that a storage acco
8282
> The cache limits are specific to Azure-to-Azure and Zone-to-Zone DR scenarios.
8383
>
8484
> When you enable replication via the virtual machine workflow for cross subscription, the portal only lists the cache storage account from the source subscription, but doesn't list any storage account created in the target subscription. To set up this scenario, use [PowerShell](azure-to-azure-powershell.md).
85+
>
86+
> Azure Site Recovery isn't supported for VMs with Premium SSD v2 disks.
8587
8688

8789

articles/site-recovery/report-site-recovery.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To start using Azure Site Recovery reports, follow these steps:
3333

3434
### Create a Log Analytics workspace or use an existing workspace
3535

36-
Set up one or more Log Analytics workspaces to store your Backup reporting data. The location and subscription of this Log Analytics workspace, can be different from where your vaults are located or subscribed.
36+
Set up one or more Log Analytics workspaces to store your Backup reporting data. The location and subscription of this Log Analytics workspace can be different from where your vaults are located or subscribed.
3737

3838
To set up a Log Analytics workspace, [follow these steps](/azure/azure-monitor/logs/quick-create-workspace). The data in a Log Analytics workspace is kept for 30 days by default. If you want to see data for a longer time span, change the retention period of the Log Analytics workspace. To change the retention period, see [Configure data retention and archive policies in Azure Monitor Logs](/azure/azure-monitor/logs/data-retention-configure).
3939

@@ -48,7 +48,7 @@ You can also configure diagnostics settings for your vaults using the following
4848

4949
1. Navigate to the chosen the Recovery Services vault, then select **Monitoring** > **Diagnostic settings**.
5050
1. Specify the target for the Recovery Services Vault's diagnostic data. Learn more about [using diagnostic events](../backup/backup-azure-diagnostic-events.md) for Recovery Services vaults.
51-
1. Select **Azure Site Recovery Jobs** and **Azure Site Recovery Replicated Item Details** options to populate the reports.
51+
1. Select **Azure Site Recovery Jobs** and **Azure Site Recovery Replicated Item Details**, and on the **Destination** table **Resource Specific** options to populate the reports.
5252
:::image type="content" source="./media/report-site-recovery/logs.png" alt-text="Screenshot of logs options.":::
5353

5454
> [!NOTE]
@@ -120,4 +120,4 @@ Additionally, the V1 schema for sending diagnostics data to a storage account or
120120

121121
## Next steps
122122

123-
- [Diagnostics in Backup and Site Recovery](../backup/backup-azure-diagnostic-events.md)
123+
- [Diagnostics in Backup and Site Recovery](../backup/backup-azure-diagnostic-events.md)

articles/site-recovery/site-recovery-faq.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ sections:
161161
>The modernized experience uses TLS 1.2 for all the communication and enforces it by default.
162162
163163
- question: |
164-
How can I enforce TLS 1.2 on HyperV-to-Azure Site Recovery scenarios?
164+
How can I enforce TLS 1.2 on Hyper-V-to-Azure Site Recovery scenarios?
165165
answer: |
166166
All communication between the microservices of Azure Site Recovery happens on TLS 1.2 protocol. Site Recovery uses security providers configured in the system (OS) and uses the latest available TLS protocol. One needs to explicitly enable the TLS 1.2 in the Registry and then Site Recovery will start using TLS 1.2 for communication with services.
167167
@@ -180,6 +180,10 @@ sections:
180180
- [Classic Storage Account Contributor](../role-based-access-control/built-in-roles.md#classic-storage-account-contributor)
181181
- [Classic Storage Account Key Operator Service Role](../role-based-access-control/built-in-roles.md#classic-storage-account-key-operator-service-role)
182182
183+
Cache storage account is not supported for managed identity.
184+
185+
186+
183187
- question: |
184188
Can Azure Site Recovery track source virtual machine changes outside the Source OS?
185189
answer: |

0 commit comments

Comments
 (0)