Skip to content

Commit bee160e

Browse files
Merge pull request #269976 from rvandenbedem/patch-2
ToC structure change
2 parents 2240cad + a3517ac commit bee160e

40 files changed

+655
-540
lines changed

.openpublishing.redirection.azure-vmware.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -179,6 +179,66 @@
179179
"source_path_from_root": "/articles/azure-vmware/vrealize-operations-for-avs.md",
180180
"redirect_url": "/azure/azure-vmware/vrealize-operations-for-azure-vmware-solution",
181181
"redirect_document_id": false
182+
},
183+
{
184+
"source_path_from_root": "/articles/azure-vmware/concepts-api-management.md",
185+
"redirect_url": "/azure/azure-vmware/architecture-api-management",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path_from_root": "/articles/azure-vmware/concepts-design-public-internet-access.md",
190+
"redirect_url": "/azure/azure-vmware/architecture-design-public-internet-access",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path_from_root": "/articles/azure-vmware/concepts-hub-and-spoke.md",
195+
"redirect_url": "/azure/azure-vmware/architecture-hub-and-spoke",
196+
"redirect_document_id": false
197+
},
198+
{
199+
"source_path_from_root": "/articles/azure-vmware/concepts-identity.md",
200+
"redirect_url": "/azure/azure-vmware/architecture-identity",
201+
"redirect_document_id": false
202+
},
203+
{
204+
"source_path_from_root": "/articles/azure-vmware/concepts-migrate.md",
205+
"redirect_url": "/azure/azure-vmware/architecture-migrate",
206+
"redirect_document_id": false
207+
},
208+
{
209+
"source_path_from_root": "/articles/azure-vmware/concepts-network-design-considerations.md",
210+
"redirect_url": "/azure/azure-vmware/architecture-network-design-considerations",
211+
"redirect_document_id": false
212+
},
213+
{
214+
"source_path_from_root": "/articles/azure-vmware/concepts-networking.md",
215+
"redirect_url": "/azure/azure-vmware/architecture-networking",
216+
"redirect_document_id": false
217+
},
218+
{
219+
"source_path_from_root": "/articles/azure-vmware/concepts-private-clouds-clusters.md",
220+
"redirect_url": "/azure/azure-vmware/architecture-private-clouds",
221+
"redirect_document_id": false
222+
},
223+
{
224+
"source_path_from_root": "/articles/azure-vmware/concepts-run-command.md",
225+
"redirect_url": "/azure/azure-vmware/using-run-command",
226+
"redirect_document_id": false
227+
},
228+
{
229+
"source_path_from_root": "/articles/azure-vmware/concepts-security-recommendations.md",
230+
"redirect_url": "/azure/azure-vmware/security-recommendations",
231+
"redirect_document_id": false
232+
},
233+
{
234+
"source_path_from_root": "/articles/azure-vmware/concepts-storage.md",
235+
"redirect_url": "/azure/azure-vmware/architecture-storage",
236+
"redirect_document_id": false
237+
},
238+
{
239+
"source_path_from_root": "/articles/azure-vmware/concepts-vulnerability-management.md",
240+
"redirect_url": "/azure/azure-vmware/vulnerability-management",
241+
"redirect_document_id": false
182242
}
183243
]
184244
}

articles/advisor/advisor-reference-performance-recommendations.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Full list of available performance recommendations in Advisor.
44
ms.topic: article
55
author: mabrahms
66
ms.author: v-mabrahms
7-
ms.date: 10/15/2023
7+
ms.date: 3/22/2024
88
---
99

1010
# Performance recommendations
@@ -167,9 +167,9 @@ Learn more about [Synapse workspace - UpgradeSynapseManagementClientSDK (Update
167167

168168
### vSAN capacity utilization has crossed critical threshold
169169

170-
Your vSAN capacity utilization has reached 75%. The cluster utilization is required to remain below the 75% critical threshold for SLA compliance. Add new nodes to VSphere cluster to increase capacity or delete VMs to reduce consumption or adjust VM workloads
170+
Your vSAN capacity utilization has reached 75%. The cluster utilization is required to remain below the 75% critical threshold for SLA compliance. Add new nodes to the vSphere cluster to increase capacity or delete VMs to reduce consumption or adjust VM workloads
171171

172-
Learn more about [AVS Private cloud - vSANCapacity (vSAN capacity utilization has crossed critical threshold)](../azure-vmware/concepts-private-clouds-clusters.md).
172+
Learn more about [Azure VMware Solution private cloud - vSANCapacity (vSAN capacity utilization has crossed critical threshold)](../azure-vmware/architecture-private-clouds.md).
173173

174174
### Update Automanage to the latest API Version
175175

articles/azure-netapp-files/performance-azure-vmware-solution-datastore.md

Lines changed: 21 additions & 21 deletions
Large diffs are not rendered by default.

articles/azure-vmware/concepts-api-management.md renamed to articles/azure-vmware/architecture-api-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
2-
title: Concepts - API Management
2+
title: Architecture - API Management
33
description: Learn how API Management protects APIs running on Azure VMware Solution virtual machines (VMs)
44
ms.topic: conceptual
55
ms.service: azure-vmware
6-
ms.date: 2/26/2024
6+
ms.date: 3/22/2024
77
ms.custom: engagement-fy23
88
---
99

articles/azure-vmware/concepts-design-public-internet-access.md renamed to articles/azure-vmware/architecture-design-public-internet-access.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
2-
title: Concept - Internet connectivity design considerations
2+
title: Architecture - Internet connectivity design considerations
33
description: Options for Azure VMware Solution Internet Connectivity.
44
ms.topic: conceptual
55
ms.service: azure-vmware
6-
ms.date: 11/28/2023
6+
ms.date: 3/22/2024
77
ms.custom: engagement-fy23
88
---
99

@@ -13,7 +13,7 @@ There are three primary patterns to create outbound access to the Internet from
1313

1414
- [Internet Service hosted in Azure](#internet-service-hosted-in-azure)
1515
- [Azure VMware Solution Managed SNAT](#azure-vmware-solution-managed-snat)
16-
- [Azure Public IPv4 address to NSX-T Data Center Edge](#azure-public-ipv4-address-to-nsx-t-data-center-edge)
16+
- [Azure Public IPv4 address to NSX Data Center Edge](#azure-public-ipv4-address-to-nsx-edge)
1717

1818
Your requirements for security controls, visibility, capacity, and operations drive the selection of the appropriate method for delivery of Internet access to the Azure VMware Solution private cloud.
1919

@@ -42,9 +42,9 @@ A Managed SNAT service provides a simple method for outbound internet access fro
4242
- Two Public IPs are used and rotated to support up to 128k simultaneous outbound connections.
4343
- No inbound DNAT capability is available with the Azure VMware Solution Managed SNAT.
4444

45-
## Azure Public IPv4 address to NSX-T Data Center Edge
45+
## Azure Public IPv4 address to NSX Edge
4646

47-
This option brings an allocated Azure Public IPv4 address directly to the NSX-T Data Center Edge for consumption. It allows the Azure VMware Solution private cloud to directly consume and apply public network addresses in NSX-T Data Center as required. These addresses are used for the following types of connections:
47+
This option brings an allocated Azure Public IPv4 address directly to the NSX Edge for consumption. It allows the Azure VMware Solution private cloud to directly consume and apply public network addresses in NSX as required. These addresses are used for the following types of connections:
4848
- Outbound SNAT
4949
- Inbound DNAT
5050
- Load balancing using VMware NSX Advanced Load Balancer and other third-party Network Virtual Appliances
@@ -55,20 +55,20 @@ This option also lets you configure the public address on a third-party Network
5555
Features include:
5656

5757
- Scale – you can request to increase the soft limit of 64 Azure Public IPv4 addresses to 1,000 s of Azure Public IPs allocated if an application requires it.
58-
- Flexibility – an Azure Public IPv4 address can be applied anywhere in the NSX-T Data Center ecosystem. It can be used to provide SNAT or DNAT, on load balancers like VMware’s NSX Advanced Load Balancer, or third-party Network Virtual Appliances. It can also be used on third-party Network Virtual Security Appliances on VMware segments or directly on VMs.
59-
- Regionality – the Azure Public IPv4 address to NSX-T Data Center Edge is unique to the local SDDC. For “multi private cloud in distributed regions,” with local exit to Internet intentions, it’s easier to direct traffic locally versus trying to control default route propagation for a security or SNAT service hosted in Azure. If you have two or more Azure VMware Solution private clouds connected with a Public IP configured, they can both have a local exit.
58+
- Flexibility – an Azure Public IPv4 address can be applied anywhere in the NSX ecosystem. It can be used to provide SNAT or DNAT, on load balancers like VMware’s NSX Advanced Load Balancer, or third-party Network Virtual Appliances. It can also be used on third-party Network Virtual Security Appliances on VMware segments or directly on VMs.
59+
- Regionality – the Azure Public IPv4 address to NSX Edge is unique to the local SDDC. For “multi private cloud in distributed regions,” with local exit to Internet intentions, it’s easier to direct traffic locally versus trying to control default route propagation for a security or SNAT service hosted in Azure. If you have two or more Azure VMware Solution private clouds connected with a Public IP configured, they can both have a local exit.
6060

6161
## Considerations for selecting an option
6262

6363
The option that you select depends on the following factors:
6464

6565
- To add an Azure VMware private cloud to a security inspection point provisioned in Azure native that inspects all Internet traffic from Azure native endpoints, use an Azure native construct and leak a default route from Azure to your Azure VMware Solution private cloud.
66-
- If you need to run a third-party Network Virtual Appliance to conform to existing standards for security inspection or streamlined operating expenses, you have two options. You can run your Azure Public IPv4 address in Azure native with the default route method or run it in Azure VMware Solution using Azure Public IPv4 address to NSX-T Data Center Edge.
67-
- There are scale limits on how many Azure Public IPv4 addresses can be allocated to a Network Virtual Appliance running in native Azure or provisioned on Azure Firewall. The Azure Public IPv4 address to NSX-T Data Center Edge option allows for higher allocations (1,000 s versus 100 s).
68-
- Use an Azure Public IPv4 address to the NSX-T Data Center Edge for a localized exit to the internet from each private cloud in its local region. Using multiple Azure VMware Solution private clouds in several Azure regions that need to communicate with each other and the internet, it can be challenging to match an Azure VMware Solution private cloud with a security service in Azure. The difficulty is due to the way a default route from Azure works.
66+
- If you need to run a third-party Network Virtual Appliance to conform to existing standards for security inspection or streamlined operating expenses, you have two options. You can run your Azure Public IPv4 address in Azure native with the default route method or run it in Azure VMware Solution using Azure Public IPv4 address to NSX Edge.
67+
- There are scale limits on how many Azure Public IPv4 addresses can be allocated to a Network Virtual Appliance running in native Azure or provisioned on Azure Firewall. The Azure Public IPv4 address to NSX Edge option allows for higher allocations (1,000 s versus 100 s).
68+
- Use an Azure Public IPv4 address to the NSX Edge for a localized exit to the internet from each private cloud in its local region. Using multiple Azure VMware Solution private clouds in several Azure regions that need to communicate with each other and the internet, it can be challenging to match an Azure VMware Solution private cloud with a security service in Azure. The difficulty is due to the way a default route from Azure works.
6969

7070
> [!IMPORTANT]
71-
> By design, Public IPv4 Address with NSX-T Data Center does not allow the exchange of Azure/Microsoft owned Public IP Addresses over ExpressRoute Private Peering connections. This means you cannot advertise the Public IPv4 addresses to your customer vNET or on-premises network via ExpressRoute. All Public IPv4 Addresses with NSX-T Data Center traffic must take the internet path even if the Azure VMware Solution private cloud is connected via ExpressRoute. For more information, visit [ExpressRoute Circuit Peering](../expressroute/expressroute-circuit-peerings.md).
71+
> By design, Public IPv4 Address with NSX does not allow the exchange of Azure/Microsoft owned Public IP Addresses over ExpressRoute Private Peering connections. This means you cannot advertise the Public IPv4 addresses to your customer VNet or on-premises network via ExpressRoute. All Public IPv4 Addresses with NSX traffic must take the internet path even if the Azure VMware Solution private cloud is connected via ExpressRoute. For more information, visit [ExpressRoute Circuit Peering](../expressroute/expressroute-circuit-peerings.md).
7272
7373
## Next Steps
7474

articles/azure-vmware/concepts-hub-and-spoke.md renamed to articles/azure-vmware/architecture-hub-and-spoke.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
2-
title: Concept - Integrate an Azure VMware Solution deployment in a hub and spoke architecture
2+
title: Architecture - Integrate an Azure VMware Solution deployment in a hub and spoke architecture
33
description: Learn about integrating an Azure VMware Solution deployment in a hub and spoke architecture on Azure.
44
ms.topic: conceptual
55
ms.service: azure-vmware
6-
ms.date: 12/21/2023
6+
ms.date: 3/22/2024
77
ms.custom: engagement-fy23
88
---
99

@@ -68,7 +68,7 @@ Because an ExpressRoute gateway doesn't provide transitive routing between its c
6868

6969
:::image type="content" source="./media/hub-spoke/azure-vmware-solution-hub-vnet-traffic-flow.png" alt-text="Diagram showing the Azure VMware Solution to Hub virtual network traffic flow." border="false" lightbox="./media/hub-spoke/azure-vmware-solution-hub-vnet-traffic-flow.png":::
7070

71-
For more information on Azure VMware Solution networking and connectivity concepts, see the [Azure VMware Solution product documentation](./concepts-networking.md).
71+
For more information on Azure VMware Solution networking and connectivity concepts, see the [Azure VMware Solution product documentation](./architecture-networking.md).
7272

7373
### Traffic segmentation
7474

0 commit comments

Comments
 (0)