You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/integrate-azure-native-services.md
+9-18Lines changed: 9 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,8 @@ title: Monitor and protect VMs with Azure native services
3
3
description: Learn how to integrate and deploy Microsoft Azure native tools to monitor and manage your Azure VMware Solution workloads.
4
4
ms.topic: how-to
5
5
ms.service: azure-vmware
6
-
ms.date: 08/15/2021
6
+
ms.date: 10/26/2022
7
+
ms.custom: engagement-fy23
7
8
---
8
9
9
10
# Monitor and protect VMs with Azure native services
@@ -12,9 +13,9 @@ Microsoft Azure native services let you monitor, manage, and protect your virtua
12
13
13
14
The Azure native services that you can integrate with Azure VMware Solution include:
14
15
15
-
-**Azure Arc** extends Azure management to any infrastructure, including Azure VMware Solution, on-premises, or other cloud platforms. [Azure Arc-enabled servers](../azure-arc/servers/overview.md) lets you manage your Windows and Linux physical servers and virtual machines hosted *outside* of Azure, on your corporate network, or another cloud provider. You can attach a Kubernetes cluster hosted in your Azure VMware Solution environment using [Azure Arc enabled Kubernetes](../azure-arc/kubernetes/overview.md).
16
+
-**Azure Arc** extends Azure management to any infrastructure, including Azure VMware Solution, on-premises, or other cloud platforms. [Azure Arc-enabled servers](../azure-arc/servers/overview.md) lets you manage your Windows and Linux physical servers and virtual machines hosted *outside* of Azure, on your corporate network, or another cloud provider. You can attach a Kubernetes cluster hosted in your Azure VMware Solution environment using [Azure Arc enabled Kubernetes](../azure-arc/kubernetes/overview.md).
16
17
17
-
-**Azure Monitor** collects, analyzes, and acts on telemetry from your cloud and on-premises environments. It requires no deployment. You can monitor guest operating system performance to discover and map application dependencies for Azure VMware Solution or on-premises VMs. Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection using the Log Analytics agent or extensions.
18
+
-**Azure Monitor** collects, analyzes, and acts on data from your cloud and on-premises environments. It requires no deployment. You can monitor guest operating system performance to discover and map application dependencies for Azure VMware Solution or on-premises VMs. Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection using the Log Analytics agent or extensions.
18
19
19
20
With Azure Monitor, you can collect data from different [sources to monitor and analyze](../azure-monitor/data-sources.md) and different types of [data for analysis, visualization, and alerting](../azure-monitor/data-platform.md). You can also create alert rules to identify issues in your environment, like high use of resources, missing patches, low disk space, and heartbeat of your VMs. You can set an automated response to detected events by sending an alert to IT Service Management (ITSM) tools. Alert detection notification can also be sent via email.
20
21
@@ -48,7 +49,7 @@ The Azure native services that you can integrate with Azure VMware Solution incl
48
49
49
50
The diagram shows the integrated monitoring architecture for Azure VMware Solution VMs.
The Log Analytics agent enables collection of log data from Azure, Azure VMware Solution, and on-premises VMs. The log data is sent to Azure Monitor Logs and stored in a Log Analytics workspace. You can deploy the Log Analytics agent using Arc enabled servers [VM extensions support](../azure-arc/servers/manage-vm-extensions.md) for new and existing VMs.
54
55
@@ -58,7 +59,7 @@ You can configure the Log Analytics workspace with Microsoft Sentinel for alert
58
59
59
60
## Before you start
60
61
61
-
If you are new to Azure or unfamiliar with any of the services previously mentioned, review the following articles:
62
+
If you're new to Azure or unfamiliar with any of the services previously mentioned, review the following articles:
-[Designing your Azure Monitor Logs deployment](../azure-monitor/logs/workspace-design.md) and [Azure Monitor](../azure-monitor/overview.md)
@@ -67,8 +68,6 @@ If you are new to Azure or unfamiliar with any of the services previously mentio
67
68
-[What is Azure Arc enabled servers?](../azure-arc/servers/overview.md) and [What is Azure Arc enabled Kubernetes?](../azure-arc/kubernetes/overview.md)
[Azure Update Management](../automation/update-management/overview.md) in Azure Automation manages operating system updates for your Windows and Linux machines in a hybrid environment. It monitors patching compliance and forwards patching deviation alerts to Azure Monitor for remediation. Azure Update Management must connect to your Log Analytics workspace to use stored data to assess the status of updates on your VMs.
@@ -81,8 +80,8 @@ If you are new to Azure or unfamiliar with any of the services previously mentio
81
80
1.[Create a Log Analytics workspace in the Azure portal](../azure-monitor/logs/quick-create-workspace.md). If you prefer, you can also create a workspace via [CLI](../azure-monitor/logs/resource-manager-workspace.md), [PowerShell](../azure-monitor/logs/powershell-workspace-configuration.md), or [Azure Resource Manager template](../azure-monitor/logs/resource-manager-workspace.md).
82
81
83
82
1.[Enable Update Management from an Automation account](../automation/update-management/enable-from-automation-account.md). In the process, you'll link your Log Analytics workspace with your automation account.
84
-
85
-
1. Once you've enabled Update Management, you can [deploy updates on VMs and review the results](../automation/update-management/deploy-updates.md).
83
+
84
+
1. Once you've enabled Update Management, you can [deploy updates on VMs and review the results](../automation/update-management/deploy-updates.md).
86
85
87
86
## Enable Microsoft Defender for Cloud
88
87
@@ -111,28 +110,21 @@ For more information, see [Integrate Microsoft Defender for Cloud with Azure VMw
111
110
112
111
Extend Azure management to any infrastructure, including Azure VMware Solution, on-premises, or other cloud platforms. For information on enabling Azure Arc enabled servers for multiple Windows or Linux VMs, see [Connect hybrid machines to Azure at scale](../azure-arc/servers/onboard-service-principal.md).
113
112
114
-
115
-
116
113
## Onboard hybrid Kubernetes clusters with Azure Arc-enabled Kubernetes
117
114
118
115
Attach a Kubernetes cluster hosted in your Azure VMware Solution environment using Azure Arc enabled Kubernetes. For more information, see [Create an Azure Arc-enabled Kubernetes cluster](../azure-arc/kubernetes/quickstart-connect-cluster.md).
119
116
120
-
121
117
## Deploy the Log Analytics agent
122
118
123
119
Monitor Azure VMware Solution VMs through the Log Analytics agent. Machines connected to the Log Analytics workspace use the [Log Analytics agent](../azure-monitor/agents/log-analytics-agent.md) to collect data about changes to installed software, Microsoft services, Windows registry and files, and Linux daemons on monitored servers. When data is available, the agent sends it to Azure Monitor Logs for processing. Azure Monitor Logs applies logic to the received data, records it, and makes it available for analysis.
124
120
125
121
Deploy the Log Analytics agent by using [Azure Arc-enabled servers VM extension support](../azure-arc/servers/manage-vm-extensions.md).
126
122
127
-
128
-
129
-
130
123
## Enable Azure Monitor
131
124
132
125
Can collect data from different [sources to monitor and analyze](../azure-monitor/data-sources.md) and different types of [data for analysis, visualization, and alerting](../azure-monitor/data-platform.md). You can also create alert rules to identify issues in your environment, like high use of resources, missing patches, low disk space, and heartbeat of your VMs. You can set an automated response to detected events by sending an alert to IT Service Management (ITSM) tools. Alert detection notification can also be sent via email.
133
126
134
-
Monitor guest operating system performance to discover and map application dependencies for Azure VMware Solution or on-premises VMs. Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection using the Log Analytics agent or extensions.
135
-
127
+
Monitor guest operating system performance to discover and map application dependencies for Azure VMware Solution or on-premises VMs. Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection using the Log Analytics agent or extensions.
136
128
137
129
1.[Design your Azure Monitor Logs deployment](../azure-monitor/logs/workspace-design.md)
138
130
@@ -150,7 +142,6 @@ Monitor guest operating system performance to discover and map application depen
150
142
151
143
-[Connect Azure to ITSM tools using IT Service Management Connector](../azure-monitor/alerts/itsmc-overview.md).
152
144
153
-
154
145
## Next steps
155
146
156
147
Now that you've covered Azure VMware Solution network and interconnectivity concepts, you may want to learn about [integrating Microsoft Defender for Cloud with Azure VMware Solution](azure-security-integration.md).
description: Learn how to access an Azure VMware Solution private cloud
4
4
ms.topic: tutorial
5
5
ms.service: azure-vmware
6
-
ms.date: 08/13/2021
6
+
ms.date: 10/27/2022
7
+
ms.custom: engagement-fy23
7
8
---
8
9
9
10
# Tutorial: Access an Azure VMware Solution private cloud
10
11
11
-
Azure VMware Solution doesn't allow you to manage your private cloud with your on-premises vCenter Server. Instead, you'll need to connect to the Azure VMware Solution vCenter Server instance through a jump box.
12
+
Azure VMware Solution doesn't allow you to manage your private cloud with your on-premises vCenter Server. Instead, you'll need to connect to the Azure VMware Solution vCenter Server instance through a jump box.
12
13
13
-
In this tutorial, you'll create a jump box in the resource group you created in the [previous tutorial](tutorial-configure-networking.md) and sign into the Azure VMware Solution vCenter Server. This jump box is a Windows virtual machine (VM) on the same virtual network you created. It provides access to both vCenter Server and the NSX Manager.
14
+
In this tutorial, you'll create a jump box in the resource group you created in the [previous tutorial](tutorial-configure-networking.md) and sign into the Azure VMware Solution vCenter Server. This jump box is a Windows virtual machine (VM) on the same virtual network you created. It provides access to both vCenter Server and the NSX Manager.
14
15
15
16
In this tutorial, you learn how to:
16
17
@@ -22,9 +23,9 @@ In this tutorial, you learn how to:
22
23
23
24
1. In the resource group, select **Add**, search for **Microsoft Windows 10**, and select it. Then select **Create**.
24
25
25
-
:::image type="content" source="media/tutorial-access-private-cloud/ss8-azure-w10vm-create.png" alt-text="Screenshot of how to add a new Windows 10 VM for a jump box.":::
26
+
:::image type="content" source="media/tutorial-access-private-cloud/ss8-azure-w10vm-create.png" alt-text="Screenshot of how to add a new Windows 10 VM for a jump box."lightbox="media/tutorial-access-private-cloud/ss8-azure-w10vm-create.png":::
26
27
27
-
1. Enter the required information in the fields, and then select **Review + create**.
28
+
1. Enter the required information in the fields, and then select **Review + create**.
28
29
29
30
For more information on the fields, see the following table.
30
31
@@ -50,29 +51,27 @@ In this tutorial, you learn how to:
50
51
51
52
1. From the jump box, sign in to vSphere Client with VMware vCenter Server SSO using a cloud admin username and verify that the user interface displays successfully.
52
53
53
-
1. In the Azure portal, select your private cloud, and then **Manage** > **Identity**.
54
+
1. In the Azure portal, select your private cloud, and then **Manage** > **Identity**.
54
55
55
56
The URLs and user credentials for private cloud vCenter Server and NSX-T Manager display.
56
57
57
-
:::image type="content" source="media/tutorial-access-private-cloud/ss4-display-identity.png" alt-text="Screenshot showing the private cloud vCenter Server and NSX Manager URLs and credentials."lightbox="media/tutorial-access-private-cloud/ss4-display-identity.png":::
58
+
:::image type="content" source="media/tutorial-access-private-cloud/ss4-display-identity.png" alt-text="Screenshot showing the private cloud vCenter Server and NSX Manager URLs and credentials."lightbox="media/tutorial-access-private-cloud/ss4-display-identity.png":::
58
59
59
-
1. Navigate to the VM you created in the preceding step and connect to the virtual machine.
60
+
1. Navigate to the VM you created in the preceding step and connect to the virtual machine.
60
61
61
62
If you need help with connecting to the VM, see [connect to a virtual machine](../virtual-machines/windows/connect-logon.md#connect-to-the-virtual-machine) for details.
62
63
63
-
1. In the Windows VM, open a browser and navigate to the vCenter Server and NSX-T Manager URLs in two tabs.
64
+
1. In the Windows VM, open a browser and navigate to the vCenter Server and NSX-T Manager URLs in two tabs.
64
65
65
66
1. In the vSphere Client tab, enter the `[email protected]` user credentials from the previous step.
66
67
67
-
:::image type="content" source="media/tutorial-access-private-cloud/ss5-vcenter-login.png" alt-text="Screenshot showing the VMware vSphere sign in page." border="true":::
68
+
:::image type="content" source="media/tutorial-access-private-cloud/ss5-vcenter-login.png" alt-text="Screenshot showing the VMware vSphere sign in page."lightbox="media/tutorial-access-private-cloud/ss5-vcenter-login.png" border="true":::
68
69
69
-
:::image type="content" source="media/tutorial-access-private-cloud/ss6-vsphere-client-home.png" alt-text="Screenshot showing a summary of Cluster-1 in the vSphere Client." border="true":::
70
+
:::image type="content" source="media/tutorial-access-private-cloud/ss6-vsphere-client-home.png" alt-text="Screenshot showing a summary of Cluster-1 in the vSphere Client."lightbox="media/tutorial-access-private-cloud/ss6-vsphere-client-home.png" border="true":::
70
71
71
72
1. In the second tab of the browser, sign in to NSX-T Manager.
72
73
73
-
:::image type="content" source="media/tutorial-access-private-cloud/ss10-nsx-manager-home.png" alt-text="Screenshot of the NSX-T Manager Overview." border="true":::
74
-
75
-
74
+
:::image type="content" source="media/tutorial-access-private-cloud/ss10-nsx-manager-home.png" alt-text="Screenshot of the NSX-T Manager Overview."lightbox="media/tutorial-access-private-cloud/ss10-nsx-manager-home.png" border="true":::
76
75
77
76
## Next steps
78
77
@@ -86,4 +85,3 @@ Continue to the next tutorial to learn how to create a virtual network to set up
86
85
87
86
> [!div class="nextstepaction"]
88
87
> [Create a Virtual Network](tutorial-configure-networking.md)
description: Learn how to create and deploy an Azure VMware Solution private cloud
4
4
ms.topic: tutorial
5
5
ms.service: azure-vmware
6
-
ms.date: 09/29/2021
6
+
ms.date: 10/27/2022
7
+
ms.custom: engagement-fy23
7
8
---
8
9
9
10
# Tutorial: Deploy an Azure VMware Solution private cloud
@@ -15,7 +16,7 @@ You use vCenter Server and NSX-T Manager to manage most other aspects of cluster
15
16
>[!TIP]
16
17
>You can always extend the cluster and add more clusters later if you need to go beyond the initial deployment number.
17
18
18
-
Because Azure VMware Solution doesn't allow you to manage your private cloud with your cloud vCenter Server at launch, you'll need to do additional steps for the configuration. This tutorial covers these steps and related prerequisites.
19
+
Because Azure VMware Solution doesn't allow you to manage your private cloud with your cloud vCenter Server at launch, you'll need to do more steps for the configuration. This tutorial covers these steps and related prerequisites.
19
20
20
21
In this tutorial, you'll learn how to:
21
22
@@ -45,6 +46,5 @@ In this tutorial, you've learned how to:
45
46
46
47
Continue to the next tutorial to learn how to create a jump box. You use the jump box to connect to your environment to manage your private cloud locally.
47
48
48
-
49
49
> [!div class="nextstepaction"]
50
50
> [Access an Azure VMware Solution private cloud](tutorial-access-private-cloud.md)
description: Learn how to delete an Azure VMware Solution private cloud that you no longer need.
4
4
ms.topic: tutorial
5
5
ms.service: azure-vmware
6
-
ms.date: 03/13/2021
6
+
ms.date: 10/27/2022
7
+
ms.custom: engagement-fy23
7
8
---
8
9
9
10
# Tutorial: Delete an Azure VMware Solution private cloud
@@ -16,7 +17,7 @@ If you have an Azure VMware Solution private cloud that you no longer need, you
16
17
17
18
* Several virtual machines (VMs)
18
19
19
-
When you delete a private cloud, all VMs, their data, clusters, and network address space provisioned get deleted. The dedicated Azure VMware Solution hosts are securely wiped and returned to the free pool.
20
+
When you delete a private cloud, all VMs, their data, clusters, and network address space provisioned get deleted. The dedicated Azure VMware Solution hosts are securely wiped and returned to the free pool.
20
21
21
22
> [!CAUTION]
22
23
> Deleting the private cloud terminates all running workloads and components and is an irreversible operation. Once you delete the private cloud, you cannot recover the data.
@@ -25,14 +26,13 @@ When you delete a private cloud, all VMs, their data, clusters, and network addr
25
26
26
27
If you require the VMs and their data later, make sure to backup the data before you delete the private cloud. Unfortunately, there's no way to recover the VMs and their data.
27
28
28
-
29
29
## Delete the private cloud
30
30
31
31
1. Access the Azure VMware Solutions console in the [Azure portal](https://portal.azure.com).
32
32
33
33
2. Select the private cloud you want to delete.
34
-
35
-
3. Enter the name of the private cloud and select **Yes**.
34
+
35
+
3. Enter the name of the private cloud and select **Yes**.
36
36
37
37
>[!NOTE]
38
38
>The deletion process takes a few hours to complete.
0 commit comments