Skip to content

Commit d2a84b9

Browse files
author
Jill Grant
authored
Merge pull request #247858 from msjasteppe/disaster-updates
Disaster updates
2 parents c21b34c + fdd8347 commit d2a84b9

File tree

4 files changed

+15
-104
lines changed

4 files changed

+15
-104
lines changed

articles/healthcare-apis/azure-api-for-fhir/disaster-recovery.md

Lines changed: 8 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Azure API for FHIR is a fully managed service, based on Fast Healthcare Interope
1515

1616
The DR feature provides a Recovery Point Objective (RPO) of 15 minutes and a Recovery Time Objective (RTO) of 60 minutes.
1717

18-
## How to enable DR
18+
## How to enable DR
1919

2020
To enable the DR feature, create a one-time support ticket. You can choose an Azure paired region or another region where the Azure API for FHIR is supported. The Microsoft support team will enable the DR feature based on the support priority.
2121

@@ -33,30 +33,29 @@ By default, Azure API for FHIR offers data protection through backup and restore
3333

3434
It's worth noting that the throughput RU/s must have the same values in the primary and secondary regions.
3535

36-
[ ![Azure Traffic Manager.](media/disaster-recovery/azure-traffic-manager.png) ](media/disaster-recovery/azure-traffic-manager.png#lightbox)
36+
[![Diagram that shows Azure Traffic Manager.](media/disaster-recovery/azure-traffic-manager.png)](media/disaster-recovery/azure-traffic-manager.png#lightbox)
3737

3838
### Automatic failover
3939

4040
During a primary region outage, the Azure API for FHIR automatically fails over to the secondary region and the same service endpoint is used. The service is expected to resume in one hour or less, and potential data loss is up to 15 minutes' worth of data. Other configuration changes may be required. For more information, see [Configuration changes in DR](#configuration-changes-in-dr).
4141

42-
[ ![Failover in disaster recovery.](media/disaster-recovery/failover-in-disaster-recovery.png) ](media/disaster-recovery/failover-in-disaster-recovery.png#lightbox)
42+
[![Diagram that shows failover in disaster recovery.](media/disaster-recovery/failover-in-disaster-recovery.png)](media/disaster-recovery/failover-in-disaster-recovery.png#lightbox)
4343

4444
### Affected region recovery
4545

4646
After the affected region recovers, it's automatically available as a secondary region and data replication restarts. You can start the data recovery process or wait until the failback step is completed.
4747

48-
[ ![Replication in disaster recovery.](media/disaster-recovery/replication-in-disaster-recovery.png) ](media/disaster-recovery/replication-in-disaster-recovery.png#lightbox)
48+
[![Diagram that shows replication in disaster recovery.](media/disaster-recovery/replication-in-disaster-recovery.png)](media/disaster-recovery/replication-in-disaster-recovery.png#lightbox)
4949

5050
When the compute has failed back to the recovered region and the data hasn't, there may be potential network latencies. The main reason is that the compute and the data are in two different regions. The network latencies should disappear automatically as soon as the data fails back to the recovered region through a manual trigger.
5151

52-
[ ![Network latency.](media/disaster-recovery/network-latency.png) ](media/disaster-recovery/network-latency.png#lightbox)
53-
52+
[![Diagram that shows network latency.](media/disaster-recovery/network-latency.png)](media/disaster-recovery/network-latency.png#lightbox)
5453

5554
### Manual failback
5655

5756
The compute fails back automatically to the recovered region. The data is switched back to the recovered region manually by the Microsoft support team using the script.
5857

59-
[ ![Failback in disaster recovery.](media/disaster-recovery/failback-in-disaster-recovery.png) ](media/disaster-recovery/failback-in-disaster-recovery.png#lightbox)
58+
[![Diagram that shows failback in disaster recovery.](media/disaster-recovery/failback-in-disaster-recovery.png)](media/disaster-recovery/failback-in-disaster-recovery.png#lightbox)
6059

6160
## Configuration changes in DR
6261

@@ -93,13 +92,6 @@ The export job will be picked up from another region after 10 minutes without an
9392

9493
Ensure that you grant the same permissions to the system identity of the Azure API for FHIR. Also, if the storage account is configured with selected networks, see [How to export FHIR data](../fhir/export-data.md).
9594

96-
### IoMT FHIR Connector
97-
98-
Any existing connection won't function until the failed region is restored. You can create a new connection once the failover has completed and your FHIR server is accessible. This new connection will continue to function when failback occurs.
99-
100-
> [!NOTE]
101-
> IoMT Connector is a preview feature and does not provide support for disaster recovery.
102-
10395
## How to test DR
10496

10597
While not required, you can test the DR feature on a non-production environment. For DR test, only the data will be included and the compute won't be included.
@@ -120,7 +112,6 @@ Consider the following steps for DR test.
120112

121113
* (Optional) Share any feedback with the Microsoft support team.
122114

123-
124115
> [!NOTE]
125116
> The DR test will double the cost of your test environment during the test. No extra cost will incur after the DR test is completed and the DR feature is disabled.
126117
@@ -131,12 +122,11 @@ The disaster recovery feature incurs extra costs because data of the compute and
131122
> [!NOTE]
132123
> The DR offering is subject to the [SLA for Azure API for FHIR](https://azure.microsoft.com/pricing/details/health-data-services), 1.0.
133124
134-
135125
## Next steps
136126

137127
In this article, you've learned how DR for Azure API for FHIR works and how to enable it. To learn about Azure API for FHIR's other supported features, see
138128

139-
>[!div class="nextstepaction"]
140-
>[FHIR supported features](fhir-features-supported.md)
129+
> [!div class="nextstepaction"]
130+
> [FHIR supported features](fhir-features-supported.md)
141131
142132
FHIR® is a registered trademark of [HL7](https://hl7.org/fhir/) and is used with the permission of HL7.

articles/healthcare-apis/azure-api-for-fhir/export-data.md

Lines changed: 1 addition & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -93,50 +93,7 @@ You're now ready to export FHIR data to the storage account securely. Note that
9393
> [!IMPORTANT]
9494
> The user interface will be updated later to allow you to select the Resource type for Azure API for FHIR and a specific service instance.
9595
96-
### Allowing specific IP addresses for the Azure storage account in a different region
97-
98-
Select **Networking** of the Azure storage account from the
99-
portal.
100-
101-
Select **Selected networks**. Under the Firewall section, specify the IP address in the **Address range** box. Add IP ranges to
102-
allow access from the internet or your on-premises networks. You can
103-
find the IP address in the table below for the Azure region where the
104-
Azure API for FHIR is provisioned.
105-
106-
|**Azure Region** |**Public IP Address** |
107-
|:----------------------|:-------------------|
108-
| Australia East | 20.53.44.80 |
109-
| Canada Central | 20.48.192.84 |
110-
| Central US | 52.182.208.31 |
111-
| East US | 20.62.128.148 |
112-
| East US 2 | 20.49.102.228 |
113-
| East US 2 EUAP | 20.39.26.254 |
114-
| Germany North | 51.116.51.33 |
115-
| Germany West Central | 51.116.146.216 |
116-
| Japan East | 20.191.160.26 |
117-
| Korea Central | 20.41.69.51 |
118-
| North Central US | 20.49.114.188 |
119-
| North Europe | 52.146.131.52 |
120-
| South Africa North | 102.133.220.197 |
121-
| South Central US | 13.73.254.220 |
122-
| Southeast Asia | 23.98.108.42 |
123-
| Switzerland North | 51.107.60.95 |
124-
| UK South | 51.104.30.170 |
125-
| UK West | 51.137.164.94 |
126-
| West Central US | 52.150.156.44 |
127-
| West Europe | 20.61.98.66 |
128-
| West US 2 | 40.64.135.77 |
129-
130-
> [!NOTE]
131-
> The above steps are similar to the configuration steps described in the document **Converting your data to FHIR**. For more information, see [Configure the ACR firewall](../../healthcare-apis/fhir/configure-settings-convert-data.md#step-6-configure-the-azure-container-registry-firewall-for-secure-access).
132-
133-
### Allowing specific IP addresses for the Azure storage account in the same region
134-
135-
The configuration process is the same as above except a specific IP
136-
address range in CIDR format is used instead, 100.64.0.0/10. The reason why the IP address range, which includes 100.64.0.0 – 100.127.255.255, must be specified is because the actual IP address used by the service varies, but will be within the range, for each $export request.
137-
138-
> [!NOTE]
139-
> It is possible that a private IP address within the range of 10.0.2.0/24 may be used instead. In that case, the $export operation will not succeed. You can retry the $export request, but there is no guarantee that an IP address within the range of 100.64.0.0/10 will be used next time. That's the known networking behavior by design. The alternative is to configure the storage account in a different region.
96+
[!INCLUDE [Specific IP ranges for storage account](../includes/common-ip-address-storage-account.md)]
14097

14198
## Next steps
14299

articles/healthcare-apis/fhir/configure-import-data.md

Lines changed: 4 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ In this document we go over the three steps used in configuring import settings
3030

3131
## Step 1: Enable managed identity on the FHIR service
3232

33-
The first step is to enable system wide managed identity on the service. This will be used to grant FHIR service an access to the storage account.
33+
The first step is to enable system wide managed identity on the service. This will be used to grant FHIR service access to the storage account.
3434
For more information about managed identities in Azure, see [About managed identities for Azure resources](../../active-directory/managed-identities-azure-resources/overview.md).
3535

3636
Follow the steps to enable managed identity on FHIR service
@@ -95,7 +95,7 @@ Do following changes to JSON:
9595
After you've completed this final step, you're ready to perform **Incremental mode** import using $import.
9696

9797

98-
Note : You can also use the **Deploy to Azure** button to open custom Resource Manager template that updates the configuration for $import.
98+
Note that you can also use the **Deploy to Azure** button to open custom Resource Manager template that updates the configuration for $import.
9999

100100
[![Deploy to Azure Button.](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fquickstarts%2Fmicrosoft.healthcareapis%2Ffhir-import%2Fazuredeploy.json)
101101

@@ -147,44 +147,8 @@ After you've executed above command, in the **Firewall** section under **Resourc
147147

148148
You're now ready to securely import FHIR data from the storage account. The storage account is on selected networks and isn't publicly accessible. To securely access the files, you can enable [private endpoints](../../storage/common/storage-private-endpoints.md) for the storage account.
149149

150-
### Option 2: Allowing specific IP addresses to access the Azure storage account
151-
#### Option 2.1: Access storage account provisioned in different Azure region than FHIR service
152-
153-
In the Azure portal, go to the ADLS Gen2 account and select the **Networking** blade.
154-
155-
Select **Enabled from selected virtual networks and IP addresses**. Under the Firewall section, specify the IP address in the **Address range** box. Add IP ranges to allow access from the internet or your on-premises networks. You can find the IP address in the table below for the Azure region where the FHIR service is provisioned.
156-
157-
|**Azure Region** |**Public IP Address** |
158-
|:----------------------|:-------------------|
159-
| Australia East | 20.53.44.80 |
160-
| Canada Central | 20.48.192.84 |
161-
| Central US | 52.182.208.31 |
162-
| East US | 20.62.128.148 |
163-
| East US 2 | 20.49.102.228 |
164-
| East US 2 EUAP | 20.39.26.254 |
165-
| Germany North | 51.116.51.33 |
166-
| Germany West Central | 51.116.146.216 |
167-
| Japan East | 20.191.160.26 |
168-
| Korea Central | 20.41.69.51 |
169-
| North Central US | 20.49.114.188 |
170-
| North Europe | 52.146.131.52 |
171-
| South Africa North | 102.133.220.197 |
172-
| South Central US | 13.73.254.220 |
173-
| Southeast Asia | 23.98.108.42 |
174-
| Switzerland North | 51.107.60.95 |
175-
| UK South | 51.104.30.170 |
176-
| UK West | 51.137.164.94 |
177-
| West Central US | 52.150.156.44 |
178-
| West Europe | 20.61.98.66 |
179-
| West US 2 | 40.64.135.77 |
180-
181-
#### Option 2.2: Access storage account provisioned in same Azure region as FHIR service
182-
183-
The configuration process for IP addresses in the same region is just like above except a specific IP address range in Classless Inter-Domain Routing (CIDR) format is used instead (that is, 100.64.0.0/10). The reason why the IP address range (100.64.0.0 – 100.127.255.255) must be specified is because an IP address for the FHIR service will be allocated each time an `$import` request is made.
184-
185-
> [!Note]
186-
> It is possible that a private IP address within the range of 10.0.2.0/24 may be used, but there is no guarantee that the `$import` operation will succeed in such a case. You can retry if the `$import` request fails, but until an IP address within the range of 100.64.0.0/10 is used, the request will not succeed. This network behavior for IP address ranges is by design. The alternative is to configure the storage account in a different region.
187-
150+
### Option 2:
151+
[!INCLUDE [Specific IP ranges for storage account](../includes/common-ip-address-storage-account.md)]
188152

189153
## Next steps
190154

articles/healthcare-apis/includes/common-ip-address-storage-account.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Select **Enabled from selected virtual networks and IP addresses**. Under the Fi
4141

4242
### Allowing specific IP addresses to access the Azure storage account in the same region
4343

44-
The configuration process for IP addresses in the same region is just like above except a specific IP address range in Classless Inter-Domain Routing (CIDR) format is used instead (i.e., 100.64.0.0/10). The reason why the IP address range (100.64.0.0 – 100.127.255.255) must be specified is because an IP address for the FHIR service will be allocated each time an `$export` request is made.
44+
The configuration process for IP addresses in the same region is just like above except a specific IP address range in Classless Inter-Domain Routing (CIDR) format is used instead (i.e., 100.64.0.0/10). The reason why the IP address range (100.64.0.0 – 100.127.255.255) must be specified is because an IP address for the FHIR service will be allocated each time an operation request is made.
4545

4646
> [!NOTE]
47-
> It is possible that a private IP address within the range of 10.0.2.0/24 may be used, but there is no guarantee that the `$export` operation will succeed in such a case. You can retry if the `$export` request fails, but until an IP address within the range of 100.64.0.0/10 is used, the request will not succeed. This network behavior for IP address ranges is by design. The alternative is to configure the storage account in a different region.
47+
> It is possible that a private IP address within the range of 10.0.2.0/24 may be used, but there is no guarantee that the operation will succeed in such a case. You can retry if the operation request fails, but until an IP address within the range of 100.64.0.0/10 is used, the request will not succeed. This network behavior for IP address ranges is by design. The alternative is to configure the storage account in a different region.

0 commit comments

Comments
 (0)