You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/site-recovery/azure-stack-site-recovery.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Replicate Azure Stack Hub to Azure using Azure Site Recovery
3
3
description: Learn how to set up disaster recovery to Azure for Azure Stack Hub with the Azure Site Recovery service.
4
4
ms.topic: how-to
5
-
ms.date: 02/05/2025
5
+
ms.date: 04/03/2025
6
6
ms.author: ankitadutta
7
7
ms.custom: engagement-fy23
8
8
ms.service: azure-site-recovery
@@ -26,7 +26,7 @@ In this article, you learn how to:
26
26
> ***Step 2: Set up a Recovery Services vault**. Set up a vault for Site Recovery, and specify what you want to replicate. Site Recovery components and actions are configured and managed in the vault.
27
27
> ***Step 3: Set up the source replication environment**. Set up a Site Recovery configuration server. The configuration server is a single Azure Stack VM that runs all the components needed by Site Recovery. After you've set up the configuration server, you register it in the vault.
28
28
> ***Step 4: Set up the target replication environment**. Select your Azure account, and the Azure storage account and network that you want to use. During replication, VM data is copied to Azure storage. After failover, Azure VMs are joined to the specified network.
29
-
> ***Step 5: Enable replication**. Configure replication settings, and enable replication for VMs. The Mobility service will be installed on a VM when replication is enabled. Site Recovery performs an initial replication of the VM, and then ongoing replication begins.
29
+
> ***Step 5: Enable replication**. Configure replication settings, and enable replication for VMs. The Mobility service will be installed on a VM when replication is enabled. Site Recovery performs an initial replication of the VM, and then ongoing replication begins. Learn how to [install the Mobility service using command prompt (Modernized)](vmware-physical-mobility-service-overview.md#install-the-mobility-service-using-command-prompt-modernized).
30
30
> ***Step 6: Run a disaster recovery drill**: After replication is up and running, you verify that failover will work as expected by running a drill. To initiate the drill, you run a test failover in Site Recovery. The test failover doesn't impact your production environment.
31
31
32
32
With these steps complete, you can then run a full failover to Azure as and when you need to.
- When a private endpoint is created for a vault, the vault is locked down and **isn't accessible
38
-
from networks other than those networks that have private endpoints**.
39
-
- Microsoft Entra ID currently doesn't support private endpoints. As such, IPs and fully
40
-
qualified domain names required for Microsoft Entra ID to work in a region need to be allowed
41
-
outbound access from the secured network. You can also use network security group tag "Azure
42
-
Active Directory" and Azure Firewall tags for allowing access to Microsoft Entra ID, as
43
-
applicable.
44
-
-**At least nine IP addresses are required** in the subnets of both your source machines and your
45
-
recovery machines. When you create a private endpoint for the vault, Site Recovery creates five
46
-
private links for access to its microservices. Further, when you enable the replication, it adds
47
-
two additional private links for the source and target region pairing.
48
-
-**One additional IP address is required** in both the source and recovery subnets. This IP address
49
-
is needed only when you need to use private endpoints connecting to cache storage accounts.
50
-
Private endpoints for storage can only be created on General Purpose v2 type. Review the pricing
51
-
structure for
52
-
[data transfer on GPv2](https://azure.microsoft.com/pricing/details/storage/page-blobs/).
53
-
54
-
## Creating and using private endpoints for Site Recovery
55
-
56
-
This section talks about the steps involved in creating and using private endpoints for Azure Site
57
-
Recovery inside your virtual networks.
33
+
-**Private endpoints**:
34
+
- Private endpoints can be created only for new Recovery Services vaults that don't have any items registered to the vault. As such, private endpoints **must be created before any items are added to the vault**. Review the pricing structure for [private endpoints](https://azure.microsoft.com/pricing/details/private-link/).
35
+
- Private endpoint for Recovery Services only supports dynamic IP addresses. Static IP addresses are not supported.
36
+
- When a private endpoint is created for a vault, the vault is locked down and **isn't accessible from networks other than those networks that have private endpoints**.
37
+
- Private endpoints for storage can only be created on General Purpose v2 type. Review the pricing structure for [data transfer on GPv2](https://azure.microsoft.com/pricing/details/storage/page-blobs/).
38
+
-**Microsoft Entra ID** currently doesn't support private endpoints. As such, IPs and fully qualified domain names required for Microsoft Entra ID to work in a region need to be allowed outbound access from the secured network. You can also use network security group tag `Azure Active Directory` and Azure Firewall tags for allowing access to Microsoft Entra ID, as applicable.
39
+
-**IP addresses**:
40
+
-**At least nine IP addresses are required** in the subnets of both your source machines and your recovery machines. When you create a private endpoint for the vault, Site Recovery creates five private links for access to its microservices. Further, when you enable the replication, it adds two additional private links for the source and target region pairing.
41
+
-**One additional IP address is required** in both the source and recovery subnets. This IP address is needed only when you need to use private endpoints connecting to cache storage accounts.
42
+
43
+
44
+
## Creating and using private endpoints for Site Recovery
45
+
46
+
This section talks about the steps involved in creating and using private endpoints for Azure Site Recovery inside your virtual networks.
58
47
59
48
> [!NOTE]
60
49
> It's highly recommended that you follow these steps in the same sequence as provided. Failure to
@@ -92,6 +81,9 @@ for the reprotection of failed over machines in the recovery network.
92
81
Ensure that you create a recovery virtual network in your target region as well during this setup
93
82
process.
94
83
84
+
> [!NOTE]
85
+
> Currently, you can't configure an automation account to use private endpoints for auto agent upgrade. This configuration requires to set up a private endpoint for the vault, however, Automation account cloud jobs can't access Azure resources secured with private endpoints.
86
+
95
87
Create the first private endpoint for your vault inside your source virtual network using the
96
88
Private Link Center in the portal or through
97
89
[Azure PowerShell](../private-link/create-private-endpoint-powershell.md). Create the second private
Copy file name to clipboardExpand all lines: articles/site-recovery/vmware-azure-set-up-replication-tutorial-modernized.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Set up VMware VM disaster recovery to Azure with Azure Site Recovery - Mo
3
3
description: Learn how to set up disaster recovery to Azure for on-premises VMware VMs with Azure Site Recovery - Modernized.
4
4
ms.service: azure-site-recovery
5
5
ms.topic: tutorial
6
-
ms.date: 11/06/2024
6
+
ms.date: 04/03/2025
7
7
ms.custom: MVC
8
8
ms.author: ankitadutta
9
9
author: ankitaduttaMSFT
@@ -130,6 +130,9 @@ Follow these steps to enable replication:
130
130
131
131
5. After you select the list of VMs, select **Next** to proceed to source settings. Here, select the [replication appliance](#appliance-selection) and VM credentials. These credentials will be used to push mobility agent on the machine by Azure Site Recovery replication appliance to complete enabling Azure Site Recovery. Ensure accurate credentials are chosen.
132
132
133
+
>[!TIP]
134
+
> In addition to automatic installation, Mobility Services agent can be installed manually or through an automated deployment method, such as Configuration Manager. [Learn more](vmware-physical-mobility-service-overview.md).
135
+
133
136
>[!NOTE]
134
137
>For Linux OS, ensure to provide the root credentials. For Windows OS, a user account with admin privileges should be added. These credentials will be used to push Mobility Service on to the source machine during enable replication operation.
Copy file name to clipboardExpand all lines: articles/site-recovery/vmware-physical-mobility-service-overview.md
+15-3Lines changed: 15 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ manager: gaggupta
6
6
ms.service: azure-site-recovery
7
7
ms.topic: how-to
8
8
ms.author: ankitadutta
9
-
ms.date: 03/21/2025
9
+
ms.date: 04/03/2025
10
10
ms.custom: engagement-fy23, linux-related-content
11
11
---
12
12
@@ -78,9 +78,10 @@ During a push installation of the Mobility service, the following steps are perf
78
78
### Prerequisites
79
79
80
80
Locate the installer files for the server’s operating system using the following steps:
81
-
- Ensure that all server configurations meet the criteria in the [support matrix](vmware-physical-azure-support-matrix.md#replicated-machines) for disaster recovery of VMware VMs and physical servers to Azure.
81
+
- Ensure that all server configurations meet the [requirements for server's operating system](vmware-physical-azure-support-matrix.md#replicated-machines).
82
+
-[Locate the installer](vmware-physical-mobility-service-overview.md#locate-installer-files) for server's operating system.
82
83
- On the appliance, go to the folder `E:\Software\Agents`.
83
-
- Copy the installer corresponding to the source machine’s operating system and place it on your source machine in a local folder, such as`C:\Program Files (x86)\Microsoft Azure Site Recovery`.
84
+
- Copy the installer corresponding to the source machine’s operating system and place it on your source machine in a local folder, for example`C:\Program Files (x86)\Microsoft Azure Site Recovery`.
84
85
85
86
86
87
**Use the following steps to install the mobility service:**
@@ -114,6 +115,17 @@ Locate the installer files for the server’s operating system using the followi
114
115
>[!NOTE]
115
116
> This section is applicable to Azure Site Recovery - Modernized. [Here are the installation instructions for Classic](#install-the-mobility-service-using-command-prompt-classic).
116
117
118
+
### Prerequisites
119
+
120
+
### Prerequisites
121
+
122
+
Locate the installer files for the server’s operating system using the following steps:
123
+
- Ensure that all server configurations meet the [requirements for server's operating system](vmware-physical-azure-support-matrix.md#replicated-machines).
124
+
-[Locate the installer](vmware-physical-mobility-service-overview.md#locate-installer-files) for server's operating system.
125
+
- On the appliance, go to the folder `E:\Software\Agents`.
126
+
- Copy the installer corresponding to the source machine’s operating system and place it on your source machine in a local folder, for example `C:\Program Files (x86)\Microsoft Azure Site Recovery`.
127
+
128
+
117
129
### Windows machine
118
130
119
131
1. Open command prompt and navigate to the folder where the installer file has been placed.
0 commit comments