Skip to content

Commit e0b0cae

Browse files
Merge pull request #297583 from ankitaduttaMSFT/0104
PBI 30406202, 28626643
2 parents eaa5f10 + 5e5797c commit e0b0cae

4 files changed

+38
-31
lines changed

articles/site-recovery/azure-stack-site-recovery.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Replicate Azure Stack Hub to Azure using Azure Site Recovery
33
description: Learn how to set up disaster recovery to Azure for Azure Stack Hub with the Azure Site Recovery service.
44
ms.topic: how-to
5-
ms.date: 02/05/2025
5+
ms.date: 04/03/2025
66
ms.author: ankitadutta
77
ms.custom: engagement-fy23
88
ms.service: azure-site-recovery
@@ -26,7 +26,7 @@ In this article, you learn how to:
2626
> * **Step 2: Set up a Recovery Services vault**. Set up a vault for Site Recovery, and specify what you want to replicate. Site Recovery components and actions are configured and managed in the vault.
2727
> * **Step 3: Set up the source replication environment**. Set up a Site Recovery configuration server. The configuration server is a single Azure Stack VM that runs all the components needed by Site Recovery. After you've set up the configuration server, you register it in the vault.
2828
> * **Step 4: Set up the target replication environment**. Select your Azure account, and the Azure storage account and network that you want to use. During replication, VM data is copied to Azure storage. After failover, Azure VMs are joined to the specified network.
29-
> * **Step 5: Enable replication**. Configure replication settings, and enable replication for VMs. The Mobility service will be installed on a VM when replication is enabled. Site Recovery performs an initial replication of the VM, and then ongoing replication begins.
29+
> * **Step 5: Enable replication**. Configure replication settings, and enable replication for VMs. The Mobility service will be installed on a VM when replication is enabled. Site Recovery performs an initial replication of the VM, and then ongoing replication begins. Learn how to [install the Mobility service using command prompt (Modernized)](vmware-physical-mobility-service-overview.md#install-the-mobility-service-using-command-prompt-modernized).
3030
> * **Step 6: Run a disaster recovery drill**: After replication is up and running, you verify that failover will work as expected by running a drill. To initiate the drill, you run a test failover in Site Recovery. The test failover doesn't impact your production environment.
3131
3232
With these steps complete, you can then run a full failover to Azure as and when you need to.

articles/site-recovery/azure-to-azure-how-to-enable-replication-private-endpoints.md

Lines changed: 17 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -30,31 +30,20 @@ Following is a reference architecture on how the replication workflow changes wi
3030

3131
## Prerequisites and caveats
3232

33-
- Private endpoints can be created only for new Recovery Services vaults that don't have any items
34-
registered to the vault. As such, private endpoints **must be created before any items are added
35-
to the vault**. Review the pricing structure for
36-
[private endpoints](https://azure.microsoft.com/pricing/details/private-link/).
37-
- When a private endpoint is created for a vault, the vault is locked down and **isn't accessible
38-
from networks other than those networks that have private endpoints**.
39-
- Microsoft Entra ID currently doesn't support private endpoints. As such, IPs and fully
40-
qualified domain names required for Microsoft Entra ID to work in a region need to be allowed
41-
outbound access from the secured network. You can also use network security group tag "Azure
42-
Active Directory" and Azure Firewall tags for allowing access to Microsoft Entra ID, as
43-
applicable.
44-
- **At least nine IP addresses are required** in the subnets of both your source machines and your
45-
recovery machines. When you create a private endpoint for the vault, Site Recovery creates five
46-
private links for access to its microservices. Further, when you enable the replication, it adds
47-
two additional private links for the source and target region pairing.
48-
- **One additional IP address is required** in both the source and recovery subnets. This IP address
49-
is needed only when you need to use private endpoints connecting to cache storage accounts.
50-
Private endpoints for storage can only be created on General Purpose v2 type. Review the pricing
51-
structure for
52-
[data transfer on GPv2](https://azure.microsoft.com/pricing/details/storage/page-blobs/).
53-
54-
## Creating and using private endpoints for Site Recovery
55-
56-
This section talks about the steps involved in creating and using private endpoints for Azure Site
57-
Recovery inside your virtual networks.
33+
- **Private endpoints**:
34+
- Private endpoints can be created only for new Recovery Services vaults that don't have any items registered to the vault. As such, private endpoints **must be created before any items are added to the vault**. Review the pricing structure for [private endpoints](https://azure.microsoft.com/pricing/details/private-link/).
35+
- Private endpoint for Recovery Services only supports dynamic IP addresses. Static IP addresses are not supported.
36+
- When a private endpoint is created for a vault, the vault is locked down and **isn't accessible from networks other than those networks that have private endpoints**.
37+
- Private endpoints for storage can only be created on General Purpose v2 type. Review the pricing structure for [data transfer on GPv2](https://azure.microsoft.com/pricing/details/storage/page-blobs/).
38+
- **Microsoft Entra ID** currently doesn't support private endpoints. As such, IPs and fully qualified domain names required for Microsoft Entra ID to work in a region need to be allowed outbound access from the secured network. You can also use network security group tag `Azure Active Directory` and Azure Firewall tags for allowing access to Microsoft Entra ID, as applicable.
39+
- **IP addresses**:
40+
- **At least nine IP addresses are required** in the subnets of both your source machines and your recovery machines. When you create a private endpoint for the vault, Site Recovery creates five private links for access to its microservices. Further, when you enable the replication, it adds two additional private links for the source and target region pairing.
41+
- **One additional IP address is required** in both the source and recovery subnets. This IP address is needed only when you need to use private endpoints connecting to cache storage accounts.
42+
43+
44+
## Creating and using private endpoints for Site Recovery
45+
46+
This section talks about the steps involved in creating and using private endpoints for Azure Site Recovery inside your virtual networks.
5847

5948
> [!NOTE]
6049
> It's highly recommended that you follow these steps in the same sequence as provided. Failure to
@@ -92,6 +81,9 @@ for the reprotection of failed over machines in the recovery network.
9281
Ensure that you create a recovery virtual network in your target region as well during this setup
9382
process.
9483

84+
> [!NOTE]
85+
> Currently, you can't configure an automation account to use private endpoints for auto agent upgrade. This configuration requires to set up a private endpoint for the vault, however, Automation account cloud jobs can't access Azure resources secured with private endpoints.
86+
9587
Create the first private endpoint for your vault inside your source virtual network using the
9688
Private Link Center in the portal or through
9789
[Azure PowerShell](../private-link/create-private-endpoint-powershell.md). Create the second private

articles/site-recovery/vmware-azure-set-up-replication-tutorial-modernized.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Set up VMware VM disaster recovery to Azure with Azure Site Recovery - Mo
33
description: Learn how to set up disaster recovery to Azure for on-premises VMware VMs with Azure Site Recovery - Modernized.
44
ms.service: azure-site-recovery
55
ms.topic: tutorial
6-
ms.date: 11/06/2024
6+
ms.date: 04/03/2025
77
ms.custom: MVC
88
ms.author: ankitadutta
99
author: ankitaduttaMSFT
@@ -130,6 +130,9 @@ Follow these steps to enable replication:
130130

131131
5. After you select the list of VMs, select **Next** to proceed to source settings. Here, select the [replication appliance](#appliance-selection) and VM credentials. These credentials will be used to push mobility agent on the machine by Azure Site Recovery replication appliance to complete enabling Azure Site Recovery. Ensure accurate credentials are chosen.
132132

133+
>[!TIP]
134+
> In addition to automatic installation, Mobility Services agent can be installed manually or through an automated deployment method, such as Configuration Manager. [Learn more](vmware-physical-mobility-service-overview.md).
135+
133136
>[!NOTE]
134137
>For Linux OS, ensure to provide the root credentials. For Windows OS, a user account with admin privileges should be added. These credentials will be used to push Mobility Service on to the source machine during enable replication operation.
135138

articles/site-recovery/vmware-physical-mobility-service-overview.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: gaggupta
66
ms.service: azure-site-recovery
77
ms.topic: how-to
88
ms.author: ankitadutta
9-
ms.date: 03/21/2025
9+
ms.date: 04/03/2025
1010
ms.custom: engagement-fy23, linux-related-content
1111
---
1212

@@ -78,9 +78,10 @@ During a push installation of the Mobility service, the following steps are perf
7878
### Prerequisites
7979

8080
Locate the installer files for the server’s operating system using the following steps:
81-
- Ensure that all server configurations meet the criteria in the [support matrix](vmware-physical-azure-support-matrix.md#replicated-machines) for disaster recovery of VMware VMs and physical servers to Azure.
81+
- Ensure that all server configurations meet the [requirements for server's operating system](vmware-physical-azure-support-matrix.md#replicated-machines).
82+
- [Locate the installer](vmware-physical-mobility-service-overview.md#locate-installer-files) for server's operating system.
8283
- On the appliance, go to the folder `E:\Software\Agents`.
83-
- Copy the installer corresponding to the source machine’s operating system and place it on your source machine in a local folder, such as `C:\Program Files (x86)\Microsoft Azure Site Recovery`.
84+
- Copy the installer corresponding to the source machine’s operating system and place it on your source machine in a local folder, for example `C:\Program Files (x86)\Microsoft Azure Site Recovery`.
8485

8586

8687
**Use the following steps to install the mobility service:**
@@ -114,6 +115,17 @@ Locate the installer files for the server’s operating system using the followi
114115
>[!NOTE]
115116
> This section is applicable to Azure Site Recovery - Modernized. [Here are the installation instructions for Classic](#install-the-mobility-service-using-command-prompt-classic).
116117
118+
### Prerequisites
119+
120+
### Prerequisites
121+
122+
Locate the installer files for the server’s operating system using the following steps:
123+
- Ensure that all server configurations meet the [requirements for server's operating system](vmware-physical-azure-support-matrix.md#replicated-machines).
124+
- [Locate the installer](vmware-physical-mobility-service-overview.md#locate-installer-files) for server's operating system.
125+
- On the appliance, go to the folder `E:\Software\Agents`.
126+
- Copy the installer corresponding to the source machine’s operating system and place it on your source machine in a local folder, for example `C:\Program Files (x86)\Microsoft Azure Site Recovery`.
127+
128+
117129
### Windows machine
118130

119131
1. Open command prompt and navigate to the folder where the installer file has been placed.

0 commit comments

Comments
 (0)