You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/site-recovery/azure-to-azure-autoupdate.md
+69-64Lines changed: 69 additions & 64 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,68 +1,73 @@
1
1
---
2
-
title: Automatic update of the Mobility service in Azure Site Recovery
2
+
title: Automatic update of the Mobility service in Azure Site Recovery
3
3
description: Overview of automatic update of the Mobility service when replicating Azure VMs by using Azure Site Recovery.
4
4
services: site-recovery
5
-
author: rajani-janaki-ram
5
+
author: rajani-janaki-ram
6
6
manager: rochakm
7
7
ms.service: site-recovery
8
8
ms.topic: article
9
-
ms.date: 10/24/2019
9
+
ms.date: 04/02/2020
10
10
ms.author: rajanaki
11
-
12
11
---
12
+
13
13
# Automatic update of the Mobility service in Azure-to-Azure replication
14
14
15
-
Azure Site Recovery uses a monthly release cadence to fix any issues and enhance existing features or add new ones. To remain current with the service, you must plan for patch deployment each month. To avoid overhead associated with each upgrade, you can instead allow Site Recovery to manage component updates.
15
+
Azure Site Recovery uses a monthly release cadence to fix any issues and enhance existing features or add new ones. To remain current with the service, you must plan for patch deployment each month. To avoid the overhead associated with each upgrade, you can allow Site Recovery to manage component updates.
16
16
17
-
As mentioned in [Azure-to-Azure disaster recovery architecture](azure-to-azure-architecture.md), the Mobility service is installed on all Azure virtual machines (VMs) for which replication is enabled, while replicating VMs from one Azure region to another. When you use automatic updates, each new release updates the Mobility service extension.
18
-
17
+
As mentioned in [Azure-to-Azure disaster recovery architecture](azure-to-azure-architecture.md), the Mobility service is installed on all Azure virtual machines (VMs) that have replication enabled from one Azure region to another. When you use automatic updates, each new release updates the Mobility service extension.
When you use Site Recovery to manage updates, it deploys a global runbook (used by Azure services) via an automation account, created in the same subscription as the vault. Each vault uses one automation account. The runbook checks for each VM in a vaultfor active auto-updates and upgrades the Mobility service extension if a newer version is available.
23
+
When you use Site Recovery to manage updates, it deploys a global runbook (used by Azure services) via an automation account, created in the same subscription as the vault. Each vault uses one automation account. For each VM in a vault, the runbook checks for active auto-updates. If a newer version of the Mobility service extension is available, the update is installed.
25
24
26
-
The default runbook schedule recurs daily at 12:00 AM in the time zone of the replicated VM's geo. You can also change the runbook schedule via the automation account.
25
+
The default runbook schedule occurs daily at 12:00 AM in the time zone of the replicated VM's geography. You can also change the runbook schedule via the automation account.
27
26
28
27
> [!NOTE]
29
-
> Starting with Update Rollup 35, you can choose an existing automation account to use for updates. Prior to this update, Site Recovery created this account by default. Note that you can only select this option when you enable replication for a VM. It isn't available for a replicating VM. The setting you select will apply for all Azure VMs protected in the same vault.
30
-
31
-
> Turning on automatic updates doesn't require a restart of your Azure VMs or affect ongoing replication.
28
+
> Starting with [Update Rollup 35](site-recovery-whats-new.md#updates-march-2019), you can choose an existing automation account to use for updates. Prior to Update Rollup 35, Site Recovery created the automation account by default. You can only select this option when you enable replication for a VM. It isn't available for a VM that already has replication enabled. The setting you select applies to all Azure VMs protected in the same vault.
29
+
30
+
Turning on automatic updates doesn't require a restart of your Azure VMs or affect ongoing replication.
32
31
33
-
> Job billing in the automation account is based on the number of job runtime minutes used in a month. By default, 500 minutes are included as free units for an automation account. Job execution takes a few seconds to about a minute each day and is covered as free units.
32
+
Job billing in the automation account is based on the number of job runtime minutes used in a month. Job execution takes a few seconds to about a minute each day and is covered as free units. By default, 500 minutes are included as free units for an automation account, as shown in the following table:
34
33
35
34
| Free units included (each month) | Price |
36
35
|---|---|
37
36
| Job runtime 500 minutes | ₹0.14/minute
38
37
39
38
## Enable automatic updates
40
39
41
-
You can allow Site Recovery to manage updates in the following ways.
40
+
There are several ways that Site Recovery can manage the extension updates:
41
+
42
+
-[Manage as part of the enable replication step](#manage-as-part-of-the-enable-replication-step)
43
+
-[Toggle the extension update settings inside the vault](#toggle-the-extension-update-settings-inside-the-vault)
When you enable replication for a VM either starting [from the VM view](azure-to-azure-quickstart.md) or [from the recovery services vault](azure-to-azure-how-to-enable-replication.md), you can either allow Site Recovery to manage updates for the Site Recovery extension or manage it manually.
### Toggle the extension update settings inside the vault
50
53
51
-
1. Inside the vault, go to **Manage** > **Site Recovery Infrastructure**.
52
-
2. Under **For Azure Virtual Machines** > **Extension Update Settings**, turn on the **Allow Site Recovery to manage** toggle. To manage manually, turn it off.
53
-
3. Select **Save**.
54
+
1. From the Recovery Services vault, go to **Manage** > **Site Recovery Infrastructure**.
55
+
1. Under **For Azure Virtual Machines** > **Extension Update Settings** > **Allow Site Recovery to manage**, select **On**.
> When you choose **Allow Site Recovery to manage**, the setting is applied to all VMs in the vault.
60
65
61
-
> [!Note]
62
-
> Either option notifies you of the automation account used for managing updates. If you're using this feature in a vault for the first time, a new automation account is created by default. Alternately, you can customize the setting, and choose an existing automation account. All subsequent enable replications in the same vault use the previously created one. Currently the drop-down will only list Automation accounts that are in the same Resource Group as the vault.
66
+
> [!NOTE]
67
+
> Either option notifies you of the automation account used for managing updates. If you're using this feature in a vault for the first time, a new automation account is created by default. Alternately, you can customize the setting, and choose an existing automation account. All subsequent taks to enable replication in the same vault will use the previously created automation account. Currently, the drop-down menu will only list automation accounts that are in the same Resource Group as the vault.
63
68
64
69
> [!IMPORTANT]
65
-
> The below script needs to be run in the context of an automation account
70
+
> The following script needs to be run in the context of an automation account.
66
71
For a custom automation account, use the following script:
1. If there are new updates for the Mobility service installed on your VMs, you'll see the following notification: "New Site Recovery replication agent update is available. Click to install"
510
+
1. If there are new updates for the Mobility service installed on your VMs, you'll see the following notification: **New Site Recovery replication agent update is available. Click to install.**

514
+
1. Select the notification to open the VM selection page.
515
+
1. Choose the VMs you want to upgrade, and then select **OK**. The Update Mobility service will start for each selected VM.
512
516
517
+
:::image type="content" source="./media/vmware-azure-install-mobility-service/update-okpng.png" alt-text="Replicated items VM list":::
513
518
514
519
## Common issues and troubleshooting
515
520
516
521
If there's an issue with the automatic updates, you'll see an error notification under **Configuration issues** in the vault dashboard.
517
522
518
-
If you couldn't enable automatic updates, see the following common errors and recommended actions:
523
+
If you can't enable automatic updates, see the following common errors and recommended actions:
519
524
520
525
-**Error**: You do not have permissions to create an Azure Run As account (service principal) and grant the Contributor role to the service principal.
521
526
522
-
**Recommended action**: Make sure that the signed-in account is assigned as Contributor and try again. Refer to the required permissions section in [Use the portal to create an Azure AD application and service principal that can access resources](https://docs.microsoft.com/azure/azure-resource-manager/resource-group-create-service-principal-portal#required-permissions) for more information about assigning permissions.
523
-
524
-
To fix most issues after you enable automatic updates, select **Repair**. If the repair button isn't available, see the error message displayed in the extension update settings pane.
527
+
**Recommended action**: Make sure that the signed-in account is assigned as Contributor and try again. For more information about assigning permissions, see the required permissions section of [How to: Use the portal to create an Azure AD application and service principal that can access resources](/azure/azure-resource-manager/resource-group-create-service-principal-portal#required-permissions).
528
+
529
+
To fix most issues after you enable automatic updates, select **Repair**. If the repair button isn't available, see the error message displayed in the extension update settings pane.
525
530
526
-

531
+
:::image type="content" source="./media/azure-to-azure-autoupdate/repair.png" alt-text="Site Recovery service repair button in extension update settings":::
527
532
528
533
-**Error**: The Run As account does not have the permission to access the recovery services resource.
529
534
530
-
**Recommended action**: Delete and then [re-create the Run As account](https://docs.microsoft.com/azure/automation/automation-create-runas-account). Or, make sure that the Automation Run As account's Azure Active Directory application has access to the recovery services resource.
535
+
**Recommended action**: Delete and then [re-create the Run As account](/azure/automation/automation-create-runas-account). Or, make sure that the Automation Run As account's Azure Active Directory application can access the recovery services resource.
531
536
532
-
-**Error**: Run As account is not found. Either one of these was deleted or not created - Azure Active Directory Application, Service Principal, Role, Automation Certificate asset, Automation Connection asset - or the Thumbprint is not identical between Certificate and Connection.
537
+
-**Error**: Run As account is not found. Either one of these was deleted or not created - Azure Active Directory Application, Service Principal, Role, Automation Certificate asset, Automation Connection asset - or the Thumbprint is not identical between Certificate and Connection.
533
538
534
-
**Recommended action**: Delete and then [re-create the Run As account](https://docs.microsoft.com/azure/automation/automation-create-runas-account).
539
+
**Recommended action**: Delete and then [re-create the Run As account](/azure/automation/automation-create-runas-account).
535
540
536
-
-**Error**: The Azure Run as Certificate used by the automation account is about to expire.
541
+
-**Error**: The Azure Run as Certificate used by the automation account is about to expire.
537
542
538
-
The self-signed certificate that is created for the Run As account expires one year from the date of creation. You can renew it at any time before it expires. If you have signed up for email notifications, you will also receive emails when an action is required from your side. This error will be shown two months prior to the expiry date, and will change to a critical error if the certificate has expired. Once the certificate has expired, auto update will not be functional until you renew the same.
543
+
The self-signed certificate that is created for the Run As account expires one year from the date of creation. You can renew it at any time before it expires. If you have signed up for email notifications, you will also receive emails when an action is required from your side. This error will be shown two months prior to the expiry date, and will change to a critical error if the certificate has expired. Once the certificate has expired, auto update will not be functional until you renew the same.
539
544
540
-
**Recommended action**: Click on 'Repair' and then 'Renew Certificate' to resolve this issue.
0 commit comments