Skip to content

Commit eb6282d

Browse files
committed
minor updates
1 parent be34fd2 commit eb6282d

14 files changed

+78
-78
lines changed

articles/azure-resource-manager/management/relocation/relocation-app-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Identify all the App Service resources that you're currently using. For example:
3939
- [Managed identities](../../../app-service/overview-managed-identity.md)
4040
- [Backup settings](../../../app-service/manage-backup.md)
4141

42-
Certain resources, such as imported certificates or hybrid connections, contain integration with other Azure services. For information on how to move those resources across regions, see the [documentation for the respective services](./move-resource-overview.md).
42+
Certain resources, such as imported certificates or hybrid connections, contain integration with other Azure services. For information on how to move those resources across regions, see the [documentation for the respective services](../move-resource-overview.md).
4343

4444
## Plan
4545

articles/azure-resource-manager/management/relocation/relocation-backup.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ In order to continue to protect your resources, you must register and back them
8686

8787
### Back up Azure Virtual Machine
8888

89-
When an Azure Virtual Machine (VM) protected by a Recovery Services vault is moved from one region to another, it can no longer be backed up to the older vault. The backups in the old vault may start failing with the errors **BCMV2VMNotFound** or [**ResourceNotFound**](../../../backup/backup-azure-vms-troubleshoot.md#320001-resourcenotfound---could-not-perform-the-operation-as-vm-no-longer-exists--400094-bcmv2vmnotfound---the-virtual-machine-doesnt-exist--an-azure-virtual-machine-wasnt-found).
89+
When an Azure Virtual Machine (VM) protected by a Recovery Services vault is moved from one region to another, it can no longer be backed up to the older vault. The backups in the old vault may start failing with the errors **BCMV2VMNotFound** or [**ResourceNotFound**](../../../backup/backup-azure-vms-troubleshoot.md#320001-resourcenotfound---could-not-perform-the-operation-as-vm-no-longer-exists--400094-bcmv2vmnotfound---the-virtual-machine-doesnt-exist--an-azure-virtual-machine-wasnt-found).
9090

9191
You can also choose to write a customized script for bulk VM protection:
9292

@@ -98,22 +98,22 @@ https://management.azure.com/Subscriptions/{subscriptionId}/resourceGroups/{vaul
9898

9999
1. Prepare Azure Virtual Machines (VMs) for relocation:
100100

101-
1. See the [prerequisites associated with VM relocation](../../../resource-mover/tutorial-move-region-virtual-machines.md#prerequisites) and ensure that the VM is eligible for relocation.
102-
1. [Select the VM on the **Backup Items** tab](../../../backup/backup-azure-delete-vault.md#delete-protected-items-in-the-cloud) of existing vault’s dashboard and select **Stop protection** followed by retain/delete data as per your requirement. When the backup data for a VM is stopped with retain data, the recovery points remain forever and don’t adhere to any policy.
103-
104-
>[!Note]
105-
>Retaining data in the older vault will incur backup charges. If you no longer wish to retain data to avoid billing, you need to delete the retained backup data using the [Delete data option](../../../backup/backup-azure-manage-vms.md#delete-backup-data).
106-
107-
1. Ensure that the VMs are turned on. All VMs’ disks that need to be available in the destination region are attached and initialized in the VMs.
108-
1. Ensure that VMs have the latest trusted root certificates, and an updated certificate revocation list (CRL). To do so:
109-
110-
- On Windows VMs, install the latest Windows updates.
111-
- On Linux VMs, refer to distributor guidance to ensure that machines have the latest certificates and CRL.
112-
113-
1. Allow outbound connectivity from VMs:
114-
115-
- If you're using a URL-based firewall proxy to control outbound connectivity, allow access to [these URLs](../../../resource-mover/support-matrix-move-region-azure-vm.md#url-access).
116-
- If you're using network security group (NSG) rules to control outbound connectivity, create [these service tag rules](../../../resource-mover/support-matrix-move-region-azure-vm.md#nsg-rules).
101+
1. See the [prerequisites associated with VM relocation](../../../resource-mover/tutorial-move-region-virtual-machines.md#prerequisites) and ensure that the VM is eligible for relocation.
102+
1. [Select the VM on the **Backup Items** tab](../../../backup/backup-azure-delete-vault.md#delete-protected-items-in-the-cloud) of existing vault’s dashboard and select **Stop protection** followed by retain/delete data as per your requirement. When the backup data for a VM is stopped with retain data, the recovery points remain forever and don’t adhere to any policy.
103+
104+
>[!Note]
105+
>Retaining data in the older vault will incur backup charges. If you no longer wish to retain data to avoid billing, you need to delete the retained backup data using the [Delete data option](../../../backup/backup-azure-manage-vms.md#delete-backup-data).
106+
107+
1. Ensure that the VMs are turned on. All VMs’ disks that need to be available in the destination region are attached and initialized in the VMs.
108+
1. Ensure that VMs have the latest trusted root certificates, and an updated certificate revocation list (CRL). To do so:
109+
110+
- On Windows VMs, install the latest Windows updates.
111+
- On Linux VMs, refer to distributor guidance to ensure that machines have the latest certificates and CRL.
112+
113+
1. Allow outbound connectivity from VMs:
114+
115+
- If you're using a URL-based firewall proxy to control outbound connectivity, allow access to [these URLs](../../../resource-mover/support-matrix-move-region-azure-vm.md#url-access).
116+
- If you're using network security group (NSG) rules to control outbound connectivity, create [these service tag rules](../../../resource-mover/support-matrix-move-region-azure-vm.md#nsg-rules).
117117

118118
1. Redeploy Azure VMs by using [Azure Resource Mover](../../../resource-mover/tutorial-move-region-virtual-machines.md) to relocate your VM to the new region.
119119

articles/azure-resource-manager/management/relocation/relocation-event-grid-custom-topics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ The high-level steps are:
2727

2828
## Prerequisites
2929

30-
- Complete the [Quickstart: Route custom events to web endpoint](../../../event-grid/custom-event-quickstart-portal.md) in the source region. Do this step so that you can test steps in this article.
30+
- Complete the [Quickstart: Route custom events to web endpoint](../../../event-grid/custom-event-quickstart-portal.md) in the source region. Do this step so that you can test steps in this article.
3131
- Ensure that the Event Grid service is available in the target region. See [Products available by region](https://azure.microsoft.com/global-infrastructure/services/?products=event-grid&regions=all).
3232

3333
## Prepare

articles/azure-resource-manager/management/relocation/relocation-event-hub.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ To get started, export a Resource Manager template. This template contains setti
6868

6969
Modify the template by changing the Event Hubs namespace name and region.
7070

71-
# [portal](#tab/azure-portal)
71+
### [portal](#tab/azure-portal)
7272

7373
1. Select **Template deployment**.
7474
1. In the Azure portal, select **Create**.
@@ -224,7 +224,7 @@ Modify the template by changing the Event Hubs namespace name and region.
224224

225225
1. Select **Save** to save the template.
226226

227-
# [PowerShell](#tab/azure-powershell)
227+
### [PowerShell](#tab/azure-powershell)
228228

229229
1. In the **template.json** file, name the Event Hubs namespace by setting the default value of the namespace name. This example sets the default value of the Event Hubs namespace name to `namespace-name`.
230230

articles/azure-resource-manager/management/relocation/relocation-firewall.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ To prepare for relocation, you need to first export and modify the template from
4343

4444
### Export template
4545

46-
# [portal](#tab/azure-portal)
46+
#### [portal](#tab/azure-portal)
4747

4848
1. Sign in to the [Azure portal](https://portal.azure.com).
4949
2. Select **All resources** and then select your Azure Firewall resource.
@@ -54,7 +54,7 @@ To prepare for relocation, you need to first export and modify the template from
5454

5555
This zip file contains the .json files that include the template and scripts to deploy the template.
5656

57-
# [PowerShell](#tab/azure-powershell)
57+
#### [PowerShell](#tab/azure-powershell)
5858

5959
1. Sign in to your Azure subscription with the `Connect-AzAccount` command and follow the on-screen directions:
6060

@@ -92,7 +92,7 @@ In this section, you learn how to modify the template that you generated in the
9292

9393
If you're running classic firewall rules without Firewall policy, migrate to Firewall policy before proceeding with the steps in this section. To learn how to migrate from classic firewall rules to Firewall policy, see [Migrate Azure Firewall configuration to Azure Firewall policy using PowerShell](/azure/firewall-manager/migrate-to-policy).
9494

95-
# [Azure portal](#tab/azure-portal)
95+
#### [Azure portal](#tab/azure-portal)
9696

9797
1. Sign in to the [Azure portal](https://portal.azure.com).
9898

@@ -145,7 +145,7 @@ To find the location code for your target region, see [Data residency in Azure](
145145

146146
1. Save the `template.json` file.
147147

148-
# [PowerShell](#tab/azure-powershell)
148+
#### [PowerShell](#tab/azure-powershell)
149149

150150
1. Sign in to the [Azure portal](https://portal.azure.com).
151151

@@ -191,7 +191,7 @@ To find the location code for your target region, see [Data residency in Azure](
191191

192192
Deploy the template to create a new Azure Firewall in the target region.
193193

194-
# [Azure portal](#tab/azure-portal)
194+
### [Azure portal](#tab/azure-portal)
195195

196196
1. Enter or select the property values:
197197

@@ -202,7 +202,7 @@ Deploy the template to create a new Azure Firewall in the target region.
202202
1. The Azure Firewall is now deployed with the adopted configuration to reflect the needed changes in the target region.
203203
1. Verify configuration and functionality.
204204

205-
# [PowerShell](#tab/azure-powershell)
205+
### [PowerShell](#tab/azure-powershell)
206206

207207
1. Obtain the subscription ID where you want to deploy the target public IP by running the following command:
208208

articles/azure-resource-manager/management/relocation/relocation-key-vault.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,19 +12,19 @@ ms.custom: subject-relocation, devx-track-azurepowershell
1212

1313
[!INCLUDE [relocate-reasons](./includes/service-relocation-reason-include.md)]
1414

15-
Azure Key Vault doesn't support key vault relocation to another region.
15+
Azure Key Vault doesn't support key vault relocation to another region.
1616

1717
Instead of relocation, you need to:
1818

19-
- Create a new key vault with the relocation of the associated Azure services.
19+
- Create a new key vault with the relocation of the associated Azure services.
2020
- Regenerate any required [keys](/azure/key-vault/keys/about-keys), [secrets](/azure/key-vault/secrets/about-secrets), or [certificates](/azure/key-vault/certificates/about-certificates). In some cases, you may need to transfer the secrets or certificates from your existing key vault to the relocated key vault.
2121

2222
:::image type="content" source="./media/relocation/keyvault/akv-pattern-design.png" alt-text="Diagram showing Azure Key vault relocation pattern.":::
2323

2424
## Prerequisites
2525

2626
- Verify that your Azure subscription allows you to create key vaults in the target region.
27-
- Create a dependency map with all the Azure services used by the Key Vault. For the services that are in scope of the relocation, you must choose the appropriate relocation strategy.
27+
- Create a dependency map with all the Azure services used by the Key Vault. For the services that are in scope of the relocation, you must choose the appropriate relocation strategy.
2828
- Depending on your Key Vault design, you may need to deploy and configure the [Virtual Network](./relocation-virtual-network.md) in the target region.
2929
- Document and plan to re-configure in the Key Vault in the target region:
3030
- Access Policies and Network configuration settings.
@@ -166,7 +166,7 @@ To deploy the template by using Azure portal:
166166
}
167167
```
168168

169-
1. In case you configured a service endpoint in your key vault, in the _networkAcl_ section, under _virtualNetworkRules_, add the rule for the target subnet. Ensure that the _ignoreMissingVnetServiceEndpoint_ flag is set to False, so that the IaC fails to deploy the Key Vault in case the service endpoint isn’t configured in the target region.
169+
1. In case you configured a service endpoint in your key vault, in the _networkAcl_ section, under _virtualNetworkRules_, add the rule for the target subnet. Ensure that the _ignoreMissingVnetServiceEndpoint_ flag is set to False, so that the IaC fails to deploy the Key Vault in case the service endpoint isn’t configured in the target region.
170170

171171
**parameter.json**
172172

@@ -338,7 +338,7 @@ Deploy the template to create a new key vault in the target region.
338338
1. For [certificates](/azure/key-vault/certificates/about-certificates):
339339
1. Export the certificate into a PFX file.
340340
1. Import the PFX file into the target key vault. If you can't export the private key (`exportable` is not set) you must generate certificate a new certificate and import it into the target key vault.
341-
1. With the relocation of the associated Azure service the [keys](/azure/key-vault/keys/about-keys) are regenerated.
341+
1. With the relocation of the associated Azure service the [keys](/azure/key-vault/keys/about-keys) are regenerated.
342342
1. Confirm that the keys have been generated for the associated service.
343343

344344
## Verify

articles/azure-resource-manager/management/relocation/relocation-kubernetes-service.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -34,30 +34,30 @@ Before you begin the relocation planning stage, first review the following prere
3434
- Capture any IP addresses defined in the AKS API service allowlist.
3535
- Understand all dependent resources. Some of the resources could be:
3636

37-
- Queues, Message Buses, Cache engines
38-
- [Azure Key Vault](./relocation-key-vault.md)
39-
- [Managed Identity](/entra/identity/managed-identities-azure-resources/how-to-managed-identity-regional-move)
40-
- [Virtual Network configuration](./relocation-virtual-network.md). Define sufficient subnet sizes to allow container IP growth if using the Azure advanced networking model
41-
- Public IP address
42-
- Virtual Network Gateway (VNG). If site-to-site communication is required to an on-premises environment in the target region, a VNG must be created in the target virtual network.
43-
- Azure Private Endpoint. Azure PaaS resources utilizing private link endpoints must be reviewed, and new private link instances created in the target region such as ACR, Azure SQL DB, KeyVault, etc.
44-
- [Azure Application Gateway](./relocation-app-gateway.md)
45-
- Azure DNS
46-
- [Azure Firewall](./relocation-firewall.md)
47-
- [Azure Monitor (Container Insights)](./relocation-log-analytics.md)
48-
- [Azure Container registry](relocation-container-registry.md) can replicate images between ACR instances. For optimal performance when pulling images, the registry should exist in the target region.
49-
50-
>[!NOTE]
51-
>If you use Azure Container Registry to authenticate to the container registry, the new AKS cluster’s managed identity can be the granted `AcrPull` RBAC role.
52-
53-
- Azure Managed Disks
54-
- Azure Files
37+
- Queues, Message Buses, Cache engines
38+
- [Azure Key Vault](./relocation-key-vault.md)
39+
- [Managed Identity](/entra/identity/managed-identities-azure-resources/how-to-managed-identity-regional-move)
40+
- [Virtual Network configuration](./relocation-virtual-network.md). Define sufficient subnet sizes to allow container IP growth if using the Azure advanced networking model
41+
- Public IP address
42+
- Virtual Network Gateway (VNG). If site-to-site communication is required to an on-premises environment in the target region, a VNG must be created in the target virtual network.
43+
- Azure Private Endpoint. Azure PaaS resources utilizing private link endpoints must be reviewed, and new private link instances created in the target region such as ACR, Azure SQL DB, KeyVault, etc.
44+
- [Azure Application Gateway](./relocation-app-gateway.md)
45+
- Azure DNS
46+
- [Azure Firewall](./relocation-firewall.md)
47+
- [Azure Monitor (Container Insights)](./relocation-log-analytics.md)
48+
- [Azure Container registry](relocation-container-registry.md) can replicate images between ACR instances. For optimal performance when pulling images, the registry should exist in the target region.
49+
50+
>[!NOTE]
51+
>If you use Azure Container Registry to authenticate to the container registry, the new AKS cluster’s managed identity can be the granted `AcrPull` RBAC role.
52+
53+
- Azure Managed Disks
54+
- Azure Files
5555

5656
## Prepare
5757

5858
Before you begin the cluster relocation process, make sure to complete the following preparations:
5959

60-
1. To accommodate the AKS cluster nodes and pods, if using Azure CNI networking, deploy the virtual network with many subnets of sufficient size.
60+
1. To accommodate the AKS cluster nodes and pods, if using Azure CNI networking, deploy the virtual network with many subnets of sufficient size.
6161
1. If you're using Azure Key Vault, [Deploy the Key Vault](./relocation-key-vault.md).
6262
1. Ensure that the relevant TLS ingress certificates are available for deployment, ideally in a secure store such as Azure Key Vault.
6363
1. Deploy a container registry. Either sync the source registry images automatically or rebuild and push new images to the target registry using a CI/CD pipeline or script.
@@ -97,4 +97,4 @@ AKS workloads that use local storage, such as persistent volumes, to store data
9797
- [Cluster creation - Terraform](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/kubernetes_cluster)
9898
- [Baseline architecture for an Azure Kubernetes Service (AKS) cluster](/azure/architecture/reference-architectures/containers/aks/secure-baseline-aks)
9999
- [Azure Kubernetes Services (AKS) day-2 operations guide](/azure/architecture/operator-guides/aks/day-2-operations-guide)
100-
- [Best practices for storage and backups in Azure Kubernetes Service (AKS)](/azure/aks/operator-best-practices-storage)
100+
- [Best practices for storage and backups in Azure Kubernetes Service (AKS)](/azure/aks/operator-best-practices-storage)

articles/azure-resource-manager/management/relocation/relocation-log-analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ If you want to relocate your Log Analytics workspace to a region that supports a
3030
- To export the workspace configuration to a template that can be deployed to another region, you need the [Log Analytics Contributor](../../../role-based-access-control/built-in-roles.md#log-analytics-contributor) or [Monitoring Contributor](../../../role-based-access-control/built-in-roles.md#monitoring-contributor) role, or higher.
3131

3232
- Identify all the resources that are currently associated with your workspace, including:
33-
33+
3434
- *Connected agents*: Enter **Logs** in your workspace and query a [heartbeat](/azure/azure-monitor/insights/solution-agenthealth#azure-monitor-log-records) table to list connected agents.
3535

3636
```kusto

articles/azure-resource-manager/management/relocation/relocation-netapp.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,10 +38,10 @@ Before you begin the relocation process, complete the following preparations:
3838

3939
- Understand the following considerations in regards to replication:
4040

41-
- SMB, NFS, and dual-protocol volumes are supported. Replication of SMB volumes requires a Microsoft Entra ID connection in the source and target NetApp accounts.
42-
- The replication destination volume is read-only until the entire move is complete.
43-
- Azure NetApp Files replication doesn't currently support multiple subscriptions. All replications must be performed under a single subscription.
44-
- There are resource limits for the maximum number of cross-region replication destination volumes. For more information, see [Resource limits for Azure NetApp Files](../../../azure-netapp-files/azure-netapp-files-resource-limits.md).
41+
- SMB, NFS, and dual-protocol volumes are supported. Replication of SMB volumes requires a Microsoft Entra ID connection in the source and target NetApp accounts.
42+
- The replication destination volume is read-only until the entire move is complete.
43+
- Azure NetApp Files replication doesn't currently support multiple subscriptions. All replications must be performed under a single subscription.
44+
- There are resource limits for the maximum number of cross-region replication destination volumes. For more information, see [Resource limits for Azure NetApp Files](../../../azure-netapp-files/azure-netapp-files-resource-limits.md).
4545

4646
## Redeploy
4747

0 commit comments

Comments
 (0)