You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|`cloudservicename.cloudapp.net`|`A`|`192.0.2.13`| <--This public IP isn't your private endpoint. You receive a 403 error. |
79
79
80
-
You must set up a private DNS server or an Azure DNS private zone. For tests, you can modify the host entry of your test machine. The DNS zone that you need to create is: `privatelink.azurewebsites.net`. Register the record for your app with an `A` record and the private endpoint IP.
80
+
You must set up a private DNS server or an Azure DNS private zone. For tests, you can modify the host entry of your test machine. The DNS zone that you need to create is: `privatelink.azurewebsites.net`. Register the record for your app with an `A` record and the private endpoint IP. With [Azure Private DNS Zone Groups](../private-link/private-endpoint-dns-integration.md#private-dns-zone-group), the DNS records are automatically added to the Private DNS zone.
81
81
82
82
For example, the name resolution is:
83
83
@@ -88,9 +88,15 @@ For example, the name resolution is:
88
88
89
89
When you set up this DNS configuration, you can reach your app privately with the default name `mywebapp.azurewebsites.net`. You must use this name, because the default certificate is issued for `*.azurewebsites.net`.
90
90
91
-
If you need to use a custom DNS name, add the custom name in your app. You must validate the custom name like any custom name, by using public DNS resolution. For more information, see [custom DNS validation](./app-service-web-tutorial-custom-domain.md).
91
+
### Custom domain name
92
92
93
-
For the Kudu console, or Kudu REST API (for deployment with Azure DevOps Services self-hosted agents, for example) you must create two records pointing to the private endpoint IP in your Azure DNS private zone or your custom DNS server. The first is for your app and the second is for the SCM (source control management) of your app.
93
+
If you need to use a custom domain name, add the custom name in your app. You must validate the custom name like any custom name, by using public DNS resolution. For more information, see [custom DNS validation](./app-service-web-tutorial-custom-domain.md).
94
+
95
+
In your custom DNS zone, you need to update the DNS record to point to the private endpoint. If your app is already configured with DNS resolution for the default host name, the preferred way is to add a `CNAME` record for the custom domain pointing to `mywebapp.azurewebsites.net`. If you only want the custom domain name to resolve to the private endpoint, you can add an `A` record with the private endpoint IP directly.
96
+
97
+
### Kudu/scm endpoint
98
+
99
+
For the Kudu console, or Kudu REST API (for deployment with Azure DevOps Services self-hosted agents, for example) you must create a second record pointing to the private endpoint IP in your Azure DNS private zone or your custom DNS server. The first is for your app and the second is for the SCM (source control management) of your app. With Azure Private DNS Zone groups, the scm endpoint is automatically added.
94
100
95
101
| Name | Type | Value |
96
102
|-----|-----|-----|
@@ -131,5 +137,5 @@ For up-to-date information about limitations, see [this documentation](../privat
131
137
-[Quickstart: Create a private endpoint by using the Azure CLI](../private-link/create-private-endpoint-cli.md)
132
138
-[Quickstart: Create a private endpoint by using Azure PowerShell](../private-link/create-private-endpoint-powershell.md)
133
139
-[Quickstart: Create a private endpoint by using an ARM template](../private-link/create-private-endpoint-template.md)
134
-
-[Quickstart template for connecting a front-end app to a secured back-end app with virtual network integration and a private endpoint](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.web/webapp-privateendpoint-vnet-injection)
135
-
-[Create two web apps connected securely with a private endpoint and virtual network integration (Terraform)](./scripts/terraform-secure-backend-frontend.md)
140
+
-[Quickstart: Template for connecting a front-end app to a secured back-end app with virtual network integration and a private endpoint](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.web/webapp-privateendpoint-vnet-injection)
141
+
-[Script: Create two web apps connected securely with a private endpoint and virtual network integration (Terraform)](./scripts/terraform-secure-backend-frontend.md)
Copy file name to clipboardExpand all lines: articles/migrate/prepare-for-migration.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: sunishvohra
6
6
ms.manager: vijain
7
7
ms.service: azure-migrate
8
8
ms.topic: how-to
9
-
ms.date: 12/04/2024
9
+
ms.date: 04/17/2025
10
10
ms.custom: engagement-fy25
11
11
---
12
12
@@ -108,12 +108,14 @@ Configure this setting manually as follows:
108
108
109
109
Azure Migrate completes these actions automatically for these versions
110
110
111
-
- Red Hat Enterprise Linux 9.x, 8.x, 7.9, 7.8, 7.7, 7.6, 7.5, 7.4, 7.3, 7.2, 7.1, 7.0, 6.x (Azure Linux VM agent is also installed automatically during migration)
111
+
- Red Hat Enterprise Linux 9.5, 9.x, 8.x, 7.9, 7.8, 7.7, 7.6, 7.5, 7.4, 7.3, 7.2, 7.1, 7.0, 6.x (Azure Linux VM agent is also installed automatically during migration)
112
112
- CentOS Stream (Azure Linux VM agent is also installed automatically during migration)
113
113
- SUSE Linux Enterprise Server 15 SP4, 15 SP3, 15 SP2, 15 SP1, 15 SP0, 12, 11 SP4, 11 SP3
114
114
- Ubuntu 22.04, 21.04, 20.04, 19.04, 19.10, 18.04LTS, 16.04LTS, 14.04LTS (Azure Linux VM agent is also installed automatically during migration)
115
115
- Debian 11, 10, 9, 8, 7
116
116
- Oracle Linux 9, 8, 7.7-CI, 7.7, 6
117
+
- Alma Linux 8.x, 9.x
118
+
- Rocky Linux 8.x, 9.x
117
119
118
120
For other versions, prepare machines as summarized in the table.
- Kali Linux (2016, 2017, 2018, 2019, 2020, 2021, 2022)
35
35
- Debian 11, 10, 9, 8, 7
36
36
- Oracle Linux 9, 8, 7.7-CI, 7.7, 6
37
-
37
+
- Alma Linux 8.x, 9.x
38
+
- Rocky Linux 8.x, 9.x
38
39
You can also use this article to manually prepare the VMs for migration to Azure for operating systems versions not listed above. At a high level, these changes include:
Copy file name to clipboardExpand all lines: articles/site-recovery/replication-appliance-support-matrix.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Support requirements for Azure Site Recovery replication appliance
3
3
description: This article describes support and requirements when deploying the replication appliance for VMware disaster recovery to Azure with Azure Site Recovery - Modernized
4
4
ms.service: azure-site-recovery
5
5
ms.topic: faq
6
-
ms.date: 12/20/2024
6
+
ms.date: 04/23/2025
7
7
ms.author: ankitadutta
8
8
author: ankitaduttaMSFT
9
9
---
@@ -37,7 +37,7 @@ Number of disks | 2, including the OS disk - 80 GB and a data disk - 620 GB
37
37
38
38
**Component** | **Requirement**
39
39
--- | ---
40
-
Operating system | Windows Server 2019
40
+
Operating system | Windows Server 2022
41
41
Operating system locale | English (en-*)
42
42
Windows Server roles | Don't enable these roles: <br> - Active Directory Domain Services <br>- Internet Information Services <br> - Hyper-V
43
43
Group policies | Don't enable these group policies: <br> - Prevent access to the command prompt. <br> - Prevent access to registry editing tools. <br> - Trust logic for file attachments. <br> - Turn on Script Execution. <br> [Learn more](/previous-versions/windows/it-pro/windows-7/gg176671(v=ws.10))
0 commit comments