Skip to content

Commit 862af6d

Browse files
committed
Fix PR review blocking issues
- Fixed grammar: 'set up' → 'setup' (noun), 'an built-in' → 'a built-in', 'scenarios is' → 'scenario is' - Fixed terminology: 'Public Azure cloud' → 'global Azure cloud', 'Shutdown' → 'Shut down' (verb), 'failover' → 'fail over' (verb) - Removed duplication: '(virtual network)' redundancy - Fixed typos: 'bring run' → 'being run', 'maintenances' → 'maintenance' - Improved link anchor text and removed extraneous commas - All fixes per PR review comment #3514454348
1 parent be7e8b1 commit 862af6d

6 files changed

Lines changed: 15 additions & 15 deletions

articles/expressroute/design-architecture-for-resiliency.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ There are three ExpressRoute resiliency architectures that can be utilized to en
3131

3232
### Maximum resiliency
3333

34-
The Maximum resiliency architecture in ExpressRoute is structured to eliminate any single point of failure within the Microsoft network path. This set up is achieved by configuring a pair of circuits across two distinct locations for site diversity with ExpressRoute. The objective of Maximum resiliency is to enhance reliability, resiliency, and availability, as a result ensuring the highest level of resilience for business and/or mission-critical workloads. For such operations, we recommend that you configure maximum resiliency. This architectural design is recommended as part of the [Well Architected Framework](/azure/well-architected/service-guides/azure-expressroute#reliability) under the reliability pillar. The ExpressRoute engineering team developed a [guided portal experience](expressroute-howto-circuit-portal-resource-manager.md?pivots=expressroute-preview) to assist you in configuring maximum resiliency.
34+
The Maximum resiliency architecture in ExpressRoute is structured to eliminate any single point of failure within the Microsoft network path. This setup is achieved by configuring a pair of circuits across two distinct locations for site diversity with ExpressRoute. The objective of Maximum resiliency is to enhance reliability, resiliency, and availability, as a result ensuring the highest level of resilience for business and/or mission-critical workloads. For such operations, we recommend that you configure maximum resiliency. This architectural design is recommended as part of the [Well Architected Framework](/azure/well-architected/service-guides/azure-expressroute#reliability) under the reliability pillar. The ExpressRoute engineering team developed a [guided portal experience](expressroute-howto-circuit-portal-resource-manager.md?pivots=expressroute-preview) to assist you in configuring maximum resiliency.
3535

3636
:::image type="content" source="./media/expressroute-howto-circuit-portal-resource-manager/maximum-resiliency.png" alt-text="Diagram of maximum resiliency for an ExpressRoute connection.":::
3737

articles/expressroute/expressroute-howto-linkvnet-arm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ $connection = New-AzVirtualNetworkGatewayConnection -Name "ERConnection" -Resour
107107
You can share an ExpressRoute circuit across multiple subscriptions. The following figure shows a simple schematic of how sharing works for ExpressRoute circuits across multiple subscriptions.
108108

109109
> [!NOTE]
110-
> Connecting virtual networks between Azure sovereign clouds and Public Azure cloud is not supported. You can only link virtual networks from different subscriptions in the same cloud.
110+
> Connecting virtual networks between Azure sovereign clouds and global Azure cloud is not supported. You can only link virtual networks from different subscriptions in the same cloud.
111111
112112
Each of the smaller clouds within the large cloud is used to represent subscriptions that belong to different departments within an organization. Each of the departments within the organization uses their own subscription for deploying their services--but they can share a single ExpressRoute circuit to connect back to your on-premises network. A single department (in this example: IT) can own the ExpressRoute circuit. Other subscriptions within the organization may use the ExpressRoute circuit.
113113

@@ -124,7 +124,7 @@ The 'circuit owner' is an authorized Power User of the ExpressRoute circuit reso
124124
The circuit owner has the power to modify and revoke authorizations at any time. Revoking an authorization results in all link connections being deleted from the subscription whose access was revoked.
125125

126126
> [!NOTE]
127-
> Circuit owner is not an built-in RBAC role or defined on the ExpressRoute resource.
127+
> Circuit owner is not a built-in RBAC role or defined on the ExpressRoute resource.
128128
> The definition of the circuit owner is any role with the following access:
129129
> - Microsoft.Network/expressRouteCircuits/authorizations/write
130130
> - Microsoft.Network/expressRouteCircuits/authorizations/read
@@ -257,7 +257,7 @@ With Virtual Network Peering and UDR support, FastPath will send traffic directl
257257

258258
With FastPath and Private Link, Private Link traffic sent over ExpressRoute bypasses the ExpressRoute virtual network gateway in the data path. With both of these features enabled, FastPath will directly send traffic to a Private Endpoint deployed in a "spoke" Virtual Network.
259259

260-
This scenarios is Generally Available for limited scenarios with connections associated to 10 Gbps and 100 Gbps ExpressRoute Direct circuits. To enable, follow the below guidance:
260+
This scenario is Generally Available for limited scenarios with connections associated to 10 Gbps and 100 Gbps ExpressRoute Direct circuits. To enable, follow the below guidance:
261261
1. Complete this [Microsoft Form](https://aka.ms/fplimitedga) to request to enroll your subscription. Requests may take up to 4 weeks to complete, so plan deployments accordingly.
262262
2. Once you receive a confirmation from Step 1, run the following Azure PowerShell command in the target Azure subscription.
263263
```azurepowershell-interactive

articles/expressroute/expressroute-howto-linkvnet-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ az network vpn-connection create --name ERConnection --resource-group ExpressRou
5252
You can share an ExpressRoute circuit across multiple subscriptions. The following figure shows a simple schematic of how sharing works for ExpressRoute circuits across multiple subscriptions.
5353

5454
> [!NOTE]
55-
> Connecting virtual networks between Azure sovereign clouds and Public Azure cloud is not supported. You can only link virtual networks from different subscriptions in the same cloud.
55+
> Connecting virtual networks between Azure sovereign clouds and global Azure cloud is not supported. You can only link virtual networks from different subscriptions in the same cloud.
5656
5757
Each of the smaller clouds within the large cloud is used to represent subscriptions that belong to different departments within an organization. Each of the departments within the organization uses their own subscription for deploying their services--but they can share a single ExpressRoute circuit to connect back to your on-premises network. A single department (in this example: IT) can own the ExpressRoute circuit. Other subscriptions within the organization may use the ExpressRoute circuit.
5858

@@ -70,7 +70,7 @@ The 'Circuit Owner' is an authorized Power User of the ExpressRoute circuit reso
7070
The Circuit Owner has the power to modify and revoke authorizations at any time. When an authorization is revoked, all link connections are deleted from the subscription whose access was revoked.
7171

7272
> [!NOTE]
73-
> Circuit owner is not an built-in RBAC role or defined on the ExpressRoute resource.
73+
> Circuit owner is not a built-in RBAC role or defined on the ExpressRoute resource.
7474
> The definition of the circuit owner is any role with the following access:
7575
>- Microsoft.Network/expressRouteCircuits/authorizations/write
7676
>- Microsoft.Network/expressRouteCircuits/authorizations/read

articles/expressroute/expressroute-howto-linkvnet-portal-resource-manager.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom: sfi-image-nochange
1818
> * [Azure CLI](expressroute-howto-linkvnet-cli.md)
1919
> * [PowerShell (classic)](expressroute-howto-linkvnet-classic.md)
2020
21-
This article helps you create a connection to link a virtual network (virtual network) to Azure ExpressRoute circuits using the Azure portal. The virtual networks that you connect to your Azure ExpressRoute circuit can either be in the same subscription or part of another subscription.
21+
This article helps you create a connection to link a virtual network to Azure ExpressRoute circuits using the Azure portal. The virtual networks that you connect to your Azure ExpressRoute circuit can either be in the same subscription or part of another subscription.
2222

2323
:::image type="content" source="./media/expressroute-howto-linkvnet-portal-resource-manager/gateway-circuit.png" alt-text="Diagram showing a virtual network linked to an ExpressRoute circuit." lightbox="./media/expressroute-howto-linkvnet-portal-resource-manager/gateway-circuit.png":::
2424

@@ -114,7 +114,7 @@ You can share an ExpressRoute circuit across multiple subscriptions. The followi
114114
Each of the smaller clouds within the large cloud is used to represent subscriptions that belong to different departments within an organization. Each of the departments within the organization uses their own subscription for deploying their services--but they can share a single ExpressRoute circuit to connect back to your on-premises network. A single department (in this example: IT) can own the ExpressRoute circuit. Other subscriptions within the organization may use the ExpressRoute circuit.
115115

116116
> [!NOTE]
117-
> * Connecting virtual networks between Azure sovereign clouds and Public Azure cloud is not supported. You can only link virtual networks from different subscriptions in the same cloud.
117+
> * Connecting virtual networks between Azure sovereign clouds and global Azure cloud is not supported. You can only link virtual networks from different subscriptions in the same cloud.
118118
> * Connectivity and bandwidth charges for the dedicated circuit will be applied to the ExpressRoute circuit owner. All virtual networks share the same bandwidth.
119119
120120
### Administration - About circuit owners and circuit users
@@ -124,7 +124,7 @@ The 'circuit owner' is an authorized Power User of the ExpressRoute circuit reso
124124
The circuit owner has the power to modify and revoke authorizations at any time. Revoking an authorization results in all link connections being deleted from the subscription whose access was revoked.
125125

126126
> [!NOTE]
127-
> Circuit owner is not an built-in RBAC role or defined on the ExpressRoute resource.
127+
> Circuit owner is not a built-in RBAC role or defined on the ExpressRoute resource.
128128
> The definition of the circuit owner is any role with the following access:
129129
> - Microsoft.Network/expressRouteCircuits/authorizations/write
130130
> - Microsoft.Network/expressRouteCircuits/authorizations/read
@@ -216,7 +216,7 @@ You can delete a connection and unlink your virtual network to an ExpressRoute c
216216

217217
In this tutorial, you learned how to connect a virtual network to a circuit in the same subscription and in a different subscription. For more information about ExpressRoute gateways, see: [ExpressRoute virtual network gateways](expressroute-about-virtual-network-gateways.md).
218218

219-
To learn how to configure, route filters for Microsoft peering using the Azure portal, advance to the next tutorial.
219+
To learn how to configure route filters for Microsoft peering using the Azure portal, advance to the next tutorial.
220220

221221
> [!div class="nextstepaction"]
222222
> [Configure route filters for Microsoft peering](how-to-routefilter-portal.md)

articles/expressroute/how-to-configure-connection-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Create a workspace in the subscription that has the VNets linked to the ExpressR
4545
1. Sign in to the [Azure portal](https://portal.azure.com). From the subscription with the virtual networks connected to your ExpressRoute circuit, select **+ Create a resource**. Search for *Log Analytics Workspace*, then select **Create**.
4646

4747
> [!NOTE]
48-
> You can create a new workspace or use an existing one. If using an existing workspace, ensure it's been migrated to the new query language. [More information...](/azure/azure-monitor/logs/log-query-overview)
48+
> You can create a new workspace or use an existing one. If using an existing workspace, ensure it's been migrated to the new query language. For more information, see [Log queries in Azure Monitor](/azure/azure-monitor/logs/log-query-overview).
4949
5050
1. Create a workspace by entering or selecting the following information:
5151

@@ -143,7 +143,7 @@ Ensure firewall rules allow TCP or ICMP packets between source and destination s
143143
Run the [EnableRules](https://aka.ms/npmpowershellscript) PowerShell script (downloaded earlier) in a PowerShell window with administrative privileges. This script creates the necessary registry keys and Windows Firewall rules.
144144

145145
> [!NOTE]
146-
> The script configures Windows Firewall rules only on the server where it's bring run. Ensure network firewalls allow traffic for the TCP port used by Connection Monitor.
146+
> The script configures Windows Firewall rules only on the server where it's being run. Ensure network firewalls allow traffic for the TCP port used by Connection Monitor.
147147
148148
#### Linux
149149

articles/expressroute/planned-maintenance.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,13 +52,13 @@ After you complete the activation of an ExpressRoute circuit and before being us
5252

5353
The process of validation of ExpressRoute circuit failover can be executed in two steps:
5454

55-
1. Shutdown the BGP session between your on-premises edge router and the primary connection on the MSEE router. This forces the traffic only through the secondary connection. You can monitor the traffic statistics on the MSEE connection using the [`Get-AzExpressRouteCircuitStats`](expressroute-troubleshooting-expressroute-overview.md#confirm-the-traffic-flow) command. The **BitsInPerSecond** and **BitsOutPerSecond** traffic metrics should only increment on the path that is currently active.
55+
1. Shut down the BGP session between your on-premises edge router and the primary connection on the MSEE router. This forces the traffic only through the secondary connection. You can monitor the traffic statistics on the MSEE connection using the [`Get-AzExpressRouteCircuitStats`](expressroute-troubleshooting-expressroute-overview.md#confirm-the-traffic-flow) command. The **BitsInPerSecond** and **BitsOutPerSecond** traffic metrics should only increment on the path that is currently active.
5656

5757
:::image type="content" source="./media/planned-maintenance/primary-down.png" alt-text="Diagram of BGP peering down for primary connection of an ExpressRoute circuit.":::
5858

5959
When the test is completed successful, move to the second step.
6060

61-
1. Shutdown the BGP session between your on-premises edge router and the secondary MSEE connection. Repeat the verification actions in Step 1 to validate the traffic is only incrementing on the primary path.
61+
1. Shut down the BGP session between your on-premises edge router and the secondary MSEE connection. Repeat the verification actions in Step 1 to validate the traffic is only incrementing on the primary path.
6262

6363
:::image type="content" source="./media/planned-maintenance/secondary-down.png" alt-text="Diagram of BGP peering down for secondary connection of an ExpressRoute circuit.":::
6464

@@ -71,7 +71,7 @@ The failover validation of an ExpressRoute circuit reduces the risk of outages d
7171
If the verification of ExpressRoute circuit failover hasn't been completed and the ExpressRoute circuit is already in production, it's never too late to schedule a customer’s maintenance, out of working hours, and proceed with failover test.
7272

7373
> [!NOTE]
74-
> As general guideline, terminating ExpressRoute BGP connections on stateful devices (such as firewalls) can cause issues with failover during planned or unplanned maintenances by Microsoft or your ExpressRoute service provider. You should evaluate your set up to ensure your traffic will failover properly, and when possible, terminate BGP sessions on stateless devices.
74+
> As general guideline, terminating ExpressRoute BGP connections on stateful devices (such as firewalls) can cause issues with failover during planned or unplanned maintenance by Microsoft or your ExpressRoute service provider. You should evaluate your setup to ensure your traffic will fail over properly, and when possible, terminate BGP sessions on stateless devices.
7575
7676
## Monitor of ExpressRoute circuit
7777

0 commit comments

Comments
 (0)