You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/expressroute/design-architecture-for-resiliency.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ There are three ExpressRoute resiliency architectures that can be utilized to en
31
31
32
32
### Maximum resiliency
33
33
34
-
The Maximum resiliency architecture in ExpressRoute is structured to eliminate any single point of failure within the Microsoft network path. This set up is achieved by configuring a pair of circuits across two distinct locations for site diversity with ExpressRoute. The objective of Maximum resiliency is to enhance reliability, resiliency, and availability, as a result ensuring the highest level of resilience for business and/or mission-critical workloads. For such operations, we recommend that you configure maximum resiliency. This architectural design is recommended as part of the [Well Architected Framework](/azure/well-architected/service-guides/azure-expressroute#reliability) under the reliability pillar. The ExpressRoute engineering team developed a [guided portal experience](expressroute-howto-circuit-portal-resource-manager.md?pivots=expressroute-preview) to assist you in configuring maximum resiliency.
34
+
The Maximum resiliency architecture in ExpressRoute is structured to eliminate any single point of failure within the Microsoft network path. This setup is achieved by configuring a pair of circuits across two distinct locations for site diversity with ExpressRoute. The objective of Maximum resiliency is to enhance reliability, resiliency, and availability, as a result ensuring the highest level of resilience for business and/or mission-critical workloads. For such operations, we recommend that you configure maximum resiliency. This architectural design is recommended as part of the [Well Architected Framework](/azure/well-architected/service-guides/azure-expressroute#reliability) under the reliability pillar. The ExpressRoute engineering team developed a [guided portal experience](expressroute-howto-circuit-portal-resource-manager.md?pivots=expressroute-preview) to assist you in configuring maximum resiliency.
35
35
36
36
:::image type="content" source="./media/expressroute-howto-circuit-portal-resource-manager/maximum-resiliency.png" alt-text="Diagram of maximum resiliency for an ExpressRoute connection.":::
You can share an ExpressRoute circuit across multiple subscriptions. The following figure shows a simple schematic of how sharing works for ExpressRoute circuits across multiple subscriptions.
108
108
109
109
> [!NOTE]
110
-
> Connecting virtual networks between Azure sovereign clouds and Public Azure cloud is not supported. You can only link virtual networks from different subscriptions in the same cloud.
110
+
> Connecting virtual networks between Azure sovereign clouds and global Azure cloud is not supported. You can only link virtual networks from different subscriptions in the same cloud.
111
111
112
112
Each of the smaller clouds within the large cloud is used to represent subscriptions that belong to different departments within an organization. Each of the departments within the organization uses their own subscription for deploying their services--but they can share a single ExpressRoute circuit to connect back to your on-premises network. A single department (in this example: IT) can own the ExpressRoute circuit. Other subscriptions within the organization may use the ExpressRoute circuit.
113
113
@@ -124,7 +124,7 @@ The 'circuit owner' is an authorized Power User of the ExpressRoute circuit reso
124
124
The circuit owner has the power to modify and revoke authorizations at any time. Revoking an authorization results in all link connections being deleted from the subscription whose access was revoked.
125
125
126
126
> [!NOTE]
127
-
> Circuit owner is not an built-in RBAC role or defined on the ExpressRoute resource.
127
+
> Circuit owner is not a built-in RBAC role or defined on the ExpressRoute resource.
128
128
> The definition of the circuit owner is any role with the following access:
@@ -257,7 +257,7 @@ With Virtual Network Peering and UDR support, FastPath will send traffic directl
257
257
258
258
With FastPath and Private Link, Private Link traffic sent over ExpressRoute bypasses the ExpressRoute virtual network gateway in the data path. With both of these features enabled, FastPath will directly send traffic to a Private Endpoint deployed in a "spoke" Virtual Network.
259
259
260
-
This scenarios is Generally Available for limited scenarios with connections associated to 10 Gbps and 100 Gbps ExpressRoute Direct circuits. To enable, follow the below guidance:
260
+
This scenario is Generally Available for limited scenarios with connections associated to 10 Gbps and 100 Gbps ExpressRoute Direct circuits. To enable, follow the below guidance:
261
261
1. Complete this [Microsoft Form](https://aka.ms/fplimitedga) to request to enroll your subscription. Requests may take up to 4 weeks to complete, so plan deployments accordingly.
262
262
2. Once you receive a confirmation from Step 1, run the following Azure PowerShell command in the target Azure subscription.
You can share an ExpressRoute circuit across multiple subscriptions. The following figure shows a simple schematic of how sharing works for ExpressRoute circuits across multiple subscriptions.
53
53
54
54
> [!NOTE]
55
-
> Connecting virtual networks between Azure sovereign clouds and Public Azure cloud is not supported. You can only link virtual networks from different subscriptions in the same cloud.
55
+
> Connecting virtual networks between Azure sovereign clouds and global Azure cloud is not supported. You can only link virtual networks from different subscriptions in the same cloud.
56
56
57
57
Each of the smaller clouds within the large cloud is used to represent subscriptions that belong to different departments within an organization. Each of the departments within the organization uses their own subscription for deploying their services--but they can share a single ExpressRoute circuit to connect back to your on-premises network. A single department (in this example: IT) can own the ExpressRoute circuit. Other subscriptions within the organization may use the ExpressRoute circuit.
58
58
@@ -70,7 +70,7 @@ The 'Circuit Owner' is an authorized Power User of the ExpressRoute circuit reso
70
70
The Circuit Owner has the power to modify and revoke authorizations at any time. When an authorization is revoked, all link connections are deleted from the subscription whose access was revoked.
71
71
72
72
> [!NOTE]
73
-
> Circuit owner is not an built-in RBAC role or defined on the ExpressRoute resource.
73
+
> Circuit owner is not a built-in RBAC role or defined on the ExpressRoute resource.
74
74
> The definition of the circuit owner is any role with the following access:
This article helps you create a connection to link a virtual network (virtual network) to Azure ExpressRoute circuits using the Azure portal. The virtual networks that you connect to your Azure ExpressRoute circuit can either be in the same subscription or part of another subscription.
21
+
This article helps you create a connection to link a virtual network to Azure ExpressRoute circuits using the Azure portal. The virtual networks that you connect to your Azure ExpressRoute circuit can either be in the same subscription or part of another subscription.
22
22
23
23
:::image type="content" source="./media/expressroute-howto-linkvnet-portal-resource-manager/gateway-circuit.png" alt-text="Diagram showing a virtual network linked to an ExpressRoute circuit." lightbox="./media/expressroute-howto-linkvnet-portal-resource-manager/gateway-circuit.png":::
24
24
@@ -114,7 +114,7 @@ You can share an ExpressRoute circuit across multiple subscriptions. The followi
114
114
Each of the smaller clouds within the large cloud is used to represent subscriptions that belong to different departments within an organization. Each of the departments within the organization uses their own subscription for deploying their services--but they can share a single ExpressRoute circuit to connect back to your on-premises network. A single department (in this example: IT) can own the ExpressRoute circuit. Other subscriptions within the organization may use the ExpressRoute circuit.
115
115
116
116
> [!NOTE]
117
-
> * Connecting virtual networks between Azure sovereign clouds and Public Azure cloud is not supported. You can only link virtual networks from different subscriptions in the same cloud.
117
+
> * Connecting virtual networks between Azure sovereign clouds and global Azure cloud is not supported. You can only link virtual networks from different subscriptions in the same cloud.
118
118
> * Connectivity and bandwidth charges for the dedicated circuit will be applied to the ExpressRoute circuit owner. All virtual networks share the same bandwidth.
119
119
120
120
### Administration - About circuit owners and circuit users
@@ -124,7 +124,7 @@ The 'circuit owner' is an authorized Power User of the ExpressRoute circuit reso
124
124
The circuit owner has the power to modify and revoke authorizations at any time. Revoking an authorization results in all link connections being deleted from the subscription whose access was revoked.
125
125
126
126
> [!NOTE]
127
-
> Circuit owner is not an built-in RBAC role or defined on the ExpressRoute resource.
127
+
> Circuit owner is not a built-in RBAC role or defined on the ExpressRoute resource.
128
128
> The definition of the circuit owner is any role with the following access:
@@ -216,7 +216,7 @@ You can delete a connection and unlink your virtual network to an ExpressRoute c
216
216
217
217
In this tutorial, you learned how to connect a virtual network to a circuit in the same subscription and in a different subscription. For more information about ExpressRoute gateways, see: [ExpressRoute virtual network gateways](expressroute-about-virtual-network-gateways.md).
218
218
219
-
To learn how to configure, route filters for Microsoft peering using the Azure portal, advance to the next tutorial.
219
+
To learn how to configure route filters for Microsoft peering using the Azure portal, advance to the next tutorial.
220
220
221
221
> [!div class="nextstepaction"]
222
222
> [Configure route filters for Microsoft peering](how-to-routefilter-portal.md)
Copy file name to clipboardExpand all lines: articles/expressroute/how-to-configure-connection-monitor.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ Create a workspace in the subscription that has the VNets linked to the ExpressR
45
45
1. Sign in to the [Azure portal](https://portal.azure.com). From the subscription with the virtual networks connected to your ExpressRoute circuit, select **+ Create a resource**. Search for *Log Analytics Workspace*, then select **Create**.
46
46
47
47
> [!NOTE]
48
-
> You can create a new workspace or use an existing one. If using an existing workspace, ensure it's been migrated to the new query language. [More information...](/azure/azure-monitor/logs/log-query-overview)
48
+
> You can create a new workspace or use an existing one. If using an existing workspace, ensure it's been migrated to the new query language. For more information, see [Log queries in Azure Monitor](/azure/azure-monitor/logs/log-query-overview).
49
49
50
50
1. Create a workspace by entering or selecting the following information:
51
51
@@ -143,7 +143,7 @@ Ensure firewall rules allow TCP or ICMP packets between source and destination s
143
143
Run the [EnableRules](https://aka.ms/npmpowershellscript) PowerShell script (downloaded earlier) in a PowerShell window with administrative privileges. This script creates the necessary registry keys and Windows Firewall rules.
144
144
145
145
> [!NOTE]
146
-
> The script configures Windows Firewall rules only on the server where it's bring run. Ensure network firewalls allow traffic for the TCP port used by Connection Monitor.
146
+
> The script configures Windows Firewall rules only on the server where it's being run. Ensure network firewalls allow traffic for the TCP port used by Connection Monitor.
Copy file name to clipboardExpand all lines: articles/expressroute/planned-maintenance.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,13 +52,13 @@ After you complete the activation of an ExpressRoute circuit and before being us
52
52
53
53
The process of validation of ExpressRoute circuit failover can be executed in two steps:
54
54
55
-
1.Shutdown the BGP session between your on-premises edge router and the primary connection on the MSEE router. This forces the traffic only through the secondary connection. You can monitor the traffic statistics on the MSEE connection using the [`Get-AzExpressRouteCircuitStats`](expressroute-troubleshooting-expressroute-overview.md#confirm-the-traffic-flow) command. The **BitsInPerSecond** and **BitsOutPerSecond** traffic metrics should only increment on the path that is currently active.
55
+
1.Shut down the BGP session between your on-premises edge router and the primary connection on the MSEE router. This forces the traffic only through the secondary connection. You can monitor the traffic statistics on the MSEE connection using the [`Get-AzExpressRouteCircuitStats`](expressroute-troubleshooting-expressroute-overview.md#confirm-the-traffic-flow) command. The **BitsInPerSecond** and **BitsOutPerSecond** traffic metrics should only increment on the path that is currently active.
56
56
57
57
:::image type="content" source="./media/planned-maintenance/primary-down.png" alt-text="Diagram of BGP peering down for primary connection of an ExpressRoute circuit.":::
58
58
59
59
When the test is completed successful, move to the second step.
60
60
61
-
1.Shutdown the BGP session between your on-premises edge router and the secondary MSEE connection. Repeat the verification actions in Step 1 to validate the traffic is only incrementing on the primary path.
61
+
1.Shut down the BGP session between your on-premises edge router and the secondary MSEE connection. Repeat the verification actions in Step 1 to validate the traffic is only incrementing on the primary path.
62
62
63
63
:::image type="content" source="./media/planned-maintenance/secondary-down.png" alt-text="Diagram of BGP peering down for secondary connection of an ExpressRoute circuit.":::
64
64
@@ -71,7 +71,7 @@ The failover validation of an ExpressRoute circuit reduces the risk of outages d
71
71
If the verification of ExpressRoute circuit failover hasn't been completed and the ExpressRoute circuit is already in production, it's never too late to schedule a customer’s maintenance, out of working hours, and proceed with failover test.
72
72
73
73
> [!NOTE]
74
-
> As general guideline, terminating ExpressRoute BGP connections on stateful devices (such as firewalls) can cause issues with failover during planned or unplanned maintenances by Microsoft or your ExpressRoute service provider. You should evaluate your set up to ensure your traffic will failover properly, and when possible, terminate BGP sessions on stateless devices.
74
+
> As general guideline, terminating ExpressRoute BGP connections on stateful devices (such as firewalls) can cause issues with failover during planned or unplanned maintenance by Microsoft or your ExpressRoute service provider. You should evaluate your setup to ensure your traffic will fail over properly, and when possible, terminate BGP sessions on stateless devices.
0 commit comments