You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/native-network-design-consideration.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,11 +28,16 @@ The following functionality is limited during this time. These limitations will
28
28
4. Your private cloud and virtual network for your private cloud must be in the ***same*** Resource Group.
29
29
5. You cannot ***move*** your private cloud from one Resource Group to another after the private cloud is created.
30
30
6. You cannot ***move*** your private cloud from one tenant to another after the private cloud is created.
31
-
1.**Service Endpoints** direct connectivity from Azure VMware Solution workloads isn't supported.
31
+
1.**Service Endpoints** direct connectivity from Azure VMware Solution workloads isn't supported.
32
+
33
+
1.**Private Endpoints when globally peered** across regions connected to Azure VMware Solution isn't supported.
34
+
32
35
9.**vCloud Director** using Private Endpoints is supported. However, vCloud Director using Public Endpoints isn't supported.
33
-
10.**vSAN Stretched Clusters** isn't supported.
36
+
1.**vSAN Stretched Clusters** isn't supported.
37
+
34
38
11.**Public IP down to the VMware NSX Microsoft Edge** for configuring internet will not be supported. You can find what internet options are supported in [Internet connectivity options](native-internet-connectivity-design-considerations.md).
35
-
12. During **unplanned maintenance** – like a host hardware failure – on any of the first four hosts in your SDDC, you may experience a temporary North-South network connectivity disruption for some workloads, lasting up to 30 seconds. North-South connectivity refers to traffic between your AVS VMware workloads and external endpoints beyond the NSX-T Tier-0 (T0) Edge—such as Azure services or on-premises environments.
39
+
1. During **unplanned maintenance** – like a host hardware failure – on any of the first four hosts in your SDDC, you may experience a temporary North-South network connectivity disruption for some workloads, lasting up to 30 seconds. North-South connectivity refers to traffic between your AVS VMware workloads and external endpoints beyond the NSX-T Tier-0 (T0) Edge, such as Azure services or on-premises environments.
40
+
36
41
13.**Network Security Groups** associated with the private cloud host virtual network must be created in the ***same*** resource group as the private cloud and its virtual network.
37
42
14.**Cross-resource group and cross-subscription references** from customer virtual networks to the Azure VMware Solution virtual network are not supported by default. This includes resource types such as: User-defined routes (UDRs), DDoS Protection Plans, and other linked networking resources. If a customer virtual network is associated with one of these references that resides in a different resource group or subscription than the Azure VMware Solution virtual network, network programming (such as NSX segment propagation) may fail. To avoid issues, customers must ensure that the Azure VMware Solution virtual network isn't linked to resources in a different resource group or subscription and detach such resources (for example, DDoS Protection Plans) from the virtual network before proceeding.
38
43
- To maintain your cross-resource group reference, create a role assignment from your cross-resource group or subscription and give the “AzS VIS Prod App” the "AVS on Fleet VIS Role". The role assignment allows you to use reference and have your reference correctly applied for your Azure VMware Solution private cloud.
0 commit comments