Skip to content

Commit 9499913

Browse files
authored
Merge pull request #313263 from mattmcinnes/nva-opt-out-faq
[MANA] NVA opt-out FAQ
2 parents 32e2922 + 7d9fcc6 commit 9499913

3 files changed

Lines changed: 150 additions & 1 deletion

File tree

articles/virtual-network/accelerated-networking-mana-existing-sizes.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Dsv5, Dv5, Ddsv5, Ddv5, Dlsv5, Dldsv5, Esv5, Ev5, Edsv5, Edv5, Ebsv5, Ebdsv5, Ds
3333

3434
Note that some of these VM sizes will soon be retired. It's highly recommended that customers utilize the latest generations of Azure VMs for improved performance, functionality, and resiliency.
3535

36-
### Will existing VMs deployed on MANA hardware?
36+
### Will existing VMs be deployed on MANA hardware?
3737
VMs already deployed will be eligible to land on MANA capable hardware following a "stop-deallocate and start" command, or through a redeploy operation. All new VMs in the series listed above are eligible to be deployed on MANA capable hardware as well.
3838

3939
### How will I know if my VM is deployed on MANA capable hardware?
@@ -63,6 +63,14 @@ To learn more about MANA, visit [Microsoft Azure Network Adapter](/azure/virtual
6363
### What should I do if I have issues?
6464
We’re here to help. Contact Microsoft Support, who can assist with troubleshooting, guidance, and next steps. You can open a support request through the Azure portal by selecting Help + support, or visit the Microsoft Support site to start a new case. A support engineer reviews your request, engage internal teams as needed, and keep you updated until the issue is resolved.
6565

66+
### Are Azure Kubernetes Service (AKS) instances impacted?
67+
68+
No. AKS instances aren't impacted and will continue to perform as expected when deployed on MANA hardware.
69+
70+
### Is VNet encryption impacted?
71+
72+
No. VNet encryption will continue to perform as expected if VMs are deployed on MANA hardware.
73+
6674
## Related content
6775

6876
- [Accelerated Networking Overview](https://aka.ms/accelnet)
Lines changed: 139 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,139 @@
1+
---
2+
title: MANA support for Network Virtual Appliances (NVAs)
3+
titleSuffix: Microsoft Azure Network Adapter
4+
description: Learn about MANA support for Network Virtual Appliances (NVAs) using existing VM sizes, including how to use Azure Policy to manage MANA deployments and ensure optimal performance.
5+
author: mattmcinnes
6+
ms.author: mattmcinnes
7+
ms.service: azure-virtual-network
8+
ms.topic: faq
9+
ms.date: 03/17/2026
10+
# Customer intent: As a network administrator using Network Virtual Appliances, I want to understand how MANA affects my NVA deployments and how to apply Azure Policy to manage the transition.
11+
---
12+
13+
# MANA support for Network Virtual Appliances (NVAs)
14+
15+
The following content is for customers using Network Virtual Appliances (NVAs) that utilize existing VM sizes.
16+
17+
Per the [announcement](https://aka.ms/announcemanasupportforexistingvms), General Purpose Compute VMs can be deployed on compute hardware equipped with the [Microsoft Azure Network Adapter (MANA)](/azure/virtual-network/accelerated-networking-mana-overview). MANA was introduced in February 2025 with the Intel v6 family of sizes as part of Azure Boost. MANA is an Azure optimized, performance-focused, Accelerated Networking device that is an integral part of the newest Azure Boost offerings.
18+
19+
As described in [Microsoft Azure Network Adapter (MANA) support for existing VM Sizes](./accelerated-networking-mana-existing-sizes.md), Network Virtual Appliances (NVAs) may also be deployed on MANA-capable hardware.
20+
21+
For optimal Accelerated Networking performance, the Virtual Machine (VM) should use an operating system that fully supports NVIDIA `ConnectX-3`, `ConnectX-4 Lx`, `ConnectX-5`, **and** MANA.
22+
23+
When a VM or NVA using an operating system that doesn't support MANA is deployed on MANA hardware, it falls back to the NetVSC network adapter. In this scenario, the MANA Virtual Function (VF) is visible, but no network interfaces are exposed by the MANA driver. Accelerated Networking performance for a VM falling back to the NetVSC network adapter is expected to be close to SR-IOV/VF mode NVIDIA `ConnectX-3`, `ConnectX-4 Lx`, `ConnectX-5`. A high number of concurrent connections can cause performance degradation. VMs and NVAs that use DPDK also revert to using NetVSC if the underlying OS doesn't meet the requirements. For more information, see [Microsoft Azure Network Adapter (MANA) and DPDK on Linux](./setup-dpdk-mana.md).
24+
25+
While Microsoft has performed extensive testing across a wide range of use cases, there remains a possibility that virtual machines may experience intermittent connectivity or degraded performance.
26+
27+
For best performance and overall experience, we recommend migrating to the latest generation of VMs. At a minimum, ensure your operating systems fully support MANA.
28+
29+
## FAQ
30+
31+
### How do I know if my NVA supports MANA?
32+
33+
Reach out to your NVA provider to determine if the NVA supports MANA.
34+
35+
### How do I determine if my NVA is deployed on MANA hardware?
36+
37+
To determine if your NVA VM is deployed on MANA, follow the instructions in [Linux VMs with the Microsoft Azure Network Adapter](./accelerated-networking-mana-linux.md).
38+
39+
### Is any action needed if the NVA or underlying OS supports MANA?
40+
41+
No action is required if the NVA or the underlying OS already supports MANA.
42+
43+
### What if additional time is needed to migrate to an NVA that fully supports MANA?
44+
45+
You can apply a tag to Network Virtual Appliances (NVAs), VMs, and Virtual Machine Scale Sets for MANA support. This tag provides a temporary reprieve and allows time to migrate to an NVA or operating system that fully supports MANA.
46+
47+
### What if the NVA is acquired directly from the NVA provider and not through the Azure Marketplace?
48+
49+
Work with your NVA provider directly to determine if any changes are required in the deployment templates or mechanisms to ensure the tag is applied to existing and new deployments.
50+
51+
### Are Managed Service NVAs affected by this change?
52+
53+
Yes. NVAs provided through a managed service are also impacted by this change. Work with the managed service provider to determine their plans and processes for applying the policy.
54+
55+
### How long will the tag be usable?
56+
57+
The tag will be usable until the end of September 2026. After this time, the systems will be updated to ignore the tag, allowing the NVAs to be deployed on MANA-enabled hardware.
58+
59+
### What support is available to help apply this tag on my applicable resources?
60+
61+
To apply this tag across applicable resources at scale, you can apply a built-in Azure Policy definition: **Adds a tag to Network Virtual Appliances (NVAs) VMs and Virtual Machine Scale Sets for MANA support**.
62+
63+
Like any other Azure Policy assignment, it can be applied at the following scope levels to cover applicable resources underneath it:
64+
65+
| Scope level | Applies to |
66+
|---|---|
67+
| Root Management Group | Entire Azure Tenant (all subscriptions) |
68+
| Management Group | Multiple subscriptions |
69+
| Subscription | All resource groups and resources in the subscription |
70+
| Resource Group | Resources in that resource group |
71+
| Resource | Single resource |
72+
73+
The policy applies a specific tag, `LegacyVMNVA`, to NVA deployments. The policy covers individual workloads and Virtual Machine Scale Sets scenarios as well.
74+
75+
Logic in the policy definition scopes the tag application to specific NVA publishers and associated product IDs, which are available in the Azure Marketplace. The tag inhibits deployment of NVAs on MANA-enabled hardware.
76+
77+
### Does applying the policy have any cost implications for my subscription?
78+
79+
No. There are no cost implications of applying the policy.
80+
81+
### How do I assign a policy definition?
82+
83+
Microsoft recommends that policy enforcement is applied gradually to your environment following your organization's strategies for safe rollout. Azure Policy supports safe rollout primitives that enable customers to gradually roll out enforcement by region and resource type.
84+
85+
For a more detailed breakdown of the mechanisms available to gradually roll out this policy assignment, see [Safe deployment of Azure Policy assignments](/azure/governance/policy/how-to/policy-safe-deployment-practices).
86+
87+
### Can the policy be edited?
88+
89+
No. The built-in policy can't be edited. We recommend assigning the built-in policy as-is. This minimizes management overhead since the policy is managed by Microsoft and ensures you receive policy revisions and updates.
90+
91+
However, if the definition needs further customization, the policy can be duplicated, customized as needed, and then assigned.
92+
93+
### Will there be new versions of the policy definition?
94+
95+
There may be minor revisions to the policy. As such, we recommend applying the built-in policy. For more information on policy versioning, see [Policy Definition Versions - REST API (Azure Policy)](/rest/api/policy-authorization/policy-definition-versions).
96+
97+
### Is there a way to selectively apply the policy to VMs within my environment?
98+
99+
Azure Policy exemption capabilities can be used to exclude resources or scopes from policy enforcement. For more information, see [Details of the policy exemption structure](/azure/governance/policy/concepts/exemption-structure).
100+
101+
### How can I ensure that new versions are automatically applied?
102+
103+
At the time of assigning the policy, enable **Automatically enroll in minor version changes** to ensure that minor versions are automatically applied. You may also assign the policy with `1.*.*`.
104+
105+
To control the rollout of updated policy definition versions to your environment, see [Safe deployment of Azure Policy assignments](/azure/governance/policy/how-to/policy-safe-deployment-practices).
106+
107+
### Are there any additional steps after applying the tag or using policy to deploy the tag?
108+
109+
For existing VMs, a redeployment is required after the tag has been applied.
110+
111+
### What VM sizes is the policy applicable to?
112+
113+
VM sizes are specified in [Microsoft Azure Network Adapter (MANA) support for existing VM Sizes](./accelerated-networking-mana-existing-sizes.md).
114+
115+
### How can I verify that the tag has been applied to my resources?
116+
117+
The tag `LegacyVMNVA` is visible in the Azure portal for IaaS VMs and for VM Scale Set scenarios.
118+
119+
Azure Policy collects and aggregates compliance data, which can be used to see which resources are *compliant* against the definition (the tag is applied) versus which ones are *non-compliant* and must be remediated (the tag isn't applied). This compliance report can be viewed in the Azure portal under the **Policy** tab.
120+
121+
### Is there a rollback mechanism in case of an error?
122+
123+
To roll back the policy assignment, delete the policy assignment. For a more gradual approach, update the policy resource selector in the policy assignment to incrementally remove regions.
124+
125+
If the tag has been applied to existing VMs, delete the tags using your Azure client of choice and redeploy the VMs.
126+
127+
### Is any action needed after end of September 2026?
128+
129+
No action is required at the end of September 2026. However, we recommend removing the policy assignment from all associated subscriptions.
130+
131+
### Does the Accelerated Networking enablement status affect application of the policy?
132+
133+
No. Accelerated Networking enablement doesn't have any effect on the application of the policy.
134+
135+
## Related content
136+
137+
- [Accelerated Networking Overview](https://aka.ms/accelnet)
138+
- [How Accelerated Networking works in Linux and FreeBSD VMs](/azure/virtual-network/accelerated-networking-how-it-works)
139+
- [Microsoft Azure Network Adapter (MANA) support for existing VM Sizes](./accelerated-networking-mana-existing-sizes.md)

articles/virtual-network/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -212,6 +212,8 @@
212212
href: accelerated-networking-mana-windows.md
213213
- name: MANA support for existing VM sizes
214214
href: accelerated-networking-mana-existing-sizes.md
215+
- name: MANA on Network Virtual Appliances (NVAs) for existing VM sizes
216+
href: accelerated-networking-mana-network-virtual-appliance-opt-out.md
215217
- name: Migrate a VM public IP address to a NAT gateway
216218
href: /azure/nat-gateway/tutorial-migrate-ilip-nat?toc=%2Fazure%2Fvirtual-network%2Ftoc.json
217219
- name: Network bandwidth

0 commit comments

Comments
 (0)