You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Azure Site Recovery](../../site-recovery/azure-to-azure-about-networking.md#outbound-connectivity-for-urls)
42
-
- Using public repository for patching the Operating system
42
+
- Using public repository for patching the operating system
43
43
- The SAP application data flow may require outbound connectivity to public end point
44
44
45
45
If your SAP deployment doesn’t require outbound connectivity to public end points, you don’t need to implement extra configuration. It's sufficient to create internal standard SKU Azure Load Balancer for your high availability scenario, assuming that there's also no need for inbound connectivity from public end points.
@@ -50,19 +50,16 @@ If your SAP deployment doesn’t require outbound connectivity to public end poi
50
50
51
51
## Prerequisites
52
52
53
-
Read the following articles first:
53
+
**Azure Standard Load Balancer**:
54
54
55
-
**Azure Standard Load Balancer**
55
+
*[Azure Standard Load Balancer overview](../../load-balancer/load-balancer-overview.md) - Comprehensive overview of Azure Standard Load balancer, important principles, concepts, and tutorials.
56
+
*[Outbound connections in Azure](../../load-balancer/load-balancer-outbound-connections.md#scenarios) - Scenarios on how to achieve outbound connectivity in Azure.
57
+
*[Load balancer outbound rules](../../load-balancer/load-balancer-outbound-connections.md#outboundrules)- Explains the concepts of load balancer outbound rules and how to create outbound rules.
56
58
57
-
*[Azure Standard Load Balancer overview](../../load-balancer/load-balancer-overview.md) - Comprehensive overview of Azure Standard Load balancer, important principles, concepts, and tutorials.
58
-
*[Outbound connections in Azure](../../load-balancer/load-balancer-outbound-connections.md#scenarios) - Scenarios on how to achieve outbound connectivity in Azure.
59
-
*[Load balancer outbound rules](../../load-balancer/load-balancer-outbound-connections.md#outboundrules)- Explains the concepts of load balancer outbound rules and how to create outbound rules.
60
-
61
-
**Azure Firewall**
62
-
63
-
*[Azure Firewall Overview](../../firewall/overview.md)- overview of Azure Firewall.
64
-
*[Tutorial: Deploy and configure Azure Firewall](../../firewall/tutorial-firewall-deploy-portal.md) - instructions on how to configure Azure Firewall via Azure portal.
59
+
**Azure Firewall**:
65
60
61
+
*[Azure Firewall Overview](../../firewall/overview.md)- overview of Azure Firewall.
62
+
*[Tutorial: Deploy and configure Azure Firewall](../../firewall/tutorial-firewall-deploy-portal.md) - instructions on how to configure Azure Firewall via Azure portal.
66
63
*[Virtual Networks - User defined rules](../../virtual-network/virtual-networks-udr-overview.md#user-defined) - Azure routing concepts and rules.
67
64
*[Security Groups Service Tags](../../virtual-network/network-security-groups-overview.md#service-tags) - how to simplify your Network Security Groups (NSG) and Firewall configuration with service tags.
68
65
@@ -202,8 +199,6 @@ You could use proxy to allow Pacemaker calls to the Azure management API public
202
199
- Depending on the location of the proxy, it may introduce extra latency in the calls from the Azure Fence Agent to the Azure Management API. If your corporate proxy is still on the premises, while your Pacemaker cluster is in Azure, measure latency and consider, if this solution is suitable for you.
203
200
- If there isn’t already highly available corporate proxy in place, we don't recommend this option as the customer would be incurring extra cost and complexity. If you decide to deploy extra proxy solution, to allow outbound connectivity from Pacemaker to Azure Management public API, you need to make sure the proxy is highly available. The latency from the VMs to the proxy is low.
204
201
205
-
---
206
-
207
202
### Pacemaker configuration with Proxy
208
203
209
204
There are many different Proxy options available in the industry. Step-by-step instructions for the proxy deployment are outside of the scope of this document. In the following example, we assume that your proxy is responding to **MyProxyService** and listening to port **MyProxyPort**.
@@ -247,6 +242,8 @@ To allow pacemaker to communicate with the Azure management API, perform the fol
247
242
sudo pcs property set maintenance-mode=false
248
243
```
249
244
245
+
---
246
+
250
247
## Other options
251
248
252
249
If outbound traffic is routed via third party, URL-based firewall proxy:
0 commit comments