Azure VMware Solution
Azure VMware Solution
Azure VMware Solution
Azure VMware Solution provides you with private clouds that contain vSphere clusters, built from dedicated
bare-metal Azure infrastructure. The minimum initial deployment is three hosts, but additional hosts can be
added one at a time, up to a maximum of 16 hosts per cluster. All provisioned private clouds have vCenter
Server, vSAN, vSphere, and NSX-T. You can migrate workloads from your on-premises environments, deploy
new virtual machines (VMs), and consume Azure services from your private clouds.
Azure VMware Solution is a VMware validated solution with on-going validation and testing of enhancements
and upgrades. Microsoft manages and maintains private cloud infrastructure and software. It allows you to
focus on developing and running workloads in your private clouds.
The diagram shows the adjacency between private clouds and VNets in Azure, Azure services, and on-premises
environments. Network access from private clouds to Azure services or VNets provides SLA-driven integration
of Azure service endpoints. ExpressRoute Global Reach connects your on-premises environment to your Azure
VMware Solution private cloud.
Networking
Azure VMware Solution offers a private cloud environment accessible from on-premises and Azure-based
environments or resources. Services such as Azure ExpressRoute and VPN connections deliver the connectivity.
These services require specific network address ranges and firewall ports for enabling the services.
When deploying a private cloud, private networks for management, provisioning, and vMotion get created. Use
these private networks to access vCenter and NSX-T Manager and virtual machine vMotion or deployment.
ExpressRoute Global Reach is used to connect private clouds to on-premises environments. The connection
requires a virtual network with an ExpressRoute circuit in your subscription.
Resources, such as web servers and virtual machines, are accessible to the internet through the Azure Virtual
WAN public IP functionality. By default, internet access is disabled for new private clouds. For more information,
see How to use the public IP functionality in Azure VMware Solution.
For more information, see Networking concepts.
Next steps
The next step is to learn key private cloud and cluster concepts.
Planning the Azure VMware Solution deployment
2/11/2021 • 7 minutes to read • Edit Online
This article provides you the planning process to identify and collect data used during the deployment. As you
plan your deployment, make sure to document the information you gather for easy reference during the
deployment.
The processes of this quick start result in a production-ready environment for creating virtual machines (VMs)
and migration.
IMPORTANT
Before you create your Azure VMware Solution resource, follow the How to enable Azure VMware Solution resource
article to submit a support ticket to have your hosts allocated. Once the support team receives your request, it takes up
to five business days to confirm your request and allocate your hosts. If you have an existing Azure VMware Solution
private cloud and want more hosts allocated, you'll go through the same process.
Subscription
Identify the subscription you plan to use to deploy Azure VMware Solution. You can either create a new
subscription or reuse an existing one.
NOTE
The subscription must be associated with a Microsoft Enterprise Agreement or a Cloud Solution Provider Azure plan. For
more information, see How to enable Azure VMware Solution resource.
Resource group
Identify the resource group you want to use for your Azure VMware Solution. Generally, a resource group is
created specifically for Azure VMware Solution, but you can use an existing resource group.
Region
Identify the region you want Azure VMware Solution deployed. For more information, see the Azure Products
Available By Region Guide.
Resource name
Define the resource name you'll use during deployment. The resource name is a friendly and descriptive name
in which you title your Azure VMware Solution private cloud.
IMPORTANT
The name must not exceed 40 characters. If the name exceeds this limit, you won't be able to create public IP addresses
for use with the private cloud.
Size hosts
Identify the size hosts that you want to use when deploying Azure VMware Solution. For a complete list, see the
Azure VMware Solution private clouds and clusters documentation.
Number of hosts
Define the number of hosts that you want to deploy into the Azure VMware Solution private cloud. The
minimum number of hosts is three, and the maximum is 16 per cluster. For more information, see the Azure
VMware Solution private cloud and clusters documentation.
You can always extend the cluster later if you need to go beyond the initial deployment number.
IP address segment
The first step in planning the deployment is to plan out the IP segmentation. Azure VMware Solution ingests a
/22 network that you provide. Then carves it up into smaller segments and then uses those IP segments for
vCenter, VMware HCX, NSX-T, and vMotion.
Azure VMware Solution connects to your Microsoft Azure Virtual Network through an internal ExpressRoute
circuit. In most cases, it connects to your data center through ExpressRoute Global Reach.
Azure VMware Solution, your existing Azure environment, and your on-premises environment all exchange
routes (typically). That being the case, the /22 CIDR network address block you define in this step shouldn't
overlap anything you already have on-premises or Azure.
Example: 10.0.0.0/22
For more information, see the Network planning checklist.
IP address segment for virtual machine workloads
Identify an IP segment to create your first network (NSX segment) in your private cloud. In other words, you
want to create a network segment on Azure VMware Solution so you can deploy VMs onto Azure VMware
Solution.
Even if you only plan on extending L2 networks, create a network segment that will validate the environment.
Remember, any IP segments created must be unique across your Azure and on-premises footprint.
Example: 10.0.4.0/24
(Optional) Extend networks
You can extend network segments from on-premises to Azure VMware Solution, and if you do, identify those
networks now.
Keep in mind that:
If you plan to extend networks from on-premises, those networks must connect to a vSphere Distributed
Switch (vDS) in your on-premises VMware environment.
If the network(s) you wish to extend live on a vSphere Standard Switch, then they can't be extended.
vMotion network : Typically, it's the same network used for vMotion on the vSphere cluster. At a
minimum, identify two IPs on this network segment for VMware HCX. You might need larger numbers,
depending on your deployment.
The vMotion network must be exposed on a distributed virtual switch or vSwitch0. If it's not, modify the
environment.
NOTE
This network can be private (not routed).
Uplink network : You want to create a new network for VMware HCX Uplink and extend it to your
vSphere cluster via a port group. At a minimum, identify two IPs on this network segment for VMware
HCX. You might need larger numbers, depending on your deployment.
NOTE
The method we recommend is creating a /26 network. On a /26 network, you can use up to 10 service meshes
and 60 network extenders (-1 per service mesh). You can stretch eight networks per network extender by using
Azure VMware Solution private clouds.
Replication network : This is optional. You want to create a new network for VMware HCX Replication
and extend that network to your vSphere cluster via a port group. At a minimum, identify two IPs on this
network segment for VMware HCX. You might need larger numbers, depending on your deployment.
NOTE
This configuration is only possible when the on-premises cluster hosts use a dedicated Replication VMkernel
network. If your on-premises cluster does not have a dedicated Replication VMkernel network defined, there is no
need to create this network.
Next steps
Now that you've gathered and documented the needed information continue to the next section to create your
Azure VMware Solution private cloud.
Deploy Azure VMware Solution
Deploy and configure Azure VMware Solution
2/11/2021 • 7 minutes to read • Edit Online
In this article, you'll use the information from the planning section to deploy Azure VMware Solution.
IMPORTANT
If you haven't defined the information yet, go back to the planning section before continuing.
Azure portal
1. Sign in to the Azure portal.
2. On the Azure portal menu, select All ser vices .
3. In the All ser vices box, enter subscription , and then select Subscriptions .
4. Select the subscription from the subscription list to view.
5. Select Resource providers and enter Microsoft.AVS into the search.
6. If the resource provider is not registered, select Register .
NOTE
To deploy Azure VMware Solution, you must be at minimum contributor level in the subscription.
F IEL D VA L UE
Resource group The resource group for your private cloud resources.
F IEL D VA L UE
Resource name The name of your Azure VMware Solution private cloud.
Address block Enter an IP address block for the CIDR network for the
private cloud, for example, 10.175.0.0/22.
Vir tual Network Select a Virtual Network or create a new one for the
Azure VMware Solution private cloud.
4. Once finished, select Review + Create . On the next screen, verify the information entered. If the
information is all correct, select Create .
NOTE
This step takes roughly two hours.
5. Verify that the deployment was successful. Navigate to the resource group you created and select your
private cloud. You'll see the status of Succeeded when the deployment has completed.
NOTE
For an end-to-end overview of this step, view the Azure VMware Solution: Deployment video.
After you deploy Azure VMware Solution, you'll create the virtual network's jump box that connects to vCenter
and NSX. Once you've configured ExpressRoute circuits and ExpressRoute Global Reach, the jump box isn't
needed. But it's handy to reach vCenter and NSX in your Azure VMware Solution.
To create a virtual machine (VM) in the virtual network that you identified or created as part of the deployment
process, follow these instructions:
1. In the resource group, select + Add then search and select Microsoft Windows 10 , and then select
Create .
2. Enter the required information in the fields, and then select Review + create .
For more information on the fields, see the following table.
F IEL D VA L UE
Vir tual machine name Enter a unique name for the VM.
Public inbound por ts Select None . If you select None, you can use JIT access
to control access to the VM only when you want to
access it.
3. Once validation passes, select Create to start the virtual machine creation process.
Connect to a virtual network with ExpressRoute
IMPORTANT
If you've already defined a virtual network in the deployment screen in Azure, then skip to the next section.
If you didn't define a virtual network in the deployment step and your intent is to connect the Azure VMware
Solution's ExpressRoute to an existing ExpressRoute Gateway, follow these steps.
1. Navigate to the private cloud you created in the Deploy vSphere Cluster in Azure tutorial. Select
Connectivity under Manage , select the ExpressRoute tab.
2. Copy the authorization key. If there isn't an authorization key, you need to create one, select + Request
an authorization key .
3. Navigate to the Virtual Network Gateway you created in the previous step and under Settings , select
Connections . On the Connections page, select + Add .
4. On the Add connection page, provide values for the fields, and select OK .
F IEL D VA L UE
Vir tual network gateway The Virtual Network gateway you created previously.
Authorization key Copy and paste the authorization key from the
ExpressRoute tab for your Resource Group.
Peer circuit URI Copy and paste the ExpressRoute ID from the
ExpressRoute tab for your Resource Group.
The connection between your ExpressRoute circuit and your Virtual Network is created.
In this example, the 10.74.72.0/22 network was input during deployment derives the /24 networks. If you see
something similar, you can connect to vCenter in Azure VMware Solution.
IMPORTANT
Make sure the CIDR network address block you defined doesn't overlap with anything in your Azure or on-premises
environments.
Follow the Create an NSX-T network segment in Azure VMware Solution tutorial to create an NSX-T network
segment in Azure VMware Solution.
NOTE
This step is to identify the DNS server, and no configurations are done in this step.
NOTE
If you set up a DHCP server, you get your network configuration for the VM from it (don't forget to set up the scope). If
you are going to configure statically, then configure as you normally would.
Next steps
In the next section, you'll connect Azure VMware Solution to your on-premises network through ExpressRoute.
Connect Azure VMware Solution to your on-premises environment
Connect Azure VMware Solution to your on-
premises environment
2/11/2021 • 2 minutes to read • Edit Online
In this article, you'll continue using the information gathered during planning to connect Azure VMware
Solution to your on-premises environment.
Before you begin, there are two prerequisites for connecting Azure VMware Solution to your on-premises
environment:
An ExpressRoute circuit from your on-premises environment to Azure.
A /29 non-overlapping network address block for the ExpressRoute Global Reach peering, which you defined
as part of the planning phase.
NOTE
You can connect through VPN, but that's out of scope for this quick start document.
IMPORTANT
Everyone has a different environment, and some will need to allow these routes to propagate back into the on-premises
network.
Some environments have firewalls protecting the ExpressRoute circuit. If no firewalls and no route pruning
occur, ping your Azure VMware Solution vCenter server or a VM on the NSX-T segment from your on-premises
environment. Additionally, from the VM on the NSX-T segment, you can reach resources in your on-premises
environment.
Next steps
Continue to the next section to deploy and configure VMware HCX
Deploy and configure VMware HCX
Deploy and configure VMware HCX
2/11/2021 • 12 minutes to read • Edit Online
This article shows you how to deploy and configure the on-premises VMware HCX Connector for your Azure
VMware Solution private cloud. With VMware HCX, you can migrate your VMware workloads to Azure VMware
Solution and other connected sites through various migration types. Because Azure VMware Solution deploys
and configures the HCX Cloud Manager, you must download, activate, and configure the HCX Connector in your
on-premises VMware datacenter.
VMware HCX Advanced Connector is pre-deployed in Azure VMware Solution. It supports up to three site
connections (on-premises to cloud, or cloud to cloud). If you need more than three site connections, submit a
support request to enable the VMware HCX Enterprise add-on. The add-on is currently in preview.
TIP
Although the VMware Configuration Maximum tool describes site pairs maximum to be 25 between the on-premises
Connector and Cloud Manager, the licensing limits this to three for Advanced and 10 for Enterprise Edition.
NOTE
VMware HCX Enterprise is available with Azure VMware Solution as a preview service. It's free and is subject to terms and
conditions for a preview service. After the VMware HCX Enterprise service is generally available, you'll get a 30-day notice
that billing will switch over. You'll also have the option to turn off or opt-out of the service. There is no simple downgrade
path from VMware HCX Enterprise to VMware HCX Advanced. If you decide to downgrade, you'll have to redeploy,
incurring downtime.
First, review Before you begin, Software version requirements, and the Prerequisites.
Then, we'll walk through all the necessary procedures to:
Download the VMware HCX Connector OVA.
Deploy the on-premises VMware HCX OVA (VMware HCX Connector).
Activate the VMware HCX Connector.
Pair your on-premises VMware HCX Connector with your Azure VMware Solution HCX Cloud Manager.
Configure the interconnect (network profile, compute profile, and service mesh).
Complete setup by checking the appliance status and validating that migration is possible.
After you're finished, follow the recommended next steps at the end of this article.
NOTE
The method we recommend is creating a /26 network. On a /26 network, you can use up to 10 service meshes
and 60 network extenders (-1 per service mesh). You can stretch eight networks per network extender by using
Azure VMware Solution private clouds.
vMotion network : Typically, it's the same network used for vMotion on the vSphere cluster. At a
minimum, identify two IPs on this network segment for VMware HCX. You might need larger numbers,
depending on your deployment.
The vMotion network must be exposed on a distributed virtual switch or vSwitch0. If it's not, modify the
environment.
NOTE
This network can be private (not routed).
Uplink network : You want to create a new network for VMware HCX Uplink and extend it to your
vSphere cluster via a port group. At a minimum, identify two IPs on this network segment for VMware
HCX. You might need larger numbers, depending on your deployment.
NOTE
The method we recommend is creating a /26 network. On a /26 network, you can use up to 10 service meshes
and 60 network extenders (-1 per service mesh). You can stretch eight networks per network extender by using
Azure VMware Solution private clouds.
Replication network : This is optional. You want to create a new network for VMware HCX Replication
and extend that network to your vSphere cluster via a port group. At a minimum, identify two IPs on this
network segment for VMware HCX. You might need larger numbers, depending on your deployment.
NOTE
This configuration is only possible when the on-premises cluster hosts use a dedicated Replication VMkernel
network. If your on-premises cluster does not have a dedicated Replication VMkernel network defined, there is no
need to create this network.
3. Select Manage > Identity and select vCenter admin password to identify the password.
TIP
The vCenter password was defined when you set up the private cloud. It's the same password you'll use to sign in
to Azure VMware Solution HCX Manager.
4. Open a browser window, sign in to the Azure VMware Solution HCX Manager on https://x.x.x.9 port
443 with the cloudadmin@vsphere.local user credentials
5. Select Administration > System Updates and then select Request Download Link .
6. Select the option of your choice to download the VMware HCX Connector OVA file.
TIP
You'll select the OVA file that you downloaded in the previous section.
2. Select a name and location, and select a resource or cluster where you're deploying the VMware HCX
Connector. Then review the details and required resources and select Next .
3. Review license terms. If you agree, select the required storage and network, and then select Next .
4. Select storage and select Next .
5. Select the VMware HCX management network segment you previously defined in the IP addresses
prerequisites section. Then, select Next .
6. In Customize template , enter all required information and then select Next .
7. Verify the configuration, and then select Finish to deploy the VMware HCX Connector OVA.
IMPORTANT
You will need to turn on the virtual appliance manually. After powering on, wait 10-15 minutes before proceeding
to the next step.
For an end-to-end overview of this procedure, view the Azure VMware Solution: HCX Appliance Deployment
video.
IMPORTANT
Make sure to include the 9443 port number with the VMware HCX Manager IP address.
3. In Licensing , enter your key for HCX Advanced Key and select Activate .
NOTE
VMware HCX Manager must have open internet access or a proxy configured.
4. In Datacenter Location , provide the nearest location for installing the VMware HCX Manager on-
premises. Then select Continue .
5. In System Name , modify the name or accept the default and select Continue .
6. Select Yes, Continue .
7. In Connect your vCenter , provide the FQDN or IP address of your vCenter server and the appropriate
credentials, and then select Continue .
TIP
The vCenter server is where you deployed the VMware HCX Connector in your datacenter.
8. In Configure SSO/PSC , provide the FQDN or IP address of your Platform Services Controller, and then
select Continue .
NOTE
Typically, it's the same as your vCenter FQDN or IP address.
NOTE
You'll experience a delay after restarting before being prompted for the next step.
After the services restart, you'll see vCenter showing as green on the screen that appears. Both vCenter and SSO
must have the appropriate configuration parameters, which should be the same as the previous screen.
For an end-to-end overview of this procedure, view the Azure VMware Solution: Activate HCX video.
IMPORTANT
Whether you're using VMware HCX Advanced or VMware HCX Enterprise, you may need to install the patch from
VMware's KB article 81558.
NOTE
To successfully establish a site pair:
Your VMware HCX Connector must be able to route to your HCX Cloud Manager IP over port 443.
Use the same password that you used to sign in to vCenter. You defined this password on the initial
deployment screen.
You'll see a screen showing that your VMware HCX Cloud Manager in Azure VMware Solution and your
on-premises VMware HCX Connector are connected (paired).
For an end-to-end overview of this procedure, view the Azure VMware Solution: HCX Site Pairing video.
Create network profiles
VMware HCX Connector deploys a subset of virtual appliances (automated) that require multiple IP segments.
When you create your network profiles, you use the IP segments you identified during the VMware HCX
Network Segments pre-deployment preparation and planning stage.
You'll create four network profiles:
Management
vMotion
Replication
Uplink
1. Under Infrastructure , select Interconnect > Multi-Site Ser vice Mesh > Network Profiles >
Create Network Profile .
2. For each network profile, select the network and port group, provide a name, and create the segment's IP
pool. Then select Create .
For an end-to-end overview of this procedure, view the Azure VMware Solution: HCX Network Profile video.
Create a compute profile
1. Under Infrastructure , select Interconnect > Compute Profiles > Create Compute Profile .
NOTE
Generally, nothing changes here.
4. In Select Ser vice Resources , select one or more service resources (clusters) to enable the selected
VMware HCX services.
5. When you see the clusters in your on-premises datacenter, select Continue .
6. From Select Datastore , select the datastore storage resource for deploying the VMware HCX
Interconnect appliances. Then select Continue .
When multiple resources are selected, VMware HCX uses the first resource selected until its capacity is
exhausted.
7. From Select Management Network Profile , select the management network profile that you created
in previous steps. Then select Continue .
8. From Select Uplink Network Profile , select the uplink network profile you created in the previous
procedure. Then select Continue .
9. From Select vMotion Network Profile , select the vMotion network profile that you created in prior
steps. Then select Continue .
10. From Select vSphere Replication Network Profile , select the replication network profile that you
created in prior steps. Then select Continue .
11. From Select Distributed Switches for Network Extensions , select the switches that contain the
virtual machines to be migrated to Azure VMware Solution on a layer-2 extended network. Then select
Continue .
NOTE
If you are not migrating virtual machines on layer-2 extended networks, you can skip this step.
12. Review the connection rules and select Continue .
For an end-to-end overview of this procedure, view the Azure VMware Solution: Compute Profile video.
Create a service mesh
Now it's time to configure a service mesh between on-premises and Azure VMware Solution SDDC.
NOTE
To successfully establish a service mesh with Azure VMware Solution:
Ports UDP 500/4500 are open between your on-premises VMware HCX Connector 'uplink' network profile
addresses and the Azure VMware Solution HCX Cloud 'uplink' network profile addresses.
Be sure to review the VMware HCX required ports.
1. Under Infrastructure , select Interconnect > Ser vice Mesh > Create Ser vice Mesh .
2. Review the sites that are pre-populated, and then select Continue .
NOTE
If this is your first service mesh configuration, you won't need to modify this screen.
3. Select the source and remote compute profiles from the drop-down lists, and then select Continue .
The selections define the resources where VMs can consume VMware HCX services.
4. Review services that will be enabled, and then select Continue .
5. In Advanced Configuration - Override Uplink Network profiles , select Continue .
Uplink network profiles connect to the network through which the remote site's interconnect appliances
can be reached.
6. In Advanced Configuration - Network Extension Appliance Scale Out , review and select
Continue .
You can have up to eight VLANs per appliance, but you can deploy another appliance to add another
eight VLANs. You must also have IP space to account for the additional appliances, and it's one IP per
appliance. For more information, see VMware HCX Configuration Limits.
7. In Advanced Configuration - Traffic Engineering , review and make any modifications that you feel
are necessary, and then select Continue .
8. Review the topology preview and select Continue .
9. Enter a user-friendly name for this service mesh and select Finish to complete.
10. Select View Tasks to monitor the deployment.
When the service mesh deployment finishes successfully, you'll see the services as green.
11. Verify the service mesh's health by checking the appliance status.
12. Select Interconnect > Appliances .
For an end-to-end overview of this procedure, view the Azure VMware Solution: Service Mesh video.
(Optional) Create a network extension
If you want to extend any networks from your on-premises environment to Azure VMware Solution, follow
these steps:
1. Under Ser vices , select Network Extension > Create a Network Extension .
2. Select each of the networks you want to extend to Azure VMware Solution, and then select Next .
3. Enter the on-premises gateway IP for each of the networks you're extending, and then select Submit .
It takes a few minutes for the network extension to finish. When it does, you see the status change to
Extension complete .
For an end-to-end overview of this procedure, view the Azure VMware Solution: Network Extension video.
Next steps
If the appliance interconnect tunnel status is UP and green, you can migrate and protect Azure VMware Solution
VMs by using VMware HCX. Azure VMware Solution supports workload migrations (with or without a network
extension). You can still migrate workloads in your vSphere environment, along with on-premises creation of
networks and deployment of VMs onto those networks.
For more information on using HCX, go to the VMware technical documentation:
VMware HCX Documentation
Migrating Virtual Machines with VMware HCX
HCX required ports
Networking planning checklist for Azure VMware
Solution
2/11/2021 • 6 minutes to read • Edit Online
Azure VMware Solution offers a VMware private cloud environment accessible for users and applications from
on-premises and Azure-based environments or resources. The connectivity is delivered through networking
services such as Azure ExpressRoute and VPN connections. It requires specific network address ranges and
firewall ports to enable the services. This article provides you with the information you need to configure your
networking to work with Azure VMware Solution properly.
In this tutorial, you'll learn about:
Virtual network and ExpressRoute circuit considerations
Routing and subnet requirements
Required network ports to communicate with the services
DHCP and DNS considerations in Azure VMware Solution
Prerequisite
Ensure that all gateways, including the ExpressRoute provider's service, support 4-byte Autonomous System
Number (ASN). Azure VMware Solution uses 4-byte public ASNs for advertising routes.
NOTE
The ExpressRoute circuit is not part of a private cloud deployment. The on-premises ExpressRoute circuit is beyond the
scope of this document. If you require on-premises connectivity to your private cloud, you can use one of your existing
ExpressRoute circuits or purchase one in the Azure portal.
When deploying a private cloud, you receive IP addresses for vCenter and NSX-T Manager. To access those
management interfaces, you'll need to create more resources in your subscription's virtual network. You can find
the procedures for creating those resources and establishing ExpressRoute private peering in the tutorials.
The private cloud logical networking comes with pre-provisioned NSX-T. A Tier-0 gateway and Tier-1 gateway is
pre-provisioned for you. You can create a segment and attach it to the existing Tier-1 gateway or attach it to a
new Tier-1 gateway that you define. NSX-T logical networking components provide East-West connectivity
between workloads and provide North-South connectivity to the internet and Azure services.
NOTE
Permitted ranges for your address block are the RFC 1918 private address spaces (10.0.0.0/8, 172.16.0.0/12,
192.168.0.0/16), except for 172.17.0.0/16.
The subnets:
WS-Management
(also requires port
443 to be open)
Cloud Gateway (local) Cloud Gateway UDP 4500 Required for IPSEC
(remote) Internet key
exchange (IKEv2) to
encapsulate
workloads for the
bidirectional tunnel.
Network Address
Translation-Traversal
(NAT-T) is also
supported.
Cloud Gateway (local) Cloud Gateway UDP 500 Required for IPSEC
(remote) Internet key
exchange (ISAKMP)
for the bidirectional
tunnel.
Next steps
In this tutorial, you learned about the considerations and requirements for deploying an Azure VMware Solution
private cloud.
Once you have the proper networking in place, continue to the next tutorial to create your Azure VMware
Solution private cloud.
Create an Azure VMware Solution private cloud
Tutorial: Deploy an Azure VMware Solution private
cloud in Azure
2/11/2021 • 4 minutes to read • Edit Online
Azure VMware Solution gives you the ability to deploy a vSphere cluster in Azure. The minimum initial
deployment is three hosts. Additional hosts can be added one at a time, up to a maximum of 16 hosts per
cluster.
Because Azure VMware Solution doesn't allow you to manage your private cloud with your on-premises
vCenter at launch, additional configuration is needed. These procedures and related prerequisites are covered in
this tutorial.
In this tutorial, you'll learn how to:
Create an Azure VMware Solution private cloud
Verify the private cloud deployed
Prerequisites
An Azure account with an active subscription. Create an account for free.
Appropriate administrative rights and permission to create a private cloud.
Ensure you have the appropriate networking configured as described in Tutorial: Network checklist.
Azure portal
1. Sign in to the Azure portal.
2. On the Azure portal menu, select All ser vices .
3. In the All ser vices box, enter subscription , and then select Subscriptions .
4. Select the subscription from the subscription list to view.
5. Select Resource providers and enter Microsoft.AVS into the search.
6. If the resource provider is not registered, select Register .
F IEL D VA L UE
Resource group The resource group for your private cloud resources.
Resource name The name of your Azure VMware Solution private cloud.
Address block Enter an IP address block for the CIDR network for the
private cloud, for example, 10.175.0.0/22.
Vir tual Network Select a Virtual Network or create a new one for the
Azure VMware Solution private cloud.
4. Once finished, select Review + Create . On the next screen, verify the information entered. If the
information is all correct, select Create .
NOTE
This step takes roughly two hours.
5. Verify that the deployment was successful. Navigate to the resource group you created and select your
private cloud. You'll see the status of Succeeded when the deployment has completed.
Azure CLI
Instead of the Azure portal to create an Azure VMware Solution private cloud, you can use the Azure CLI using
the Azure Cloud Shell. For a list of commands you can use with Azure VMware Solution, see Azure VMware
commands.
Open Azure Cloud Shell
Select Tr y it from the upper right corner of a code block. You can also launch Cloud Shell in a separate browser
tab by going to https://shell.azure.com/bash. Select Copy to copy the blocks of code, paste it into the Cloud
Shell, and press Enter to run it.
Create a resource group
Create a resource group with the [az group create](/cli/azure/group) command. An Azure resource group is a
logical container into which Azure resources are deployed and managed. The following example creates a
resource group named myResourceGroup in the eastus location:
-g (Resource Group name) The name of the resource group for your private cloud
resources.
-n (Private Cloud name) The name of your Azure VMware Solution private cloud.
--network-block The CIDR IP address network block to use for your private
cloud. The address block shouldn't overlap with address
blocks used in other virtual networks that are in your
subscription and on-premises networks.
Next steps
In this tutorial, you've learned how to:
Create an Azure VMware Solution private cloud
Verify the private cloud deployed
Delete an Azure VMware Solution private cloud
Continue to the next tutorial to learn how to create a jump box. You use the jump box to connect to your
environment so that you can manage your private cloud locally.
Access an Azure VMware Solution private cloud
Tutorial: Access an Azure VMware Solution private
cloud
11/2/2020 • 2 minutes to read • Edit Online
Azure VMware Solution doesn't allow you to manage your private cloud with your on-premises vCenter. You'll
need to do additional setup and connection to a local vCenter instance through a jump box.
In this tutorial, you'll create a jump box in the resource group you created in the previous tutorial and sign into
vCenter. The jump box is a Windows virtual machine (VM) on the same virtual network you created. It provides
access to vCenter and NSX Manager.
In this tutorial, you learn how to:
Create a Windows virtual machine to use to connect to vCenter
Login to vCenter from your virtual machine
2. Enter the required information in the fields, and then select Review + create .
For more information on the fields, see the following table.
F IEL D VA L UE
Vir tual machine name Enter a unique name for the VM.
F IEL D VA L UE
Public inbound por ts Select None . If you select None, you can use JIT access
to control access to the VM only when you want to
access it.
3. Once validation passes, select Create to start the virtual machine creation process.
Connect to the local vCenter of your private cloud
1. From the jump box, sign in to vSphere Client with VMware vCenter SSO using a cloud admin username
and verity that the user interface displays successfully.
2. In the Azure portal, select your private cloud and then in the Over view view, select Identity > Default .
The URLs and user credentials for private cloud vCenter and NSX-T Manager display.
3. Navigate to the VM you created in the preceding step and connect to the virtual machine.
If you need help with connecting to the VM, see connect to a virtual machine for details.
4. In the Windows VM, open a browser and navigate to the vCenter and NSX-T Manger URLs in two tabs.
5. In the vCenter tab, enter the cloudadmin@vmcp.local user credentials from the previous step.
6. In the second tab of the browser, sign in to NSX-T manager.
Next steps
In this tutorial you learned how to:
Create a Windows virtual machine to use to connect to vCenter
Login to vCenter from your virtual machine
Continue to the next tutorial to learn how to create a virtual network to set up local management for your
private cloud clusters.
Create a Virtual Network
Tutorial: Configure networking for your VMware
private cloud in Azure
11/2/2020 • 4 minutes to read • Edit Online
An Azure VMware Solution private cloud requires an Azure Virtual Network. Because Azure VMware Solution
doesn't support your on-premises vCenter, additional steps for integration with your on-premises environment
are needed. Setting up an ExpressRoute circuit and a virtual network gateway are also required.
In this tutorial, you learn how to:
Create a virtual network
Create a virtual network gateway
Connect your ExpressRoute circuit to the gateway
Locate the URLs for vCenter and NSX Manager
Prerequisites
A virtual network that you created an Azure VMware Solution private cloud.
IMPORTANT
You must use an address space that does not overlap with the address space you used when you created your
private cloud in the preceding tutorial.
8. Select + Add subnet , and on the Add subnet page, give the subnet a name and appropriate address
range. When complete, select Add .
9. Select Review + create .
10. Verify the information and select Create . Once the deployment is complete, you'll see your virtual
network in the resource group.
F IEL D VA L UE
Vir tual network Select the virtual network you created previously. If you
don't see the virtual network, make sure the region of
the gateway matches the region of your virtual network.
Gateway subnet address range This value is populated when you select the virtual
network. Don't change the default value.
F IEL D VA L UE
Vir tual network gateway The Virtual Network gateway you created previously.
Authorization key Copy and paste the authorization key from the
ExpressRoute tab for your Resource Group.
Peer circuit URI Copy and paste the ExpressRoute ID from the
ExpressRoute tab for your Resource Group.
The connection between your ExpressRoute circuit and your Virtual Network is created.
Next steps
In this tutorial you learned how to:
Create a virtual network
Create a virtual network gateway
Connect your ExpressRoute circuit to the gateway
Locate the URLs for vCenter and NSX Manager
Continue to the next tutorial to learn how to create the NSX-T network segments that are used for VMs in
vCenter.
Create an NSX-T network segment
Tutorial: Add a network segment in Azure VMware
Solution
2/11/2021 • 2 minutes to read • Edit Online
The virtual machines (VMs) created in vCenter are placed onto the network segments created in NSX-T and are
visible in vCenter.
In this tutorial, you learn how to:
Navigate in NSX-T Manager to add network segments
Add a new network segment
Observe the new network segment in vCenter
Prerequisites
An Azure VMware Solution private cloud with access to the vCenter and NSX-T Manager interfaces. For more
information, see the Configure networking tutorial.
IMPORTANT
The IP address needs to be on a non-overlapping RFC1918 address block, which ensures connection to the VMs
on the new segment.
ExpressRoute Global Reach connects your on-premises environment to your Azure VMware Solution private
cloud. The ExpressRoute Global Reach connection is established between the private cloud ExpressRoute circuit
and an existing ExpressRoute connection to your on-premises environments.
The ExpressRoute circuit you use when you configure Azure-to-private cloud networking requires you to create
and use authorization keys. You'll have already used one authorization key from the ExpressRoute circuit, and in
this tutorial, you'll create a second one to peer with your on-premises ExpressRoute circuit.
In this tutorial, you learn how to:
Create a second authorization key for circuit 2, the private cloud ExpressRoute circuit
Use either the Azure portal or the Azure CLI in a Cloud Shell method in the subscription of circuit 1 to enable
on-premises-to-private cloud ExpressRoute Global Reach peering
Prerequisites
Established connectivity to and from an Azure VMware Solution private cloud with its ExpressRoute circuit
peered with an ExpressRoute gateway in an Azure virtual network (VNet) – which is circuit 2 from peering
procedures.
A separate, functioning ExpressRoute circuit used to connect on-premises environments to Azure – which is
circuit 1 from the peering procedures' perspective.
A /29 non-overlapping network address block for the ExpressRoute Global Reach peering.
Ensure that all gateways, including the ExpressRoute provider's service, support 4-byte Autonomous System
Number (ASN). Azure VMware Solution uses 4-byte public ASNs for advertising routes.
TIP
In the context of these prerequisites, your on-premises ExpressRoute circuit is circuit 1, and your private cloud
ExpressRoute circuit is in a different subscription and labeled circuit 2.
Once created, the new key appears in the list of authorization keys for the private cloud.
3. Make a note of the authorization key and the ExpressRoute ID, along with the /29 address block. You'll use
them in the next step to complete the peering.
3. You can create an on-premises cloud connection by doing one of these choices:
Select the ExpressRoute circuit from the list.
If you have a circuit ID, copy and paste it.
4. Select Connect . The new connection shows in the On-premises cloud connections list.
TIP
You can delete or disconnect a connection from the list by selecting More .
Azure CLI in a Cloud Shell method
We've augmented the CLI commands with specific details and examples to help you configure the ExpressRoute
Global Reach peering between on-premises environments to an Azure VMware Solution private cloud.
TIP
For brevity in the Azure CLI command output, these instructions may use a –query argument to execute a JMESPath
query to only show the required results.
1. Sign in to the Azure portal using the same subscription as the on-premises ExpressRoute circuit and open
a Cloud Shell. Leave the shell as Bash.
2. Enter the Azure CLI command to create the peering. Use your specific information and resource ID,
authorization key, and /29 CIDR network block.
The image shows an example of the command that you'll use and the output indicating a successful
peering. The example command is based on the command used in step 3 of “Enable connectivity between
ExpressRoute circuits in different Azure subscriptions".
You can connect from on-premises environments to your private cloud over the ExpressRoute Global
Reach peering.
TIP
You can delete the peering you just created by following the Disable connectivity between your on-premises networks
instructions.
Next steps
In this tutorial, you learned how to create a second authorization key for the private cloud ExpressRoute circuit.
You also learned how to enable the on-premises-to-private cloud ExpressRoute Global Reach peering.
Continue to the next tutorial to learn how to deploy and configure VMware HCX solution for your Azure
VMware Solution private cloud.
Deploy and configure VMware HCX
Deploy and configure VMware HCX
2/11/2021 • 12 minutes to read • Edit Online
This article shows you how to deploy and configure the on-premises VMware HCX Connector for your Azure
VMware Solution private cloud. With VMware HCX, you can migrate your VMware workloads to Azure VMware
Solution and other connected sites through various migration types. Because Azure VMware Solution deploys
and configures the HCX Cloud Manager, you must download, activate, and configure the HCX Connector in your
on-premises VMware datacenter.
VMware HCX Advanced Connector is pre-deployed in Azure VMware Solution. It supports up to three site
connections (on-premises to cloud, or cloud to cloud). If you need more than three site connections, submit a
support request to enable the VMware HCX Enterprise add-on. The add-on is currently in preview.
TIP
Although the VMware Configuration Maximum tool describes site pairs maximum to be 25 between the on-premises
Connector and Cloud Manager, the licensing limits this to three for Advanced and 10 for Enterprise Edition.
NOTE
VMware HCX Enterprise is available with Azure VMware Solution as a preview service. It's free and is subject to terms and
conditions for a preview service. After the VMware HCX Enterprise service is generally available, you'll get a 30-day notice
that billing will switch over. You'll also have the option to turn off or opt-out of the service. There is no simple downgrade
path from VMware HCX Enterprise to VMware HCX Advanced. If you decide to downgrade, you'll have to redeploy,
incurring downtime.
First, review Before you begin, Software version requirements, and the Prerequisites.
Then, we'll walk through all the necessary procedures to:
Download the VMware HCX Connector OVA.
Deploy the on-premises VMware HCX OVA (VMware HCX Connector).
Activate the VMware HCX Connector.
Pair your on-premises VMware HCX Connector with your Azure VMware Solution HCX Cloud Manager.
Configure the interconnect (network profile, compute profile, and service mesh).
Complete setup by checking the appliance status and validating that migration is possible.
After you're finished, follow the recommended next steps at the end of this article.
Prerequisites
Prerequisites
If you plan to use VMware HCX Enterprise, make sure you've requested activation through the Azure VMware
Solution support channels.
On-premises vSphere environment
Make sure that your on-premises vSphere environment (source environment) meets the minimum
requirements.
Network and ports
Azure ExpressRoute Global Reach is configured between on-premises and Azure VMware Solution SDDC
ExpressRoute circuits.
All required ports are open for communication between on-premises components and Azure VMware
Solution SDDC.
IP addresses
Four networks are needed for VMware HCX:
Management network : Typically, it's the same management network used on the vSphere cluster. At a
minimum, identify two IPs on this network segment for VMware HCX. You might need larger numbers,
depending on your deployment.
NOTE
The method we recommend is creating a /26 network. On a /26 network, you can use up to 10 service meshes
and 60 network extenders (-1 per service mesh). You can stretch eight networks per network extender by using
Azure VMware Solution private clouds.
vMotion network : Typically, it's the same network used for vMotion on the vSphere cluster. At a
minimum, identify two IPs on this network segment for VMware HCX. You might need larger numbers,
depending on your deployment.
The vMotion network must be exposed on a distributed virtual switch or vSwitch0. If it's not, modify the
environment.
NOTE
This network can be private (not routed).
Uplink network : You want to create a new network for VMware HCX Uplink and extend it to your
vSphere cluster via a port group. At a minimum, identify two IPs on this network segment for VMware
HCX. You might need larger numbers, depending on your deployment.
NOTE
The method we recommend is creating a /26 network. On a /26 network, you can use up to 10 service meshes
and 60 network extenders (-1 per service mesh). You can stretch eight networks per network extender by using
Azure VMware Solution private clouds.
Replication network : This is optional. You want to create a new network for VMware HCX Replication
and extend that network to your vSphere cluster via a port group. At a minimum, identify two IPs on this
network segment for VMware HCX. You might need larger numbers, depending on your deployment.
NOTE
This configuration is only possible when the on-premises cluster hosts use a dedicated Replication VMkernel
network. If your on-premises cluster does not have a dedicated Replication VMkernel network defined, there is no
need to create this network.
3. Select Manage > Identity and select vCenter admin password to identify the password.
TIP
The vCenter password was defined when you set up the private cloud. It's the same password you'll use to sign in
to Azure VMware Solution HCX Manager.
4. Open a browser window, sign in to the Azure VMware Solution HCX Manager on https://x.x.x.9 port
443 with the cloudadmin@vsphere.local user credentials
5. Select Administration > System Updates and then select Request Download Link .
6. Select the option of your choice to download the VMware HCX Connector OVA file.
TIP
You'll select the OVA file that you downloaded in the previous section.
2. Select a name and location, and select a resource or cluster where you're deploying the VMware HCX
Connector. Then review the details and required resources and select Next .
3. Review license terms. If you agree, select the required storage and network, and then select Next .
4. Select storage and select Next .
5. Select the VMware HCX management network segment you previously defined in the IP addresses
prerequisites section. Then, select Next .
6. In Customize template , enter all required information and then select Next .
7. Verify the configuration, and then select Finish to deploy the VMware HCX Connector OVA.
IMPORTANT
You will need to turn on the virtual appliance manually. After powering on, wait 10-15 minutes before proceeding
to the next step.
For an end-to-end overview of this procedure, view the Azure VMware Solution: HCX Appliance Deployment
video.
IMPORTANT
Make sure to include the 9443 port number with the VMware HCX Manager IP address.
3. In Licensing , enter your key for HCX Advanced Key and select Activate .
NOTE
VMware HCX Manager must have open internet access or a proxy configured.
4. In Datacenter Location , provide the nearest location for installing the VMware HCX Manager on-
premises. Then select Continue .
5. In System Name , modify the name or accept the default and select Continue .
6. Select Yes, Continue .
7. In Connect your vCenter , provide the FQDN or IP address of your vCenter server and the appropriate
credentials, and then select Continue .
TIP
The vCenter server is where you deployed the VMware HCX Connector in your datacenter.
8. In Configure SSO/PSC , provide the FQDN or IP address of your Platform Services Controller, and then
select Continue .
NOTE
Typically, it's the same as your vCenter FQDN or IP address.
NOTE
You'll experience a delay after restarting before being prompted for the next step.
After the services restart, you'll see vCenter showing as green on the screen that appears. Both vCenter and SSO
must have the appropriate configuration parameters, which should be the same as the previous screen.
For an end-to-end overview of this procedure, view the Azure VMware Solution: Activate HCX video.
IMPORTANT
Whether you're using VMware HCX Advanced or VMware HCX Enterprise, you may need to install the patch from
VMware's KB article 81558.
NOTE
To successfully establish a site pair:
Your VMware HCX Connector must be able to route to your HCX Cloud Manager IP over port 443.
Use the same password that you used to sign in to vCenter. You defined this password on the initial
deployment screen.
You'll see a screen showing that your VMware HCX Cloud Manager in Azure VMware Solution and your
on-premises VMware HCX Connector are connected (paired).
For an end-to-end overview of this procedure, view the Azure VMware Solution: HCX Site Pairing video.
Create network profiles
VMware HCX Connector deploys a subset of virtual appliances (automated) that require multiple IP segments.
When you create your network profiles, you use the IP segments you identified during the VMware HCX
Network Segments pre-deployment preparation and planning stage.
You'll create four network profiles:
Management
vMotion
Replication
Uplink
1. Under Infrastructure , select Interconnect > Multi-Site Ser vice Mesh > Network Profiles >
Create Network Profile .
2. For each network profile, select the network and port group, provide a name, and create the segment's IP
pool. Then select Create .
For an end-to-end overview of this procedure, view the Azure VMware Solution: HCX Network Profile video.
Create a compute profile
1. Under Infrastructure , select Interconnect > Compute Profiles > Create Compute Profile .
NOTE
Generally, nothing changes here.
4. In Select Ser vice Resources , select one or more service resources (clusters) to enable the selected
VMware HCX services.
5. When you see the clusters in your on-premises datacenter, select Continue .
6. From Select Datastore , select the datastore storage resource for deploying the VMware HCX
Interconnect appliances. Then select Continue .
When multiple resources are selected, VMware HCX uses the first resource selected until its capacity is
exhausted.
7. From Select Management Network Profile , select the management network profile that you created
in previous steps. Then select Continue .
8. From Select Uplink Network Profile , select the uplink network profile you created in the previous
procedure. Then select Continue .
9. From Select vMotion Network Profile , select the vMotion network profile that you created in prior
steps. Then select Continue .
10. From Select vSphere Replication Network Profile , select the replication network profile that you
created in prior steps. Then select Continue .
11. From Select Distributed Switches for Network Extensions , select the switches that contain the
virtual machines to be migrated to Azure VMware Solution on a layer-2 extended network. Then select
Continue .
NOTE
If you are not migrating virtual machines on layer-2 extended networks, you can skip this step.
12. Review the connection rules and select Continue .
For an end-to-end overview of this procedure, view the Azure VMware Solution: Compute Profile video.
Create a service mesh
Now it's time to configure a service mesh between on-premises and Azure VMware Solution SDDC.
NOTE
To successfully establish a service mesh with Azure VMware Solution:
Ports UDP 500/4500 are open between your on-premises VMware HCX Connector 'uplink' network profile
addresses and the Azure VMware Solution HCX Cloud 'uplink' network profile addresses.
Be sure to review the VMware HCX required ports.
1. Under Infrastructure , select Interconnect > Ser vice Mesh > Create Ser vice Mesh .
2. Review the sites that are pre-populated, and then select Continue .
NOTE
If this is your first service mesh configuration, you won't need to modify this screen.
3. Select the source and remote compute profiles from the drop-down lists, and then select Continue .
The selections define the resources where VMs can consume VMware HCX services.
4. Review services that will be enabled, and then select Continue .
5. In Advanced Configuration - Override Uplink Network profiles , select Continue .
Uplink network profiles connect to the network through which the remote site's interconnect appliances
can be reached.
6. In Advanced Configuration - Network Extension Appliance Scale Out , review and select
Continue .
You can have up to eight VLANs per appliance, but you can deploy another appliance to add another
eight VLANs. You must also have IP space to account for the additional appliances, and it's one IP per
appliance. For more information, see VMware HCX Configuration Limits.
7. In Advanced Configuration - Traffic Engineering , review and make any modifications that you feel
are necessary, and then select Continue .
8. Review the topology preview and select Continue .
9. Enter a user-friendly name for this service mesh and select Finish to complete.
10. Select View Tasks to monitor the deployment.
When the service mesh deployment finishes successfully, you'll see the services as green.
11. Verify the service mesh's health by checking the appliance status.
12. Select Interconnect > Appliances .
For an end-to-end overview of this procedure, view the Azure VMware Solution: Service Mesh video.
(Optional) Create a network extension
If you want to extend any networks from your on-premises environment to Azure VMware Solution, follow
these steps:
1. Under Ser vices , select Network Extension > Create a Network Extension .
2. Select each of the networks you want to extend to Azure VMware Solution, and then select Next .
3. Enter the on-premises gateway IP for each of the networks you're extending, and then select Submit .
It takes a few minutes for the network extension to finish. When it does, you see the status change to
Extension complete .
For an end-to-end overview of this procedure, view the Azure VMware Solution: Network Extension video.
Next steps
If the appliance interconnect tunnel status is UP and green, you can migrate and protect Azure VMware Solution
VMs by using VMware HCX. Azure VMware Solution supports workload migrations (with or without a network
extension). You can still migrate workloads in your vSphere environment, along with on-premises creation of
networks and deployment of VMs onto those networks.
For more information on using HCX, go to the VMware technical documentation:
VMware HCX Documentation
Migrating Virtual Machines with VMware HCX
HCX required ports
Tutorial: Scale an Azure VMware Solution private
cloud
11/2/2020 • 2 minutes to read • Edit Online
To get the most out of your Azure VMware Solution private cloud experience, scale the clusters and hosts to
reflect what you need for planned workloads. You can scale the clusters and hosts in a private cloud as required
for your application workload. Performance and availability limitations for specific services should be addressed
on a case by case basis. The cluster and host limits are provided in the private cloud concept article.
In this tutorial, you'll use the Azure portal to:
Add a cluster to an existing private cloud
Add hosts to an existing cluster
Prerequisites
A private cloud to complete this tutorial. If you haven't created a private cloud, use the create a private cloud
tutorial to create one. Configure networking for your VMware private cloud in Azure to set up the required
virtual network.
2. In the Add cluster page, use the slider to select the number of hosts. Select Save .
The deployment of the new cluster will begin.
Scale a cluster
1. On the overview page of an existing private cloud, select Scale private cloud and select the pencil icon
to edit the cluster.
2. In the Edit Cluster page, use the slider to select the number of hosts. Select Save .
If you have an Azure VMware Solution private cloud that you no longer need, you can delete it. The private cloud
includes an isolated network domain, one or more provisioned vSphere clusters on dedicated server hosts, and
several virtual machines (VMs). When you delete a private cloud, all of the VMs, their data, and clusters are
deleted. The dedicated hosts are securely wiped and returned to the free pool. The network domain provisioned
for the customer is also deleted.
Cau t i on
Deleting the private cloud is an irreversible operation. Once the private cloud is deleted, the data cannot be
recovered, as it terminates all running workloads and components and destroys all private cloud data and
configuration settings, including public IP addresses.
Prerequisites
If you require the VMs and their data later, make sure to back up the data before you delete the private cloud.
There's no way to recover the VMs and their data.
NOTE
The deletion process takes a few hours to complete.
Azure VMware Solution private cloud and cluster
concepts
2/11/2021 • 3 minutes to read • Edit Online
The Azure VMware Solution delivers VMware-based private clouds in Azure. Private clouds contain clusters built
with dedicated, bare-metal Azure hosts. They're deployed and managed through the Azure portal, CLI, or
PowerShell. Clusters provisioned in private clouds include VMware vSphere, vCenter, vSAN, and NSX software.
Azure VMware Solution private cloud hardware and software deployments are fully integrated and automated
in Azure.
There's a logical relationship between Azure subscriptions, Azure VMware Solution private clouds, vSAN
clusters, and hosts. The diagram shows a single Azure subscription with two private clouds that represent the
development and production environment. In each of those private clouds are two clusters.
This article describes all of these concepts.
NOTE
Because of the lower potential needs of a development environment, use smaller clusters with lower capacity hosts.
Private clouds
Private clouds contain vSAN clusters built with dedicated, bare-metal Azure hosts. Each private cloud can have
multiple clusters managed by the same vCenter server and NSX-T manager. You can deploy and manage private
clouds in the portal, CLI, or PowerShell.
As with other resources, private clouds are installed and managed from within an Azure subscription. The
number of private clouds within a subscription is scalable. Initially, there's a limit of one private cloud per
subscription.
Clusters
For each private cloud created, there's one vSAN cluster by default. You can add, delete, and scale clusters using
the Azure portal or through the API. All clusters have a default size of three hosts and can scale up to 16 hosts.
The hosts used in a cluster must be the same host type.
Trial clusters are available for evaluation and limited to three hosts. There's a single trial cluster per private cloud.
You can scale a trial cluster by a single host during the evaluation period.
You use vSphere and NSX-T Manager to manage most other aspects of cluster configuration or operation. All
local storage of each host in a cluster is under the control of vSAN.
Hosts
Azure VMware Solution private cloud clusters use hyper-converged, bare-metal infrastructure hosts. The
following table shows the RAM, CPU, and disk capacities of the host.
Hosts used to build or scale clusters come from an isolated pool of hosts. Those hosts have passed hardware
tests and have had all data securely deleted.
SO F T WA RE VERSIO N
ESXi 6.7 U3
vSAN 6.7 U3
NSX-T 2.5
NOTE
NSX-T is the only supported version of NSX.
For any new cluster in a private cloud, the software version matches what's currently running. For any new
private cloud in a subscription, the software stack's latest version gets installed. For more information, see the
VMware software version requirements.
The private cloud software bundle upgrades keep the software within one version of the most recent software
bundle release from VMware. The private cloud software versions may differ from the most recent versions of
the individual software components (ESXi, NSX-T, vCenter, vSAN). You can find the general upgrade policies and
processes for the Azure VMware Solution platform software described in Private cloud updates and upgrades.
IMPORTANT
Do not modify the configuration of NSX-T Edge or Tier-0 Gateway, as this may result in a loss of service.
Next steps
Now that you've covered Azure VMware Solution private cloud concepts, you may want to learn about:
Azure VMware Solution networking and interconnectivity concepts.
Azure VMware Solution storage concepts.
How to enable Azure VMware Solution resource.
Azure VMware Solution networking and
interconnectivity concepts
2/11/2021 • 3 minutes to read • Edit Online
Azure VMware Solution offers a private cloud environment accessible from on-premises and Azure-based
environments or resources. Services such as Azure ExpressRoute and VPN connections deliver the connectivity.
These services require specific network address ranges and firewall ports for enabling the services.
When deploying a private cloud, private networks for management, provisioning, and vMotion get created. Use
these private networks to access vCenter and NSX-T Manager and virtual machine vMotion or deployment.
ExpressRoute Global Reach is used to connect private clouds to on-premises environments. The connection
requires a virtual network with an ExpressRoute circuit in your subscription.
Resources, such as web servers and virtual machines, are accessible to the internet through the Azure Virtual
WAN public IP functionality. By default, internet access is disabled for new private clouds. For more information,
see How to use the public IP functionality in Azure VMware Solution.
A useful perspective on interconnectivity is to consider the two types of Azure VMware Solution private cloud
implementations:
1. Basic Azure-only interconnectivity lets you manage and use your private cloud with only a single
virtual network in Azure. This implementation is best suited for Azure VMware Solution evaluations or
implementations that don't require access from on-premises environments.
2. Full on-premises to private cloud interconnectivity extends the basic Azure-only implementation
to include interconnectivity between on-premises and Azure VMware Solution private clouds.
In this article, we'll cover a few key concepts that establish networking and interconnectivity, including
requirements and limitations. We’ll also cover more information the two types of Azure VMware Solution
private cloud interconnectivity implementations. This article provides you with the information you need to
know to configure your networking to work with Azure VMware Solution properly.
TIP
All use cases for the Azure VMware Solution service are enabled with on-premises to private cloud connectivity.
On-premises interconnectivity
In the virtual network and on-premises to full private cloud implementation, you can access your Azure VMware
Solution private clouds from on-premises environments. This implementation is an extension of the basic
implementation described in the previous section. Like the basic implementation, an ExpressRoute circuit is
required, but with this implementation, it’s used to connect from on-premises environments to your private
cloud in Azure.
The diagram below shows the on-premises to private cloud interconnectivity, which enables the following use
cases:
Hot/Cold Cross-vCenter vMotion
On-Premises to Azure VMware Solution private cloud management access
For full interconnectivity to your private cloud, enable ExpressRoute Global Reach and then request an
authorization key and private peering ID for Global Reach in the Azure portal. The authorization key and peering
ID are used to establish Global Reach between an ExpressRoute circuit in your subscription and the ExpressRoute
circuit for your new private cloud. Once linked, the two ExpressRoute circuits route network traffic between your
on-premises environments to your private cloud. For more information on the procedures to request and use
the authorization key and peering ID, see the tutorial for creating an ExpressRoute Global Reach peering to a
private cloud.
Next steps
Now that you've covered Azure VMware Solution network and interconnectivity concepts, you may want to
learn about:
Azure VMware Solution storage concepts.
Azure VMware Solution identity concepts.
How to enable Azure VMware Solution resource.
Azure VMware Solution storage concepts
2/11/2021 • 2 minutes to read • Edit Online
Azure VMware Solution private clouds provide native, cluster-wide storage with VMware vSAN. All local storage
from each host in a cluster is used in a vSAN datastore, and data-at-rest encryption is available and enabled by
default. You can use Azure Storage resources to extend storage capabilities of your private clouds.
vSAN clusters
Local storage in each cluster host is used as part of a vSAN datastore. All diskgroups use an NVMe cache tier of
1.6 TB with the raw, per host, SSD-based capacity of 15.4 TB. The size of the raw capacity tier of a cluster is the
per host capacity times the number of hosts. For example, a four host cluster will provide 61.6-TB raw capacity
in the vSAN capacity tier.
Local storage in cluster hosts is used in cluster-wide vSAN datastore. All datastores are created as part of a
private cloud deployment and are available for use immediately. The cloudadmin user and all users in the
CloudAdmin group can manage datastores with these vSAN privileges:
Datastore.AllocateSpace
Datastore.Browse
Datastore.Config
Datastore.DeleteFile
Datastore.FileManagement
Datastore.UpdateVirtualMachineMetadata
Data-at-rest encryption
vSAN datastores use data-at-rest encryption by default. The encryption solution is KMS-based and supports
vCenter operations for key management. Keys are stored encrypted, wrapped by an Azure Key Vault master key.
When a host is removed from a cluster for any reason, data on SSDs is invalidated immediately.
Scaling
Native cluster storage capacity is scaled by adding hosts to a cluster. For clusters that use HE hosts, the raw
cluster-wide capacity is increased by 15.4 TB with each added host. Clusters that are built with GP hosts have
their raw capacity increased by 7.7 TB with each added host. In both types of clusters, hosts take about 10
minutes to be added to a cluster. For instructions on scaling clusters, see the scale private cloud tutorial.
Next steps
Now that you've covered Azure VMware Solution storage concepts, you may want to learn about:
Private cloud identity concepts.
vSphere role-based access control for Azure VMware Solution.
How to enable Azure VMware Solution resource.
Azure VMware Solution identity concepts
2/11/2021 • 2 minutes to read • Edit Online
Azure VMware Solution private clouds are provisioned with a vCenter server and NSX-T Manager. You use
vCenter to manage virtual machine (VM) workloads. You use the NSX-T manager to extend the private cloud.
Access and identity management use CloudAdmin group privileges for vCenter and restricted administrator
rights for NSX-T Manager. It ensures that your private cloud platform upgrades automatically with the newest
features and patches. For more information, see private cloud upgrades concepts article.
Content Library A CloudAdmin user has Enabled with SSO. Microsoft will distribute files
privileges to create and use in the Content Library to
files in a Content Library. ESXi hosts.
Datastore Datastore.AllocateSpace, -- --
Datastore.Browse,
Datastore.Config,
Datastore.DeleteFile,
Datastore.FileManagement,
Datastore.UpdateVirtualMa
chineMetadata
Global Global.CancelTask,
Global.GlobalTag,
Global.Health,
Global.LogEvent,
Global.ManageCustomField
s, Global.ServiceManagers,
Global.SetCustomField,
Global.SystemTag
InventoryService InventoryService.Tagging -- --
Next steps
Now that you've covered Azure VMware Solution access and identity concepts, you may want to learn about:
Private cloud upgrade concepts.
vSphere role-based access control for Azure VMware Solution.
How to enable Azure VMware Solution resource.
vSphere role-based access control (vSphere RBAC)
for Azure VMware Solution
2/11/2021 • 4 minutes to read • Edit Online
In Azure VMware Solution, vCenter has a built-in local user called cloudadmin and assigned to the built-in
CloudAdmin role. The local cloudadmin user is used to set up users in AD. In general, the CloudAdmin role
creates and manages workloads in your private cloud. In Azure VMware Solution, the CloudAdmin role has
vCenter privileges that differ from other VMware cloud solutions.
NOTE
Azure VMware Solution currently doesn't offer custom roles on vCenter or the Azure VMware Solution portal.
In a vCenter and ESXi on-premises deployment, the administrator has access to the vCenter
administrator@vsphere.local account. They can also have additional Active Directory (AD) users/groups
assigned.
In an Azure VMware Solution deployment, the administrator doesn't have access to the administrator user
account. But they can assign AD users and groups to the CloudAdmin role on vCenter.
The private cloud user doesn't have access to and can't configure specific management components supported
and managed by Microsoft. For example, clusters, hosts, datastores, and distributed virtual switches.
Sessions Message
Validate session
Next steps
Now that you've covered the basics of vSphere role-based access control for Azure VMware Solution, you may
want to learn about:
The details of each privilege in the VMware product documentation.
How Azure VMware Solution monitors and repairs private clouds.
How to enable Azure VMware Solution resource.
Monitor and repair Azure VMware Solution private
clouds
2/11/2021 • 2 minutes to read • Edit Online
Azure VMware Solution continuously monitors the VMware ESXi servers on an Azure VMware Solution private
cloud.
NOTE
Azure VMware Solution tenant admins must not edit or delete the above defined VMware vCenter alarms, as these are
managed by the Azure VMware Solution control plane on vCenter. These alarms are used by Azure VMware Solution
monitoring to trigger the Azure VMware Solution host remediation process.
Next steps
Now that you've covered how Azure VMware Solution monitors and repairs private clouds, you may want to
learn about:
Azure VMware Solution private cloud upgrades.
How to enable Azure VMware Solution resource.
Azure VMware Solution private cloud updates and
upgrades
2/11/2021 • 2 minutes to read • Edit Online
One of the key benefits of Azure VMware Solution private clouds is that the platform is maintained for you.
Platform maintenance includes automated updates to a VMware validated software bundle, helping to ensure
you're using the latest version of the validated Azure VMware Solution private cloud software.
Specifically, an Azure VMware Solution private cloud includes:
Dedicated bare-metal server nodes provisioned with VMware ESXi hypervisor
vCenter server for managing ESXi and vSAN
VMware NSX-T software defined networking for vSphere workload VMs
VMware vSAN datastore for vSphere workload VMs
VMware HCX for workload mobility
In addition to these components, an Azure VMware Solution private cloud includes resources in the Azure
underlay required for connectivity and to operate the private cloud. Azure VMware Solution continuously
monitors the health of both the underlay and the VMware components. When Azure VMware Solution detects a
failure, it takes action to repair the failed components.
Types of updates
Azure VMware Solution applies the following types of updates to VMware components:
Patches: Security patches and bug fixes released by VMware.
Updates: Minor version updates of one or more VMware components.
Upgrades: Major version updates of one or more VMware components.
You will be notified before and after patches are applied to your private clouds. We will also work with you to
schedule a maintenance window before applying updates or upgrades to your private cloud.
Next steps
Now that you've covered the key upgrade processes and features in Azure VMware Solution, you may want to
learn about:
How to create a private cloud.
How to enable Azure VMware Solution resource.
How to enable Azure VMware Solution resource
2/11/2021 • 4 minutes to read • Edit Online
Learn how to submit a support request to enable your Azure VMware Solution resource. You can also request
more hosts in your existing Azure VMware Solution private cloud.
Eligibility criteria
You'll need an Azure account in an Azure subscription. The Azure subscription must comply with one of the
following criteria:
A subscription under an Azure Enterprise Agreement (EA) with Microsoft.
A Cloud Solution Provider (CSP) managed subscription under an existing CSP Azure offers contract or an
Azure plan.
NOTE
Azure VMware Solution recommends a minimum of three hosts to spin up your private cloud and for redundancy
N+1 hosts.
4. Before you can provision your hosts, make sure that you register the Microsoft.AVS resource provider
in the Azure portal.
For additional ways to register the resource provider, see Azure resource providers and types.
IMPORTANT
Azure VMware Solution service does not provide a multi-tenancy required. Hosting partners requiring it are not
supported.
NOTE
Azure VMware Solution recommends a minimum of three hosts to spin up your private cloud and for redundancy
N+1 hosts.
IMPORTANT
If you already have an existing Azure VMware Solution, and you are requesting additional hosts, please note that
we need five business days to allocate the hosts.
7. If the subscription is managed by the service provider then their administration team must access Azure
portal using again Admin On Behalf Of (AOBO) procedure from Partner Center. One in Azure portal
launch a Cloud Shell instance and register the Microsoft.AVS resource provider and proceed with the
deployment of the Azure VMware Solution private cloud.
For additional ways to register the resource provider, see Azure resource providers and types.
8. If the subscription is managed directly by the customer the registration of the Microsoft.AVS resource
provider must be done by an user with enough permissions in the subscription, see Azure resource
providers and types for more details and ways to register the resource provider.
Next steps
After you enable your Azure VMware Solution resource, and you have the proper networking in place, you can
create a private cloud.
Save costs with Azure VMware Solution
2/11/2021 • 5 minutes to read • Edit Online
When you commit to a reserved instance of Azure VMware Solution, you save money. The reservation discount
is applied automatically to the running Azure VMware Solution hosts that match the reservation scope and
attributes. A reserved instance purchase covers only the compute part of your usage and includes software
licensing costs.
Buy a reservation
You can buy a reserved instance of an Azure VMware Solution host instance in the Azure portal.
You can pay for the reservation up front or with monthly payments.
These requirements apply to buying a reserved dedicated host instance:
You must be in an Owner role for at least one EA subscription or a subscription with a pay-as-you-go
rate.
For EA subscriptions, you must enable the Add Reser ved Instances option in the EA portal. If disabled,
you must be an EA Admin for the subscription to enable it.
For subscription under a Cloud Solution Provider (CSP) Azure Plan, the partner must purchase the
reserved instances in the Azure portal for the customer.
Buy reserved instances for an EA subscription
1. Sign in to the Azure portal.
2. Select All ser vices > Reser vations .
3. Select Purchase Now and then select Azure VMware Solution .
4. Enter the required fields. The selected attributes that match running Azure VMware Solution hosts qualify
for the reservation discount. Attributes include the SKU, regions (where applicable), and scope.
Reservation scope selects where the reservation savings apply.
If you have an EA agreement, you can use the Add more option to add instances quickly. The option
isn't available for other subscription types.
F IEL D DESC RIP T IO N
6. Enter the required fields. The selected attributes that match running Azure VMware Solution hosts qualify
for the reservation discount. Attributes include the SKU, regions (where applicable), and scope.
Reservation scope selects where the reservation savings apply.
To learn more on how to view the purchased reservations for your customer, see View Azure reservations as a
Cloud Solution Provider (CSP) article.
Next steps
Now that you've covered buying a reserved instance of Azure VMware Solution, you may want to learn about:
Creating an Azure VMware Solution assessment.
Managing DHCP for Azure VMware Solution.
Lifecycle management of Azure VMware Solution VMs.
Create an Azure VMware Solution (AVS) assessment
2/11/2021 • 6 minutes to read • Edit Online
This article describes how to create an Azure VMware Solution (AVS) assessment for on-premises VMware VMs
with Azure Migrate: Server Assessment.
Azure Migrate helps you to migrate to Azure. Azure Migrate provides a centralized hub to track discovery,
assessment, and migration of on-premises infrastructure, applications, and data to Azure. The hub provides
Azure tools for assessment and migration, as well as third-party independent software vendor (ISV) offerings.
A SSESSM EN T T Y P E DETA IL S
Azure VMware Solution (AVS) Assessments to migrate your on-premises servers to Azure
VMware Solution (AVS).
NOTE
Azure VMware Solution (AVS) assessment is currently in preview and can be created for VMware VMs only.
There are two types of sizing criteria that you can use to create Azure VMware Solution (AVS) assessments:
3. In Assess ser vers , select the assessment type as "Azure VMware Solution (AVS)", select the discovery
source.
4. Click Edit to review the assessment properties.
5. In Select machines to assess > Assessment name > specify a name for the assessment.
6. In Select or create a group > select Create New and specify a group name. A group gathers one or
more VMs together for assessment.
7. In Add machines to the group , select VMs to add to the group.
8. Click next to Review + create assessment to review the assessment details.
9. Click Create Assessment to create the group, and run the assessment.
10. After the assessment is created, view it in Ser vers > Azure Migrate: Ser ver Assessment >
Assessments .
11. Click Expor t assessment , to download it as an Excel file.
0%-20% 1 Star
21%-40% 2 Star
41%-60% 3 Star
61%-80% 4 Star
81%-100% 5 Star
Next steps
Learn how to use dependency mapping to create high confidence groups.
Learn more about how AVS assessments are calculated.
Manage DHCP for Azure VMware Solution
2/11/2021 • 3 minutes to read • Edit Online
Applications and workloads running in a private cloud environment require DHCP services for IP address
assignments. This article shows you how to create and manage DHCP in Azure VMware Solution in two ways:
If you're using NSX-T to host your DHCP server, you'll need to create a DHCP server and relay to that
server. When you create the DHCP server, you'll also add a network segment and specify the DHCP IP
address range.
If you're using a third-party external DHCP server in your network, you'll need to create DHCP relay
service. When you create a relay to a DHCP server, whether using NSX-T or a third-party to host your
DHCP server, you'll need to specify the DHCP IP address range.
IMPORTANT
DHCP does not work for virtual machines (VMs) on the VMware HCX L2 stretch network when the DHCP server is in the
on-premises datacenter. NSX, by default, blocks all DHCP requests from traversing the L2 stretch. For the solution, see the
Send DHCP requests to the on-premises DHCP server procedure.
3. Select Tier 1 Gateways , select the vertical ellipsis on the Tier-1 gateway, and then select Edit .
4. Select No IP Allocation Set to add a subnet.
8. Confirm the presence of the new network segment. In this example, ls01 is the new network segment.
a. In NSX-T Manager, select Networking > Segments .
b. In vCenter, select Networking > SDDC-Datacenter .
4. Modify the gateway IP address if needed, and enter the DHCP range IP.
5. Select Apply , and then Save . The segment is assigned a DHCP server pool.
Send DHCP requests to the on-premises DHCP server
If you want to send DHCP requests from your Azure VMware Solution VMs on the L2 extended segment to the
on-premises DHCP server, you'll create a security segment profile.
1. Sign in to your on-premises vCenter, and under Home , select HCX .
2. Select Network Extension under Ser vices .
3. Select the network extension you want to support DHCP requests from Azure VMware Solution to on-
premises.
4. Take note of the destination network name.
5. In the Azure VMware Solution NSX-T Manager, select Networking > Segments > Segment Profiles .
6. Select Add Segment Profile and then Segment Security .
7. Provide a name and a tag, and then set the BPDU Filter toggle to ON and all the DHCP toggles to OFF.
8. Remove all the MAC addresses, if any, under the BPDU Filter Allow List . Then select Save .
9. Under Networking > Segments > Segments , in the search area, enter the definition network name.
10. Select the vertical ellipsis on the segment name and select Edit .
11. Change the Segment Security to the segment profile you created earlier.
Next steps
Learn more about Host maintenance and lifecycle management.
Complete disaster recovery of virtual machines
using Azure VMware Solution
11/2/2020 • 4 minutes to read • Edit Online
This article contains the process to complete disaster recovery of your virtual machines (VMs) with VMware
HCX solution and using an Azure VMware Solution private cloud as the recovery or target site.
VMware HCX provides various operations that provide fine control and granularity in replication policies.
Available Operations include:
Reverse – After a disaster has occurred. Reverse helps make Site B the source site and Site A, where the
protected VM now lives.
Pause – Pause the current replication policy associated with the VM selected.
Resume - Resume the current replication policy associated with the VM selected.
Remove - Remove the current replication policy associated with the VM selected.
Sync Now – Out of bound sync source VM to the protected VM.
This guide covers the following replication scenarios:
Protect a VM or a group of VMs.
Complete a Test Recover of a VM or a group of VMs.
Recover a VM or a group of VMs.
Reverse Protection of a VM or a group of VMs.
Protect VMs
1. Log into vSphere Client on the source site and access HCX plugin .
6. Monitor the process for each of the selected VMs in the same disaster recovery area.
7. After the VM has been protected, you can view the different snapshots in the Snapshots tab.
The yellow triangle means the snapshots and the virtual machines haven't been tested in a Test Recovery
operation.
There are key differences between a VM that is powered off and one powered on. The image shows the
syncing process for a powered-on VM. It starts the syncing process until it finishes the first snapshot,
which is a full copy of the VM, and then completes the next ones in the configured interval. It syncs a copy
for a powered off VM, and then the VM appears as inactive, and protection operation shows as
completed. When the VM is powered on, it starts the syncing process to the remote site.
3. Select the options for the test and the snapshot you want to use to test different states of the VM.
6. After testing has been done on the VM or any application running on it, do a cleanup to delete the test
instance.
Recover VMs
1. Log into vSphere Client on the remote site, which is the Azure VMware Solution private cloud, and
access the HCX plugin .
For the recovery scenario, a group of VMs used for this example.
2. Select the VM to be recovered from the list, open the ACTIONS menu, and select Recover VMs .
3. Configure the recovery options for each instance and select Recover to start the recovery operation.
4. After the recovery operation is completed, the new VMs appear in the remote vCenter Server inventory.
NOTE
Ensure the original VMs on the source site are powered off before you start the reverse replication. The operation
fails if the VMs aren't powered off.
2. From the list, select the VMs to be replicated back to the source site, open the ACTIONS menu, and select
Reverse .
3. Select Reverse to start the replication.
4. Monitor on the details section of each VM.
"replicationId": "string",
"needPowerOn": true,
"instanceId": "string",
"source": {
"endpointType": "string",
"endpointId": "string",
"endpointName": "string",
"resourceType": "string",
"resourceId": "string",
"resourceName": "string"
},
"destination": {
"endpointType": "string",
"endpointId": "string",
"endpointName": "string",
"resourceType": "string",
"resourceId": "string",
"resourceName": "string"
},
"placement": [
"containerType": "string",
"containerId": "string"
],
"resourceId": "string",
"forcePowerOff": true,
"isTest": true,
"forcePowerOffAfterTimeout": true,
"isPlanned": true
}
]
With these APIs, you can build a custom mechanism to automate a disaster recovery plan's creation and
execution.
Create a content library to deploy VMs in Azure
VMware Solution
2/11/2021 • 2 minutes to read • Edit Online
A content library stores and manages content in the form of library items. A single library item consists of one
or more files you use to deploy virtual machines (VMs).
In this article, we'll walk through the procedure for creating a content library. Then we'll walk through deploying
a VM using an ISO image from the content library.
Prerequisites
An NSX-T logical switch segment and a managed DHCP service are required to complete this tutorial. For more
information, see the How to manage DHCP in Azure VMware Solution article.
6. Review and verify the content library settings, and then select Finish .
Upload an ISO image to the content library
Now that the content library has been created, you can add an ISO image to deploy a VM to a private cloud
cluster.
1. From the vSphere Client, select Menu > Content Libraries .
2. Right-click the content library you want to use for the new ISO and select Impor t Item .
3. Import a library item for the Source by doing one of the following, and then select Impor t :
a. Select URL and provide a URL to download an ISO.
b. Select Local File to upload from your local system.
TIP
Optional, you can define a custom item name and notes for the Destination.
4. Open the library and select the Other Types tab to verify that your ISO was uploaded successfully.
Next steps
Now that you've covered creating a content library to deploy VMs in Azure VMware Solution, you may want to
learn about:
Deploying and configuring VMware HCX to migrate VM workloads to your private cloud.
Lifecycle management of Azure VMware Solution VMs.
Set up GitHub Enterprise Server on your Azure
VMware Solution private cloud
2/11/2021 • 7 minutes to read • Edit Online
In this article, we walk through the steps to set up GitHub Enterprise Server, the "on-premises" version of
GitHub.com, on your Azure VMware Solution private cloud. The scenario covered in this walk-through is for a
GitHub Enterprise Server instance capable of serving up to 3,000 developers running up to 25 jobs per minute
on GitHub Actions. It includes the setup of (at time of writing) preview features, such as GitHub Actions. To
customize the setup for your particular needs, review the requirements listed in Installing GitHub Enterprise
Server on VMware.
vCPUs 4 8
Memory 32 GB 61 GB
However, your needs may vary. Refer to the guidance on hardware considerations in Installing GitHub Enterprise
Server on VMware. Also see Adding CPU or memory resources for VMware to customize the hardware
configuration based on your situation.
Once the instance restarts, create a new admin account on the instance. Be sure to make a note of this user's
password as well.
Other configuration steps
To harden your instance for production use, the following optional setup steps are recommended:
1. Configure high availability for protection against:
Software crashes (OS or application level)
Hardware failures (storage, CPU, RAM, and so on)
Virtualization host system failures
Logically or physically severed network
2. Configure backup-utilities, providing versioned snapshots for disaster recovery, hosted in availability that
is separate from the primary instance.
3. Setup subdomain isolation, using a valid TLS certificate, to mitigate cross-site scripting and other related
vulnerabilities.
External blob storage is necessary to enable GitHub Actions on GitHub Enterprise Server (currently available as
a "beta" feature). This external blob storage is used by Actions to store artifacts and logs. Actions on GitHub
Enterprise Server supports Azure Blob Storage as a storage provider (and some others). So we'll provision a
new Azure storage account with a storage account type of BlobStorage:
Once the deployment of the new BlobStorage resource has completed, copy and make a note of the connection
string (available under Access keys). We'll need this string shortly.
At this point, you should have an instance of GitHub Enterprise Server running, with an administrator account
created. You should also have external blob storage that GitHub Actions will use for persistence.
Now let's create somewhere for GitHub Actions to run; again, we'll use Azure VMware Solution.
First, let's provision a new VM on the cluster. We'll base our VM on a recent release of Ubuntu Server.
Once the VM is created, power it up and connect to it via SSH.
Next, install the Actions runner application, which runs a job from a GitHub Actions workflow. Identify and
download the most current Linux x64 release of the Actions runner, either from the releases page or by running
the following quick script. This script requires both curl and jq to be present on your VM.
LATEST\_RELEASE\_ASSET\_URL=$( curl https://api.github.com/repos/actions/runner/releases/latest | \
jq -r '.browser\_download\_url' )
You should now have a file locally on your VM, actions-runner-linux-arm64-*.tar.gz. Extract this tarball locally:
tar xzf actions-runner-linux-arm64-\*.tar.gz
This extraction unpacks a few files locally, including a config.sh and run.sh script, which we'll come back to
shortly.
Nearly there! Let's configure and enable GitHub Actions on the GitHub Enterprise Server instance. We'll need to
access the GitHub Enterprise Server instance's administrative shell over SSH, and then run the following
commands:
# set an environment variable containing your Blob storage connection string
ghe-config-apply
# execute a precheck, this install additional software required by Actions on GitHub Enterprise Server
ghe-config-apply
Next run:
ghe-actions-check -s blob
You should see output: "Blob Storage is healthy".
Now that GitHub Actions is configured, enable it for your users. Sign in to your GitHub Enterprise Server
instance as an administrator, and select the in the upper right corner of any page. In the left sidebar, select
Enterprise over view , then Policies , Actions , and select the option to enable Actions for all
organizations .
Next, configure your runner from the Self-hosted runners tab. Select Add new and then New runner from
the drop-down.
On the next page, you'll be presented with a set of commands to run, we just need to copy the command to
configure the runner, for instance:
./config.sh --url https://10.1.1.26/enterprises/octo-org --token AAAAAA5RHF34QLYBDCHWLJC7L73MA
Copy the config.sh command and paste it into a session on your Actions runner (created previously).
To make this runner available to organizations in your enterprise, edit its organization access:
Here we will make it available to all organizations, but you can also limit access to a subset of organizations, and
even to specific repositories.
If you chose to not enable GitHub Connect, you can use the following alternative workflow.
Navigate to a repo on your instance, and add the above workflow as: .github/workflows/hello-world.yml
In the Actions tab for your repo, wait for the workflow to execute.
If everything ran successfully, you should see a new issue in your repo, entitled "Hello world."
Congratulations! You just completed your first Actions workflow on GitHub Enterprise Server, running on your
Azure VMware Solution private cloud.
In this article, we set up a new instance of GitHub Enterprise Server, the self-hosted equivalent of GitHub.com, on
top of your Azure VMware Solution private cloud. This instance includes support for GitHub Actions and uses
Azure Blob Storage for persistence of logs and artifacts. But we are just scratching the surface of what you can
do with GitHub Actions. Check out the list of Actions on GitHub's Marketplace, or create your own.
Next steps
Now that you've seen how to set up GitHub Enterprise Server on your Azure VMware Solution private cloud,
you may want to learn about:
Getting started with GitHub Actions.
Joining the beta program.
Administration of GitHub Enterprise Server.
How to use the public IP functionality in Azure
VMware Solution
2/11/2021 • 3 minutes to read • Edit Online
Public IP is a new feature in Azure VMware Solution connectivity. It makes resources, such as web servers,
virtual machines (VMs), and hosts accessible through a public network.
You enable public internet access in two ways.
Applications can be hosted and published under the Application Gateway load balancer for HTTP/HTTPS
traffic.
Published through public IP features in Azure Virtual WAN.
As a part of Azure VMware Solution private cloud deployment, upon enabling public IP functionality, the
required components with automation get created and enabled:
Virtual WAN
Virtual WAN hub with ExpressRoute connectivity
Azure Firewall services with public IP
This article details how you can use the public IP functionality in Virtual WAN.
Prerequisites
Azure VMware Solution environment
A webserver running in Azure VMware Solution environment.
A new non-overlapping IP range for the Virtual WAN hub deployment, typically a /24 .
Reference architecture
The architecture diagram shows a web server hosted in the Azure VMware Solution environment and
configured with RFC1918 private IP addresses. The web service is made available to the internet through Virtual
WAN public IP functionality. Public IP is typically a destination NAT translated in Azure Firewall. With DNAT rules,
firewall policy translates public IP address requests to a private address (webserver) with a port.
User requests hit the firewall on a public IP that, in turn, is translated to private IP using DNAT rules in the Azure
Firewall. The firewall checks the NAT table, and if the request matches an entry, it forwards the traffic to the
translated address and port in the Azure VMware Solution environment.
The web server receives the request and replies with the requested information or page to the firewall, and then
the firewall forwards the information to the user on the public IP address.
Test case
In this scenario, you'll publish the IIS webserver to the internet. Use the public IP feature in Azure VMware
Solution to publish the website on a public IP address. You'll also configure NAT rules on the firewall and access
Azure VMware Solution resource (VMs with a web server) with public IP.
TIP
You can monitor the status from the Notification area.
3. Select Secured vir tual hubs and, from the list, select a virtual hub.
4. On the virtual hub page, select Public IP configuration , and to add more public IP address, then select
Add .
3. Select Azure Firewall Policies and then select Create Azure Firewall Policy .
4. Under the Basics tab, provide the required details and select Next: DNS Settings .
5. Under the DNS tab, select Disable , and then select Next: Rules .
6. Select Add a rule collection , provide the below details, and select Add and then select Next: Threat
intelligence .
Name
Rules collection Type - DNAT
Priority
Rule collection Action – Allow
Name of rule
Source Type- IPaddress
Source - *
Protocol – TCP
Destination port – 80
Destination Type – IP Address
Destination – Public IP Address
Translated address – Azure VMware Solution Web Ser ver private IP Address
Translated port - Azure VMware Solution Web Ser ver por t
7. Leave the default value, and then select Next: Hubs .
8. Select Associate vir tual hub .
9. Select a hub from the list and select Add .
10. Select Next: Tags .
11. (Optional) Create name and value pairs to categorize your resources.
12. Select Next: Review + create and then select Create .
Limitations
You can have 100 public IPs per SDDCs.
Next steps
Now that you've covered how to use the public IP functionality in Azure VMware Solution, you may want to
learn about:
Using public IP addresses with Azure Virtual WAN.
Creating an IPSec tunnel into Azure VMware Solution.
Create an IPSec tunnel into Azure VMware Solution
2/11/2021 • 5 minutes to read • Edit Online
In this article, we'll go through the steps to establish a VPN (IPsec IKEv1 and IKEv2) site-to-site tunnel
terminating in the Microsoft Azure Virtual WAN hub. We'll create an Azure Virtual WAN hub and a VPN gateway
with a public IP address attached to it. Then we'll create an Azure ExpressRoute gateway and establish an Azure
VMware Solution endpoint. We'll also go over the details of enabling a policy-based VPN on-premises setup.
Topology
The Azure Virtual hub contains the Azure VMware Solution ExpressRoute gateway and the site-to-site VPN
gateway. It connects an on-premise VPN device with an Azure VMware Solution endpoint.
F IEL D VA L UE
Resource group The Virtual WAN is a global resource and isn't confined
to a specific region.
Resource group location To create the Virtual WAN hub, you need to set a
location for the resource group.
Name
F IEL D VA L UE
Type Select Standard , which will allow more than just the
VPN gateway traffic.
3. In the Azure portal, select the Virtual WAN you created in the previous step, select Create vir tual hub ,
enter the required fields, and then select Next: Site to site .
F IEL D VA L UE
Name
Hub private address space Enter the subnet using a /24 (minimum).
4. On the Site-to-site tab, define the site-to-site gateway by setting the aggregate throughput from the
Gateway scale units drop-down.
TIP
One scale unit = 500 Mbps. The scale units are in pairs for redundancy, each supporting 500 Mbps.
TIP
A scale unit value is 2 Gbps.
F IEL D VA L UE
Name
Device vendor
Border Gateway Protocol Set to Enable to ensure both Azure VMware Solution
and the on-premises servers advertise their routes
across the tunnel. If disabled, the subnets that need to
be advertised must be manually maintained. If subnets
are missed, HCX will fail to form the service mesh. For
more information, see About BGP with Azure VPN
Gateway.
Private address space Enter the on-premises CIDR block. It's used to route all
traffic bound for on-premises across the tunnel. The
CIDR block is only required if you don't enable BGP.
Connect to
4. On the Links tab, fill in the required fields and select Review + create . Specifying link and provider
names allow you to distinguish between any number of gateways that may eventually be created as part
of the hub. BGP and autonomous system number (ASN) must be unique inside your organization.
3. Edit the connection between the VPN site and the hub, and then select Save .
Internet Protocol Security (IPSec), select Custom .
Use policy-based traffic selector, select Enable
Specify the details for IKE Phase 1 and IKE Phase 2(ipsec) .
Your traffic selectors or subnets that are part of the policy-based encryption domain should be:
The virtual WAN hub /24
The Azure VMware Solution private cloud /22
The connected Azure virtual network (if present)
NOTE
The authorization key will disappear after some time, so copy it as soon as it appears.
4. Next, we'll link Azure VMware Solution and the VPN gateway together in the Virtual WAN hub. In the
Azure portal, open the Virtual WAN you created earlier. Select the created Virtual WAN hub and then
select ExpressRoute in the left pane. Select + Redeem authorization key .
Paste the authorization key into the Authorization key field and the ExpressRoute ID into the Peer circuit
URI field. Make sure to select Automatically associate this ExpressRoute circuit with the hub.
Select Add to establish the link.
5. To test your connection, Create an NSX-T segment and provision a VM on the network. Test by pinging
both the on-premise and Azure VMware Solution endpoints.
API Management to publish and protect APIs
running on Azure VMware Solution-based VMs
2/11/2021 • 2 minutes to read • Edit Online
Microsoft Azure API Management lets you securely publish to internal or external consumers. Only the
Developer and Premium SKUs allow for Azure Virtual Network integration to publish APIs running on Azure
VMware Solution workloads. Both SKUs securely enable the connectivity between API Management service and
the backend.
NOTE
The Developer SKU is intended for development and testing while the Premium SKU is for production deployments.
The API Management configuration is the same for backend services that run on top of Azure VMware Solution
virtual machines (VMs) and on-premises. For both deployments, API Management configures the virtual IP (VIP)
on the load balancer as the backend endpoint when the backend server is placed behind an NSX Load Balancer
on the Azure VMware Solution.
External deployment
An external deployment publishes APIs consumed by external users using a public endpoint. Developers and
DevOps engineers can manage APIs through the Azure portal or PowerShell, and the API Management
developer portal.
The external deployment diagram shows the entire process and the actors involved (shown at the top). The
actors are:
Administrator(s): Represents the admin or DevOps team, which manages Azure VMware Solution
through the Azure portal and automation mechanisms like PowerShell or Azure DevOps.
Users: Represents the exposed APIs' consumers and represent both users and services consuming the
APIs.
The traffic flow goes through API Management instance, which abstracts the backend services, plugged into the
Hub virtual network. The ExpressRoute Gateway routes the traffic to the ExpressRoute Global Reach channel and
reaches an NSX Load Balancer distributing the incoming traffic to the different backend services instances.
API Management has an Azure Public API, and activating Azure DDOS Protection Service is recommended.
Internal deployment
An internal deployment publishes APIs consumed by internal users or systems. DevOps team and API
developers use the same management tools and developer portal as in the external deployment.
Internal deployments can be done with Azure Application Gateway to create a public and secure endpoint for
the API. The gateway's capabilities are used to create a hybrid deployment that enables different scenarios.
Use the same API Management resource for consumption by both internal and external consumers.
Have a single API Management resource with a subset of APIs defined and available for external
consumers.
Provide an easy way to switch access to API Management from the public internet on and off.
The deployment diagram below shows consumers that can be internal or external, with each type accessing the
same or different APIs.
In an internal deployment, APIs get exposed to the same API Management instance. In front of API Management,
Application Gateway gets deployed with Azure Web Application Firewall (WAF) capability activated. Also
deployed, a set of HTTP listeners and rules to filter the traffic, exposing only a subset of the backend services
running on Azure VMware Solution.
Internal traffic routes through ExpressRoute Gateway to Azure Firewall and then to API Management,
directly or through traffic rules.
External traffic enters Azure through Application Gateway, which uses the external protection layer for API
Management.
Integrate Azure VMware Solution in a hub and
spoke architecture
2/11/2021 • 6 minutes to read • Edit Online
This article provides recommendations for integrating an Azure VMware Solution deployment in an existing or a
new Hub and Spoke architecture on Azure.
The Hub and Spoke scenario assume a hybrid cloud environment with workloads on:
Native Azure using IaaS or PaaS services
Azure VMware Solution
vSphere on-premises
Architecture
The Hub is an Azure Virtual Network that acts as a central point of connectivity to your on-premises and Azure
VMware Solution private cloud. The Spokes are virtual networks peered with the Hub to enable cross-virtual
network communication.
Traffic between the on-premises datacenter, Azure VMware Solution private cloud, and the Hub goes through
Azure ExpressRoute connections. Spoke virtual networks usually contain IaaS based workloads but can have
PaaS services like App Service Environment, which has direct integration with Virtual Network, or other PaaS
services with Azure Private Link enabled.
IMPORTANT
You can use an existing ExpressRoute Gateway to connect to Azure VMware Solution as long as it does not exceed the
limit of four ExpressRoute circuits per virtual network. However, to access Azure VMware Solution from on-premises
through ExpressRoute, you must have ExpressRoute Global Reach since the ExpressRoute gateway does not provide
transitive routing between its connected circuits.
The diagram shows an example of a Hub and Spoke deployment in Azure connected to on-premises and Azure
VMware Solution through ExpressRoute Global Reach.
The architecture has the following main components:
On-premises site: Customer on-premises datacenter(s) connected to Azure through an ExpressRoute
connection.
Azure VMware Solution private cloud: Azure VMware Solution SDDC formed by one or more
vSphere clusters, each one with a maximum of 16 hosts.
ExpressRoute gateway: Enables the communication between Azure VMware Solution private cloud,
shared services on Hub virtual network, and workloads running on Spoke virtual networks.
ExpressRoute Global Reach: Enables the connectivity between on-premises and Azure VMware
Solution private cloud. The connectivity between Azure VMware Solution and the Azure fabric is through
ExpressRoute Global Reach only. You can't select any option beyond ExpressRoute Fast Path. ExpressRoute
Direct isn't supported.
S2S VPN considerations: For Azure VMware Solution production deployments, Azure S2S VPN isn't
supported due to network requirements for VMware HCX. However, you can use it for a PoC deployment.
Hub vir tual network : Acts as the central point of connectivity to your on-premises network and Azure
VMware Solution private cloud.
Spoke vir tual network
IaaS Spoke: An IaaS spoke hosts Azure IaaS based workloads, including VM availability sets and
virtual machine scale sets, and the corresponding network components.
PaaS Spoke: A PaaS Spoke hosts Azure PaaS services using private addressing thanks to Private
Endpoint and Private Link.
Azure Firewall: Acts as the central piece to segment traffic between the Spokes and Azure VMware
Solution.
Application Gateway: Exposes and protects web apps that run either on Azure IaaS/PaaS or Azure
VMware Solution virtual machines (VMs). It integrates with other services like API Management.
Network and security considerations
ExpressRoute connections enable traffic to flow between on-premises, Azure VMware Solution, and the Azure
network fabric. Azure VMware Solution uses ExpressRoute Global Reach to implement this connectivity.
Because an ExpressRoute gateway doesn't provide transitive routing between its connected circuits, on-premises
connectivity also must use ExpressRoute Global Reach to communicate between the on-premises vSphere
environment and Azure VMware Solution.
On-premises to Azure VMware Solution traffic flow
For more information on Azure VMware Solution networking and connectivity concepts, see the Azure VMware
Solution product documentation.
Traffic segmentation
Azure Firewall is the Hub and Spoke topology's central piece, deployed on the Hub virtual network. Use Azure
Firewall or another Azure supported network virtual appliance to establish traffic rules and segment the
communication between the different spokes and Azure VMware Solution workloads.
Create route tables to direct the traffic to Azure Firewall. For the Spoke virtual networks, create a route that sets
the default route to the internal interface of Azure Firewall. This way, when a workload in the Virtual Network
needs to reach the Azure VMware Solution address space, the firewall can evaluate it and apply the
corresponding traffic rule to either allow or deny it.
IMPORTANT
A route with address prefix 0.0.0.0/0 on the GatewaySubnet setting is not supported.
Set routes for specific networks on the corresponding route table. For example, routes to reach Azure VMware
Solution management and workloads IP prefixes from the spoke workloads and the other way around.
A second level of traffic segmentation using the network security groups within the Spokes and the Hub to
create a more granular traffic policy.
NOTE
Traffic from on-premises to Azure VMware Solution: Traffic between on-premises workloads, either vSphere-based
or others, are enabled by Global Reach, but the traffic doesn't go through Azure Firewall on the hub. In this scenario, you
must implement traffic segmentation mechanisms, either on-premises or in Azure VMware Solution.
Application Gateway
Azure Application Gateway V1 and V2 have been tested with web apps that run on Azure VMware Solution VMs
as a backend pool. Application Gateway is currently the only supported method to expose web apps running on
Azure VMware Solution VMs to the internet. It can also expose the apps to internal users securely.
For more information, see the Azure VMware Solution-specific article on Application Gateway.
Jump box and Azure Bastion
Access Azure VMware Solution environment with a jump box, which is a Windows 10 or Windows Server VM
deployed in the shared service subnet within the Hub virtual network.
IMPORTANT
Azure Bastion is the service recommended to connect to the jump box to prevent exposing Azure VMware Solution to the
internet. You cannot use Azure Bastion to connect to Azure VMware Solution VMs since they are not Azure IaaS objects.
As a security best practice, deploy Microsoft Azure Bastion service within the Hub virtual network. Azure Bastion
provides seamless RDP and SSH access to VMs deployed on Azure without the need to provision public IP
addresses to those resources. Once you provision the Azure Bastion service, you can access the selected VM
from the Azure portal. After establishing the connection, a new tab opens, showing the jump box desktop, and
from that desktop, you can access the Azure VMware Solution private cloud management plane.
IMPORTANT
Do not give a public IP address to the jump box VM or expose 3389/TCP port to the public internet.
Azure DNS resolution considerations
For Azure DNS resolution, there are two options available:
Use the domain controllers deployed on the Hub (described in Identity considerations) as name servers.
Deploy and configure an Azure DNS private zone.
The best approach is to combine both to provide reliable name resolution for Azure VMware Solution, on-
premises, and Azure.
As a general design recommendation, use the existing Azure DNS infrastructure (in this case, Active Directory-
integrated DNS) deployed onto at least two Azure VMs deployed in the Hub virtual network and configured in
the Spoke virtual networks to use those Azure DNS servers in the DNS settings.
You can use Azure Private DNS, where the Azure Private DNS zone links to the virtual network. The DNS servers
are used as hybrid resolvers with conditional forwarding to on-premises or Azure VMware Solution running
DNS using customer Azure Private DNS infrastructure.
To automatically manage the DNS records' lifecycle for the VMs deployed within the Spoke virtual networks,
enable autoregistration. When enabled, the maximum number of private DNS zones is only one. If disabled, then
the maximum number is 1000.
On-premises and Azure VMware Solution servers can be configured with conditional forwarders to resolver
VMs in Azure for the Azure Private DNS zone.
Identity considerations
For identity purposes, the best approach is to deploy at least one domain controller on the Hub. Use two shared
service subnets in zone-distributed fashion or a VM availability set. For more information on extending your on-
premises Active Directory (AD) domain to Azure, see Azure Architecture Center.
Additionally, deploy another domain controller on the Azure VMware Solution side to act as identity and DNS
source within the vSphere environment.
As a recommended best practice, integrate AD domain with Azure Active Directory.
Protect your Azure VMware Solution VMs with
Azure Security Center integration
2/11/2021 • 6 minutes to read • Edit Online
Azure native security tools provide a secure infrastructure for a hybrid environment of Azure, Azure VMware
Solution, and on-premises virtual machines (VMs). This article shows you how to set up Azure tools for hybrid
environment security. You'll use various tools to identify and address different types of threats.
Topology
The Log Analytics agent enables collection of log data from Azure, Azure VMware Solution, and on-premises
VMs. The log data is sent to Azure Monitor Logs and is stored in a Log Analytics workspace. You can deploy the
Log Analytics agent using Arc enabled servers VM extensions support for new and existing VMs.
Once the logs are collected by the Log Analytics workspace, you can configure the Log Analytics workspace with
Azure Security Center. Azure Security Center will assess the vulnerability status of Azure VMware Solution VMs
and raise an alert for any critical vulnerability. For instance, it assesses missing operating system patches,
security misconfigurations, and endpoint protection.
You can configure the Log Analytics workspace with Azure Sentinel for alert detection, threat visibility, proactive
hunting, and threat response. In the preceding diagram, Azure Security Center is connected to Azure Sentinel
using Azure Security Center connector. Azure Security Center will forward the environment vulnerability to
Azure Sentinel to create an incident and map with other threats. You can also create the scheduled rules query to
detect unwanted activity and convert it to the incidents.
Benefits
Azure native services can be used for hybrid environment security in Azure, Azure VMware Solution, and on-
premises services.
Using a Log Analytics workspace, you can collect the data or the logs to a single point and present the same
data to different Azure native services.
Azure Security Center offers a number of features, including:
File integrity monitoring
Fileless attack detection
Operating system patch assessment
Security misconfigurations assessment
Endpoint protection assessment
Azure Sentinel allows you to:
Collect data at cloud scale across all users, devices, applications, and infrastructure, both on premises
and in multiple clouds.
Detect previously undetected threats.
Investigate threats with artificial intelligence and hunt for suspicious activities at scale.
Respond to incidents rapidly with built-in orchestration and automation of common tasks.
4. Select Connect to connect the Azure Security Center with Azure Sentinel.
5. Enable Create incident to generate an incident for Azure Security Center.
SecurityEvent
|where Activity startswith '4625'
|summarize count () by IpAddress,Computer
|where count_ > 3
Map entities
Query scheduling
Alert threshold
Event grouping
Suppression
Select Next .
6. On the Incident settings tab, enable Create incidents from aler ts triggered by this analytics
rule and select Next: Automated response > .
Next steps
Now that you've covered how to protect your Azure VMware Solution VMs, you may want to learn about:
Using the Azure Defender dashboard.
Advanced multistage attack detection in Azure Sentinel.
Lifecycle management of Azure VMware Solution VMs.
Set up Azure Backup Server for Azure VMware
Solution
2/11/2021 • 15 minutes to read • Edit Online
Azure Backup Server contributes to your business continuity and disaster recovery (BCDR) strategy. With Azure
VMware Solution, you can only configure a virtual machine (VM)-level backup using Azure Backup Server.
Azure Backup Server can store backup data to:
Disk : For short-term storage, Azure Backup Server backs up data to disk pools.
Azure : For both short-term and long-term storage off-premises, Azure Backup Server data stored in disk
pools can be backed up to the Microsoft Azure cloud by using Azure Backup.
Use Azure Backup Server to restore data to the source or an alternate location. That way, if the original data is
unavailable because of planned or unexpected issues, you can restore data to an alternate location.
This article helps you prepare your Azure VMware Solution environment to back up VMs by using Azure Backup
Server. We walk you through the steps to:
Determine the recommended VM disk type and size to use.
Create a Recovery Services vault that stores the recovery points.
Set the storage replication for a Recovery Services vault.
Add storage to Azure Backup Server.
Limitations
Update Rollup 1 for Azure Backup Server v3 must be installed.
You can't back up user snapshots before the first Azure Backup Server backup. After Azure Backup Server
finishes the first backup, then you can back up user snapshots.
Azure Backup Server can't protect VMware VMs with pass-through disks and physical raw device mappings
(pRDMs).
Azure Backup Server can't detect or protect VMware vApps.
To set up Azure Backup Server for Azure VMware Solution, you must finish the following steps:
Set up the prerequisites and environment.
Create a Recovery Services vault.
Download and install Azure Backup Server.
Add storage to Azure Backup Server.
Deployment architecture
Azure Backup Server is deployed as an Azure infrastructure as a service (IaaS) VM to protect Azure VMware
Solution VMs.
*To get the required IOPs, use minimum recommended- or higher-size disks. Smaller-size disks offer lower IOPs.
NOTE
Azure Backup Server is designed to run on a dedicated, single-purpose server. You can't install Azure Backup Server on a
computer that:
Runs as a domain controller.
Has the Application Server role installed.
Is a System Center Operations Manager management server.
Runs Exchange Server.
Is a node of a cluster.
You'll also need space for Azure Backup Server to copy the
file catalog to a temporary installation location when you
archive.
Disk for storage pool Two to three times the protected data size.
(Uses basic volumes, can't be on a dynamic disk) For detailed storage calculation, see DPM Capacity Planner.
To learn how to attach a new managed data disk to an existing Azure VM, see Attach a managed data disk to a
Windows VM by using the Azure portal.
NOTE
A single Azure Backup Server has a soft limit of 120 TB for the storage pool.
IMPORTANT
You should not retain operational recovery data on Azure Backup Server-attached disks for more than five days. If data is
more than five days old, store it in a Recovery Services vault.
To store backup data in Azure, create or use a Recovery Services vault. When you prepare to back up the Azure
Backup Server workload, you configure the Recovery Services vault. Once configured, each time an online
backup job runs, a recovery point gets created in the vault. Each Recovery Services vault holds up to 9,999
recovery points. Depending on the number of recovery points created and how long kept, you can keep backup
data for many years. For example, you could create monthly recovery points and keep them for five years.
IMPORTANT
Whether you send backup data to Azure or keep it locally, you must register Azure Backup Server with a Recovery
Services vault.
Scale deployment
If you want to scale your deployment, you have the following options:
Scale up : Increase the size of the Azure Backup Server VM from A series to DS3 series, and increase the local
storage.
Offload data : Send older data to Azure and keep only the newest data on the storage attached to the Azure
Backup Server machine.
Scale out : Add more Azure Backup Server machines to protect the workloads.
.NET Framework
The VM must have .NET Framework 3.5 SP1 or higher installed.
Join a domain
The Azure Backup Server VM must be joined to a domain. A domain user with administrator privileges on the
VM must install Azure Backup Server.
Azure Backup Server deployed in an Azure VM can back up workloads on the VMs in Azure VMware Solution.
The workloads should be in the same domain to enable the backup operation.
Name : Enter a friendly name to identify the vault. The name must be unique to the Azure subscription.
Specify a name that has at least two but not more than 50 characters. The name must start with a
letter and consist only of letters, numbers, and hyphens.
Subscription : Choose the subscription to use. If you're a member of only one subscription, you'll see
that name. If you're not sure which subscription to use, use the default (suggested) subscription. There
are multiple choices only if your work or school account is associated with more than one Azure
subscription.
Resource group : Use an existing resource group or create a new one. To see the list of available
resource groups in your subscription, select Use existing , and then select a resource from the drop-
down list. To create a new resource group, select Create new and enter the name.
Location : Select the geographic region for the vault. To create a vault to protect Azure VMware
Solution virtual machines, the vault must be in the same region as the Azure VMware Solution private
cloud.
6. When you're ready to create the Recovery Services vault, select Create .
It can take a while to create the Recovery Services vault. Monitor the status notifications in the
Notifications area in the upper-right corner of the portal. After creating your vault, it's visible in the list
of Recovery Services vaults. If you don't see your vault, select Refresh .
IMPORTANT
Changing the setting of Storage replication type Locally-redundant/Geo-redundant for a Recovery Services vault
must be done before you configure backups in the vault. After you configure backups, the option to modify it is disabled,
and you can't change the storage replication type.
b. From the What do you want to back up? menu, select the workloads you want to protect by
using Azure Backup Server.
c. Select Prepare Infrastructure to download and install Azure Backup Server and the vault
credentials.
6. In the Prepare infrastructure window that opens:
a. Select the Download link to install Azure Backup Server.
b. Select Already downloaded or using the latest Azure Backup Ser ver installation and then
Download to download the vault credentials. You'll use these credentials when you register the
Azure Backup Server to the Recovery Services vault. The links take you to the Download Center,
where you download the software package.
7. On the download page, select all the files and select Next .
NOTE
You must download all the files to the same folder. Because the download size of the files together is greater than
3 GB, it might take up to 60 minutes for the download to complete.
Extract the software package
If you downloaded the software package to a different server, copy the files to the VM you created to deploy
Azure Backup Server.
WARNING
At least 4 GB of free space is required to extract the setup files.
1. After you've downloaded all the files, double-click MicrosoftAzureBackupInstaller.exe to open the
Microsoft Azure Backup setup wizard, and then select Next .
2. Select the location to extract the files to and select Next .
3. Select Extract to begin the extraction process.
4. Once extracted, select the option to Execute setup.exe and then select Finish .
TIP
You can also locate the setup.exe file from the folder where you extracted the software package.
4. The Azure Backup Server installation package comes bundled with the appropriate SQL Server binaries
that are needed. When you start a new Azure Backup Server installation, select the Install new Instance
of SQL Ser ver with this Setup option. Then select Check and Install .
NOTE
If you want to use your own SQL Server instance, the supported SQL Server versions are SQL Server 2014 SP1 or
higher, 2016, and 2017. All SQL Server versions should be Standard or Enterprise 64-bit. The instance used by
Azure Backup Server must be local only; it can't be remote. If you use an existing SQL Server instance for Azure
Backup Server, the setup only supports the use of named instances of SQL Server.
If a failure occurs with a recommendation to restart the machine, do so, and select Check Again . For any
SQL Server configuration issues, reconfigure SQL Server according to the SQL Server guidelines. Then
retry to install or upgrade Azure Backup Server using the existing instance of SQL Server.
Manual configuration
When you use your own SQL Server instance, make sure you add builtin\Administrators to the sysadmin
role to the master database's sysadmin role.
Configure repor ting ser vices with SQL Ser ver 2017
If you use your instance of SQL Server 2017, you must configure SQL Server 2017 Reporting Services
(SSRS) manually. After configuring SSRS, make sure to set the IsInitialized property of SSRS to True .
When set to True , Azure Backup Server assumes that SSRS is already configured and skips the SSRS
configuration.
To check the SSRS configuration status, run:
$configset =Get-WmiObject –namespace
"root\Microsoft\SqlServer\ReportServer\RS_SSRS\v14\Admin" -class
MSReportServer_ConfigurationSetting -ComputerName localhost
$configset.IsInitialized
NOTE
Microsoft Online Services Terms (OST) governs the licensing for SQL Server used as the database for Azure Backup
Server. According to OST, only use SQL Server bundled with Azure Backup Server as the database for Azure
Backup Server.
NOTE
The scratch location is required for backup to Azure. Ensure the scratch location is at least 5% of the data planned
for backing up to the cloud. For disk protection, separate disks need configuring after the installation finishes. For
more information about storage pools, see Configure storage pools and disk storage.
7. Provide a strong password for restricted local user accounts, and select Next .
8. Select whether you want to use Microsoft Update to check for updates, and select Next .
NOTE
We recommend having Windows Update redirect to Microsoft Update, which offers security and important
updates for Windows and other products like Azure Backup Server.
TIP
You can automatically generate a passphrase or provide your minimum 16-character passphrase.
12. Enter the location to save the passphrase, and then select Next to register the server.
IMPORTANT
Save the passphrase to a safe location other than the local server. We strongly recommend using the Azure Key
Vault to store the passphrase.
After the Microsoft Azure Recovery Services Agent setup finishes, the installation step moves on to the
installation and configuration of SQL Server and the Azure Backup Server components.
Next steps
Now that you've covered how to set up Azure Backup Server for Azure VMware Solution, you may want to learn
about:
Configuring backups for your Azure VMware Solution VMs.
Protecting your Azure VMware Solution VMs with Azure Security Center integration.
Back up Azure VMware Solution VMs with Azure
Backup Server
2/11/2021 • 12 minutes to read • Edit Online
In this article, we'll back up VMware virtual machines (VMs) running on Azure VMware Solution with Azure
Backup Server. First, thoroughly go through Set up Microsoft Azure Backup Server for Azure VMware Solution.
Then, we'll walk through all of the necessary procedures to:
Set up a secure channel so that Azure Backup Server can communicate with VMware servers over HTTPS.
Add the account credentials to Azure Backup Server.
Add the vCenter to Azure Backup Server.
Set up a protection group that contains the VMware VMs you want to back up, specify backup settings, and
schedule the backup.
NOTE
If the VMware Getting Star ted page doesn't appear, verify the connection and browser proxy settings and try
again.
2. On the VMware Getting Star ted page, select Download trusted root CA cer tificates .
3. Save the download.zip file to the Azure Backup Server machine, and then extract its contents to the
cer ts folder, which contains the:
Root certificate file with an extension that begins with a numbered sequence like .0 and .1.
CRL file with an extension that begins with a sequence like .r0 or .r1.
4. In the cer ts folder, right-click the root certificate file and select Rename to change the extension to .cr t .
The file icon changes to one that represents a root certificate.
5. Right-click the root certificate, and select Install Cer tificate .
6. In the Cer tificate Impor t Wizard , select Local Machine as the destination for the certificate, and
select Next .
NOTE
If asked, confirm that you want to allow changes to the computer.
7. Select Place all cer tificates in the following store , and select Browse to choose the certificate store.
8. Select Trusted Root Cer tification Authorities as the destination folder, and select OK .
9. Review the settings, and select Finish to start importing the certificate.
10. After the certificate import is confirmed, sign in to the vCenter server to confirm that your connection is
secure.
Enable TLS 1.2 on Azure Backup Server
VMware 6.7 onwards had TLS enabled as the communication protocol.
1. Copy the following registry settings, and paste them into Notepad. Then save the file as TLS.REG without
the .txt extension.
[HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v2.0.50727]
"SystemDefaultTlsVersions"=dword:00000001
"SchUseStrongCrypto"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319]
"SystemDefaultTlsVersions"=dword:00000001
"SchUseStrongCrypto"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v2.0.50727]
"SystemDefaultTlsVersions"=dword:00000001
"SchUseStrongCrypto"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319]
"SystemDefaultTlsVersions"=dword:00000001
"SchUseStrongCrypto"=dword:00000001
2. Right-click the TLS.REG file, and select Merge or Open to add the settings to the registry.
3. In the Add Credential dialog box, enter a name and a description for the new credential. Specify the
user name and password you defined on the VMware server.
NOTE
If the VMware server and Azure Backup Server aren't in the same domain, specify the domain in the User name
box.
4. Select Add to add the new credential.
4. In the SSL Por t box, enter the port used to communicate with the vCenter.
TIP
Port 443 is the default port, but you can change it if your vCenter listens on a different port.
5. In the Specify Credential box, select the credential that you created in the previous section.
6. Select Add to add the vCenter to the servers list, and select Next .
7. On the Summar y page, select Add to add the vCenter to Azure Backup Server.
The new server gets added immediately. vCenter doesn't need an agent.
8. On the Finish page, review the settings, and then select Close .
You see the vCenter server listed under Production Ser ver with:
Type as VMware Ser ver
Agent Status as OK
If you see Agent Status as Unknown , select Refresh .
3. On the Select Protection Group Type page, select Ser vers , and then select Next . The Select Group
Members page appears.
4. On the Select Group Members page, select the VMs (or VM folders) that you want to back up, and then
select Next .
NOTE
When you select a folder or VMs, folders inside that folder are also selected for backup. You can uncheck folders or
VMs you don't want to back up. If a VM or folder is already being backed up, you can't select it, which ensures
duplicate recovery points aren't created for a VM.
5. On the Select Data Protection Method page, enter a name for the protection group and protection
settings.
6. Set the short-term protection to Disk , enable online protection, and then select Next .
7. Specify how long you want to keep data backed up to disk.
Retention range : The number of days that disk recovery points are kept.
Express Full Backup : How often disk recovery points are taken. To change the times or dates when
short-term backups occur, select Modify .
8. On the Review Disk Storage Allocation page, review the disk space provided for the VM backups.
The recommended disk allocations are based on the retention range you specified, the type of
workload, and the size of the protected data. Make any changes required, and then select Next .
Data size: Size of the data in the protection group.
Disk space: Recommended amount of disk space for the protection group. If you want to modify this
setting, select space lightly larger than the amount you estimate each data source grows.
Storage pool details: Shows the status of the storage pool, which includes total and remaining disk
size.
NOTE
In some scenarios, the data size reported is higher than the actual VM size. We're aware of the issue and currently
investigating it.
9. On the Choose Replica Creation Method page, indicate how you want to take the initial backup, and
select Next .
The default is Automatically over the network and Now . If you use the default, specify an off-peak
time. If you choose Later , specify a day and time.
For large amounts of data or less-than-optimal network conditions, consider replicating the data
offline by using removable media.
10. For Consistency check options , select how and when to automate the consistency checks and select
Next .
You can run consistency checks when replica data becomes inconsistent, or on a set schedule.
If you don't want to configure automatic consistency checks, you can run a manual check by right-
clicking the protection group Perform Consistency Check .
11. On the Specify Online Protection Data page, select the VMs or VM folders that you want to back up,
and then select Next .
TIP
You can select the members individually or choose Select All to choose all members.
12. On the Specify Online Backup Schedule page, indicate how often you want to back up data from local
storage to Azure.
Cloud recovery points for the data to get generated according to the schedule.
After the recovery point gets generated, it's then transferred to the Recovery Services vault in Azure.
13. On the Specify Online Retention Policy page, indicate how long you want to keep the recovery points
created from the backups to Azure.
There's no time limit for how long you can keep data in Azure.
The only limit is that you can't have more than 9,999 recovery points per protected instance. In this
example, the protected instance is the VMware server.
14. On the Summar y page, review the settings and then select Create Group .
NOTE
For short-term protection, select a disk-based recovery point for faster recovery. After short-term recovery points
expire, you see only Online recovery points to recover.
4. Before recovering from an online recovery point, ensure the staging location contains enough free space
to house the full uncompressed size of the VM you want to recover. The staging location can be viewed or
changed by running the Configure Subscription Settings Wizard .
5. Select Recover to open the Recover y Wizard .
6. Select Next to go to the Specify Recover y Options screen. Select Next again to go to the Select
Recover y Type screen.
NOTE
VMware workloads don't support enabling network bandwidth throttling.
7. On the Select Recover y Type page, either recover to the original instance or a new location.
If you choose Recover to original instance , you don't need to make any more choices in the wizard.
The data for the original instance is used.
If you choose Recover as vir tual machine on any host , then on the Specify Destination screen,
provide the information for ESXi Host , Resource Pool , Folder , and Path .
8. On the Summar y page, review your settings and select Recover to start the recovery process.
The Recover y status screen shows the progression of the recovery operation.
Restore an individual file from a VM
You can restore individual files from a protected VM recovery point. This feature is only available for Windows
Server VMs. Restoring individual files is similar to restoring the entire VM, except you browse into the VMDK
and find the files you want before you start the recovery process.
NOTE
Restoring an individual file from a VM is available only for Windows VM and disk recovery points.
1. In the Azure Backup Server Administrator Console, select the Recover y view.
2. Using the Browse pane, browse or filter to find the VM you want to recover. After you select a VM or
folder, the **Recovery points for pane display the available recovery points.
3. In the Recover y points for pane, use the calendar to select the date that contains the wanted recovery
points. Depending on how the backup policy was configured, dates can have more than one recovery
point.
4. After you select the day when the recovery point was taken, make sure you choose the correct Recover y
time .
NOTE
If the selected date has multiple recovery points, choose your recovery point by selecting it in the Recover y time
drop-down menu.
After you choose the recovery point, the list of recoverable items appears in the Path pane.
5. To find the files you want to recover, in the Path pane, double-click the item in the Recoverable Item
column to open it. Then select the file or folders you want to recover. To select multiple items, select the
Ctrl key while you select each item. Use the Path pane to search the list of files or folders that appear in
the Recoverable Item column.
NOTE
Search list below doesn't search into subfolders. To search through subfolders, double-click the folder. Use the
Up button to move from a child folder into the parent folder. You can select multiple items (files and folders), but
they must be in the same parent folder. You can't recover items from multiple folders in the same recovery job.
6. When you've selected the items for recovery, in the Administrator Console tool ribbon, select Recover to
open the Recover y Wizard . In the Recover y Wizard , the Review Recover y Selection screen shows
the selected items to be recovered.
7. On the Specify Recover y Options screen, do one of the following steps:
Select Modify to enable network bandwidth throttling. In the Throttle dialog box, select Enable
network bandwidth usage throttling to turn it on. Once enabled, configure the Settings and
Work Schedule .
Select Next to leave network throttling disabled.
8. On the Select Recover y Type screen, select Next . You can only recover your files or folders to a
network folder.
9. On the Specify Destination screen, select Browse to find a network location for your files or folders.
Azure Backup Server creates a folder where all recovered items are copied. The folder name has the
prefix MABS_day-month-year. When you select a location for the recovered files or folder, the details for
that location are provided.
10. On the Specify Recover y Options screen, choose which security setting to apply. You can opt to modify
the network bandwidth usage throttling, but throttling is disabled by default. Also, SAN Recover y and
Notification aren't enabled.
11. On the Summar y screen, review your settings and select Recover to start the recovery process. The
Recover y status screen shows the progression of the recovery operation.
Next steps
Now that you've covered backing up your Azure VMware Solution VMs with Azure Backup Server, you may
want to learn about:
Troubleshooting when setting up backups in Azure Backup Server.
Lifecycle management of Azure VMware Solution VMs.
Lifecycle management of Azure VMware Solution
VMs
2/11/2021 • 5 minutes to read • Edit Online
Microsoft Azure native tools allow you to monitor and manage your virtual machines (VMs) in the Azure
environment. Yet they also allow you to monitor and manage your VMs on Azure VMware Solution and your
on-premises VMs. In this overview, we'll look at the integrated monitoring architecture Azure offers, and how
you can use its native tools to manage your Azure VMware Solution VMs throughout their lifecycle.
Benefits
Azure native services can be used to manage your VMs in a hybrid environment (Azure, Azure VMware
Solution, and on-premises).
Integrated monitoring and visibility of your Azure, Azure VMware Solution, and on-premises VMs.
With Azure Update Management in Azure Automation, you can manage operating system updates for both
your Windows and Linux machines.
Azure Security Center provides advanced threat protection, including:
File integrity monitoring
Fileless security alerts
Operating system patch assessment
Security misconfigurations assessment
Endpoint protection assessment
Easily deploy the Log Analytics agent using Azure Arc enabled servers VM extension support for new and
existing VMs.
Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection
using the Log Analytics agent or extensions. Collect data and logs to a single point and present that data to
different Azure native services.
Added benefits of Azure Monitor include:
Seamless monitoring
Better infrastructure visibility
Instant notifications
Automatic resolution
Cost efficiency
Next steps
Now that you've covered using Azure's native tools to manage your Azure VMware Solution VMs throughout
their lifecycle, you may want to learn about:
Protecting your Azure VMware Solution VMs with Azure Security Center.
Setting up Azure Backup Server for Azure VMware Solution.
Integrating Azure VMware Solution in a hub and spoke architecture.
Azure NetApp Files with Azure VMware Solution
2/11/2021 • 3 minutes to read • Edit Online
In this article, we'll walk through the steps of integrating Azure NetApp Files with Azure VMware Solution-based
workloads. The guest operating system will run inside virtual machines (VMs) accessing Azure NetApp Files
volumes.
Reference architecture
The following diagram illustrates a connection via Azure ExpressRoute to an Azure VMware Solution private
cloud. The Azure VMware Solution environment accesses the Azure NetApp Files share mounted on Azure
VMware Solution VMs.
This article covers instructions to set up, test, and verify the Azure NetApp Files volume as a file share for Azure
VMware Solution VMs. In this scenario, we've used the NFS protocol. Azure NetApp Files and Azure VMware
Solution are created in the same Azure region.
Prerequisites
Azure subscription with Azure NetApp Files enabled
Subnet for Azure NetApp Files
Linux VM on Azure VMware Solution
Windows VMs on Azure VMware Solution
Regions supported
List of supported regions can be found at Azure Products by Region.
The Capacity pools page opens showing the capacity and service level. In this example, the storage pool is
configured as 4 TiB with a Premium service level.
4. Select Volumes to view volumes created under the capacity pool. (See preceding screenshot.)
5. Select a volume to view its configuration.
Next steps
Now that you've covered integrating Azure NetApp Files with your Azure VMware Solution workloads, you may
want to learn about:
Resource limits for Azure NetApp Files.
Guidelines for Azure NetApp Files network planning.
Cross-region replication of Azure NetApp Files volumes.
FAQs about Azure NetApp Files.
Use Azure Application Gateway to protect your web
apps on Azure VMware Solution
2/11/2021 • 5 minutes to read • Edit Online
Azure Application Gateway is a layer 7 web traffic load balancer that lets you manage traffic to your web
applications. It's offered in both Azure VMware Solution v1.0 and v2.0. Both versions tested with web apps
running on Azure VMware Solution.
The capabilities include:
Cookie-based session affinity
URL-based routing
Web Application Firewall (WAF)
For a complete list of features, see Azure Application Gateway features.
This article shows you how to use Application Gateway in front of a web server farm to protect a web app
running on Azure VMware Solution.
Topology
The diagram shows how Application Gateway is used to protect Azure IaaS virtual machines (VMs), Azure virtual
machine scale sets, or on-premises servers. Application Gateway treats Azure VMware Solution VMs as on-
premises servers.
IMPORTANT
Azure Application Gateway is currently the only supported method to expose web apps running on Azure VMware
Solution VMs.
The diagram shows the testing scenario used to validate the Application Gateway with Azure VMware Solution
web applications.
The Application Gateway instance is deployed on the hub in a dedicated subnet. It has an Azure public IP
address. Activating Standard DDoS protection for the virtual network is recommended. The web server is hosted
on an Azure VMware Solution private cloud behind NSX T0 and T1 routers. Azure VMware Solution uses
ExpressRoute Global Reach to enable communication with the hub and on-premises systems.
Prerequisites
An Azure account with an active subscription.
An Azure VMware Solution private cloud deployed and running.
4. Add a backend pool of the VMs that run on Azure VMware Solution infrastructure. Provide the details of
web servers that run on the Azure VMware Solution private cloud and select Add . Then select Next:
Configuration> .
5. On the Configuration tab, select Add a routing rule .
6. On the Listener tab, provide the details for the listener. If HTTPS is selected, you must provide a
certificate, either from a PFX file or an existing Azure Key Vault certificate.
7. Select the Backend targets tab and select the backend pool previously created. For the HTTP settings
field, select Add new .
8. Configure the parameters for the HTTP settings. Select Add .
9. If you want to configure path-based rules, select Add multiple targets to create a path-based rule .
10. Add a path-based rule and select Add . Repeat to add more path-based rules.
11. When you have finished adding path-based rules, select Add again; then select Next: Tags> .
12. Add tags and then select Next: Review + Create> .
13. A validation will run on your Application Gateway; if it's successful, select Create to deploy.
Configuration examples
Now we'll configure Application Gateway with Azure VMware Solution VMs as backend pools for the following
use cases:
Hosting multiple sites
Routing by URL
Hosting multiple sites
This procedure shows you how to define backend address pools using VMs running on an Azure VMware
Solution private cloud on an existing application gateway.
NOTE
This procedure assumes you have multiple domains, so we'll use examples of www.contoso.com and www.fabrikam.com.
1. In your private cloud, create two different pools of VMs. One represents Contoso and the second
Fabrikam.
We've used Windows Server 2016 with the Internet Information Services (IIS) role installed. Once the
VMs are installed, run the following PowerShell commands to configure IIS on each of the VMs.
2. In an existing application gateway instance, select Backend pools from the left menu, select Add , and
enter the new pools' details. Select Add in the right pane.
3. In the Listeners section, create a new listener for each website. Enter the details for each listener and
select Add .
4. On the left, select HTTP settings and select Add in the left pane. Fill in the details to create a new HTTP
setting and select Save .
5. Create the rules in the Rules section of the left menu. Associate each rule with the corresponding listener.
Select Add .
6. Configure the corresponding backend pool and HTTP settings. Select Add .
7. Test the connection. Open your preferred browser and navigate to the different websites hosted on your
Azure VMware Solution environment, for example, http://www.fabrikam.com.
Routing by URL
The following steps define backend address pools using VMs running on an Azure VMware Solution private
cloud. The private cloud is on an existing application gateway. You then create routing rules that make sure web
traffic arrives at the appropriate servers in the pools.
1. In your private cloud, create a virtual machine pool to represent the web farm.
Windows Server 2016 with IIS role installed has been used to illustrate this tutorial. Once the VMs are
installed, run the following PowerShell commands to configure IIS for each VM tutorial.
The first virtual machine, contoso-web-01, will host the main website.
The second virtual machine, contoso-web-02, will host the images site.
The third virtual machine, contoso-web-03, will host the video site.
3. In the Listeners section, create a new listener of type Basic using port 8080.
4. On the left navigation, select HTTP settings and select Add in the left pane. Fill in the details to create a
new HTTP setting and select Save .
5. Create the rules in the Rules section of the left menu. Associate each rule with the previously created
listener. Then configure the main backend pool and HTTP settings. Select Add .
6. Test the configuration. Access the application gateway on the Azure portal and copy the public IP address
in the Over view section.
a. Open a new browser window and enter the URL http://<app-gw-ip-address>:8080 .
This article walks through the steps of how to integrate Azure Traffic Manager with Azure VMware Solution. The
integration balances application workloads across multiple endpoints. This article also walks through the steps
of how to configure Traffic Manager to direct traffic between three Azure Application Gateway spanning several
Azure VMware Solution regions.
The gateways have Azure VMware Solution virtual machines (VMs) configured as backend pool members to
load balance the incoming layer 7 requests. For more information, see Use Azure Application Gateway to protect
your web apps on Azure VMware Solution
The diagram shows how Traffic Manager provides load balancing for the applications at the DNS level between
regional endpoints. The gateways have backend pool members configured as IIS Servers and referenced as
Azure VMware Solution external endpoints. Connection over the virtual network between the two private cloud
regions uses an ExpressRoute gateway.
Before you begin, first review the Prerequisites and then we'll walk through the procedures to:
Verify configuration of your application gateways and the NSX-T segment
Create your Traffic Manager profile
Add external endpoints into your Traffic Manager profile
Prerequisites
Three VMs configured as Microsoft IIS Servers running in different Azure VMware Solution regions:
West US
West Europe
East US (on-premises)
An application gateway with external endpoints in the Azure VMware Solution regions mentioned above.
Host with internet connectivity for verification.
An NSX-T network segment created in Azure VMware Solution.
3. Select Backend pools to verify the configuration of one of the backend pools. You see one VM backend
pool member configured as a web server with an IP address of 172.29.1.10.
4. Verify the configuration of the other application gateways and backend pool members.
2. Select Tier-1 Gateways to see a list of Tier-1 gateways with the number of linked segments.
3. Select the segment linked to Contoso-T01. A window opens showing the logical interface configured on
the Tier-01 router. It serves as a gateway to the backend pool member VM connected to the segment.
4. In the vSphere client, select the VM to view its details.
NOTE
Its IP address matches VM backend pool member configured as a web server from the preceding section:
172.29.1.10.
5. Select the VM, then select ACTIONS > Edit Settings to verify connection to the NSX-T segment.
4. Paste the DNS name URL in a browser. The screenshot shows traffic directing to the West Europe region.
5. Refresh your browser. The screenshot shows traffic directing to another set of backend pool members in
the West US region.
6. Refresh your browser again. The screenshot shows traffic directing to the final set of backend pool
members on-premises.
Next steps
Now that you've covered integrating Azure Traffic Manager with Azure VMware Solution, you may want to learn
about:
Using Azure Application Gateway on Azure VMware Solution.
Traffic Manager routing methods.
Combining load-balancing services in Azure.
Measuring Traffic Manager performance.
Set up vRealize Operations for Azure VMware
Solution
2/11/2021 • 3 minutes to read • Edit Online
vRealize Operations Manager is an operations management platform that allows VMware infrastructure
administrators to monitor system resources. These system resources could be application-level or infrastructure
level (both physical and virtual) objects. Most VMware administrators have used vRealize Operations to monitor
and manage the VMware private cloud components – vCenter, ESXi, NSX-T, vSAN, and VMware HCX. Each
provisioned Azure VMware Solution private cloud includes a dedicated vCenter, NSX-T, vSAN, and HCX
deployment.
Thoroughly review Before you begin and Prerequisites first. Then, we'll walk you through the two typical
deployment topologies:
On-premises vRealize Operations managing Azure VMware Solution deployment
vRealize Operations running on Azure VMware Solution deployment
Prerequisites
vRealize Operations Manager installed.
A VPN or an Azure ExpressRoute configured between on-premises and Azure VMware Solution SDDC.
An Azure VMware Solution private cloud has been deployed in Azure.
TIP
Refer to the VMware documentation for step-by-step guide for installing vRealize Operations Manager.
IMPORTANT
This option isn't currently supported by VMware.
Once the instance has been deployed, you can configure vRealize Operations to collect data from vCenter, ESXi,
NSX-T, vSAN, and HCX.
Known limitations
The cloudadmin@vsphere.local user in Azure VMware Solution has limited privileges. Virtual machines
(VMs) on Azure VMware Solution doesn't support in-guest memory collection using VMware tools. Active
and consumed memory utilization continues to work in this case.
Workload optimization for host-based business intent doesn't work because Azure VMware Solutions
manage cluster configurations, including DRS settings.
Workload optimization for the cross-cluster placement within the SDDC using the cluster-based business
intent is fully supported with vRealize Operations Manager 8.0 and onwards. However, workload
optimization isn't aware of resource pools and places the VMs at the cluster level. A user can manually
correct it in the Azure VMware Solution vCenter Server interface.
You can't sign in to vRealize Operations Manager using your Azure VMware Solution vCenter Server
credentials.
Azure VMware Solution doesn't support the vRealize Operations Manager plugin.
When you connect the Azure VMware Solution vCenter to vRealize Operations Manager using a vCenter Server
Cloud Account, you'll see a warning:
The warning occurs because the cloudadmin@vsphere.local user in Azure VMware Solution doesn't have
sufficient privileges to do all vCenter Server actions required for registration. However, the privileges are
sufficient for the adapter instance to do data collection, as seen below:
For more information, see Privileges Required for Configuring a vCenter Adapter Instance.
Deploy Horizon on Azure VMware Solution
2/11/2021 • 11 minutes to read • Edit Online
NOTE
This document focuses on the VMware Horizon product, formerly known as Horizon 7. Horizon is a different solution than
Horizon Cloud on Azure, although there are some shared components. Key advantages of the Azure VMware Solution
include both a more straightforward sizing method and the integration of VMware Cloud Foundation management into
the Azure portal.
VMware Horizon®, a virtual desktop and applications platform, run in the data center and provides simple and
centralized management. It delivers virtual desktops and applications on any device, anywhere. Horizon lets you
create and broker connections to Windows and Linux virtual desktops, Remote Desktop Server (RDS) hosted
applications, desktops, and physical machines.
Here, we focus specifically on deploying Horizon on Azure VMware Solution. For general information on
VMware Horizon, refer to the Horizon production documentation:
What is VMware Horizon?
Learn more about VMware Horizon
Horizon Reference Architecture
With Horizon's introduction on Azure VMware Solution, there are now two Virtual Desktop Infrastructure (VDI)
solutions on the Azure platform. The following diagram summarizes the key differences at a high level.
Horizon 2006 and later versions on the Horizon 8 release line supports both on-premises deployment and
Azure VMware Solution deployment. There are a few Horizon features that are supported on-premises but not
on Azure VMware Solution. Additional products in the Horizon ecosystem are also supported. For for
information, see feature parity and interoperability.
IMPORTANT
CPA is not a stretched deployment; each Horizon pod is distinct, and all Connection Servers that belong to each of the
individual pods are required to be located in a single location and run on the same broadcast domain from a network
perspective.
Like on-premises or private data center, Horizon can be deployed in an Azure VMware Solution private cloud.
We'll discuss key differences in deploying Horizon on-premises and on Azure VMware Solution in the following
sections.
The Azure private cloud is conceptually the same as the VMware SDDC, a term typically used in Horizon
documentation. The rest of this document uses the terms Azure private cloud and VMware SDDC
interchangeable.
The Horizon Cloud Connector is required for Horizon on Azure VMware Solution to manage subscription
licenses. Cloud Connector can be deployed in Azure Virtual Network alongside Horizon Connection Servers.
IMPORTANT
Horizon Control Plane support for Horizon on Azure VMware Solution is not yet available. Be sure to download the VHD
version of Horizon Cloud Connector.
IMPORTANT
CBRC must not be turned back on.
NOTE
Azure VMware Solution automatically configures specific Horizon settings as long as you deploy Horizon 2006 (aka
Horizon 8) and above on the Horizon 8 branch and select the Azure option in the Horizon Connection Server installer.
NOTE
Your workload profile and needs may be different, and therefore results may vary based on your use case. User Data
volumes may lower scale limits in the context of your workload. Size and plan your deployment accordingly. For more
information, see the sizing guidelines in the Size Azure VMware Solution hosts for Horizon deployments section.
Given the Azure private cloud and SDDC max limit, we recommend a deployment architecture where the
Horizon Connection Servers and VMware Unified Access Gateways (UAGs) are running inside the Azure Virtual
Network. It effectively turns each Azure private cloud and SDDC into a block. In turn, maximizing the scalability
of Horizon running on Azure VMware Solution.
The connection from Azure Virtual Network to the Azure private clouds / SDDCs should be configured with
ExpressRoute FastPath. The following diagram shows a basic Horizon pod deployment.
A single Horizon pod is the most straight forward deployment scenario because you deploy just one Horizon
pod in the US East region. Since each private cloud and SDDC is estimated to handle 4,000 desktop sessions,
you deploy the maximum Horizon pod size. You can plan the deployment of up to three private clouds/SDDCs.
With the Horizon infrastructure virtual machines (VMs) deployed in Azure Virtual Network, you can reach the
12,000 sessions per Horizon pod. The connection between each private cloud and SDDC to the Azure Virtual
Network is ExpressRoute Fast Path. No east-west traffic between private clouds is needed.
Key assumptions for this basic deployment example include that:
You don't have an on-premises Horizon pod that you want to connect to this new pod using Cloud Pod
Architecture (CPA).
End users connect to their virtual desktops through the internet (vs. connecting via an on-premises data
center).
You connect your AD domain controller in Azure Virtual Network with your on-premises AD through VPN or
ExpressRoute circuit.
A variation on the basic example might be to support connectivity for on-premises resources. For example,
users access desktops and generate virtual desktop application traffic or connect to an on-premises Horizon pod
using CPA.
The diagram shows how to support connectivity for on-premises resources. To connect to your corporate
network to the Azure Virtual Network, you'll need an ExpressRoute circuit. You'll also need to connect your
corporate network with each of the private cloud and SDDCs using ExpressRoute Global Reach. It allows the
connectivity from the SDDC to the ExpressRoute circuit and on-premises resources.
Multiple Horizon pods on Azure VMware Solution across multiple regions
Another scenario is scaling Horizon across multiple pods. In this scenario, you deploy two Horizon pods in two
different regions and federate them using CPA. It's similar to the network configuration in the previous example,
but with some additional cross-regional links.
You'll connect the Azure Virtual Network in each region to the private clouds/SDDCs in the other region. It
allows Horizon connection servers part of the CPA federation to connect to all desktops under management.
Adding additional private clouds/SDDCs to this configuration would allow you to scale to 24,000 sessions
overall.
The same principles apply if you deploy two Horizon pods in the same region. Make sure to deploy the second
Horizon pod in a separate Azure Virtual Network. Just like the single pod example, you can connect your
corporate network and on-premises pod to this multi-pod/region example using ExpressRoute and Global
Reach.
Size Azure VMware Solution hosts for Horizon deployments
Horizon's sizing methodology on a host running in Azure VMware Solution is simpler than Horizon on-
premises. That's because the Azure VMware Solution host is standardized. Exact host sizing helps determine the
number of hosts needed to support your VDI requirements. It's central to determining the cost-per-desktop.
Sizing tables
Specific vCPU/vRAM requirements for Horizon virtual desktops depend on the customer’s specific workload
profile. Work with your MSFT and VMware sales team to help determine your vCPU/vRAM requirements for
your virtual desktops.
V
R
V A
C M
P P IN
U E S
P R T 10 20 30 40 50 60 70 80 90 10 20 30 40 50 60 64
E V A 0 0 0 0 0 0 0 0 0 00 00 00 00 00 00 00
R M N V V V V V V V V V V V V V V V V
V (G C M M M M M M M M M M M M M M M M
M B) E S S S S S S S S S S S S S S S S
2 3. A 3 3 4 4 5 6 6 7 8 9 1 2 3 4 4 5
5 V 7 5 3 1 9 3
S
2 4 A 3 3 4 5 6 6 7 8 9 9 1 2 3 4 5 5
V 8 6 4 2 1 4
S
2 6 A 3 4 5 6 7 9 1 1 1 1 2 3 5 6 7 7
V 0 1 2 3 6 8 1 2 5 9
S
2 8 A 3 5 6 8 9 1 1 1 1 1 3 5 6 8 1 1
V 1 2 4 6 8 4 1 7 4 0 0
S 0 6
V
R
V A
C M
P P IN
U E S
P R T 10 20 30 40 50 60 70 80 90 10 20 30 40 50 60 64
E V A 0 0 0 0 0 0 0 0 0 00 00 00 00 00 00 00
R M N V V V V V V V V V V V V V V V V
V (G C M M M M M M M M M M M M M M M M
M B) E S S S S S S S S S S S S S S S S
2 1 A 4 6 9 1 1 1 1 2 2 2 5 7 1 1 1 1
2 V 1 3 6 9 1 3 6 1 5 0 2 4 5
S 0 4 9 8
2 1 A 5 8 1 1 1 2 2 2 3 3 6 1 1 1 1 2
6 V 1 4 8 1 4 7 0 4 7 0 3 6 9 1
S 0 3 5 8 1
4 3. A 3 3 4 5 6 7 8 9 1 1 2 3 4 5 6 7
5 V 0 1 2 3 4 5 6 0
S
4 4 A 3 3 4 5 6 7 8 9 1 1 2 3 4 5 6 7
V 0 1 2 3 4 5 6 0
S
4 6 A 3 4 5 6 7 9 1 1 1 1 2 3 5 6 7 7
V 0 1 2 3 6 8 1 2 5 9
S
4 8 A 3 5 6 8 9 1 1 1 1 1 3 5 6 8 1 1
V 1 2 4 6 8 4 1 7 4 0 0
S 0 6
4 1 A 4 6 9 1 1 1 1 2 2 2 5 7 1 1 1 1
2 V 1 3 6 9 1 3 6 1 5 0 2 4 5
S 0 4 9 8
4 1 A 5 8 1 1 1 2 2 2 3 3 6 1 1 1 1 2
6 V 1 4 8 1 4 7 0 4 7 0 3 6 9 1
S 0 3 5 8 1
6 3. A 3 4 5 6 7 9 1 1 1 1 2 4 5 6 8 8
5 V 0 1 3 4 7 1 4 8 1 6
S
6 4 A 3 4 5 6 7 9 1 1 1 1 2 4 5 6 8 8
V 0 1 3 4 7 1 4 8 1 6
S
6 6 A 3 4 5 6 7 9 1 1 1 1 2 4 5 6 8 8
V 0 1 3 4 7 1 4 8 1 6
S
6 8 A 3 5 6 8 9 1 1 1 1 1 3 5 6 8 1 1
V 1 2 4 6 8 4 1 7 4 0 0
S 0 6
V
R
V A
C M
P P IN
U E S
P R T 10 20 30 40 50 60 70 80 90 10 20 30 40 50 60 64
E V A 0 0 0 0 0 0 0 0 0 00 00 00 00 00 00 00
R M N V V V V V V V V V V V V V V V V
V (G C M M M M M M M M M M M M M M M M
M B) E S S S S S S S S S S S S S S S S
6 1 A 4 6 9 1 1 1 1 2 2 2 5 7 1 1 1 1
2 V 1 3 6 9 1 3 6 1 5 0 2 4 5
S 0 4 9 8
6 1 A 5 8 1 1 1 2 2 2 3 3 6 1 1 1 1 2
6 V 1 4 8 1 4 7 0 4 7 0 3 6 9 1
S 0 3 5 8 1
8 3. A 3 4 6 7 9 1 1 1 1 1 3 4 6 8 9 1
5 V 0 2 4 5 7 3 9 6 2 8 0
S 5
8 4 A 3 4 6 7 9 1 1 1 1 1 3 4 6 8 9 1
V 0 2 4 5 7 3 9 6 2 8 0
S 5
8 6 A 3 4 6 7 9 1 1 1 1 1 3 4 6 8 9 1
V 0 2 4 5 7 3 9 6 2 8 0
S 5
8 8 A 3 5 6 8 9 1 1 1 1 1 3 5 6 8 1 1
V 1 2 4 6 8 4 1 7 4 0 0
S 0 6
8 1 A 4 6 9 1 1 1 1 2 2 2 5 7 1 1 1 1
2 V 1 3 6 9 1 3 6 1 5 0 2 4 5
S 0 4 9 8
8 1 A 5 8 1 1 1 2 2 2 3 3 6 1 1 1 1 2
6 V 1 4 8 1 4 7 0 4 7 0 3 6 9 1
S 0 3 5 8 1
IMPORTANT
Customer workloads will vary from this example of a LoginVSI Knowledge Worker. As a part of planning your deployment,
work with your VMware EUC SEs for your specific sizing and performance needs. Be sure to run your own performance
testing using the actual, planned workload before finalizing host sizing and adjust accordingly.
Next steps
To learn more about VMware Horizon on Azure VMware Solution, read the VMware Horizon FAQ.
Backup solutions for Azure VMware Solution virtual
machines (VMs)
2/11/2021 • 2 minutes to read • Edit Online
A key principle of Azure VMware Solution is to enable you to continue to use your investments and your
favorite VMware solutions running on Azure. Independent software vendor (ISV) technology support, validated
with Azure VMware Solution, is an important part of this strategy.
Our backup partners have industry-leading backup and restore solutions in VMware-based environments.
Customers have widely adopted these solutions for their on-premises deployments. Now these partners have
extended their solutions to Azure VMware Solution, using Azure to provide a backup repository and a storage
target for long-term retention and archival.
Backup network traffic between Azure VMware Solution VMs and the backup repository in Azure travels over a
high-bandwidth, low-latency link. Replication traffic across regions travels over the internal Azure backplane
network, which lowers bandwidth costs for users.
You can find more information on these backup solutions here:
Commvault
Veritas
Veeam
Open a support request for an Azure VMware
Solution deployment or provisioning failure
2/11/2021 • 3 minutes to read • Edit Online
This article shows you how to open a support request and provide key information for an Azure VMware
Solution deployment or provisioning failure.
When you have a failure on your private cloud, you need to open a support request in the Azure portal. To open
a support request, first get some key information in the Azure portal:
Correlation ID
Azure ExpressRoute circuit ID
Error messages
3. To find the failed deployment and its correlation ID, search for the name of the resource or other
information that you used to create the resource.
The following example shows search results for a private cloud resource named pc03.
4. In the search results in the Activity log pane, select the operation name of the failed deployment.
5. In the Create or update a PrivateCloud pane, select the JSON tab, and then look for correlationId in
the log that is shown. Copy the correlationId value to include it in your support request.