You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+43Lines changed: 43 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -1257,6 +1257,8 @@ Follow the steps to test failover manually:
1257
1257
1258
1258
You should be able to access Admin Server and have the same domain configuration as that runs on adminVM.
1259
1259
1260
+
You are able to automate assigning secondary IP using [AssignIP-Workflow.ps1](#scripts/AssignIP-Workflow.ps1) in Automation Account. Follow [Azure Automation Account](https://docs.microsoft.com/en-us/azure/automation/automation-create-standalone-account?tabs=azureportal) to create Runbook and configure credentials. The script is using user managed identity, you must assign at least **Contributor** role to the user identity.
1261
+
1260
1262
### Use Azure Site Recovery
1261
1263
1262
1264
Azure Site Recovery will back up the disk of VM once you enable and protect the replica, you need not move the domain configuration to shared storage.
@@ -1304,6 +1306,47 @@ It takes about 15 min to complete the failover steps. You still need to assign t
1304
1306
- Assign secondary IP to target adminVM: go to Azure Portal -> open target adminVM ->select**Settings** ->select**Networking** -> open the network interface ->select**Settings** ->select**IP Configurations** -> Add `ipconfig2` with static IP address, here is `10.0.0.16`.
1305
1307
- Wait for Admin Server ready.
1306
1308
1309
+
You have to commit the failover after Admin Server is up: Select Protected items -> Replicated istems -> adminVM -> commit.
1310
+
1311
+
#### Custom recovery plan
1312
+
1313
+
You are able to automate above step with a custom recovery plan.
1314
+
1315
+
Before creating a custom plan, you're required to have a Automation Account in a different region:
1316
+
1317
+
- Follow [Create a standalone Azure Automation account](https://docs.microsoft.com/en-us/azure/automation/automation-create-standalone-account?tabs=azureportal) to create an automation account in West US.
1318
+
- Follow [Create a user-assigned managed identity](https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity) to create a user-assigned managed identity, and grant it with subscription **Contributor** role.
1319
+
- Modify [AssignIP-Workflow.ps1](#scripts/AssignIP-Workflow.ps1) with your values, and import it as a runbook to the automation account.
1320
+
- Publish the runbook.
1321
+
1322
+
Now you are ready to create a custom plan:
1323
+
1324
+
- Go to recovery service vault from Azure Portal.
1325
+
- Select Manage - Recovery Plans -> Add Recovery plan
1326
+
- Name: WLSAdminZone2ZoneRecovery
1327
+
- Source: East US
1328
+
- Check "Select this check box if you would like to failover machines across zones within the same region"
1329
+
- Source zone: 1
1330
+
- Target zone: 3
1331
+
- Allow items with deployment model: Resource Manager
1332
+
- Selected items: select adminVM
1333
+
- Click Create
1334
+
1335
+
After the plan is completed, open the plan, you will find **Customize** button, hit that button and add a post action to group 1.
1336
+
1337
+
Steps to add post action to group 1:
1338
+
1339
+
- Name: Assign-IP
1340
+
- Automation account name: select the automation account created previously.
1341
+
- Runbook name: AssignIP-Workflow.
1342
+
- Click OK.
1343
+
1344
+
Save the recovery plan. The plan is able to assign IP to target VM automatically.
1345
+
1346
+
Open the plan and click failover, the plan will provison and start target machine in the target resource group. You have to commit the failover after Admin Server is up: Select the plan and click **Commit**.
1347
+
1348
+
Please note that, if you fail back from target machine to source machine, you have to assign IP maunaully, the plan will not trigger the post action for **Re-protect**.
0 commit comments