I have a VM which have a network adapter called 'Ethernet'.
When I create an image from this VM, any VM that I create from that image have only one network adapter named 'Ethernet 2'.
How can I force it have the same network adapter name?
Thank you very much for your help!
This is expected behavior. Network adapter would also change if your VM is healed (i.e. the underlying hardware fails and your image is re-instantiated on a new one). This will also happen if you scale the VM (change the VM size). Changing the name of the network adapter also would happen sometimes when you shutdown the VM (from the portal, which would also de-allocate resources).
Even if the above mentioned limitations are fixed (today, or in the future). I would not rely on using specific name for the adapter in my application.
Even with the recently added feature to have multiple NICs, as described here, you cannot influence the name of the NIC which the OS uses:
The interface name must be unique for the VM, but does not represent
the names of the NICs inside the VM.
It is important to know that the settings for the NIC you dictate from your Virtual Network setup (DNS, IP Address, Subnet Mask) are guaranteed to be taken by your VM. So why the need for specific network adapter name. Also, keep in mind that you should never manually change the network settings inside an Azure VM.
Related
I created a VM in HyperV and modified it to be a DLP machine.
I saved the machine's disk and uploaded it to Azure on a new VM and when I tried to connect a Network Interface to the VM it didn't work, I could do that and it seemed as if it worked but when went to Networking it said:
This network interface does not contain network security groups
Which basically means it didn't set anything, also when tried to add a new NIC (Network Interface) for the third time the following error was given:
Failed to attach network interface 'Dlp-machine-NetworkINT' to virtual machine 'Dlp-machine'. Error: The number of network interfaces for virtual machine Dlp-machine exceeds the maximum allowed for the virtual machine size Standard_D2s_v3. The number of network interfaces is 3 and the maximum allowed is 2.
So it seems like the former NICs were saved but were not really applied or used.
I came to realize that what's the problem is that since the VM is using a local disk it's configured to use the local NIC.
Anyone has encountered something like this when uploading a local disk to Azure and knows what to do?
What the second error says is that your VM is limited to only 2 NICs by its SKU. You should use Standard_D8s_v3 (or some other SKU) to allow to use 4 NICs
https://learn.microsoft.com/en-us/azure/virtual-machines/windows/sizes-general#dsv3-series-1
I need to have all the macaddress same for all the VMs that come up in a VMSS.
They can be either just changing the registry entry when the VMs come up.
Can someone help me with that? Also would that change have any impact in terms of network/security of VMs in VNET even if they are behind load balancer?
MAC Addresses are designed to uniquely identify a network interface in a computer Network.
Having duplicate MAC Addresses in a computer network would cause the network to malfunction (or at least one of the network interfaces will be kicked out and not able to communicate with the network).
The requirement to have same MAC Addresses is fundamentally wrong and shows intent to abuse either software licences that are bound to MAC Address, or some malicious network activity.
If you state your question more detailed (why the requirement for same MAC Addresses, what is the base architecture of the solution) maybe we will be able to help you.
What you can do to implement this approach is create a separate subnet within you Azure VNet for Licensing and then add a second NIC that is bound to that Subnet, then set the MAC addresses as you see fit there. This allows you to have normal network connectivity on your primary NIC and the Licenses can be on the MACs associated on the secondary NIC. This approach is laid out in this blog post by Francois DelPort: https://www.francoisdelport.com/2015/10/change-the-mac-address-on-your-azure-vm/
I've just created a "new" virtual machine in Windows Azure. I say "new" because there is a "Virtual Machine (classic)" option.
The "new" virtual machine is not accesible by the "old" https://manage.windowsazure.com, it's only accesible by the "new" https://portal.azure.com
My problem is that I've expent a couple of days configuring the "new" Virtual Machine and now I want to open the port 80... but I don't find the "endpoint" configuration!!
I've been looking for it many hours :S
Any clues?
Azure Resource Managed VMs now use the concept of Network adapters, Virtual Networks and Security Groups to manage ingress, egress from a machine.
A virtual machine has a network adapter attached, the adapter is placed within a subnet within a virtual network. A security group can then be placed against the subnet and / or the network adapter.
The network adapter can optionally have a publically accessible address bound to it. Either dynamically or statically bound (i.e. if you take a fixed address, you will be charged for it for when the machine isn't running)
I'm not entirely sure its possible to create a security group via the portal (at least I couldn't find any option for it when I just (albeit briefly) looked.
However you can use New-AzureNetworkSecurityGroup to create a security group and then attach it to your Nic through the portal and also configure the security policy. Which you get to via -
Virtual machines -> VNMame-> Settings -> Network interfaces -> NicName -> Choose network security group
It is a little more complicated than the previous method, but once you're used to it it is a lot more flexible.
Edited to add
Depending on your config, you might need to a public IP address attaching also - use New-AzurePublicIpAddress
It's all good. The get-help wasn't up to date and optional params are actually needed. Just make sure to use all params
I have created an Azure virtual network with a specific address space - 10.0.0.0/8. I created a subnet beneath it, 10.10.0.0/16, and added several machines to this subnet, including a PDC and a BDC, which are also acting as DNS servers.
Unfortunately, that is not exactly what I meant to do, I meant to create the address space as 10.10.0.0/16, with the intent of connecting it to some other virtual networks using S2S VPN gateways. The other virtual networks are set up using address spaces configured as: 10.x.0.0/16
To rectify the situation, based on what I could find here and on MSDN, I created a new virtual network in the same region with the correct address space (10.10.0.0/16), then deleted the VMs in the old virtual network (but left the VHDs) and recreated the VMs in the new virtual network using the old VHDs.
This seems to be working as expected. Now I am down to the domain controllers and one other machine. Will there be any issues with following the same process to move a domain controller? I realize the system GUID will be different, but was not sure if this impacts anything relative to AD and the DNS servers.
TIA for you help.
Looks like no impacts from the AD perspectives. From a DNS perspective, Azure assigned IP addresses to the machines in the order that they were restarted, so to avoid confusing DNS, I restarted the VMs in order of increasing IP address.
Needed to make sure SQL Server data volumes were attached before starting the machine, otherwise the database would show as being in a pending recovery state.
Also, apps that depend on MAC address (such as some license servers) did require new license files, as the MAC address changed.
I was trying to change the network numbers address of my Virtual machine on Azure to be in same network rang as another Virtual machine on Azure pool, once I click save on network card, it freezes & became not accessible with Remote Desktop or any other way.
Please Help.
NEVER try to manually change the NIC. The NIC is still owned by the Windows Azure fabric and when you manually make changes, the fabric interprets it as an attempt to bypass its network security measure. You should be able to get access to the VM back by removing and re-adding the VM (when you remove it, be sure not to remove its disks then you can re-provision it from those same disks).
If you're trying to adjust network address spaces (subnets?), you may want to look at using an Azure virtual network to help group VMs together. While this still won't guarantee a fixed internal IP address, it will give you a degree of predictability.