Azure Notes
Azure Notes
IAAS NOTES
MAHESH MALLARAPU
IGROW TECHONOLOGIES
82, Maruthi Nagar Main Rd, Old Madiwala, Chikka Madivala,
1st Stage, BTM Layout, Bengaluru, Karnataka 560068, India
9738566679 / [email protected]
Contents
Azure Network Topologies ............................................................................................................................ 2
Azure Virtual Network................................................................................................................................... 3
Azure Virtual Machines ................................................................................................................................. 4
Azure VM sku’s .............................................................................................................................................. 6
Azure VM networking ................................................................................................................................... 7
Azure Bastion ................................................................................................................................................ 9
Azure Virtual Machine Scale Sets (VMSS) ................................................................................................... 10
Fault Domains and Update Domains .......................................................................................................... 11
Azure Backup and Azure Recovery Services Vault ...................................................................................... 12
Azure backup policies.................................................................................................................................. 14
Azure Site Recovery..................................................................................................................................... 16
Azure Active Directory (AAD) ...................................................................................................................... 17
Azure Storage .............................................................................................................................................. 19
Azure Storage sku’s ..................................................................................................................................... 20
Azure Storage Networking .......................................................................................................................... 22
Azure load balancer .................................................................................................................................... 24
Azure Load balancer sku’s ........................................................................................................................... 25
Azure Application Gateway sku’s ................................................................................................................ 26
Azure Firewall.............................................................................................................................................. 27
Azure Firewall sku’s ..................................................................................................................................... 29
Azure Private End Point ............................................................................................................................... 30
Azure Network Topologies
In Azure, there are several network topologies that you can implement depending on your
requirements for connectivity, redundancy, and security. Some common topologies include:
1. Hub and Spoke Topology: This is a centralized network architecture where a central
"hub" virtual network is connected to multiple "spoke" virtual networks. Resources
within each spoke can communicate with resources in other spokes via the hub. This
topology is useful for centralizing network management and implementing shared
services or security policies.
2. Flat Network Topology: In this topology, all resources are connected to a single virtual
network without any segmentation into subnets or spokes. This is the simplest network
topology but may not be suitable No index entries found.for larger deployments where
segmentation and isolation are required for security or organizational reasons.
3. Multi-Tier Application Topology: This topology segregates resources into multiple tiers
(e.g., web, application, database) within the same virtual network or across multiple
virtual networks. Each tier may have its own subnet and security groups, allowing for
isolation and control over traffic flow between tiers.
4. Hybrid Network Topology: This involves connecting on-premises networks to Azure
virtual networks, either through VPN or ExpressRoute connections. This topology allows
for seamless integration of on-premises resources with cloud resources, enabling hybrid
cloud deployments.
5. Transit Network Topology: In this topology, a dedicated transit virtual network is used to
route traffic between multiple virtual networks. This approach can simplify network
connectivity and reduce the number of VPN or ExpressRoute connections required in a
hub-and-spoke architecture.
6. Microsegmentation Topology: This topology involves dividing a virtual network into
smaller segments or subnets based on workload characteristics, application
requirements, or security policies. Each segment may have its own security groups and
policies, allowing for fine-grained control over network traffic.
7. Geographically Redundant Topology: This involves deploying resources across multiple
Azure regions to achieve high availability and disaster recovery. Traffic can be routed to
the closest region using Azure Traffic Manager or Azure Front Door, and resources can be
replicated across regions using Azure Site Recovery or other replication mechanisms.
These are just a few examples of network topologies that can be implemented in Azure. The
optimal topology for your deployment will depend on factors such as your application
architecture, performance requirements, security policies, and budget constraints.
Azure Virtual Network
Azure Virtual Network (VNet) is a fundamental building block of Azure networking. It enables
you to create your isolated network in the Azure cloud, similar to how you would set up a
traditional network in your on-premises data center. Azure VNets allow you to securely connect
Azure resources, such as virtual machines (VMs), to each other, to the internet, and to on-
premises networks.
Key features and components of Azure Virtual Network include:
1. Subnets: You can divide a VNet into multiple subnets to organize and segregate your
resources. Subnets can be used to group similar resources together and enforce network
security boundaries.
2. Address Space: Each VNet is associated with an IP address space, which defines the
range of IP addresses that can be assigned to resources within the VNet. You can choose
private IP address ranges according to your requirements.
3. Network Security Groups (NSGs): NSGs are stateful packet filters that allow you to
control inbound and outbound traffic to network interfaces (NICs), VMs, and subnets.
You can define rules to permit or deny traffic based on source and destination IP
addresses, ports, and protocols.
4. Virtual Network Peering: This feature enables connecting VNets within the same Azure
region securely. Once peered, resources in the peered VNets can communicate with
each other, leveraging the Azure backbone network.
5. VPN Gateway: Azure VPN Gateway allows you to establish secure, encrypted
connections between your Azure VNets and on-premises networks or other VNets across
the internet. It supports site-to-site VPN and point-to-site VPN connectivity.
6. ExpressRoute: ExpressRoute provides dedicated private connectivity between your on-
premises network and Azure data centers, bypassing the public internet. It offers higher
reliability, lower latency, and higher security compared to VPN connections.
7. Azure Bastion: Azure Bastion is a fully managed PaaS service that provides secure and
seamless RDP and SSH access to VMs directly from the Azure portal over SSL. It
eliminates the need to expose VMs to the public internet.
8. Local Network gateway: A Local Network Gateway (LNG) in Azure represents the on-
premises location or network site. It acts as the counterpart to the Azure Virtual
Network Gateway, enabling secure communication between your on-premises network
and Azure resources via VPN or ExpressRoute connections. To create a Local Network
Gateway in Azure, you typically need to provide details such as the public IP address of
your on-premises VPN device and the address space of your on-premises network.
Azure VM sku’s
In Azure, SKU (Stock Keeping Unit) refers to a specific version or configuration of
a service or resource. For Azure Virtual Machines (VMs), the SKU determines the
VM's size, hardware configuration, performance characteristics, and pricing. Each
SKU represents a different combination of CPU, memory, disk, and network
resources.
Azure VM SKUs are categorized into several families based on their
characteristics and intended use cases. Some common VM families include:
1. General Purpose: General-purpose VMs offer a balanced ratio of CPU to memory and are
suitable for a wide range of workloads, including development and testing, small to
medium databases, and low to moderate traffic web servers.
2. Compute Optimized: Compute-optimized VMs prioritize CPU performance over memory
and are ideal for CPU-intensive workloads such as batch processing, gaming servers, and
application servers that require high computational power.
3. Memory Optimized: Memory-optimized VMs provide a higher ratio of memory to CPU
and are designed for memory-intensive workloads such as big data analytics, in-memory
databases, caching, and enterprise applications with large memory requirements.
4. Storage Optimized: Storage-optimized VMs are optimized for high disk throughput and
provide local SSD storage for data-intensive workloads such as large databases, data
warehousing, and data analytics.
5. GPU: GPU-enabled VMs are equipped with graphical processing units (GPUs) and are
suitable for graphics-intensive workloads, machine learning, artificial intelligence (AI),
video rendering, and other GPU-accelerated applications.
6. High Performance Compute (HPC): HPC VMs offer high CPU and memory performance
for compute-intensive scientific and engineering simulations, financial modeling, and
other HPC workloads.
Each Azure VM SKU is identified by a combination of series, size, and tier. For
example, the SKU "Standard_DS2_v2" refers to a Standard series VM with a DS
size and v2 tier.
Azure VM networking
Azure VM (Virtual Machine) Network refers to the networking configuration and capabilities
associated with virtual machines deployed in Microsoft Azure. Azure VMs require network
connectivity to communicate with other resources within Azure, such as other VMs, Azure
services, and the internet. Here are some key aspects of Azure VM networking:
1. Virtual Network (VNet):
Azure VMs are typically deployed within a Virtual Network (VNet), which serves
as an isolated and customizable network environment in Azure.
VNets provide segmentation, isolation, and control over network traffic between
Azure resources, allowing you to define subnets, IP address ranges, and network
security policies.
Azure VNets support both IPv4 and IPv6 addressing schemes and allow you to
establish peering connections or VPN gateways for connecting VNets across
different regions or with on-premises networks.
2. Network Interfaces:
Each Azure VM is associated with one or more network interfaces (NICs), which
connect the VM to the underlying VNet and enable network communication.
Network interfaces can have public IP addresses for internet access or private IP
addresses for internal communication within the VNet.
Azure VMs can have multiple network interfaces for scenarios such as network
virtual appliances (NVAs), load balancing, or multi-tier application architectures.
3. IP Addressing:
Azure VMs can have both public IP addresses and private IP addresses assigned
to their network interfaces.
Public IP addresses allow VMs to communicate with the internet and can be
dynamic or static (reserved).
Private IP addresses are used for internal communication within the VNet and
are assigned from the subnet's IP address range.
4. Network Security Groups (NSGs):
Network Security Groups are stateful firewall-like security policies that allow you
to control inbound and outbound traffic to Azure VMs.
NSGs are applied at the subnet or network interface level and enable you to
define rules based on source/destination IP addresses, ports, and protocols.
NSGs provide granular control over network traffic and help enforce security
policies to protect Azure VMs from unauthorized access or attacks.
5. Load Balancing:
Azure offers load balancing services such as Azure Load Balancer and Azure
Application Gateway for distributing incoming network traffic across multiple VM
instances.
Load balancers improve the availability, scalability, and reliability of applications
by evenly distributing traffic and detecting unhealthy endpoints for failover.
6. Traffic Routing:
Azure VMs can communicate with other Azure resources and external networks
using various routing mechanisms, including user-defined routes (UDRs), Azure
route tables, and Azure Firewall.
Routing configurations define how network traffic is routed between Azure
resources, VNets, subnets, and on-premises networks.
Azure VM networking provides the foundation for building and deploying applications in the
cloud, allowing you to establish secure and scalable network architectures for diverse workloads
and use cases. Understanding Azure VM network configuration options and best practices is
essential for designing resilient and efficient cloud solutions.
Azure Bastion
Azure Bastion is a fully managed Platform as a Service (PaaS) offering from Microsoft Azure that
provides secure and seamless RDP and SSH access to virtual machines (VMs) deployed in Azure
without exposing them to the public internet. Azure Bastion acts as a jump server or bastion
host within your Azure Virtual Network (VNet), enabling secure remote access to VMs over
Remote Desktop Protocol (RDP) and Secure Shell (SSH) protocols. Here are some key aspects of
Azure Bastion:
1. Secure Remote Access:
Azure Bastion provides secure and private access to Azure VMs directly from the
Azure portal using RDP or SSH, without the need for a public IP address or VPN
connection.
Bastion sessions are encrypted using Transport Layer Security (TLS), ensuring
data confidentiality and integrity during transmission.
2. Managed Service:
Azure Bastion is a fully managed service that eliminates the need to deploy and
manage jump hosts or bastion servers manually.
Microsoft handles the infrastructure provisioning, maintenance, security
updates, and scaling of Azure Bastion, reducing administrative overhead and
operational complexity.
3. Integration with Azure Portal:
Azure Bastion is tightly integrated with the Azure portal, providing a seamless
user experience for accessing VMs securely.
You can initiate RDP or SSH sessions to Azure VMs directly from the Azure portal
with a single click, eliminating the need for separate remote desktop or SSH
clients.
4. Private Connectivity:
Azure Bastion is deployed within your Azure Virtual Network (VNet) and does not
require public IP addresses or inbound network security group (NSG) rules on
VMs.
Access to VMs is routed through Azure Bastion over the Azure backbone
network, ensuring private connectivity and reducing exposure to external
threats.
Note : Azure bastion requires a /27 subnet (minimum of 32 IP addresses) for deployment.
Azure Virtual Machine Scale Sets (VMSS) is a service provided by Microsoft Azure that
allows you to deploy and manage a group of identical virtual machines (VMs) for large-scale
services. VMSS provides high availability, scalability, and ease of management for applications
with varying loads. Here are some key features and aspects of Azure Virtual Machine Scale Sets:
1. Scalability:
VMSS automatically scales the number of VM instances based on demand,
allowing your application to handle varying workloads efficiently. You can define
scaling policies based on metrics such as CPU utilization, memory utilization, or
custom metrics.
2. High Availability:
VMSS distributes VM instances across multiple fault domains and update
domains within an Azure region to ensure high availability and fault tolerance. If
any VM instance fails or needs maintenance, VMSS automatically redistributes
the workload to healthy instances.
3. Load Balancing:
VMSS integrates with Azure Load Balancer to distribute incoming traffic evenly
across VM instances within the scale set. This ensures that each VM instance
receives a balanced share of traffic and improves application performance and
reliability.
4. Customization:
You can customize VMSS instances by specifying the VM size, OS image, disk
configuration, network settings, and extensions. VMSS supports both Windows
and Linux virtual machines, allowing you to choose the appropriate operating
system for your application.
5. Managed Disks:
VMSS supports Azure Managed Disks, which provide simplified management,
better reliability, and built-in backups compared to unmanaged disks. Managed
Disks handle storage replication, encryption, and redundancy automatically,
reducing the administrative overhead of managing storage accounts.
6. Automatic Updates:
VMSS can automatically apply OS updates and security patches to VM instances
using Azure Update Management or custom scripts. This ensures that VM
instances are up-to-date with the latest patches and fixes, reducing security
vulnerabilities and downtime.
7. Integration with Azure Services:
VMSS integrates with other Azure services such as Azure Monitor, Azure Security
Center, Azure Backup, and Azure Automation for monitoring, security, backup,
and management tasks. This allows you to leverage the full capabilities of the
Azure ecosystem to manage and monitor your VMSS deployments.
8. Cost Optimization:
VMSS offers cost optimization features such as autoscaling, which automatically
adjusts the number of VM instances based on demand, and low-priority VM
instances, which provide discounted pricing for non-production workloads.
In Azure, Fault Domains and Update Domains are concepts related to ensuring high
availability and fault tolerance for applications and services deployed on Azure infrastructure.
These concepts are crucial for designing resilient architectures and minimizing downtime during
planned maintenance or unforeseen failures.
1. Fault Domains:
A Fault Domain is a logical group of hardware resources within an Azure data
center that share a common power source and network switch. Fault Domains
are designed to ensure that if there is a hardware failure (e.g., server failure,
network switch failure), only a subset of resources is affected, minimizing the
impact on the overall availability of the application.
Azure ensures that VM instances and other resources deployed within the same
Availability Set or Virtual Machine Scale Set are distributed across different Fault
Domains. This ensures that VM instances are not all located on the same physical
hardware, reducing the risk of downtime due to hardware failures.
For example, if you deploy VM instances in an Availability Set with three Fault
Domains, Azure will distribute the VM instances across three different sets of
hardware within the data center, ensuring that a failure in one Fault Domain does
not affect the availability of the entire application.
2. Update Domains:
An Update Domain is a logical group of VM instances within an Azure data center
that are updated and rebooted together during planned maintenance events.
Update Domains are used to ensure that only a subset of VM instances is taken
offline at any given time for updates, minimizing downtime and maintaining
application availability.
When you deploy VM instances in an Availability Set or Virtual Machine Scale
Set, Azure automatically assigns each VM instance to a specific Update Domain.
During planned maintenance events, Azure updates and reboots VM instances in
each Update Domain sequentially, ensuring that VM instances in different
Update Domains remain available to handle incoming requests.
By default, Azure divides VM instances into five Update Domains, but you can
specify a different number of Update Domains based on your availability
requirements.
By leveraging Fault Domains and Update Domains, you can design resilient and highly available
architectures in Azure that are capable of withstanding hardware failures and planned
maintenance events with minimal downtime. It's essential to understand these concepts and
incorporate them into your Azure deployment strategies to ensure the availability and reliability
of your applications and services.
Azure Storage
Azure Storage is a cloud-based storage solution provided by Microsoft Azure, offering scalable,
durable, and highly available storage for various types of data, including files, blobs, tables, and
queues. It is designed to support a wide range of use cases, from simple file storage to complex
big data analytics and media streaming applications. Here are some key features and aspects of
Azure Storage:
1. Storage Services:
Azure Blob Storage: Blob storage is optimized for storing large amounts of
unstructured data, such as images, videos, documents, logs, and backups. It
supports block blobs, append blobs, and page blobs for different storage
scenarios.
Azure Files: Azure Files provides fully managed file shares in the cloud, allowing
you to mount file shares as network drives for Windows, Linux, and macOS
systems or access files using REST APIs.
Azure Queues: Azure Queues offer reliable messaging for asynchronous
communication between application components, enabling decoupled and
scalable architectures.
Azure Tables: Azure Tables provide NoSQL storage for structured data, allowing
you to store and query large datasets with high availability and low latency.
2. Scalability:
Azure Storage is designed to scale seamlessly to meet the growing storage
demands of applications and workloads. It offers virtually unlimited storage
capacity, allowing you to store petabytes of data in a single storage account.
You can scale storage capacity and performance independently by adjusting
storage account settings, such as performance tiers, redundancy options, and
access tiers.
3. Durability and Availability:
Azure Storage provides high durability and availability by replicating data across
multiple storage nodes and data centers within the same region.
Redundancy options such as locally redundant storage (LRS), zone-redundant
storage (ZRS), geo-redundant storage (GRS), and geo-zone-redundant storage
(GZRS) offer varying levels of data redundancy and fault tolerance.
4. Security:
Azure Storage offers robust security features to protect data at rest and in transit,
including encryption, access controls, Azure Active Directory integration, role-
based access control (RBAC), and network security policies.
Advanced security features such as Azure Key Vault integration, customer-
managed keys, and Azure Private Link enhance data protection and compliance.
5. Data Management:
Azure Storage provides tools and services for managing data lifecycle, versioning,
retention, and compliance requirements.
Features such as Blob Lifecycle Management, Blob Versioning, Blob Soft Delete,
and Azure Data Lake Storage (ADLS) integration enable efficient data
management and governance.
6. Integration:
Azure Storage integrates seamlessly with other Azure services such as Azure
Virtual Machines, Azure Data Factory, Azure Databricks, Azure Functions, Azure
Synapse Analytics, and Azure Kubernetes Service (AKS), enabling a wide range of
data-driven workflows and applications.
Azure Storage is a foundational service in the Azure ecosystem, offering reliable and scalable
storage solutions for modern cloud applications, data lakes, analytics, and archival storage
needs. It provides the flexibility and scalability required to support diverse workloads and use
cases, from small-scale applications to enterprise-scale deployments.
Azure Firewall
Azure Firewall is a cloud-based network security service provided by Microsoft Azure that helps
protect your Azure Virtual Network resources from unauthorized access and threats. It acts as a
centralized, managed firewall solution for securing outbound and inbound traffic to and from
your Azure resources, including virtual machines, virtual networks, and Azure services. Here are
some key features and aspects of Azure Firewall:
1. Network Security:
Azure Firewall provides stateful firewalling capabilities to filter and inspect both
inbound and outbound traffic based on source and destination IP addresses, port
numbers, and protocols.
It supports application-level filtering for traffic based on fully qualified domain
names (FQDNs), allowing you to control access to specific websites, services, or
applications.
2. Centralized Management:
Azure Firewall offers centralized management and configuration through the
Azure portal, Azure Resource Manager (ARM) templates, Azure PowerShell,
Azure CLI, and Azure Management APIs.
You can define and manage firewall rules, network rules, threat intelligence-
based filtering, and logging settings centrally across multiple Azure subscriptions
and virtual networks.
3. Integration with Azure Services:
Azure Firewall integrates seamlessly with other Azure networking services such
as Azure Virtual Network (VNet), Azure Monitor, Azure Security Center, Azure Log
Analytics, and Azure Active Directory (AD) for advanced monitoring, logging, and
security insights.
It can be deployed alongside Azure Virtual Network appliances such as Azure
Application Gateway, Azure Load Balancer, and Azure VPN Gateway to provide
comprehensive network security and traffic management solutions.
4. High Availability and Scalability:
Azure Firewall is designed for high availability and scalability, with built-in
redundancy and automatic failover across multiple Azure regions.
You can scale Azure Firewall instances horizontally to handle increased network
throughput and traffic volume by adjusting the number of instances and sizing
them according to your performance requirements.
5. Threat Intelligence:
Azure Firewall leverages threat intelligence feeds from Microsoft and third-party
sources to provide advanced threat detection and prevention capabilities.
It can dynamically block known malicious IP addresses, domains, and URLs to
protect your network resources from cyber threats and attacks in real-time.
6. Logging and Monitoring:
Azure Firewall logs detailed network traffic information, including allowed and
denied traffic, security rules, and threat intelligence events.
You can stream firewall logs to Azure Monitor, Azure Storage, Azure Event Hubs,
or third-party SIEM (Security Information and Event Management) solutions for
real-time monitoring, analysis, and threat detection.
Azure Firewall is a critical component of Azure network security, providing advanced protection,
visibility, and control over network traffic in cloud environments. It helps organizations enforce
security policies, comply with regulatory requirements, and mitigate cybersecurity risks
effectively.
Azure Firewall sku’s
1. Standard SKU:
The Standard SKU of Azure Firewall provides essential firewall capabilities for
securing your network traffic in Azure.
It offers stateful packet inspection, network address translation (NAT), and
application-level filtering (Layer 7) for inbound and outbound traffic.
The Standard SKU supports high availability with active-standby deployment
mode across multiple Azure regions for increased reliability and fault tolerance.
Standard Firewall rules are applied to all traffic passing through the firewall,
allowing you to define filtering criteria based on IP addresses, ports, protocols,
and FQDNs (Fully Qualified Domain Names).
2. Premium SKU:
The Premium SKU of Azure Firewall includes all the features of the Standard SKU
and adds additional capabilities for advanced network security and threat
protection.
It includes features such as intrusion detection and prevention system (IDPS), TLS
inspection, web category filtering, and URL filtering for enhanced security and
compliance.
The Premium SKU offers integration with Azure Sentinel for centralized security
monitoring, threat detection, and incident response.
Premium Firewall rules allow you to define more granular filtering policies based
on application categories, URL categories, and threat intelligence feeds.
3. Firewall Policy SKU:
The Firewall Policy SKU is not a standalone SKU but rather a management SKU
that allows you to centrally manage and enforce firewall policies across multiple
Azure Firewalls.
Firewall policies define the configuration settings, rules, and security policies
applied to Azure Firewall instances within a given Azure region or across multiple
regions.
With Firewall Policy SKU, you can create and manage reusable firewall policies,
enforce consistent security controls, and simplify firewall management at scale.
When selecting an Azure Firewall SKU, consider factors such as your security requirements,
performance needs, compliance obligations, and budget constraints. The Standard SKU provides
basic firewall capabilities suitable for most scenarios, while the Premium SKU offers advanced
security features and threat protection for more demanding environments.
It's essential to review the feature set and pricing details of each SKU to determine the most
appropriate option for your specific use case and organizational requirements. Additionally,
consider factors such as network throughput, latency, and scalability when planning your Azure
Firewall deployment.