Azure Lab- Network and Peering
FIrst, step when developing this lab was to come up with a consitent way to move the audience through the lab, in a single Subscription, and within the timeframe we had to present. It was quickly decided to utilize Resource Groups to keep everyone’s resources together. Grouping resources is what these do. That coupled with a naming convention that we thought would avoid overlap, we were ready to go.
Thsi Lab we will be using the Azure Resource Monitor and what is called the blade. It allows for a pretty seamless naviugation experience, and provides a single pane to configure all the components needed for a specific resource. We did not utilize the Dashboard in this lab, thsi was for simplicity as some of the aprticipants had limited exposure to Azure. I will go into the Dashboard in a later post. We also employed the use of the Azure Portal menu to easily return all the participants back to their resource group. This allowed everyone to start the Blade for each subsequent resource with the Resource Group and Subscritpition already filled in. It’s always there, and made it an easy way to get everyone “Home” or back to their Resource Groups before each section.
First Step was for each Participant to configure an individual Resource Group, using the steps below.
For this part of the lab we put in the infrasructure for all the communication. This will be the Virtual Networks or VNets and their corresponding routing. I like to think of VNets like a tradition on-prem network. Where typically there is a single Address space (ex. 10.0.0.0/16) which is then broken up into subnet ranges., allowing for segmentation of resources within site. VNets also introduce “Gateways” allowing for the movement or routing of traffic from the VNet to the internet, or other VNets (Sites) or even across VPNs and Azure Express Routes. So, just like their on-prem network counterpart, VNets are an important part of your cloud datacenter. And even though you don’t have to build all the routes, configure the indivual switches/routers, proper lanning ans setup for you application is crucial.
For this lab we kept it simple. Two, VNets. The first to house a single compute node or VM, and the second to house the Veeam Backup for Azure Appliance. So , in this first posting I will review the setup of both VNets and the basis for their communtcation to each other (Peering) and to the Storage account to be covered in a later posting.
Let’s get into it!
This brings us to the next step in the blade, where I asked the participants to configure an IP Address Space, and setup their Subnet.
After this we added a 2nd VNet. For the purpose of this lab it served as the location of the Veeam backup for Azure applaince. It also lead to the configuration of Peering, which I will cover in the next post.
Once Deployment is Complete Click Go to resource. This is done either from the Resource Menu, or the Notification drop Menu from the upper left (HINT: it is shaped like a Bell)
Now, by default VNets do not communicate with each other. They are separate IP Spaces fenced off from each other. They do by default offer access to the internet, and thus have some default routes to do so. As we do want connectivity between these VNets, we need to setup the feature called Peering.
If you navigatre to the 1st VNet you will see the Peering connection is already set here, as it was all configured in this single step. You also need not configure routing, as it is already setup with this same action.
Now we only enabled the network access settings that conencted VNet 2 to Vnet 1. Leaving the last 2 as disabled. In a future post I will include setup for VNet Peering allowing for acces across a VPN, but for the purpose of this lab we simply needed the 2 Networks to talk to each other.
That concludes the Network portion of this lab. Stay tuned for Storage and Compute. THese components will take advantage of what was setup in the network portion of this lab.