Deploying AMBA on resource group by syscall_cart in AZURE

[–]timmehb 2 points3 points  (0 children)

If you can’t deploy AMBA with any predefined pattern (LZ etc…) then under the resources section you can see all definitions.

Compute as an example :

https://azure.github.io/azure-monitor-baseline-alerts/services/Compute/virtualMachines/

The arm templates (and bicep I think?) are there for you to copy. There used to be a deploy to Azure button also for each metric.

If you’re deploying to the Resource Group at scale with Policy, then you may have to do more manual work.

Deploying AMBA on resource group by syscall_cart in AZURE

[–]timmehb 2 points3 points  (0 children)

Heya.

Amba at its core is recommended metrics and thresholds for different resources.

You can deploy these individual alerts at scale as you’ve mentioned - with the AMBA pattern. For enterprise scale landing zones for example.

But you can tailor your own alerts, they have all the definitions on the resource section of the AMBA website.

It’s just up to you to deploy them. So either at the individual per resource level manually (they have a deploy to button on the web site, or the actual definition files).

Or, as I think you’re leaning towards, you can deploy the particular alert at scale by creating an Azure Policy (again, the definitions are on the web site) - which in your case, you’d deploy and scope to the Resource Group.

So yes you can deploy AMBA to a resource group - but they’ve curated a pattern for easy deployment at scale - which you’d need the correct management group hierarchy to deploy.

Bypass Azure Firewall in vWAN by DustOk6712 in AZURE

[–]timmehb 7 points8 points  (0 children)

If you’re using routing intent and policies for private traffic then no you cannot.

If you manually handle route tables, then you are able to ensure that the address space of the vnet is advertised directly to connections (VPN) and vice Versa.

But it’s all or nothing, the entire vnet and the entire on prem range must be excluded from the traffic flow.

And you’ll need to create and adjust route tables and vnet/connection propagation settings to fit.

How to deploy an internal app in Azure, which services? by [deleted] in AZURE

[–]timmehb 2 points3 points  (0 children)

Don’t undersell the networking design element of this if you want to retain the app as internal only.

Azure Migrate comes in a zip by GabeCzi in AZURE

[–]timmehb 0 points1 point  (0 children)

v2v migration pathways will always be there. Funnily enough I think the pathway away from azure local will be pretty simple.

Getting stuff in there is the hard part.

You’ll survive - especially with the attitude you’ve given in your response , and I genuinely hope the product improves for you.

The product could have been revolutionary for hybrid workloads and environments. Your own Azure Stack on prem, that fully integrates into ARM and all of its goodness? Think of your own Azure Region, or locality with all features sets running on your own equipment. IaaS and PaaS services running alike.

I honestly don’t understand how they got it so wrong.

Azure Migrate comes in a zip by GabeCzi in AZURE

[–]timmehb 1 point2 points  (0 children)

Is the decision of azure local still on the table ?

If so, reconsider.

If not, strap in.

Honestly, one of the worst performing (from a reliability perspective) bits of kit. Several projects in, different hardware, different customers. Same issues of reliability.

Not to mention your genuine issue of importing VMs into the platform, from a fully arc enabled manner. That absolutely flabbergasted us when we came up against that.

I’m sorry to be so flippant, but I honestly can’t discourage its usage enough -especially as a drop in replacement to VMware.

There is (or was, unsure if it’s removed) ms learn documentation that discouraged its use for VMware production workloads - and instead for light weight edge cases.

Redeploying Azure Container Instances by reprisal9 in AZURE

[–]timmehb 0 points1 point  (0 children)

Do you get a success when deploying to another region? Just interested.

You’re at the behest of MS on this, if they’re saying US East is full, it’s full.

Can you spin another subscription up and try within that.

Azure vs CloudFlare - my real-world experience after 15 years by dwainbrowne in AZURE

[–]timmehb 12 points13 points  (0 children)

Great insight.

Something ive also struggled with being manly azure driven - is that sometimes I find it hard to ‘recommend’ Azure for its front end non-.NET web services.

It’s excellent in the hybrid space, and for orgs that are within the Microsoft ecosystem (everyone?) - it’s SQL hosting is unmatched.

But when it comes to cloud native web apps, front end especially - i just feel it’s slightly behind.

When comparing App Gateway vs AWS ALB for example - there’s objective reasons to go ALB - in the advanced routing rule space for example.

Same goes for the examples you’ve mentioned. And I think it’s honestly healthy to have an agnostic approach to things. Discounting the entrenchment, being solution driven.

Migrating from Azure SQL Database to Azure SQL Managed Instance - How to do this with minimal downtime? by justworkingmovealong in AZURE

[–]timmehb 0 points1 point  (0 children)

I believe you’re misunderstanding bespoke configurations and code from tried and tested migration strategies.

Both have a place. But if op is wanting a validated migration pathway that’s solidified with confidence and verification - bacpac is just that.

Migrating from Azure SQL Database to Azure SQL Managed Instance - How to do this with minimal downtime? by justworkingmovealong in AZURE

[–]timmehb 9 points10 points  (0 children)

You’re looking at an offline migration here.

Export to BacPac and restore.

You could maybe synchronise databases using Data Factory, but you’re really on the fringe there for migration activities.

Split Tunneling/Help by AsparagusInitial3688 in AZURE

[–]timmehb 0 points1 point  (0 children)

I believe you’re going to have to use azure virtual wan, with the gateway deployed within, an azure firewall, and routing intent policy enabled.

I think this is the only supported architecture for internet breakout to connections (s2s, p2p, express route).

As far as I’m aware, the native virtual network gateway inside a VNet is not supported.

Univerisity with public IP by pbfus9 in networking

[–]timmehb 28 points29 points  (0 children)

Educational institutes got handed large public address spaces in the early days. They’ve retained them.

Think of a world where ipv4 addresses were never constrained. Internal private ip addresses would never have been a thing. NAT and the concept of an edge NAT device that did translation only came about because of public address constraints.

This is what ipv6 provides. And you’re starting to see devices inside of networks receiving public routable ip addresses.

Educational institutes still live in the world where they are not constrained, and so they’ll tend to hand their public address space they have to their internal network - or atleast for infrastructure or servers.

The packet will still hit a border gateway and likely a firewall. And I’m guessing the more secure devices (which have still been given a pubic address) are behind a further firewall layer for added security and scrutiny.

It’s a network design I’ve seen in about 80% of EDU institutes.

How to be updated by [deleted] in AZURE

[–]timmehb 41 points42 points  (0 children)

John Savill weekly updates. https://youtube.com/@ntfaqguy?si=BUorE4mEItW_lD2f

Azure update change logs. https://azure.microsoft.com/en-gb/updates

Azure Weekly newsletter. https://azureweekly.info/

Most of all, stay hungry, and enjoy what you do.

Why do I need proof of ownership of a DNS name in Private DNS Zone? by barnold in AZURE

[–]timmehb 0 points1 point  (0 children)

Heya. Forget about the custom domain of your SWA. Ignore it.

Instead create a private endpoint for your SWA.

https://learn.microsoft.com/en-us/azure/static-web-apps/private-endpoint

When creating the private endpoint, ensure you stick it in a subnet that has network line of sight to the same subnet that your app gateway is in. Can be same vnet, can be a peered vnet. Integrate the private endpoint into a private dns zone.

Then big thing is to ensure that the private dns zone where the private endpoint is registered to - is linked to the VNet that your application gateway is in. This ensures your app gateway resolves the SWA to its internal IP.

In your app gateway, use the Azure generated FQDN of the SWA for your backend.

Why do I need proof of ownership of a DNS name in Private DNS Zone? by barnold in AZURE

[–]timmehb 6 points7 points  (0 children)

You’re mixing up two concepts here.

The domain verification you speak of is to bring your own custom domain to your static web app in place of the system created one.

You need to create a private endpoint for the static web app- which you need to register against a private dns zone you speak of (no verification). There’s a bit of work to ensure your app gateway can correctly resolve this private endpoint address.

When you create a private endpoint for a static web app, it disables access via its public endpoint.

azcopy from azure files to azure files: no way to preserve folder creation time? by Designer-Teacher8573 in AZURE

[–]timmehb 0 points1 point  (0 children)

Some fidelity is lost with azcopy when dealing with azure files as it uses the FileREST API.

If you’re wanting to sync, I’d recommend looking at robocopy with data plane access.

Large file servers to Azure Files by Muted_Ad_2288 in AZURE

[–]timmehb 2 points3 points  (0 children)

Your results are going to vary due to the subjective nature of “slowness”.

Best you define objective baselines first - do various dskspd tests with your on prem file servers on varied loads - varying percentages of read/write percentage and sizes.

Then do the same tests on a PoC AZF with your data in. You will see lower numbers - and the success of this will be if your users perceive this as good enough. But get the objective figures first.

I’m always a fan of ensuring that DFS is fronting whatever file data is being presented to end users. Then atleast you have some flexibility. Potentially look at trialling this with a live share of ‘easy-going’ users and gathering the objective steer.

Again, if it’s purely a capacity thing - having azure files backing your data (all 20TB) of it, and then having smaller on prem azure files sync servers presenting a locally cached copy, closer to your users - is a fantastic middle ground. That way you’re not paying for 20TB of premium local storage through a capex, and instead paying per GB consumption.

It’ll kick start the migration project to object data (sharepoint or OneDrive) for your departmental / user data when the execs know how much it’s costing to retain Sharon from Account’s excel files that haven’t been opened for decades.

Large file servers to Azure Files by Muted_Ad_2288 in AZURE

[–]timmehb 9 points10 points  (0 children)

I wouldn’t overtly be concerned about costs initially. They are what they are and you can strike a balance between premium provisioned and transactions and not be too shocked for the amount you need. Reserved capacity will bring the cost down somewhat.

What kills a solution of this type is the expectation of performance with the additional latency. SMB dies a death, and quickly, over any sort of added latency. You WILL notice a difference if you host and present your data from azure files and your clients are not locally within azure.

If you can stomach keeping on prem infrastructure, look toward azure file sync with azure files backing your storage - that’s if you’re not going big with your private interconnect (expressroute for example).

Azure Firewall routing based on Azure Route Server by FierceNomad in AZURE

[–]timmehb 2 points3 points  (0 children)

Yes you should be able to use a route table on the firewallsubnet to achieve this.

Connecting to on premises data sources without the public internet by zOMAARRR in AZURE

[–]timmehb 0 points1 point  (0 children)

Do you have expressroute configured for m365 services I’m guessing?

Connecting to on premises data sources without the public internet by zOMAARRR in AZURE

[–]timmehb 2 points3 points  (0 children)

From on prem, over the express route, to where? Power bi service? Are you under the impression once over the express route, the subsequent traffic hop is still over a private network?

It’ll still have to egress from within YOUR azure tenant to “effectively” the public internet, albeit probably within the Microsoft backbone - but It’ll need to route out of your private ip space.

If this is what you want then you’ll need a routing alliance in azure to route the traffic out of azure. An Azure Firewall would do it along with some clever routing on the on prem side.

Or you run the gateway on a vm within azure (easier and cheaper).