Thursday, April 20, 2023

Azure Data factory and self-hosted Integration Runtime: 

This is a continuation of the articles on Azure Data Platform as they appear here. Azure Data Factory is a managed cloud service from the Azure public cloud that supports data migration and integration between networks. This article focuses on setting up a site-to-site VPN for connecting on-premises to the Azure cloud.

Azure, self-hosted and Azure-SSIS integration runtimes are the flavors of compute infrastructure that the Azure Data Factory uses to provide data integration capabilities across different network environments.  These include executing a data flow in a managed Azure compute environment, copying data across data stores in a public or private networks, dispatching and monitoring transformation activities and natively executing SQL Server integration services packages in a managed Azure compute environment. Out of these, the self-hosted runtime can be used for data movement and activity dispatch across on-premises and Azure networks. Self-hosted integration runtime cannot be used for managed compute, autoscale and dataflow but it can be used for on-premises data access, private link/private endpoint and custom component/driver. It requires the on-premises network to be connected to Azure via ExpressRoute or VPN. The private endpoints are managed by the Azure Data Factory Service. 

The setting up of site-to-site connection involves the use of Azure Virtual WAN.

An IPSec/IKE VPN connection is required to connect to Azure resources over virtual WAN. This involves a VPN device located on-premises that has an externally facing public IP address assigned to it. The steps involved to set this up are: 1. Create a virtual WAN, 2. Configure virtual hub Basic settings, 3. Configure site-to-site VPN gateway settings. 4. Create a site, 5. Connect a site to a virtual hub, 6. Connect a VPN site to a virtual hub, 7. Connect a VNet to a virtual hub, 8. Download a configuration file, and 9. View or edit the VPN gateway.

The pre-requisites on the Azure side of the connection are 1. An Azure subscription, 2. A virtual network without any existing virtual network gateways and IP address range to use for the virtual hub private address space.

The Virtual WAN is actually a set of resources collectively insantiated to represent a virtual overlay of the Azure network. It requires subscription, resource group, location, name and type as Basic or Standard. Basic is used to create only the site-to-site connection while Standard has advanced features.

A virtual hub is required to contain a dedicated gateway for site-to-site functionality. It requires subscription, location, name, private address space in CiDR notation, capacity in terms of routing infrastructure units, routing preference and a router Autonomous System Number.

The site-to-site connection is configured with the router ASN, Gateway scale units and routing preference as Microsoft network or Internet.

Next, a site is configured in the Virtual WAN to correspond to the physical location from where the connections will be initiated. It requires the location, name, device vendor as Citrix, Cisco, Barracuda, etc. and a private address space. Links can be added to represent the physical links at the location.

When the site is created, it can be viewed from the virtual WAN page. The VPN site is then connected to the virtual hub. The connection of sites requires settings such as a Pre-shared key, protocol such as IKEv2 or IKEv1, IPSec as default or custom, a flag to indicate if the default route will propagate so that virtual networks connecting to the hub will have this gateway reachability added to their routing table, a flag to indicate if the policy based traffic selector must be left disabled, a flag to indicate if the traffic selector must be configured and a connection mode selected from default, initiator only or responder only choices.

When the connection is made, its status will show as updating. After the updating completes, the site shows the connection and connectivity status. A virtual network can then be connected and the VPN device configuration information can be downloaded.    

 

No comments:

Post a Comment