This is a continuation of an article that describes operational considerations for hosting solutions on Azure public cloud.
1.
When an IPSec VPN (site-to-site) or
Express Route (private peering) is used, the configuration for the self-hosted
Integrated runtime varies. In the site-to-site, the command channel and the
data channel from the self-hosted integrated runtime crosses the Azure virtual
network to reach the Data Factory and the Azure managed storage services
respectively. With private peering, the data channel is entirely within the
Azure Virtual network in which the self-hosted integration runtime runs.
2.
Windows Firewall runs as a daemon on
the local machine in which the self-hosted integration runtime is installed.
The outbound port and domain requirements for corporate firewalls could be
listed. These do not include the rules for the self-hosted integration runtime.
The outbound port 443 must be opened for the self-hosted integration runtime to
make internet connections. The inbound port 8060 must be opened only at the
machine level. IP configurations and allow lists can be setup in data stores.
3.
Multi-region clusters increase
resiliency. This architecture builds on
the AKS Baseline architecture where AD pod identity, ingress and egress
restrictions, resource limits and other secure AKS infrastructure
configurations are described. Each cluster is deployed in a separate Azure
region and traffic is routed through all regions Even if one region becomes
unavailable, traffic is routed through another that is closest to the user who
issued the request. A regional hub-spoke network pair are deployed for each
regional AKS instance. Azure Firewall manager policies are used to manage
firewall policies across all regions. Azure FrontDoor is used to load balance
and route traffic to a regional Azure application gateway instance designated
for each AKS cluster. A single Azure container registry is used for all
Kubernetes instances in the cluster.
4.
Multitenant SaaS is excellent for
running solutions that can be unbranded and marketed to other businesses. It
adds an entire new revenue stream for a company. But the operational aspects of running this
service is very different from that of a web application. The architecture for hosting this involves
creating multiple resource groups. All users access resources through the Azure
Front Door that has integration with both the Azure DNS and the Azure Active
Directory. In each resource group, an application gateway routes traffic to
multiple app services that are all hosted on the infrastructure provided by a
layer of Azure Kubernetes service.
No comments:
Post a Comment