Azure networking concepts

Azure networking concepts

The most common question I have to answer when it comes to Azure virtual networking is: how do I associate a route table with a virtual network? And the answer is: you don't. Route tables are associated with subnets, not vnets. Ha! Don't you love the cloud?

I have put together the following diagram to try to get this stuff straight in my own head, and hopefully it will be useful for others. (Also, please let me know if there are errors in it...)

No alt text provided for this image

In the diagram above, an arrow from 'A' to 'B' means that you go to 'A' in the Azure Portal and tell it to associate with 'B'. (Or you create a Terraform resource for 'A' and feed it the ID of 'B' as an input attribute, etc.)

The little '1:1'/'1:n'/'n:n' notations refer to the number of 'A's that can be connected to what number of 'B's. For example each subnet can have multiple route tables and each route table can be associated with multiple subnets ('n:n'). On the other hand multiple network interfaces can be associated with each network security group, but each network interface can only have one network security group ('n:1').

The next diagram gives some examples of how traffic flows through virtual networks:

No alt text provided for this image

Of course in reality the traffic doesn't go anywhere. For most customers, their entire Azure estate is hosted on a single AWS instance, and traffic does not leave that box. Virtual networking is the ultimate in 'talking to yourself'. However, when it comes to troubleshooting connectivity problems, the above diagram is your guide. You need to make sure you have things like peerings, route tables and NSGs in place, and know where to look for them.

The above is far from everything there is to know about Azure virtual networking, but it's a good start. Even for those of us who have been fiddling around with this stuff for years, it is useful to have some simple summary diagrams of what connects to what. Otherwise you will be trying to configure flow logs on your route tables, and that's not a good way to spend your evening. Enjoy! :-)

要查看或添加评论,请登录

Patrick Conheady的更多文章

  • Project governance vs project management

    Project governance vs project management

    For years I thought "project governance" was a meaningless phrase, basically "project management" but with…

    1 条评论
  • Why do we need this RFC?

    Why do we need this RFC?

    RFCs are the laws of the internet. They explain how protocols like the Internet Protocol, DNS and Ethernet work.

    2 条评论
  • Some basics of cybersecurity

    Some basics of cybersecurity

    Here are some basic concepts I find helpful when thinking about the security of a computer system, reading about new…

    2 条评论
  • How are large computer systems made?

    How are large computer systems made?

    Introduction Consider a large retailer with hundreds of shops, a headquarters and a website where you can buy things…

  • Diffs and patches in law and software engineering

    Diffs and patches in law and software engineering

    One of the things that both lawyers and software engineers both do, but do completely differently, is diffing and…

    3 条评论
  • A good idea stuck inside a bad idea

    A good idea stuck inside a bad idea

    The image at the start of this article is Stringer Bell, a crime boss in The Wire, chairing a meeting with his…

    1 条评论
  • If you cannot fail then you cannot succeed either

    If you cannot fail then you cannot succeed either

    We want to plan for success, not failure. The best plan is one which makes failure vanishingly unlikely.

    1 条评论
  • Passing the buck the right way

    Passing the buck the right way

    A key principle at the intersection of agile and DevOps is to push responsibility down the org chart, as close to the…

  • The "tech triangle", for IT consultants

    The "tech triangle", for IT consultants

    I have received some encouragement with respect to trying to share the knowledge I use day-to-day as an IT consultant…

  • Getting rid of sensitive data from a Gitlab repo

    Getting rid of sensitive data from a Gitlab repo

    Sometimes you find something in your Git repository’s history which should not be there, such as when you started…

社区洞察

其他会员也浏览了