Hub & Spoke Networks
Mariano Carro Arrubarrena
Solution Consultant | Technical Enabler | Technical Presales | Partner Engagement | Relationship developer | Bilingual in English and Spanish Give service with excellence to gain trust and transform lives.
As we continue with the network topologies, let’s talk about the Hub and Spoke Networks.
?
This reference architecture implements a hub-and-spoke star network pattern with customer-managed hub infrastructure components.
?
This reference architecture implements a hub-and-spoke star network pattern in which the hub virtual network acts as a central point of connectivity to many spoke virtual networks. Virtual spoke networks connect to the hub and can be used to isolate workloads.
?
You can also enable cross-premises scenarios by using the hub to connect to local networks.
?
This architecture describes a network pattern with customer-managed hub infrastructure components. For a Microsoft managed hub infrastructure solution, see Hub-and-spoke topology with Azure Virtual WAN.
?
The advantages of using a hub-and-spoke star configuration include the following:
?
?
Some of the typical uses for a hub-and-spoke star architecture include workloads that:
?
This sample solution uses a single Azure resource group. You can also deploy the hub and each spoke to different resource groups and subscriptions.
??
When you pair virtual networks in different subscriptions, you can associate the subscriptions with the same or a different Azure Active Directory (Azure AD) tenant. This flexibility enables decentralized management of each workload, while keeping shared services at the center. See Create a virtual network peering: Resource Manager, different subscriptions, and Azure AD tenants.
?
As a general rule, it is best to have at least one center per region. This configuration helps to avoid a single point of failure, for example, to prevent resources in Region A from being impacted at the network level by an outage in Region B.
?
To centrally manage connectivity and security controls, use Virtual Network Manager to create new hub-and-spoke virtual network topologies or incorporate existing topologies. Using Virtual Network Manager ensures hub and spoke star network topologies are prepared for future large-scale growth across multiple subscriptions, management groups, and regions.
?
?Example use case scenarios for Virtual Network Manager include the following:
?
To ensure consistent connectivity and network security rules, you can use network groups to group virtual networks from any subscription, management group, or region in the same Azure AD tenant. You can automatically or manually add virtual networks to network groups through dynamic or static membership assignments.
?
The discoverability of virtual networks that Virtual Network Manager manages is defined by scopes. This feature provides flexibility for a desired number of Network Manager instances, allowing for greater democratization of virtual network pool management.
?
To connect spoke virtual networks in the same network group to each other, use Virtual Network Manager to implement virtual network peering or direct connectivity. Use the global mesh option to extend direct mesh connectivity to radio networks in different regions. The following diagram shows the global mesh connectivity between regions.
??
For detailed documentation, we can go to the links:
Hub-spoke network topology in Azure
?
Hub-spoke network topology with Azure Virtual WAN
?
?We can also talk about peering 2 networks in different subscriptions, it is possible, even if they are from different "Tenants". Peering two virtual networks allows resources in different virtual networks to communicate with each other with the same bandwidth and latency that the resources would have if they were in the same virtual network. Learn more about Virtual Network Peering.
?
领英推荐
Depending on whether the virtual networks are in the same subscription or different subscriptions, the steps to create a virtual network peering are different. The steps for peering networks built with the classic deployment model are different. For information about deployment models, see Azure deployment model.
?
You cannot create a virtual network peering between two virtual networks deployed using the classic deployment model. If you need to connect virtual networks that were created through the classic deployment model, you can use an Azure VPN Gateway to connect the virtual networks.
?
For the detail of the documentation, we can go to the link:
Create a virtual network peering - Resource Manager, different subscriptions and Azure Active Directory tenants.
?
?
We can also have the option of accessing PaaS services through internal addresses and avoiding exposing those services to the internet. We can do that by defining Private Connections.
?
A private endpoint is a network interface that uses a virtual network's private IP address. This network interface connects you privately and securely to a service powered by Azure Private Link. By enabling a private endpoint, you add the service to the virtual network.
The service could be an Azure service like:
?
?When using private endpoints, the traffic is protected on a private link resource. The platform validates network connections and only allows those that reach the specified private link resource. To access additional child resources of the same Azure service, additional private endpoints are required. In the case of Azure Storage, for example, separate private endpoints will be needed to access the file and blob child resources.
?
Private endpoints provide a private access IP address for the Azure service, but don't necessarily restrict public network access to the service. Azure App Service and Azure Functions don't support public access when associated with a private endpoint. However, all other Azure services require additional access controls. These controls provide an additional layer of network security to your resources, offering protection to prevent access to the Azure service associated with the private link resource.
?
Private endpoints support network policies. Network policies enable support for Network Security Groups (NSGs), User Defined Routes (UDRs), and Application Security Groups (ASGs). For more information about enabling network policies for a private endpoint, see Managing network policies for private endpoints. To use an application security group with a private endpoint, see Set up an application security group (ASG) with a private endpoint.
?
You can connect to a private link resource using the following connection approval methods:
?
?Through a private endpoint connection, the owner of a private link resource can:
?
?For detailed documentation of Private Endpoints, we can go to:
What is a private endpoint?
?
?For the complete list of resources and their limitations to move between subscriptions, we can go to this link:
Move operation support for resources
?
?
Thanks for reading and I hope it is helpful for you.
Your comments are appreciated.
?
Mariano Carro Arrubarrena.
?