- 17
- 60 017
Customer Architecture & Engineering
United Kingdom
เข้าร่วมเมื่อ 25 มี.ค. 2022
Azure Landing Zones - External Community Call - September 2024
The recording of our eighth Azure Landing Zones Community Call held on the 12th June 2024.
PowerPoint Slides and other information from the meeting are available from: aka.ms/alz/community
Sign-up info and pre-meeting discussion is available: github.com/Azure/Enterprise-Scale/issues/1666
Be part of the next community call by checking for the next meeting via this short link: aka.ms/alz/communitycall
Slides and previous community calls can be found here: aka.ms/alz/community
PowerPoint Slides and other information from the meeting are available from: aka.ms/alz/community
Sign-up info and pre-meeting discussion is available: github.com/Azure/Enterprise-Scale/issues/1666
Be part of the next community call by checking for the next meeting via this short link: aka.ms/alz/communitycall
Slides and previous community calls can be found here: aka.ms/alz/community
มุมมอง: 648
วีดีโอ
Azure Verified Modules (AVM) - September 2024 - External Community Call
มุมมอง 603หลายเดือนก่อน
The second Azure Verified Modules (AVM) external community call, hosted on the 4th September 2024. Slides can be found at: azure.github.io/Azure-Verified-Modules/assets/community/sept24/avm-community-call-sept24.pdf aka.ms/avm aka.ms/avm/resources
Azure Landing Zones - External Community Call - June 2024
มุมมอง 1.6K4 หลายเดือนก่อน
The recording of our eighth Azure Landing Zones Community Call held on the 12th June 2024. PowerPoint Slides and other information from the meeting are available from: aka.ms/alz/community Sign-up info and pre-meeting discussion is available: github.com/Azure/Enterprise-Scale/issues/1596 Be part of the next community call by checking for the next meeting via this short link: aka.ms/alz/communit...
Azure Verified Modules (AVM) - May 2024 - External Community Call
มุมมอง 1.3K5 หลายเดือนก่อน
The first Azure Verified Modules (AVM) external community call, hosted on the 21st May 2024. Slides can be found at: azure.github.io/Azure-Verified-Modules/assets/community/may24/avm-community-call-may24.pdf aka.ms/avm aka.ms/avm/resources
Azure Landing Zones - External Community Call - March 2024
มุมมอง 2.3K7 หลายเดือนก่อน
The recording of our eighth Azure Landing Zones Community Call held on the 11th March 2024. PowerPoint Slides and other information from the meeting are available from: github.com/Azure/Enterprise-Scale/wiki/Community-Calls Sign-up info and pre-meeting discussion is available: github.com/Azure/Enterprise-Scale/issues/1491 Be part of the next community call by checking for the next meeting via t...
Mastering Data Types in Infrastructure-as-Code: Bicep & Terraform
มุมมอง 7469 หลายเดือนก่อน
In this video, we will explore the different data types used in infrastructure-as-code languages, specifically Bicep and Terraform. We will also demonstrate how to use these data types in a live demo, including some basic functions. By the end of this tutorial, you will have a solid understanding of data types in infrastructure-as-code and be able to use them effectively in your own projects. C...
An Introduction to Azure Verified Modules (AVM)
มุมมอง 12K9 หลายเดือนก่อน
In this video, we will explore the concept of Azure Verified Modules (AVM), an initiative by Microsoft to provide and define the standards for what a good Infrastructure-as-Code module looks like. We will learn how AVM modules are constructed, tested, consumed, and supported across different IaC languages, today Bicep and Terraform. We will also see how AVM modules align to the well-architected...
Azure Landing Zones - External Community Call - December 2023
มุมมอง 1.8K10 หลายเดือนก่อน
The recording of our seventh Azure Landing Zones Community Call held on the 6th December 2023. PowerPoint Slides and other information from the meeting are available from: github.com/Azure/Enterprise-Scale/wiki/Community-Calls Sign-up info and pre-meeting discussion is available: github.com/Azure/Enterprise-Scale/issues/1431 Be part of the next community call by checking for the next meeting vi...
Azure Landing Zones - External Community Call - September 2023
มุมมอง 1.7Kปีที่แล้ว
The recording of our sixth Azure Landing Zones Community Call held on the 25th September 2023. PowerPoint Slides and other information from the meeting are available from: github.com/Azure/Enterprise-Scale/wiki/Community-Calls Sign-up info and pre-meeting discussion is available: github.com/Azure/Enterprise-Scale/issues/1287 Be part of the next community call by checking for the next meeting vi...
Azure Landing Zones and Multiple Azure Active Directory Tenants
มุมมอง 1.4Kปีที่แล้ว
In this video we give an overview of the new Azure Landing Zones multiple Azure Active Directory Tenants guidance - aka.ms/alz/multitenant We also cover the important and common question of "Should we use a single or multiple Azure Active Directory Tenants?" Sign up to the ALZ Mailing List: aka.ms/alz/notifications/signup (opt out: aka.ms/alz/notifications/optout)
Azure Landing Zones - External Community Call - April 2023
มุมมอง 1.4Kปีที่แล้ว
The recording of our fifth Azure Landing Zones Community Call held on the 27th April 2023. PowerPoint Slides and other information from the meeting are available from: github.com/Azure/Enterprise-Scale/wiki/Community-Calls Sign-up info and pre-meeting discussion is available: github.com/Azure/Enterprise-Scale/issues/1191 Be part of the next community call by checking for the next meeting via th...
Azure Landing Zones - External Community Call - January 2023
มุมมอง 1.9Kปีที่แล้ว
The recording of our fourth Azure Landing Zones Community Call held on the 31st January 2023. PowerPoint Slides and other information from the meeting are available from: github.com/Azure/Enterprise-Scale/wiki/Community-Calls Sign-up info and pre-meeting discussion is available: github.com/Azure/Enterprise-Scale/issues/1153 Be part of the next community call by checking for the next meeting via...
Azure Landing Zones - Handling Dev/Test/Prod for Application Workloads
มุมมอง 14K2 ปีที่แล้ว
Ever wondered how to handle dev/test/prod environments in Azure Landing Zones? Then this is the video for you! Join Jack Tracey, Matt White & Kevin Rowlandson from the Microsoft Customer Architecture & Engineering team (the team that are responsible for Azure Landing Zones) as they talk through how to handle dev/test/prod application workloads in the Azure Landing Zone architecture. Useful Link...
Azure Landing Zones - How many subscriptions should I use in Azure?
มุมมอง 17K2 ปีที่แล้ว
Ever wondered how many Azure Subscriptions you should be using in your organization? Ever wondered how to make the Azure Landing Zones design principal of Subscription Democratization (docs.microsoft.com/azure/cloud-adoption-framework/ready/landing-zone/design-principles#subscription-democratization) real? Ever wondered whether you should have one big Subscription or lots of smaller Subscriptio...
Azure Landing Zones - Community Call - 2nd May 2022
มุมมอง 8192 ปีที่แล้ว
The recording of our third Azure Landing Zones Community Call held on the 2nd May 2022. PowerPoint Slides and other information from the meeting are available from: github.com/Azure/Enterprise-Scale/wiki/Community-Calls Sign-up info and pre-meeting discussion is available: github.com/Azure/Enterprise-Scale/issues/949 Be part of the next community call by checking for the next meeting via this s...
Enterprise Scale - Community Call - 17th November 2021
มุมมอง 2582 ปีที่แล้ว
Enterprise Scale - Community Call - 17th November 2021
Enterprise Scale - Community Call - 25th August 2021
มุมมอง 5422 ปีที่แล้ว
Enterprise Scale - Community Call - 25th August 2021
Great and useful information!
I prefer breaking changes in December because our business slows down mid December and would give me time to digest the changes, Jan gets crazy with new year budgets. So far, as a Microsoft partner who deploys dozens of landing zones per year, I’ve found the new terraform bootstrapping process overly complex and prone to failure. Failures so far are due to using azure devops organization that is different than target azure tenant
Jarred spoke about switching to the MS hosted runners for better security. Are they still self hosted runners that are centrally managed or did he mean the GitHub hosted runners? If it's the GitHub hosted runners, is there any doco on why that's more secure/preferred?
Hi Simone. For clarity our move to OIDC improved our security posture. Previously we were using a compute instance managed identity which is only possible with a self-hosted runner. Any workflow running on that runner can leverage the managed identity. With OIDC the auth is decoupled from the runner and scoped to the repository, etc. In our scenario it makes no difference whether we use Microsoft-hosted (GitHub-hosted) runners or self-hosted since we are only hitting public Azure end points. Could a self-hosted runner potentially improve our security posture further? Potentially as we could use private networking to connect to our state storage account. However this also limits our scalability and parallel run limits, so for us it was a bonus to be able to move to Microsoft-hosted agents since it didn’t impact our security posture for testing these open source modules. We are not handling sensitive data, etc. OIDC allows us to use granular permissions, scope to a specific workflow template and stop forked PRs from possibly triggering our end to end tests without our oversight, which was a risk before. Hope that helps.
I recommend looking at Managed DevOps Pools as a hybrid solution.
it is great content. Learned a lot.
As someone that worked very little in azure with infrastructure, this was very hard to follow.
Are we supposed to create all required subscription first? is this applicable for terraform as well?
Yes that is correct, subscriptions are meant to be created first before deploying ALZ. You can see a nice diagram here learn.microsoft.com/en-us/azure/cloud-adoption-framework/ready/#landing-zone-journey
Do we need to provision subscription before we start Azure Landing zone accelerator?
more Subscriptions = longer it takes to view combined cost analysis. We can't view costs are MGMT group scope, only Sub scope.
Tremendous work as always, thank you for keeping this on your priority list, so many depend on your outstanding work!
Thanks guys !
Thank you for posting this video so quickly! 👍
Good Q/A, great work community !!
Awesome input from both John and Stu and I really look forward to co-pilot using AVM and the autocomplete in visual studio code for both bicep and terraform for AVM.
Absolutely enjoyed the valuable and vibrant exchanges! Love the work!
Great video for Ops Nazis - doesn't address the central concept of how to handle "application environments" despite the enthusiastic belief of the presenters.
What happened to the terraform caf modules? Will this merge into AVM?
Hi, why isn't the documentation on the official Microsoft website? Such a great concept if it's not flop after a couple years
Yeah, like it was with PSarm...
Great update!
Fantastic WORK EVERYONE 🤩
14/03/24 - still waiting for demo video ?
These are very much on our list to do, but we have just released some self-service labs for both Bicep & Terraform so check these out in the meantime azure.github.io/Azure-Verified-Modules/resources/#-labs
Great Content, thanks for your outstanding work to deliver this to the community. Helps me a lot in my job
First
Very informative video on subscriptions. Just one thing when you say 'overlapping ip assignments within an address space...' could you clarify what you mean by 'ip assignments'. I understand we can't have overlapping ip address with a subnet so was wondering what you meant by overlapping ip assignments?
Not particularly sure why the Azcaf project as just not furthered and supported. It was a great project.
Think this would be awesome i spend considerable time validating and tracking modules.
Demo ?
No demos just talk, super diappointed.
We have a video for this planned. Stay tuned!
Great initiative !!
I know it is an old video, but Kevin and Matt don't seem to be on the same page. At 5:30 (th-cam.com/video/8ECcvTxkrJA/w-d-xo.html), Kevin recommends App A to have all three stages under Corp. But 10:15 (th-cam.com/video/8ECcvTxkrJA/w-d-xo.html) Matt recommends not exactly that. What am I missing here?
I believe the difference is the additional management group level that is crossed out in section discussed by Matt. The dev, test, and prod subscriptions can be under Corp but they can't be under dev, test, and prod management groups under the Corp management group. This discussion is about management groups, not subscriptions. Kevin's did not have the dev, test, and prod management groups.
Amazing! I need to learn more about how to democratize the platform, but this video was an excellent start. Studying for the AZ-305 has me wondering if I have just been going rogue with some migrations. Love the content and can't wait to check out the rest of your stuff!
Great discussion. If an Azure Kubernetes Service (AKS) cluster is operational within a subscription that necessitates on-premises connectivity via ExpressRoute, while simultaneously utilizing a public Load Balancer (LB) to make an application accessible over the internet, the question arises as to whether this subscription will fall under the Corporate (Corp) management group or the Online management group?
Thanks @bangash830. If it requires private corp connectivity it would be corp. We recently documented this a bit more here: learn.microsoft.com/azure/cloud-adoption-framework/ready/landing-zone/design-area/network-topology-and-connectivity#design-area-overview Corp only applies policies to prevent public IPs from being attached to NICs, which means app GWs etc all can still exist in corp, if requried
@@MicrosoftCAE Thank you for your reply, and yes the recent document regarding network topology and connectivity is much clear.
Great video and guidance as always, Jack!
If an enterprise is to adopt the cloud adoption framework using Terraform and landing zones, should the root management group and high-level management group (and other near-root level resources) be made manually to follow security best practices, or are there ways of defining those via code securely? If so, does documentation exist on best practices how to do that securely? Or is it typical for organizations to just make those high-level resources manually then IAC the other downstream resources? Struggling on a recommendation on where IAC starts to become "everything as code". When using the portal accelerator and following the enterprise scale model, it's obviously going to require fairly beefy permissions, but that's a one-time deployment, and an organization can then utilize IAC to do the rest from within the subscriptions, or utilize RBAC at the Landing Zone management group to further scope permissions out.
Hey Mike, please raise an issue over on our terraform repo and we can take the conversation further there: github.com/Azure/terraform-azurerm-caf-enterprise-scale
Look forward to seeing the updates to the TF module.. currently using a custom template to provide the flexibility... Great update and lots of new useful information and features :)
Same here. We would be using the whole thing if not for the lack of MG flexibility. Without that, we're stuck borrowing and modifying what code we can and writing the rest from scratch.
Ivory tower discussion.. All the points mentioned are pro multiple subscription and nothing to the contrary. We are a 50 person organization with an IT team of 5 people. Why should we create a management group hierarchy and multiple subscriptions and increase the complexity from the get go ?
Hey Duraid, thanks for the feedback. I think the point of ALZ is to set you up for long-term success and growth. We know that migrating resources out of single subscription environments can be painful, depending on the services you have within it. Also having a single subscription approach can cause: - Running into Resources/Quota limits faster and when you do, you dont have a scalable way to handle this. - Apps can be impacted by noisy neighbours, using quota they may need etc. - Complex RBAC assignments - hard to give higher level of control to app/workload teams in shared single subscription model - Larger blast radius should a single subscription become compromised Management groups help you enable, operate and govern and multi-subscription environment at scale. Hope that helps
@@MicrosoftCAE Thanks for the response. The advantages were mentioned in the video. Thanks for re-iterating them. Non of the trade-offs were mentioned however which an unbalanced design decision. So now we build skyscrapers for everybody even if they need a couple of rooms just in case you need them in the future?
@@duraidh7299 I think CAE's response was valid, and I'll ask. How does having multiple subscriptions increase complexity? If anything, it allows you to reduce complexity as your company's cloud adoption goes. As architects, we should design environments that scale well. As outlined in the video, a single subscription can run into very painful scalability issues. A multi-subscription environment on the other hand might avoid those. If the complexity is not large (and there is no additional cost involved), why not create the more scalable solution? One final question that I'll ask that probably could have summarized my entire response. What about multiple subscriptions do you find more complex than a single subscription? The requirement for additional VNet Peering perhaps?
@@tharagz08Complexity
Great video, but as someone getting started with the "proper" way to structure my Azure layout, one thing I'd like to see clarified is what exactly is meant by "corp" vs. "online"? What would go in a corp management group vs online? Is Corp meant just for internal applications that should never be customer facing? And therefore is "online" meant to be your actual deployed products that are released into the world for customers to use? I haven't found in any of the documentation what exactly the differences are besides a very complex all-encompassing enterprise-level diagram of how to 100% layout an organization from scratch. Thanks!
Hey, thanks! The TLDR on Corp & Online are as follows: Corp == Corporate connected applications, that require hybrid connectivity back to on-premises or other VNet spokes via traditional Layer 3 Routing (think VNet Peering to a Hub etc.) Online == Workloads that don't need traditional Layer 3 routing to on-premise or other VNet spokes. And if they do require connectivity to them they would either interact via each applications API exposure "publicly" (over the MSFT backbone if all in Azure) or use service like Private Link to connect between each other without the need for VNet Peering. We are actually creating a document in CAF for just this topic in terms of how Corp & Online Networking should be done in more detail and some common scenarios. Stay tuned.
At 36:09 we see all stages of Corp App 1 and Corp App 2 under the same management group with no additional layer in between. Is this best practice? How about adding a Corp App 1 MG and Corp App 2 MG and place the stages there. Otherwise you could end up with dozens of subscriptions under Corp.
Hey, yes this is indeed best practice. We only advise creating additional Management Groups if they have different governance requirements. Checkout the guidance we have on Tailoring ALZ (aka.ms/alz/tailoring)
Would be nice to see something on how you govern the change of policy. If you have multiple subs for multiple envs under a single branch of the hierarchy a single change to policy with unintended consequences has a larger blast radius. I wonder if having a management group for policy changes would be beneficial where it mirrors "online" or "corp" but you can move a subscription like dev into it, to test that the policy is the expected change for a trial period before moving it back and applying the policy for real.
Azure Policy can be applied at the Management Group, Subscription, Resource Group or individual resource level. If you apply a policy at a higher level, it gets inherited down. If there is a more restrictive policy it will always win, regardless of the level it has been applied. Meaning, it does not matter if the policy is applied on management group or individual resource level, the deny will win for the resources the policy is assigned to. If policies are not conflicting, they will be complementary. In your example if I felt I was going to apply a more restrictive policy, I would consider applying it at a lower level for testing. Also, we should strive to have production and non-production versions of our applications, so ideally, we would be able to apply the more restrictive policy to the non-production side first, test and validate, then roll into production once we felt comfortable. As mentioned in the video you can deploy Policy in Audit mode, so following the above feedback with this, you should be able to accomplish what you are asking: learn.microsoft.com/en-us/azure/governance/policy/concepts/effects
@@tharagz08 audit mode with some validation process makes most sense. Your example works but I was specific about testing policy applied at the root, or more specifically corporation subroot which are intended to be inherited by all, like a change nist or something.
@@evolagenda I think audit mode would make the most sense in that scenario then.
Good idea for content
Thanks for the videos guys. I've just shared this with my client as they're at a critical juncture with their journey. Hopefully, this will help them design a subscription model which is aligned with the organisation's operating model and industry regulations.
Good videos, I like it! Would love to see a discussion about Platform subscriptions.
@Jack Tracey why would Cloud Networking Team would object to different subscriptions? What about Secure Hub-spoke landing zone with different subscription? Any idea Great Knowledge Base Info. Please keep coming with videos with your advisory about what to use not use as well.
Is there a set time/date for the community call? How can someone join the call? Thanks!
Hey Jin, I think there are a couple pointers in the Video's Metadata above :)
Great discussion, really insightful, helpful and useful. Having tried to the prod/test/dev MGs under a Corp/Online hierarchy, I would love to hear more about why "it just doesn't scale" @10:25 some tales from the field would be awesome to hear, policy can be a very tricky discussion to have with customers for sure! cheers and thanks for the videos.
Thanks Matt. Stay tuned we have another video planned for just this.
@@MicrosoftCAE awesome, that would be amazing, looking forward to it 😎
Would be really great with some practical examples of the scaling issues. Are about to decide on MG structure and tend to go for MGs on prod and dev.
Good video, the linked FAQ are really handy!
Dream team at work!
Loving the content chaps!
Good informative stuff.. let us have next deep dive sessions
Awesome vid, great content and key areas covered in 15 mins. Good work.
good stuff gents