Highly Available NVAs in Microsoft Azure

แชร์
ฝัง
  • เผยแพร่เมื่อ 1 ธ.ค. 2024

ความคิดเห็น • 61

  • @MrSelecta32
    @MrSelecta32 ปีที่แล้ว +3

    this kind of video goes beyond Azure / cloud knowledge, you learn about principals. John is the man!

  • @et2931
    @et2931 2 ปีที่แล้ว +4

    Most of the times I'm really surprised how this kind of content is so underrated. To allow John continue his job it is very simple that he has to get fair payment for this. Please share this content with your colleagues! Cloud is the future and your future is tomorrow! :)

    • @NTFAQGuy
      @NTFAQGuy  2 ปีที่แล้ว +6

      Thank you but I have all advertising turned off. I make no money from this channel. It's just a way to give back and help people.

  • @2emptywords
    @2emptywords ปีที่แล้ว

    No one goes into that level of details! Thank you very much 🙏

  • @maheshadate
    @maheshadate 3 ปีที่แล้ว +1

    Hey John, your videos are turning out to be one stop shop for all queries on complex issues on Azure environment... Thanks a ton for posting such informative videos

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      You are very welcome

  • @erichosseini3832
    @erichosseini3832 2 ปีที่แล้ว +1

    Detailed, direct to the point, touching different real world scenarios and awesome, like always!
    Thanks John 🤟

  • @jakehardluck2315
    @jakehardluck2315 3 ปีที่แล้ว +2

    Excellent content! Am looking forward to your next video on Azure Route Server especially NVA’s and routing to Azure Private Link IP’s.

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Route server is next week. Have something else for this Thursday.

  • @iamdedlok
    @iamdedlok 3 ปีที่แล้ว

    Whoa... this was...'Brainfull'! I am overloaded, need to go back and rewatch this. Thanks a bunch John!
    You are like the Tech whisperer, a couple of days back we were configuring the Palo Alto Firewall Appliance in Azure, and now it's slowly making sense why the configuration needed to be a certain way! Woohoo. You are amazing.

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      That’s awesome! Glad it was timely :)

  • @juanpabloguerra9512
    @juanpabloguerra9512 3 ปีที่แล้ว +1

    Thanks for sharing your knowledge. Looking forward to the ARS video

  • @origamicaptain5664
    @origamicaptain5664 ปีที่แล้ว

    The best explanation of these concepts period.

  • @TomWhi
    @TomWhi 3 ปีที่แล้ว +1

    Brilliant video. You often cover something I've thought about but haven't made time to research. I love all the whiteboard sessions but in particular I'd really like to see a "putting/seeing it in practice session"

  • @devops-kinda1935
    @devops-kinda1935 3 ปีที่แล้ว +1

    Thanks a ton for breaking all of this down. Definitely helped me understand the concepts of HA NVA's!

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Great to hear!

  • @mentat04
    @mentat04 2 ปีที่แล้ว

    John, very informative training, you are the KING of Azure.Thank you so much.

  • @MayankSingh-yw3kc
    @MayankSingh-yw3kc ปีที่แล้ว

    I know just saying thanks won't be enough to all your hard work which you had done and are doing continuously to teach azure Cloud to all those who are interested. It's really amazing and you are one the best Tutor on Azure. Thank you John for all your efforts. By the way what inspire you most & how you looks so fit. It's really Crazyyyy

    • @NTFAQGuy
      @NTFAQGuy  ปีที่แล้ว

      You're very welcome! Thank you

  • @neespion1131
    @neespion1131 ปีที่แล้ว

    Thanks a lot for this incredible explanation. This just saved me 6hours from a presentation on the subject. I appreciate. Keep up the excellent work

  • @jasonharris6412
    @jasonharris6412 ปีที่แล้ว

    Like everyone else in the comments is saying, great video! Clear, thorough, easy to follow. It has it all. It blows my mind that a video like this can have over 16k views and only 482 (as of now) likes. Wake up, people. Hit that thumb. There isn't better Azure content out there that I can find.

    • @NTFAQGuy
      @NTFAQGuy  ปีที่แล้ว

      hehe, thanks.

  • @ZPDrift
    @ZPDrift 3 ปีที่แล้ว

    good video mate - cheers

  • @evolagenda
    @evolagenda 3 ปีที่แล้ว

    Fantastic, as always

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      Thank you! Cheers!

    • @evolagenda
      @evolagenda 3 ปีที่แล้ว

      ​@@NTFAQGuy With the vswitch and vfp can I ask is that a construct per backend pool? Or is it one per lb instance or per backend nic. Or is it a bit more mysterious than that?

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +2

      @@evolagenda its at the host.

  • @vladx3539
    @vladx3539 2 ปีที่แล้ว

    brilliant!!! thx a lot!

  • @jgrote
    @jgrote 3 ปีที่แล้ว +1

    MASSIVE CAVEAT FOR ROUTE SERVER: It doesn't work to route between subnets in a vnet, every vnet can only have 1 subnet if you want it to regulate traffic between subnets, due to how the BGP tables are built between vnets and how there's no escape hatch with a user-defined route that works that doesn't end up bouncng the traffic back to the host or the route server in a loop.
    However it is awesome for an edge NVA and SD-WAN as John showed, just don't try to use it for an NVA firewall that you want to monitor inter-subnet traffic with.

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      Will be covering route server next week lol

  • @cedarlee768
    @cedarlee768 3 ปีที่แล้ว

    Excellent! Thanks John for the teaching! One thing about the ARS and BGP demo, I got what you meant for the ECMP. But what you wrote down on the whiteboard "CIDR2 => NVA1" does not match what you said. Most likely it's just a typo. I guess it should be "CIDR1 => NVA 2".

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      Glad you like the video. I would have to rewatch to know as no memory :)

  • @karachikings4001
    @karachikings4001 2 ปีที่แล้ว

    Great content as always John. Wondering if the route server will break statefulness if the NVAs are Firewalls, with two ECMPs in the route table with both NVAs as the next hop.

    • @NTFAQGuy
      @NTFAQGuy  2 ปีที่แล้ว

      Look at my new video on gateway load balancer

  • @shengsheng7577
    @shengsheng7577 3 ปีที่แล้ว

    Hi John, as always, thanks for the hard work, bring us another amazing episode. Quick question, @35:03 the response seems bypassing the Internal LB, so in this case, is the Internal LB being used at all? do we still need it in this case? thanks

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Watch my load balancer deep dive to understand flow. Lb required to distribute/failover multiple instances

  • @ivanbravomunoz1305
    @ivanbravomunoz1305 3 ปีที่แล้ว

    Hi John, great vid as always :) Got one question: a third-party firewall from the Azure Marketplace is essentially a NVA?

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      basically yes.

  • @cma9br
    @cma9br 3 ปีที่แล้ว

    Amazing!!! For the internal facing NVAs to work properly, do I need to enable IP forwarding in the guest OS as I do it in the NIC of the NVA as well?

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Forwarding would be part of the nva

  • @tbatth
    @tbatth 3 ปีที่แล้ว

    @John How does NVA1 knows about VNET prefixes and forward traffic. Do we need to add static routes on NVAs to forward traffic to VNets and UDR on route tables attached to the subnet? And what if traffic is destined for peered vnets?

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      NVAs typically will be configured but may interact with vnet to learn or hook into something like route server potentially.

  • @ZivRivkis
    @ZivRivkis 3 ปีที่แล้ว

    Thanks for another great video. I am not sure I understand the point of the internal LB in your Active/Active scenario. When is it being used by the VMs? When they are the source of the request to an "external IP"?

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      I’m the internal scenario they were always used for traffic sent between subnets hence the udr. Think packet inspection/firewall

    • @ZivRivkis
      @ZivRivkis 3 ปีที่แล้ว

      @@NTFAQGuy Thanks John.

  • @C-Swede
    @C-Swede 3 ปีที่แล้ว

    Excellent. Can you elaborate on when SNAT is not a viable option?

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      its really based on the receiving workload and if they need the true IP of the client and can't handle x-forwarded-for etc.

  • @harrichavan789
    @harrichavan789 5 หลายเดือนก่อน

    actually deep dive

  • @dregoriuss
    @dregoriuss 3 ปีที่แล้ว

    How about Zone based Firewalls that require 1 NIC per zone? Haven’t found and option to to 1 NIC with Palo Alto Networks Firewall and some other vendors.

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      Different vendors work in different ways but the reality is the VNet is flat. multiple NICs really don't change that. Work with the vendor but the point here is if you are multi-NIC and stateful then you SNAT.

    • @jgrote
      @jgrote 3 ปีที่แล้ว +1

      In Palo Alto case, you can certainly just do two NICs with HA ports sandwiching it and load balancer it all to the one NIC, and then apply your policies at the source/destination level rather than the zone level. Your zones are just "Internal" and "External" and internal can have as many subnets as you want routed to it via UDR.

    • @kilosandkeyboards
      @kilosandkeyboards 3 ปีที่แล้ว

      I don't see any reason why you couldn't deploy some PA-VMs with a single NIC in a load-balancer sandwich. Granted, most PA-VMs will have two NICs (one for data-plane and one for management-plane), but there should be nothing stopping you from running the PA-VM with one data-plane NIC. Everything will be "intrazone," which will necessitate you modifying the behavior of the factory-default intrazone rule from "allow" to "deny" or something similar. From there, you will just add more specific "allow" Security-Policies above the default catchall. Don't forget the default route in the Virtual-Router, either.
      Check out PANW's Azure reference architecture, if you haven't already.

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      @@kilosandkeyboards having a NIC for management is fine. Just where the load balancing for the symmetric flow need same LB with same NIC.

  • @newallst
    @newallst 3 ปีที่แล้ว

    👍🏻🤙

  • @jaggedll2
    @jaggedll2 3 ปีที่แล้ว +1

    Hello John, great videos! With regard to SNATing and using X-FORWARDED-FOR - you refer to this as an IP header. Isn't this an HTTP header? I.e., if the protocol being used is vanilla TCP then you can't use it and the backend VM doesn't get to see the source IP.

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Yes, i should have been clearer on that.