Highly Available NVAs in Microsoft Azure

  Рет қаралды 21,534

John Savill's Technical Training

John Savill's Technical Training

Күн бұрын

In this video we go super deep on things like symmetric routing, SNAT, hashing to support highly available NVAs in Azure.
Whiteboard - github.com/johnthebrit/Random...
Load Balancer Deep Dive - • Azure Load Balancer De...
HA Ports - docs.microsoft.com/en-us/azur...
NVA HA architectures - docs.microsoft.com/en-us/azur...
00:00 Introduction
01:38 Load Balancer functionality review
06:48 Floating IP
08:52 Next hop behavior
10:55 SDN L3 differences from a L2 physical world and numbers of NICs
14:37 Stateful HA NVAs
16:12 Internal facing NVAs
26:15 External and internal NVAs. No SNAT
32:38 With SNAT!
36:15 x-forwarded-for with SNAT
37:14 Using Floating IP
39:30 Using Route Server
44:00 Summary

Пікірлер: 61
@MrSelecta32
@MrSelecta32 Жыл бұрын
this kind of video goes beyond Azure / cloud knowledge, you learn about principals. John is the man!
@erichosseini3832
@erichosseini3832 Жыл бұрын
Detailed, direct to the point, touching different real world scenarios and awesome, like always! Thanks John 🤟
@2emptywords
@2emptywords Жыл бұрын
No one goes into that level of details! Thank you very much 🙏
@juanpabloguerra9512
@juanpabloguerra9512 3 жыл бұрын
Thanks for sharing your knowledge. Looking forward to the ARS video
@mentat04
@mentat04 2 жыл бұрын
John, very informative training, you are the KING of Azure.Thank you so much.
@maheshadate
@maheshadate 2 жыл бұрын
Hey John, your videos are turning out to be one stop shop for all queries on complex issues on Azure environment... Thanks a ton for posting such informative videos
@NTFAQGuy
@NTFAQGuy 2 жыл бұрын
You are very welcome
@TomWhi
@TomWhi 3 жыл бұрын
Brilliant video. You often cover something I've thought about but haven't made time to research. I love all the whiteboard sessions but in particular I'd really like to see a "putting/seeing it in practice session"
@origamicaptain5664
@origamicaptain5664 Жыл бұрын
The best explanation of these concepts period.
@devops-kinda1935
@devops-kinda1935 2 жыл бұрын
Thanks a ton for breaking all of this down. Definitely helped me understand the concepts of HA NVA's!
@NTFAQGuy
@NTFAQGuy 2 жыл бұрын
Great to hear!
@neespion1131
@neespion1131 Жыл бұрын
Thanks a lot for this incredible explanation. This just saved me 6hours from a presentation on the subject. I appreciate. Keep up the excellent work
@jakehardluck2315
@jakehardluck2315 3 жыл бұрын
Excellent content! Am looking forward to your next video on Azure Route Server especially NVA’s and routing to Azure Private Link IP’s.
@NTFAQGuy
@NTFAQGuy 3 жыл бұрын
Route server is next week. Have something else for this Thursday.
@iamdedlok
@iamdedlok 3 жыл бұрын
Whoa... this was...'Brainfull'! I am overloaded, need to go back and rewatch this. Thanks a bunch John! You are like the Tech whisperer, a couple of days back we were configuring the Palo Alto Firewall Appliance in Azure, and now it's slowly making sense why the configuration needed to be a certain way! Woohoo. You are amazing.
@NTFAQGuy
@NTFAQGuy 3 жыл бұрын
That’s awesome! Glad it was timely :)
@et2931
@et2931 Жыл бұрын
Most of the times I'm really surprised how this kind of content is so underrated. To allow John continue his job it is very simple that he has to get fair payment for this. Please share this content with your colleagues! Cloud is the future and your future is tomorrow! :)
@NTFAQGuy
@NTFAQGuy Жыл бұрын
Thank you but I have all advertising turned off. I make no money from this channel. It's just a way to give back and help people.
@MayankSingh-yw3kc
@MayankSingh-yw3kc Жыл бұрын
I know just saying thanks won't be enough to all your hard work which you had done and are doing continuously to teach azure Cloud to all those who are interested. It's really amazing and you are one the best Tutor on Azure. Thank you John for all your efforts. By the way what inspire you most & how you looks so fit. It's really Crazyyyy
@NTFAQGuy
@NTFAQGuy Жыл бұрын
You're very welcome! Thank you
@ZPDrift
@ZPDrift 3 жыл бұрын
good video mate - cheers
@vladx3539
@vladx3539 2 жыл бұрын
brilliant!!! thx a lot!
@evolagenda
@evolagenda 2 жыл бұрын
Fantastic, as always
@NTFAQGuy
@NTFAQGuy 2 жыл бұрын
Thank you! Cheers!
@evolagenda
@evolagenda 2 жыл бұрын
​@@NTFAQGuy With the vswitch and vfp can I ask is that a construct per backend pool? Or is it one per lb instance or per backend nic. Or is it a bit more mysterious than that?
@NTFAQGuy
@NTFAQGuy 2 жыл бұрын
@@evolagenda its at the host.
@jasonharris6412
@jasonharris6412 Жыл бұрын
Like everyone else in the comments is saying, great video! Clear, thorough, easy to follow. It has it all. It blows my mind that a video like this can have over 16k views and only 482 (as of now) likes. Wake up, people. Hit that thumb. There isn't better Azure content out there that I can find.
@NTFAQGuy
@NTFAQGuy Жыл бұрын
hehe, thanks.
@cedarlee768
@cedarlee768 2 жыл бұрын
Excellent! Thanks John for the teaching! One thing about the ARS and BGP demo, I got what you meant for the ECMP. But what you wrote down on the whiteboard "CIDR2 => NVA1" does not match what you said. Most likely it's just a typo. I guess it should be "CIDR1 => NVA 2".
@NTFAQGuy
@NTFAQGuy 2 жыл бұрын
Glad you like the video. I would have to rewatch to know as no memory :)
@karachikings4001
@karachikings4001 2 жыл бұрын
Great content as always John. Wondering if the route server will break statefulness if the NVAs are Firewalls, with two ECMPs in the route table with both NVAs as the next hop.
@NTFAQGuy
@NTFAQGuy 2 жыл бұрын
Look at my new video on gateway load balancer
@shengsheng7577
@shengsheng7577 2 жыл бұрын
Hi John, as always, thanks for the hard work, bring us another amazing episode. Quick question, @35:03 the response seems bypassing the Internal LB, so in this case, is the Internal LB being used at all? do we still need it in this case? thanks
@NTFAQGuy
@NTFAQGuy 2 жыл бұрын
Watch my load balancer deep dive to understand flow. Lb required to distribute/failover multiple instances
@ivanbravomunoz1305
@ivanbravomunoz1305 2 жыл бұрын
Hi John, great vid as always :) Got one question: a third-party firewall from the Azure Marketplace is essentially a NVA?
@NTFAQGuy
@NTFAQGuy 2 жыл бұрын
basically yes.
@ZivRivkis
@ZivRivkis 3 жыл бұрын
Thanks for another great video. I am not sure I understand the point of the internal LB in your Active/Active scenario. When is it being used by the VMs? When they are the source of the request to an "external IP"?
@NTFAQGuy
@NTFAQGuy 3 жыл бұрын
I’m the internal scenario they were always used for traffic sent between subnets hence the udr. Think packet inspection/firewall
@ZivRivkis
@ZivRivkis 3 жыл бұрын
@@NTFAQGuy Thanks John.
@jgrote
@jgrote 3 жыл бұрын
MASSIVE CAVEAT FOR ROUTE SERVER: It doesn't work to route between subnets in a vnet, every vnet can only have 1 subnet if you want it to regulate traffic between subnets, due to how the BGP tables are built between vnets and how there's no escape hatch with a user-defined route that works that doesn't end up bouncng the traffic back to the host or the route server in a loop. However it is awesome for an edge NVA and SD-WAN as John showed, just don't try to use it for an NVA firewall that you want to monitor inter-subnet traffic with.
@NTFAQGuy
@NTFAQGuy 3 жыл бұрын
Will be covering route server next week lol
@cma9br
@cma9br 2 жыл бұрын
Amazing!!! For the internal facing NVAs to work properly, do I need to enable IP forwarding in the guest OS as I do it in the NIC of the NVA as well?
@NTFAQGuy
@NTFAQGuy 2 жыл бұрын
Forwarding would be part of the nva
@C-Swede
@C-Swede 3 жыл бұрын
Excellent. Can you elaborate on when SNAT is not a viable option?
@NTFAQGuy
@NTFAQGuy 3 жыл бұрын
its really based on the receiving workload and if they need the true IP of the client and can't handle x-forwarded-for etc.
@tbatth
@tbatth 3 жыл бұрын
@John How does NVA1 knows about VNET prefixes and forward traffic. Do we need to add static routes on NVAs to forward traffic to VNets and UDR on route tables attached to the subnet? And what if traffic is destined for peered vnets?
@NTFAQGuy
@NTFAQGuy 3 жыл бұрын
NVAs typically will be configured but may interact with vnet to learn or hook into something like route server potentially.
@newallst
@newallst 3 жыл бұрын
👍🏻🤙
@harrichavan789
@harrichavan789 25 күн бұрын
actually deep dive
@dregoriuss
@dregoriuss 3 жыл бұрын
How about Zone based Firewalls that require 1 NIC per zone? Haven’t found and option to to 1 NIC with Palo Alto Networks Firewall and some other vendors.
@NTFAQGuy
@NTFAQGuy 3 жыл бұрын
Different vendors work in different ways but the reality is the VNet is flat. multiple NICs really don't change that. Work with the vendor but the point here is if you are multi-NIC and stateful then you SNAT.
@jgrote
@jgrote 3 жыл бұрын
In Palo Alto case, you can certainly just do two NICs with HA ports sandwiching it and load balancer it all to the one NIC, and then apply your policies at the source/destination level rather than the zone level. Your zones are just "Internal" and "External" and internal can have as many subnets as you want routed to it via UDR.
@kilosandkeyboards
@kilosandkeyboards 3 жыл бұрын
I don't see any reason why you couldn't deploy some PA-VMs with a single NIC in a load-balancer sandwich. Granted, most PA-VMs will have two NICs (one for data-plane and one for management-plane), but there should be nothing stopping you from running the PA-VM with one data-plane NIC. Everything will be "intrazone," which will necessitate you modifying the behavior of the factory-default intrazone rule from "allow" to "deny" or something similar. From there, you will just add more specific "allow" Security-Policies above the default catchall. Don't forget the default route in the Virtual-Router, either. Check out PANW's Azure reference architecture, if you haven't already.
@NTFAQGuy
@NTFAQGuy 3 жыл бұрын
@@kilosandkeyboards having a NIC for management is fine. Just where the load balancing for the symmetric flow need same LB with same NIC.
@jaggedll2
@jaggedll2 2 жыл бұрын
Hello John, great videos! With regard to SNATing and using X-FORWARDED-FOR - you refer to this as an IP header. Isn't this an HTTP header? I.e., if the protocol being used is vanilla TCP then you can't use it and the backend VM doesn't get to see the source IP.
@NTFAQGuy
@NTFAQGuy 2 жыл бұрын
Yes, i should have been clearer on that.
Microsoft AI Tour keynote session by Satya Nadella | February 8, 2024
1:11:15
Azure Networking, User Defined Routes, and Network Virtual Appliances
21:24
THEY WANTED TO TAKE ALL HIS GOODIES 🍫🥤🍟😂
00:17
OKUNJATA
Рет қаралды 14 МЛН
LOVE LETTER - POPPY PLAYTIME CHAPTER 3 | GH'S ANIMATION
00:15
I’m just a kid 🥹🥰 LeoNata family #shorts
00:12
LeoNata Family
Рет қаралды 20 МЛН
Microsoft Azure Gateway Load Balancer Deep Dive
32:16
John Savill's Technical Training
Рет қаралды 16 М.
Azure Route Server Overview
31:34
John Savill's Technical Training
Рет қаралды 35 М.
OSPF Deep Dive
2:26:28
Kevin Wallace Training, LLC
Рет қаралды 202 М.
Managing Multiple Environments with Terraform
20:39
Ned in the Cloud
Рет қаралды 4,3 М.
Azure Application Gateway for Containers - General Availability
57:52
Azure Kubernetes Service (AKS)
Рет қаралды 1,3 М.
Virtual Networking Explained
8:25
IBM Technology
Рет қаралды 92 М.
Deep Dive into Cisco SD-WAN: Single  DMZ Scenario | Answer & Win!
1:00:55
Networking with Ehsan
Рет қаралды 25 М.
Azure Architect Interview
10:04
Patrik's Tech Lightning
Рет қаралды 4,9 М.
Understanding ExpressRoute Latency
14:48
John Savill's Technical Training
Рет қаралды 7 М.
Getting Started with Public Load Balancers in Azure
16:57
Travis Roberts
Рет қаралды 6 М.
Что не так с яблоком Apple? #apple #macbook
0:38
Не шарю!
Рет қаралды 394 М.
Хотела заскамить на Айфон!😱📱(@gertieinar)
0:21
Взрывная История
Рет қаралды 4,8 МЛН