Zone resiliency and private #335
Replies: 3 comments
-
Hi @robsissons-contino, here's my quick assessment of the points you provided above:
Would you mind providing me some feedback on my assessment above, and they we can talk about next steps and what does/doesn't need to change with the deployment scripts? Thanks so much! |
Beta Was this translation helpful? Give feedback.
-
Hi @DCMattyG Thanks for the response, and apologies for delay in getting back to you.
In our case, the IPAM solution will be central to our automation for provisioning of new virtual networks so if the service is unavailable then the whole provisioning service is down so for this reason we would require high availability offered by the additional zones. Appreciate this isn't the case for everyone!
Appreciate this, and assumed this would be the case. Wondered if there is a way to have a second script available to "enable" private access or some documentation detailing the steps required for this?
The policy which highlighted this comes from a NIST initiative which requires storage accounts for log analytics workspaces for any saved queries. In this case we will raise an exemption to waiver - no action required.
Agree - we need to raise exemptions here too. Is there anything I can do to assist in documenting / scripting the private configuration or do you already have anything which can be used for this? Thanks again |
Beta Was this translation helpful? Give feedback.
-
Hi there @robsissons-contino, thanks for the responses! I have intended on adding a section in the docs for quite some time now around different possible ways to enable private network communication between all of the components of the Azure IPAM platform. I will finally have some time as we approach the holidays where I can get this done properly with screenshots & details. I believe this will be the best approach as customers can see various examples and pick & choose the way that makes the most sense for their organization. We always welcome contributions so if you have some thoughts as to how those docs should be organized or want to suggest some verbiage that makes sense, please don't hesitate. Otherwise I intend of accomplishing this over the month of December and will roll all of this into the next release (v3.6.0). |
Beta Was this translation helpful? Give feedback.
-
We have a requirement to meet some strict policies and would like to use Azure IPAM.
Deploying "out of the box" gives us a lot of non-compliance against several policies, such as:
Resources should be zonally resilient:
Cosmos & App Service Plan
should use private link / have firewall rules / disable public network access
Cosmos, App Service, Key Vault
Saved-queries in Azure Monitor should be saved in customer storage account for logs encryption
Log Analytics
Key Vault secrets should have expiry date / content type / maximum validity
KV Secrets
Some of the above we can fix retrospectively after deployment, some cannot (such as making an App Service Plan zonal).
Does anyone have a solution for this or is there a view to adding these features? I have seen some discussions saying that the private solution is being developed but nothing available yet.
Ideally we would still like to be able to access the IPAM solution externally so we would also need to look at deploying an application gateway to proxy the solution?
Beta Was this translation helpful? Give feedback.
All reactions