Skip to content

Latest commit

 

History

History
235 lines (174 loc) · 27.9 KB

readme.md

File metadata and controls

235 lines (174 loc) · 27.9 KB

Network Analytics Landing Zone for Operators

Devices and equipment on operators on-premises locations (such as radio access networks or networking devices), generate large amounts of logs and files that not only need to be captured, but also, given the sheer amount of information, operators require a cloud native solution to aggregate, analyze and report the data to embrace data-driven solutions and decisions. For example, a use case would be to collect RAN logs to aggregate and analyze them to identify anomalies or interference.

A Network Analytics landing zone for operators provides the required foundational services on Azure to ingest large amounts of data into Azure storage services (such as Azure Data Lake Storage Gen2). Once this landing zone is provisioned, operators can simply deploy whichever data and analytics services and solutions they prefer to analyze the data. Alternatively, operators could join the Azure for Operators network analytics solution accelerator program to implement a comprehensive and prescriptive analytics solution on Azure, implemented by using the foundational services provided by a network analytics landing zone as prescribed on this article.

This article provides design considerations and recommendations for Network Analytics landing zones for operators, and it also provides a reference implementation to accelerate and simplify the deployment of those landing zones.

Reference implementation Description Deploy Documentation
Network Analytics Landing Zone for Operators Network Analytics landing zone for operators with required infrastructure for data ingestion into an Azure storage service and ready for deployment of storage services (such as ADLS Gen2) an analytics solutions (such as Azure Synapse). Deploy To Microsoft Cloud User guide

Table of contents

Networking options

It is essential to define the network connectivity model to be used for the Network Analytics landing zone for operators, as it will provide the connectivity required to allow you to ingest (potentially) large amounts of data from your on-premises network into an Azure storage service.

While there are many multiple ways to connect an on-premises network to Azure, this section provides design considerations and recommendations to help you define the right network connectivity model based on your scenarios and requirements. The following table summarizes the network connectivity options available:

Option Pros Cons
Internet Simple to implement. No additional Azure networking costs involved. No Azure networking infrastructure required. Traffic traverses the public internet. Latency and bandwidth not guaranteed. Traffic is not encrypted by default.
VPN Traffic is encrypted via IPSec tunnels. Traffic to an Azure storage service can be kept private within an Azure VNet. Traffic traverses the public internet. It requires and Azure VPN gateway. The maximum bandwidth per IPSec tunnel is about 1Gbps and there are limits on the maximum number of tunnels. Azure storage service must be accessible via a private endpoint unless additional infrastructure is deployed in the Azure VNet.
ExpressRoute (Private Peering) Traffic is not exposed to the public internet as it traverses a private connection. Predictable bandwidth and latency. 99.95% SLA availability. Scalable bandwidth up to 100 Gbps. FastPath can be enabled to remove the ExpressRoute Gateway from the data path. More complex to implement compared to an internet-based or VPN connection. It requires and ExpressRoute gateway. Azure storage service must be accessible via a private endpoint unless additional infrastructure is deployed in the Azure VNet.
ExpressRoute (Microsoft Peering) Traffic is not exposed to the public internet, as it traverses a private connection. Predictable bandwidth and latency. 99.95% SLA availability. Scalable bandwidth up to 100 Gbps. It does not require an ExpressRoute gateway. The Azure storage service can be reached over its public endpoint via a private connection. More complex to implement compared to an internet-based or VPN connection. It requires usage of public IPs (although traffic traverses a private connection).

Internet

This is the simplest option to provide connectivity from on-premises to an Azure storage service. This model requires that the Azure storage service is accessible over its public endpoint. Figure 1 below describes this scenario:

internet

Figure 1: Connectivity to Azure storage over the internet.

Design considerations

  • Internet connections typically don't provide predictable bandwidth or latency.
  • Traffic over the internet can be susceptible to malicious attacks and is strongly recommended that traffic over the internet is secured for example with a strong encryption algorithm.
  • Many Azure storage services offer the possibility to lock down access to specific public IP addresses.
  • A service or application would be required in the on-premises network to be able to push the data from on-premises to the Azure storage service (for example, using the AzCopy tool).

Design recommendations

  • Use an internet-based connection for a Network Analytics landing zone for scenarios such as:
    • Small environments with small amounts of data.
    • Development and testing environments.
    • There are no requirements or regulations in your organization, industry or region to transmit corporate data over a public internet connection.
    • It is allowed in your organization to access an Azure storage service over its public endpoint.
  • Always use strong encryption and secure protocols when transmitting data over the internet.
  • Ensure your Azure storage services are configured to only accept connections using secure protocols using strong encryption.
  • Restrict access to only the public IP addresses that you will use to transmit data in the Azure storage service.
  • Ensure no other public access is allowed in the Azure Storage service.

VPN

An alternative connectivity model to a Network Analytics landing zone is by using a site-to-site (S2S) VPN connection as depicted in figure 2 below:

VPN

Figure 2: Connectivity to Azure storage over VPN.

Design considerations

  • Site-to-Site (IPsec/IKE VPN tunnel) configurations are between your on-premises location and Azure.
  • This type of connection relies on an IPsec VPN appliance (hardware device or soft appliance), which must be deployed at the edge of your network. To create this type of connection, you must have an externally facing IPv4 address.
  • An Azure VPN gateway (or a third-party network virtual appliance) is required on an Azure VNet. A VPN gateway sends encrypted traffic between your virtual network and your on-premises location across a public connection.
  • Azure VPN gateway has different SKUs to support your specific routing, availability and scalability requirements.
  • The maximum throughput of a site-to-site VPN connection is limited by IPsec to 1.25Gbps. However, multiple tunnels can be used, up to the maximum number of tunnels or aggregated throughput of your VPN gateway SKU.
  • You cannot reach an Azure storage service over its public endpoint using a Site-to-Site VPN connection. Instead, you must make the Azure storage service accessible via a private endpoint, or you need to deploy Azure resources or services (such as a virtual machine or Azure Data Factory) in an Azure virtual network to move the data from on-premises to the Azure storage service over either, its public endpoint or via a private endpoint.
  • Azure Private Endpoint is a metered service. Make sure you familiarize with its pricing, so that you can estimate expected costs depending on the amount of data to ingest.

Design recommendations

  • Use a site-to-site VPN connection over the internet for a Network Analytics landing zone for scenarios such as:
    • Environments where the maximum aggregated throughput required is less than 10 Gbps.
    • There are no requirements or regulations in your organization, industry or region to transmit corporate data over a public internet connection as long as the connection is always encrypted.
    • It is not allowed in your organization to access an Azure storage service over its public endpoint. Access to Azure PaaS services must be done privately either by deploying them in the VNet or by accessing them via private endpoints.
  • Plan carefully the Azure VPN Gateway SKU as each SKU supports different features (like availability zones support), scalability and throughput numbers.
  • For maximum reliability, deploy the VPN gateway as zone-redundant (on Azure regions that support availability zones), unless you have a very specific requirement to deploy the VPN as zonal or regional.

ExpressRoute (Private Peering)

Azure ExpressRoute provides private connectivity that does not traverse the public internet. Besides ensuring that network traffic is kept in a private network, predictable throughput and latency can be expected and ExpressRoute availability is backed by a 99.95% SLA. With ExpressRoute private peering, all communication between on-premises and Azure is done via private IP addresses (typically RFC1918). A sample Network Analytics landing zone using ExpressRoute with private peering is depicted in figure 3 below:

ExpressRoutePrivatePeering

Figure 3: Connectivity to Azure via ExpressRoute with private peering

Design considerations

  • ExpressRoute lets you extend your on-premises network into the Microsoft cloud over a private connection.
  • ExpressRoute connections don't go over the public internet. This allows ExpressRoute connections to offer more reliability, faster speeds, consistent latencies, and higher security than typical connections over the internet.
  • Azure compute services, namely virtual machines (IaaS) and cloud services (PaaS), that are deployed within a virtual network can be connected through the private peering domain. The private peering domain is considered to be a trusted extension of your core network into Microsoft Azure. You can set up bi-directional connectivity between your core network and Azure virtual networks (VNets). This peering lets you connect to virtual machines and cloud services directly on their private IP addresses.
    • To access Azure PaaS services from on-premises via ExpressRoute private peering, they must be deployed either in the VNet or must be accessible using a private endpoint.
    • Note that private endpoint is a metered Azure service. Make sure you familiarize with its pricing, so that you can estimate expected costs depending on the amount of data to ingest.
  • To connect your Azure virtual network and your on-premises network via ExpressRoute, you must create a virtual network gateway first. A virtual network gateway serves two purposes: exchange IP routes between the networks and route network traffic.
  • Before you create an ExpressRoute gateway, you must create a gateway subnet, which must be named GatewaySubnet.
  • The ExpressRoute gateway can be deployed as regional, zonal or zone-redundant.
  • FastPath, when enabled, sends network traffic directly to virtual machines in the virtual network, bypassing the ExpressRoute gateway.
  • ExpressRoute Direct gives you the ability to connect directly into Microsoft’s global network at peering locations strategically distributed around the world. ExpressRoute Direct provides dual 100 Gbps or 10-Gbps connectivity, which supports Active/Active connectivity at scale.

Design recommendations

  • Use a private connection based on ExpressRoute with private peering for a Network Analytics landing zone for scenarios such as:
    • Large environments with large amounts of data.
    • Production environments.
    • Mission critical environments.
    • There are requirements or regulations in your organization, industry or region that require you to transmit corporate data over private connections exclusively, avoiding internet-based connections.
    • It is not allowed in your organization to access an Azure storage service over its public endpoint. Access to Azure storage services must be done over private endpoints.
  • Use ExpressRoute direct if you require more than 10Gbps bandwidth.
  • When using ExpressRoute private peering:
    • Ensure the Azure storage service (such as ADLS Gen2) is accessible via a private endpoint.
    • Enable FastPath on the ExpressRoute connection. This will remove the ExpressRoute Gateway from the data path. Note that it is still required for control plane operations.

ExpressRoute (Microsoft Peering)

Azure ExpressRoute provides a private connectivity that does not traverses the public internet. Thus, besides ensuring that network traffic is kept in a private network, predictable throughput and latency can be expected and ExpressRoute availability is backed by a 99.95% SLA. With Microsoft peering, all communication between on-premises and Azure is done via public IP addresses, that need to be verified by Microsoft. With Microsoft peering, it is possible to reach Azure storage services over a private connection and directly to their public endpoint without requiring any additional infrastructure on Azure. A sample Network Analytics landing zone using ExpressRoute with Microsoft peering is depicted in figure 4 below:

ExpressRouteMSFTPeering

Figure 4: Connectivity to Azure via ExpressRoute with Microsoft peering

Design considerations

  • ExpressRoute lets you extend your on-premises networks into the Microsoft cloud over a private connection.
  • ExpressRoute connections don't go over the public internet. This allows ExpressRoute connections to offer more reliability, faster speeds, consistent latencies, and higher security than typical connections over the internet.
  • Connectivity to Microsoft online services (Microsoft 365 and Azure PaaS services) occurs through Microsoft peering. Microsoft enables bi-directional connectivity between your WAN and Microsoft cloud services through the Microsoft peering routing domain.
  • With ExpressRoute Microsoft peering you don't need an ExpressRoute gateway as you can access Azure PaaS services directly over their public endpoint.
    • This setup may reduce your data transfer costs, as you don't need a private endpoint for the purpose of uploading data from on-premises into an Azure storage service (such as ADLS Gen2).
  • With ExpressRoute Microsoft peering, you must use public IP addresses that you own for setting up the BGP sessions. Microsoft must be able to verify the ownership of the IP addresses through routing internet registries and internet routing registries.
  • When Microsoft peering gets configured in an ExpressRoute circuit, all prefixes related to these services gets advertised through the BGP sessions that are established. A BGP community value is attached to every prefix to identify the service that is offered through the prefix.
  • If you plan to consume only a subset of services offered through Microsoft peering, you can reduce the size of your route tables in two ways. You can:
    • Filter out unwanted prefixes by applying route filters on BGP communities.
    • Define route filters and apply them to your ExpressRoute circuit. A route filter is a resource that lets you select the list of services you plan to consume through Microsoft peering. ExpressRoute routers only send the list of prefixes that belong to the services identified in the route filter.
  • ExpressRoute Direct gives you the ability to connect directly into Microsoft’s global network at peering locations strategically distributed around the world. ExpressRoute Direct provides dual 100 Gbps or 10-Gbps connectivity, which supports Active/Active connectivity at scale.

Design recommendations

  • Use a private connection based on ExpressRoute with Microsoft peering for a Network Analytics landing zone for scenarios such as:
    • Large environments with large amounts of data.
    • Production environments.
    • Mission critical environments.
    • There are requirements or regulations in your organization, industry or region that require you to transmit corporate data over private connections exclusively, avoiding internet-based connections.
    • Access to Azure storage services over their public endpoint is allowed.
  • Ensure Azure storage service is configured to only accept traffic from the public IP addresses that you use for your ExpressRoute Microsoft peering connection.
  • Use Azure route filters and configure them to the Azure service and region that you require. This will ensure that Microsoft will only advertise the IP prefixes required (instead of advertising prefixes for all services).
  • Use ExpressRoute direct if you require more than 10Gbps bandwidth.

Using an existing hub and spoke platform

While the previous section depicted the network connectivity options into an isolated landing zone, some operators may want to leverage their existing hub and spoke (or Azure Virtual WAN) network platform on Azure and deploy a network analytics solution of their choice on a spoke VNet that is connected to the hub VNet via VNet peering. In this way, operators can reuse and share existing ExpressRoute or VPN connectivity between on-premises and Azure.

This architecture is depicted in figure 5 below:

HubAndSpoke

Figure 5: Using an existing hub and spoke platform.

Design considerations

  • On a hub and spoke architecture, all spokes share the same ExpressRoute (or VPN) connection, and it is not possible to allocate dedicated bandwidth per spoke.
    • Such scenarios are suceptible to noisy-neighbor scenarios, where an application that consumes large amounts of bandwidth could negatively impact other applications sharing the same ExpressRoute connection.
    • Azure does not provide a metric to identify the ExpressRoute traffic being consumed by a specific application.
  • On a hub and spoke architecture, hubs also share common resources in the hub, such as Azure Firewall (or a third-party NVA) and the ExpressRoute (or VPN) gateway.
  • FastPath is available to remove the ExpressRoute Gateway from the data path and only be used for control plane operations. While this feature would allow to prevent the ExpressRoute Gateway from becoming a bottleneck for network intense applications, FastPath has currently some limitations.
    • If you connect to a private endpoint in your virtual network from your on-premises network, over a non-100Gbps ExpressRoute Direct circuit, the connection will go through the virtual network gateway. FastPath Connectivity to a private endpoint over a 100Gb ExpressRoute Direct circuit is supported.
    • Note that Private Link Connectivity for 10Gbps ExpressRoute Direct Connectivity is currently in public preview.
  • Currently there is a limitation with private endpoints in which traffic that's destined for a private endpoint through a user-defined route (UDR) might be asymmetric.
    • On this case, return traffic from a private endpoint bypasses a network virtual appliance (NVA) and attempts to return to the source virtual machine.
    • Note that there is a public preview of Private Link UDR Support. This feature enhancement will provide you with the ability to apply custom routes to traffic destined to a private endpoint with a wider subnet range.
  • Note that both, VNet peering and private endpoints are metered services. Thus, there will be charges depending on the amount of traffic through them.
    • When accessing Private Endpoints from a peered Network, you will only be charged for Private Link Premium. You will not be charged for Peering.

Design recommendations

  • To copy/upload data into an Azure storage PaaS service (such as ADLS Gen2), you have the following options:
    • (Recommneded) Create a private endpoint to the Azure storage PaaS service, and it will be accesible from on-premises. You can then copy/upload data using any tool/system either on-premises (push) or from Azure (pull). This is the most secure option, as the storage service is only reachable via the private endpoint, but it will generate costs as private endpoint is a metered service. See figure 5 for more details.

    • Enable VNet service endpoint on a subnet for the Azure storage service you will use. Then, you need to deploy a service on the same subnet which will be the responsible to pull the data from on-premises and upload it into the storage account, as Azure storage services exposed via VNet service endpoints are not accesible from on-premises. While private endpoint as described previously is a metered service, VNet service endpoint is a free service. VNet service endpoint is not as secure as private endpoint, as storage service requires to be accesible over its public endpoint (which can be secured), but also, the subnet enabled for private endpoints can reach other storage accounts and not only your designated ones. See figure 6 for more details. HubAndSpoke

      Figure 6: Using an existing hub and spoke platform and accessing storage service via Service Endpoint.

  • Plan carefully for the bandwidth utilization of your network analytics solution. Depending on the amount of traffic, it could saturate the bandwidth available on the ExpressRoute circuit or the ExpressRoute gateway. This in turn, could cause a negative effect on the rest of the applications that use the same ExpressRoute circuit and gateway (spoke VNets).
  • Consider ExpressRoute Direct for high-bandwidth network analytics scenarios. ExpressRoute Direct would provide additional benefits compared to partner ExpressRoute circuits, including:
    • Higher bandwidth (up to 100 Gbps).
    • Possibility to create multiple ExpressRoute circuits from your assigned port pair (for example, to isolate traffic).
    • FastPath connectivity to a private endpoint over a 100Gb ExpressRoute Direct circuit is supported.
    • (Public preview) Private Link Connectivity for 10Gbps ExpressRoute Direct connectivity.
  • Enable FastPath and (preview) VNet peering support for FastPath if you are using (or will use) a 100 Gbps ExpressRoute connection. This will ensure the ExpressRoute gateway is not on the data path, and you can reach your private endpoints by maximizing bandwidth available on the ExpressRoute circuit.

Reference implementation

Reference implementation Description Deploy Documentation
Network Analytics Landing Zone for Operators Network Analytics landing zone for operators with required infrastructure for data ingestion into an Azure storage service and ready for deployment of storage services (such as ADLS Gen2) an analytics solutions (such as Azure Synapse). Deploy To Microsoft Cloud User guide

This reference implementation is intended for landing zone owners for them to deploy Network Analytics landing zones for operators. This reference implementation allows the deployment of Network Analytics landing zones for operators using three network connectiviity models:

Connectivity Model Network Analytics Landing Zone composition
Internet [Internet]
ExpressRoute with Microsoft Peering ExpressRoute_Microsoft_Peering
ExpressRoute with Private Peering ExpressRoute_Private_Peering

Table 1: Network connectivity models in the Network Analytics Landing Zone reference implementation

As table 1 depicts, the Network Analytics Landing Zones reference implementation deploys and configures several Azure resources. The list of resources are described in table 2 below along with a description. Once the Network Analytics Landing Zones reference implementation deploys those resources, the landing zone is ready for the deployment of Azure storage and Azure analytical services that you would require for your own environment.

Table 2 below also provides links to the deployment guides which include step-by-step deployment instructions for your Network Analytics landing zone. Table 1 also provides links to the Network Analytics solution accelerator to help you deploy and configure data and analitical services in your landing zone.

Azure resource Deployed by Details Deploy
Azure subscription Platform team Azure subscription is provided by the platform team and deployed under the Operator management group AfO Landing Zones User Guide
DNS Platform team DNS name resolution is provided by the platform team via VNet peering to central hub VNet. Note that landing zone owners can optionally deploy a dedicated DNS infrastructure within the Network Analytics landing zone if required AfO Landing Zones User Guide
ExpressRoute circuit Landing Zone owner Optional, as an existing ExpressRoute circuit can be used Network Analytics Landing Zones User Guide
Route filter Landing Zone owner Deployed in case of implementing ExpressRoute with Microsoft peering Network Analytics Landing Zones User Guide
ExpressRoute gateway Landing Zone owner Deployed in case of implementing ExpressRoute with Private peering Network Analytics Landing Zones User Guide
ExpressRoute connection Landing Zone owner Deployed in case of implementing ExpressRoute with Private peering Network Analytics Landing Zones User Guide
Virtual network Landing Zone owner Network Analytics Landing Zones User Guide
NSGs Landing Zone owner Network Analytics Landing Zones User Guide
Azure Bastion Landing Zone owner Network Analytics Landing Zones User guide
Azure storage service(s) Landing Zone owner Any Azure storage service(s) required by the landing zone owner (such as Azure Data Lake Storage Gen2) Solution Accelerator (coming soon)
Private Endpoints Landing Zone owner Solution Accelerator (coming soon)
Analytics services Landing Zone owner Any analytics service(s) as required by the landing zone owner (for example Azure Synapse) Solution Accelerator (coming soon)

Table 2: Resources deployed by the Obervability Landing Zones reference implementation