Edit

Share via


Plan your network for disconnected operations on Azure Local (preview)

This article explains how to plan your network for disconnected operations on Azure Local. Learn key design considerations and requirements to ensure reliable integration and performance in a disconnected environment.

Important

This feature is currently in PREVIEW. See the Supplemental Terms of Use for Microsoft Azure Previews.

Understand network requirements

Disconnected operations run on Azure Local, so it's important that you understand Azure Local's network requirements. Ensuring that your network meets these requirements is essential for seamless integration and optimal performance. For more detailed information, see Physical network requirements for Azure Local.

Azure Local lets you set up the instance to fit your needs. Deploy the disconnected operations as a virtual machine (VM) appliance that integrates with the Azure Local network. This setup supports robust and reliable operations even when internet connectivity is intermittent or unavailable.

Network checklist

Use this checklist to plan your network for disconnected operations on Azure Local:

  • Review Physical network requirements for Azure Local.

  • Check System requirements for Azure Local.

  • Develop the Azure Local network plan (Disconnected operations and Azure Local):

  • Set up the network for disconnected operations (ingress and management network):

    • Assign an ingress IP within the management IP address pool subnet. Make sure it doesn't overlap with the range provided during deployment.

    • Check that the container network range doesn't conflict with the external network.

  • Make sure the domain name system (DNS) server is accessible for disconnected operations. Set it up during deployment to flow through the ingress vNIC/IP.

  • Check that the DNS server can resolve the endpoints for the ingress IP.

  • Check that the disconnected operations appliance can reach endpoints (IP and port) through the ingress vNIC/IP.

  • Make sure an identity provider is routable and accessible from the disconnected operations appliance on the management network (intent).

  • Set up the external network so services outside Azure Local can resolve and route traffic to the disconnected operations ingress IP (port 443).

Virtual network interface cards and network integration

The disconnected operations VM appliance uses two different virtual network interface cards (vNICs) that plug into the network intent.

These vNICs are:

  • Management vNIC
  • Ingress vNIC

Here's a high-level workflow for vNIC management and deployment:

  • Connect the vNICs to the virtual switch for management, which links to your physical network.
  • Set an IP address for the vNICs during deployment.
  • Use the vNIC interfaces for bootstrapping, troubleshooting, operations, and regular use through the portal or CLI.

Screenshot of how the appliance and users or workloads communicate with the service.

Plan your ingress IP

When you plan your ingress IP, make sure it's in the same subnet range as the cluster you configure later, but outside the reserved IP range. For example, if your cluster's subnet range is 192.168.1.0/24 and the reserved IP range is 192.168.1.1 - 192.168.1.10, choose an ingress IP like 192.168.1.11 or higher, so it doesn't overlap with the reserved range.

Note

Disconnected operations has a built-in container network range that can interfere with your existing network range. If you already use the range 10.131.19.0/24, isolate this range from your disconnected operations environment.

  • You can't reconfigure the built-in container network range.

IP checklist for the disconnected appliance

Use this checklist to plan your IP addresses for the disconnected operations appliance:

  • Ingress IP:

    • Connects to the management intent.
    • Uses the standard network path for the control plane and Azure Local features.
    • Requires DNS resolution to the target fully qualified domain name (FQDN).
    • Must be in the same subnet as the Azure Local instance, but outside the reserved range used for the instance deployment.
  • Management IP:

    • Connects to management intent.
    • Must be a valid, unused IP on the local network.
    • Must be reachable if you access lower management application programming interfaces (APIs) from outside the cluster.

Plan DNS and public key infrastructure (PKI)

During deployment of disconnected operations, you need an FQDN for your appliance that resolves to the ingress IP. It's important to plan your DNS and PKI infrastructure before you deploy disconnected operations. Also, consider how you want to use them to serve clients in your environment.

The ingress network has several endpoints based on the configured FQDN. These endpoints must be resolvable and secure in your network. For a list of endpoints, see PKI for disconnected operations.

Note

The wildcard endpoints serve as backing services where your users dynamically create services such as Azure Key Vault or Azure Container Registry. Your infrastructure needs to resolve a wildcard for these specific endpoints.

If you plan to connect the appliance to Azure, make sure your DNS infrastructure resolves the required Microsoft endpoints. Allow DNS requests from the disconnected operations appliance and make sure there's a network path from disconnected operations to the ingress network to reach the external endpoints.

For more information, see Firewall requirements for Azure Local.

Configure your DNS server (if you're running Windows Server DNS role):

Here's an example:

$externalFqdn = 'autonomous.cloud.private'
$IngressIPAddress = '192.168.200.115'

Add-DnsServerPrimaryZone -Name $ExternalFqdn -ReplicationScope Domain

Add-DnsServerResourceRecordA -Name "*" -IPv4Address $IngressIpAddress -ZoneName $ExternalFqdn 

Verify your DNS setup

Here's an example:

nslookup portal.autonomous.cloud.private

Here's a sample output:

Name:    portal.autonomous.cloud.private
Address:  192.168.200.115

Run appliance with limited connectivity

Run the appliance in limited connectivity mode to make support easier and let logs and telemetry go directly to Microsoft without an export or import job. The disconnected appliance only needs to resolve a subset of these endpoints for observability and diagnostics.

In limited connectivity mode, the appliance resolves certain Microsoft endpoints for observability and diagnostics.

Here are the endpoints that the appliance needs to resolve:

Observability and diagnostics Endpoint
Geneva Observability Services gcs.prod.monitoring.core.windows.net

*.prod.warm.ingest.monitor.core.windows.net
Azure Connected Machine Agent Managed Identity login.windows.net

login.microsoftonline.com

pas.windows.net

management.azure.com

*.his.arc.azure.com

*.guestconfiguration.azure.com

Unsupported features

The following features aren't supported in this preview:

  • Configurable Virtual Local Area Network (VLAN) for disconnected operations ingress network that lets you add VLAN tags to ingress packets on a per-port basis.
  • Configurable VLAN for disconnected operations management network that lets you isolate management traffic from other network traffic, enhance security, and reduce interference.

This feature is available only in Azure Local 2506.