infoblox_nios:azure
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infoblox_nios:azure [2024/08/19 10:40] – [X6 in Azure] bstafford | infoblox_nios:azure [2025/03/07 04:36] (current) – [Private Link] bstafford | ||
|---|---|---|---|
| Line 10: | Line 10: | ||
| ===== Private Link ===== | ===== Private Link ===== | ||
| When configuring forward zone to web.core.windows.net, | When configuring forward zone to web.core.windows.net, | ||
| + | |||
| + | 168.63.129.16 is the magic DNS IP in Azure. | ||
| + | |||
| + | Resolver = $180 montly per endpoint. | ||
| + | ===== HA ===== | ||
| + | Documentation on [[https:// | ||
| + | |||
| + | Permission details for HA are [[https:// | ||
| + | |||
| + | * You must create a Managed Identity and set the scope as a subscription. | ||
| + | * The custom role must be assigned to the Managed Identity. | ||
| + | * The Managed Identity must be assigned to both vNIOS of the HA configuration. | ||
| + | |||
| + | NIOS HA in Azure/ | ||
| + | |||
| + | Three interfaces required (MGMT, LAN1 and HA) | ||
| + | |||
| + | HA interface shoudl have a secondary IP assigned if in AWS/Azure. In GCP, this is called an alias IP being associated. This IP will be designated as the VIP. | ||
| + | |||
| + | Certain permissions through EC2 Instance profile (AWS), Managed Identities (Azure) and Service account (GCP) are required. | ||
| + | |||
| + | A DNS resolver must be available. | ||
| + | |||
| + | For GCP, if the configured DNS resolver fails to resolve the Google API metadata.google.internal, | ||
| + | |||
| + | In NIOS 9.0.4 and higher, under Grid > Grid Manager > Members > Properties > Network there is now a tick box in the HA section called " | ||
| + | |||
| + | In the "Ports and Addresses" | ||
| + | |||
| + | Due to a certain restriction from Azure, the Address Resolution Protocol (ARP) functionality on the passive node of an HA pair always remains enabled. It cannot be disabled. Therefore, the passive node always responds to ping requests. | ||
| + | |||
| + | The time taken for an HA failover can vary depending on the response time from the host. | ||
| + | |||
| + | vNIOS for Azure does not support automatic upgrade of software (NIOS) on an HA node If the node is running on a version of NIOS that is prior to 9.0.4 | ||
| + | |||
| + | |||
| ===== X6 in Azure ===== | ===== X6 in Azure ===== | ||
| Line 24: | Line 60: | ||
| | TE-v2225/ | | TE-v2225/ | ||
| - | HA not supported on TE-926 because it only has two interfaces. Three needed for HA (MGMT, LAN1, HA) | + | [[https:// |
| https:// | https:// | ||
| + | |||
| + | Limitations and recommendations specific only to Azure Public Cloud: | ||
| + | * Azure Public Cloud does not support IPv6 network configuration. | ||
| + | * Adding or deleting a network interface when a vNIOS for Azure instance is powered on, can result in unexpected behavior. You must first power off the instance, add or delete the interface, and then start the instance. | ||
| + | * vNIOS for Azure Public Cloud instances do not support high availability (HA) configuration on the following virtual machine sizes: | ||
| + | * Standard DS11 v2 that is used in IB-V825 and CP-V805 appliances | ||
| + | * Standard_E4s_v3 that is used in IB-V926 appliances | ||
| + | * vNIOS for Azure Public Cloud instances do not support an HA setup with nodes on different cloud platforms, regions, or hosts. | ||
| + | * Due to a certain restriction from Azure, the Address Resolution Protocol (ARP) functionality on the passive node of an HA pair always remains enabled. It cannot be disabled. Therefore, the passive node always responds to ping requests. | ||
| + | * The time taken for an HA failover can vary depending on the response time from the host. | ||
| + | * vNIOS for Azure does not support automatic upgrade of software (NIOS) on an HA node If the node is running on a version of NIOS that is prior to 9.0.4. | ||
| + | |||
| + | ===== Deploying in Azure ===== | ||
| + | Azure PowerShell | ||
| + | < | ||
| + | $pubName=" | ||
| + | $offername = " | ||
| + | $skuName=" | ||
| + | $versionName=" | ||
| + | |||
| + | Get-AzVMImage -Location $locName -PublisherName $pubName -Offer $offerName -Skus $skuName -Version $versionName</ | ||
| + | |||
| + | Find Publisher | ||
| + | < | ||
| + | Get-AzVMImagePublisher -Location $locName</ | ||
| + | |||
| + | Find Offer | ||
| + | < | ||
| + | Get-AzVMImageOffer -Location $locName -PublisherName $pubName | Select Offer</ | ||
| + | < | ||
| + | infoblox-bloxone-34 | ||
| + | infoblox-cp-v1405 | ||
| + | infoblox-nios-for-9_0_x-for-ddi | ||
| + | infoblox-vm-appliances-853 | ||
| + | infoblox-vm-appliances-860 | ||
| + | infoblox-vm-appliances-861 | ||
| + | infoblox-vm-appliances-862 | ||
| + | infoblox-vm-appliances-863 | ||
| + | infoblox-vm-appliances-900 | ||
| + | infoblox-vm-appliances-901 | ||
| + | infoblox-vm-appliances-902 | ||
| + | infoblox-vm-appliances-903 | ||
| + | infoblox-vm-appliances-904 | ||
| + | infoblox-vm-appliances-904-test | ||
| + | infoblox-vm-appliances-905 | ||
| + | infoblox-vnios-te-v1420 | ||
| + | infoblox_nios_payg</ | ||
| + | Get Skus | ||
| + | < | ||
| + | Get-AzVMImageSku -Location $locName -PublisherName $pubName -Offer $offerName | Select Skus</ | ||
| + | < | ||
| + | ---- | ||
| + | niosprivateoffer | ||
| + | vgsot | ||
| + | vgsot-ni | ||
| + | vsot | ||
| + | vsot-ni</ | ||
| + | Get Version | ||
| + | < | ||
| + | Get-AzVMImage -Location $locName -PublisherName $pubName -Offer $offerName -Skus $skuName</ | ||
| ===== DHCP in Azure ===== | ===== DHCP in Azure ===== | ||
| + | **NOTE**: See end of this section for why DHCP doesn' | ||
| Unlike AWS and GCP, Azure uses standard DHCP code for issuing DHCP to VM's in Azure itself. This means they are more sensitive to T1 timers (somehow). | Unlike AWS and GCP, Azure uses standard DHCP code for issuing DHCP to VM's in Azure itself. This means they are more sensitive to T1 timers (somehow). | ||
| Line 58: | Line 155: | ||
| Some unofficial lab testing in Feb 2023 seemed to show that DHCP rate limiting in Azure has been lifted and that it works. However, Microsoft still do not support it as of May 2023. | Some unofficial lab testing in Feb 2023 seemed to show that DHCP rate limiting in Azure has been lifted and that it works. However, Microsoft still do not support it as of May 2023. | ||
| + | |||
| + | ** Why DHCP in Azure is still a bad idea ** | ||
| + | When two DHCP members are configured in a Failover Association (any system using Failover Association) then the first lease given to a client is the MCLT (normally 1 hour). Half way through this (e.g. 30 minutes) it will try and renew. The DHCP server will then issue a full lease. Since Azure blocks T1, this cannot happen. At T2, the client issues a rebind. The DHCP failover association sees the T2 rebind and assumes there is a problem with the peer and so issues MCLT again. | ||
| + | |||
| + | This means that clients can never have full lease time and thus may easily overwhelm a DHCP server. e.g. if you size the DHCP server based on 50,000 devices having 14 day lease times, it probably won't cope with 50,000 devices trying to renew every 30 minutes. | ||
| + | |||
| + | Because DHCP FO uses " | ||
| + | |||
| + | Remember, T2 is rebind and not a renewal. A lot of " | ||
| + | |||
| + | This does not affect Infoblox Universal DDI because it uses a different methodology for DHCP HA. | ||
| + | |||
| + | |||
infoblox_nios/azure.1724064030.txt.gz · Last modified: by bstafford
