Microsoft Azure Traffic Manager balances the traffic across regions, and there is a regional load balancer based on Azure Application Gateway. This combination gets you the benefits of Traffic Manager's flexible routing and Application Gateway's many capabilities, including:
Web Application Firewall (WAF).
Transport Layer Security (TLS) termination.
Path-based routing.
Cookie-based session affinity.
In this scenario, the application consists of three layers:
Web tier: This is the top layer and has the user interface. It parses user interactions and passes the actions to the business tier for processing.
Business tier: Processes the user interactions and determines the next steps. It connects the web and data tiers.
Data tier: Stores the application data, typically in a database, object storage, or files.
Architecture
Traffic Manager operates at the DNS layer to direct application traffic according to your choice of routing method. For example, you might direct requests to be sent to the closest endpoints to improve responsiveness. Application Gateway load balances HTTP(S) and WebSocket requests as it routes them to backend pool servers. The backend can be public or private endpoints, virtual machines, Azure Virtual Machine Scale Sets, app services, or AKS clusters. You can route traffic based on attributes of an HTTP request, such as hostname and URI path.
Key Components
Azure Virtual Machines VMs are on-demand, scalable computing resources that give you the flexibility of virtualization but eliminate the maintenance demands of physical hardware. The operating system choices include Windows and Linux. The VMs are an on-demand and scalable resource.
Azure Virtual Machine Scale Sets are automated and load-balanced VM scaling that simplifies the management of your applications and increases availability.
Traffic Manager is a DNS-based traffic load balancer that distributes traffic optimally to services across global Azure regions while providing high availability and responsiveness. For more information, see the section Traffic Manager configuration.
Application Gateway is a layer seven load balancer. In this architecture, a zone-redundant Application Gateway routes HTTP requests to the web front end. Application Gateway also provides a Web Application Firewall (WAF) that protects the application from common exploits and vulnerabilities. The v2 SKU of Application Gateway supports cross-zone redundancy. A single Application Gateway deployment can run multiple instances of the gateway.
Azure Load Balancer is a layer four load balancer. There are two SKUs: Standard and Basic. In this architecture, a zone-redundant Standard Load Balancer directs network traffic from the web tier to the business tier. Because a zone-redundant Load Balancer is not pinned to a specific zone, the application will continue to distribute the network traffic in the case of a zone failure.
Azure DDoS Protection has enhanced features to protect against distributed denial of service (DDoS) attacks, features that go beyond the basic Azure advanced threat protection that Azure provides.
Azure DNS is a hosting service for DNS domains. It provides name resolution using Microsoft Azure infrastructure. By hosting your domains in Azure, you can manage your DNS records using the same credentials, APIs, tools, and billing as your other Azure services. Azure DNS also supports private DNS zones. Azure DNS Private Zones provide name resolution within a virtual network, as well as between virtual networks. The records contained in a private DNS zone are not resolvable frinternetnternet. DNS resolution against a private DNS zone works only from virtual networks that are linked to it.
Azure Virtual Network is a secure private network in the cloud. It connects VMs to one another, internetnternet, and to on-premises networks.
Azure Bastion provides secure and seamless Remote Desktop Protocol (RDP) and Secure Shell (SSH) access to the VMs within the virtual network. This provides access while limiting the exposed public IP addresses of the VMs in the virtual network. Azure Bastion provides a cost-effective alternative to a provisioned VM to provide access to all VMs within the same virtual network.
Recommendations
The following recommendations apply to most scenarios. Follow these recommendations unless you have a specific requirement that overrides them.
Use at least two Azure regions for higher availability. You can deploy your application across multiple Azure regions in active/passive or active/active configurations.
For production workloads, run at least two gateway instances. Note that in this architecture, the public endpoints of the Application Gateways are configured as the Traffic Manager backends.
Use Network Security Group (NSG) rules to restrict traffic between tiers.
Availability considerations
Azure Availability Zones
Azure Availability Zones provide high availability within a region. A regional network connects at least three physically distinct strategically placed data centres in each region.
Multiple regions
Deploying in multiple regions can provide higher availability than deploying to a single region. If a regional outage affects the primary region, you can use Traffic Manager to fail over to the secondary region. Multiple regions can also help if an individual subsystem of the application fails.
Note that this architecture is applicable for active/passive as well as for active/active configurations across Azure regions.
Paired regions
Each Azure region is paired with another region in the same geography (for example, the United States, Europe, or Asia). This approach allows for the replication of resources, such as VM storage, across regions. The idea is to keep one region available even if the other becomes unavailable due to natural disasters, civil unrest, power loss, network outages, and so on.
There are other advantages of regional pairing, including:
In the event of a wider Azure outage, one region is prioritized out of every pair to help reduce the time to restore applications.
Planned Azure updates are rolled out to paired regions one at a time to minimize downtime and risk of application outage.
Data continues to reside within the same geography as its pair (except for Brazil South) for tax and law enforcement jurisdiction purposes.
Make sure that both regions support all of the Azure services that your application needs (see Services by Region).
Manageability considerations
Resource groups: Use Resource groups to manage Azure resources by lifetime, owner, and other characteristics.
Virtual network peering: Use Virtual network peering to seamlessly connect two or more virtual networks in Azure. The virtual networks appear as one for connectivity purposes. The traffic between virtual machines in peered virtual networks uses the Microsoft backbone infrastructure. Make sure that the address space of the virtual networks doesn't overlap. In this scenario, the virtual networks are peered via Global virtual network peering to allow data replication from the primary region to the secondary region.
Virtual networks and subnets of Azure VM and specific Azure resources (such as Application Gateway and Load Balancer) are deployed into a virtual network that can be segmented into subnets. Create a separate subnet for each tier.
Traffic Manager configuration
Traffic Manager delivers high availability for your critical applications by monitoring endpoints and providing automatic failover when an endpoint goes down.
Consider the following points when configuring Traffic Manager:
Routing: Traffic Manager supports six traffic-routing methods to determine how to route traffic to the various service endpoints. In this architecture, we use performance routing, which routes traffic to the endpoint that has the lowest latency for the user. Traffic Manager adjusts automatically as endpoint latencies change. Also, if you need more granular control—for example, to choose a preferred failover within a region—you can use Traffic Manager in a nested configuration.
Health probe: The Traffic Manager uses an HTTP (or HTTPS) probe to monitor the availability of each region. The probe checks for an HTTP 200 response for a specified URL path. As a best practice, create an endpoint that reports the overall health of the application and use this endpoint for the health probe. Otherwise, the probe might report a healthy endpoint when critical parts of the application are failing.
When Traffic Manager fails over, there is a period of time when clients cannot access the application. The duration is affected by the following factors:
The health probe must detect that the primary region has become unreachable.
DNS servers must update the cached DNS records for the IP address, which depends on the DNS time-to-live (TTL). The default TTL is 300 seconds (5 minutes), but you can configure this value when you create the Traffic Manager profile.
Traffic View: Enable Traffic View to understand which regions have a large amount of traffic but suffer from higher latencies. Then, you can use this information to plan your footprint expansion in new Azure regions. That way, your users will have a lower latency experience.
Application Gateway
Application Gateway v1 SKU supports high-availability scenarios when you've deployed two or more instances. Azure distributes these instances across update and fault domains to ensure that instances don't all fail at the same time. The v1 SKU supports scalability by adding multiple instances of the same gateway to share the load.
Application Gateway v2 SKU automatically ensures that new instances are spread across fault domains and update domains. If you choose zone redundancy, the newest instances are also spread across availability zones to offer zone failure resiliency.
Health probes
Application Gateway and Load Balancer both use health probes to monitor the availability of VM instances.
Application Gateway always uses an HTTP probe.
Load Balancer can test either HTTP or TCP. Generally, if a VM runs an HTTP server, use an HTTP probe. Otherwise, use TCP.
Security considerations
Use DDoS Protection Standard for greater DDoS protection than the basic protection that Azure provides. For more information
Use
Network Security Groups (NSGs) to restrict network traffic within the virtual network. For example, in the three-tier architecture shown here, the database tier accepts traffic only from the business tier and the Bastion subnet, not from the web front end.
Network Security Groups
Only the business tier can communicate directly with the database tier. To enforce this rule, the database tier should block all incoming traffic except for the business-tier subnet.
Deny all inbound traffic from the virtual network. (Use the VIRTUAL_NETWORK tag in the rule.)
Allow inbound traffic from the business-tier subnet.
Allow inbound traffic from the database-tier subnet itself. This rule allows communication between the database VMs, which is needed for database replication and failover.
Create rules 2 – 3 with higher priority than the first rule so they override it.
You can use service tags to define network access controls on Network Security Groups or Azure Firewall.
Pricing
Use the Azure Pricing Calculator to estimate costs. Here are some other considerations.
Virtual Machine Scale Sets
Virtual Machine Scale Sets are available on all Windows VM sizes. You're only charged for the Azure VMs you deploy, and any additional underlying infrastructure resources consumed, such as storage and networking. There are no incremental charges for the Virtual Machine Scale Sets service.
Standard Load Balancer
Pricing of the Standard Load Balancer is hourly based on the number of configured outbound load-balancing rules. Inbound NAT rules are free. There is no hourly charge for the Standard SKU Load Balancer when no rules are configured. There is also a charge for the amount of data that the Load Balancer processes.
Application Gateway v2 SKU
The Application Gateway should be provisioned with the v2 SKU and can span multiple Availability Zones. With the v2 SKU, the pricing model is driven by consumption and has two components: an hourly fixed price and a consumption-based cost.
Traffic Manager
Traffic Manager billing is based on the number of DNS queries received, with a discount for services receiving more than 1 billion monthly queries. You're also charged for each monitored endpoint.
Virtual network peering
A high-availability deployment that leverages multiple Azure Regions makes use of virtual network peering. The charges for virtual network peering within the same region aren't the same as charges for global virtual network peering.
Comments