Azure Landing Zones Documentation
Home GitHub Issue Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

3 - Multi-Region Hub and Spoke Virtual Network with Network Virtual Appliance (NVA)

A full platform landing zone deployment with hub and spoke Virtual Network connectivity in multiple regions, ready for a third party Network Virtual Appliance (NVA).

Resources

The following resources are deployed by default in this scenario:

Management

Management Groups

  • Management Groups
  • Policy Definitions
  • Policy Set Definitions
  • Policy Assignments
  • Policy Assignment Role Assignments

Management Resources

  • Log Analytics Workspace
  • Log Analytics Data Collection Rules for AMA
  • User Assigned Managed Identity for AMA
  • Automation Account

Connectivity

Azure DDOS Protection Plan

  • DDOS Protection Plan

Azure Virtual Networks

  • Hub virtual networks in each region
  • Hub virtual network peering
  • Subnets for Network Virtual Appliance, Gateway, Bastion, and Private DNS Resolver in each region
  • Azure Route table for Network Virtual Appliance per region
  • Azure Route table for other subnets and spokes per region

Azure Bastion

  • Azure Bastion per region
  • Azure Bastion public ip per region

Azure Private DNS

  • Azure Private DNS Resolver per region
  • Azure non-regional Private Link Private DNS zones in primary region
  • Azure regional Private Link Private DNS zones per region
  • Azure Virtual Machine auto-registration Private DNS zone per region
  • Azure Private Link DNS zone virtual network links per region

Azure Virtual Network Gateways

  • Azure ExpressRoute Virtual Network Gateway per region
  • Azure VPN Virtual Network Gateway per region

Configuration

The following relevant configuration is applied:

Azure DNS

Private DNS is configured ready for using Private Link and Virtual Machine Auto-registration. Spoke Virtual Networks should use the Network Virtual Appliance IP Address in the same region as their DNS configuration.

  • Network Virtual Appliance should be configured as DNS proxy
  • Network Virtual Appliance should be forward DNS traffic to the Private DNS resolver
  • Azure Private DNS Resolver has an inbound endpoint from the hub network
  • Azure Private Link DNS zones are linked to the all hub Virtual Networks

Azure Routing

Route tables are pre-configured for spoke virtual networks in each region. Assign the user subnet route table to any subnets created in spokes.

  • Network Virtual Appliance in relevant region as next hop in Route Table