Skip to content

This issue was moved to a discussion.

You can continue the conversation there. Go to discussion →

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Subnet definition does not match project #261

Closed
fmms opened this issue Dec 20, 2021 · 5 comments
Closed

Subnet definition does not match project #261

fmms opened this issue Dec 20, 2021 · 5 comments
Labels
question Further information is requested

Comments

@fmms
Copy link

fmms commented Dec 20, 2021

Hi,

in the bastion template we have:

param bastionSubnetAddressPrefix string = '10.1.10.0/24'

However, in the configuration at

"value": "10.0.0.0/16"

an address range is referenced that does not fit to this default IP address.

As the bastion host is stored in this repository to be instantiated as part of the mangement zone i suggest to get that aligned.

regards

@fmms
Copy link
Author

fmms commented Dec 20, 2021

Unfortunately linked to Azure/azure-quickstart-templates#2786 as well, if the solution should be redeployable.

@marvinbuss
Copy link
Collaborator

Thanks @fmms for submitting this.

We are calling out here that this can be deployed to a Landing Zone or Management Zone. The default subnet address prefixes are actually within the address space of the default Data Landing Zone values. Hence, this will most likely stay as it is. Users can update the address space accordingly to land this into their management zone.

Azure/azure-quickstart-templates#2786 is a well known issue that is not in control of our team. Hence, we also have to live with that network RP design. If you want to make it idempotent, you will have to add the Bastion Host template to the landing zone or management zone setup. Currently, we are evaluating whether we should do this. Please add your comment here, if you want us to work on this: Azure/data-landing-zone#202
Reason why we have not done this so far is that most customers do not require a Bastion Host, because they already have a VPN or ExpressRoute connectivity that allows them to connect to services privately. Adding a Bastion host setup in those scenarios would just consume additional address space and is therefore not desired.

@fmms
Copy link
Author

fmms commented Dec 21, 2021

@marvinbuss yes, i did read that it can be instantiated in both, just had the feeling as this is stored in the data-management-zone repo, it should be by default aligned to that and not the data-landing-zone. Moreover, to me it seemed like logically this should be part of the management zone as this is an overarching service while testing this and not something to be used in production scenarios where you will have network peering.

@marvinbuss
Copy link
Collaborator

Due to the IAM requirements described here Azure Bastion is not necessarily an overarching service that is shared across all spokes. Due to these restrictions, users often deploy this into the respective spoke rather than use it as a shared resource. As a result, we are not dictating the use and deployment only in the Management Zone or Landing Zone. It can be landed into each one of them depending on the user group.

@marvinbuss marvinbuss added the question Further information is requested label Dec 23, 2021
@marvinbuss
Copy link
Collaborator

I will convert this into a discussion for now. If changes are required based on the discussion, we may open a new issue.

@Azure Azure locked and limited conversation to collaborators Dec 23, 2021
@marvinbuss marvinbuss converted this issue into discussion #266 Dec 23, 2021

This issue was moved to a discussion.

You can continue the conversation there. Go to discussion →

Labels
question Further information is requested
Projects
None yet
Development

No branches or pull requests

2 participants