Azure internal load-balanced network with VNet Gateway with P2S VPN - azure

So as the title suggests, I need to make a load-balanced internal gateway with a VPN. I'm a developer, so networking is not my forte.
I have two identical VMs (VM1 in Availability Zone 1 and VM2 in Availability Zone 2) and I need to share VPN traffic between them. My client has provided a range of 5 addresses that will be configured on their firewall, so I will pick one for them to use and they then need to be oblivious to the internal routing.
My ultimate goal is to allow the client to connect through a VPN to one IP address (in the range they have allocated) and let Azure direct the traffic to VM1 primarily, but failover to VM2 if Availability Zone 1 goes down. The client must be oblivious to which VM they ultimately connect to.
My problem is that I cannot create a configuration where the Load Balancer's static IP is in the address range of the Gateway's VPN P2S address pool. Azure requires the P2S address pool to be outside of the VNet's address space and the Load Balancer needs to use the VNet's Subnet (which obviously is INSIDE the VNet's address space, so I'm stuck.
I can create the GW -> Vnet -> subnet -> VM1/VM2 set up no problem using the client's specified IP range for the P2S VPN, but without a Load Balancer, how do I then direct the traffic between the VMs?
e.g. (IPs are hypothetical)
The Vnet address range is 172.10.0.0/16
The Gateway subnet is 172.10.10.0/24
The Gateway's P2S address pool is 172.5.5.5/29
VM1's IP is 172.10.10.4
VM2's IP is 172.10.10.5
I can create a Load Balancer to use the Vnet (and the VMs in a Backend Pool), but then it's static IP has to fall in the VNet's subnet and thus outside the P2S address pool. So how do I achieve this?
I thought of creating a second VNet and corresponding Gateway and linking the Gateways, but I seemed to end up in the same boat
UPDATE: here is an image of my VNet diagram. I have only added one of the VMs (NSPHiAvail1) for now, but VM2 will be in the same LB backend pool
NSP_Address_Range is the range is a subnet of the VNet and is the range dictated by the client. The load balancer has a frontend IP in this range

Firstly, the Azure load balancer does round-robin load balancing for new incoming TCP connections, you could not use it for failover.
My problem is that I cannot create a configuration where the Load
Balancer's static IP is in the address range of the Gateway's VPN P2S
address pool.
You do not need to add the Load balancer frontend IP in the P2S address pool, the address pool is used for clients connecting to your Azure VNet.
Generally, you could configure P2S VPN gateway, create Gateway subnet and vmsubnet and create an internal standard SKU load balancer in the vmsubnet, then you could add the VMs in the vmsubnet into the backend pool as the backend target of the load balancer and configure the healthpro and load balancer rule for load balancing traffic. If so, you could access the backend VMs from clients via the load balancer frontend private IP.
Moreover, you could know some limitations about internal load balancer.

My problem was the Load Balancer Rules - or lack thereof. Once I had added a rule for port 1433 (SQL Server), I was able to query the DB from my local instance of SSMS
There is another solution that is a LOT simpler than the solution I was trying to implement, BUT it does not work allow for an internal load balancer
Azure Virtual Machine Scale Sets implement as many VMs as I specify and will automatically switch to another zone if one goes down. I have no need for the scalability aspect, so I disabled this and I'm only using the Load balancing aspect.
NB This setup only exposes a PUBLIC IP and you cannot assign an internal load balancer in conjunction with the default public load balancer
Here's some info:
Quickstart: Create a virtual machine scale set in the Azure portal
Create a virtual machine scale set that uses Availability Zones
Networking for Azure virtual machine scale sets
Virtual Machine Scale Sets
The cost is exactly what you'd pay for individual VMs, but the loadbalancing is included. So it's cheaper than the solution I described in my question. Bonus!

Related

Azure load balancer inside a subnet VPN gateway

I have two virtual machines in azure VNet (IP adresses 10.1.0.4 and 10.1.0.5), and one machine connected to VNet via VPN Gateway (IP 10.3.0.2). Is is possible to create a load balancing in internal load balancer to redirect UPD traffic to VPN connected machine?
Azure Load Balancer supports virtual machines or virtual machine scale sets as it's backend pool endpoints along with addition of instances via network interface or IP addresses. However, a backend pool configured by IP address has the following limitation:
The backend resources must be in the same virtual network as the load balancer.
Reference : https://learn.microsoft.com/en-us/azure/load-balancer/backend-pool-management#limitations
So, you cannot add a VPN connected on-premise machine in the backend pool of the load balancer. There is an active feature request for this and it is under review by the load balancer product group team. You can upvote this feature request in the below forum for future improvements:
https://feedback.azure.com/d365community/idea/49c222f6-8726-ec11-b6e6-000d3a4f0789

Azure load balancer inside a subnet

I have a VNET with a subnet, there are 3 VMs in the subnet, the VNET is connected via a VPN connection to an on-premises server. The on-premises server will send requests to an internal IP of the subnet.
What I'd like to do is host a load balancer with no public IP, but has an IP in the subnet range. The on-premises app would then talk to the single load balancer, which would in turn forward the request on to any of the servers hosting my app in the subnet.
Can anyone tell me if this is possible, or an alternative if possible.
I believe you are looking for an internal load balancer.
You can find documentation for that here: https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-get-started-ilb-arm-portal.
Azure Internal Load Balancer (ILB) provides network load balancing between virtual machines that reside inside a cloud service or a virtual network with a regional scope.
Create a Load Balancer as usual, but specify Type: Internal.
Probably best to make it use a static IP address as well so it won't change.
Then you'll need to configure its back-end pool and health probe so it knows where to route traffic.

Azure internal load balancer outbound connectivity

How can virtual machines behind an Azure internal load balancer access internet? Is there an AWS NAT gateway equivalent in Azure?
A Virtual Machine that is part of the backend pool of a Standard (not Basic) Internal Load Balancer can not make outgoing connections to the Internet.
To make outgoing connections it is necessary to create a second Load Balancer with a public IP with the same backend pool and a dummy rule with a dummy probe. Once the rule is created then it will trigger the creation of an outbound SNAT.
https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-outbound-connections#defaultsnat
By default, Azure VM behind an Azure internal load balancer, that VM can access the internet, but you can't access it from internet.
If you want to access it, you can create a VM in that VM with a public IP address, use that VM work as jumpbox. Also you can assign a public IP address to that VM, then use that public IP address to access it.

Azure Load Balancer - bad outgoing IP address

I have two Azure VMs behind the load balancer. VMs don't have any public IP, only LB has one static public IP address.
Sometimes VM gets outgoing public IP 13.93.5.128, which is not right. When I restart one VM, it gets right IP but second VM get this bad IP. It changes even without restart.
According this - https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-outbound-connections - I think I'm using Load-balanced VM (no Instance Level Public IP address on VM) (SNAT).
Trying outgoing IP with dig myip.opendns.com #resolver1.opendns.com .
How can I have outgoing IP for all VMs behind Load Balancer always the same (load balancer's one)?
This maybe over elaborate for your requirements but if your VMs are hosted using ARM (as opposed to CLASSIC) then you can reserve a public IP address for the LOAD BALANCER. If you are unhappy with the allocated address for whatever reason reserve and allocate a new one.
Example
Create a resource group
Create a virtual network inside the resource group
Create a subnet inside the virtual network
Create a public IP
Create a load balancer under the resource group
Create Front-end IP pool inside the load balancer and assign the newly created public IP to it.
Create a Backend IP pool inside the load balancer
Create rules for the load balancer
Create Inbound NAT rules inside the load balancer
Create probes for the load balancer
Create a NIC under the resource group. NIC must be under the created Resource group, Vnet, and subet.
Also, it must be attached with the backend pool from the load balancer and the inbound NAT rules from the load balancer.
Create a new VM and attach the newly created NIC
Reference
These are worth reading:
https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-get-started-internet-arm-ps
https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-arm

Control outbound IP address of internal VMSS in Azure

I have a VMSS/svc fabric cluster on internal vnet (not public). The only inbound connections to the VMSS is from on prem through a Azure VPN Gateway.
How do I control the outbound IP address the VMSS go through when accessing the internet? In this case I do not want this traffic routed through a random IP address or through the VPN connection.
Basically I want to secure my Azure SQL so that the outbound internet IPs of the VMSS is whitelisted. And I don't want to add all Azure datacenter IPs.
You could look to use Forced Tunneling which would ensure that your control where the data egress occurs in your on-premises environment, however this would force any data in your Virtual Network back over your VPN connection which may not be desirable (or helpful if you don't control egress from there).
Failing this you could add a software-based firewall running on an Azure VM with a public IP onto the same VNet and then use User Defined Routes (UDRs) to force all traffic bound for the Internet to go via that and then use the public IP address in your SQL firewall.
Longer term you will be able to connect Azure SQL DB to VNets (or at least restrict access to it from one) - see the Uservoice site (and add your vote!)

Resources