Virtual Network Service Endpoints

Another new announced feature at Ignite was Virtual Network Service Endpoints.

Now I actually saw this turn up in the portal about a w eek ago and wasn’t quite sure what the feature was until now.

Basically this a very simple and very useful feature. up until now services such as Azure storage and Azure SQL have been public facing services. You would connect to these services over a public IP address and secure access either using a firewall or security token. Now I’ve had quite a few customers who were not happy using a public facing service. The new service endpoints allows you to connect your VNet address space to Azure services, and you can restrict access to the services to be from your VNet only.

Allowing you to secure access to Azure resources from your VNet only. The service currently supports Azure Storage & Azure SQL with more services coming in the future.



Azure File Sync

Another newly announced preview service at ignite was Azure File Sync.

Now in my opinion this has been a long time coming, though it was arguably available as part of the StorSimple solution, however this new feature sounds much easier to implement and maintain.

Basically, you install an agent/package on your on-prem fil server and it syncs up with Azure File Storage .

The two great things about this service are:

  • Storage tiering, allowing you to offload files to the cloud and free up your on-prem server space.
  • The solution supports multi master sync. Allowing you to keep file servers in different geographic regions synced with each other. Finally we have a solution for syncing cross premises file servers using Azure as our central store point!

You can read the official announcement here

Back in Business

Just a quick note to all my followers,

As you’ve probably seen my blog has been “sleepy” for the past 12-15 months.
This has been because of multiple reasons mainly our first child arriving, and me changing jobs 18 months ago.
Well the little one is now not so little and I’m changing jobs again.
I figured it’s time to kick this blog back to life. And what better time that during Microsoft ignite when all the new announcements for Azure are flowing in!

So hopefully back top blogging.

Azure Data Box

Azure Data Box is Microsoft’s answer to AWS snowball.


Basically this is a secure, hardened “box”/Storage for transferring large amounts of data to Azure.

The basics are simple. The box plugs directly into your network and supports standard SMB/CIFS protocols.

You copy your data to the box, which supports up to 100TB, and ship it back to Microsoft where it will be offloaded to your Azure storage.

There is also integrated support for 3rd party products such as Commvault, Veeam. Veritas & more.

You can read the official statement here

Azure Service Healing

I often get asked what happens if an Azure service or resource crashes.
I’m also sometimes asked how Azure keep Virtual Machines running 100%.

Well lets start with the second question. They Don’t! Azure is an extremely reliable platform but is still based on industry standard physical servers, power, networking… And sometimes a failure may occur that can cause a VM to reboot or go offline. Having said that uptime is of course extremely high, some services being higher than others. You can find official SLA listings here.

Now regarding what happens if a service does fail. Well Azure has a an Auto-Recovery feature called service healing. Auto-Recovery is available across all Virtual Machine sizes in all regions.
Azure has multiple ways to preform health checks on your resources. Every VM deployed in the form if Web and Worker role has an agent injected in to it that run a health check every 15 seconds, a web farm behind a load balancer will also have health checks performed by the load balancer itself. If a predefined number of consecutive health check fail or a signal from the load balancer causes a role to become unhealthy then a recovery action will be initiated which is to restart the role instance.

Another test preformed is the health of the virtual machine itself within which the role instance is running. The virtual machine is hosted on a physical server running inside an Azure datacenter. The physical server runs another agent called the Host Agent. The Host Agent monitors the health of the virtual machine by pinging the guest agent every 15 seconds. It is quite plausible that a virtual machine is under stress from its workload, which could be its CPU is at 100% utilization, because a machine may be under heavy load Azure will wait 10 minutes before preforming a recovery action. The recovery action in this case is to recycle the virtual machine with a clean OS disk in the case of a Web & Worker Role and in the case of Azure Virtual Machine we perform a reboot preserving the disk state intact.

Apart from this Azure take as many measures as possible to predict failure in advance this includes extensive monitoring of all hardware in the Datacenter including CPU, Disk IO etc.

Azure Cool Blob Storage

Azure’s new cool blob is now GA. But what is cool blob?

Well cool blob is a new blob storage feature for data that is accessed infrequently. In other words it’s good for backups, archives, scientific data etc.

The price of a cool blob is extremely low, between 1 to 1.6 cents per GB per month depending on region.

Cool blobs come with a 99% SLA compared with the 99.9% SLA offered on it’s hot tier. Azure cool blobs API is 100% compatible with existing blob storage offerings.

The Service is only available using the new modern ARM deployment, so if for some reason you need to use classic deployment then you cant take advantage of the new service. Also the service is offered as a block blob for unstructured data, so it can’t be used to store IAAS VHD’s, this makes sense as VHD’s need random read and write operations.

You can read more on the new offering at the Azure Blog over here

Important Notice For All Office 365 Hybrid Environments

Just saw this important blog issue from Microsoft.

On April the 15th Microsoft is renewing the TLS Certificate used by Office 365.

This means that hybrid mail flow may be broken for users who do not take appropriate action.

This fix is quite simple. All on-prem servers used for hybrid  need to be updated to Exchange 2013 CU9 or later and the Exchange hybrid wizard needs to be run again.

You can find the latest version of the hybrid wizard over here

You can find the full Microsoft blog regarding this issue over here