Compare and contrast azure-py-vdc and azureng-py-vdc #806
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This includes both an update to azure-py-virtual-data-center and a new azureng-py-virtual-data-center.
The two examples are interoperable - you can peer a stack in one with a stack in the other. Both implement the latest Azure Firewall features including forced tunnelling - although the current azure provider can't have additional properties.
Code has been refactored so that both examples are directly comparable - examine vdc.py to see the differences between providers. For example, some parameter names have changed e.g. public_ip_address is now publicIPAddress. Differences in other files are to do with the lack of auto-naming in azure-nextgen.
Code has been optimised to overcome contention issues that show up in the activity log, by moving things around and adding depends_on statements.
These examples demonstrate custom routing that avoids a common pitfall, where traffic already headed to one member of the Azure Firewall VM Scale Set is redirected to the private IP address - causing looping and dropped traffic.