Preparing Azure for a Zerto Cloud Appliance Installation – Part 4: Storage Accounts

Storage Accounts

Creating a new Storage Account like we will do in this step isn’t required to do a ZCA installation because the ZCA installer will create it automatically. However, as part of the installation, you can also select existing storage accounts so this post shows you if you have storage accounts already existing, you can use them.

From the main menu, select Storage accounts and create a new storage Account.

In the create storage account, give it a name that makes it easy to locate. I’m using msignitesa, the Resource Manager deployment model, General purpose, Premium (you can use standard), LRS and Disabled for secure transfer required. Be sure to use the Resource Group you created.

Go to the Resource Group you created and you will see the network, network security group and the storage account in the Resource Group.

This is the final post in this series. You now have everything you need to start the ZCA installation.

Preparing Azure for a Zerto Cloud Appliance Installation – Part 3: Network Security Groups

In the previous post in this series, we created Resource Groups and Networks and Subnets. In this post we continue to create what we need in the Azure environment for our Zerto Cloud Appliance installation.

Network Security Groups

Using similar steps as the creation of Resource Group and Networks,   from the main menu, go to Network Security Groups (NSGs) so we can create the Network Security Groups for the subnets.  Click +Add and give the Network Security Group a name. I used ms-ignite-demo-subnet-nsg and use the ms-ignite-rg Resource Group.

Once it’s created, open the Network Security Group so you can add some firewall rules. I’m going to show you how to create the rules using RDP and these rules could actually be assigned at different levels like individual NICs, but for the purpose of showing how to put inbound and outbound firewall rules, we’ll apply them to the subnets. For more on the design and usage of NSGs, read this post.

Additionally, since you most likely have a commercial firewall on-premises, there are commercial offerings in the Azure marketplace that allows your network and security teams to use the platform that they are accustomed to using. For example, if you use Cisco ASA, there is an Azure marketplace appliance available to use.

In the Resource Group, go down to Inbound Rules.

We want to use the drop-down selector for the Service. Choose RDP to allow Remote Desktop connections.

Once you click OK, it shows the firewall rules in the main table.

In this menu, select Subnets to associate the firewall rules to the subnets. Click the +Associate and select the virtual network you created and associate the subnets.

Once you have associated all the subnets you need, then you can close the blade.

Navigate over to the Resource Group you created. You will see the network and subnets in the Resource Group.

At this point, you actually have what you need to install Zerto Virtual Replication. During the Zerto Cloud Appliance installation, it will create a storage account. However, in version 5.5U1 Zerto added the ability to use an existing storage account. In the next post, we’ll create a storage account.

Preparing Azure for a Zerto Cloud Appliance Installation – Part 2: Networks and Subnets

This is the second post in the “Preparing Azure for a Zerto Cloud Appliance” series.  In the first post in this series, we created a Resource Group.  In this post, we’ll add a network and some subnets.

Networks and Subnets

Back at the main menu on the left, go to Virtual networks. You will be creating a Virtual network much like the way you created the Resource Group.

Click +Add to add a new network. Give your network a name. I used ms-ignite-net and add the Address space. I changed the IP address to 10.2.0.0/16 from /24 because I want to create some subnets.

Be sure to select Use existing Resource group and add in the Resource Group you created. I’m using ms-ignite-rg. Use an Azure Region that is closest to your data center that will be connecting to Azure to improve performance.

In the Subnet, I changed it to 10.2.1.0/24 and named it Demo1 Subnet.

Click Create to create the network. When it is complete, click on Subnets to open up the Subnets configuration menu.  I’m going to add 4 Subnets.

To add the Subnets, you click the +Subnet button. I wanted to use a series of /24 subnets in this network.

You don’t have to associate Network Security Groups or Route Tables in this step; however, you have NSGs or routes created already, you can can do it now. You also can add them later.

Now we have the network and subnets we need. In the next post in this series, we create some Network Security Groups and associate them to the subnets.