Skip to content

Commit 736ac86

Browse files
Merge pull request #292151 from milope/main
milope--vnet doc--ado--30551764
2 parents cbc0d37 + 558bcf4 commit 736ac86

File tree

1 file changed

+51
-15
lines changed

1 file changed

+51
-15
lines changed

articles/azure-cache-for-redis/cache-how-to-premium-vnet.md

Lines changed: 51 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to create and manage virtual network support for your Pre
44

55

66
ms.topic: conceptual
7-
ms.date: 12/12/2024
7+
ms.date: 12/17/2024
88

99
---
1010

@@ -29,10 +29,9 @@ ms.date: 12/12/2024
2929
- failure of management operations like scaling
3030
- intermittent or complete SSL/TLS failures
3131
- failure to apply updates, including important security and reliability improvements
32-
3332
- in the most severe scenarios, loss of availability
33+
- When using a VNet injected cache, you must keep your VNet updated to allow access to cache dependencies, such as Certificate Revocation Lists, Public Key Infrastructure, Azure Key Vault, Azure Storage, Azure Monitor, and more.
3434
- VNet injected caches are only available for Premium-tier Azure Cache for Redis, not other tiers.
35-
- When using a VNet injected cache, you must change your VNet to cache dependencies such as Certificate Revocation Lists/Public Key Instructure, Azure Key Vault, Azure Storage, Azure Monitor, and more.
3635
- You can't inject an existing Azure Cache for Redis instance into a Virtual Network. You must select this option when you _create_ the cache.
3736

3837
## Set up virtual network support
@@ -120,11 +119,11 @@ When Azure Cache for Redis is hosted in a virtual network, the ports in the foll
120119

121120
#### Outbound port requirements
122121

123-
There are nine outbound port requirements. Outbound requests in these ranges are either: a) outbound to other services necessary for the cache to function, or b) internal to the Redis subnet for internode communication. For geo-replication, other outbound requirements exist for communication between subnets of the primary and replica cache.
122+
There are network connectivity requirements for Azure Cache for Redis needed for outbound connectivity to other dependency services necessary for the cache to function, or even internal to the Redis subnet for inter-node communication.
124123

125124
| Ports | Direction | Transport protocol | Purpose | Local IP | Remote IP |
126125
| --- | --- | --- | --- | --- | --- |
127-
| 80, 443 |Outbound |TCP |Redis dependencies on Azure Storage/PKI (internet) | (Redis subnet) |* <sup>4</sup> |
126+
| 80, 443 |Outbound |TCP |Redis dependencies on Azure Storage, PKI (internet), operating system, infrastructure, and the antivirus | (Redis subnet) |* <sup>4</sup> |
128127
| 443 | Outbound | TCP | Redis dependency on Azure Key Vault and Azure Monitor | (Redis subnet) | AzureKeyVault, AzureMonitor <sup>1</sup> |
129128
| 12000 | Outbound | TCP | Redis dependency on Azure Monitor | (Redis subnet) | AzureMonitor <sup>1</sup> |
130129
| 53 |Outbound |TCP/UDP | Redis dependencies on DNS (internet/virtual network) | (Redis subnet) | 168.63.129.16 and 169.254.169.254 <sup>2</sup> and any custom DNS server for the subnet <sup>3</sup> |
@@ -168,16 +167,53 @@ There are eight inbound port range requirements. Inbound requests in these range
168167

169168
#### Additional virtual network connectivity requirements
170169

171-
There are network connectivity requirements for Azure Cache for Redis that might not be initially met in a virtual network. Azure Cache for Redis requires all the following items to function properly when used within a virtual network:
172-
173-
- Outbound network connectivity to Azure Key Vault endpoints worldwide. Azure Key Vault endpoints resolve under the DNS domain `*.vault.azure.net`.
174-
- Outbound network connectivity to Azure Storage endpoints worldwide. Endpoints located in the same region as the Azure Cache for Redis instance and storage endpoints located in _other_ Azure regions are included. Azure Storage endpoints resolve under the following DNS domains: `*.table.core.windows.net`, `*.blob.core.windows.net`, `*.queue.core.windows.net`, and `*.file.core.windows.net`.
175-
- Outbound network connectivity to `ocsp.digicert.com`, `crl4.digicert.com`, `ocsp.msocsp.com`, `mscrl.microsoft.com`, `crl3.digicert.com`, `cacerts.digicert.com`, `oneocsp.microsoft.com`, and `crl.microsoft.com`, `cacerts.geotrust.com`, `www.microsoft.com`, `cdp.geotrust.com`, `status.geotrust.com`. This connectivity is needed to support TLS/SSL functionality.
176-
- Outbound network connectivity to the following Azure Monitor endpoints, which resolve under the following DNS domains: `shoebox3.prod.microsoftmetrics.com`, `shoebox3-red.prod.microsoftmetrics.com`, `shoebox3-black.prod.microsoftmetrics.com`, `azredis.prod.microsoftmetrics.com`, `azredis-red.prod.microsoftmetrics.com`, `azredis-black.prod.microsoftmetrics.com`, `global.prod.microsoftmetrics.com`, `gcs.prod.monitoring.core.windows.net`, and `*.prod.warm.ingest.monitor.core.windows.net`.
177-
- Outbound network connectivity to the following endpoints for internal diagnostics, which resolve under the following DNS domains: `azurewatsonanalysis-prod.core.windows.net`, `*.data.microsoft.com`, `shavamanifestazurecdnprod1.azureedge.net`, and `shavamanifestcdnprod1.azureedge.net`.
178-
- Outbound network connectivity to the following endpoints for the operating system update service, which resolve under the following DNS domains: `*.update.microsoft.com`, `*.ctldl.windowsupdate.com`, and `ctldl.windowsupdate.com`, `*.delivery.mp.microsoft.com`, and `download.windowsupdate.com`.
179-
- Outbound network connectivity to the following endpoints for the antivirus, which resolve under the following DNS domains: `go.microsoft.com`, `wdcp.microsoft.com`, `wdcpalt.microsoft.com`, and `definitionupdates.microsoft.com`.
180-
- The DNS configuration for the virtual network must be able to resolve all of the endpoints and domains mentioned in the earlier points. These DNS requirements can be met by ensuring a valid DNS infrastructure is configured and maintained for the virtual network.
170+
There are network connectivity requirements for Azure Cache for Redis needed for outbound connectivity to other dependency services necessary for the cache to function, or even internal to the Redis subnet for internode communication.
171+
172+
Azure Cache for Redis requires all the following outbound connectivity items to function properly when used within a virtual network:
173+
174+
| Host name | Protocol | Outbound port | Purpose | Service tag |
175+
|--|--|--|--|--|
176+
| *.vault.azure.net | HTTPS | 443 | Azure Key Vault | AzureKeyVault |
177+
| *.table.core.windows.net | HTTPS | 443 | Azure Storage | Storage |
178+
| *.blob.core.windows.net | HTTPS | 443 | Azure Storage | Storage |
179+
| *.queue.core.windows.net | HTTPS | 443 | Azure Storage | Storage |
180+
| *.file.core.windows.net | HTTPS | 443 | Azure Storage | Storage |
181+
| ocsp.digicert.com | HTTP | 80 | Azure Public Key Infrastructure | N/A |
182+
| crl4.digicert.com | HTTP | 80 | Azure Public Key Infrastructure | N/A |
183+
| ocsp.msocsp.com | HTTP | 80 | Azure Public Key Infrastructure | N/A |
184+
| mscrl.microsoft.com | HTTP | 80 | Azure Public Key Infrastructure | N/A |
185+
| crl3.digicert.com | HTTP | 80 | Azure Public Key Infrastructure | N/A |
186+
| cacerts.digicert.com | HTTP | 80 | Azure Public Key Infrastructure | N/A |
187+
| oneocsp.microsoft.com | HTTP | 80 | Azure Public Key Infrastructure | N/A |
188+
| crl.microsoft.com | HTTP | 80 | Azure Public Key Infrastructure | N/A |
189+
| cacerts.geotrust.com | HTTP | 80 | Azure Public Key Infrastructure | N/A |
190+
| www.microsoft.com | HTTP | 80 | Azure Public Key Infrastructure | N/A |
191+
| cdp.geotrust.com | HTTP | 80 | Azure Public Key Infrastructure | N/A |
192+
| status.geotrust.com | HTTP | 80 | Azure Public Key Infrastructure | N/A |
193+
| shoebox3.prod.microsoftmetrics.com | HTTPS | 443 | Azure Monitor | AzureMonitor |
194+
| shoebox3-red.prod.microsoftmetrics.com | HTTPS | 443 | Azure Monitor | AzureMonitor |
195+
| shoebox3-black.prod.microsoftmetrics.com | HTTPS | 443 | Azure Monitor | AzureMonitor |
196+
| azredis.prod.microsoftmetrics.com | HTTPS | 443 | Azure Monitor | AzureMonitor |
197+
| azredis-red.prod.microsoftmetrics.com | HTTPS | 443 | Azure Monitor | AzureMonitor |
198+
| azredis-black.prod.microsoftmetrics.com | HTTPS | 443 | Azure Monitor | AzureMonitor |
199+
| global.prod.microsoftmetrics.com | HTTPS | 443 | Azure Monitor | AzureMonitor |
200+
| gcs.prod.monitoring.core.windows.net | HTTPS | 443 | Azure Monitor | AzureMonitor |
201+
| *.prod.warm.ingest.monitor.core.windows.net | HTTPS | 443 | Azure Monitor | AzureMonitor |
202+
| *.servicebus.windows.net | HTTPS | 443 | Azure Monitor | EventHub |
203+
| *.update.microsoft.com | HTTPS | 443 | Operating system update service | AzureCloud |
204+
| *.windowsupdate.com | HTTP/HTTPS | 80, 443 | Operating system update service | N/A |
205+
| *.delivery.mp.microsoft.com | HTTP/HTTPS | 80, 443 | Operating system update service | AzureCloud |
206+
| go.microsoft.com | HTTP/HTTPS | 80, 443 | Antivirus | N/A |
207+
| *.wdcp.microsoft.com | HTTPS | 443 | Antivirus | AzureCloud |
208+
| *.wdcpalt.microsoft.com | HTTPS | 443 | Antivirus | AzureCloud |
209+
| *.wd.microsoft.com | HTTPS | 443 | Antivirus | AzureCloud |
210+
| definitionupdates.microsoft.com | HTTPS | 443 | Antivirus | N/A |
211+
| azurewatsonanalysis-prod.core.windows.net | HTTPS | 443 | Internal diagnostics | AzureCloud |
212+
| shavamanifestazurecdnprod1.azureedge.net | HTTPS | 443 | Internal diagnostics | N/A |
213+
| shavamanifestcdnprod1.azureedge.net | HTTPS | 443 | Internal diagnostics | N/A |
214+
| *.data.microsoft.com | HTTPS | 443 | Internal diagnostics | AzureCloud |
215+
216+
- The DNS configuration for the virtual network must be able to resolve all of the endpoints and domains mentioned in the earlier table entries. These DNS requirements can be met by ensuring a valid DNS infrastructure is configured and maintained for the virtual network.
181217

182218
### How can I verify that my cache is working in a virtual network?
183219

0 commit comments

Comments
 (0)