You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-managed-lustre/vnet-encryption.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.lastreviewed: 07/21/2023
11
11
12
12
# Enable and Validate VNet Encryption with Azure Managed Lustre
13
13
14
-
Azure Managed Lustre (AMLFS) supports Virtual Network (VNet) Encryption, enabling encryption of data in transit between AMLFS and client virtual machines (VMs). This feature is particularly valuable for customers in regulated industries such as finance, healthcare, and government, where data confidentiality is paramount.
14
+
Azure Managed Lustre (AMLFS) supports Virtual Network (VNet) Encryption, enabling encryption of data in transit between AMLFS and client virtual machines (VMs). This feature is valuable for customers in regulated industries such as finance, healthcare, and government, where data confidentiality is paramount.
15
15
16
16
## How VNet Encryption Works
17
17
@@ -40,7 +40,7 @@ To enable VNet Encryption with AMLFS:
40
40
- Ebsv5-series
41
41
42
42
> [!IMPORTANT]
43
-
> Unsupported VMs will not encrypt traffic, even if the VNet is encrypted.
43
+
> Unsupported VMs do not encrypt traffic, even if the VNet is encrypted.
44
44
> Existing VMs must be rebooted for encryption to be enabled.
45
45
46
46
1. Deploy AMLFS into an Encrypted VNet
@@ -50,7 +50,7 @@ To enable VNet Encryption with AMLFS:
50
50
- A peered VNet that also has encryption enabled
51
51
52
52
> [!NOTE]
53
-
> If you enable VNet Encryption on a VNet after deploying AMLFS, the cluster will not immediately support encrypted traffic.
53
+
> If you enable VNet Encryption on a VNet after deploying AMLFS, the cluster won't immediately support encrypted traffic.
54
54
> Encryption capability is activated only after a maintenance event and cluster reboot.
55
55
> Refer to the AMLFS maintenance window documentation for guidance on scheduling and managing updates.
56
56
@@ -59,16 +59,16 @@ To enable VNet Encryption with AMLFS:
59
59
Azure currently supports only the `AllowUnencrypted` enforcement mode:
60
60
61
61
- Unencrypted traffic is still allowed, even when VNet Encryption is enabled.
62
-
- The stricter `DropUnencrypted` mode is not generally available and requires special feature registration.
62
+
- The stricter `DropUnencrypted` mode isn't generally available and requires special feature registration.
63
63
64
64
## Validate Encrypted Traffic
65
65
66
66
To confirm that traffic between AMLFS and client VMs is encrypted:
67
67
68
68
1.**Use Azure Network Watcher**
69
69
- Enable Network Watcher in the region.
70
-
-Use packet capture on the client VM to inspect traffic headers.
71
-
- Encrypted traffic will show DTLS encapsulation.
70
+
-To inspect traffic headers, use packet capture on the client VM.
71
+
- Encrypted traffic shows DTLS encapsulation.
72
72
73
73
1.**Run Diagnostic Reports**
74
74
- Use Azure Monitor or custom scripts to validate encrypted traffic paths.
@@ -86,7 +86,7 @@ To confirm that traffic between AMLFS and client VMs is encrypted:
86
86
87
87
## Caveats and Limitations
88
88
89
-
-**Encryption enforcement**: AMLFS does not enforce encryption; it relies on the configuration of the VNet and VM.
89
+
-**Encryption enforcement**: AMLFS doesn't enforce encryption; it relies on the configuration of the VNet and VM.
90
90
-**Unsupported VMs**: Traffic from unsupported VM series remains unencrypted, even if VNet Encryption is enabled.
91
-
-**Firewall visibility**: Azure Firewall cannot inspect traffic encrypted at the network layer.
92
-
-**Enforcement mode**: The `DropUnencrypted` mode is not generally available (GA) and must be explicitly enabled via feature registration.
91
+
-**Firewall visibility**: Azure Firewall can't inspect traffic encrypted at the network layer.
92
+
-**Enforcement mode**: The `DropUnencrypted` mode isn't generally available (GA) and must be explicitly enabled via feature registration.
0 commit comments