Skip to content

Commit a1816f2

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-stack-docs-pr (branch live)
2 parents 71a5f1b + 695e934 commit a1816f2

File tree

3 files changed

+100
-0
lines changed

3 files changed

+100
-0
lines changed

azure-managed-lustre/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,8 @@
4848
href: configure-network-security-group.md
4949
- name: Use customer-managed encryption keys
5050
href: customer-managed-encryption-keys.md
51+
- name: Enable VNet encryption
52+
href: vnet-encryption.md
5153
- name: Monitoring metrics and logs
5254
items:
5355
- name: Monitor a file system

azure-managed-lustre/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,8 @@ landingContent:
7474
url: configure-network-security-group.md
7575
- text: Use customer-managed encryption keys
7676
url: customer-managed-encryption-keys.md
77+
- text: Enable VNet encryption
78+
url: vnet-encryption.md
7779
- title: Self-paced learning
7880
linkLists:
7981
- linkListType: learn
Lines changed: 96 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,96 @@
1+
---
2+
title: Enable and Validate VNet Encryption with Azure Managed Lustre
3+
description: Learn how to enable and test VNet encryption for the Azure Managed Lustre file system.
4+
ms.topic: how-to
5+
author: pauljewellmsft
6+
ms.author: pauljewell
7+
ms.reviewer: brianl
8+
ms.date: 07/18/2025
9+
ms.lastreviewed: 07/21/2023
10+
---
11+
12+
# Enable and Validate VNet Encryption with Azure Managed Lustre
13+
14+
Azure Managed Lustre (AMLFS) supports [Virtual Network (VNet) Encryption](/azure/virtual-network/virtual-network-encryption-overview), enabling encryption of data in transit between AMLFS and client virtual machines (VMs). This feature is valuable for customers in regulated industries such as finance, healthcare, and government, where data confidentiality is paramount.
15+
16+
## How VNet Encryption Works
17+
18+
VNet Encryption in Azure uses Datagram Transport Layer Security (DTLS) 1.2 to secure traffic at the network layer. Key characteristics include:
19+
20+
- **Encryption Protocol**: DTLS 1.2 with AES-GCM-256 encryption.
21+
- **Key Exchange**: Session keys are negotiated using ECDSA certificates.
22+
- **Performance**: Encryption is offloaded to inline FPGAs on the VM host, ensuring high throughput and low latency.
23+
24+
## Enable VNet Encryption for AMLFS
25+
26+
To enable VNet Encryption with AMLFS:
27+
28+
1. **Enable VNet Encryption on the virtual network** where AMLFS is deployed.
29+
Use the Azure CLI or portal to enable encryption on the VNet.
30+
Example CLI command:
31+
32+
```bash
33+
az network vnet update --name <vnet-name> --resource-group <rg-name> --enable-encryption true
34+
```
35+
36+
1. Ensure Client VM Compatibility
37+
38+
Azure only supports specific VM series for VNet Encryption. Unsupported VMs do not encrypt traffic, even if the VNet is encrypted. See [Azure Virtual Network encryption requirements](/azure/virtual-network/virtual-network-encryption-overview#requirements) for requirements and a list of VM SKUs that support encryption.
39+
40+
Existing VMs must be rebooted for encryption to be enabled.
41+
42+
1. Deploy AMLFS into an Encrypted VNet
43+
44+
You can deploy Azure Managed Lustre (AMLFS) into:
45+
46+
- An encrypted VNet
47+
- A peered VNet that also has encryption enabled
48+
49+
> [!NOTE]
50+
> If you enable VNet Encryption on a VNet after deploying AMLFS, the cluster won't immediately support encrypted traffic.
51+
> Encryption capability is activated only after a maintenance event and cluster reboot.
52+
> Refer to the AMLFS maintenance window documentation for guidance on scheduling and managing updates.
53+
54+
## Enforcement Mode
55+
56+
Azure currently supports only the [`AllowUnencrypted`](/azure/virtual-network/virtual-network-encryption-overview#limitations) enforcement mode:
57+
58+
- Unencrypted traffic is still allowed, even when VNet Encryption is enabled.
59+
- The stricter `DropUnencrypted` mode isn't generally available and requires special feature registration.
60+
61+
## Validate Encrypted Traffic
62+
63+
To confirm that traffic between AMLFS and client VMs is encrypted:
64+
65+
1. **Use Azure Network Watcher**
66+
- Enable Network Watcher in the region.
67+
- To inspect traffic headers, use packet capture on the client VM.
68+
- Encrypted traffic shows DTLS encapsulation.
69+
70+
1. **Run Diagnostic Reports**
71+
- Use Azure Monitor or custom scripts to validate encrypted traffic paths.
72+
- Check VM metrics and logs for [encryption status](/azure/network-watcher/vnet-flow-logs-overview?tabs=Americas#log-format) indicators.
73+
74+
1. **Check VM Capabilities**
75+
Use the following command to verify if a VM supports VNet Encryption:
76+
77+
```bash
78+
az vm show --name <vm-name> --resource-group <rg-name> --query "storageProfile.osDisk.managedDisk.encryptionSettingsCollection"
79+
```
80+
81+
> [!TIP]
82+
> For more information on verifying encryption, understanding performance impact, and managing certificate handling, see the [FAQ for Azure Virtual Network encryption](/azure/virtual-network/virtual-network-encryption-faq).
83+
84+
## Caveats and Limitations
85+
86+
- **Encryption enforcement**: AMLFS doesn't enforce encryption; it relies on the configuration of the VNet and VM.
87+
- **Unsupported VMs**: Traffic from unsupported VM series remains unencrypted, even if VNet Encryption is enabled.
88+
- **Firewall visibility**: Azure Firewall can't inspect traffic encrypted at the network layer.
89+
- **Enforcement mode**: The `DropUnencrypted` mode isn't generally available (GA) and must be explicitly enabled via feature registration.
90+
91+
## Next steps
92+
93+
To learn more about Azure encryption, see the following articles:
94+
95+
- [Azure Virtual Network encryption](/azure/virtual-network/virtual-network-encryption-overview)
96+
- [Azure encryption of data in transit](/azure/security/fundamentals/encryption-overview#encryption-of-data-in-transit)

0 commit comments

Comments
 (0)