|
| 1 | +--- |
| 2 | +title: Enable and Validate VNet Encryption with Azure Managed Lustre |
| 3 | +description: Learn how to enable and test VNet encryption for the Azure Managed Lustre file system. |
| 4 | +ms.topic: how-to |
| 5 | +author: pauljewellmsft |
| 6 | +ms.author: pauljewell |
| 7 | +ms.reviewer: brianl |
| 8 | +ms.date: 07/18/2025 |
| 9 | +ms.lastreviewed: 07/21/2023 |
| 10 | +zone_pivot_groups: select-os |
| 11 | +--- |
| 12 | + |
| 13 | +# Enable and Validate VNet Encryption with Azure Managed Lustre |
| 14 | + |
| 15 | +Azure Managed Lustre (AMLFS) supports Virtual Network (VNet) Encryption, enabling encryption of data in transit between AMLFS and client virtual machines (VMs). This feature is particularly valuable for customers in regulated industries such as finance, healthcare, and government, where data confidentiality is paramount. |
| 16 | + |
| 17 | +## How VNet Encryption Works |
| 18 | + |
| 19 | +VNet Encryption in Azure uses Datagram Transport Layer Security (DTLS) 1.2 to secure traffic at the network layer. Key characteristics include: |
| 20 | + |
| 21 | +- **Encryption Protocol**: DTLS 1.2 with AES-GCM-256 encryption. |
| 22 | +- **Key Exchange**: Session keys are negotiated using ECDSA certificates. |
| 23 | +- **Performance**: Encryption is offloaded to inline FPGAs on the VM host, ensuring high throughput and low latency. |
| 24 | + |
| 25 | +## Enable VNet Encryption for AMLFS |
| 26 | + |
| 27 | +To enable VNet Encryption with AMLFS: |
| 28 | + |
| 29 | +1. **Enable VNet Encryption on the virtual network** where AMLFS is deployed. |
| 30 | + Use the Azure CLI or portal to enable encryption on the VNet. |
| 31 | + Example CLI command: |
| 32 | + |
| 33 | + ```bash |
| 34 | + az network vnet update --name <vnet-name> --resource-group <rg-name> --enable-encryption true |
| 35 | + ``` |
| 36 | + |
| 37 | +1. Ensure Client VM Compatibility |
| 38 | + |
| 39 | +Only specific VM series support VNet Encryption: |
| 40 | + |
| 41 | +- Dsv6-series |
| 42 | +- Ebsv5-series |
| 43 | + |
| 44 | +> [!IMPORTANT] |
| 45 | +> Unsupported VMs will not encrypt traffic, even if the VNet is encrypted. |
| 46 | +> Existing VMs must be rebooted for encryption to be enabled. |
| 47 | +
|
| 48 | +3. Deploy AMLFS into an Encrypted VNet |
| 49 | + |
| 50 | +You can deploy Azure Managed Lustre (AMLFS) into: |
| 51 | + |
| 52 | +- An encrypted VNet |
| 53 | +- A peered VNet that also has encryption enabled |
| 54 | + |
| 55 | +> [!NOTE] |
| 56 | +> If you enable VNet Encryption on a VNet after deploying AMLFS, the cluster will not immediately support encrypted traffic. |
| 57 | +> Encryption capability is activated only after a maintenance event and cluster reboot. |
| 58 | +> Refer to the AMLFS maintenance window documentation for guidance on scheduling and managing updates. |
| 59 | +
|
| 60 | +## Enforcement Mode |
| 61 | + |
| 62 | +Azure currently supports only the `AllowUnencrypted` enforcement mode: |
| 63 | + |
| 64 | +- Unencrypted traffic is still allowed, even when VNet Encryption is enabled. |
| 65 | +- The stricter `DropUnencrypted` mode is not generally available and requires special feature registration. |
| 66 | + |
| 67 | +## Validate Encrypted Traffic |
| 68 | + |
| 69 | +To confirm that traffic between AMLFS and client VMs is encrypted: |
| 70 | + |
| 71 | +1. **Use Azure Network Watcher** |
| 72 | + - Enable Network Watcher in the region. |
| 73 | + - Use packet capture on the client VM to inspect traffic headers. |
| 74 | + - Encrypted traffic will show DTLS encapsulation. |
| 75 | + |
| 76 | +1. **Run Diagnostic Reports** |
| 77 | + - Use Azure Monitor or custom scripts to validate encrypted traffic paths. |
| 78 | + - Check VM metrics and logs for encryption status indicators. |
| 79 | + |
| 80 | +1. **Check VM Capabilities** |
| 81 | + Use the following command to verify if a VM supports VNet Encryption: |
| 82 | + |
| 83 | + ```bash |
| 84 | + az vm show --name <vm-name> --resource-group <rg-name> --query "storageProfile.osDisk.managedDisk.encryptionSettingsCollection" |
| 85 | + ``` |
| 86 | + |
| 87 | +> [!TIP] |
| 88 | +> For more information on verifying encryption, understanding performance impact, and managing certificate handling, see the #. |
| 89 | +
|
| 90 | +## Caveats and Limitations |
| 91 | + |
| 92 | +- **Encryption enforcement**: AMLFS does not enforce encryption; it relies on the configuration of the VNet and VM. |
| 93 | +- **Unsupported VMs**: Traffic from unsupported VM series remains unencrypted, even if VNet Encryption is enabled. |
| 94 | +- **Firewall visibility**: Azure Firewall cannot inspect traffic encrypted at the network layer. |
| 95 | +- **Enforcement mode**: The `DropUnencrypted` mode is not generally available (GA) and must be explicitly enabled via feature registration. |
0 commit comments