Skip to content

Commit 630ac5e

Browse files
authored
pull base content,head:MicrosoftDocs:main,into:wwlpublishsync
2 parents 7e1f815 + 0e2db36 commit 630ac5e

14 files changed

+266
-0
lines changed
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.introduction-ai-landing-zones.introduction-landing-zones
3+
title: Introduction to landing zones
4+
metadata:
5+
title: Introduction to landing zones
6+
description: Understand the purpose and elements of Azure landing zones.
7+
ms.date: 05/01/2025
8+
author: Orin-Thomas
9+
ms.author: orthomas
10+
ms.topic: unit
11+
durationInMinutes: 8
12+
content: |
13+
[!include[](includes/1-introduction-landing-zones.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.introduction-ai-landing-zones.azure-ai-landing-zones
3+
title: Azure AI Landing Zones
4+
metadata:
5+
title: Azure AI Landing Zones
6+
description: Understand how AI applications can use Azure Landing Zones.
7+
ms.date: 05/01/2025
8+
author: Orin-Thomas
9+
ms.author: orthomas
10+
ms.topic: unit
11+
durationInMinutes: 10
12+
content: |
13+
[!include[](includes/2-azure-ai-landing-zones.md)]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.introduction-ai-landing-zones.deploy-test-landing-zones
3+
title: Deploy and Test Landing Zones
4+
metadata:
5+
title: Deploy and Test Landing Zones
6+
description: How to deploy and test landing zones using the Azure CLI and Bicep.
7+
ms.date: 05/01/2025
8+
author: Orin-Thomas
9+
ms.author: orthomas
10+
ms.topic: unit
11+
durationInMinutes: 4
12+
content: |
13+
[!include[](includes/3-deploy-test-landing-zones.md)]
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.introduction-ai-landing-zones.knowledge-check
3+
title: Knowledge Check
4+
metadata:
5+
title: Knowledge Check
6+
description: Check your understanding of the module content.
7+
ms.date: 05/01/2025
8+
author: Orin-Thomas
9+
ms.author: orthomas
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: Choose the best response for each question.
13+
quiz:
14+
questions:
15+
- content: "You are in the process of planning management boundaries for an AI application deployment. Which Azure landing zone design area aligns with this goal?"
16+
choices:
17+
- content: "Network topology and connectivity"
18+
isCorrect: false
19+
explanation: "This design area addresses appropriately planned network topology and connectivity. This ensures that deployed resources can communicate in a secure, reliable, and cost effective manner."
20+
- content: "Resource organization"
21+
isCorrect: true
22+
explanation: "The resource organization design area determines the appropriate Azure management group and subscription hierarchy. Planning subscription hierarchy impacts governance, operations management, and adoption patterns. When considering this design area, you configure subscriptions as management boundaries that separate the platform and workload teams. This separation is also termed subscription democratization."
23+
- content: "Platform automation and DevOps"
24+
isCorrect: false
25+
explanation: "This design element ensures that your organization uses the right alignment of tools and templates to deploy landing zones and supporting resources."
26+
- content: "Which of the following is the responsibility of the workload team in an Azure AI application deployment using landing zones?"
27+
choices:
28+
- content: "Azure AI Foundry"
29+
isCorrect: true
30+
explanation: "Azure AI Foundry is the responsibility of the workload team. The workload team is responsible for the configuration, management, and deployment of the workload components, including all AI services that are used in this architecture."
31+
- content: "Azure Firewall"
32+
isCorrect: false
33+
explanation: "Network infrastructure like Azure Firewall is the responsibility of the platform team."
34+
- content: "Azure private DNS zones"
35+
isCorrect: false
36+
explanation: "Network infrastructure like Azure private DNS zones is the responsibility of the platform team."
37+
- content: "Which of the following is the responsibility of the platform team in an Azure AI application deployment using landing zones?"
38+
choices:
39+
- content: "Azure Bastion"
40+
isCorrect: true
41+
explanation: "Azure Bastion is the responsibility of the platform team in an Azure AI application deployment using landing zones"
42+
- content: "Azure Container Registry"
43+
isCorrect: false
44+
explanation: "Azure Container Registry is the responsibility of the workload team in an Azure AI application deployment using landing zones"
45+
- content: "Azure App Service"
46+
isCorrect: false
47+
explanation: "Azure App Services is the responsibility of the workload team in an Azure AI application deployment using landing zones"
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.introduction-ai-landing-zones.summary
3+
title: Summary
4+
metadata:
5+
title: Summary
6+
description: Summary of module content.
7+
ms.date: 05/01/2025
8+
author: Orin-Thomas
9+
ms.author: orthomas
10+
ms.topic: unit
11+
durationInMinutes: 3
12+
content: |
13+
[!include[](includes/5-summary.md)]
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
An Azure landing zone is a preconfigured, scalable environment within Microsoft Azure that serves as the foundation for deploying cloud workloads. Landing zones implement best practices for governance, security, and infrastructure. Landing zones provide standardized subscription designs, identity and access management controls, policy configurations, network topology, and shared services.
2+
3+
Azure landing zones use subscriptions to isolate and scale application resources and platform resources. Azure landing zone architectures are scalable and modular. The repeatable infrastructure allows you to apply configurations and controls to every subscription consistently. You can deploy landing zones using the Azure portal, Bicep modules, or Terraform.
4+
5+
You should use landing zone conceptual architectures as a starting point and tailor the architecture to meet your needs for your organization's AI workloads.
6+
7+
## Landing zone design areas
8+
9+
An Azure landing zone is an environment that follows key design principles across eight design areas. Azure landing zone design areas describe what to consider before you deploy a landing zone. Design areas help you establish a process in exploring the subjects relevant to making critical decisions about your environment. You should evaluate each design area to help you understand any changes that you might need to make to the implementation options for Azure landing zones and the AI related workloads that those zones might host.
10+
11+
Evaluating each design area sequentially provides you with a process that simplifies the design of any complex environment. Once you've already addressed each design area to your satisfaction, move on to the next area.
12+
13+
These Azure landing zone design areas are as follows:
14+
15+
- **Azure billing and Microsoft Entra tenant.** Ensures that the tenants in the landing zone are properly created, enrolled, and that billing is appropriately configured.
16+
- **Identity and access management.** Identity functions as the primary security boundary in the public cloud. This landing zone design area ensures that identity and access management is implemented to serve as the foundation for a secure and fully compliant architecture.
17+
- **Network topology and connectivity.** Appropriately planned network topology and connectivity ensure that deployed resources can communicate in a secure, reliable, and cost effective manner.
18+
- **Resource organization.** Determines the appropriate Azure management group and subscription hierarchy. Planning subscription hierarchy impacts governance, operations management, and adoption patterns. Configure subscriptions as management boundaries that separate the platform and workload teams. This separation is also termed subscription democratization.
19+
- **Security.** The security design area involves designing and implementing the appropriate controls and processes to secure all elements of the cloud environment. An example of this design area is ensuring use of managed identities rather than API keys for authentication and authorization.
20+
- **Management.** The management design area includes developing management baselines that provide appropriate and secure visibility into resources and also ensuring that operations practices meet compliance requirements.
21+
- **Governance.** This design area addresses ensuring that governance policies and auditing are enforced and automated. An example would be notifications and alerts being generated when an element of the deployment's configuration drifts out of compliance due to configuration changes.
22+
- **Platform automation and DevOps.** This design element ensures that your organization leverages the right alignment of tools and templates to deploy landing zones and supporting resources.
23+
24+
![Diagram showing the eight different Azure landing zone design areas.](../media/landing-zone-decision-areas.png)
25+
26+
As a general rule, be prepared to balance requirements and functionality. Your journey to the most effective architecture for your organization's AI workloads will evolve over time as requirements change and you learn from your implementation.
27+
28+
All Azure landing zone architectures are designed with a separation of ownership between the platform team and the workload team. This subscription democratization allows application architects, data scientists, and DevOps teams to understand what's under their direct influence or control and what isn't.
29+
30+
## Application and platform landing zones
31+
32+
Subscription democratization leads to two categories of landing zone that are relevant to AI adoption: application landing zones and platform landing zones. The differences between them are as follows:
33+
34+
- An application landing zone is an Azure subscription in which a workload runs. An application landing zone is connected to the organization's shared platform resources. Through that connection, the landing zone has access to the infrastructure that supports the workload, such as networking, identity access management, policies, and monitoring. These landing zones and subscriptions are the responsibility of the workload team.
35+
- A platform landing zone is a subscription that provides shared services (identity, connectivity, management) to applications in application landing zones. A platform landing zone is a collection of various subscriptions that multiple platform teams can manage. Each subscription has a specific function. For example, a connectivity subscription provides centralized Domain Name System (DNS) resolution, cross-premises connectivity, and network virtual appliances (NVAs) that are available for platform teams to use. These landing zones and subscriptions are the responsibility of the platform team.
36+
37+
Determine which infrastructure elements need to be present for the workloads in the application landing zones and deploy them in the platform landing zones. Ensure that the infrastructure present in the platform landing zones adheres to the principles laid out in the security, management, governance, network, and identity and access design areas. Once the infrastructure to support the workloads is in place, you can use the design principles, including those in the platform automation and DevOps design area, to deploy, update and maintain the application workloads.
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
The Azure OpenAI chat baseline application published in the Azure Architecture Center on the Microsoft website illustrates an example of how you can use Azure Landing Zones with AI workloads.
2+
3+
![Diagram of all elements of a complex AI application deployment.](../media/ai-landing-zone-network-diagram.png)
4+
5+
In the AI chatbot landing zone implementation, the workload team is mostly responsible for the configuration, management, and deployment of the workload components, including all AI services that are used in this architecture.
6+
7+
For this architecture, the workload team and platform team need to collaborate on a few topics: management group assignment (including the associated Azure Policy governance) and networking setup.
8+
9+
## Workload team managed resources
10+
11+
In the AI chatbot landing zone implementation, the workload team is responsible for the following resources:
12+
13+
- **Azure AI Foundry.** The platform used to build, test, and deploy AI solutions. AI Foundry is used in this architecture to build, test, and deploy the prompt flow orchestration logic for the chat application. In this architecture, Azure AI Foundry provides the managed virtual network for network security.
14+
- **Managed online endpoints.** These are used as a platform as a service (PaaS) endpoint for the chat UI application, which invokes the prompt flows hosted by Azure AI Foundry.
15+
- **Azure App Service**. Used to host the web application for the chat UI. In this architecture, App Service has three instances, each in a different Azure zone.
16+
- **AI Search**. Service that's used in the flows behind chat applications. You can use AI Search to retrieve indexed data that's relevant for user queries.
17+
- **Azure Storage.** Used to persist the prompt flow source files for prompt flow development.
18+
- **Azure Container Registry.** Used to store flows that are packaged as container images.
19+
- **Azure Application Gateway.** Used as the reverse proxy to route user requests to the chat UI that's hosted in App Service. In this architecture, Azure Application Gateway is also used to host an Azure web application firewall to protect the front-end application from potentially malicious traffic.
20+
- **Key Vault.** Used to store application secrets and certificates.
21+
- **Azure Monitor, Azure Monitor Logs, and Application Insights.** Used to collect, store, and visualize observability data.
22+
- **Azure Policy.** Used to apply policies that are specific to the workload to help govern, secure, and apply controls at scale.
23+
24+
![Diagram of the part of the AI workload that is the responsibility of the workload team.](../media/workload-resources.png)
25+
26+
In this architecture the workload team is also responsible for maintaining the following resources:
27+
28+
- Spoke virtual network subnets and the network security groups (NSGs) that are placed on those subnets to maintain segmentation and control traffic flow.
29+
- Private endpoints to secure connectivity to PaaS solutions.
30+
31+
## Platform team managed resources
32+
33+
In this architecture the platform team owns and maintains the following centralized resources which should be pre-provisioned before the deployment of the resources managed by the workload team:
34+
35+
- **Azure Firewall.** Deployed in the hub network is used to route, inspect, and restrict egress traffic. Workload egress traffic goes to the internet, cross-premises destinations, or to other application landing zones.
36+
- **Azure Bastion.** Deployed in the hub network and provides secure operational access to workload components and also allows secure access to Azure AI Foundry components.
37+
- **Spoke virtual network.** This network hosts the AI application.
38+
- **User-defined routes (UDRs).** Used to force tunnel network traffic to the hub network.
39+
- **Azure Policy-based governance constraints and DeployIfNotExists (DINE) policies.** You can apply these policies at the platform team-owned management group level or apply them to the workload's subscription directly.
40+
- **Azure private DNS zones.** Host the A records for private endpoints.
41+
- **DNS resolution service for spoke virtual networks and cross-premises workstations.** That service usually takes the form of Azure Firewall as a DNS proxy or Azure DNS Private Resolver. In this architecture, this service resolves private endpoint DNS records for all DNS requests that originate in the spoke.
42+
- **Azure DDoS Protection.** Used to protect public IP addresses against distributed attacks.
43+
44+
![Diagram of the part of the AI workload that is the responsibility of the platform team.](../media/platform-resources.png)
45+
46+
## Critical dependencies
47+
48+
All functionality that the workload performs in the platform and application landing zones are dependencies. Incident response plans require that the workload team is aware of the point and method of contact information for these dependencies, and the workload team should be included in the change management process for these dependencies. Also include these dependencies in the workload's failure mode analysis (FMA).
49+
50+
Important dependencies to take into account:
51+
52+
- Egress firewall. The centralized egress firewall, shared by multiple workloads, undergoes may undergo changes unrelated to the AI workload.
53+
- **DNS resolution.** This architecture uses DNS provided by the platform team instead of directly interfacing with Azure DNS. This means that timely updates to DNS records for private endpoints and availability of DNS services are new dependencies.
54+
- **DINE policies.** Deploy If Not Exists (DINE) policies for Azure DNS private DNS zones, or any other platform-provided dependency, are best effort, with no SLA when you apply them. For example, a delay in DNS configuration for this architecture's private endpoints can cause delays in the readiness of the chat UI to handle traffic or prompt flow from completing queries.
55+
- **Management group policies.** Consistent policies among environments are key for reliability. Ensure that preproduction environments are similar to production environments to provide accurate testing and to prevent environment-specific deviations that can block a deployment or scale.
56+
57+
## Security considerations
58+
59+
The following security considerations should be addressed when implementing this type of AI workload.
60+
61+
- **Ingress traffic control.** Isolate your workload from other workload spokes within your organization by using NSGs on your subnets and the nontransitive nature or controls in the regional hub. Construct comprehensive NSGs that only permit the inbound network requirements of your application and its infrastructure.
62+
- **Egress traffic control.** Apply NSG rules that express the required outbound connectivity requirements of your solution and deny everything else. Don't rely only on the hub network controls. As a workload operator, block undesired egress traffic as close to the source as practicable.
63+
- **DDoS Protection.** Determine who should apply the DDoS Protection plan that covers all of your solution's public IP addresses. The platform team might use IP address protection plans, or use Azure Policy to enforce virtual network protection plans. This architecture should have coverage because it involves a public IP address for ingress from the internet.
64+
- **Identity and access management.** Unless otherwise required by your platform team's governance automation, there are no expectations of extra authorization requirements on this architecture because of the platform team's involvement. Azure role-based access control (RBAC) should continue to fulfill the principle of least privilege, which grants limited access only to those who need it and only when needed.
65+
- **Certificates and encryption.** The workload team typically procures the TLS certificate for the public IP address on Application Gateway in this architecture.
66+
- **Correlate data from multiple sinks.** The workload's logs and metrics and its infrastructure components are stored in the workload's Azure Monitor Logs workspace. However, logs and metrics from centralized services, such as Azure Firewall, DNS Private Resolver, and Azure Bastion, are often stored in a central Azure Monitor Logs workspace. Correlating data from multiple sinks can be a complex task.

0 commit comments

Comments
 (0)