Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Tasks to perform before you use Azure with DuploCloud
Before using DuploCloud, ensure the following prerequisites are met.
Read the Access Control section to ensure at least one person has administrator access.
For Kubernetes prerequisites, see the DuploCloud Kubernetes User Guide.
Add DNS entries for DuploCloud Services to use your domain names
Before you use DuploCloud for Azure, a subdomain-hosted zone must be created to program DNS entries so DuploCloud services can access your specific domain names. Public and private DNS zones are supported. In addition, keys must be added to the DuploCloud configuration that map to the needed DNS entries. Reach out to DuploCloud support staff to accomplish these tasks.
Once the DNS entries are configured, you can use your existing domain names with DuploCloud.
In order to add your DNS entries, contact DuploCloud via email or by using your private Slack channel. Our support staff guides you through the process and assists you with completing other prerequisites in this section, such as providing CRT files and private keys for importing SSL certificates.
Integrate with OpenVPN by provisioning VPN users
DuploCloud integrates natively with OpenVPN by provisioning VPN users that you add to the Duplocloud Portal. OpenVPN setup is a two-step process.
Accept OpenVPN in the Azure marketplace and follow the instructions in the Quick Start Guide.
In the DuploCloud Portal, navigate to Administrator -> System Settings.
Click the VPN tab.
Click Provision VPN.
After the OpenVPN is provisioned, it is ready to use. Behind the scenes, DuploCloud launches a cloud formation script to provision the OpenVPN.
You can find the OpenVPN admin password in the cloud formation stack in your Azure console.
Provision a VPN while creating a user:
In the DuploCloud Portal, navigate to Administrator -> Users.
Click Add. The Create User pane displays.
Enter a valid email address in the Username field.
In the Roles field, select the appropriate role for the User.
Select Provision VPN.
Click Submit.
For information about removing VPN access for a user, see Deleting a VPN user. To delete VPN access, you must have administrator privileges.
By default, users connected to a VPN can SSH or RDP into virtual machines (VMs). Users can also connect to internal load balancers and endpoints of the applications. However, to connect to other services, such as databases and elastic cache, you must open the port to the VPN:
In the DuploCloud Portal, navigate to Administrator -> Tenant.
Select the Tenant in the Name column.
Click the Security tab.
Click Add. The Add Tenant Security pane displays.
In the Source Type field, select Ip Address.
In the IP CIDR field, enter the name of your VPN.
Click Add.
Import SSL certs to establish secure access to the DuploCloud Portal
Establish secure access to the DuploCloud portal by importing SSL certificates, and creating and configuring the certificates in DuploCloud.
If you haven't already done so, contact the DuploCloud support staff via email or by using your private Slack channel. They will provide you with everything you need to accomplish this task and assist you with other needed prerequisites to set up DuploCloud for Azure.
Contact the DuploCloud support staff via email or by using your private Slack channel to request the following for SSL certificate setup and configuration:
Security Certificate (.crt
) file
Certificate Private Key
Certificate Bundle (.crt
) containing the Intermediate and Root Certificates. You can download the Certificate Bundle from https://support.globalsign.com/ca-certificates/intermediate-certificates/alphassl-intermediate-certificates.
Because Azure supports only PFX files for SSL certificates, you must convert the CRT file that DuploCloud provides you to PFX format.
To do this, enter the following using the command line:
When running this command, you will be asked for a password to protect the PFX file. Note this password and store it in a secure place as you will need to provide it when importing the certificate to Azure KeyVault.
After you generate the PFX file, sign in to the Azure Portal and access Azure Key Vault.
Select the respective Azure Key Vault for your environment (for example, production versus test) to import the PFX file as shown below.
In Azure Key Vault, navigate to Objects -> Certificates and click Generate/Import.
When you click Generate/Import, the Create a Certificate form displays. In the Method of Certificate Creation field, select Import.
Name the Certificate, using the Certificate Name field.
Browse for a file to upload, using the Upload Certificate File field.
In the Password field, enter the password you set when you generated the PFX file.
Click Create. Even though the certificate is created, notice that the certificate is not yet successfully imported into the vault, as indicated by the No certificates available message, as shown below. To import the certificate, you must obtain the Secret Identifier ARN of this certificate and then configure it in DuploCloud.
On the Certificates page, select the certificate from the list, and open the CURRENT VERSION of the certificate, as shown below, to obtain the Secret Identifier.
You will paste the ARN when you configure the certificate in DuploCloud.
With the Secret Identifier in your Clipboard, you are now ready to configure the certificate in the DuploCloud Portal and
In the DuploCloud Portal, navigate to Administrator -> Plans.
Select the Plan to which you want to add the certificate from the Name column. The Plans page displays.
Click the Certificates tab.
Click Add. The Add a Certificate pane displays.
Enter a Name for the certificate.
Paste the Secret Identifier that you obtained from the Azure Portal (it should be in your Clipboard) into the Certificate ARN field.
Click Create.
Before attaching certificates with K8S Ingress in the DuploCloud Portal, create and configure an azure-application-gateway.
If you use Kubernetes Ingress, you can attach the certificate to the appropriate DuploCloud service in the DuploCloud portal by using the Kubernetes -> Ingress option.
In the DuploCloud Portal, navigate to Kubernetes -> Ingress.
On the Ingress page, select the Ingress instance for the azure- application-gateway.
Click the Ingress Rules tab.
From the Actions menu, select Edit.
On the Edit Kubernetes Ingress page, select the certificate that you want to attach from the Certificate ARN list box.
Click Update.
The certificate is attached to the Ingress application gateway and is available to the service.
Connecting to the DuploCloud VPN with the OpenVPN client
DuploCloud integrates natively with OpenVPN by provisioning VPN users added to the Duplocloud portal. As a DuploCloud user, you can access resources in the private network by connecting to the VPN with the OpenVPN client.
The OpenVPN Access Server is set to forward only traffic destined for network resources in the DuploCloud-managed private networks. Traffic accessing other resources on the internet does not pass through the tunnel.
User VPN credentials are accessible on the user profile page. It can be accessed through the menu on the upper right of the page or through the Administrator -> Users menu option on the left.
Click the VPN URL link in the VPN Details section of your user profile. Browsers will call the link unsafe since it is using a self-signed certificate. Proceed to it.
Open the .ovpn file and click OK in the Import .ovpn profile dialog.
Configure managed identity for the DuploCloud portal in Azure.
This document provides a step-by-step guide to configure a Managed Identity (MI) in Azure for DuploCloud. DuploCloud requires the VM where it is installed to have owner access to the Azure subscription to launch and manage Azure resources effectively.
Follow these steps post the installation of DuploCloud portal in Azure VM:
Log in to the Azure Portal.
Navigate to Managed Identities.
Click on + Add to create a new managed identity.
Provide the following details:
Name: Enter a meaningful name for the managed identity (e.g., duplo-master-managed-identity
).
Subscription: Select the subscription where the identity will be created.
Resource Group: Choose an existing resource group or create a new one.
Region: Select the appropriate region for the managed identity.
Click Create and wait for the deployment to complete.
Go to Virtual Machines in the Azure portal and select the VM where DuploCloud is installed.
Under the Security section, select Identity.
Switch to the User assigned tab and click + Add.
Select the managed identity created in Step 1 and click Add.
Go to Subscriptions in the Azure portal and select the subscription where resources will be launched by DuploCloud.
Under Access Control (IAM), click + Add -> Add role assignment.
Switch to Privileged administrator roles tab
Select Owner.
In the Assign access to field, choose Managed identity.
Search for and select the managed identity created in Step 1.
Click Save to complete the role assignment.
In the same subscription as above, navigate again to Access Control (IAM).
Click + Add -> Add role assignment.
Switch to Privileged administrator roles tab
Select Owner in the Role dropdown.
In the Assign access to field, choose Managed Identity.
Search for and select the DuploCloud VM.
Click Save to apply the changes.
Ensure that both the managed identity and the VM are in the same subscription where resources will be launched.
Verify the assignments under Access Control (IAM) for both the managed identity and the VM to ensure correct configurations.
In the Certificate Version form, copy the Secret Identifier using the Copy Icon ().
Log in to the OpenVPN Access Server user portal using the credentials from the DuploCloud user profile section.
Install the OpenVPN Connect app on your local machine.
Download the OpenVPN user profile for your account from the link labeled Yourself (user-locked profile).
Click Connect.
Set the default AKS cluster version to enable Kubernetes cluster creation
DuploCloud contains many features that leverage Kubernetes in your cloud environment. In order to create Kubernetes clusters with DuploCloud Azure, you must set the default version of your AKS cluster in DuploCloud's configuration.
If you do not set the default AKS cluster version, or keep it updated to your current AKD cluster version release, DuploCloud may be unable to create Kubernetes clusters.
Failure to create Kubernetes clusters is often indicated by empty values for Server Endpoint and Token.
For example, in the DuploCloud Portal, navigate to Administrator -> Infrastructure. Select your Infrastructure Name and click the Kubernetes tab. If the Server Endpoint and Token fields are empty, this indicates a failure occurred when attempting to create a Kubernetes cluster.
To set the default AKS cluster version and enable Kubernetes cluster creation:
In the DuploCloud Portal, navigate to Administrator -> System Settings.
Click the System Config tab.
In the System Configs section, click Add. The Add Config pane displays.
Select Other from the Config Type list box.
Select AppConfig from the Other Config Type list box.
In the Key list box, type AKS_DEFAULT_CLUSTER_VERSION.
In the Value field, enter the default AKS cluster version number (for example, 1.23.12). When you upgrade your AKS cluster, you will need to update the value of AKS_DEFAULT_CLUSTER_VERSION.
Click Submit. The key and value are displayed in the System Config tab.