Redaguoti

Bendrinti naudojant


Azure VM Image Builder networking options

Applies to: ✔️ Linux VMs ✔️ Flexible scale sets

With Azure VM Image Builder, you choose to deploy the service with or without an existing virtual network. The following sections provide more details about this choice.

Deploy without specifying an existing virtual network

If you don't specify an existing virtual network, VM Image Builder creates one, along with a subnet, in the staging resource group. The service uses a public IP resource with a network security group to restrict inbound traffic. The public IP facilitates the channel for commands during the image build. After the build completes, the virtual machine (VM), public IP, disks, and virtual network are deleted. To use this option, don't specify any virtual network properties.

Deploy using an existing VNET

If you specify a virtual network and subnet, VM Image Builder deploys the build VM to your chosen virtual network. You can access resources that are accessible on your virtual network. You can also create a siloed virtual network, unconnected to any other virtual network. If you specify a virtual network, VM Image Builder doesn't use a public IP address. Communication from VM Image Builder to the build virtual machine uses Azure Private Link.

For more information, see one of the following examples:

Azure Private Link provides private connectivity from a virtual network to Azure platform as a service (PaaS), or to customer-owned or Microsoft partner services. It simplifies the network architecture, and secures the connection between endpoints in Azure by eliminating data exposure to the public internet. For more information, see the Private Link documentation.

Required permissions for an existing virtual network

VM Image Builder requires specific permissions to use an existing virtual network. For more information, see Configure Azure VM Image Builder permissions by using the Azure CLI or Configure Azure VM Image Builder permissions by using PowerShell.

What is deployed during an image build?

If you use an existing virtual network, VM Image Builder deploys an additional VM (a proxy VM), and a load balancer (Azure Load Balancer). These are connected to Private Link. Traffic from the VM Image Builder service goes across the private link to the load balancer. The load balancer communicates to the proxy VM by using port 60001 for Linux, or port 60000 for Windows. The proxy forwards commands to the build VM by using port 22 for Linux, or port 5986 for Windows.

Note

The virtual network must be in the same region as the VM Image Builder service region.

Important

The Azure VM Image Builder service modifies the WinRM connection configuration on all Windows builds to use HTTPS on port 5986 instead of the default HTTP port on 5985. This configuration change can impact workflows that rely on WinRM communication.

Why deploy a proxy VM?

When a VM without a public IP is behind an internal load balancer, it doesn't have internet access. The load balancer used for the virtual network is internal. The proxy VM allows internet access for the build VM during builds. You can use the associated network security groups to restrict the build VM access.

The deployed proxy VM size is Standard A1_v2, in addition to the build VM. The VM Image Builder service uses the proxy VM to send commands between the service and the build VM. You can't change the proxy VM properties (this restriction includes the size and the operating system).

Image template parameters to support the virtual network

"vnetConfig": {
        "subnetId": ""
        },
Setting Description
subnetId Resource ID of a pre-existing subnet on which the build VM and validation VM is deployed.

Private Link requires an IP from the specified virtual network and subnet. Currently, Azure doesn’t support network policies on these IPs. Hence, you must disable network policies on the subnet. For more information, see the Private Link documentation.

Checklist for using your virtual network

  1. Allow Azure Load Balancer to communicate with the proxy VM in a network security group.
  2. Disable the private service policy on the subnet.
  3. Allow VM Image Builder to create a load balancer, and add VMs to the virtual network.
  4. Allow VM Image Builder to read and write source images, and create images.
  5. Ensure that you're using a virtual network in the same region as the VM Image Builder service region.

Next steps

Azure VM Image Builder overview