In this scenario, an organization has hosted multiple APIs using Azure Application Service Environment (ILB ASE), and they want to consolidate these APIs internally, by using Azure API Management (APIM) deployed inside a Virtual Network. The internal API Management instance could also be exposed to external users to allow for utilization of the full potential of the APIs. This external exposure could be achieved using Azure Application Gateway forwarding requests to the internal API Management service, which in turn consumes the APIs deployed in the ASE.
Potential use cases
- Synchronize customer address information internally after a change made by the customer.
- Attract developers to your platform by exposing unique data assets.
Download a Visio file of this architecture.
The above scenario covers a complete lifecycle of internal APIs that are consumed by the external users.
The data flows as follows:
- Developers check in code to a GitHub repository that's connected to a CI/CD pipeline agent that's installed on an Azure VM.
- The agent pushes the build to the API application that's hosted on ILB ASE.
- Azure API Management consumes the above APIs via HOST headers that are specified in API Management policy.
- API Management uses the App Service Environment's DNS name for all the APIs.
- Application Gateway exposes API Management's developer and API portal.
- Azure Private DNS is used to route the traffic internally between ASE, API Management, and Application Gateway.
- External users utilize the exposed developer portal to consume the APIs via Application Gateway's public IP.
- Azure Virtual Network enables Azure resources to securely communicate with each other, the internet, and on-premises networks.
- Azure Private DNS allows domain names to be resolved in a virtual network without needing to add a custom DNS solution.
- Azure API Management helps organizations publish APIs to external, partner, and internal developers to use their data and services.
- Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications.
- Internal Load Balancer App Service Environment is an Azure App Service feature that provides a fully isolated and dedicated environment for securely running App Service apps at high scale.
- Azure DevOps is a service for managing your development lifecycle and includes features for planning and project management, code management, build, and release.
- Application Insights is an extensible Application Performance Management (APM) service for web developers on multiple platforms.
- Azure Cosmos DB is Microsoft's globally distributed, multi-model database service.
- In an Azure lift and shift scenario deployed into an Azure Virtual Network, back-end servers could be directly addressed through private IP addresses.
- If using on-premises resources, the API Management instance could reach back to the internal service privately via an Azure VPN gateway and site-to-site IPSec VPN connection or ExpressRoute making a hybrid Azure and on-premises scenario.
- Existing or open-source DNS providers could be used instead of the Azure-based DNS Service.
- Internal APIs deployed outside of Azure can still benefit by exposing the APIs through API Management Service.
- The web APIs are hosted over secured HTTPS protocol and will be using a TLS Certificate.
- The Application Gateway also is configured over port 443 for secured and reliable outbound calls.
- The API Management service is configured to use custom domains using TLS certificates.
- Review the suggested network configuration for App Service Environments
- There needs to be an explicit mention about port 3443 allowing API Management to manage via the Azure portal or PowerShell.
- Leverage policies within APIM to add a HOST header for the API hosted on ASE. This ensures that the ASE's load balancer will properly forward the request.
- The API Management accepts ASE's DNS entry for all the apps hosted under App Service Environments. Add an APIM policy to explicitly set the HOST header to allow the ASE load balancer to differentiate between Apps under the App Service Environment.
- Consider Integrating with Azure Application Insights, which also surfaces metrics through Azure Monitor for monitoring.
- If you use CI/CD pipelines for deploying Internal APIs, consider building your own Hosted Agent on a VM inside the Virtual Network.
Azure API Management service could be deployed as a Multi-Region deployment for higher availability and also to reduce latencies. This feature is only available in Premium Mode. The API Management service in this specific scenario consumes APIs from App Service Environments. One could also use APIM for APIs hosted on the internal on-premises infrastructure.
App Service Environments could make use of Traffic Manager profiles to distribute the traffic hosted on App Service Environments for higher scale and availability.
API Management instances could be scaled out depending upon a number of factors like number and rate of concurrent connections, the kind and number of configured policies, request and response sizes, and back-end latencies on the APIs. Scaling out instance options are available in Basic, Standard, and Premium Tiers but are bound by an upper scale limit in tiers below premium. The instances are referred to as Units and can be scaled up to a max of two units in Basic tier, four units in Standard tier and any number of units in the Premium tier. Auto Scaling options are also available to enable scale out based on rules.
App Service Environments are designed for scale with limits based on the pricing tier and the apps hosted under the App Service Environments can be configured to scale out (number of instances) or scale up (instance size) depending upon the requirements of the application.
Azure Application Gateway auto scaling is available as a part of the Zone redundant SKU in all global Azure regions. See the public preview feature regarding App gateway Auto scaling.
Since the above example scenario is hosted completely on an internal network, API Management and ASE are already deployed on secured infrastructure (Azure VNet). Application Gateways can be integrated with Microsoft Defender for Cloud to provide a seamless way to prevent, detect, and respond to threats to the environment. For general guidance on designing secure solutions, see the Azure Security Documentation.
This example scenario though talks more about configuration, the APIs hosted on the App Service Environments should be resilient enough to handle errors in the requests, which eventually is managed by the API Management service and Application Gateway. Consider Retry and Circuit breaker patterns in the API design. For general guidance on designing resilient solutions, see Designing resilient applications for Azure.
API Management is offered in four tiers: developer, basic, standard, and premium. You can find detailed guidance on the difference in these tiers at the Azure API Management pricing guidance here.
Customers can scale API Management by adding and removing units. Each unit has capacity that depends on its tier.
The Developer tier can be used for evaluation of the API Management features. The Developer tier should not be used for production.
To view projected costs and customize to your deployment needs, you can modify the number of scale units and App Service instances in the Azure Pricing Calculator.
Similarly, the App Service Environments pricing guidance is provided here
Application Gateway pricing can be configured here depending upon the required tier and resources.
Deploy this scenario
Prerequisites and assumptions
- A custom domain name will need to be purchased.
- A TLS certificate (we used a wild-card certificate from Azure Certificates Service) to use one for all our custom domains. You could also procure a self-signed certificate for Dev Test scenarios.
- This specific deployment uses the domain name contoso.org and a wild-card TLS certificate for the domain.
- The deployment is using the resource names and address spaces mentioned in the deployment section, which can be configured.
Deployment and putting the pieces together
The components deployed using the above Resource Manager template needs to be further configured as below
VNet with the following configurations:
- Address space for VNet: 10.0.0.0/16
- Four Subnets
backendSubnetfor DNS Service: 10.0.0.0/24
apimsubnetfor Internal API Management Service: 10.0.1.0/28
asesubnetfor ILB ASE: 10.0.2.0/24
- VMSubnet for Test VMs and Internal DevOps Hosted Agent VM: 10.0.3.0/24
Private DNS service (Public Preview) since adding a DNS service requires the VNet to be empty.
- Refer to the deployment guidelines for more information
App Service Environment with Internal Load Balancer (ILB) option:
aseinternal.contoso.org). Once the Deployment is complete, upload the wild-card cert for the ILB
App Service Plan with ASE as location
An API App (App Services for simplicity) -
https://srasprest.contoso.org) – ASP.NET MVC-based web API. After the deployment, configure
- web app to use the TLS certificate
- Application Insights to the above apps: api-insights
- Create an Azure Cosmos DB service for web APIs hosted internal to VNet:
- Create DNS entries on the Private DNS zone created
- You could make use of Azure Pipelines to configure the agents on Virtual Machines to deploy the code for Web App on internal Network
- For testing the API App internally, create a test VM within the VNet subnet
Creates API Management service:
Configure the service to connect to internal VNet on Subnet:
apimsubnet. After the deployment is complete, perform the below additional steps
- Configure custom domains for APIM Services using TLS
- API portal (api.contoso.org)
- Dev Portal (portal.contoso.org)
- In the APIs section, configure the ASE Apps using ASE's DNS name added Policy for HOST Header for the Web app
- Use the above created test VM to test the API Management service internal on the Virtual Network
The testing the APIM APIs from Azure portal will still not work as api.contoso.org isn't able to be publicly resolved.*
- Configure custom domains for APIM Services using TLS
Configure Application Gateway (WAF V1) to access the API service: apim-gateway on Port 80. Add TLS certs to the App Gateway and corresponding Health probes and Http settings. Also configure the Rules and Listeners to use the TLS cert.
Once the above steps are successfully completed, Configure the DNS entries in GoDaddy CNAME entries of api.contoso.org and portal.contoso.org with App Gateway's public DNS name:
ase-appgtwy.westus.cloudapp.azure.com and verify if you are able to reach the Dev Portal from Public and are able to test the APIM services APIs using Azure portal
It is not a good practice to use same URL for Internal and External endpoints for the APIM services (currently in the above demo, both URLs are same). If we want to choose to have different URLs for internal and external endpoints, we could make use of App Gateway WAF v2, which supports http redirection and much more.
- Tutorial: Import and publish your first API
- Tutorial: Create and publish a product
- Tutorial: Publish multiple versions of your API
Check out the related scenario on Migrating legacy web APIs to API Management