Skip to main content
Version: Next

Manual Deployment Procedures

Runbook Azure

DOCUMENT CATEGORY: Runbook SCOPE: Manual infrastructure deployment procedures PURPOSE: Step-by-step deployment of individual components MASTER REFERENCE: Microsoft Learn - Azure Networking

Status: Active


Overview

This section provides manual deployment procedures for each Azure management infrastructure component. These procedures are intended for troubleshooting, learning, or deploying individual components when the CI/CD pipeline is unavailable.

Automated Deployment Recommended

For production deployments, use the CI/CD Pipeline Deployment for consistent, repeatable results.

Repository: github.com/AzureLocal/azurelocal-toolkit

When to Use Manual Procedures

Use these manual procedures when:

  • The CI/CD pipeline is unavailable or experiencing issues
  • You need to troubleshoot or customize individual components
  • You are learning or validating the deployment process
  • You need to deploy a single component without running the full pipeline

Landing Zone Considerations

Each task in this section includes a Landing Zone Placement table showing where resources are deployed under different models. Your deployment model affects which subscription and resource group each resource targets.

ModelDescriptionWhen Used
Single SubscriptionAll resources in one subscription under rg-azrlmgmt-\{env\}-\{region\}-01Small deployments, PoC, single-customer environments
CAF/WAF Landing ZoneResources split across Connectivity, Management, and Identity subscriptions per Cloud Adoption FrameworkEnterprise deployments, multi-customer, governance-first environments
Know Your Landing Zone Model

Before starting, confirm with your project lead which landing zone model applies. This determines the subscription and resource group for every resource deployed in this section.

Component Summary

This stage deploys all Azure-side infrastructure needed for Azure Local management. Tasks 01-10 create Azure resources; Task 11 deploys all management VMs.

VM Configuration

After completing Task 11, proceed to the VM Configuration section to configure individual VM workloads (AD DS, Utility Server, NDM, Lighthouse, WAC). VM Configuration applies regardless of whether you used CI/CD or manual deployment.

Networking and Platform Resources (Tasks 01-10)

TaskComponentClassificationPurpose
1Virtual Network and SubnetsRequiredAzure Local management network
2VPN GatewayRequiredSite-to-site connectivity to on-prem
3S2S VPN ConnectionRequiredEstablish tunnel to on-prem site
4P2S VPN ConnectionOptionalEngineer remote access via Azure VPN Client (Entra ID auth)
5Azure BastionRecommendedSecure RDP/SSH access to VMs
6Network Security GroupsRequiredSubnet-level security rules
7NAT GatewayRequiredOutbound internet for management VMs
8Arc GatewayOptionalAzure Arc hybrid connectivity
9Log Analytics WorkspaceRecommendedMonitoring and HCI Insights
10Key VaultRequiredSecrets management (passwords, keys)

Virtual Machine Deployment (Task 11)

TaskComponentClassificationPurpose
11Deploy Management VMsRequiredCreate all management VM resources in Azure

Cluster Mode (Once per Cluster)

Cluster-specific resources are deployed separately for each Azure Local cluster:

  • VPN Connection (Local Network Gateway + Connection): Deploy per-site using Task 3: S2S VPN Connection
  • Cluster Key Vault: See cluster deployment stages
  • Cluster Log Analytics Workspace: See cluster deployment stages

Network Architecture

The management VNet uses the following default subnet layout:

SubnetPurposeDefault CIDRNotes
GatewaySubnetVPN Gateway10.100.1.0/27Required name, no NSG
snet-azrl-*Management VMs10.100.1.32/27DCs, Utility, NDM servers
AzureBastionSubnetAzure Bastion10.100.1.64/26Required name, /26 minimum
snet-endpoints-*Private Endpoints10.100.1.128/27Key Vault, Storage endpoints

Prerequisites

Before starting this stage, ensure:

  • Phase 01: Landing Zones completed - Subscription and resource groups exist
  • Phase 02: Resource Providers completed - Required providers registered
  • Phase 03: RBAC Permissions completed - Deployment identity has required roles
  • Landing zone model confirmed (Single Subscription or CAF/WAF)
  • Network IP address ranges documented (avoid conflicts with on-prem)
  • VPN configuration details from on-prem team (ASN, BGP peer IP, public IP)

Deployment Order

Components should be deployed in the order listed (Tasks 1-16). Some resources have dependencies:

graph TD
A[Task 1: VNet and Subnets] --> B[Task 2: VPN Gateway]
B --> C[Task 3: S2S VPN Connection]
B --> D[Task 4: P2S VPN Connection]
A --> E[Task 5: Azure Bastion]
A --> F[Task 6: NSGs]
A --> G[Task 7: NAT Gateway]
A --> H[Task 8: Arc Gateway]
A --> I[Task 9: Log Analytics]
A --> J[Task 10: Key Vault]
F --> K[Task 11: Deploy Mgmt VMs]
G --> K
J --> K
I --> K
K --> L[VM Configuration Section]

Estimated Deployment Time

ComponentDeployment Time
Virtual Network and Subnets~2 minutes
VPN Gateway30-45 minutes
S2S VPN Connection (per-site)~5 minutes
P2S VPN Connection (optional)~10 minutes
Azure Bastion~10 minutes
NSGs~2 minutes
NAT Gateway~5 minutes
Arc Gateway (optional)~5 minutes
Log Analytics Workspace~2 minutes
Key Vault~3 minutes
Deploy Management VMs (all)~20 minutes
Total (Infrastructure)~2 hours
info

VM configuration time (~1.5 hours) is tracked in the VM Configuration section.

VPN Gateway Deployment

The VPN Gateway takes 30-45 minutes to deploy. Plan accordingly and do not interrupt the deployment.

Outcome

Upon completion of this stage:

  • Management VNet deployed with all required subnets
  • Site-to-site VPN connectivity to on-premises established
  • Point-to-site VPN available for engineer remote access (if deployed)
  • Azure Bastion available for secure VM access
  • Network security rules applied
  • NAT Gateway providing outbound connectivity
  • Arc Gateway ready for hybrid connectivity (if deployed)
  • Log Analytics Workspace ready for HCI Insights
  • Key Vault provisioned with deployment secrets
  • All management VMs deployed and ready for configuration
Next

Proceed to VM Configuration to configure AD DS, utility server, NDM, Lighthouse, and WAC.

Next Steps

After completing this stage:

  1. Verify VPN connectivity with on-premises network team
  2. Configure AD sites and services on Domain Controllers
  3. Store credentials in Key Vault (admin passwords, service accounts)
  4. Proceed to Phase 05: Identity and Security

PreviousUpNext
CI/CD Pipeline DeploymentPhase 04: Management InfrastructureTask 01: Virtual Network

End of Document


Version Control

  • Created: 2025-09-15 by Hybrid Cloud Solutions
  • Last Updated: 2026-03-20 by Hybrid Cloud Solutions
  • Version: 3.0.0
  • Tags: azure-local, manual-deployment, management-infrastructure, networking, vpn, key-vault, landing-zone
  • Keywords: manual deployment, virtual network, VPN gateway, bastion, NSG, NAT gateway, key vault, domain controller, landing zone
  • Author: Hybrid Cloud Solutions