Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Azure firewall Subnet out of scope from Adress Space #731

Closed
tcardosoMSFT opened this issue Aug 9, 2021 · 6 comments · Fixed by #767
Closed

Azure firewall Subnet out of scope from Adress Space #731

tcardosoMSFT opened this issue Aug 9, 2021 · 6 comments · Fixed by #767
Assignees
Labels
engineering engineering work enhancement New feature or request

Comments

@tcardosoMSFT
Copy link

tcardosoMSFT commented Aug 9, 2021

Describe the bug
When deploy a azure firewall out of the address space pass of validate without issue.
the issue occur:
"message\\\": \\\"Subnet 'AzureFirewallSubnet' is not valid in virtual network 'example-hub-eastus'.

Steps to reproduce

1.deploy a hUb and Scope landing zone.
2. in network deploy a address space 10.0.0.1/18
3. Deploy a Azure firewall in the subnet out of the address space linke 10.100.0.1/24

the validate pass without issue. the deployment will failed in the virtual network deployment.

Screenshots

@tcardosoMSFT tcardosoMSFT added the bug Something isn't working label Aug 9, 2021
@synapp
Copy link
Contributor

synapp commented Aug 9, 2021

May be related to my issue reported in #716

@krnese krnese self-assigned this Aug 9, 2021
@synapp
Copy link
Contributor

synapp commented Aug 9, 2021

Hi @tcardosoMSFT,
Can you share some Error or Deployment State Messages? I've got a similar issue, but my Subnets for Azure Firewall ARE within the address space of the HUB.
"addressPrefix": { "value": "10.100.0.0/23"
And the Subnets are:
"subnetMaskForAzFw": { "value": "10.100.0.0/24" },
"subnetMaskForGw": { "value": "10.100.1.0/24"

My Error message (one of many)
{ "status": "Failed", "error": { "code": "ReferencedResourceNotProvisioned", "message": "Cannot proceed with operation because resource /subscriptions/<REDACTED>/resourceGroups/COMPANYPREFIX-vnethub-eastus/providers/Microsoft.Network/virtualNetworkGateways/COMPANYPREFIX-vpngw-eastus used by resource /subscriptions/<REDACTED>/resourceGroups/COMPANYPREFIX-vnethub-eastus/providers/Microsoft.Network/virtualNetworks/COMPANYPREFIX-hub-eastus is not in Succeeded state. Resource is in Failed state and the last operation that updated/is updating the resource is PutVirtualNetworkGatewayOperation.", "details": [] } }

@krnese
Copy link
Contributor

krnese commented Aug 9, 2021

Thanks. We have some known gaps in the cidr validation on the client side, and are looking to use new controls to capture this in the portal prior to submitting the deployment.

@tulpy
Copy link

tulpy commented Aug 17, 2021

There is some regex validation that has been done as part of the Data Management Landing Zones here - https://github.com/Azure/data-management-zone/blob/main/docs/reference/portal.dataManagementZone.json that would help here

Capture

@krnese krnese added engineering engineering work enhancement New feature or request and removed bug Something isn't working labels Aug 17, 2021
@marvinbuss
Copy link
Contributor

@tulpy & @krnese In ESA we are currently only validating whether the address range is valid and large enough. We are not yet checking, whether there is any overlap etc. This is potentially something that can be done, but it will become quite complex. Let us evaluate how we can further enhance the experience for users, who are not that familiar with network address ranges.

@marvinbuss
Copy link
Contributor

marvinbuss commented Aug 24, 2021

@tulpy, @krnese & @daltondhcp I worked on a rudimentary validation. See my analysis here as well as the linked PRs: Azure/data-management-zone#148

Let me know, whether this is something we also want to include in ESLZ. This will mitigate the issue reported above.

@marvinbuss marvinbuss linked a pull request Aug 26, 2021 that will close this issue
6 tasks
@ghost ghost locked as resolved and limited conversation to collaborators Jan 11, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
engineering engineering work enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants