How to setup the interconnect between Oracle Cloud Infrastructure and Microsoft Azure

Jamal Arif
10 min readJun 20, 2019

--

A week back Oracle announced Oracle and Microsoft Interconnect Clouds to Accelerate Enterprise Cloud Adoption, a cloud interoperability partnership between Microsoft and Oracle. This interconnect will allow customers to run their workloads across the two environments, seamlessly connecting Azure services like Analytics and AI to Oracle Autonomous Database services.

This blog series will walk through the details of setting up this interconnect between Oracle and Azure, and then discuss common use-cases for multi cloud deployments.

In the first blog of this series, I will first describe how to set up virtual networking infrastructure resources in Oracle Cloud Infrastructure and Microsoft Azure to enable this interconnect.

Following is a high level diagram shows am Azure VNet (Virtual Network) that is connected to a Oracle VCN (Virtual Cloud Network). Resources in the VNet use the logical circuit that runs on the cross-cloud connection between Azure and Oracle Cloud Infrastructure to connect with resources in the VCN.

OCI-Azure Interconnect

Lets continue and setup one by one each component to exactly enable such a connection.

As we continue with the details, I am making the following assumptions.

  • Users have access to OCI and Azure Tenancy
  • Have necessary required policies to create resources in OCI and Azure. Can find more details here.

Pre-requisites Step 1: Microsoft Azure

In order to setup this interconnect, there are some pre-requisites that we need to complete for this setup: Azure Virtual Network (VNet) with subnets that can host a test virtual machine, and an Azure virtual network gateway.

Lets get started!

Sign in to the Azure portal. On the upper-left side of the screen, select Create a resource > Networking > Virtual network. Add in the required details as shown below, leave the rest to default and select Create.

VNET and Subnet Creation

This creates a virtual network (VNet) and a subnet, which are scoped to a single region with in Azure (US West in our example). Resources within the virtual network can communicate outbound with the internet, by default. An inbound connection can be achieved by attaching a public IP with the resource. You can also connect virtual network with your on-premises network or other public clouds (Oracle Cloud Infrastructure) by using Azure ExpressRoute. This connection is private. Traffic does not go over the internet.

In order to create the interconnect between Azure virtual network and oracle cloud infrastructure virtual cloud network (VCN), we must create a virtual network gateway first. A virtual network gateway serves two purposes: exchange IP routes between the networks and route network traffic.

On the upper-left side of the screen, search for ‘virtual network gateway’ resource and click on Create. It opens up the virtual network gateway options. Add in the details as shown below. Remember to select ‘ExpressRoute’ in gateway type.

Virtual Network Gateway Details
Virtual Network and Gateway Network
Public IP for Virtual Network Gateway

It make take up to 45 minutes for creating the virtual network gateway. In the meantime, lets setup a virtual machine in your virtual network to test the connectivity once the interconnect is successfully setup.

On the upper-left side of the screen, select Create a resource > Compute > Ubuntu Server. Add in the required details and leave the rest as default.

This completes our pre-requisites for Microsoft Azure.

Pre-requisites Step 2: Oracle Cloud Infrastructure

Similarly on the Oracle Cloud Infrastructure side (OCI), we need to create a virtual cloud network with subnets and attach a dynamic routing gateway.

Lets get started!

Sign into the OCI console. One the top left of the screen, select Menu > Networking > Virtual Cloud Networking > Create a Virtual Cloud Network. Add in the required details and Select Create Virtual Cloud Network plus related resources. The dialog box expands to list the items that will be created with your cloud network.

Create Virtual Cloud Network plus related resources
Resources to be created
Subnets automatically created

A virtual cloud network is a software defined version of a network, and allows you to create a virtualized datacenter in any oracle cloud infrastructure region. The subnets are scoped within a particular virtual cloud network and can be availability domain specific or regional.

Now that we have created basic virtual cloud network components, lets go ahead and create a dynamic routing gateway (DRG). A DRG can be considered as a virtual router that allows private traffic connectivity between your virtual cloud network and the networks outside of your VCN, that can be VCN in another region, a virtual network in another cloud or on-premise network.

One the top left of the screen, select Menu > Networking > Dynamic Routing Gateway > Create Dynamic Routing Gateway.

Create Dynamic Routing Gateway

It takes usually 3/4 minutes to create a DRG. Once the DRG is created, go ahead and attach that DRG with your VCN.

Attach VCN to DRG

Once the DRG is attached to VCN, your pre-requisites are completed for Oracle Cloud Infrastructure. Before we move ahead, lets create a virtual machine here in OCI VCN as well for testing.

One the top left of the screen, select Menu > Compute > Instances > Create Instance. More on creating an instance can be found here.

Now that the pre-requisites are completed, lets continue with the process of creating the interconnect between Microsoft Azure and Oracle Cloud Infrastructure.

Step 1: Setup Azure ExpressRoute

On the upper-left side of the screen, select Create a resource > ExpressRoute and select Create. Add in the required details as shown below. Choose Oracle Cloud FastConnect as the provider, and currently my region is US West for Azure.

The connection is currently available only between the Oracle Cloud Infrastructure location in the us-ashburn-1 region and the Azure Washington DC location

This creates an ExpressRoute circuit, however its not currently provisioned and doesn’t provide any connectivity details. Note down the service key as we will use this afterwards in Oracle Cloud Infrastructure.

Step 2: Setup Oracle Cloud Infrastructure FastConnect

In OCI Console, navigate to the Menu > Networking > FastConnect > Create Connection. Choose the connect through provider and select Microsoft Azure ExpressRoute.

FastConnect Circuit

Choose a private virtual circuit creation, provide details of your dynamic routing gateway and add in the service key copied from Azure here.

The connection between Azure VNet and OCI VCN uses BGP dynamic routing. Provide the BGP IP addresses that will be used for the two redundant BGP sessions between Oracle and Azure:

  • A primary pair of BGP addresses
  • A separate, secondary pair of BGP addresses

I have provided here /30 addresses here for the BGP connection. The second and third in each /30 are used as BGP IP address pair. The second address in the block is for the Oracle side of the BGP session and the third address in the block is for the Azure side of the BGP session.

Initially the circuit will go into provisioning.

FastConnect Circuit in Provisioning State

Shortly after the circuit goes into ‘UP’ status with its lifecycle state as ‘Provisioned’.

UP Status of FastConnect virtual circuit
Details page of FastConnect Virtual Circuit

Similarly on the Azure side, the circuit status has changed into provisioned as well.

Azure ExpressRoute Provisioned Status
Azure ExpressRoute Peering details

Step 3: Link VNet to Azure ExpressRoute

Next step is to create a link between the Azure Virtual Network and ExpressRoute circuit and configure security groups and routing for the virtual network.

On your dashboard navigate to your virtual network gateway > connections > select Add and configure the values.

Configure Values for connection
Connection to ExpressRoute successful

Step 4: Associate Network Security groups and Route table to Azure VNet

On the upper-left side of the screen, select Create a resource > Network Security Group > select Create. Configure the values to create a network security group.

Network Security Group

Associate the network security group to the subnet in your VNet hosting your virtual machine. Select the newly created network security group from the dashboard, select Subnets and Associate. Select the VNet and subnet required.

Associate VNet Subnet to Network Security Group

Add relevant security group rules to allow traffic from Virtual Cloud Network on Oracle Cloud Infrastructure. We will start with some basic ping tests using the ICMP protocol.

Navigate to the newly created network security group from the dashboard, select Inbound Security Rules > select Add. Add two rules, one for ssh connection into the Azure VM and another rule for connection between OCI VCN Subnet (10.0.0.0/24) to Azure VNet Subnet (172.16.0.0/24).

Inbound Network Security Group Rules

Navigate to the upper-left side of the screen, select Create a resource > Route Table > select Create. Configure the values to create a route table.

Route table Creation

Once the new route table is created, associate the route table with the VNet Subnet hosting your virtual machine and add a route. The following figure shows the route with address prefix is Oracle Cloud Infrastructure VCN CIDR (In our example: 10.0.0.0/16) and the next hop is the Azure Virtual Network Gateway.

Adding a Route to the Route Table

We have created an ExpressRoute, linked it with our Virtual Network Gateway and configured network security group and route table to allow traffic connectivity with OCI VCN.

Step 5: Configure OCI VCN Security Lists and Route Table

Navigate to the details of the Virtual Cloud Network and configure the security lists and route table associated with your subnet hosting your virtual machine.

Virtual Cloud Network > Security Lists > Default Security List > Add Ingress Rule with source CIDR of the Azure VNet Subnet (172.16.0.0/24). This opens up all protocols traffic between the two virtual networks. In upcoming blogs, I will provide best practices on having more secure connection between multiple cloud environments and implications of such a connection.

Security List Rule

Moving ahead, lets navigate to Virtual Cloud Network > Route table > Default Route table > Add Route rule with Destination CIDR of Azure VNet (172.16.0.0/16) and DRG as your target. This will add a route table entry for routing the traffic towards Azure VNet.

Test your Connection!!

Lets go ahead and test the connection. We have virtual machines in each virtual network. Lets ssh into them and test out connectivity by doing a basic PING test.

  • OCI VM Private IP: 10.0.0.2
  • Azure VM Private IP: 172.16.0.4
Azure VM PING Test to OCI VM Private IP
OCI VM PING test to Azure VM Private IP

There you go! The connection is successful. We are able to PING traffic from either direction i.e. OCI — Azure.

UPDATE: I recently tested latency between Azure East region and the Ashburn region in OCI. Following were the results with Latency around ~2ms!!

Azure VM ping to OCI VM
OCI VM to Azure VM

In coming blogs, I will use this connection and create common use-cases for this interconnect.

--

--