Skip to content

Latest commit

 

History

History
116 lines (102 loc) · 14.1 KB

deploy-baseline.md

File metadata and controls

116 lines (102 loc) · 14.1 KB

Azure Virtual Desktop LZA - Baseline - Deployment walk through

Portal UI Experience (ARM)
Deploy To Azure Deploy to Azure Gov Deploy to Azure China
  • Basics blade
    • Subscription - The subscription where the accelerator is going to deploy the resources.
    • Region – The desired Azure Region to be used for the deployment. Management Plane and Session Host Locations will be selected separately.
    • Prefix – A prefix of maximum 4 characters that will be appended to the names of Resource Groups and Azure resources within the Resource Groups.
    • Environment – Deployment Environment type (Development/Test/Production), will be used for naming and tagging purposes.
  • Identity provider blade
    • Identity Service Provider - Identity service provider (AD DS, Entra DS, Microsoft Entra ID) that already exists and will be used for Azure Virtual Desktop.
      • Microsoft Entra ID.
      • Active Directory (AD DS).
      • Microsoft Entra Domain Services.
    • Azure Virtual Desktop access assignment - These identities will be granted access to Azure Virtual Desktop application groups (role "Desktop Virtualization User").
      • Groups - select from the drop down the groups to be granted access to Azure Virtual Desktop published items and to create sessions on VMs and single sign-on (SSO) when using Microsoft Entra ID as the identity provider.
      • Note: when using Microsoft Entra ID as the identity service provider, an additional role (virtual machine user login) will be granted to compute resource group during deployment.
    • When selecting AD DS or Microsoft Entra DS:
      • Domain join credentials The Username and password with rights to join computers to the domain.
    • When selecting Microsoft Entra ID:
      • Enroll VM with Intune: check the box to enroll session hosts on tenant's.
    • Session host local admin credentials The Username and password to set for local administrator.
  • Management plane blade
    • Deployment location - The Azure Region where management plane resources (workspace, host pool, application groups) will be deployed. These resources are not available in all locations but are globally replicated and they can share the same location as the session hosts or not.
    • Host pool type - This option determines if a personal (aka single session) or pool (aka multi-session ) host pool will be configured.
    • When Pooled is selected:
      • Load balancing algorithm - Choose either breadth-first or depth-first, based on your usage pattern. Learn more about what each of these options means at Host pool load-balancing methods.
      • Max session limit - Enter the maximum number of users you want load-balanced to a single session host.
      • Create remote app group - Choose if you want to create a RemoteApp application group or not. A Desktop application group will be created by default.
      • Scaling plan - Choose if you want to create a scaling plan or not. An Azure Virtual Desktop scaling plan will be created and host pools assigned to it.
    • When Personal is selected:
      • Machine assignment - Select either Automatic or Direct.
      • Start VM on connect - Choose if you want the host pool to be configured to allow users starting session hosts on demand.
  • Session hosts blade
    • Deploy sessions hosts - You can choose to not deploy session hosts just the Azure Virtual Desktop service objects.
    • Session host region - Provide the region to where you want to deploy the session hosts. This defaults to the Management Plane region but can be changed.
    • Session hosts OU path (Optional) - Provide OU where to locate session hosts, if not provided session hosts will be placed on the default (computers) OU. If left empty the computer account will be created in the default Computers OU. Example: OU=avd,DC=contoso,DC=com.
    • Availability zones - If you deselect the checkbox, an Availability set will be created instead and session hosts will be created in the availability set. If you select the checkbox the accelerator will distribute compute and storage resources across availability zones.
    • VM size - Select the SKU size for the session hosts.
    • VM count - Select the number of session hosts to deploy.
    • OS disk type - Select the OS Disk SKU type. Premium is recommended for performance and higher SLA.
    • Zero trust disk configuration - Check the box to enable the zero trust configuration on the session host disks to ensure all the disks are encrypted, the OS and data disks are protected with double encryption with a customer managed key, and network access is disabled.
    • Enable accelerated networking - Check the box to ensure the network traffic on the session hosts is offloaded to the network interface to enhance performance. This feature is free and available as long a supported VM SKU and OS is chosen. To check whether a VM size supports Accelerated Networking, see Sizes for virtual machines in Azure. This feature is recommended as it will decrease CPU utilization for networking (offloading to NIC) and increase network performance/throughput to Azure VMs and Services, like Azure Files.
    • OS image source - Select a marketplace image or an image from Azure Compute Gallery (Custom image build deployment will create images in compute gallery).
    • OS version or image - Choose the OS version or desired image from the Azure compute gallery.
  • Storage blade
    • General Settings:
      • AD Domain name: The full qualified domain name of the on-premises domain where the hybrid identities originated from, this information is used for Azure files authentication setup, Example: contoso.com.
      • Custom OU Path (Optional): specify an OU path to create domain storage objects.
      • Zone redundant storage: Select to replicate storage across availability zones or only use local redundancy.
    • FSLogix profile management: Deploys FSLogix containers and session host setup for user's profiles.
    • FSLogix Azure Files share Performance - Select the desired performance.
    • FSLogix file share size Choose the desired size in 100GB increments. Minimum size is 100GB.
    • MSIX App Attach: Deploys MSIX App Attach container for MSIX app packages.
    • MSIX App Attach Azure Files share Performance - Select the desired performance.
    • MSIX App Attach file share size Choose the desired size in 100GB increments. Minimum size is 100GB.
  • Network connectivity blade
    • Virtual Network - Select if creating "New"" or use "Existing" virtual network.
      • New - Select if you want to create a new VNet to be used for Azure Virtual Desktop.
        • vNet address range - Enter the IP block in CIDR notation to allocate to the VNet.
        • Azure Virtual Desktop subnet address prefix - Enter IP block in CIDR notation for the new Azure Virtual Desktop subnet.
        • Private endpoint subnet address prefix - Enter IP block in CIDR notation for the new private endpoint subnet.
        • Custom DNS servers - Enter the custom DNS servers IPs to be set on the VNet. These DNS server should have proper DNS resolution to your AD DS domain, internet and Azure private DNS zones for private endpoint resolution.
      • Existing - Select if using existing virtual networks for the Azure Virtual Desktop deployment.
        • Azure Virtual Desktop virtual network - Select virtual network to be used for Azure Virtual Desktop deployment.
        • Azure Virtual Desktop subnet - Select virtual network subnet to be used for session hosts deployment.
        • Private endpoint virtual network - Select virtual network to be used for private endpoint deployment.
        • Private endpoint subnet - Select virtual network subnet to be used for private endpoint deployment.
    • Private endpoints (Key vault and Azure files) - Select the checkbox to create private endpoints for key vault and Azure file services, when selecting no public endpoints of the services will be used.
    • Existing Azure private DNS zone - Select the checkbox to use an existing private DNS zone for Azure Files and Key vault (Private DNS for Azure files is required for FSLogix deployment to configure properly).
    • Existing hub VNet peering
      • Virtual Network - Select the hub VNet where this new VNet will be peered with.
      • VNet Gateway on hub - Select the checkbox to set the use remote gateway option for the VNet peering.
  • Monitoring blade
    • Deploy monitoring - select checkbox to deploy all required diagnostic configurations all Azure Virtual Desktop resources, also events and performance stats will be pushed from session hosts to a log analytics workspace.
      • Log analytics workspace - select if creating a new workspace or if using and existing one.
      • Deploy monitoring policies (subscription level) - select the checkbox to deploy custom policies and policy sets will be created and assigned to the subscription to enforce deployIfNotExist rules to future Azure Virtual Desktop resources.
  • Resource naming blade
    • Custom Resource Naming - select the checkbox to provide the names that will be used to name resources. When the checkbox is not selected deployment will use the Azure Virtual Desktop accelerator naming standard.
  • Resource tagging blade
    • Custom Resource tagging - select the checkbox to provide information to be use to create tags on resources and resource groups.
  • Review + create blade

Take a look at the Naming Standard and Tagging page for further information.

Post Deployment Considerations

  • When using Microsoft Entra ID as identity provider and deploying FSLogix storage, it is required to grant admin consent to the storage account service principal (your-storage-account-name.file.core.windows.net) created during deployemnt, additional information can be found in the Grant admin consent to the new service principal guide.

Redeployment Considerations

When redeploying the baseline automation with the same deployment prefix value, clean up of previously created resource groups or at least their contained resources will need to be removed before the new deployment is executed, this will prevent the duplication of resources (key vaults and storage accounts) and conflicts of IP range overlap when creating the Azure Virtual Desktop virtual network.

Other Deployment Options

We have these other options available:

Deployment Type Link
Azure portal UI Deploy to Azure Deploy to Azure Gov Deploy to Azure China
Command line (Bicep/ARM) Powershell/Azure CLI
Terraform Terraform

Next Steps

  • After successful deployment, you can remove the following temporary resources used only during deployment:
    • Management virtual machine (vmmgmt{deploymentPrefix}{DeploymentEnvironment-d/t/p}{AzureRegionAcronym}) and its associated OS disk and network interface.
  • You should assign specific roles, including Azure Virtual Desktop - Specific roles based on your organization’s policies.
  • Preferably enable NSG Flow logs and Traffic Analytics.

Known Issues

Please report issues using the projects issues tracker.