Select Page

Overview of the Azure Cloud Stack Architecture

Below we can see the classic diagram of the azure stack architecture. We have the ARM, the PR and the infrastructure control layers. Let’s take a look at the functionality of each layer in the Azure Cloud Stack.
Azure Stack Cloud

Image Source: www.microsoft.com

The ARM Layer of Azure Stack Cloud

We have the Azure portal and the templates being able to work with PowerShell and the way the overall topology of Azure is managed in Azure Stack. The Azure Resource Manager (ARM) is an instance that runs in Azure Stack. This is the end point that you interact with as both a tenant and administrator of an Azure-Stack-instance – This is key to the overall delivery.

The PR Layer

Underneath the ARM layer is an architectural layer as a partition request broker. We have a number of abbreviations listed underneath that. All of them refer to essentially a resource provider. It is a widely known API that interacts back-and-forth with the ARM.

Azure Cloud’s Infrastructure Control Layer

Then underneath that, we have, essentially the changes that start to occur, because the architecture, nothing like the massive data center, it is going to be 4-servers to start with. So, we have to take the software that runs in that data center in some form and deliver the stability of Azure and bring it onto a four node configuration to begin.

This essentially represents the core pieces where the variance starts to occur from an Azure standpoint. This is all essential detail. This is an infrastructure that Microsoft Azure Cloud is providing and it is not externally-disclosed to you through a set of APIs. You are not going to see that when you go-off to deploy workloads as a tenet or administer for the whole server-solution.

Azure Cloud Stack

Image Source: www.cio.com

Inside the infrastructure is the hardware Layer that underlies all this. So compute, network and storage is an underlying feature or set. Then the details of essentially what’s inside that infrastructure role. When your coworkers like to refer to that long list of things, if you are going to open up the task manager in Windows on your desktop, you see a bunch of services running like you may know what those are, but you don’t really have to get into the details of how to manage them. You know that they are present and might have to stop-and-restart them occasionally, But the idea is that those are well-engineered, tested, validated and you really don’t need to interact with them or know their detail.
The Spear Phishing Survival Guide

The Spear Phishing Survival Guide

Spear phishing stands as the favored gateway for ransomware delivery and infiltrating corporate networks. Shockingly, 36% of data breaches in 2022 involved phishing, with 25% utilizing email as the ransomware attack vector. Guarding against cyber threats and...

Understanding Detection and Response: EDR vs MDR vs XDR vs NDR

Understanding Detection and Response: EDR vs MDR vs XDR vs NDR

In a digitally transformed landscape fraught with ever-evolving cyber threats, the acronyms EDR (Endpoint Detection and Response), XDR (Extended Detection and Response), MDR (Managed Detection and Response), and NDR (Network Detection and Response) have become...

Trigona Ransomware: What is it and How to Defend Against it

Trigona Ransomware: What is it and How to Defend Against it

In an ever-evolving digital landscape, the specter of ransomware looms large, and Trigona stands as a significant player in the realm of cyber threats. This blog delves into the multifaceted world of Trigona ransomware, unraveling its origins, unique characteristics,...

Lockbit Ransomware: Inside the Cyberthreat and Defense Strategies

Lockbit Ransomware: Inside the Cyberthreat and Defense Strategies

In the constantly evolving arena of cybersecurity, the digital landscape is fraught with adversaries lurking in the shadows, ready to exploit vulnerabilities and disrupt the operations of organizations. Among these threats, LockBit ransomware has emerged as a...

What Defending Against Ransomware-as-a-Service (RaaS) Entails

What Defending Against Ransomware-as-a-Service (RaaS) Entails

Ransomware has evolved, becoming a thriving business model for cybercriminals. Ransomware-as-a-Service (RaaS) exemplifies this transformation—a lethal alliance between the creators and distributors of ransomware. It’s no longer a threat relegated to tech...

You May Also Like

WordPress PopUp Plugin

Subscribe To Our Newsletter

Join our mailing list to receive the latest news, updates, and promotions from StoneFly.

Please Confirm your subscription from the email