Microsoft Azure Architectures for SharePoint 2013

 

Applies to: Microsoft Azure, SharePoint 2013

Topic Last Modified: 2016-05-13

Summary: SharePoint 2013 solutions can be hosted in Microsoft Azure virtual machines. Learn which type of solutions are a good fit and how to set up Microsoft Azure to host one.

Azure is a good environment for hosting a SharePoint Server 2013 solution. In most cases, we recommend Office 365, but a SharePoint Server farm hosted in Azure can be a good option for specific solutions. This article describes how to architect SharePoint solutions so they are a good fit in the Azure platform. The following two specific solutions are used as examples:

Azure infrastructure services is a compelling option for hosting SharePoint solutions. Some solutions are a better fit for this platform than others. The following table shows recommended solutions.

 

Solution Why this solution is recommended for Azure

Development and test environments

It’s easy to create and manage these environments.

Disaster recovery of on-premises SharePoint farms to Azure

Hosted secondary datacenter   Use Azure instead of investing in a secondary datacenter in a different region.

Lower-cost disaster-recovery environments   Maintain and pay for fewer resources than an on-premises disaster recovery environment. The number of resources depends on the disaster recovery environment you choose: cold standby, warm standby, or hot standby.

More elastic platform   In the event of a disaster, easily scale-out your recovery SharePoint farm to meet load requirements. Scale in when you no longer need the resources.

See SharePoint Server 2013 Disaster Recovery in Microsoft Azure.

Internet-facing sites that use features and scale not available in Office 365

Focus your efforts Concentrate on building a great site rather than building infrastructure.

Take advantage of elasticity in Azure   Size the farm for the demand by adding new servers, and pay only for resources you need. Dynamic machine allocation is not supported (auto scale).

Use Azure Active Directory (AD)   Take advantage of Azure AD for customer accounts.

Add SharePoint functionality not available in Office 365   Add deep reporting and web analytics.

See Internet Sites in Microsoft Azure using SharePoint Server 2013.

App farms to support Office 365 or on-premises environments

Build, test, and host apps in Azure to support both on-premises and cloud environments.

Host this role in Azure instead of buying new hardware for on-premises environments.

For intranet and collaboration solutions and workloads, consider the following options:

  • Determine if Office 365 meets your business requirements or can be part of the solution. Office 365 provides a rich feature set that is always up to date.

  • If Office 365 does not meet all your business requirements, consider a standard implementation of SharePoint 2013 on premises from Microsoft Consulting Services (MCS). A standard architecture can be a quicker, cheaper, and easier solution for you to support than a customized one.

  • If a standard implementation doesn’t meet your business requirements, consider a customized on-premises solution.

  • If using a cloud platform is important for your business requirements, consider a standard or customized implementation of SharePoint 2013 hosted in Azure infrastructure services. SharePoint solutions are much easier to support in Azure than other non-native Microsoft public cloud platforms.

While this article uses example SharePoint topologies, you can use these design concepts with any SharePoint farm topology. Before you design the Azure environment, use the following topology, architecture, capacity, and performance guidance to design the SharePoint farm:

Each SharePoint Server farm relies on Active Directory to provide administrative accounts for farm setup. At this time, there are two options for SharePoint solutions in Azure. These are described in the following table.

 

Option Description

Dedicated domain

You can deploy a dedicated and isolated Active Directory domain to Azure to support your SharePoint farm. This is a good choice for public-facing Internet sites.

Extend the on-premises domain through a cross-premises connection

When you extend the on-premises domain through a cross-premises connection, users access the SharePoint farm via your intranet as if it were hosted on-premises. You can take advantage of your on-premises Active Directory and DNS implementation.

A cross-premises connection is required for building a disaster-recovery environment in Azure to fail over to from your on-premises farm.

This article includes design concepts for extending the on-premises domain through a cross-premises connection. If your solution uses a dedicated domain, you don’t need a cross-premises connection.

First you need a virtual network in Azure, which includes subnets on which you will place your virtual machines. The virtual network needs a private IP address space, portions of which you assign to the subnets.

If you are extending your on-premises network to Azure through a cross-premises connection (required for a disaster recovery environment), you must choose a private address space that is not already in use elsewhere in your organization network, which can include your on-premises environment and other Azure virtual networks.

Figure 1: On-premises environment with a virtual network in Azure

Microsoft Azure virtual network design for a SharePoint solution. One subnet for the Azure gateway. One subnet for the virtual machines.

In this diagram:

  • A virtual network in Azure is illustrated side-by-side to the on-premises environment. The two environments are not yet connected by a cross-premises connection, which can be a site-to-site VPN connection or ExpressRoute.

  • At this point, the virtual network just includes the subnets and no other architectural elements. One subnet will host the Azure gateway and other subnets host the tiers of the SharePoint farm, with an additional one for Active Directory and DNS.

The next deployment step is to create the cross-premises connection (if this applies to your solution). For cross-premises connections, a Azure gateway resides in a separate gateway subnet, which you must create and assign an address space.

When you plan for a cross-premises connection, you define and create an Azure gateway and connection to an on-premises gateway device.

Figure 2: Using an Azure gateway and an on-premises gateway device to provide site-to-site connectivity between the on-premises environment and Azure

On-premises environment connected to an Azure virtual network by a cross-premise connection, which can be a site-to-site VPN connection or ExpressRoute

In this diagram:

  • Adding to the previous diagram, the on-premises environment is connected to the Azure virtual network by a cross-premise connection, which can be a site-to-site VPN connection or ExpressRoute.

  • An Azure gateway is on a gateway subnet.

  • The on-premises environment includes a gateway device, such as a router or VPN server.

For additional information to plan for and create a cross-premises virtual network, see Connect an on-premises network to a Microsoft Azure virtual network.

For disaster recovery in Azure, you deploy Windows Server AD and DNS in a hybrid scenario where Windows Server AD is deployed both on-premises and on Azure virtual machines.

Figure 3: Hybrid Active Directory domain configuration

STwo virtual machines deployed to the Azure virtual network and the SharePoint Farm subnet are replica domain controllers and DNS servers

This diagram builds on the previous diagrams by adding two virtual machines to a Windows Server AD and DNS subnet. These virtual machines are replica domain controllers and DNS servers. They are an extension of the on-premises Windows Server AD environment.

The following table provides configuration recommendations for these virtual machines in Azure. Use these as a starting point for designing your own environment—even for a dedicated domain where your Azure environment doesn’t communicate with your on-premises environment.

 

Item Configuration

Virtual machine size in Azure

A1 or A2 size in the Standard tier

Operating system

Windows Server 2012 R2

Active Directory role

AD DS domain controller designated as a global catalog server. This configuration reduces egress traffic across the cross-premises connection.

In a multidomain environment with high rates of change (this is not common), configure domain controllers on premises not to sync with the global catalog servers in Azure, to reduce replication traffic.

DNS role

Install and configure the DNS Server service on the domain controllers.

Data disks

Place the Active Directory database, logs, and SYSVOL on additional Azure data disks. Do not place these on the operating system disk or the temporary disks provided by Azure.

IP addresses

Use static IP addresses and configure the virtual network to assign these addresses to the virtual machines in the virtual network after the domain controllers have been configured.

ImportantImportant:
Before you deploy Active Directory in Azure, read Guidelines for Deploying Windows Server Active Directory on Azure Virtual Machines. These help you determine if a different architecture or different configuration settings are needed for your solution.

Place the virtual machines of the SharePoint farm in tiers on the appropriate subnets.

Figure 4: Placement of SharePoint virtual machines

Database servers and SharePoint server roles added to the Azure virtual network within the SharePoint Farm subnet

This diagram builds on the previous diagrams by adding the SharePoint farm server roles in their respective tiers.

  • Two database virtual machines running SQL Server create the database tier.

  • Two virtual machines running SharePoint Server 2013 for each of the following tiers: front end servers, distributed cache servers, and back end servers.

A fault domain is a grouping of hardware in which role instances run. Virtual machines within the same fault domain can be updated by the Azure infrastructure at the same time. Or, they can fail at the same time because they share the same rack. To avoid the risk of having two virtual machines on the same fault domain, you can configure your virtual machines as an availability set, which ensures that each virtual machine is in a different fault domain. If three virtual machines are configured as an availability set, Azure guarantees that no more than two of the virtual machines are located in the same fault domain.

When you design the Azure architecture for a SharePoint farm, configure identical server roles to be part of an availability set. This ensures that your virtual machines are spread across multiple fault domains.

Figure 5: Use Azure Availability Sets to provide high availability for the SharePoint farm tiers

Configuration of availability sets in the Azure infrastructure for a SharePoint 2013 solution

This diagram calls out the configuration of availability sets within the Azure infrastructure. Each of the following roles share a separate availability set:

  • Active Directory and DNS

  • Database

  • Back end

  • Distribute cache

  • Front end

The SharePoint farm might need to be fine tuned in the Azure platform. To ensure high availability of all components, ensure that the server roles are all configured identically.

Here is an example that shows a standard Internet Sites architecture that meets specific capacity and performance goals. This example is featured in the following architecture model: Internet Sites Search Architectures for SharePoint Server 2013.

Figure 6: Planning example for capacity and performance goals in a three-tier farm

Standard SharePoint 2013 Internet Sites architecture with component allocations that meet specific capacity and performance goals

In this diagram:

  • A three-tier farm is represented: web servers, application servers, and database servers.

  • The three web servers are configured identically with multiple components.

  • The two database servers are configured identically.

  • The three application servers are not configured identically. These server roles require fine tuning for availability sets in Azure.

Let’s look closer at the application server tier.

Figure 7: Application server tier before fine tuning

Example SharePoint Server 2013 application server tier before tuning for Microsoft Azure availability sets

In this diagram:

  • Three servers are included in the application tier.

  • The first server includes four components.

  • The second server includes three components.

  • The third server includes two components.

You determine the number of components by the performance and capacity targets for the farm. To adapt this architecture for Azure, we’ll replicate the four components across all three servers. This increases the number of components beyond what is necessary for performance and capacity. The tradeoff is that this design ensures high availability of all four components in the Azure platform when these three virtual machines are assigned to an availability set.

Figure 8: Application server tier after fine tuning

Example SharePoint Server 2013 application server tier after tuning for Microsoft Azure availability sets

This diagram shows all three application servers configured identically with the same four components.

When we add availability sets to the tiers of the SharePoint farm, the implementation is complete.

Figure 9: The completed SharePoint farm in Azure infrastructure services

Example SharePoint 2013 farm in Azure infrastructure services with virtual network, cross-premises connectivity, subnets, VMs, and availability sets

This diagram shows the SharePoint farm implemented in Azure infrastructure services, with availability sets to provide fault domains for the servers in each tier.

Join the discussion

Contact us Description

What cloud adoption content do you need?

We are creating content for cloud adoption that spans multiple Microsoft cloud platforms and services. Let us know what you think about our cloud adoption content, or ask for specific content by sending email to cloudadopt@microsoft.com.

Join the cloud adoption discussion

If you are passionate about cloud-based solutions, consider joining the Cloud Adoption Advisory Board (CAAB) to connect with a larger, vibrant community of Microsoft content developers, industry professionals, and customers from around the globe. To join, add yourself as a member of the Cloud Adoption Advisory Board group of the Office 365 Yammer network and send us a quick email at CAAB@microsoft.com. Anyone can read community-related content on the CAAB blog. However, CAAB members get access to private webinars that describe new cloud adoption resources and solutions.

Get the art you see here

If you want an editable copy of the art you see in this article, we’ll be glad to send it to you. Email your request, including the URL and title of the art, to cloudadopt@microsoft.com.

Show: