AZURE CLOUD ARCHITECTURE
SCENARIOS & DOCUMENTATION

Complete Guide to Azure Compute and Networking Services
Based on AZ-900 Curriculum

Author: Azure Solutions Architect

Prepared For: Digital Transformation Projects

Version: 1.0

March 14, 2026

Table of Contents

Scenario 1: The Architectural Firm - "Digital Designs"

Digital Designs: Traditional "Lift and Shift" Migration

Industry: Architecture & Engineering | Employees: 200

πŸ“‹ Business Challenge

A mid-sized architectural firm faces infrastructure failures with on-premises servers. Issues include overheating, slow 3D rendering, poor remote access, and no disaster recovery plan.

🎯 Solution Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ DIGITAL DESIGNS AZURE ARCHITECTURE β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ [Internet] ────┬─── [VPN Gateway] ────┐ β”‚ β”‚ [Office Firewall] [Remote Workers] β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ DigitalDesigns-VNet (10.0.0.0/16) β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ GatewaySubnet β”‚ β”‚ β”‚ β”‚ [VPN Gateway] β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β”‚ β”‚ Web-Subnet β”‚ β”‚ App-Subnet β”‚ β”‚Data-Subnetβ”‚ β”‚ β”‚ β”‚ 10.0.1.0/24 β”‚ β”‚ 10.0.2.0/24 β”‚ β”‚10.0.3.0/24β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ [NSG Rules] β”‚ β”‚ [NSG Rules] β”‚ β”‚ [NSG Rules] β”‚ β”‚ β”‚ Allow HTTP β”‚ β”‚ Allow from β”‚ β”‚ Deny All β”‚ β”‚ β”‚ HTTPS only β”‚ β”‚ Web-Subnet β”‚ β”‚ Except Appβ”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜ β””β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”˜ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ [Web VM] [App VMs]─────[Load Balancer] β”‚ β”‚ (2x B2s) β”‚ β”‚ β”‚ [Public IP]β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β”‚ β”‚ β”‚ β”‚ β”‚ [SQL Database] β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ› οΈ Azure Resources Deployed

Resource Type Resource Name Configuration Purpose
Networking DigitalDesigns-VNet Address Space: 10.0.0.0/16 Isolated network for all resources
Networking Web-Subnet 10.0.1.0/24 Public-facing web servers
Networking App-Subnet 10.0.2.0/24 Application tier VMs
Networking Data-Subnet 10.0.3.0/24 Database servers
Compute App-VM-01, App-VM-02 Standard_B2s (2 vCPUs, 4GB RAM) Project management and wiki servers
Compute Render-VM-Pool Standard_F72s_v2 (Compute Optimized) 3D rendering workloads
Networking NSG-Web Allow HTTP/HTTPS from Internet Web tier firewall
Networking NSG-Data Allow only from App-Subnet Database protection
Networking App-LoadBalancer Standard SKU, Internal Distribute traffic across App VMs
Networking Corporate-VPN-Gateway Site-to-Site + Point-to-Site Secure remote connectivity

πŸ“Š Resource Summary

Virtual Network Subnets Virtual Machines (B-series) Virtual Machines (F-series) Network Security Groups Load Balancer VPN Gateway

Scenario 2: The E-Learning Startup - "EduStream"

EduStream: Modern Serverless Platform

Industry: E-Learning | Focus: Global Scale, Minimal Cost

πŸ“‹ Business Challenge

A startup needs to launch a global online course platform with unpredictable traffic patterns (spikes during live classes). They want to minimize costs and focus on code, not server management.

🎯 Solution Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ EDUSTREAM SERVERLESS ARCHITECTURE β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ [Global Users] ────→ [Azure Front Door] ────────────────────┐ (Global Load Balancer) β”‚ β”‚ β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ β–Ό β–Ό β”‚ [Container Instances] [Azure Functions] β”‚ (Course Application) (Enrollment, β”‚ Emails, Quizzes) β”‚ β”‚ β”‚ β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ β”‚ β–Ό β–Ό [Azure SQL Database] [Storage Account] (Static Website + Course Videos)

πŸ› οΈ Azure Resources Deployed

Resource Type Resource Name Configuration Purpose
Compute edu-app-container ACI, Linux Container Course application hosting
Compute edu-functions-app Consumption Plan, JavaScript Serverless backend processing
Networking edu-frontdoor Global SKU, WAF Policy Global load balancing & security
Storage edustreamstorage Static website enabled, Hot tier Frontend website files
Networking edu-vnet-integration VNet integrated with Functions Secure backend connectivity

πŸ“Š Resource Summary

Container Instances Azure Functions Azure Front Door Storage Account Virtual Network Integration

Scenario 3: The Financial Services Firm - "SecureSave"

SecureSave: Regulated, Stateful Application Migration

Industry: Financial Services | Compliance: PCI-DSS, HIPAA

πŸ“‹ Business Challenge

A financial firm needs to migrate a sensitive, stateful application to Azure with strict compliance requirements. No code changes allowed, and zero downtime is mandatory.

πŸ› οΈ Azure Resources Deployed

Resource Type Resource Name Configuration Purpose
Compute secure-app-vm-1,2,3 Standard_D4s_v3, Availability Set Stateful application hosting
Compute secure-as 3 Fault Domains, 5 Update Domains High availability across racks
Networking secure-lb Standard SKU, Session Persistence Load balancer with sticky sessions
Networking secure-nsg-app Allow only corporate IPs Restrict access to known sources
Networking secure-storage-endpoint Service Endpoint enabled Private connection to Storage

πŸ“Š Resource Summary

Virtual Machines (D-series) Availability Set Load Balancer with Session Persistence Network Security Groups Service Endpoints

Scenario 4: The Media Company - "ViralVids"

ViralVids: Global Media Streaming Platform

Industry: Media & Entertainment | Focus: Content Delivery

πŸ“‹ Business Challenge

A media company needs to host massive video archives and stream content to millions of users worldwide, requiring inexpensive storage and fast global delivery.

🎯 Solution Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ VIRALVIDS CONTENT DELIVERY β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ [User in Paris] ──→ [CDN POP Europe] ──┐ [User in Tokyo] ──→ [CDN POP Asia] ─── [User in NY] ──→ [CDN POP US] ──┼──→ [Azure CDN] β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β” β–Ό β–Ό [Blob Storage - Videos] [Static Website] (Origin) ($web)

πŸ› οΈ Azure Resources Deployed

Resource Type Resource Name Configuration Purpose
Storage viralvidsstorage BlobStorage, Hot tier, Static website Video archive and frontend hosting
Networking viralvids-cdn Verizon Premium, Global Content caching and delivery
Compute viral-api-functions Premium Plan, JavaScript Backend API for dynamic features

πŸ“Š Resource Summary

Blob Storage Static Website Hosting Content Delivery Network (CDN) Azure Functions

Scenario 5: The Multinational Corporation - "GlobalCorp"

GlobalCorp: Enterprise Hybrid Cloud

Industry: Multinational | Offices: NY, London, Singapore

πŸ“‹ Business Challenge

A global corporation needs to connect offices worldwide to Azure using private, high-speed connections, treating Azure as an extension of their corporate network.

🎯 Solution Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β”‚ GLOBALCORP HYBRID NETWORK β”‚ β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜ [NY Office] ───┐ [London Office]─┼──→ [ExpressRoute] ───┐ [Singapore] β”€β”€β”€β”˜ β”‚ β–Ό [Azure Firewall] β”‚ β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β” β–Ό β–Ό [Hub VNet - East US] ─────VNet Peering───── [Spoke VNet - EU West] (10.0.0.0/16) (10.1.0.0/16)

πŸ› οΈ Azure Resources Deployed

Resource Type Resource Name Configuration Purpose
Networking GlobalCorp-Hub-VNet 10.0.0.0/16 Central hub network
Networking GlobalCorp-Spoke-EU 10.1.0.0/16 European workload network
Networking GlobalCorp-ExpressRoute 10 Gbps, Premium SKU Private connection to on-premises
Networking Hub-to-EU-Peering VNet Peering, Gateway Transit Connect hub and spoke networks
Networking GlobalCorp-Firewall Standard SKU, Forced Tunneling Central traffic inspection

πŸ“Š Resource Summary

Virtual Network ExpressRoute VNet Peering Azure Firewall

How to Document Azure Resources

πŸ“ The Importance of Cloud Documentation

Proper documentation is critical for operational success, troubleshooting, compliance, and knowledge transfer. Below is a comprehensive guide on documenting Azure resources effectively.

1. Resource Naming Conventions

Resource Type Naming Pattern Example Max Length
Resource Group rg-{app}-{env}-{region} rg-edu-prod-eastus 90
Virtual Network vnet-{app}-{env}-{region} vnet-digitaldesigns-prod-eastus 64
Subnet snet-{tier}-{env} snet-web-prod 80
Virtual Machine vm{app}{tier}{number} vmeduweb01 15
Storage Account {app}{env}{number} edustreamprod001 24 (lowercase only)
Load Balancer lb-{app}-{tier}-{env} lb-edu-web-prod 80
Network Security Group nsg-{tier}-{env} nsg-web-prod 80

2. Required Documentation Sections

πŸ“‹ Resource Documentation Template

# RESOURCE DOCUMENTATION TEMPLATE

## 1. GENERAL INFORMATION
- **Resource Name:** 
- **Resource Type:** 
- **Resource Group:** 
- **Location:** 
- **Creation Date:** 
- **Owner/Team:** 
- **Cost Center:** 

## 2. CONFIGURATION DETAILS
- **SKU/Tier:** 
- **Size/Capacity:** 
- **OS Version (if applicable):** 
- **Network Configuration:** 
- **Security Settings:** 

## 3. TAGS
- Environment: (Production/Development/Test)
- Application: 
- Criticality: (High/Medium/Low)
- Compliance: (PCI/HIPAA/SOX/None)

## 4. DEPENDENCIES
- Depends On: 
- Dependent Resources: 

## 5. ACCESS CONTROL (IAM)
- Owners: 
- Contributors: 
- Readers: 
- Special Roles: 

## 6. BACKUP & DISASTER RECOVERY
- Backup Policy: 
- Retention Period: 
- Recovery Services Vault: 
- RPO/RTO: 

## 7. MONITORING & ALERTING
- Metrics Tracked: 
- Alert Rules: 
- Action Groups: 
- Log Analytics Workspace: 

## 8. COST INFORMATION
- Estimated Monthly Cost: 
- Billing Code: 
- Optimization Opportunities: 

## 9. NOTES
- Special Considerations: 
- Known Issues: 
- Maintenance Windows: 
                

3. IP Address Planning Documentation

VNet/Subnet Address Space Usable IPs Purpose Resources Deployed
Hub-VNet 10.0.0.0/16 65,536 Central Hub Firewall, Gateway
GatewaySubnet 10.0.0.0/27 32 VPN/ExpressRoute Gateway VPN Gateway
AzureFirewallSubnet 10.0.1.0/26 64 Azure Firewall Firewall
Web-Subnet 10.0.2.0/24 256 Web Tier Web VMs, Load Balancer

4. Network Security Group (NSG) Documentation

NSG Name Priority Name Source Destination Protocol Action Justification
nsg-web-prod 100 Allow_HTTP_Internet Internet 10.0.2.0/24 TCP 80 Allow Allow public web traffic
nsg-web-prod 110 Allow_HTTPS_Internet Internet 10.0.2.0/24 TCP 443 Allow Allow secure web traffic
nsg-web-prod 4000 Deny_All_Other * * * Deny Default deny all other traffic

Implementation Checklists

βœ… Virtual Network Deployment Checklist

  • Define address space that doesn't overlap with on-premises networks
  • Create subnets with appropriate sizes (consider future growth)
  • Reserve GatewaySubnet for VPN/ExpressRoute gateways
  • Reserve AzureFirewallSubnet for Azure Firewall
  • Enable DDoS Protection Standard for production VNets
  • Configure DNS settings (custom or Azure-provided)
  • Document all IP address ranges
  • Plan for VNet peering requirements
  • Consider service endpoints for PaaS services
  • Apply tags for cost tracking

βœ… Virtual Machine Deployment Checklist

  • Select appropriate VM size based on workload requirements
  • Choose correct storage type (Premium SSD, Standard SSD, or HDD)
  • Place VM in correct Availability Set or Zone
  • Apply Network Security Group to VM NIC
  • Enable boot diagnostics
  • Configure auto-shutdown for development VMs
  • Implement Azure Backup
  • Enable Azure Monitor for VMs
  • Apply managed identity for secure access
  • Tag VM for cost tracking and management

βœ… Load Balancer Deployment Checklist

  • Choose correct SKU (Basic vs Standard)
  • Select public vs internal load balancer
  • Configure backend pool with VMs or VMSS
  • Define health probes (HTTP, TCP, or HTTPS)
  • Configure load balancing rules
  • Set up session persistence if needed
  • Configure outbound rules for public load balancers
  • Enable diagnostic logs
  • Integrate with Azure Monitor
  • Document frontend IP configurations

βœ… Network Security Group (NSG) Checklist

  • Apply NSGs at subnet level for broad protection
  • Apply NSGs at NIC level for fine-grained control
  • Follow least privilege principle (deny all by default)
  • Use service tags for Azure services
  • Document all rules with descriptions
  • Review NSG flow logs regularly
  • Test rules with NSG flow logs
  • Implement just-in-time VM access for management
  • Use application security groups for logical grouping
  • Regularly audit and remove unused rules

Best Practices & Guidelines

🎯 Tagging Strategy

Tag Name Required Example Values Purpose
Environment Yes Prod, Dev, Test, QA, Staging Identify deployment environment
Application Yes DigitalDesigns, EduStream, SecureSave Group resources by application
CostCenter Yes CC-12345, Marketing-IT, R&D Chargeback and cost allocation
Owner Yes team-web, john.doe@company.com Point of contact for resource
Criticality Yes High, Medium, Low Determine support and backup levels
Compliance Conditional PCI, HIPAA, SOX, GDPR Track compliance requirements
MaintenanceWindow No Sunday-2AM-EST, Weekends Schedule maintenance activities

⚠️ Common Pitfalls to Avoid

  • IP Address Overlap: Never use overlapping IP ranges with on-premises networks for hybrid connections
  • Missing NSGs: Always apply NSGs; don't leave subnets unprotected
  • Default Passwords: Never use default credentials on VMs
  • Public Exposure: Avoid exposing management ports (RDP/SSH) to the internet
  • No Backups: Always configure backups for production data
  • Single Point of Failure: Use availability sets/zones for critical VMs
  • No Monitoring: Always enable Azure Monitor and alerts
  • Orphaned Resources: Clean up unused resources to avoid costs

πŸ’‘ Cost Optimization Tips

  • Right-size VMs: Use Azure Advisor recommendations to resize underutilized VMs
  • Reserved Instances: Purchase 1 or 3-year reservations for stable workloads
  • Spot Instances: Use for non-critical, interruptible workloads
  • Auto-shutdown: Configure auto-shutdown for dev/test VMs
  • Delete unused resources: Regularly audit and delete unattached disks, unused load balancers, etc.
  • Choose right storage tier: Use cool/archive tiers for infrequently accessed data
  • Monitor with Cost Management: Set budgets and alerts in Azure Cost Management

AZ-900 Compute & Networking Resource Glossary

Resource Category Description Use Cases
Virtual Machines Compute (IaaS) Software emulation of physical computers, including OS and applications Lift-and-shift migrations, custom software, full control requirements
VM Scale Sets Compute (IaaS) Groups of identical, load-balanced VMs that auto-scale Stateless web tiers, auto-scaling applications
Container Instances Compute (PaaS) Simple, fast way to run containers without managing servers Simple container deployments, development/testing
Azure Functions Compute (Serverless) Event-driven, serverless compute for small code pieces API backends, data processing, integrations, scheduled tasks
Virtual Network Networking Private network in Azure for resources to communicate Foundation for all Azure networking
Subnets Networking Segmentation of VNet for security and organization Separate web, app, and data tiers
Network Security Groups Networking Software firewall filtering traffic to/from resources Securing subnets and NICs
Load Balancer Networking Distributes traffic across resources for HA and performance Load balancing web servers, applications
VPN Gateway Networking Connects on-premises networks to Azure over the internet Hybrid cloud, remote access
ExpressRoute Networking Private, dedicated connection to Azure (not over internet) Enterprise hybrid cloud, high-bandwidth needs, compliance
Azure DNS Networking Domain name system hosting and resolution Custom domain names for Azure resources
Azure Firewall Networking Managed, cloud-based network security service Central network security, traffic inspection
Front Door Networking Global load balancer and web application firewall Global applications, acceleration, WAF protection
CDN Networking Content Delivery Network for caching content globally Media streaming, static content delivery
VNet Peering Networking Connects VNets privately over Microsoft backbone Hub-and-spoke topologies, multi-region architectures