View Categories

EA 2.0 on Azure (Reference Deployment)

3 min read

Resource Groups • Network Zones • Identity • Security #


1 Purpose #

EA 2.0 is cloud-agnostic in theory but Azure-native in practice.
Deploying on Azure provides first-class services for identity, storage, compute, integration, and analytics — everything needed for an intelligent, event-driven architecture platform hosted inside a sovereign boundary.

The reference deployment defines a repeatable blueprint for secure, multi-tenant EA 2.0 environments.


2 Architecture Overview #

[User / Teams / Power BI]
        │
        ▼
[Natural-Language Query UI (React Web App)]
        │
        ▼
[Reasoning API – Azure Functions / App Service]
        │
        ▼
[Knowledge Graph – Azure Cosmos DB (Gremlin)]
        │
        ▼
[Data Lake / Blob Storage + Synapse / ADF Pipelines]
        │
        ▼
[Integration Plane – Event Hub / Logic Apps / Service Bus]
        │
        ▼
[Outbound Connectors – ServiceNow, Policy Gov, APIs]

All components reside within controlled resource groups segmented by function.


3 Resource Group Layout #

Resource GroupPurposeKey Resources
rg-ea2-coreCore runtime servicesApp Service Plan, Functions, Cosmos DB
rg-ea2-dataStorage & ETLBlob Storage, Synapse, ADF
rg-ea2-connectorsIntegration planeLogic Apps, Event Hub, API Mgmt
rg-ea2-securityIdentity & secretsKey Vault, Managed Identity
rg-ea2-monitoringObservabilityLog Analytics, Monitor, Sentinel
rg-ea2-networkNetworking & zonesVNet, Subnets, NSGs, Private Endpoints

4 Network Zones & Topology #

EA 2.0 operates within three network zones for defense-in-depth:

ZoneContainsConnectivity
Front ZoneReact UI, App Gateway, CDNPublic HTTPS only
Middle ZoneReasoning API, Functions, Event HubPrivate Endpoints + VNet Integration
Data ZoneCosmos DB, Blob, SynapseNo internet egress
  • Use VNet peering for cross-zone traffic.
  • Enforce network rules with NSGs and private DNS.
  • Enable Azure Firewall for egress inspection.

5 Identity & Access Control #

EA 2.0 relies on Microsoft Entra ID (formerly Azure AD) for all auth.

RolePurposeTypical Access
ViewerRead NLQ and DashboardsPower BI, Graph Read only
AnalystCreate queries, validate DQFunctions, Logic Apps
AdminConfigure connectorsKey Vault, ADF Pipelines
Service PrincipalAutomation agentManaged Identity

Authentication → OpenID Connect (JWT).
Authorization → Role-based via Entra groups.


6 Security Foundations #

Control AreaAzure FeaturePurpose
Secret ManagementKey Vault + RBACCentralized API keys
EncryptionManaged Keys (KMS)At rest and in transit
Identity IsolationEntra Conditional AccessRestrict external sign-ins
Audit LoggingAzure Monitor / SentinelEnd-to-end traceability
Data ProtectionPurview / Sensitivity LabelsPolicy driven governance

Security baseline aligns to NIST 800-53 and CIS Azure Benchmarks.


7 Deployment Options #

ModeUse CaseProvisioning Method
Pilot (MVP)Single tenant sandboxARM Template / Bicep
EnterpriseMulti-region HA + Dev/Test zonesTerraform / Azure Landing Zone
Sovereign CloudGovernment / regulatory tenantAzure Gov / Stack Hub Blueprint

8 Reference Bicep Snippet #

resource cosmos 'Microsoft.DocumentDB/databaseAccounts@2023-04-15' = {
  name: 'ea2-cosmos'
  location: resourceGroup().location
  kind: 'GlobalDocumentDB'
  properties: {
    databaseAccountOfferType: 'Standard'
    consistencyPolicy: {
      defaultConsistencyLevel: 'Session'
    }
    locations: [
      { locationName: resourceGroup().location, failoverPriority: 0 }
    ]
    isVirtualNetworkFilterEnabled: true
  }
}

Repeatable for Functions, Storage, and Monitor.


9 Monitoring and Observability #

EA 2.0 pipes telemetry into Log Analytics workspace:

  • Function invocation latency
  • Cosmos RU consumption
  • Connector success rate
  • Audit event volume
  • Error traces by policy

Dashboards in Power BI and Azure Monitor give ops teams real-time health.


10 Compliance and Governance #

  • Apply Azure Policy for location restrictions, tagging, and resource locks.
  • Enable Defender for Cloud for threat protection.
  • Log all admin actions in Activity Log + Sentinel SIEM.
  • Integrate EA 2.0 graph with Purview for asset discovery and DQ alignment.

11 Cost Optimization Guidelines #

ComponentCost DriverOptimization
Cosmos DBRequest Units (RUs)Autoscale + partition strategy
FunctionsExecution timeDurable Functions / batch jobs
ADF / SynapsePipeline runsEvent-triggered runs
MonitorLog retention30-day default + export to Blob

12 Disaster Recovery Strategy #

  • Cosmos DB multi-region replication.
  • Storage geo-redundancy (GRS).
  • Function App slot swap rollback.
  • Configuration backups in Git and Key Vault export.

RPO ≤ 1 hour, RTO ≤ 2 hours.


13 Sample Topology Diagram #

 ┌────────────────────────────┐
 │      Front Zone (VNet1)    │
 │  React UI + App Gateway    │
 └───────────┬────────────────┘
             │ Private Link
 ┌───────────▼────────────────┐
 │   Middle Zone (VNet2)      │
 │  Reasoning API + LogicApps │
 └───────────┬────────────────┘
             │ Private Endpoint
 ┌───────────▼────────────────┐
 │      Data Zone (VNet3)     │
 │   Cosmos DB + Storage      │
 └────────────────────────────┘

14 Benefits #

✅ Completely tenant-sovereign deployment.
✅ Modular resource groups simplify management.
✅ Meets ISO 27001 / GDPR controls out of the box.
✅ Scales from pilot to enterprise without redesign.
✅ Supports federation with Azure Gov and SaaS systems.


15 Takeaway #

Infrastructure is the trust fabric of EA 2.0.
Deploying on Azure turns the blueprint into a living, secure, and compliant system — ready to host real-time governance and AI-driven decisioning at scale.

Powered by BetterDocs

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to Top