Install Astro Hybrid on Azure
This document applies only to Astro Hybrid. To see whether you're an Astro Hybrid user, click Organization Settings. Your Astro product type is listed under Product Type on the General page.
To create a cluster on Astro Hosted, see Create a dedicated cluster.
To install Astro Hybrid on Azure, Astronomer will create an Astro cluster in a dedicated Azure account that's hosted and owned by your organization. This ensures that all data remains within your network and allows your organization to manage infrastructure billing.
To complete the installation, you'll:
- Create an Astronomer account.
- Create a new Azure subscription with the required Azure resources.
- Add the IAM service principal to Microsoft Entra ID that'll be used by Astro.
Astronomer support will create infrastructure within your Azure account to host the resources and Apache Airflow components necessary to deploy DAGs and execute tasks. If you need more than one Astro cluster, contact Astronomer support.
Prerequisites
-
A new Azure subscription. For security reasons, Azure subscriptions with existing infrastructure aren't supported. Also, no Azure policy should be applicable to the subscription's Azure management group.
-
A Microsoft Entra ID user with the following role assignments:
-
Application Administrator
. See Understand roles in Microsoft Entra ID. -
Owner
with permission to create and manage subscription resources of all types. See Azure built-in roles.
This Microsoft Entra ID user is required for data plane activation. You can remove the user or modify their role assignments after the cluster is created.
-
-
A CIDR block with a range of
/19
. If you don't have any preferred CIDR block, Astro will provision a VPC using a default of172.20.0.0/19
. Astro uses this VPC for four subnets, one each for database, pods, nodes, and private endpoints. See Azure resource reference for details. -
A minimum quota of 48 Standard Ddv5-series vCPUs in the selected region. You can use Dv5-series vCPUs, but you'll need 96 total vCPUs composed of 48 Ddv5-series vCPUs and 48 Dv5-series vCPUs. To adjust your quota limits up or down, see Increase VM-family vCPU quotas.
Confirm that the VM types are available in all Availability Zones in the selected region. For example, you can run the following Azure Az PowerShell command to confirm that the Standard_D4d_v5 VMs (the default for Astro) are available in the
CentralUS
region:az vm list-skus --location centralus --size Standard_D --all --output table | grep -e 'Restrictions\|Standard_D4d_v5'
If the VM types are unavailable, the output returns
Restrictions
. Contact Microsoft Support to have these VMs enabled.ResourceType Locations Name Zones Restrictions
virtualMachines centralus Standard_D4d_v5 1,2,3 NotAvailableForSubscription, type: Zone, locations: centralus, zones: 1 -
A subscription to the Astro status page. This ensures that you're alerted when an incident occurs or when scheduled maintenance is planned.
-
The following domains added to your organization's allowlist for any user and CI/CD environments:
https://cloud.astronomer.io/
https://api.astronomer.io/
https://images.astronomer.cloud/
https://auth.astronomer.io/
https://updates.astronomer.io/
https://install.astronomer.io/
https://<your-org>.astronomer.run/
https://astro-<your-org>.datakin.com/
VNet peering prerequisites (Optional)
To give Astro access to any Azure resources on a private network, you must create a VNet peering connection between Astronomer's VNet and the VNets for your broader network.
To create a VNet peering connection, contact Astronomer Support and provide the following details:
- Azure TenantID of the target VNet
- Subscription ID of the target VNet
- Region of the target VNet
- VNet ID of the target VNet
- ResourceGroup of the target VNet
- A CIDR block (RFC 1918 IP Space) no smaller than a
/19
range. This CIDR block can't overlap with any Azure VNet(s) that you will peer with later. The default CIDR range is172.20.0.0/19
. - ResourceID, for example:
/subscriptions/<Subscription Id>/resourceGroups/myResourceGroupA/providers/Microsoft.Network/virtualNetworks/myVnetA
. You can find the resource ID in the Azure portal by following step 7 in Create peering - Azure portal.
Additionally, ensure that your Microsoft Entra ID user has at least one of the following role assignments:
- Network Contributor: This permission is required for any VNet deployed through Resource Manager.
- Classic Network Contributor: This permission is required for any VNet deployed through the classic deployment model.
From here, Astronomer support will set up the VNet connection to Astro.
Access Astro
-
Go to https://cloud.astronomer.io/ and create an account, or enter your email address, and then click Continue.
-
Select one of the following options to access the Astro UI:
- Enter your password and click Continue.
- To authenticate with an identity provider (IdP), click Continue with SSO, enter your username and password, and then click Sign In.
- To authenticate with your GitHub account, click Continue with GitHub, enter your username or email address, enter your password, and then click Sign in.
- To authenticate with your Google account, click Continue with Google, choose an account, enter your username and password, and then click Sign In.
If you're the first person in an Organization to authenticate, you're added as a Workspace Owner to a new Workspace named after your Organization. You can add other team members to the Workspace without the assistance of Astronomer support. See Manage Workspace users.
To integrate an identity provider (IdP) with Astro, see Set up an identity provider.
Prepare for data plane activation
The data plane is a collection of Astro infrastructure components that run in your cloud and are managed by Astronomer. This includes a central database, storage for Airflow tasks logs, and the resources required for task execution.
- Azure CLI on Bash
- PowerShell
-
Run the following command to log in to your Azure account:
az login
-
Run the following command to select your Azure subscription:
az account set -s <subscription-id>
-
Run the following command to add the Astronomer Service Principal to Microsoft Entra ID:
az ad sp create --id a67e6057-7138-4f78-bbaf-fd9db7b8aab0
-
Run the following commands to get details about the Azure subscription and create a new role assignment for the Astronomer service principal:
subid=$(az account show --query id --output tsv)
az role assignment create --assignee a67e6057-7138-4f78-bbaf-fd9db7b8aab0 --role Owner --scope /subscriptions/$subid -
Run the following commands to register the
EncryptionAtHost
feature:az feature register --namespace "Microsoft.Compute" --name "EncryptionAtHost"
while [ $(az feature list --query "[?contains(name, 'Microsoft.Compute/EncryptionAtHost')].{State:properties.state}" -o tsv) != "Registered" ]
do
echo "Still waiting for Feature Registration (EncryptionAtHost) to complete, this can take up to 15 minutes"
sleep 60
done
echo "Registration Complete"
az provider register --namespace Microsoft.Compute
-
Run the following command to log in to your Azure account:
Connect-AzAccount
-
Run the following command to select your Azure subscription:
Set-AzContext -SubscriptionId <subscription-id>
-
Run the following command to create the Astronomer service principal:
$sp = New-AzADServicePrincipal -AppId a67e6057-7138-4f78-bbaf-fd9db7b8aab0
-
Run the following commands to get details about the Azure subscription and create a new role assignment for the Astronomer service principal:
$sp = Get-AzADServicePrincipal -ApplicationId a67e6057-7138-4f78-bbaf-fd9db7b8aab0
$subid = (Get-AzContext).Subscription.id
$ra = New-AzRoleAssignment -ObjectId $sp.id -RoleDefinitionName Owner -Scope "/subscriptions/$subid"
-
Run the following commands to register the
EncryptionAtHost
feature:Register-AzProviderFeature -FeatureName EncryptionAtHost -ProviderNamespace Microsoft.Compute
while ( (Get-AzProviderFeature -FeatureName EncryptionAtHost -ProviderNamespace Microsoft.Compute).RegistrationState -ne "Registered") {echo "Still waiting for Feature Registration (EncryptionAtHost) to complete, this can take up to 15 minutes"; sleep 60} echo "Registration Complete"Register-AzResourceProvider -ProviderNamespace Microsoft.compute
Provide setup information to Astronomer support
After you've prepared your environment for data plane activation, provide Astronomer support with the following information:
- Your preferred Astro cluster name.
- Your Azure TenantID and SubscriptionID.
- Your preferred region. The default is
centralus
. - Optional. Your preferred node instance type. The default is Standard_D4d_v5.
- Optional. Your preferred Postgres Flexible Server instance type. The default is Standard_D4ds_v4.
- Optional. Your preferred maximum node count. The default is 20.
- Optional. Your custom CIDR ranges for Astronomer service connections. The default is
172.20.0.0/19
.
See Azure resource reference for all supported cluster configurations.
Astronomer support creates the cluster
After you provide Astronomer support with the setup information for your cluster, Astronomer support creates the cluster on Azure. Wait for confirmation from Astronomer support that the cluster has been created before creating a Deployment.
Create a Deployment and confirm the install
When Astronomer support confirms that your Astro cluster has been created, you can confirm it in the Astro UI by clicking on the Astronomer icon in the top left corner, then click on Clusters to see your cluster. You can then create a Deployment and start to develop and deploy your DAGs.