- Notifications
You must be signed in to change notification settings - Fork225
AVD Accelerator deployment automation to simplify the setup of AVD (Azure Virtual Desktop) based on best practices
License
Azure/avdaccelerator
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
LZA Baseline |Browfield Scenarios |Custom Image Build |Architectural Diagram
Enterprise-scale is an architectural approach and a reference implementation that enables effective construction and operation of landing zones on Azure, at scale. This approach aligns with the Azure roadmap and the Cloud Adoption Framework for Azure.
Azure Virtual Desktop Landing Zone Accelerator (LZA) represents the strategic design path and target technical state for Azure Virtual Desktop deployment. This solution provides an architectural approach and reference implementation to prepare landing zone subscriptions for a scalable Azure Virtual Desktop deployment. For the architectural guidance, check outEnterprise-scale for Azure Virtual Desktop in Microsoft Docs.
The Azure Virtual Desktop Landing Zone Accelerator (LZA) only addresses what gets deployed in the specific Azure Virtual Desktop landing zone subscriptions, highlighted by the red boxes in thearchitectural diagram below. It is assumed that an appropriate platform foundation is already setup which may or may not be the officialALZ platform foundation. This means that policies and governance should already be in place or should be set up after this implementation and are not a part of the scope this program. The policies applied to management groups in the hierarchy above the subscription will trickle down to the Enterprise-scale for Azure Virtual Desktop landing zone subscriptions.
This repository will contain various customer scenarios that can help accelerate the development and deployment of Azure Virtual Desktop that conforms withEnterprise-Scale for Azure Virtual Desktop best practices and guidelines. Each scenario aims to represent common customer experiences with the goal of accelerating the process of developing and deploying conforming Azure Virtual Desktop using IaaC. Each scenario will eventually have an ARM, Bicep, PowerShell and CLI version to choose from.As of today, we have a first reference implementation scenario that is one of the most common ones used by Enterprise customers and partners and it can be used to deploy an Azure Virtual Desktop workload. We will continue to add new scenarios in future updates.
Getting Started deploying Azure Virtual Desktop (AVD) resources and dependent services for establishing the baseline
- Azure Virtual Desktop resources: workspace, two (2) application groups, scaling plan and a host pool
- [Optional]: new virtual network (VNet) with NSGs, ASG and route tables
- Azure Files with Integration to the identity service
- Key vault
- Session Hosts
Deployment Type | Link |
---|---|
Azure portal UI | |
Command line (Bicep/ARM) | ![]() |
Terraform | ![]() |
If you are having deployment challenges, refer to theLZA baseline troubleshooting guide for guidance. For additional support please submit a GitHub issue.
The brownfield, add-ons and tools section, contains templates to deploy additional features for Azure Virtual Desktop when infrastructure already exists. These templates can be used individually as required. Here is the list of deployment options available:
- AVD Client (Remote Desktop) Kiosk
- Scaling Tool
- App Attach Tools VM
- Auto Increase Premium File Share Quota
- AVD Session Host Replacer
- Custom Image Templates Prerequisites
- Migrate monitoring agent from MMA to AMA
Getting Started deploying a custom image based on the latest version of the Azure marketplace image to an Azure Compute Gallery. The following images are offered:
- Windows 10 22H2 (Gen 2)
- Windows 11 22H2 (Gen 2)
- Windows 11 23H2 (Gen 2)
- Windows 11 24H2 (Gen 2)
- Windows 10 22H2 with O365 (Gen 2)
- Windows 11 22H2 with O365 (Gen 2)
- Windows 11 23H2 with O365 (Gen 2)
- Windows 11 24H2 with O365 (Gen 2)
You can also select to enable the Trusted Launch or Confidential VM security type feature on the Azure Compute Gallery image definition.
Custom image is optimized usingVirtual Desktop Optimization Tool (VDOT) and patched with the latest Windows updates.
Deployment Type | Link |
---|---|
Azure portal UI | |
Command line (Bicep/ARM) | ![]() |
Terraform | ![]() |
Download aVisio file of this architecture.
This project welcomes contributions and suggestions. Most contributions require you to agree to aContributor License Agreement (CLA) declaring that you have the right to, and actually do, grant usthe rights to use your contribution. For details, visithttps://cla.opensource.microsoft.com.
When you submit a pull request, a CLA bot will automatically determine whether you need to providea CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructionsprovided by the bot. You will only need to do this once across all repos using our CLA.
This project has adopted theMicrosoft Open Source Code of Conduct.For more information see theCode of Conduct FAQ orcontactopencode@microsoft.com with any additional questions or comments.
This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsofttrademarks or logos is subject to and must followMicrosoft's Trademark & Brand Guidelines.Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship.Any use of third-party trademarks or logos are subject to those third-party's policies.
Microsoft Support is not yet handling issues for any published tools in this repository. However, we would like to welcome you to open issues using GitHubissues to collaborate and improve these tools.