Skip to content

Azure

The purpose of this guide is to walk through some best practices for accessing private resources on Azure by deploying Cloudflare’s lightweight connector, cloudflared.

We will walk through how to initialize a service on a Linux VM in Azure, and route to it from another VM running cloudflared. This deployment guide does not take into account routing beyond basic security groups and default VPCs.

Prerequisites

Create your environment

Make sure you sign up for Azure and create a new subscription.

  1. First, create your first resource group.

    Azure group

  2. In addition, create your first keypair as well. You will be using the keypair to SSH into your Virtual Machine.

    Azure keypair

  3. Next, define your inbound and outbound ports to the VM. If these ports are not configured properly, the solution will not function as intended. For testing purposes, we will leave access open.

    Azure keypair

Create two Ubuntu 20.04 LTS VMs, and make sure you record their internal IP addresses. Azure by default uses the 10.0.0.0/8 subnet.

Deploy cloudflared

  1. SSH into your Azure instance using the command line.

    Terminal window
    $ cd Downloads
    Terminal window
    $ ssh -i <private key path> azureuser@20.115.124.241
  2. Run sudo su to gain full admin rights to the Virtual Machine.

  3. Install cloudflared on your instance. In this example, we are running a Debian-based instance, so use the Debian package of cloudflared:

    1. Add Cloudflare’s package signing key:
    Terminal window
    $ sudo mkdir -p --mode=0755 /usr/share/keyrings
    $ curl -fsSL https://pkg.cloudflare.com/cloudflare-main.gpg | sudo tee /usr/share/keyrings/cloudflare-main.gpg >/dev/null
    1. Add Cloudflare’s apt repo to your apt repositories:
    Terminal window
    $ echo "deb [signed-by=/usr/share/keyrings/cloudflare-main.gpg] https://pkg.cloudflare.com/cloudflared $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/cloudflared.list
    1. Update repositories and install cloudflared:
    Terminal window
    $ sudo apt-get update && sudo apt-get install cloudflared
  4. Run the following command to authenticate cloudflared with your Cloudflare account. The command will launch a browser window where you will be prompted to log in with your Cloudflare account and pick any zone you have added to Cloudflare.

    Terminal window
    $ cloudflared tunnel login
  5. Create a tunnel.

    Terminal window
    $ cloudflared tunnel create Azure-01

Complete tunnel configuration

  1. Make a directory for your configuration file.

    Terminal window
    $ mkdir /etc/cloudflared
    Terminal window
    $ cd /etc/cloudflared
  2. Build a configuration file. Before moving forward and entering vim, copy your Tunnel ID and credentials path to a notepad.

    Terminal window
    $ vim config.yml
  3. Type i to begin editing the file and copy-paste the following settings in it.

    tunnel: <Tunnel ID/name>
    credentials-file: /root/.cloudflared/<Tunnel ID>.json
    protocol: quic
    warp-routing:
    enabled: true
    logfile: /var/log/cloudflared.log
    #cloudflared to the origin debug
    loglevel: debug
    #cloudflared to cloudflare debug
    transport-loglevel: info
  4. Press esc and then enter :x to save and exit.

  5. Run cloudflared as a service.

Terminal window
$ cloudflared service install
Terminal window
$ systemctl start cloudflared
Terminal window
$ systemctl status cloudflared

Next, visit Zero Trust and ensure your new tunnel shows as active. Optionally, begin creating Access policies to secure your private resources.