Overview
Azure Virtual Networks (VNets) provide isolated network environments for your Azure resources. Multi-Cloud Manager enables you to create, list, and manage VNets across all your Azure subscriptions.Listing Virtual Networks
API Endpoint
Implementation Details
The list operation discovers VNets across all accessible subscriptions and resource groups: Source:/workspace/source/project/backend/azure_modules/vnet.py:8
Response Format
Response Fields
Array of VNet objects
Creating a Virtual Network
API Endpoint
Request Body
Request Parameters
Azure subscription ID where the VNet will be created
Name for the new Virtual Network
Existing resource group name
Azure region (e.g., “eastus”, “westeurope”, “southeastasia”)
Implementation Details
Source:/workspace/source/project/backend/azure_modules/vnet.py:38
The VNet creation uses the Azure Network Management Client with the following configuration:
Default Configuration
VNets are created with a default address space of 10.0.0.0/16, which provides 65,536 IP addresses for your resources.
Address Space Details
| CIDR Block | IP Range | Available IPs | Use Case |
|---|---|---|---|
| 10.0.0.0/16 | 10.0.0.0 - 10.0.255.255 | 65,536 | Default (small to medium deployments) |
| 10.0.0.0/8 | 10.0.0.0 - 10.255.255.255 | 16,777,216 | Large enterprise deployments |
| 172.16.0.0/12 | 172.16.0.0 - 172.31.255.255 | 1,048,576 | Medium to large deployments |
| 192.168.0.0/16 | 192.168.0.0 - 192.168.255.255 | 65,536 | Small deployments |
Response
Success (200):Authentication
All VNet operations require authentication via Azure OAuth:
Source:
/workspace/source/project/backend/azure_modules/vnet.py:9-10
Resource Hierarchy
Understanding Azure’s resource organization:Network Management Client
SDK Reference
Source:/workspace/source/project/backend/azure_modules/vnet.py:3
Key Operations
| Operation | Method | Description |
|---|---|---|
| List VNets | virtual_networks.list(resource_group) | Lists all VNets in a resource group |
| Create VNet | virtual_networks.begin_create_or_update() | Creates or updates a VNet |
| Get VNet | virtual_networks.get() | Gets details of a specific VNet |
| Delete VNet | virtual_networks.begin_delete() | Deletes a VNet |
Network Isolation
VNet-Level Isolation
Virtual Networks provide complete isolation by default:- Resources in different VNets cannot communicate without explicit connectivity (peering or gateway)
- Each VNet has its own address space
- Network Security Groups (NSGs) control inbound/outbound traffic
Subnet Segmentation
Within a VNet, subnets provide micro-segmentation:- Different subnets can host different resource types
- NSGs can be applied at subnet level
- Service endpoints can be enabled per subnet
Connectivity Scenarios
VNet Peering
Connect VNets within the same region or across regions:- Low-latency, high-bandwidth connections
- Traffic stays on Microsoft backbone network
- No gateway required
VPN Gateway
Secure connections for:- VNet-to-VNet across subscriptions
- Site-to-Site VPN to on-premises
- Point-to-Site for individual clients
ExpressRoute
Dedicated private connections:- Does not traverse public internet
- Predictable latency and bandwidth
- Supports up to 100 Gbps
Best Practices
Common Use Cases
Development Environment
Multi-Region Deployment
Hybrid Cloud
Troubleshooting
Error: “Brak wymaganych danych”
Ensure all required fields are provided in the request:subscriptionIdvnetNamergNamelocation
Error: “Unauthorized”
Verify that:- User is authenticated with Azure
- Access token is present in session
- Token has not expired
VNet Creation Fails
Common causes:- Resource group does not exist
- Invalid location name
- Insufficient permissions in subscription
- Quota limits reached
Next Steps
Subnet Management
Learn how to create and manage subnets within your VNet
GCP VPCs
Compare with GCP VPC networking