DARTS Connectivity (Crime -> SDS)
Network Flow
Above is a network flow diagram outlining the connectivity between DARTS in Crime and DARTS in SDS.
In summary:
- Request sent from stagingdarts pod to outbound App Gateway.
 - App Gateway forwards traffic via VPN Gateway to Cloud Gateway network.
 - Request is SNATd by appropriate Cloud Gateway firewall rule and sent onward to VWAN within HMCTS tenant.
 - Request is forwarded to the appropriate AKS App Gateway (Prod goes via Hub Palo Alto).
 - AKS App Gateway sends request on to a darts-gateway pod on one of the AKS clusters in its backend pool.
 
Outbound Application Gateway Configuration
There is an outbound App Gateway in each of the Crime tenants:
The gateways have listeners which listen for requests sent to either of these two host names:
- https://darts-gateway.mnl.nl.cjscp.org.uk (NonLive)
 - https://darts-gateway.mlv.lv.cjscp.org.uk (Live)
 
When a request is received, it is forwarded on to the specified backend target. In NonLive the target is the SDS Demo AKS backend App Gateway(aks00-demo-agw), and in Live the target is the DNAT IP address(sds-aks-ingress-backend-prod-dnat) of the SDS Prod AKS backend App Gateway on the Hub Palo Alto.
Cookie-based affinity is enabled on both gateways for sticky sessions.
Outbound requests will have the hostname overridden and set to the corresponding SDS DARTS Gateway for that environment:
- http://darts-gateway.demo.platform.hmcts.net (NonLive)
 - http://darts-gateway.platform.hmcts.net (Live)
 
Relevant Repositories
- cpp-terraform-azurerm-imz - Terraform code for Application Gateways.
 - cpp-terraform-network - Terraform code for Private DNS config.
 
Dynatrace Monitoring
Monitoring has been configured within Dynatrace to trigger alerts when the backend pool of the outbound App Gateway becomes unhealthy.
- Crime - DARTS - PROD - Strategic Platform - Live - Dynatrace Connection
 - DARTS - Azure Application Gateway unhealthy hosts - DARTS Metric Event
 
