Skip to main content

DARTS Connectivity (Crime -> SDS)

Network Flow

Network Flow Diagram

Above is a network flow diagram outlining the connectivity between DARTS in Crime and DARTS in SDS.

In summary:

  • Request sent from stagingdarts pod to outbound App Gateway.
  • App Gateway forwards traffic via VPN Gateway to Cloud Gateway network.
  • Request is SNATd by appropriate Cloud Gateway firewall rule and sent onward to VWAN within HMCTS tenant.
  • Request is forwarded to the appropriate AKS App Gateway (Prod goes via Hub Palo Alto).
  • AKS App Gateway sends request on to a darts-gateway pod on one of the AKS clusters in its backend pool.

Outbound Application Gateway Configuration

There is an outbound App Gateway in each of the Crime tenants:

The gateways have listeners which listen for requests sent to either of these two host names:

  • https://darts-gateway.mnl.nl.cjscp.org.uk (NonLive)
  • https://darts-gateway.mlv.lv.cjscp.org.uk (Live)

When a request is received, it is forwarded on to the specified backend target. In NonLive the target is the SDS Demo AKS backend App Gateway(aks00-demo-agw), and in Live the target is the DNAT IP address(sds-aks-ingress-backend-prod-dnat) of the SDS Prod AKS backend App Gateway on the Hub Palo Alto.

Cookie-based affinity is enabled on both gateways for sticky sessions.

Outbound requests will have the hostname overridden and set to the corresponding SDS DARTS Gateway for that environment:

  • http://darts-gateway.demo.platform.hmcts.net (NonLive)
  • http://darts-gateway.platform.hmcts.net (Live)

Relevant Repositories

Dynatrace Monitoring

Monitoring has been configured within Dynatrace to trigger alerts when the backend pool of the outbound App Gateway becomes unhealthy.

This page was last reviewed on 31 October 2025. It needs to be reviewed again on 31 October 2026 by the page owner platops-build-notices .
This page was set to be reviewed before 31 October 2026 by the page owner platops-build-notices. This might mean the content is out of date.