Azure Vs. AWS terminology
Through my study of AWS and Azure, I have found that one challenge is in understanding the terminology difference, particularly as my own background is in VMware technologies. So, I have created this little chart that compares the three.
Obviously, there is no direct one-to-one mapping of the product offerings, but there are some common areas, at a conceptual level.
So, here is a table, that roughly equates the concepts to each other;
| Physical concept | VMware concept | AWS concept | Azure concept |
|---|---|---|---|
| Network | vSwitch Port Group | VPC | Virtual Network |
| VPN | NSX Edge IPSEC tunnel | VPC | SSTP or OpenVPN |
| Subnet | Virtual Machine Port Group | Subnet | Dynamic IP (DIP) |
| Drive | Drive Mapping | Volume | Disk |
| Disk | vmdk | EBS Volume | VHD |
| Server | Virtual Machine | EC2 Instance | Virtual Machine |
| DNS | NSX Edge DNS | Route 53 | Azure DNS |
| DDoS protection | NSX Edge Firewall | AWS Shield | (built-in) |
| Firewall | NSX Edge Firewall virtual appliance | Security Groups, ACLs | Network Security Group (NSG) |
| Layer 7 WAF | Third party solution needed | AWS WAF Firewall Manager |
Application Gateway |
| WAN | VXLAN, NSX SD-WAN (VeloCloud) | AWS Direct Connect (L2 VPN) | ExpressRoute (L3 routed, also MPLS) |
| Multi Factor Authentication | Workspace ONE and third party | AWS MFA | Azure Active Directory |
| Load Balancing | NSX Load Balancer | AWS Elastic Load Balancer |
Azure Load Balancer, Traffic Manager |
| Centralised Logging | vRealize Log Insight, etc. | use an S3 bucket or CloudWatch | Azure Audit Logs |
| Vulnerability Assessment | vRealize Operations | AWS Guard Duty, Amazon Inspector, AWS Trusted Advisor | Azure Security Center |
| Power off immediately | Power off | Not Available | Not Available |
| Request Shut Down OS | Shut Down OS | Stop | Stop |
| Reset Power | Reset | Not Available | Not Available |
| Request OS reboot | Reboot OS | Reboot | Restart |
| Sleep / Hibernate | Suspend | Not Available (except Amazon Linux) | Not Available |
| Delete server | Delete from disk (when powered off) | Terminate | Deallocate |
| Create identical duplicate | Clone (when powered off) | Create Image | Create Image |
| Create deployable image | Convert to Template (when VM powered off) | Create Image | Generalise, then Create Image |
| Unknown server or disk | Orphan | ? | Unattached |
There may be some questions about my opinion of these comparative conceptual terms – if so, post a comment below. Please let me know if I have made an error.
