Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
27 commits
Select commit Hold shift + click to select a range
a51d9fd
First commit of doc review/restructuring
MXClyde Oct 23, 2025
cb69cb6
First commit of review/refactoring
MXClyde Oct 23, 2025
3470f6b
GA documentation review
MXClyde Oct 28, 2025
9d7ba41
Merge branch 'mendix:development' into development
MXClyde Oct 28, 2025
ac9041a
Update mendix-azure.md
katarzyna-koltun-mx Oct 29, 2025
10bb645
Update _index.md
katarzyna-koltun-mx Oct 29, 2025
b171324
Update _index.md
katarzyna-koltun-mx Oct 29, 2025
4119f6a
Update mendix-azure.md
katarzyna-koltun-mx Oct 29, 2025
6e360b4
Update mendix-azure.md
katarzyna-koltun-mx Oct 29, 2025
ebe9b92
Update mendix-azure.md
katarzyna-koltun-mx Oct 29, 2025
e54b2da
Update mendix-azure.md
katarzyna-koltun-mx Oct 29, 2025
ce7f02f
Update _index.md
katarzyna-koltun-mx Oct 29, 2025
c23d72c
Update _index.md
katarzyna-koltun-mx Oct 29, 2025
6df832a
Update mx-azure-support.md
katarzyna-koltun-mx Oct 29, 2025
40c05fc
minor changes to license page
MXClyde Oct 29, 2025
5abb173
Merge branch 'development' of https://www.github.com/mxclyde/docs int…
MXClyde Oct 29, 2025
e34b356
Merge branch 'mendix:development' into development
MXClyde Oct 29, 2025
6cabf15
Update mx-azure-network-interconnecting-networks.md
katarzyna-koltun-mx Oct 29, 2025
85b052c
Update _index.md
katarzyna-koltun-mx Oct 29, 2025
695b3a7
Update mx-azure-direct-database-access.md
katarzyna-koltun-mx Oct 29, 2025
4749ffe
Update mx-azure-architecture.md
katarzyna-koltun-mx Oct 29, 2025
8fc82ea
Update mx-azure-ingress-egress-configuration.md
katarzyna-koltun-mx Oct 29, 2025
cdb9521
Update mx-azure-backups.md
katarzyna-koltun-mx Oct 29, 2025
649e3e2
Update mx-azure-security-and-compliance.md
katarzyna-koltun-mx Oct 29, 2025
d53b4a8
Update mx-azure-licensing.md
katarzyna-koltun-mx Oct 29, 2025
0f79bc4
Update mx-azure-deploy.md
katarzyna-koltun-mx Oct 29, 2025
0537a31
Update mx-azure-delete.md
katarzyna-koltun-mx Oct 29, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
81 changes: 12 additions & 69 deletions content/en/docs/deployment/mx-azure/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,83 +9,26 @@ description_list: true

## Introduction
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done.


Mendix on Azure provides a simplified, integrated way to deploy Mendix applications to a Microsoft Azure environment. With this solution, users are empowered to deploy their Mendix applications in Azure environments without the need for intricate infrastructure setup in cloud services. They can also seamlessly manage infrastructure services through an intuitive user interface. No matter their IT skills, users can realize their project value quickly and securely with Azure.
Mendix on Azure offers a streamlined, fully integrated approach to deploying Mendix applications on Microsoft Azure. This solution eliminates the need for complex cloud infrastructure setup, enabling users to focus on building and delivering value faster. Through an intuitive interface, teams can easily manage their application environment and infrastructure services. Regardless of technical background, users can deploy, scale, and secure their Mendix apps efficiently on Azure.

## Benefits of Mendix on Azure

By eliminating manual setup and maintenance, Mendix on Azure allows your teams to:
By eliminating manual setup and maintenance, Mendix on Azure enables your teams to:

* Focus on developing business value instead of configuring infrastructure.
* Avoid delays caused by cross-team dependencies or architectural discussions.
* Accelerate time-to-market for critical applications.
* Address deployment and operational bottlenecks by automating the setup and management of Mendix applications on Azure.
* Eliminate the need for specialized cloud engineers and reduce setup time to under 30 minutes.
* Focus on innovation and deliver value faster, reduces labor costs, and ensure consistency, security, and compliance.
* Deliver business value faster instead of managing infrastructure.
* Accelerate time-to-market and reduce deployment bottlenecks.
* Minimize cross-team dependencies and technical complexity.
* Deploy applications in under 30 minutes without specialized cloud expertise.
* Lower operational costs while maintaining security, compliance, and consistency.

## Mendix on Azure and Mendix on Kubernetes
## Comparing Mendix on Azure and Mendix on Kubernetes

Mendix on Azure is a new deployment option that makes use of some of the features of Mendix on Kubernetes, but does so in an opinionated way.
Mendix on Azure is a deployment option that uses the same core Mendix engine as Mendix on Kubernetes, but is delivered in a standardized way within Azure environments.

Mendix on Kubernetes offers its users flexibility coupled with the ability to keep their deployment within their enterprise firewall, but requires more effort to configure and more time to value than deployments on Mendix Cloud.
While Mendix on Kubernetes gives organizations flexibility and the ability to host applications securely behind their own firewall, it demands more hands-on configuration and can take longer to realize full value when compared to deployments managed by public Mendix Cloud.

Mendix on Azure builds on that by providing an automated, preconfigured solution with access to private customer networks, which can be deployed in 30 minutes by a user without IT skills at no extra operational costs. The architecture, its maintenance, updates, and security hardening are all fully managed by Mendix. This helps prevent issues with setting up the infrastructure, which can sometimes be very technical and complicated for citizen developers.
Mendix on Azure aims to bring the best of both worlds, by offering users a preconfigured solution that can be integrated within their private networks. Deployment is simplified to such an extent that even business users without deep IT knowledge can launch production-ready environments in under 30 minutes—without incurring extra operating costs. Mendix manages the infrastructure, ongoing updates, and security hardening, eliminating technical hurdles and freeing up teams to focus on business innovation rather than infrastructure setup.​

## Architecture

Mendix on Azure provides a managed service to host Mendix apps in an Azure subscription you own. The Mendix on Azure service is composed of several underlying Azure services combined with the following Mendix-specific components:

* [Mendix Runtime](/refguide/runtime/)
* [Mendix Operator](/developerportal/deploy/private-cloud-cluster/)
* [Mendix Agent](/developerportal/deploy/private-cloud-cluster/)

Mendix operates all services and components within the scope of the Mendix on Azure service for you. The service leverages several underlying Azure services that are preconfigured to optimally host your Mendix apps.

### Components

Mendix deploys, operates and is responsible for overall service functionality of the following components as part of Mendix on Azure:

* Azure Kubernetes Service with Managed NGINX Ingress Controller (app routing add-on)
* Azure PostgreSQL Flexible Server
* Azure Container Registry
* Azure Blob Storage
* Azure Managed Grafana
* Azure Managed Prometheus
* Azure Virtual Network with private endpoints and private DNS zones
* Mendix Runtime
* Mendix Operator
* Mendix Agent

You cannot alter these managed components yourself beyond what is offered in the Mendix on Azure and Mendix on Kubernetes self-service portals. Mendix limits customization to ensure a consistent, predictable, and scalable customer experience.

### Diagram

The diagram in this section presents the high-level architecture of the Mendix for Azure solution.

{{< figure src="/attachments/deployment/mx-azure/architecture.png" class="no-border" >}}

The architecture is assessed against the [Azure well-architected framework](https://learn.microsoft.com/en-us/azure/well-architected/) to ensure its reliability, accessibility, and performance.

## Security

Mendix accesses customer environments in a secure, auditable way:

* We use [cross-tenant access](https://learn.microsoft.com/en-us/entra/external-id/cross-tenant-access-overview), which is native to Azure and complies with Microsoft best practices.
* Most access is performed programmatically, that is, by the system rather than manually by normal users. There is usually no human intervention into the customer environments.
* In rare cases where human intervention is required, for example, because of a support request that requires access to the customer environment to resolve, the access is automated, auditable, and governed by Mendix support processes. The Mendix employee working on the support request receives temporary access which is then revoked.
* The network connectivity is done using a private Azure link service, not through the public internet.

### SOC 2 Type 2 Compliance Exceptions

The Azure Policy add-on is not enabled inside Mendix Azure clusters, because Mendix can control which workloads can access the cluster. Because of that, the following exceptions to the SOC 2 Type 2 policy are considered acceptable:

* Azure Container Registry:
* [Container registries should be encrypted with a customer-managed key](https://www.azadvertizer.net/azpolicyadvertizer/5b9159ae-1701-4a6f-9a7a-aa9c8ddd0580.html) - The standard Microsoft key is used instead.
* AKS - cluster resource:
* [Azure Policy Add-on for Kubernetes service (AKS) should be installed and enabled on your clusters](https://www.azadvertizer.net/azpolicyadvertizer/0a15ec92-a229-4763-bb14-0ea34a568f8d.html) - The cluster is deployed and managed by Mendix, so the policy is not needed.
* [Azure Kubernetes Service clusters should have Defender profile enabled](https://www.azadvertizer.net/azpolicyadvertizer/a1840de2-8088-4ea8-b153-b4c723e9cb01.html) - This is not automated for cost-saving reasons.
* AKS - cluster VNET:
* [All Internet traffic should be routed via your deployed Azure Firewall](https://www.azadvertizer.net/azpolicyadvertizer/fc5e4038-4584-4632-8c85-c0448d374b2c.html) - This is not automated, but the customer can deploy their own Firewall if required.
* Storage Account:
* [Storage accounts should use customer-managed key for encryption](https://www.azadvertizer.net/azpolicyadvertizer/6fac406b-40ca-413b-bf8e-0bf964659c25.html) - The cluster is deployed and managed by Mendix, so this is not needed.
This managed approach helps ensure reliable operations and secure best practices, while empowering citizen developers and IT professionals alike to harness the full potential of Mendix with minimal friction.

## Read More
146 changes: 0 additions & 146 deletions content/en/docs/deployment/mx-azure/backups.md

This file was deleted.

Loading