Using Bitmovin Cloud Connect with Azure

This document explains how to set up Bitmovin Encoding on Azure Cloud infrastructure so that the Bitmovin platform can run encoders using the Azure API.

The instructions in this document for the REST API Services apply to live encoding and file-based encoding. For a complete list of formats and input types, see the Bitmovin website.

Prerequisites

🚧

Activation required

This feature requires a commercial agreement and needs to be specifically activated for a Bitmovin account, it is not available by default. You will not be able to complete the configuration below without this activation.

  • A Bitmovin account enabled for usage of Cloud Connect
    • If you want to use Cloud Connect with a sub organization, this sub organization must be enabled for usage of Cloud Connect
  • An Azure account
    • with a "Microsoft.Compute > Total Regional vCPUs" quota for your region of at least "8" (also see Resource Quotas below)

Note: A free Azure trial subscription is not sufficient for Cloud Connect, as it has a "Total Regional vCPUs" quota of "4". Consider upgrading your subscription at least to an Azure Pay as you go (PAYG) plan and requesting a quota increase in your desired region.

Configure your Azure account

In this section, you will create a separate resource group that will be used by the Bitmovin platform when interacting with your Azure infrastructure. Also, we will create the appropriate infrastructure setup to enable Encoding jobs.

Add the bitmovin-azure-connect application

The bitmovin-azure-connect application is used to access the Azure Compute Gallery (previously Shared Image Gallery) where the images reside that are required to start virtual machines (VMs) for Bitmovin encodings.

  1. Open the Azure portal: https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview
  2. Copy your Tenant ID from "Overview > Basic information"

  1. Replace <Your Tenant ID> with your Tenant ID in the following link and open it in your browser:
https://login.microsoftonline.com/<Your Tenant ID>/oauth2/authorize?client_id=ad59b58a-9910-409a-909e-cf98258bb566&response_type=code&redirect_uri=https%3A%2F%2Fbitmovin.com%2F
  1. This will will open a "Permissions requested" modal for bitmovin-azure-connect, then click the "Accept" button

Create a Resource group

This Resource group is a container to hold all Bitmovin-related resources to run Cloud Connect Encoding jobs. (See: https://learn.microsoft.com/azure/azure-resource-manager/management/manage-resource-groups-portal) Additionally, we will add the bitmovin-azure-connect application to the Resource group to manage Virtual machines.

  1. Open the Subscriptions service and select your subscription: https://portal.azure.com/#view/Microsoft_Azure_Billing/SubscriptionsBladeV2
  2. Go to "Settings > Resource groups" in the sidebar, then click the "Create" button
  3. In "Basics" (Step 1), provide a "Resource group" name and "Region" of your choice, then click the "Review + create" button

  1. In "Review + create" (Step 3), wait until the validation passed, then click the "Create" button

Allow the bitmovin-azure-connect application to run Virtual machines

  1. Within your Subscription, open the newly created Resource group
  2. Go to "Access control (IAM)" in the sidebar, click the "Add" button and select "Add role assignment"
  3. In "Role" (Step 1), select the "Privileged administrator roles" tab and select the "Contributor" role, then click the "Next" button

  1. In "Members" (Step 2), click the "Select members" button. Search for and select the "bitmovin-azure-connect" application, then click the "Select" button. Then click the "Review + assign" button

  1. In "Review + create" (Step 3), click the "Review + assign" button

📘

Tighten permissions for production

If you want to define and use a fine-grained custom role to narrow down the permissions on that resource group please reach out to the support team to get guidance on the required permissions.

Create a Network security group (per region)

"A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources." (Source: https://learn.microsoft.com/azure/virtual-network/network-security-groups-overview)

📘

Running Encodings in different regions

If you need to run different Encoding jobs in different regions, repeat the following steps for every region.

  1. Within your Subscription, open your previously created Resource group, then click the "Create" button
  2. In the Resource group "Marketplace", search for "Network security group"
  3. Select "Network security group" (Microsoft Azure Service), then select "Create" and click "Network security group"
  4. In "Basics" (Step 1), provide a "Name" and "Region" of your choice, then click the "Review + create" button

  1. In "Review + create" (Step 3), wait until the validation passed, then click the "Create" button
  2. This will open the "Network security group" after creation, then click the "Go to resource" button
  3. Go to "Settings > Inbound security rules" in the sidebar, create new rules for each of the following tables by clicking the "Add" button:

KeyValue
SourceIP Addresses
Source IP addresses/CIDR ranges104.199.97.13/32, 35.205.157.162/32
Source port ranges-
DestinationAny
ServiceCustom
Destination port ranges9999
ProtocolTCP
ActionAllow
Priority100
NameAllowBitmovinApi1
KeyValue
SourceIP Addresses
Source IP addresses/CIDR ranges104.199.97.13/32, 35.205.157.162/32
Source port ranges-
DestinationAny
ServiceCustom
Destination port ranges9443
ProtocolTCP
ActionAllow
Priority101
NameAllowBitmovinApi2
KeyValue
SourceIP Addresses
Source IP addresses/CIDR ranges104.199.97.13/32, 35.205.157.162/32
Source port ranges-
DestinationAny
ServiceCustom
Destination port ranges22
ProtocolTCP
ActionAllow
Priority102
NameAllowBitmovinApi3

📘

Live encodings

Additional inbound rules are required if you are encoding live streams transported over RTMP, SRT or Zixi.

Additional inbound rules for RTMP live streams

KeyValue
Destination port ranges1935
ProtocolTCP
Priority300
Namertmp-listener
DescriptionFor RTMP live streams
KeyValue
Destination port ranges443
ProtocolTCP
Priority302
NameAllowRTMPSInbound
DescriptionFor RTMPS live streams

Additional inbound rules for SRT live streams

KeyValue
Destination port ranges2088
ProtocolTCP
Priority400
Namesrt-listener-tcp
DescriptionFor SRT live streams
KeyValue
Destination port ranges2088
ProtocolUDP
Priority500
Namesrt-listener-udp-2088
DescriptionFor SRT live streams
KeyValue
Destination port ranges2090
ProtocolUDP
Priority700
Namesrt-listener-udp-2090
DescriptionFor SRT live streams
KeyValue
Destination port ranges2091
ProtocolUDP
Priority800
Namesrt-listener-udp-2091
DescriptionFor SRT live streams

Additional inbound rules for Zixi live streams

KeyValue
Destination port ranges4444
ProtocolTCP
Priority900
Namezixi-listener
DescriptionFor Zixi live streams

Create a Virtual network (per region)

📘

Running Encodings in different regions

If you need to run different Encoding jobs in different regions, repeat the following steps for every region.

  1. Within your Subscription, open your previously created Resource group, then click the "Create" button
  2. In the Resource group "Marketplace", search for "Virtual network"
  3. Select "Virtual network" (Microsoft Azure Service), then select "Create" and click "Virtual network"
  4. In "Basics" (Step 1), provide a "Virtual network name" and "Region" of your choice, then click the "Next" button
  5. In "IP addresses" (Step 3), delete the default subnet (Name: default, Size: /24 (256 addresses))

Note: The default IPv4 address space gives you a CIDR notation of /16 with a size of 65,636 IP addresses, which should be sufficient.

  1. Click the "Add a subnet" button, provide a "Name" of your choice and select "Size" with /16 (65,536 addresses), then click the "Add" button
  2. Click the "Review + create" button, then finish the creation by clicking the "Create" button
  3. This will open the "Virtual network" after creation, then click the "Go to resource" button

Assign the Network security group

  1. Go to "Settings > Subnets" in the sidebar, then select your newly created Subnet
  2. Select in "Network security group" your previously created Network security group

Configure your Bitmovin account

Before you continue, make sure you have collected the following information from Azure:

  • From your Azure account
    • Tenant ID
  • From your Resource group
    • Subscription ID
    • Resource group name
  • From your Virtual network
    • Virtual network name
    • Subnet name (under "Settings > Subnets")

Link your Azure account

To enable your Bitmovin account to run encodings in your Azure account, you need to link it with Infrastructure and Region Settings objects.

  1. Open the Bitmovin Dashboard: https://dashboard.bitmovin.com/
  2. Go to "VOD/LIVE Encoding > Cloud Connect"
  3. Click the "Add infrastructure account" button, select the "Microsoft Azure" option, click the "Next" button
  4. Provide a "Name" of your choice, fill in the Subscription ID, Resource Group ID/Name and Tenant ID, click the "Next" button
  5. Select the appropriate "Cloud Region" (where the Resource group was created), fill in the Network Name and "Subnet Name", click the "Next" button

Run encoding jobs in Azure

After configuration has been completed, you will be able to run encoding jobs in your own Azure account. To do so, use the Bitmovin API client SDKs to submit encoding jobs, in the same way as you would do for encodings running in the Bitmovin Managed Cloud service. The only difference is that you need to specify the new infrastructure instead of public cloud regions.

Here is a Python snippet demonstrating how to link your encoding to your infrastructure.

    # ID of the Infrastructure object
    infra_id = ‘<infrastructure_id>’ 
    
    # Azure region of the Azure-connect setup
    infra_region = CloudRegion.AZURE_EUROPE_WEST
    infrastructure = InfrastructureSettings(infrastructure_id=infra_id, 
                            cloud_region=infra_region)
    
    encoding = Encoding(name='azure connect encoding',
        cloud_region=CloudRegion.EXTERNAL,
        infrastructure=infrastructure,
        encoder_version='STABLE')

Sub Organizations

If you have set up your infrastructure in a sub organization, you must tell the Bitmovin API that you want to run the encoding in that sub organization. Thus, in addition to the code snippet above, make sure to set the tenant_org_id alongside the api_key in the bitmovin_api object:

    # ID of the sub organisation you added the infrastructure to
    organisation_id = '<sub_organisation_id>'

    bitmovin_api = BitmovinApi(api_key=config_provider.get_bitmovin_api_key(), 
                       tenant_org_id=organisation_id,
                       logger=BitmovinApiLogger())

Resource Quotas

If you want to run several encodings in parallel, the default limits may not be sufficient. In that case, you will have to request limit increases for the following resource in your Region(s), through the Quotas page:

For the limits to request we will be using these variables:

Variable nameExplanation
(maximum number of encodings)The maximum number of parallel encodings the infrastructure must be able to run. Typically this is the number of encoding slots assigned to the Bitmovin account or sub-org associated with the infrastructure.
(maximum number of instances per encoding)The number of instances used by one encoding.
This number varies depending on the input file size and the number and data rate of the encoder representations. However, we recommend to use 60 as the maximum number of instances per encoding when getting started and to increase this limit if it proves insufficient.
For Dolby Vision encodings and conversions, starting from Encoder v2.208.0 , the maximum number of instances have been increased to
- 100 instances if the encodingMode configured is STANDARD (which currently maps to TWO_PASS), SINGLE_PASSor TWO_PASS
- 200 instances if the encodingMode configured is THREE_PASS

Using the variables above, please request the following limits:

ProviderQuota NameLimit to request
Microsoft.NetworkPublic IP Addresses - Basic(maximum number of encodings) * (max # of instances per encoding)
Microsoft.ComputeStandard DSv3 Family vCPUs(maximum number of encodings) * 8
Microsoft.ComputeStandard FSv2 Family vCPUs(maximum number of encodings) * 8
Microsoft.ComputeTotal Regional vCPUs(maximum number of encodings) * 8
Microsoft.ComputeTotal Regional Spot vCPUs(maximum number of encodings) * (maximum number of instances per encoding) * 8
Microsoft.ComputeVirtual Machines(maximum number of encodings) * (maximum number of instances per encoding) - The default value of 25000 should be sufficient
Microsoft.ComputeVirtual Machine Scale SetsThe default value of 2500 should be sufficient
Microsoft.ComputeStandard Storage Managed Disks(maximum number of encodings) * (maximum number of instances per encoding) - The default value of 50000 should be sufficient
Microsoft.ComputePremium Storage Managed Disks(maximum number of encodings) * (maximum number of instances per encoding) - The default value of 50000 should be sufficient

This implies the standard case: 8 core instances. If your use case requires instances with a different number of cores, multiply by that.

The maximum number of instances needed depends on the maximum number of parallel encodings running multiplied by the maximum number of instances needed for one encoding. The number of instances used by one encoding varies depending on the input file size and the number and data rate of the encoder Representations and cannot exceed 120.

Generally, it cannot hurt to multiply the expected limit calculated for your current situation by 2, to have some margin in case you need to ramp up.