You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/create-private-endpoint-cli.md
+21-21Lines changed: 21 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ You can create private endpoints for a variety of Azure services, such as Azure
40
40
41
41
An Azure resource group is a logical container where Azure resources are deployed and managed.
42
42
43
-
Create a resource group with[az group create](/cli/azure/group#az_group_create):
43
+
First, create a resource group by using[az group create](/cli/azure/group#az_group_create):
44
44
45
45
```azurecli-interactive
46
46
az group create \
@@ -50,11 +50,9 @@ az group create \
50
50
51
51
## Create a virtual network and bastion host
52
52
53
-
In this section, you create a virtual network, subnet, and bastion host.
53
+
Next, create a virtual network, subnet, and bastion host. You'll use the bastion host to connect securely to the VM for testing the private endpoint.
54
54
55
-
You'll use the bastion host to connect securely to the VM for testing the private endpoint.
56
-
57
-
1. Create a virtual network by using [az network vnet create](/cli/azure/network/vnet#az_network_vnet_create).
55
+
1. Create a virtual network by using [az network vnet create](/cli/azure/network/vnet#az_network_vnet_create):
58
56
59
57
* Name: **myVNet**
60
58
* Address prefix: **10.0.0.0/16**
@@ -73,7 +71,7 @@ You'll use the bastion host to connect securely to the VM for testing the privat
73
71
--subnet-prefixes 10.0.0.0/24
74
72
```
75
73
76
-
1. Update the subnet to disable private-endpoint network policies for the private endpoint with [az network vnet subnet update](/cli/azure/network/vnet/subnet#az_network_vnet_subnet_update):
74
+
1. Update the subnet to disable private-endpoint network policies for the private endpoint by using [az network vnet subnet update](/cli/azure/network/vnet/subnet#az_network_vnet_subnet_update):
77
75
78
76
```azurecli-interactive
79
77
az network vnet subnet update \
@@ -83,7 +81,7 @@ You'll use the bastion host to connect securely to the VM for testing the privat
83
81
--disable-private-endpoint-network-policies true
84
82
```
85
83
86
-
1. Use [az network public-ip create](/cli/azure/network/public-ip#az_network_public_ip_create) to create a public IP address for the bastion host:
84
+
1. Create a public IP address for the bastion host by using [az network public-ip create](/cli/azure/network/public-ip#az_network_public_ip_create):
87
85
88
86
* Standard zone-redundant public IP address name: **myBastionIP**
89
87
* Resource group: **CreatePrivateEndpointQS-rg**
@@ -95,7 +93,7 @@ You'll use the bastion host to connect securely to the VM for testing the privat
95
93
--sku Standard
96
94
```
97
95
98
-
1. Use [az network vnet subnet create](/cli/azure/network/vnet/subnet#az_network_vnet_subnet_create) to create a bastion subnet:
96
+
1. Create a bastion subnet by using [az network vnet subnet create](/cli/azure/network/vnet/subnet#az_network_vnet_subnet_create):
99
97
100
98
* Name: **AzureBastionSubnet**
101
99
* Address prefix: **10.0.1.0/24**
@@ -110,7 +108,7 @@ You'll use the bastion host to connect securely to the VM for testing the privat
110
108
--address-prefixes 10.0.1.0/24
111
109
```
112
110
113
-
1. Use [az network bastion create](/cli/azure/network/bastion#az_network_bastion_create) to create a bastion host:
111
+
1. Create a bastion host by using [az network bastion create](/cli/azure/network/bastion#az_network_bastion_create):
114
112
115
113
* Name: **myBastionHost**
116
114
* Resource group: **CreatePrivateEndpointQS-rg**
@@ -133,7 +131,9 @@ It can take a few minutes for the Azure Bastion host to deploy.
133
131
134
132
Next, create a VM that you can use to test the private endpoint.
135
133
136
-
1. Create a VM with [az vm create](/cli/azure/vm#az_vm_create). At the prompt, provide a password to be used as the credentials for the VM:
134
+
1. Create the VM by using [az vm create](/cli/azure/vm#az_vm_create).
135
+
136
+
1. At the prompt, provide a password to be used as the credentials for the VM:
137
137
138
138
* Name: **myVM**
139
139
* Resource group: **CreatePrivateEndpointQS-rg**
@@ -156,11 +156,11 @@ Next, create a VM that you can use to test the private endpoint.
156
156
157
157
## Create a private endpoint
158
158
159
-
Next, you create the private endpoint.
159
+
Next, create the private endpoint.
160
160
161
-
1. Use [az webapp list](/cli/azure/webapp#az_webapp_list) to place the resource ID of the web app that you created earlier into a shell variable.
161
+
1. Place the resource ID of the web app that you created earlier into a shell variable by using [az webapp list](/cli/azure/webapp#az_webapp_list).
162
162
163
-
1. Use [az network private-endpoint create](/cli/azure/network/private-endpoint#az_network_private_endpoint_create) to create the endpoint and connection:
163
+
1. Create the endpoint and connection by using [az network private-endpoint create](/cli/azure/network/private-endpoint#az_network_private_endpoint_create):
164
164
165
165
* Name: **myPrivateEndpoint**
166
166
* Resource group: **CreatePrivateEndpointQS-rg**
@@ -186,11 +186,11 @@ Next, you create the private endpoint.
186
186
187
187
## Configure the private DNS zone
188
188
189
-
Next, you create and configure the private DNS zone by using [az network private-dns zone create](/cli/azure/network/private-dns/zone#az_network_private_dns_zone_create).
189
+
Next, create and configure the private DNS zone by using [az network private-dns zone create](/cli/azure/network/private-dns/zone#az_network_private_dns_zone_create).
190
190
191
-
1. Use [az network private-dns link vnet create](/cli/azure/network/private-dns/link/vnet#az_network_private_dns_link_vnet_create) to create the virtual network link to the DNS zone.
191
+
1. Create the virtual network link to the DNS zone by using [az network private-dns link vnet create](/cli/azure/network/private-dns/link/vnet#az_network_private_dns_link_vnet_create).
192
192
193
-
1. Create a DNS zone group with [az network private-endpoint dns-zone-group create](/cli/azure/network/private-endpoint/dns-zone-group#az_network_private_endpoint_dns_zone_group_create).
193
+
1. Create a DNS zone group by using [az network private-endpoint dns-zone-group create](/cli/azure/network/private-endpoint/dns-zone-group#az_network_private_endpoint_dns_zone_group_create).
194
194
195
195
* Zone name: **privatelink.azurewebsites.net**
196
196
* Virtual network: **myVNet**
@@ -221,7 +221,7 @@ Next, you create and configure the private DNS zone by using [az network private
221
221
222
222
## Test connectivity to the private endpoint
223
223
224
-
Finally, use the VM that you created earlier to connect to the SQL server across the private endpoint.
224
+
Finally, use the VM that you created earlier to connect to the SQL Server instance across the private endpoint.
225
225
226
226
1. Sign in to the [Azure portal](https://portal.azure.com).
227
227
@@ -239,7 +239,7 @@ Finally, use the VM that you created earlier to connect to the SQL server across
239
239
240
240
1. After you've connected, open PowerShell on the server.
241
241
242
-
1. Enter `nslookup <your-webapp-name>.azurewebsites.net`. Replace **\<your-webapp-name>** with the name of the web app that you created earlier. You'll receive a message that's similar to the following:
242
+
1. Enter `nslookup <your-webapp-name>.azurewebsites.net`, replacing *\<your-webapp-name>* with the name of the web app that you created earlier. You'll receive a message that's similar to the following:
243
243
244
244
```powershell
245
245
Server: UnKnown
@@ -253,15 +253,15 @@ Finally, use the VM that you created earlier to connect to the SQL server across
253
253
254
254
A private IP address of *10.0.0.5* is returned for the web app name. This address is in the subnet of the virtual network that you created earlier.
255
255
256
-
1. In the bastion connection to **myVM**, open your web browser.
256
+
1. In the bastion connection to *myVM**, open your web browser.
257
257
258
-
1. Enter the URL of your web app, **https://\<your-webapp-name>.azurewebsites.net**.
258
+
1. Enter the URL of your web app, *https://\<your-webapp-name>.azurewebsites.net*.
259
259
260
260
If your web app hasn't been deployed, you'll get the following default web app page:
261
261
262
262
:::image type="content" source="./media/create-private-endpoint-portal/web-app-default-page.png" alt-text="Screenshot of the default web app page on a browser." border="true":::
Copy file name to clipboardExpand all lines: articles/private-link/create-private-endpoint-portal.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.topic: quickstart
8
8
ms.date: 10/20/2020
9
9
ms.author: allensu
10
10
ms.custom: mode-ui
11
-
#Customer intent: As someone with a basic network background who is new to Azure, I want to create a private endpoint on a SQL server so that I can securely connect to it.
11
+
#Customer intent: As someone who has a basic network background but is new to Azure, I want to create a private endpoint on a SQL server so that I can securely connect to it.
12
12
---
13
13
14
14
# Quickstart: Create a private endpoint by using the Azure portal
@@ -206,7 +206,7 @@ Use the VM that you created earlier to connect to the web app across the private
206
206
207
207
1. After you've connected, open PowerShell on the server.
208
208
209
-
1. Enter `nslookup <your-webapp-name>.azurewebsites.net`. Replace **\<your-webapp-name>** with the name of the web app that you created earlier. You'll receive a message that's similar to the following:
209
+
1. Enter `nslookup <your-webapp-name>.azurewebsites.net`, replacing *\<your-webapp-name>* with the name of the web app that you created earlier. You'll receive a message that's similar to the following:
1. Place the web app into a variable. Replace <webapp-resource-group-name> with the resource group name of your web app, and replace <your-webapp-name> with your web app name.
182
+
1. Place the web app into a variable. Replace \<webapp-resource-group-name> with the resource group name of your web app, and replace \<your-webapp-name> with your web app name.
Copy file name to clipboardExpand all lines: articles/private-link/create-private-endpoint-template.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ You need an Azure account with an active subscription. If you don't already have
31
31
32
32
This template creates a private endpoint for an instance of Azure SQL Database.
33
33
34
-
The template that's used in this quickstart is from [Azure Quickstart Templates](https://azure.microsoft.com/resources/templates/private-endpoint-sql/).
34
+
The template thatthis quickstart uses is from [Azure Quickstart Templates](https://azure.microsoft.com/resources/templates/private-endpoint-sql/).
Copy file name to clipboardExpand all lines: articles/private-link/private-endpoint-overview.md
+16-10Lines changed: 16 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,16 +18,17 @@ The service could be an Azure service such as:
18
18
* Azure Storage
19
19
* Azure Cosmos DB
20
20
* Azure SQL Database
21
-
* Your own service, using a [Private Link service](private-link-service-overview.md).
21
+
* Your own service, using [Private Link service](private-link-service-overview.md).
22
22
23
23
## Private endpoint properties
24
-
A private endpoint specifies the following properties:
24
+
25
+
A private endpoint specifies the following properties:
25
26
26
27
|Property |Description |
27
28
|---------|---------|
28
29
|Name | A unique name within the resource group. |
29
30
|Subnet | The subnet to deploy, where the private IP address is assigned. For subnet requirements, see the [Limitations](#limitations) section later in this article. |
30
-
|Privatelink resource | The private-link resource to connect by using a resource ID or alias, from the list of available types. A unique network identifier is generated for all traffic that's sent to this resource. |
31
+
|Private-link resource | The private-link resource to connect by using a resource ID or alias, from the list of available types. A unique network identifier is generated for all traffic that's sent to this resource. |
31
32
|Target subresource | The subresource to connect. Each private-link resource type has various options to select based on preference. |
32
33
|Connection approval method | Automatic or manual. Depending on the Azure role-based access control (RBAC) permissions, your private endpoint can be approved automatically. If you're connecting to a private-link resource without Azure RBAC permissions, use the manual method to allow the owner of the resource to approve the connection. |
33
34
|Request message | You can specify a message for requested connections to be approved manually. This message can be used to identify a specific request. |
@@ -57,10 +58,8 @@ As you're creating private endpoints, consider the following:
57
58
58
59
- The subscription from the private-link resource must also be registered with the Microsoft network resource provider. For more information, see [Azure Resource Providers](../azure-resource-manager/management/resource-providers-and-types.md).
59
60
60
-
## Private-link resources
61
-
A private-link resource is the destination target of a specified private endpoint.
62
-
63
-
The following table lists the available resources that support a private endpoint:
61
+
## Private-link resource
62
+
A private-link resource is the destination target of a specified private endpoint. The following table lists the available resources that support a private endpoint:
64
63
65
64
| Private-link resource name | Resource type | Subresources |
@@ -115,7 +114,7 @@ When you use private endpoints, traffic is secured to a private-link resource. T
115
114
116
115
You can completely lock down your workloads to prevent them from accessing public endpoints to connect to a supported Azure service. This control provides an extra network security layer to your resources, and this security provides protection that helps prevent access to other resources that are hosted on the same Azure service.
117
116
118
-
## Access private-link resources by using an approval workflow
117
+
## Access to a private-link resource using approval workflow
119
118
120
119
You can connect to a private-link resource by using the following connection approval methods:
121
120
@@ -139,13 +138,20 @@ Over a private-endpoint connection, a private-link resource owner can:
139
138
140
139
### Connect by using an alias
141
140
142
-
An alias is a unique moniker that's generated when a service owner creates a private-link service behind a standard load balancer. Service owners can share this alias with their customers offline.
141
+
An alias is a unique moniker that's generated when a service owner creates a private-link service behind a standard load balancer. Service owners can share this alias offline with consumers of your service.
143
142
143
+
<<<<<<< HEAD
144
144
<<<<<<< HEAD
145
145
The customers can request a connection to a private-link service by using either the resource URI or the alias. To connect by using the alias, you must create a private endpoint by using the manual connection approval method. To use the manual connection approval method, set the manual request parameter to `true` during the private endpoint creation workflow. For more information, see [New-AzPrivateEndpoint](/powershell/module/az.network/new-azprivateendpoint) and [az network private-endpoint create](/cli/azure/network/private-endpoint#az_network_private_endpoint_create).
146
146
=======
147
147
Consumers can request a connection to private link service using either the resource URI or the alias. If you want to connect using the alias, you must create a private endpoint using the manual connection approval method. For using manual connection approval method, set manual request parameter to true during private endpoint create flow. For more information, see [New-AzPrivateEndpoint](/powershell/module/az.network/new-azprivateendpoint) and [az network private-endpoint create](/cli/azure/network/private-endpoint#az_network_private_endpoint_create). Note that this manual request can be auto approved if the consumer subscription is allowlisted on the provider side. To learn more, navigate to [controlling service access](/azure/private-link/private-link-service-overview#control-service-access).
148
148
>>>>>>> ba80e2288804a4725e813a5c4bc28c0fdb99ebbd
149
+
=======
150
+
The consumers can request a connection to a private-link service by using either the resource URI or the alias. To connect by using the alias, they would create a private endpoint by using the manual connection approval method. To use the manual connection approval method, they would set the manual request parameter to *True* during the private-endpoint creation workflow. For more information, see [New-AzPrivateEndpoint](/powershell/module/az.network/new-azprivateendpoint) and [az network private-endpoint create](/cli/azure/network/private-endpoint#az_network_private_endpoint_create).
151
+
152
+
> [!NOTE]
153
+
> This manual request can be auto approved if your subscription is allow-listed on the provider side. To learn more, go to [controlling service access](/azure/private-link/private-link-service-overview#control-service-access).
0 commit comments