Skip to content

Commit 29d9a5f

Browse files
committed
syncing changes
2 parents ffd2a02 + 747d9c2 commit 29d9a5f

6 files changed

+52
-46
lines changed

articles/private-link/create-private-endpoint-cli.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ You can create private endpoints for a variety of Azure services, such as Azure
4040

4141
An Azure resource group is a logical container where Azure resources are deployed and managed.
4242

43-
Create a resource group with [az group create](/cli/azure/group#az_group_create):
43+
First, create a resource group by using [az group create](/cli/azure/group#az_group_create):
4444

4545
```azurecli-interactive
4646
az group create \
@@ -50,11 +50,9 @@ az group create \
5050

5151
## Create a virtual network and bastion host
5252

53-
In this section, you create a virtual network, subnet, and bastion host.
53+
Next, create a virtual network, subnet, and bastion host. You'll use the bastion host to connect securely to the VM for testing the private endpoint.
5454

55-
You'll use the bastion host to connect securely to the VM for testing the private endpoint.
56-
57-
1. Create a virtual network by using [az network vnet create](/cli/azure/network/vnet#az_network_vnet_create).
55+
1. Create a virtual network by using [az network vnet create](/cli/azure/network/vnet#az_network_vnet_create):
5856

5957
* Name: **myVNet**
6058
* Address prefix: **10.0.0.0/16**
@@ -73,7 +71,7 @@ You'll use the bastion host to connect securely to the VM for testing the privat
7371
--subnet-prefixes 10.0.0.0/24
7472
```
7573
76-
1. Update the subnet to disable private-endpoint network policies for the private endpoint with [az network vnet subnet update](/cli/azure/network/vnet/subnet#az_network_vnet_subnet_update):
74+
1. Update the subnet to disable private-endpoint network policies for the private endpoint by using [az network vnet subnet update](/cli/azure/network/vnet/subnet#az_network_vnet_subnet_update):
7775
7876
```azurecli-interactive
7977
az network vnet subnet update \
@@ -83,7 +81,7 @@ You'll use the bastion host to connect securely to the VM for testing the privat
8381
--disable-private-endpoint-network-policies true
8482
```
8583
86-
1. Use [az network public-ip create](/cli/azure/network/public-ip#az_network_public_ip_create) to create a public IP address for the bastion host:
84+
1. Create a public IP address for the bastion host by using [az network public-ip create](/cli/azure/network/public-ip#az_network_public_ip_create):
8785
8886
* Standard zone-redundant public IP address name: **myBastionIP**
8987
* Resource group: **CreatePrivateEndpointQS-rg**
@@ -95,7 +93,7 @@ You'll use the bastion host to connect securely to the VM for testing the privat
9593
--sku Standard
9694
```
9795
98-
1. Use [az network vnet subnet create](/cli/azure/network/vnet/subnet#az_network_vnet_subnet_create) to create a bastion subnet:
96+
1. Create a bastion subnet by using [az network vnet subnet create](/cli/azure/network/vnet/subnet#az_network_vnet_subnet_create):
9997
10098
* Name: **AzureBastionSubnet**
10199
* Address prefix: **10.0.1.0/24**
@@ -110,7 +108,7 @@ You'll use the bastion host to connect securely to the VM for testing the privat
110108
--address-prefixes 10.0.1.0/24
111109
```
112110
113-
1. Use [az network bastion create](/cli/azure/network/bastion#az_network_bastion_create) to create a bastion host:
111+
1. Create a bastion host by using [az network bastion create](/cli/azure/network/bastion#az_network_bastion_create):
114112
115113
* Name: **myBastionHost**
116114
* Resource group: **CreatePrivateEndpointQS-rg**
@@ -133,7 +131,9 @@ It can take a few minutes for the Azure Bastion host to deploy.
133131
134132
Next, create a VM that you can use to test the private endpoint.
135133
136-
1. Create a VM with [az vm create](/cli/azure/vm#az_vm_create). At the prompt, provide a password to be used as the credentials for the VM:
134+
1. Create the VM by using [az vm create](/cli/azure/vm#az_vm_create).
135+
136+
1. At the prompt, provide a password to be used as the credentials for the VM:
137137
138138
* Name: **myVM**
139139
* Resource group: **CreatePrivateEndpointQS-rg**
@@ -156,11 +156,11 @@ Next, create a VM that you can use to test the private endpoint.
156156
157157
## Create a private endpoint
158158
159-
Next, you create the private endpoint.
159+
Next, create the private endpoint.
160160
161-
1. Use [az webapp list](/cli/azure/webapp#az_webapp_list) to place the resource ID of the web app that you created earlier into a shell variable.
161+
1. Place the resource ID of the web app that you created earlier into a shell variable by using [az webapp list](/cli/azure/webapp#az_webapp_list).
162162
163-
1. Use [az network private-endpoint create](/cli/azure/network/private-endpoint#az_network_private_endpoint_create) to create the endpoint and connection:
163+
1. Create the endpoint and connection by using [az network private-endpoint create](/cli/azure/network/private-endpoint#az_network_private_endpoint_create):
164164
165165
* Name: **myPrivateEndpoint**
166166
* Resource group: **CreatePrivateEndpointQS-rg**
@@ -186,11 +186,11 @@ Next, you create the private endpoint.
186186
187187
## Configure the private DNS zone
188188
189-
Next, you create and configure the private DNS zone by using [az network private-dns zone create](/cli/azure/network/private-dns/zone#az_network_private_dns_zone_create).
189+
Next, create and configure the private DNS zone by using [az network private-dns zone create](/cli/azure/network/private-dns/zone#az_network_private_dns_zone_create).
190190
191-
1. Use [az network private-dns link vnet create](/cli/azure/network/private-dns/link/vnet#az_network_private_dns_link_vnet_create) to create the virtual network link to the DNS zone.
191+
1. Create the virtual network link to the DNS zone by using [az network private-dns link vnet create](/cli/azure/network/private-dns/link/vnet#az_network_private_dns_link_vnet_create).
192192
193-
1. Create a DNS zone group with [az network private-endpoint dns-zone-group create](/cli/azure/network/private-endpoint/dns-zone-group#az_network_private_endpoint_dns_zone_group_create).
193+
1. Create a DNS zone group by using [az network private-endpoint dns-zone-group create](/cli/azure/network/private-endpoint/dns-zone-group#az_network_private_endpoint_dns_zone_group_create).
194194
195195
* Zone name: **privatelink.azurewebsites.net**
196196
* Virtual network: **myVNet**
@@ -221,7 +221,7 @@ Next, you create and configure the private DNS zone by using [az network private
221221
222222
## Test connectivity to the private endpoint
223223
224-
Finally, use the VM that you created earlier to connect to the SQL server across the private endpoint.
224+
Finally, use the VM that you created earlier to connect to the SQL Server instance across the private endpoint.
225225
226226
1. Sign in to the [Azure portal](https://portal.azure.com).
227227
@@ -239,7 +239,7 @@ Finally, use the VM that you created earlier to connect to the SQL server across
239239
240240
1. After you've connected, open PowerShell on the server.
241241
242-
1. Enter `nslookup <your-webapp-name>.azurewebsites.net`. Replace **\<your-webapp-name>** with the name of the web app that you created earlier. You'll receive a message that's similar to the following:
242+
1. Enter `nslookup <your-webapp-name>.azurewebsites.net`, replacing *\<your-webapp-name>* with the name of the web app that you created earlier. You'll receive a message that's similar to the following:
243243
244244
```powershell
245245
Server: UnKnown
@@ -253,15 +253,15 @@ Finally, use the VM that you created earlier to connect to the SQL server across
253253
254254
A private IP address of *10.0.0.5* is returned for the web app name. This address is in the subnet of the virtual network that you created earlier.
255255
256-
1. In the bastion connection to **myVM**, open your web browser.
256+
1. In the bastion connection to *myVM**, open your web browser.
257257
258-
1. Enter the URL of your web app, **https://\<your-webapp-name>.azurewebsites.net**.
258+
1. Enter the URL of your web app, *https://\<your-webapp-name>.azurewebsites.net*.
259259
260260
If your web app hasn't been deployed, you'll get the following default web app page:
261261
262262
:::image type="content" source="./media/create-private-endpoint-portal/web-app-default-page.png" alt-text="Screenshot of the default web app page on a browser." border="true":::
263263
264-
1. Close the connection to **myVM**.
264+
1. Close the connection to *myVM*.
265265
266266
## Clean up resources
267267

articles/private-link/create-private-endpoint-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: quickstart
88
ms.date: 10/20/2020
99
ms.author: allensu
1010
ms.custom: mode-ui
11-
#Customer intent: As someone with a basic network background who is new to Azure, I want to create a private endpoint on a SQL server so that I can securely connect to it.
11+
#Customer intent: As someone who has a basic network background but is new to Azure, I want to create a private endpoint on a SQL server so that I can securely connect to it.
1212
---
1313

1414
# Quickstart: Create a private endpoint by using the Azure portal
@@ -206,7 +206,7 @@ Use the VM that you created earlier to connect to the web app across the private
206206

207207
1. After you've connected, open PowerShell on the server.
208208

209-
1. Enter `nslookup <your-webapp-name>.azurewebsites.net`. Replace **\<your-webapp-name>** with the name of the web app that you created earlier. You'll receive a message that's similar to the following:
209+
1. Enter `nslookup <your-webapp-name>.azurewebsites.net`, replacing *\<your-webapp-name>* with the name of the web app that you created earlier. You'll receive a message that's similar to the following:
210210

211211
```powershell
212212
Server: UnKnown

articles/private-link/create-private-endpoint-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ Next, create a VM that you can use to test the private endpoint.
179179
* [New-AzPrivateLinkServiceConnection](/powershell/module/az.network/New-AzPrivateLinkServiceConnection)
180180
* [New-AzPrivateEndpoint](/powershell/module/az.network/new-azprivateendpoint)
181181
182-
1. Place the web app into a variable. Replace <webapp-resource-group-name> with the resource group name of your web app, and replace <your-webapp-name> with your web app name.
182+
1. Place the web app into a variable. Replace \<webapp-resource-group-name> with the resource group name of your web app, and replace \<your-webapp-name> with your web app name.
183183
184184
```azurepowershell-interactive
185185
$webapp = Get-AzWebApp -ResourceGroupName <webapp-resource-group-name> -Name <your-webapp-name>
@@ -345,4 +345,4 @@ You used the VM to securely test connectivity to the web app across the private
345345

346346
For more information about the services that support private endpoints, see:
347347
> [!div class="nextstepaction"]
348-
> [What is Azure Private Link?](private-link-overview.md#availability)
348+
> [What is Azure Private Link?](private-link-overview.md#availability)

articles/private-link/create-private-endpoint-template.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ You need an Azure account with an active subscription. If you don't already have
3131

3232
This template creates a private endpoint for an instance of Azure SQL Database.
3333

34-
The template that's used in this quickstart is from [Azure Quickstart Templates](https://azure.microsoft.com/resources/templates/private-endpoint-sql/).
34+
The template that this quickstart uses is from [Azure Quickstart Templates](https://azure.microsoft.com/resources/templates/private-endpoint-sql/).
3535

3636
:::code language="json" source="~/quickstart-templates/quickstarts/microsoft.sql/private-endpoint-sql/azuredeploy.json":::
3737

@@ -78,15 +78,15 @@ Connect to the VM _myVm{uniqueid}_ from the internet by doing the following:
7878

7979
1. Open the downloaded RDP file.
8080

81-
a. If prompted, select **Connect**.
81+
a. If you're prompted, select **Connect**.
8282
b. Enter the username and password that you specified when you created the VM.
8383

8484
> [!NOTE]
8585
> You might need to select **More choices** > **Use a different account** to specify the credentials you entered when you created the VM.
8686
8787
1. Select **OK**.
8888

89-
You might receive a certificate warning during the sign-in process. If you receive a certificate warning, select **Yes** or **Continue**.
89+
You might receive a certificate warning during the sign-in process. If you do, select **Yes** or **Continue**.
9090

9191
1. After the VM desktop appears, minimize it to go back to your local desktop.
9292

@@ -137,4 +137,4 @@ Remove-AzResourceGroup -Name <your resource group name>
137137

138138
For more information about the services that support private endpoints, see:
139139
> [!div class="nextstepaction"]
140-
> [Private Link availability](private-link-overview.md#availability)
140+
> [What is Azure Private Link?](private-link-overview.md#availability)

articles/private-link/private-endpoint-overview.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -18,16 +18,17 @@ The service could be an Azure service such as:
1818
* Azure Storage
1919
* Azure Cosmos DB
2020
* Azure SQL Database
21-
* Your own service, using a [Private Link service](private-link-service-overview.md).
21+
* Your own service, using [Private Link service](private-link-service-overview.md).
2222

2323
## Private endpoint properties
24-
A private endpoint specifies the following properties:
24+
25+
A private endpoint specifies the following properties:
2526

2627
|Property |Description |
2728
|---------|---------|
2829
|Name | A unique name within the resource group. |
2930
|Subnet | The subnet to deploy, where the private IP address is assigned. For subnet requirements, see the [Limitations](#limitations) section later in this article. |
30-
|Private link resource | The private-link resource to connect by using a resource ID or alias, from the list of available types. A unique network identifier is generated for all traffic that's sent to this resource. |
31+
|Private-link resource | The private-link resource to connect by using a resource ID or alias, from the list of available types. A unique network identifier is generated for all traffic that's sent to this resource. |
3132
|Target subresource | The subresource to connect. Each private-link resource type has various options to select based on preference. |
3233
|Connection approval method | Automatic or manual. Depending on the Azure role-based access control (RBAC) permissions, your private endpoint can be approved automatically. If you're connecting to a private-link resource without Azure RBAC permissions, use the manual method to allow the owner of the resource to approve the connection. |
3334
|Request message | You can specify a message for requested connections to be approved manually. This message can be used to identify a specific request. |
@@ -57,10 +58,8 @@ As you're creating private endpoints, consider the following:
5758

5859
- The subscription from the private-link resource must also be registered with the Microsoft network resource provider. For more information, see [Azure Resource Providers](../azure-resource-manager/management/resource-providers-and-types.md).
5960

60-
## Private-link resources
61-
A private-link resource is the destination target of a specified private endpoint.
62-
63-
The following table lists the available resources that support a private endpoint:
61+
## Private-link resource
62+
A private-link resource is the destination target of a specified private endpoint. The following table lists the available resources that support a private endpoint:
6463

6564
| Private-link resource&nbsp;name | Resource type | Subresources |
6665
| ---------------------------| ------------- | ------------- |
@@ -90,7 +89,7 @@ The following table lists the available resources that support a private endpoin
9089
| Azure Machine Learning | Microsoft.MachineLearningServices/workspaces | amlworkspace |
9190
| Azure Migrate | Microsoft.Migrate/assessmentProjects | project |
9291
| Application Gateway | Microsoft.Network/applicationgateways | application gateway |
93-
| Private Link Service (your own service) | Microsoft.Network/privateLinkServices | empty |
92+
| Private Link service (your own service) | Microsoft.Network/privateLinkServices | empty |
9493
| Power BI | Microsoft.PowerBI/privateLinkServicesForPowerBI | Power BI |
9594
| Azure Purview | Microsoft.Purview/accounts | account |
9695
| Azure Purview | Microsoft.Purview/accounts | portal |
@@ -115,7 +114,7 @@ When you use private endpoints, traffic is secured to a private-link resource. T
115114

116115
You can completely lock down your workloads to prevent them from accessing public endpoints to connect to a supported Azure service. This control provides an extra network security layer to your resources, and this security provides protection that helps prevent access to other resources that are hosted on the same Azure service.
117116

118-
## Access private-link resources by using an approval workflow
117+
## Access to a private-link resource using approval workflow
119118

120119
You can connect to a private-link resource by using the following connection approval methods:
121120

@@ -139,13 +138,20 @@ Over a private-endpoint connection, a private-link resource owner can:
139138
140139
### Connect by using an alias
141140

142-
An alias is a unique moniker that's generated when a service owner creates a private-link service behind a standard load balancer. Service owners can share this alias with their customers offline.
141+
An alias is a unique moniker that's generated when a service owner creates a private-link service behind a standard load balancer. Service owners can share this alias offline with consumers of your service.
143142

143+
<<<<<<< HEAD
144144
<<<<<<< HEAD
145145
The customers can request a connection to a private-link service by using either the resource URI or the alias. To connect by using the alias, you must create a private endpoint by using the manual connection approval method. To use the manual connection approval method, set the manual request parameter to `true` during the private endpoint creation workflow. For more information, see [New-AzPrivateEndpoint](/powershell/module/az.network/new-azprivateendpoint) and [az network private-endpoint create](/cli/azure/network/private-endpoint#az_network_private_endpoint_create).
146146
=======
147147
Consumers can request a connection to private link service using either the resource URI or the alias. If you want to connect using the alias, you must create a private endpoint using the manual connection approval method. For using manual connection approval method, set manual request parameter to true during private endpoint create flow. For more information, see [New-AzPrivateEndpoint](/powershell/module/az.network/new-azprivateendpoint) and [az network private-endpoint create](/cli/azure/network/private-endpoint#az_network_private_endpoint_create). Note that this manual request can be auto approved if the consumer subscription is allowlisted on the provider side. To learn more, navigate to [controlling service access](/azure/private-link/private-link-service-overview#control-service-access).
148148
>>>>>>> ba80e2288804a4725e813a5c4bc28c0fdb99ebbd
149+
=======
150+
The consumers can request a connection to a private-link service by using either the resource URI or the alias. To connect by using the alias, they would create a private endpoint by using the manual connection approval method. To use the manual connection approval method, they would set the manual request parameter to *True* during the private-endpoint creation workflow. For more information, see [New-AzPrivateEndpoint](/powershell/module/az.network/new-azprivateendpoint) and [az network private-endpoint create](/cli/azure/network/private-endpoint#az_network_private_endpoint_create).
151+
152+
> [!NOTE]
153+
> This manual request can be auto approved if your subscription is allow-listed on the provider side. To learn more, go to [controlling service access](/azure/private-link/private-link-service-overview#control-service-access).
154+
>>>>>>> 747d9c2881a8981eb546358c4569f79252823f75
149155
150156
## DNS configuration
151157

0 commit comments

Comments
 (0)