You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/howto-set-up-private-access.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ This command will prompt your web browser to launch and load an Azure sign-in pa
70
70
71
71
1. Select **Next : Virtual Network >**.
72
72
73
-
1. Select an existing **Virtual network** to deploy the private endpoint to. If you don't have a virtual network, [create a virtual network](../private-link/create-private-endpoint-portal.md#create-a-virtual-network-and-bastion-host).
73
+
1. Select an existing **Virtual network** to deploy the private endpoint to. If you don't have a virtual network, [create a virtual network](../private-link/create-private-endpoint-portal.md).
Copy file name to clipboardExpand all lines: articles/managed-grafana/how-to-set-up-private-access.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ In this guide, you'll learn how to disable public access to your Azure Managed G
29
29
Public access is enabled by default when you create an Azure Grafana workspace. Disabling public access prevents all traffic from accessing the resource unless you go through a private endpoint.
30
30
31
31
> [!NOTE]
32
-
> When private access (preview) is enabled, pinging charts using the [*Pin to Grafana*](../azure-monitor/visualize/grafana-plugin.md#pin-charts-from-the-azure-portal-to-azure-managed-grafana) feature will no longer work as the Azure portal can’t access an Azure Managed Grafana workspace on a private IP address.
32
+
> When private access (preview) is enabled, pinging charts using the [*Pin to Grafana*](../azure-monitor/visualize/grafana-plugin.md#pin-charts-from-the-azure-portal-to-azure-managed-grafana) feature will no longer work as the Azure portal can't access an Azure Managed Grafana workspace on a private IP address.
33
33
34
34
### [Portal](#tab/azure-portal)
35
35
@@ -82,7 +82,7 @@ Once you have disabled public access, set up a [private endpoint](../private-lin
82
82
83
83
1. Select **Next : Virtual Network >**.
84
84
85
-
1. Select an existing **Virtual network** to deploy the private endpoint to. If you don't have a virtual network, [create a virtual network](../private-link/create-private-endpoint-portal.md#create-a-virtual-network-and-bastion-host).
85
+
1. Select an existing **Virtual network** to deploy the private endpoint to. If you don't have a virtual network, [create a virtual network](../private-link/create-private-endpoint-portal.md).
# Quickstart: Use Bicep templates to create a virtual network
15
15
16
-
This quickstart shows you how to create a virtual network with two virtual machines (VMs), and then deploy Azure Bastion on the virtual network, by using Bicep templates. You then securely connect to the VMs from the internet by using Azure Bastion, and communicate privately between the VMs.
16
+
This quickstart shows you how to create a virtual network with two virtual machines (VMs), and then deploy Azure Bastion on the virtual network, by using Bicep templates. You then securely connect to the VMs from the internet by using Bastion and start private communication between the VMs.
17
17
18
18
A virtual network is the fundamental building block for private networks in Azure. Azure Virtual Network enables Azure resources like VMs to securely communicate with each other and the internet.
19
19
@@ -23,11 +23,11 @@ A virtual network is the fundamental building block for private networks in Azur
23
23
24
24
- An Azure account with an active subscription. You can [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
25
25
26
-
- To deploy the Bicep files, either Azure CLI or PowerShell installed.
26
+
- To deploy the Bicep files, either the Azure CLI or Azure PowerShell installed:
27
27
28
28
# [CLI](#tab/azure-cli)
29
29
30
-
1.[Install Azure CLI locally](/cli/azure/install-azure-cli) to run the commands. You need Azure CLI version 2.0.28 or later. Run [az version](/cli/azure/reference-index?#az-version) to find your installed version and dependent libraries, and run [az upgrade](/cli/azure/reference-index?#az-upgrade) to upgrade.
30
+
1.[Install the Azure CLI locally](/cli/azure/install-azure-cli) to run the commands. You need Azure CLI version 2.0.28 or later. Run [az version](/cli/azure/reference-index?#az-version) to find your installed version and dependent libraries, and run [az upgrade](/cli/azure/reference-index?#az-upgrade) to upgrade.
31
31
32
32
1. Sign in to Azure by using the [az login](/cli/azure/reference-index#az-login) command.
33
33
@@ -45,7 +45,7 @@ A virtual network is the fundamental building block for private networks in Azur
45
45
46
46
## Create the virtual network and VMs
47
47
48
-
This quickstart uses the [Two VMs in VNET](https://github.com/Azure/azure-quickstart-templates/blob/master/quickstarts/microsoft.compute/2-vms-internal-load-balancer/main.bicep) Bicep template from [Azure Quickstart Templates](https://github.com/Azure/azure-quickstart-templates) to create the virtual network, resource subnet, and VMs. The Bicep template defines the following Azure resources:
48
+
This quickstart uses the [Two VMs in VNET](https://github.com/Azure/azure-quickstart-templates/blob/master/quickstarts/microsoft.compute/2-vms-internal-load-balancer/main.bicep) Bicep template from [Azure Resource Manager Quickstart Templates](https://github.com/Azure/azure-quickstart-templates) to create the virtual network, resource subnet, and VMs. The Bicep template defines the following Azure resources:
49
49
50
50
-[Microsoft.Network virtualNetworks](/azure/templates/microsoft.network/virtualnetworks): Creates an Azure virtual network.
51
51
-[Microsoft.Network virtualNetworks/subnets](/azure/templates/microsoft.network/virtualnetworks/subnets): Creates a subnet for the VMs.
@@ -62,7 +62,7 @@ Review the Bicep file:
62
62
### Deploy the Bicep template
63
63
64
64
1. Save the Bicep file to your local computer as *main.bicep*.
65
-
1. Deploy the Bicep file by using either Azure CLI or Azure PowerShell.
65
+
1. Deploy the Bicep file by using either the Azure CLI or Azure PowerShell:
66
66
67
67
# [CLI](#tab/azure-cli)
68
68
@@ -88,17 +88,17 @@ When the deployment finishes, a message indicates that the deployment succeeded.
88
88
89
89
## Deploy Azure Bastion
90
90
91
-
Azure Bastion uses your browser to connect to VMs in your virtual network over secure shell (SSH) or remote desktop protocol (RDP) by using their private IP addresses. The VMs don't need public IP addresses, client software, or special configuration. For more information about Azure Bastion, see [Azure Bastion](~/articles/bastion/bastion-overview.md).
91
+
Bastion uses your browser to connect to VMs in your virtual network over Secure Shell (SSH) or Remote Desktop Protocol (RDP) by using their private IP addresses. The VMs don't need public IP addresses, client software, or special configuration. For more information about Bastion, see [What is Azure Bastion?](~/articles/bastion/bastion-overview.md).
Use the [Azure Bastion as a service](https://github.com/Azure/azure-quickstart-templates/blob/master/quickstarts/microsoft.network/azure-bastion/main.bicep) Bicep template from [Azure Quickstart Templates](https://github.com/Azure/azure-quickstart-templates) to deploy and configure Azure Bastion in your virtual network. This Bicep template defines the following Azure resources:
96
+
Use the [Azure Bastion as a Service](https://github.com/Azure/azure-quickstart-templates/blob/master/quickstarts/microsoft.network/azure-bastion/main.bicep) Bicep template from [Azure Resource Manager Quickstart Templates](https://github.com/Azure/azure-quickstart-templates) to deploy and configure Bastion in your virtual network. This Bicep template defines the following Azure resources:
97
97
98
-
-[Microsoft.Network virtualNetworks/subnets](/azure/templates/microsoft.network/virtualnetworks/subnets): Creates an AzureBastionSubnet subnet.
98
+
-[Microsoft.Network virtualNetworks/subnets](/azure/templates/microsoft.network/virtualnetworks/subnets): Creates an **AzureBastionSubnet** subnet.
99
99
-[Microsoft.Network bastionHosts](/azure/templates/microsoft.network/bastionhosts): Creates the Bastion host.
100
-
-[Microsoft.Network publicIPAddresses](/azure/templates/microsoft.network/publicipaddresses): Creates a public IP address for the Azure Bastion host.
101
-
-[Microsoft Network networkSecurityGroups](/azure/templates/microsoft.network/networksecuritygroups): Controls the network security group (NSG) settings.
100
+
-[Microsoft.Network publicIPAddresses](/azure/templates/microsoft.network/publicipaddresses): Creates a public IP address for the Bastion host.
101
+
-[Microsoft Network networkSecurityGroups](/azure/templates/microsoft.network/networksecuritygroups): Controls the settings for network security groups.
102
102
103
103
Review the Bicep file:
104
104
@@ -114,9 +114,9 @@ Review the Bicep file:
114
114
- Line 12: Change `param vnetNewOrExisting string` from `'new'` to `'existing'`.
115
115
- Line 15: Change `param bastionSubnetIpPrefix string` from `'10.1.1.0/26'` to `'10.0.1.0/26'`.
116
116
- Line 18: Change `param bastionHostName string` to `param bastionHostName = 'VNet-bastion'`.
117
-
118
-
The first 18 lines of your Bicep file should now look like this:
119
-
117
+
118
+
The first 18 lines of your Bicep file should now look like this example:
119
+
120
120
```bicep
121
121
@description('Name of new or existing vnet to which Azure Bastion should be deployed')
122
122
param vnetName string = 'VNet'
@@ -141,7 +141,7 @@ Review the Bicep file:
141
141
142
142
1. Save the *bastion.bicep* file.
143
143
144
-
1. Deploy the Bicep file by using either Azure CLI or Azure PowerShell.
144
+
1. Deploy the Bicep file by using either the Azure CLI or Azure PowerShell:
145
145
146
146
# [CLI](#tab/azure-cli)
147
147
@@ -163,12 +163,12 @@ Review the Bicep file:
163
163
164
164
When the deployment finishes, a message indicates that the deployment succeeded.
165
165
166
-
>[!NOTE]
167
-
>VMs in a virtual network with a Bastion host don't need public IP addresses. Bastion provides the public IP, and the VMs use private IPs to communicate within the network. You can remove the public IPs from any VMs in Bastion-hosted virtual networks. For more information, see [Dissociate a public IP address from an Azure VM](ip-services/remove-public-ip-address-vm.md).
166
+
>[!NOTE]
167
+
>VMs in a virtual network with a Bastion host don't need public IP addresses. Bastion provides the public IP, and the VMs use private IPs to communicate within the network. You can remove the public IPs from any VMs in Bastion-hosted virtual networks. For more information, see [Dissociate a public IP address from an Azure VM](ip-services/remove-public-ip-address-vm.md).
168
168
169
169
## Review deployed resources
170
170
171
-
Use Azure CLI, Azure PowerShell, or the Azure portal to review the deployed resources.
171
+
Use the Azure CLI, Azure PowerShell, or the Azure portal to review the deployed resources:
1. In the [Azure portal](https://portal.azure.com), search for and select *resource groups*, and on the **Resource groups** page, select **TestRG** from the list of resource groups.
188
-
1. On the **Overview** page for **TestRG**, review all the resources that you created, including the virtual network, the two VMs, and the Azure Bastion host.
189
-
1. Select the **VNet** virtual network, and on the **Overview** page for **VNet**, note the defined address space of **10.0.0.0/16**.
190
-
1.Select **Subnets** from the left menu, and on the **Subnets** page, note the deployed subnets of **backendSubnet** and **AzureBastionSubnet** with the assigned values from the Bicep files.
187
+
1. In the [Azure portal](https://portal.azure.com), search for and select **resource groups**. On the **Resource groups** page, select **TestRG** from the list of resource groups.
188
+
1. On the **Overview** page for **TestRG**, review all the resources that you created, including the virtual network, the two VMs, and the Bastion host.
189
+
1. Select the **VNet** virtual network. On the **Overview** page for **VNet**, note the defined address space of **10.0.0.0/16**.
190
+
1.On the left menu, select **Subnets**. On the **Subnets** page, note the deployed subnets of **backendSubnet** and **AzureBastionSubnet** with the assigned values from the Bicep files.
1. At the top of the **BackendVM1** page, select the dropdown arrow next to **Connect**, and then select **Bastion**.
201
201
202
-
:::image type="content" source="./media/quick-create-bicep/connect-to-virtual-machine.png" alt-text="Screenshot of connecting to VM1 with Azure Bastion." border="true":::
202
+
:::image type="content" source="./media/quick-create-bicep/connect-to-virtual-machine.png" alt-text="Screenshot of connecting to the first virtual machine with Azure Bastion." border="true":::
203
203
204
-
1. On the **Bastion** page, enter the username and password you created for the VM, and then select **Connect**.
204
+
1. On the **Bastion** page, enter the username and password that you created for the VM, and then select **Connect**.
205
205
206
206
## Communicate between VMs
207
207
208
-
1. From the desktop of BackendVM1, open PowerShell.
208
+
1. From the desktop of **BackendVM1**, open PowerShell.
209
209
210
210
1. Enter `ping BackendVM0`. You get a reply similar to the following message:
1. In the Azure portal, on the **Resource groups** page, select the **TestRG** resource group.
277
277
1. At the top of the **TestRG** page, select **Delete resource group**.
278
-
1. On the **Delete a resource group** page, under **Enter resource group name to confirm deletion**, enter *TestRG*, and then select **Delete**.
278
+
1. On the **Delete a resource group** page, under **Enter resource group name to confirm deletion**, enter **TestRG**, and then select **Delete**.
279
279
1. Select **Delete** again.
280
280
281
281
---
282
282
283
283
## Next steps
284
284
285
-
In this quickstart, you created a virtual network with two subnets, one containing two VMs and the other for Azure Bastion. You deployed Azure Bastion and used it to connect to the VMs, and securely communicated between the VMs. To learn more about virtual network settings, see [Create, change, or delete a virtual network](manage-virtual-network.md).
285
+
In this quickstart, you created a virtual network that has two subnets: one that contains two VMs and the other for Bastion. You deployed Bastion, and you used it to connect to the VMs and start communication between the VMs. To learn more about virtual network settings, see [Create, change, or delete a virtual network](manage-virtual-network.md).
286
+
287
+
Private communication between VMs is unrestricted in a virtual network. To learn more about configuring various types of VM communications in a virtual network, continue to the next article:
286
288
287
-
Private communication between VMs is unrestricted in a virtual network. Continue to the next article to learn more about configuring different types of VM network communications.
0 commit comments