Skip to content

Commit 56a6d12

Browse files
author
Jill Grant
authored
Merge pull request #292653 from AbdullahBell/private-link-freshness-2
Private Link: Freshness: Image Review: 5 articles updated for freshness
2 parents b6b1cd0 + e0db865 commit 56a6d12

5 files changed

+49
-63
lines changed

articles/private-link/private-endpoint-export-dns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: abell
66
ms.author: abell
77
ms.service: azure-private-link
88
ms.topic: how-to
9-
ms.date: 07/25/2021
9+
ms.date: 01/06/2025
1010
ms.custom: template-how-to
1111
---
1212

articles/private-link/troubleshoot-private-link-connectivity.md

Lines changed: 17 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Step-by-step guidance to diagnose private link connectivity
44
author: abell
55
ms.service: azure-private-link
66
ms.topic: troubleshooting
7-
ms.date: 03/29/2020
7+
ms.date: 01/06/2025
88
ms.author: abell
99
---
1010

@@ -42,8 +42,6 @@ If you experience connectivity problems with your private link setup, review the
4242

4343
b. On the left pane, select **Private link services**.
4444

45-
:::image type="content" source="./media/private-link-tsg/private-link-service.png" alt-text="Screenshot of Private link services.":::
46-
4745
c. Filter and select the private link service that you want to diagnose.
4846

4947
d. Review the private endpoint connections.
@@ -52,52 +50,40 @@ If you experience connectivity problems with your private link setup, review the
5250

5351
- If the state is **Pending**, select it and approve it.
5452

55-
:::image type="content" source="./media/private-link-tsg/pls-private-endpoint-connections.png" alt-text="Screenshot of Private endpoint connections.":::
56-
57-
- Go to the private endpoint that you're connecting from by selecting the name. Make sure the connection status shows as **Approved**.
58-
59-
:::image type="content" source="./media/private-link-tsg/pls-private-endpoint-overview.png" alt-text="Screenshot of private endpoint connection overview.":::
53+
- Select the private endpoint you're connecting from by clicking on its name. Ensure the connection status is **Approved**.
6054

6155
- After both sides are approved, try the connectivity again.
6256

6357
e. Review **Alias** on the **Overview** tab and **Resource ID** on the **Properties** tab.
64-
- Make sure the **Alias** and **Resource ID** information matches the **Alias** and **Resource ID** you're using to create a private endpoint to this service.
65-
66-
:::image type="content" source="./media/private-link-tsg/pls-overview-pane-alias.png" alt-text="Screenshot of verify alias information.":::
58+
- Ensure that the **Alias** and **Resource ID** details match the ones you're using to create a private endpoint for this service.
6759

68-
:::image type="content" source="./media/private-link-tsg/pls-properties-pane-resourceid.png" alt-text="Screenshot of verify resource ID information.":::
69-
70-
f. Review **Visibility** information on the **Overview** tab.
60+
f. Review **Visibility** information on the **Overview** tab. Select **See more** in the overview pane to see the details.
7161

7262
- Make sure that your subscription falls under the **Visibility** scope.
7363

74-
:::image type="content" source="./media/private-link-tsg/pls-overview-pane-visibility.png" alt-text="Screenshot of verify visibility information.":::
75-
7664
g. Review **Load balancer** information on the **Overview** tab.
7765

78-
- You can go to the load balancer by selecting the load balancer link.
79-
80-
:::image type="content" source="./media/private-link-tsg/pls-overview-pane-ilb.png" alt-text="Screenshot of verify load balancer information.":::
81-
82-
- Make sure that the load balancer settings are configured as per your expectations.
66+
- View the load balancer by selecting the load balancer link in the *Overview* pane.
67+
68+
- Confirm the load balancer settings are configured as per your requirements.
8369

8470
- Review **Frontend IP configuration**.
8571

8672
- Review **Backend pools**.
8773

8874
- Review **Load balancing rules**.
8975

90-
:::image type="content" source="./media/private-link-tsg/pls-ilb-properties.png" alt-text="Screenshot of verify load balancer properties.":::
91-
92-
- Make sure the load balancer is working as per the previous settings.
76+
- Confirm load balancer is working as per the previous settings.
9377

94-
- Select a VM in any subnet other than the subnet where the load balancer back-end pool is available.
95-
96-
- Try accessing the load balancer front end from the previous VM.
78+
- Choose a virtual machine located in a subnet different from the one where the load balancer back-end pool resides.
79+
80+
- Access the load balancer front end from the previous virtual machine.
9781

98-
- If the connection makes it to the back-end pool as per load-balancing rules, your load balancer is operational.
82+
- If the connection reaches the back-end pool according to the load-balancing rules, then your load balancer is functioning correctly.
9983

100-
- You can also review the load balancer metric through Azure Monitor to see if data is flowing through the load balancer.
84+
- If the connection doesn't reach the back-end pool, then you need to troubleshoot the load balancer configuration.
85+
86+
- Use Azure Monitor to review load balancer metrics and verify if data is flowing through the load balancer.
10187

10288
1. Use [Azure Monitor](/azure/azure-monitor/overview) to see if data is flowing.
10389

@@ -107,7 +93,7 @@ If you experience connectivity problems with your private link setup, review the
10793

10894
- See if data is flowing when you attempt to connect to the private link service. Expect a delay of approximately 10 minutes.
10995

110-
:::image type="content" source="./media/private-link-tsg/pls-metrics.png" alt-text="Screenshot of verify private link service metrics.":::
96+
11197

11298
1. Use [Azure Monitor - Networks](../network-watcher/network-insights-overview.md#resource-view) for insights and to see a resource view of the resources by going to:
11399

@@ -123,6 +109,6 @@ Contact the [Azure Support](https://portal.azure.com/#blade/Microsoft_Azure_Supp
123109

124110
## Next steps
125111

126-
* [Create a private link service (CLI)](./create-private-link-service-cli.md)
112+
* [Create a private link service (CLI)](./create-private-link-service-cli.md)
127113

128114
* [Azure Private Endpoint troubleshooting guide](troubleshoot-private-endpoint-connectivity.md)

articles/private-link/tutorial-private-endpoint-sql-cli.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: abell
66
# Customer intent: As someone with a basic network background, but is new to Azure, I want to create a private endpoint on a SQL server so that I can securely connect to it.
77
ms.service: azure-private-link
88
ms.topic: tutorial
9-
ms.date: 11/03/2020
9+
ms.date: 01/06/2025
1010
ms.author: abell
1111
ms.custom: template-tutorial, fasttrack-edit, devx-track-azurecli
1212
---
@@ -49,9 +49,9 @@ az group create \
4949

5050
## Create a virtual network and bastion host
5151

52-
In this section, you'll create a virtual network, subnet, and bastion host.
52+
In this section, you create a virtual network, subnet, and bastion host.
5353

54-
The bastion host will be used to connect securely to the virtual machine for testing the private endpoint.
54+
The bastion host is used to connect securely to the virtual machine for testing the private endpoint.
5555

5656
Create a virtual network with [az network vnet create](/cli/azure/network/vnet#az-network-vnet-create)
5757

@@ -130,7 +130,7 @@ It can take a few minutes for the Azure Bastion host to deploy.
130130

131131
## Create test virtual machine
132132

133-
In this section, you'll create a virtual machine that will be used to test the private endpoint.
133+
In this section, you create a virtual machine that is used to test the private endpoint.
134134

135135
Create a VM with [az vm create](/cli/azure/vm#az-vm-create). When prompted, provide a password to be used as the credentials for the VM:
136136

@@ -155,7 +155,7 @@ az vm create \
155155

156156
## Create an Azure SQL server
157157

158-
In this section, you'll create a SQL server and database.
158+
In this section, you create a SQL server and database.
159159

160160
Use [az sql server create](/cli/azure/sql/server#az-sql-server-create) to create a SQL server:
161161

@@ -189,7 +189,7 @@ az sql db create \
189189

190190
## Create private endpoint
191191

192-
In this section, you'll create the private endpoint.
192+
In this section, you create the private endpoint.
193193

194194
Use [az sql server list](/cli/azure/sql/server#az-sql-server-list) to place the resource ID of the SQL server into a shell variable.
195195

@@ -220,9 +220,9 @@ az network private-endpoint create \
220220

221221
In this section, you'll create and configure the private DNS zone using [az network private-dns zone create](/cli/azure/network/private-dns/zone#az-network-private-dns-zone-create).
222222

223-
You'll use [az network private-dns link vnet create](/cli/azure/network/private-dns/link/vnet#az-network-private-dns-link-vnet-create) to create the virtual network link to the dns zone.
223+
You use [az network private-dns link vnet create](/cli/azure/network/private-dns/link/vnet#az-network-private-dns-link-vnet-create) to create the virtual network link to the dns zone.
224224

225-
You'll create a dns zone group with [az network private-endpoint dns-zone-group create](/cli/azure/network/private-endpoint/dns-zone-group#az-network-private-endpoint-dns-zone-group-create).
225+
You create a dns zone group with [az network private-endpoint dns-zone-group create](/cli/azure/network/private-endpoint/dns-zone-group#az-network-private-endpoint-dns-zone-group-create).
226226

227227
* Zone named **privatelink.database.windows.net**
228228
* In virtual network **myVNet**.
@@ -253,7 +253,7 @@ az network private-endpoint dns-zone-group create \
253253

254254
## Test connectivity to private endpoint
255255

256-
In this section, you'll use the virtual machine you created in the previous step to connect to the SQL server across the private endpoint.
256+
In this section, you use the virtual machine you created in the previous step to connect to the SQL server across the private endpoint.
257257

258258
1. Sign in to the [Azure portal](https://portal.azure.com).
259259

@@ -271,19 +271,19 @@ In this section, you'll use the virtual machine you created in the previous step
271271

272272
8. Open Windows PowerShell on the server after you connect.
273273

274-
9. Enter `nslookup <sqlserver-name>.database.windows.net`. Replace **\<sqlserver-name>** with the name of the SQL server you created in the previous steps. You'll receive a message similar to what is displayed below:
274+
9. Enter `nslookup <sqlserver-name>.database.windows.net`. Replace **\<sqlserver-name>** with the name of the SQL server you created in the previous steps. You receive a message similar to what is displayed below:
275275

276276
```powershell
277277
Server: UnKnown
278-
Address: 168.63.129.16
278+
Address: 172.63.129.16
279279
280280
Non-authoritative answer:
281281
Name: mysqlserver8675.privatelink.database.windows.net
282282
Address: 10.0.0.5
283283
Aliases: mysqlserver8675.database.windows.net
284284
```
285285
286-
A private IP address of **10.0.0.5** is returned for the SQL server name. This address is in the subnet of the virtual network you created previously.
286+
A private IP address of **10.0.0.5** is returned for the SQL server name. This address is in the subnet of the virtual network you created previously.
287287
288288
289289
10. Install [SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms?preserve-view=true&view=sql-server-2017) on **myVM**.
@@ -328,6 +328,6 @@ In this tutorial, you created a:
328328

329329
You used the virtual machine to test connectivity securely to the SQL server across the private endpoint.
330330

331-
As a next step, you may also be interested in the **Web app with private connectivity to Azure SQL database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
331+
As a next step, review the **Web app with private connectivity to Azure SQL database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
332332
> [!div class="nextstepaction"]
333333
> [Web app with private connectivity to Azure SQL database](/azure/architecture/example-scenario/private-web-app/private-web-app)

articles/private-link/tutorial-private-endpoint-sql-portal.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ In this section, you create a SQL server in Azure.
4747

4848
1. In **SQL databases**, select **+ Create**.
4949

50-
1. In the **Basics** tab of **Create SQL Database**, enter or select the following information:
50+
1. In the **Basics** tab of **Create SQL Database**, enter, or select the following information:
5151

5252
| Setting | Value |
5353
|---|---|
@@ -64,7 +64,7 @@ In this section, you create a SQL server in Azure.
6464

6565
1. Select **Next: Networking**.
6666

67-
1. In the **Networking** tab of **Create SQL Database**, enter or select the following information:
67+
1. In the **Networking** tab of **Create SQL Database**, enter, or select the following information:
6868

6969
| Setting | Value |
7070
|---|---|
@@ -92,7 +92,7 @@ In this section, you create a SQL server in Azure.
9292
1. Select **Create**.
9393

9494
> [!IMPORTANT]
95-
> When adding a Private endpoint connection, public routing to your Azure SQL server is not blocked by default. The setting "Deny public network access" under the "Firewall and virtual networks" blade is left unchecked by default. To disable public network access ensure this is checked.
95+
> When adding a Private endpoint connection, public routing to your Azure SQL server isn't blocked by default. The setting "Deny public network access" under the "Firewall and virtual networks" blade is left unchecked by default. To disable public network access, ensure this is checked.
9696
9797
## Disable public access to Azure SQL logical server
9898

@@ -129,8 +129,8 @@ In this section, you use the virtual machine you created in the previous steps t
129129
You receive a message similar to the following example. The IP address returned is the private IP address of the private endpoint.
130130

131131
```output
132-
Server: 127.0.0.53
133-
Address: 127.0.0.53#53
132+
Server: unknown
133+
Address: 172.0.0.53
134134
135135
Non-authoritative answer:
136136
sql-server-8675.database.windows.netcanonical name = sql-server-8675.privatelink.database.windows.net.
@@ -169,6 +169,6 @@ In this tutorial, you learned how to create:
169169

170170
You used the virtual machine to test connectivity privately and securely to the SQL server across the private endpoint.
171171

172-
As a next step, you may also be interested in the **Web app with private connectivity to Azure SQL Database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
172+
As a next step, review the **Web app with private connectivity to Azure SQL Database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
173173
> [!div class="nextstepaction"]
174174
> [Web app with private connectivity to Azure SQL Database](/azure/architecture/example-scenario/private-web-app/private-web-app)

articles/private-link/tutorial-private-endpoint-sql-powershell.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: abell
66
# Customer intent: As someone with a basic network background, but is new to Azure, I want to create a private endpoint on a SQL server so that I can securely connect to it.
77
ms.service: azure-private-link
88
ms.topic: tutorial
9-
ms.date: 10/31/2020
9+
ms.date: 01/06/2025
1010
ms.author: abell
1111
ms.custom: template-tutorial, fasttrack-edit, devx-track-azurepowershell
1212
---
@@ -42,9 +42,9 @@ New-AzResourceGroup -Name 'CreateSQLEndpointTutorial-rg' -Location 'eastus'
4242

4343
## Create a virtual network and bastion host
4444

45-
In this section, you'll create a virtual network, subnet, and bastion host.
45+
In this section, you create a virtual network, subnet, and bastion host.
4646

47-
The bastion host will be used to connect securely to the virtual machine for testing the private endpoint.
47+
The bastion host is used to connect securely to the virtual machine for testing the private endpoint.
4848

4949
Create a virtual network and bastion host with:
5050

@@ -93,7 +93,7 @@ It can take a few minutes for the Azure Bastion host to deploy.
9393

9494
## Create test virtual machine
9595

96-
In this section, you'll create a virtual machine that will be used to test the private endpoint.
96+
In this section, you create a virtual machine that is used to test the private endpoint.
9797

9898
Create the virtual machine with:
9999

@@ -148,7 +148,7 @@ New-AzVM -ResourceGroupName 'CreateSQLEndpointTutorial-rg' -Location 'eastus' -V
148148

149149
## Create an Azure SQL server
150150

151-
In this section, you'll create a SQL server and database using:
151+
In this section, you create a SQL server and database using:
152152

153153
* [New-AzSqlServer](/powershell/module/az.sql/new-azsqlserver)
154154
* [New-AzSQlDatabase](/powershell/module/az.sql/new-azsqldatabase)
@@ -181,7 +181,7 @@ New-AzSqlDatabase @parameters2
181181

182182
## Create private endpoint
183183

184-
In this section, you'll create the private endpoint and connection using:
184+
In this section, you create the private endpoint and connection using:
185185

186186
* [New-AzPrivateLinkServiceConnection](/powershell/module/az.network/New-AzPrivateLinkServiceConnection)
187187
* [New-AzPrivateEndpoint](/powershell/module/az.network/new-azprivateendpoint)
@@ -217,7 +217,7 @@ New-AzPrivateEndpoint @parameters2
217217
```
218218
## Configure the private DNS zone
219219

220-
In this section you'll create and configure the private DNS zone using:
220+
In this section you create and configure the private DNS zone using:
221221

222222
* [New-AzPrivateDnsZone](/powershell/module/az.privatedns/new-azprivatednszone)
223223
* [New-AzPrivateDnsVirtualNetworkLink](/powershell/module/az.privatedns/new-azprivatednsvirtualnetworklink)
@@ -263,7 +263,7 @@ New-AzPrivateDnsZoneGroup @parameters4
263263

264264
## Test connectivity to private endpoint
265265

266-
In this section, you'll use the virtual machine you created in the previous step to connect to the SQL server across the private endpoint.
266+
In this section, you use the virtual machine you created in the previous step to connect to the SQL server across the private endpoint.
267267

268268
1. Sign in to the [Azure portal](https://portal.azure.com).
269269

@@ -281,19 +281,19 @@ In this section, you'll use the virtual machine you created in the previous step
281281

282282
8. Open Windows PowerShell on the server after you connect.
283283

284-
9. Enter `nslookup <sqlserver-name>.database.windows.net`. Replace **\<sqlserver-name>** with the name of the SQL server you created in the previous steps. You'll receive a message similar to what is displayed below:
284+
9. Enter `nslookup <sqlserver-name>.database.windows.net`. Replace **\<sqlserver-name>** with the name of the SQL server you created in the previous steps. You receive a message similar to what is displayed below:
285285

286286
```powershell
287287
Server: UnKnown
288-
Address: 168.63.129.16
288+
Address: 172.63.129.16
289289
290290
Non-authoritative answer:
291291
Name: mysqlserver8675.privatelink.database.windows.net
292292
Address: 10.0.0.5
293293
Aliases: mysqlserver8675.database.windows.net
294294
```
295295
296-
A private IP address of **10.0.0.5** is returned for the SQL server name. This address is in the subnet of the virtual network you created previously.
296+
A private IP address of **10.0.0.5** is returned for the SQL server name. This address is in the subnet of the virtual network you created previously.
297297
298298
299299
10. Install [SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms?preserve-view=true&view=sql-server-2017) on **myVM**.
@@ -338,6 +338,6 @@ In this tutorial, you created a:
338338
339339
You used the virtual machine to test connectivity securely to the SQL server across the private endpoint.
340340
341-
As a next step, you may also be interested in the **Web app with private connectivity to Azure SQL database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
341+
As a next step, review the **Web app with private connectivity to Azure SQL database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
342342
> [!div class="nextstepaction"]
343343
> [Web app with private connectivity to Azure SQL database](/azure/architecture/example-scenario/private-web-app/private-web-app)

0 commit comments

Comments
 (0)