You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/troubleshoot-private-link-connectivity.md
+17-31Lines changed: 17 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Step-by-step guidance to diagnose private link connectivity
4
4
author: abell
5
5
ms.service: azure-private-link
6
6
ms.topic: troubleshooting
7
-
ms.date: 03/29/2020
7
+
ms.date: 01/06/2025
8
8
ms.author: abell
9
9
---
10
10
@@ -42,8 +42,6 @@ If you experience connectivity problems with your private link setup, review the
42
42
43
43
b. On the left pane, select **Private link services**.
44
44
45
-
:::image type="content" source="./media/private-link-tsg/private-link-service.png" alt-text="Screenshot of Private link services.":::
46
-
47
45
c. Filter and select the private link service that you want to diagnose.
48
46
49
47
d. Review the private endpoint connections.
@@ -52,52 +50,40 @@ If you experience connectivity problems with your private link setup, review the
52
50
53
51
- If the state is **Pending**, select it and approve it.
54
52
55
-
:::image type="content" source="./media/private-link-tsg/pls-private-endpoint-connections.png" alt-text="Screenshot of Private endpoint connections.":::
56
-
57
-
- Go to the private endpoint that you're connecting from by selecting the name. Make sure the connection status shows as **Approved**.
58
-
59
-
:::image type="content" source="./media/private-link-tsg/pls-private-endpoint-overview.png" alt-text="Screenshot of private endpoint connection overview.":::
53
+
- Select the private endpoint you're connecting from by clicking on its name. Ensure the connection status is **Approved**.
60
54
61
55
- After both sides are approved, try the connectivity again.
62
56
63
57
e. Review **Alias** on the **Overview** tab and **Resource ID** on the **Properties** tab.
64
-
- Make sure the **Alias** and **Resource ID** information matches the **Alias** and **Resource ID** you're using to create a private endpoint to this service.
65
-
66
-
:::image type="content" source="./media/private-link-tsg/pls-overview-pane-alias.png" alt-text="Screenshot of verify alias information.":::
58
+
- Ensure that the **Alias** and **Resource ID** details match the ones you're using to create a private endpoint for this service.
67
59
68
-
:::image type="content" source="./media/private-link-tsg/pls-properties-pane-resourceid.png" alt-text="Screenshot of verify resource ID information.":::
69
-
70
-
f. Review **Visibility** information on the **Overview** tab.
60
+
f. Review **Visibility** information on the **Overview** tab. Select **See more** in the overview pane to see the details.
71
61
72
62
- Make sure that your subscription falls under the **Visibility** scope.
73
63
74
-
:::image type="content" source="./media/private-link-tsg/pls-overview-pane-visibility.png" alt-text="Screenshot of verify visibility information.":::
75
-
76
64
g. Review **Load balancer** information on the **Overview** tab.
77
65
78
-
- You can go to the load balancer by selecting the load balancer link.
79
-
80
-
:::image type="content" source="./media/private-link-tsg/pls-overview-pane-ilb.png" alt-text="Screenshot of verify load balancer information.":::
81
-
82
-
- Make sure that the load balancer settings are configured as per your expectations.
66
+
- View the load balancer by selecting the load balancer link in the *Overview* pane.
67
+
68
+
- Confirm the load balancer settings are configured as per your requirements.
83
69
84
70
- Review **Frontend IP configuration**.
85
71
86
72
- Review **Backend pools**.
87
73
88
74
- Review **Load balancing rules**.
89
75
90
-
:::image type="content" source="./media/private-link-tsg/pls-ilb-properties.png" alt-text="Screenshot of verify load balancer properties.":::
91
-
92
-
- Make sure the load balancer is working as per the previous settings.
76
+
- Confirm load balancer is working as per the previous settings.
93
77
94
-
- Select a VM in any subnet other than the subnet where the load balancer back-end pool is available.
95
-
96
-
- Try accessing the load balancer front end from the previous VM.
78
+
- Choose a virtual machine located in a subnet different from the one where the load balancer back-end pool resides.
79
+
80
+
- Access the load balancer front end from the previous virtual machine.
97
81
98
-
- If the connection makes it to the back-end pool as per load-balancing rules, your load balancer is operational.
82
+
- If the connection reaches the back-end pool according to the load-balancing rules, then your load balancer is functioning correctly.
99
83
100
-
- You can also review the load balancer metric through Azure Monitor to see if data is flowing through the load balancer.
84
+
- If the connection doesn't reach the back-end pool, then you need to troubleshoot the load balancer configuration.
85
+
86
+
- Use Azure Monitor to review load balancer metrics and verify if data is flowing through the load balancer.
101
87
102
88
1. Use [Azure Monitor](/azure/azure-monitor/overview) to see if data is flowing.
103
89
@@ -107,7 +93,7 @@ If you experience connectivity problems with your private link setup, review the
107
93
108
94
- See if data is flowing when you attempt to connect to the private link service. Expect a delay of approximately 10 minutes.
109
95
110
-
:::image type="content" source="./media/private-link-tsg/pls-metrics.png" alt-text="Screenshot of verify private link service metrics.":::
96
+
111
97
112
98
1. Use [Azure Monitor - Networks](../network-watcher/network-insights-overview.md#resource-view) for insights and to see a resource view of the resources by going to:
113
99
@@ -123,6 +109,6 @@ Contact the [Azure Support](https://portal.azure.com/#blade/Microsoft_Azure_Supp
123
109
124
110
## Next steps
125
111
126
-
*[Create a private link service (CLI)](./create-private-link-service-cli.md)
112
+
*[Create a private link service (CLI)](./create-private-link-service-cli.md)
Copy file name to clipboardExpand all lines: articles/private-link/tutorial-private-endpoint-sql-cli.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: abell
6
6
# Customer intent: As someone with a basic network background, but is new to Azure, I want to create a private endpoint on a SQL server so that I can securely connect to it.
In this section, you'll create a virtual network, subnet, and bastion host.
52
+
In this section, you create a virtual network, subnet, and bastion host.
53
53
54
-
The bastion host will be used to connect securely to the virtual machine for testing the private endpoint.
54
+
The bastion host is used to connect securely to the virtual machine for testing the private endpoint.
55
55
56
56
Create a virtual network with [az network vnet create](/cli/azure/network/vnet#az-network-vnet-create)
57
57
@@ -130,7 +130,7 @@ It can take a few minutes for the Azure Bastion host to deploy.
130
130
131
131
## Create test virtual machine
132
132
133
-
In this section, you'll create a virtual machine that will be used to test the private endpoint.
133
+
In this section, you create a virtual machine that is used to test the private endpoint.
134
134
135
135
Create a VM with [az vm create](/cli/azure/vm#az-vm-create). When prompted, provide a password to be used as the credentials for the VM:
136
136
@@ -155,7 +155,7 @@ az vm create \
155
155
156
156
## Create an Azure SQL server
157
157
158
-
In this section, you'll create a SQL server and database.
158
+
In this section, you create a SQL server and database.
159
159
160
160
Use [az sql server create](/cli/azure/sql/server#az-sql-server-create) to create a SQL server:
161
161
@@ -189,7 +189,7 @@ az sql db create \
189
189
190
190
## Create private endpoint
191
191
192
-
In this section, you'll create the private endpoint.
192
+
In this section, you create the private endpoint.
193
193
194
194
Use [az sql server list](/cli/azure/sql/server#az-sql-server-list) to place the resource ID of the SQL server into a shell variable.
195
195
@@ -220,9 +220,9 @@ az network private-endpoint create \
220
220
221
221
In this section, you'll create and configure the private DNS zone using [az network private-dns zone create](/cli/azure/network/private-dns/zone#az-network-private-dns-zone-create).
222
222
223
-
You'll use [az network private-dns link vnet create](/cli/azure/network/private-dns/link/vnet#az-network-private-dns-link-vnet-create) to create the virtual network link to the dns zone.
223
+
You use [az network private-dns link vnet create](/cli/azure/network/private-dns/link/vnet#az-network-private-dns-link-vnet-create) to create the virtual network link to the dns zone.
224
224
225
-
You'll create a dns zone group with [az network private-endpoint dns-zone-group create](/cli/azure/network/private-endpoint/dns-zone-group#az-network-private-endpoint-dns-zone-group-create).
225
+
You create a dns zone group with [az network private-endpoint dns-zone-group create](/cli/azure/network/private-endpoint/dns-zone-group#az-network-private-endpoint-dns-zone-group-create).
226
226
227
227
* Zone named **privatelink.database.windows.net**
228
228
* In virtual network **myVNet**.
@@ -253,7 +253,7 @@ az network private-endpoint dns-zone-group create \
253
253
254
254
## Test connectivity to private endpoint
255
255
256
-
In this section, you'll use the virtual machine you created in the previous step to connect to the SQL server across the private endpoint.
256
+
In this section, you use the virtual machine you created in the previous step to connect to the SQL server across the private endpoint.
257
257
258
258
1. Sign in to the [Azure portal](https://portal.azure.com).
259
259
@@ -271,19 +271,19 @@ In this section, you'll use the virtual machine you created in the previous step
271
271
272
272
8. Open Windows PowerShell on the server after you connect.
273
273
274
-
9. Enter `nslookup <sqlserver-name>.database.windows.net`. Replace **\<sqlserver-name>** with the name of the SQL server you created in the previous steps. You'll receive a message similar to what is displayed below:
274
+
9. Enter `nslookup <sqlserver-name>.database.windows.net`. Replace **\<sqlserver-name>** with the name of the SQL server you created in the previous steps. You receive a message similar to what is displayed below:
A private IP address of **10.0.0.5** is returned for the SQL server name. This address is in the subnet of the virtual network you created previously.
286
+
A private IP address of **10.0.0.5** is returned for the SQL server name. This address is in the subnet of the virtual network you created previously.
287
287
288
288
289
289
10. Install [SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms?preserve-view=true&view=sql-server-2017) on **myVM**.
@@ -328,6 +328,6 @@ In this tutorial, you created a:
328
328
329
329
You used the virtual machine to test connectivity securely to the SQL server across the private endpoint.
330
330
331
-
As a next step, you may also be interested in the **Web app with private connectivity to Azure SQL database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
331
+
As a next step, review the **Web app with private connectivity to Azure SQL database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
332
332
> [!div class="nextstepaction"]
333
333
> [Web app with private connectivity to Azure SQL database](/azure/architecture/example-scenario/private-web-app/private-web-app)
Copy file name to clipboardExpand all lines: articles/private-link/tutorial-private-endpoint-sql-portal.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ In this section, you create a SQL server in Azure.
47
47
48
48
1. In **SQL databases**, select **+ Create**.
49
49
50
-
1. In the **Basics** tab of **Create SQL Database**, enter or select the following information:
50
+
1. In the **Basics** tab of **Create SQL Database**, enter, or select the following information:
51
51
52
52
| Setting | Value |
53
53
|---|---|
@@ -64,7 +64,7 @@ In this section, you create a SQL server in Azure.
64
64
65
65
1. Select **Next: Networking**.
66
66
67
-
1. In the **Networking** tab of **Create SQL Database**, enter or select the following information:
67
+
1. In the **Networking** tab of **Create SQL Database**, enter, or select the following information:
68
68
69
69
| Setting | Value |
70
70
|---|---|
@@ -92,7 +92,7 @@ In this section, you create a SQL server in Azure.
92
92
1. Select **Create**.
93
93
94
94
> [!IMPORTANT]
95
-
> When adding a Private endpoint connection, public routing to your Azure SQL server is not blocked by default. The setting "Deny public network access" under the "Firewall and virtual networks" blade is left unchecked by default. To disable public network access ensure this is checked.
95
+
> When adding a Private endpoint connection, public routing to your Azure SQL server isn't blocked by default. The setting "Deny public network access" under the "Firewall and virtual networks" blade is left unchecked by default. To disable public network access, ensure this is checked.
96
96
97
97
## Disable public access to Azure SQL logical server
98
98
@@ -129,8 +129,8 @@ In this section, you use the virtual machine you created in the previous steps t
129
129
You receive a message similar to the following example. The IP address returned is the private IP address of the private endpoint.
130
130
131
131
```output
132
-
Server: 127.0.0.53
133
-
Address: 127.0.0.53#53
132
+
Server: unknown
133
+
Address: 172.0.0.53
134
134
135
135
Non-authoritative answer:
136
136
sql-server-8675.database.windows.netcanonical name = sql-server-8675.privatelink.database.windows.net.
@@ -169,6 +169,6 @@ In this tutorial, you learned how to create:
169
169
170
170
You used the virtual machine to test connectivity privately and securely to the SQL server across the private endpoint.
171
171
172
-
As a next step, you may also be interested in the **Web app with private connectivity to Azure SQL Database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
172
+
As a next step, review the **Web app with private connectivity to Azure SQL Database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
173
173
> [!div class="nextstepaction"]
174
174
> [Web app with private connectivity to Azure SQL Database](/azure/architecture/example-scenario/private-web-app/private-web-app)
Copy file name to clipboardExpand all lines: articles/private-link/tutorial-private-endpoint-sql-powershell.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: abell
6
6
# Customer intent: As someone with a basic network background, but is new to Azure, I want to create a private endpoint on a SQL server so that I can securely connect to it.
In this section, you'll use the virtual machine you created in the previous step to connect to the SQL server across the private endpoint.
266
+
In this section, you use the virtual machine you created in the previous step to connect to the SQL server across the private endpoint.
267
267
268
268
1. Sign in to the [Azure portal](https://portal.azure.com).
269
269
@@ -281,19 +281,19 @@ In this section, you'll use the virtual machine you created in the previous step
281
281
282
282
8. Open Windows PowerShell on the server after you connect.
283
283
284
-
9. Enter `nslookup <sqlserver-name>.database.windows.net`. Replace **\<sqlserver-name>** with the name of the SQL server you created in the previous steps. You'll receive a message similar to what is displayed below:
284
+
9. Enter `nslookup <sqlserver-name>.database.windows.net`. Replace **\<sqlserver-name>** with the name of the SQL server you created in the previous steps. You receive a message similar to what is displayed below:
A private IP address of **10.0.0.5** is returned for the SQL server name. This address is in the subnet of the virtual network you created previously.
296
+
A private IP address of **10.0.0.5** is returned for the SQL server name. This address is in the subnet of the virtual network you created previously.
297
297
298
298
299
299
10. Install [SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms?preserve-view=true&view=sql-server-2017) on **myVM**.
@@ -338,6 +338,6 @@ In this tutorial, you created a:
338
338
339
339
You used the virtual machine to test connectivity securely to the SQL server across the private endpoint.
340
340
341
-
As a next step, you may also be interested in the **Web app with private connectivity to Azure SQL database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
341
+
As a next step, review the **Web app with private connectivity to Azure SQL database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
342
342
> [!div class="nextstepaction"]
343
343
> [Web app with private connectivity to Azure SQL database](/azure/architecture/example-scenario/private-web-app/private-web-app)
0 commit comments