Skip to content

Commit 6667f93

Browse files
committed
resolve comments
1 parent 41ed62b commit 6667f93

File tree

1 file changed

+9
-14
lines changed

1 file changed

+9
-14
lines changed

articles/spring-apps/enterprise/how-to-private-network-access-backend-storage.md

Lines changed: 9 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -74,24 +74,20 @@ az spring update \
7474

7575
## Use central DNS resolution
7676

77-
If your network infrastructure uses the [hub and spoke network architecture](/azure/cloud-adoption-framework/ready/azure-best-practices/private-link-and-dns-integration-at-scale), with private DNS zones hosted centrally in the same subscription where the hub VNet deploys, you can enable central DNS resolution for private storage access feature by configuring the DNS settings appropriately. This setup ensures that:
78-
+ When a private endpoint is created, the corresponding DNS records are automatically added to the centralized private DNS zone.
79-
+ DNS records are managed according to the lifecycle of the private endpoint, meaning they are automatically removed when the private endpoint is deleted.
77+
If you are using a centralized DNS management architecture as documented in the [hub and spoke network architecture](/azure/cloud-adoption-framework/ready/azure-best-practices/private-link-and-dns-integration-at-scale), where all private DNS zones are deployed and managed centrally in a different central VNet than the Azure Spring Apps service instance, you can enable central DNS resolution for private storage access by configuring the DNS settings appropriately. This setup ensures that:
8078

81-
The following sections explain how to enable central DNS resolution for Azure Storage blobs by using [Azure Policy](/azure/governance/policy/overview). The same principles apply to Azure Storage files and other Azure services that support private link.
79+
- When a private endpoint is created, the corresponding DNS records are automatically added to the centralized private DNS zone.
80+
- DNS records are managed according to the lifecycle of the private endpoint, meaning they are automatically removed when the private endpoint is deleted.
8281

83-
### Create private DNS zone
84-
85-
Create private DNS zone in the central connectivity subscription. In this case, we create `privatelink.blob.core.windows.net` private DNS zone in the connectivity subscription. For more information, see [Azure Private Endpoint DNS configuration](/azure/private-link/private-endpoint-dns).
82+
The following sections explain how to enable central DNS resolution for Azure Storage blobs by using [Azure Policy](/azure/governance/policy/overview), assuming you already have the private DNS zone `privatelink.blob.core.windows.net` set up in the central VNet. The same principles apply to Azure Storage files and other Azure services that support private link.
8683

8784
### Policy definition
8885

89-
In addition to the private DNS zone, we also need to [create a custom Azure Policy definition](/azure/governance/policy/tutorials/create-custom-policy-definition). This definition automatically creates the required DNS record in the central private DNS zone when private endpoint is created.
86+
In addition to the private DNS zone, we need to [create a custom Azure Policy definition](/azure/governance/policy/tutorials/create-custom-policy-definition). This definition automatically creates the required DNS record in the central private DNS zone when private endpoint is created.
9087

9188
The following policy triggers when you create a private endpoint resource with a service-specific `groupId`. The `groupId` is the ID of the group obtained from the remote resource (service) that this private endpoint should connect to. In this example, the `groupId` for Azure Storage blobs is `blob`. For more information on the `groupId` for other Azure services, see [Azure Private Endpoint DNS configuration](/azure/private-link/private-endpoint-dns), under the `Subresource` column.
9289

93-
The policy then triggers a deployment of a `privateDNSZoneGroup` within the private endpoint, which associates the private endpoint with the private DNS zone that's specified as the parameter. In this example, the private DNS zone resource ID is `
94-
/subscriptions/<subscription-id>/resourceGroups/<resourceGroupName>/providers/Microsoft.Network/privateDnsZones/privatelink.blob.core.windows.net`.
90+
The policy then triggers a deployment of a `privateDNSZoneGroup` within the private endpoint, which associates the private endpoint with the private DNS zone that's specified as the parameter. In this example, the private DNS zone resource ID is `/subscriptions/<subscription-id>/resourceGroups/<resourceGroupName>/providers/Microsoft.Network/privateDnsZones/privatelink.blob.core.windows.net`.
9591

9692
```json
9793
{
@@ -194,12 +190,11 @@ The policy then triggers a deployment of a `privateDNSZoneGroup` within the priv
194190

195191
### Policy assignment
196192

197-
After deploying the policy definition, assign the policy at the desired scope and specify the central private DNS zone as the parameter. Ensure that the policy assignment targets the Azure subscriptions hosting Azure Spring Apps service instances with the private storage access feature.
193+
After deploying the policy definition, assign the policy at the subscription hosting Azure Spring Apps service instances and specify the central private DNS zone as the parameter.
198194

199-
> [!IMPORTANT]
200-
> In addition to [assigning the roleDefinition](/azure/governance/policy/how-to/remediate-resources?tabs=azure-portal#configure-the-policy-definition) defined in the policy, remember to assign the [Private DNS Zone Contributor role](/azure/dns/dns-protect-private-zones-recordsets) in the subscription and resource group where the private DNS zones are hosted to the [managed identity created by the DeployIfNotExists policy assignment](/azure/governance/policy/how-to/remediate-resources?tabs=azure-portal#configure-the-managed-identity) that will be responsible to create and manage the private endpoint DNS record in the private DNS zone. This is because the private endpoint is usually located in the application subscription, while the private DNS zone is usually located in a different central connectivity subscription.
195+
If the central private DNS zone and Azure Spring Apps service instance are hosted in the different subscriptions, remember to assign the [Private DNS Zone Contributor role](/azure/dns/dns-protect-private-zones-recordsets) in the subscription and resource group where the private DNS zones are hosted to the [managed identity created by the DeployIfNotExists policy assignment](/azure/governance/policy/how-to/remediate-resources?tabs=azure-portal#configure-the-managed-identity) that will be responsible to create and manage the private endpoint DNS record in the private DNS zone.
201196

202-
After finishing the configurations, when enabling (or disabling) private storage access feature, the DNS records for private endpoints will be automatically registered (and removed once a private endpoint is deleted) from the corresponding private DNS zone.
197+
After finishing the configurations, when enabling (or disabling) private storage access feature, the DNS records for private endpoints will be automatically registered (and removed once a private endpoint is deleted) in the corresponding private DNS zone.
203198

204199
## Extra costs
205200

0 commit comments

Comments
 (0)