Skip to content

Commit 821f246

Browse files
committed
acrolinx tone
1 parent 3200095 commit 821f246

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/virtual-wan/howto-private-link.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom: fasttrack-new
1818

1919
## Before you begin
2020

21-
The steps in this article assume that you have already deployed a virtual WAN with one or more hubs and at least two virtual networks connected to Virtual WAN.
21+
The steps in this article assume that you've already deployed a virtual WAN with one or more hubs and at least two virtual networks connected to Virtual WAN.
2222

2323
To create a new virtual WAN and a new hub, use the steps in the following articles:
2424

@@ -28,15 +28,15 @@ To create a new virtual WAN and a new hub, use the steps in the following articl
2828

2929
## <a name="endpoint"></a>Create a private link endpoint
3030

31-
You can create a private link endpoint for many different services. In this example, we are using Azure SQL Database. You can find more information about how to create a private endpoint for an Azure SQL Database in [Quickstart: Create a Private Endpoint using the Azure portal](../private-link/create-private-endpoint-portal.md). The following image shows the network configuration of the Azure SQL Database:
31+
You can create a private link endpoint for many different services. In this example, we're using Azure SQL Database. You can find more information about how to create a private endpoint for an Azure SQL Database in [Quickstart: Create a Private Endpoint using the Azure portal](../private-link/create-private-endpoint-portal.md). The following image shows the network configuration of the Azure SQL Database:
3232

3333
:::image type="content" source="./media/howto-private-link/create-private-link.png" alt-text="create private link" lightbox="./media/howto-private-link/create-private-link.png":::
3434

3535
After creating the Azure SQL Database, you can verify the private endpoint IP address browsing your private endpoints:
3636

3737
:::image type="content" source="./media/howto-private-link/endpoints.png" alt-text="private endpoints" lightbox="./media/howto-private-link/endpoints.png":::
3838

39-
Clicking on the private endpoint we have created, you should see its private IP address and its Fully Qualified Domain Name (FQDN). The private endpoint should have an IP address in the range of the VNet where it has been deployed (10.1.3.0/24):
39+
Clicking on the private endpoint we've created, you should see its private IP address and its Fully Qualified Domain Name (FQDN). The private endpoint should have an IP address in the range of the VNet where it has been deployed (10.1.3.0/24):
4040

4141
:::image type="content" source="./media/howto-private-link/sql-endpoint.png" alt-text="SQL endpoint" lightbox="./media/howto-private-link/sql-endpoint.png":::
4242

@@ -58,7 +58,7 @@ Name: wantest.privatelink.database.windows.net
5858
Address: 10.1.3.228
5959
```
6060

61-
As you can see in the previous output, the FQDN `wantest.database.windows.net` is mapped to `wantest.privatelink.database.windows.net`, that the private DNS zone created along the private endpoint will resolve to the private IP address `10.1.3.228`. Looking into the private DNS zone will confirm that there is an A record for the private endpoint mapped to the private IP address:
61+
As you can see in the previous output, the FQDN `wantest.database.windows.net` is mapped to `wantest.privatelink.database.windows.net`, that the private DNS zone created along the private endpoint will resolve to the private IP address `10.1.3.228`. Looking into the private DNS zone will confirm that there's an A record for the private endpoint mapped to the private IP address:
6262

6363
:::image type="content" source="./media/howto-private-link/dns-zone.png" alt-text="DNS zone" lightbox="./media/howto-private-link/dns-zone.png":::
6464

@@ -73,7 +73,7 @@ sqlcmd -S wantest.database.windows.net -U $username -P $password -Q "$query"
7373
10.1.3.75
7474
```
7575

76-
As you can see, we are using a special SQL query that gives us the source IP address that the SQL server sees from the client. In this case the server sees the client with its private IP (`10.1.3.75`), which means that the traffic goes from the VNet straight into the private endpoint.
76+
As you can see, we're using a special SQL query that gives us the source IP address that the SQL server sees from the client. In this case the server sees the client with its private IP (`10.1.3.75`), which means that the traffic goes from the VNet straight into the private endpoint.
7777

7878
Set the variables `username` and `password` to match the credentials defined in the Azure SQL Database to make the examples in this guide work.
7979

@@ -86,7 +86,7 @@ Once you have connectivity between the VNet or the branch to the VNet where the
8686
* If connecting to the private endpoint from a VNet, you can use the same private zone that was created with the Azure SQL Database.
8787
* If connecting to the private endpoint from a branch (Site-to-site VPN, Point-to-site VPN or ExpressRoute), you need to use on-premises DNS resolution.
8888

89-
In this example we are connecting from a different VNet. First attach the private DNS zone to the new VNet so that its workloads can resolve the Azure SQL Database Fully Qualified Domain Name to the private IP address. This is done through linking the private DNS zone to the new VNet:
89+
In this example we're connecting from a different VNet. First attach the private DNS zone to the new VNet so that its workloads can resolve the Azure SQL Database Fully Qualified Domain Name to the private IP address. This is done through linking the private DNS zone to the new VNet:
9090

9191
:::image type="content" source="./media/howto-private-link/dns-link.png" alt-text="DNS link" lightbox="./media/howto-private-link/dns-link.png":::
9292

@@ -110,7 +110,7 @@ In order to double-check that this VNet (10.1.1.0/24) has connectivity to the or
110110

111111
:::image type="content" source="./media/howto-private-link/effective-routes.png" alt-text="effective routes" lightbox="./media/howto-private-link/effective-routes.png":::
112112

113-
As you can see, there is a route pointing to the VNet 10.1.3.0/24 injected by the Virtual Network Gateways in Azure Virtual WAN. Now we can finally test connectivity to the database:
113+
As you can see, there's a route pointing to the VNet 10.1.3.0/24 injected by the Virtual Network Gateways in Azure Virtual WAN. Now we can finally test connectivity to the database:
114114

115115
```bash
116116
query="SELECT CONVERT(char(15), CONNECTIONPROPERTY('client_net_address'));"
@@ -121,7 +121,7 @@ sqlcmd -S wantest.database.windows.net -U $username -P $password -Q "$query"
121121
10.1.1.75
122122
```
123123

124-
With this example, we have seen how creating a private endpoint in one of the VNets attached to a Virtual WAN provides connectivity to the rest of VNets and branches in the Virtual WAN.
124+
With this example, we've seen how creating a private endpoint in one of the VNets attached to a Virtual WAN provides connectivity to the rest of VNets and branches in the Virtual WAN.
125125

126126
## Next steps
127127

0 commit comments

Comments
 (0)