Skip to content

Commit 8336548

Browse files
author
David Curwin
committed
corrections after review
1 parent 8980f74 commit 8336548

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/backup/private-endpoints.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ This section talks about the steps involved in creating and using private endpoi
4141
4242
[!INCLUDE [How to create a Recovery Services vault](../../includes/backup-create-rs-vault.md)]
4343

44-
See [this section](#create-a-recovery-services-vault-using-the-azure-resource-manager-arm-client) to learn how to create a vault using the ARM client . This creates a vault with its managed identity already enabled. Learn more about Recovery Services vaults [here](https://docs.microsoft.com/azure/backup/backup-azure-recovery-services-vault-overview).
44+
See [this section](#create-a-recovery-services-vault-using-the-azure-resource-manager-client) to learn how to create a vault using the Azure Resource Manager client. This creates a vault with its managed identity already enabled. Learn more about Recovery Services vaults [here](https://docs.microsoft.com/azure/backup/backup-azure-recovery-services-vault-overview).
4545

4646
## Enable Managed Identity for your vault
4747

@@ -177,7 +177,7 @@ This section describes the process of creating a private endpoint for your vault
177177

178178
If the user creating the private endpoint is also the owner of the Recovery Services vault, the private endpoint created above will be auto-approved. Otherwise, the owner of the vault must approve the private endpoint before being able to use it. This section discusses manual approval of private endpoints through the Azure portal.
179179

180-
See [Manual approval of private endpoints using the ARM Client](#manual-approval-of-private-endpoints-using-the-arm-client) to use the ARM client for approving private endpoints.
180+
See [Manual approval of private endpoints using the Azure Resource Manager Client](#manual-approval-of-private-endpoints-using-the-azure-resource-manager-client) to use the Azure Resource Manager client for approving private endpoints.
181181

182182
1. In your Recovery Services vault, navigate to **Private endpoint connections** on the left bar.
183183
1. Select the private endpoint connection you wish to approve.
@@ -259,9 +259,9 @@ However, if you remove private endpoints for the vault after a MARS agent has be
259259
260260
## Additional topics
261261
262-
### Create a Recovery Services vault using the Azure Resource Manager (ARM) client
262+
### Create a Recovery Services vault using the Azure Resource Manager client
263263
264-
You can create the Recovery Services Vault and enable its Managed Identity (enabling the Managed Identity is required, as we'll later see) using the ARM client. A sample for doing this is shared below:
264+
You can create the Recovery Services Vault and enable its Managed Identity (enabling the Managed Identity is required, as we'll later see) using the Azure Resource Manager client. A sample for doing this is shared below:
265265
266266
```rest
267267
armclient PUT /subscriptions/<subscriptionid>/resourceGroups/<rgname>/providers/Microsoft.RecoveryServices/Vaults/<vaultname>?api-version=2017-07-01-preview @C:\<filepath>\MSIVault.json
@@ -322,19 +322,19 @@ Response JSON:
322322
```
323323

324324
>[!NOTE]
325-
>The vault created in this example through the ARM client is already created with a system-assigned managed identity.
325+
>The vault created in this example through the Azure Resource Manager client is already created with a system-assigned managed identity.
326326
327327
### Managing permissions on Resource Groups
328328

329329
The Managed Identity for the vault needs to have the following permissions in the resource group and virtual network where the private endpoints will be created:
330330

331-
1. `Microsoft.Network/privateEndpoints/*`
331+
- `Microsoft.Network/privateEndpoints/*`
332332
This is required to perform CRUD on private endpoints in the resource group. It should be assigned on the resource group.
333-
1. `Microsoft.Network/virtualNetworks/subnets/join/action`
333+
- `Microsoft.Network/virtualNetworks/subnets/join/action`
334334
This is required on the virtual network where private IP is getting attached with the private endpoint.
335-
1. `Microsoft.Network/networkInterfaces/read`
335+
- `Microsoft.Network/networkInterfaces/read`
336336
This is required on the resource group to get the network interface created for the private endpoint.
337-
1. Private DNS Zone Contributor Role
337+
- Private DNS Zone Contributor Role
338338
This role already exists and can be used to provide `Microsoft.Network/privateDnsZones/A/*` and `Microsoft.Network/privateDnsZones/virtualNetworkLinks/read` permissions.
339339

340340
You can use one of the following methods to create roles with required permissions:
@@ -454,7 +454,7 @@ $privateEndpoint = New-AzPrivateEndpoint `
454454
-Force
455455
```
456456

457-
### Manual approval of private endpoints using the ARM Client
457+
### Manual approval of private endpoints using the Azure Resource Manager Client
458458

459459
1. Use **GetVault** to get the Private Endpoint Connection ID for your private endpoint.
460460

@@ -466,7 +466,7 @@ $privateEndpoint = New-AzPrivateEndpoint `
466466
467467
`privateendpointconnectionid = {peName}.{vaultId}.backup.{guid}`
468468
469-
1. Get the **Private Endpoint Connection ID** (and the **Private Endpoint Name**, wherever required) from the response and replace it in the following JSON and ARM URI and try changing the Status to “Approved/Rejected/Disconnected”, as demonstrated in the sample below:
469+
1. Get the **Private Endpoint Connection ID** (and the **Private Endpoint Name**, wherever required) from the response and replace it in the following JSON and Azure Resource Manager URI and try changing the Status to “Approved/Rejected/Disconnected”, as demonstrated in the sample below:
470470
471471
```rest
472472
armclient PUT /subscriptions/<subscriptionid>/resourceGroups/<rgname>/providers/Microsoft.RecoveryServices/Vaults/<vaultname>/privateEndpointConnections/<privateendpointconnectionid>?api-version=2020-02-02-preview @C:\<filepath>\BackupAdminApproval.json
@@ -504,7 +504,7 @@ You need to create three private DNS zones and link them to your virtual network
504504
>[!NOTE]
505505
>In the text above, *geo* refers to the region code. For example, *wcus* and *ne* for West Central US and North Europe respectively.
506506
507-
Please refer to [this list](https://download.microsoft.com/download/1/2/6/126a410b-0e06-45ed-b2df-84f353034fa1/AzureRegionCodesList.docx) for region codes.
507+
Refer to [this list](https://download.microsoft.com/download/1/2/6/126a410b-0e06-45ed-b2df-84f353034fa1/AzureRegionCodesList.docx) for region codes.
508508
509509
#### Adding DNS records for custom DNS servers
510510

0 commit comments

Comments
 (0)