You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/private-endpoints.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ This section talks about the steps involved in creating and using private endpoi
41
41
42
42
[!INCLUDE [How to create a Recovery Services vault](../../includes/backup-create-rs-vault.md)]
43
43
44
-
See [this section](#create-a-recovery-services-vault-using-the-azure-resource-manager-arm-client) to learn how to create a vault using the ARM client . This creates a vault with its managed identity already enabled. Learn more about Recovery Services vaults [here](https://docs.microsoft.com/azure/backup/backup-azure-recovery-services-vault-overview).
44
+
See [this section](#create-a-recovery-services-vault-using-the-azure-resource-manager-client) to learn how to create a vault using the Azure Resource Manager client. This creates a vault with its managed identity already enabled. Learn more about Recovery Services vaults [here](https://docs.microsoft.com/azure/backup/backup-azure-recovery-services-vault-overview).
45
45
46
46
## Enable Managed Identity for your vault
47
47
@@ -177,7 +177,7 @@ This section describes the process of creating a private endpoint for your vault
177
177
178
178
If the user creating the private endpoint is also the owner of the Recovery Services vault, the private endpoint created above will be auto-approved. Otherwise, the owner of the vault must approve the private endpoint before being able to use it. This section discusses manual approval of private endpoints through the Azure portal.
179
179
180
-
See [Manual approval of private endpoints using the ARM Client](#manual-approval-of-private-endpoints-using-the-arm-client) to use the ARM client for approving private endpoints.
180
+
See [Manual approval of private endpoints using the Azure Resource Manager Client](#manual-approval-of-private-endpoints-using-the-azure-resource-manager-client) to use the Azure Resource Manager client for approving private endpoints.
181
181
182
182
1. In your Recovery Services vault, navigate to **Private endpoint connections** on the left bar.
183
183
1. Select the private endpoint connection you wish to approve.
@@ -259,9 +259,9 @@ However, if you remove private endpoints for the vault after a MARS agent has be
259
259
260
260
## Additional topics
261
261
262
-
### Create a Recovery Services vault using the Azure Resource Manager (ARM) client
262
+
### Create a Recovery Services vault using the Azure Resource Manager client
263
263
264
-
You can create the Recovery Services Vault and enable its Managed Identity (enabling the Managed Identity is required, as we'll later see) using the ARM client. A sample for doing this is shared below:
264
+
You can create the Recovery Services Vault and enable its Managed Identity (enabling the Managed Identity is required, as we'll later see) using the Azure Resource Manager client. A sample for doing this is shared below:
265
265
266
266
```rest
267
267
armclient PUT /subscriptions/<subscriptionid>/resourceGroups/<rgname>/providers/Microsoft.RecoveryServices/Vaults/<vaultname>?api-version=2017-07-01-preview @C:\<filepath>\MSIVault.json
@@ -322,19 +322,19 @@ Response JSON:
322
322
```
323
323
324
324
>[!NOTE]
325
-
>The vault created in this example through the ARM client is already created with a system-assigned managed identity.
325
+
>The vault created in this example through the Azure Resource Manager client is already created with a system-assigned managed identity.
326
326
327
327
### Managing permissions on Resource Groups
328
328
329
329
The Managed Identity for the vault needs to have the following permissions in the resource group and virtual network where the private endpoints will be created:
330
330
331
-
1.`Microsoft.Network/privateEndpoints/*`
331
+
-`Microsoft.Network/privateEndpoints/*`
332
332
This is required to perform CRUD on private endpoints in the resource group. It should be assigned on the resource group.
This is required on the virtual network where private IP is getting attached with the private endpoint.
335
-
1.`Microsoft.Network/networkInterfaces/read`
335
+
-`Microsoft.Network/networkInterfaces/read`
336
336
This is required on the resource group to get the network interface created for the private endpoint.
337
-
1. Private DNS Zone Contributor Role
337
+
- Private DNS Zone Contributor Role
338
338
This role already exists and can be used to provide `Microsoft.Network/privateDnsZones/A/*` and `Microsoft.Network/privateDnsZones/virtualNetworkLinks/read` permissions.
339
339
340
340
You can use one of the following methods to create roles with required permissions:
1. Get the **Private Endpoint Connection ID** (and the **Private Endpoint Name**, wherever required) from the response and replace it in the following JSON and ARM URI and try changing the Status to “Approved/Rejected/Disconnected”, as demonstrated in the sample below:
469
+
1. Get the **Private Endpoint Connection ID** (and the **Private Endpoint Name**, wherever required) from the response and replace it in the following JSON and Azure Resource Manager URI and try changing the Status to “Approved/Rejected/Disconnected”, as demonstrated in the sample below:
470
470
471
471
```rest
472
472
armclient PUT /subscriptions/<subscriptionid>/resourceGroups/<rgname>/providers/Microsoft.RecoveryServices/Vaults/<vaultname>/privateEndpointConnections/<privateendpointconnectionid>?api-version=2020-02-02-preview @C:\<filepath>\BackupAdminApproval.json
@@ -504,7 +504,7 @@ You need to create three private DNS zones and link them to your virtual network
504
504
>[!NOTE]
505
505
>In the text above, *geo* refers to the region code. For example, *wcus* and *ne* for West Central US and North Europe respectively.
506
506
507
-
Please refer to [this list](https://download.microsoft.com/download/1/2/6/126a410b-0e06-45ed-b2df-84f353034fa1/AzureRegionCodesList.docx) for region codes.
507
+
Refer to [this list](https://download.microsoft.com/download/1/2/6/126a410b-0e06-45ed-b2df-84f353034fa1/AzureRegionCodesList.docx) for region codes.
0 commit comments