You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|**Subscription**| Drop down and select your subscription. | The subscription under which to create this virtual network. |
46
+
|**Subscription**| Drop down and select your subscription. | The subscription where you create this virtual network. |
46
47
|**Resource group**| Drop down and select a resource group, or select **Create new** and enter a new resource group name. | Name for the resource group in which to create your virtual network and other resources. By putting all your app resources in one resource group, you can easily manage or delete them together. |
47
48
|**Name**| Enter a virtual network name. | The name must: begin with a letter or number; end with a letter, number, or underscore; and contain only letters, numbers, underscores, periods, or hyphens. |
48
49
|**Region**| Drop down and select a region. | Select a [region](https://azure.microsoft.com/regions/) near other services that use your virtual network. |
@@ -67,19 +68,11 @@ To create a cache instance, follow these steps:
67
68
68
69
1. Go back to the Azure portal homepage or open the sidebar menu, then select **Create a resource**.
69
70
70
-
1. On the **New** page, select **Databases** and then select **Azure Managed Redis**.
71
-
72
-
:::image type="content" source="media/managed-redis-private-link/2-select-cache.png" alt-text="Select Azure Cache for Redis.":::
71
+
1. In the search box, type _Azure Cache for Redis_. Refine your search to Azure services only, and select **Azure Cache for Redis**.
73
72
74
73
1. On the **New Redis Cache** page, configure the settings for your new cache.
|**DNS name**| Enter a globally unique name. | The cache name must be a string between 1 and 63 characters. The string must contain only numbers, letters, or hyphens. The name must start and end with a number or letter, and can't contain consecutive hyphens. Your cache instance's *host name* is *\<DNS name>.\<region>.redis.azure.net*. |
79
-
|**Subscription**| Drop down and select your subscription. | The subscription under which to create this new Azure Managed Redis instance. |
80
-
|**Resource group**| Drop down and select a resource group, or select **Create new** and enter a new resource group name. | Name for the resource group in which to create your cache and other resources. By putting all your app resources in one resource group, you can easily manage or delete them together. |
81
-
|**Location**| Drop down and select a location. | Select a [region](https://azure.microsoft.com/regions/) near other services that use your cache. |
82
-
|**Pricing tier**| Drop down and select a [Pricing tier](https://azure.microsoft.com/pricing/details/cache/). | The pricing tier determines the size, performance, and features that are available for the cache. For more information, see [Azure Managed Redis Overview](managed-redis-overview.md). |
74
+
1. Select an Azure Managed Redis cache in **Cache SKU**.
75
+
1. Select an appropriate option in **Cache size**.
83
76
84
77
1. Select the **Networking** tab or select the **Networking** button at the bottom of the page.
85
78
@@ -107,7 +100,6 @@ To create a cache instance, follow these steps:
107
100
108
101
It takes a while for the cache to create. You can monitor progress on the Azure Managed Redis **Overview** page. When **Status** shows as **Running**, the cache is ready to use.
109
102
110
-
111
103
## Create a private endpoint with an existing Azure Managed Redis instance
112
104
113
105
In this section, you add a private endpoint to an existing Azure Managed Redis instance.
@@ -126,7 +118,7 @@ To create a virtual network, follow these steps:
|**Subscription**| Drop down and select your subscription. | The subscription under which to create this virtual network. |
121
+
|**Subscription**| Drop down and select your subscription. | The subscription where you create this virtual network. |
130
122
|**Resource group**| Drop down and select a resource group, or select **Create new** and enter a new resource group name. | Name for the resource group in which to create your virtual network and other resources. By putting all your app resources in one resource group, you can easily manage or delete them together. |
131
123
|**Name**| Enter a virtual network name. | The name must: begin with a letter or number; end with a letter, number, or underscore; and contain only letters, numbers, underscores, periods, or hyphens. |
132
124
|**Region**| Drop down and select a region. | Select a [region](https://azure.microsoft.com/regions/) near other services that use your virtual network. |
@@ -149,23 +141,23 @@ To create a virtual network, follow these steps:
149
141
150
142
To create a private endpoint, follow these steps:
151
143
152
-
1. In the Azure portal, search for **Azure Managed Redis**. Then, press enter or select it from the search suggestions.
144
+
1. In the Azure portal, search for **Azure Cache for Redis**. Then, press enter or select it from the search suggestions for your cache.
153
145
154
-
:::image type="content" source="media/managed-redis-private-link/4-search-for-cache.png" alt-text="Search for Azure Managed Redis.":::
146
+
<!--:::image type="content" source="media/managed-redis-private-link/4-search-for-cache.png" alt-text="Search for Azure Managed Redis.":::-->
155
147
156
148
1. Select the cache instance you want to add a private endpoint to.
157
149
158
150
1. On the left side of the screen, select **Private Endpoint**.
159
151
160
152
1. Select the **Private Endpoint** button to create your private endpoint.
|**Subscription**| Drop down and select your subscription. | The subscription under which to create this private endpoint. |
160
+
|**Subscription**| Drop down and select your subscription. | The subscription where you create this private endpoint. |
169
161
|**Resource group**| Drop down and select a resource group, or select **Create new** and enter a new resource group name. | Name for the resource group in which to create your private endpoint and other resources. By putting all your app resources in one resource group, you can easily manage or delete them together. |
170
162
|**Name**| Enter a private endpoint name. | The name must: begin with a letter or number; end with a letter, number, or underscore; and can contain only letters, numbers, underscores, periods, or hyphens. |
171
163
|**Region**| Drop down and select a region. | Select a [region](https://azure.microsoft.com/regions/) near other services that use your private endpoint. |
@@ -197,7 +189,7 @@ To create a private endpoint, follow these steps:
197
189
>
198
190
## Create a private endpoint using Azure PowerShell
199
191
200
-
To create a private endpoint named *MyPrivateEndpoint* for an existing Azure Managed Redis instance, run the following PowerShell script. Replace the variable values with the details for your environment:
192
+
To create a private endpoint named _MyPrivateEndpoint_ for an existing Azure Managed Redis instance, run the following PowerShell script. Replace the variable values with the details for your environment:
To create a private endpoint named *myPrivateEndpoint* for an existing Azure Managed Redis instance, run the following Azure CLI script. Replace the variable values with the details for your environment:
240
+
To create a private endpoint named _myPrivateEndpoint_ for an existing Azure Managed Redis instance, run the following Azure CLI script. Replace the variable values with the details for your environment:
249
241
250
242
```azurecli-interactive
251
243
# Resource group where the Azure Managed Redis and virtual network resources are located
-[What features aren't supported with private endpoints?](#what-features-arent-supported-with-private-endpoints)
314
306
-[How do I verify if my private endpoint is configured correctly?](#how-do-i-verify-if-my-private-endpoint-is-configured-correctly)
315
307
-[How can I change my private endpoint to be disabled or enabled from public network access?](#how-can-i-change-my-private-endpoint-to-be-disabled-or-enabled-from-public-network-access)
316
-
<!-- - [How can I migrate my VNet injected cache to a Private Link cache?](#how-can-i-migrate-my-vnet-injected-cache-to-a-private-link-cache) -->
317
308
-[How can I have multiple endpoints in different virtual networks?](#how-can-i-have-multiple-endpoints-in-different-virtual-networks)
318
309
-[What happens if I delete all the private endpoints on my cache?](#what-happens-if-i-delete-all-the-private-endpoints-on-my-cache)
319
310
-[Are network security groups (NSG) enabled for private endpoints?](#are-network-security-groups-nsg-enabled-for-private-endpoints)
320
311
-[My private endpoint instance isn't in my VNet, so how is it associated with my VNet?](#my-private-endpoint-instance-isnt-in-my-vnet-so-how-is-it-associated-with-my-vnet)
321
312
322
313
### How do I connect to my cache with private endpoint?
323
314
324
-
Your application should connect to `<cachename>.<region>.redis.azure.net` on port `10000`. A private DNS zone, named `*.privatelink.redis.azure.net`, is automatically created in your subscription. The private DNS zone is vital for establishing the TLS connection with the private endpoint. We recommend avoiding the use of `<cachename>.privatelink.redis.azure.net` in configuration for client connection.
315
+
Your application should connect to `<cachename>.<region>.redis.azure.net` on port `10000`. A private DNS zone, named `*.privatelink.redis.azure.net`, is automatically created in your subscription. The private DNS zone is vital for establishing the TLS connection with the private endpoint. We recommend avoiding the use of `<cachename>.privatelink.redis.azure.net` in configuration for client connection.
325
316
326
317
For more information, see [Azure services DNS zone configuration](/azure/private-link/private-endpoint-dns).
327
318
328
319
### Why can't I connect to a private endpoint?
329
320
330
-
- Private endpoints can't be used with your cache instance if your cache is already a VNet injected cache.
321
+
- Private endpoints can't be used with your cache instance if your cache is already a virtual network (VNet) injected cache.
331
322
332
323
- Azure Managed Redis caches are limited to 84 private links.
333
324
@@ -337,43 +328,43 @@ For more information, see [Azure services DNS zone configuration](/azure/private
337
328
338
329
### What features aren't supported with private endpoints?
339
330
340
-
- There is no restriction for using private endpoint with Azure Managed Redis (Preview).
331
+
- There's no restriction for using private endpoint with Azure Managed Redis (Preview).
341
332
342
333
### How do I verify if my private endpoint is configured correctly?
343
334
344
-
Go to **Overview** in the Resource menu on the portal. You see the **Host name** for your cache in the working pane. Run a command like `nslookup <hostname>` from within the VNet that is linked to the private endpoint to verify that the command resolves to the private IP address for the cache.
335
+
Go to **Overview** in the Resource menu on the portal. You see the **Host name** for your cache in the working pane. To verify that the command resolves to the private IP address for the cache, run a command like `nslookup <hostname>` from within the VNet that is linked to the private endpoint.
345
336
346
337
:::image type="content" source="media/managed-redis-private-link/managed-redis-private-ip-address.png" alt-text="In the Azure portal, private endpoint D N S settings.":::
347
338
348
339
### How can I change my private endpoint to be disabled or enabled from public network access?
349
340
350
341
To change the value in the Azure portal, follow these steps:
351
342
352
-
1. In the Azure portal, search for **Azure Managed Redis**. Then, press enter or select it from the search suggestions.
343
+
1. In the Azure portal, search for **Azure Managed Redis**. Then, press enter or select it from the search suggestions.
353
344
354
345
1. Select the cache instance you want to change the public network access value.
355
346
356
347
1. On the left side of the screen, select **Private Endpoint**.
357
348
358
-
1. Delete the private endpoint.
349
+
1. Delete the private endpoint.
359
350
360
351
### How can I have multiple endpoints in different virtual networks?
361
352
362
-
To have multiple private endpoints in different virtual networks, the private DNS zone must be manually configured to the multiple virtual networks *before* creating the private endpoint. For more information, see [Azure Private Endpoint DNS configuration](/azure/private-link/private-endpoint-dns).
353
+
To have multiple private endpoints in different virtual networks, the private DNS zone must be manually configured to the multiple virtual networks before creating the private endpoint. For more information, see [Azure Private Endpoint DNS configuration](/azure/private-link/private-endpoint-dns).
363
354
364
355
### What happens if I delete all the private endpoints on my cache?
365
356
366
-
Deleting all private endpoints on your Azure Managed Redis (preview) will make the service to have public network access.
357
+
If you delete all private endpoints on your Azure Managed Redis (preview) cache, networking defaults to have public network access.
367
358
368
359
### Are network security groups (NSG) enabled for private endpoints?
369
360
370
-
No, they're disabled for private endpoints. While subnets containing the private endpoint can have NSG associated with it, the rules aren't effective on traffic processed by the private endpoint. You must have [network policies enforcement disabled](/azure/private-link/disable-private-endpoint-network-policy) to deploy private endpoints in a subnet. NSG is still enforced on other workloads hosted on the same subnet. Routes on any client subnet will be using an /32 prefix, changing the default routing behavior requires a similar UDR.
361
+
No, they're disabled for private endpoints. While subnets containing the private endpoint can have NSG associated with it, the rules aren't effective on traffic processed by the private endpoint. You must have [network policies enforcement disabled](/azure/private-link/disable-private-endpoint-network-policy) to deploy private endpoints in a subnet. NSG is still enforced on other workloads hosted on the same subnet. Routes on any client subnet use a /32 prefix, changing the default routing behavior requires a similar UDR.
371
362
372
363
Control the traffic by using NSG rules for outbound traffic on source clients. Deploy individual routes with /32 prefix to override private endpoint routes. NSG Flow logs and monitoring information for outbound connections are still supported and can be used.
373
364
374
365
### My private endpoint instance isn't in my VNet, so how is it associated with my VNet?
375
366
376
-
It's only linked to your VNet. Because it's not in your VNet, NSG rules don't need to be modified for dependent endpoints.
367
+
Your private endpoint is only linked to your VNet. Because it's not in your VNet, NSG rules don't need to be modified for dependent endpoints.
0 commit comments