|
1 | 1 | ---
|
2 | 2 | title: Integrate Azure Relay with Azure Private Link Service
|
3 |
| -description: Learn how to integrate Azure Relay with Azure Private Link Service |
4 |
| -ms.date: 02/15/2023 |
5 |
| -ms.topic: article |
| 3 | +description: This article describes how to integrate Azure Relay with Azure Private Link Service to secure access to Azure Relay resources only from a private network. |
| 4 | +ms.date: 12/10/2024 |
| 5 | +ms.topic: how-to |
6 | 6 | ms.custom: devx-track-azurepowershell
|
| 7 | +# Customer intent: As an Azure Relay user, I want to learn how to integrate Azure Relay with Azure Private Link service. |
7 | 8 | ---
|
8 | 9 |
|
9 | 10 | # Integrate Azure Relay with Azure Private Link
|
10 | 11 | Azure **Private Link Service** enables you to access Azure services (for example, Azure Relay, Azure Service Bus, Azure Event Hubs, Azure Storage, and Azure Cosmos DB) and Azure hosted customer/partner services over a private endpoint in your virtual network. For more information, see [What is Azure Private Link?](../private-link/private-link-overview.md)
|
11 | 12 |
|
12 |
| -A **private endpoint** is a network interface that allows your workloads running in a virtual network to connect privately and securely to a service that has a **private link resource** (for example, a Relay namespace). The private endpoint uses a private IP address from your VNet, effectively bringing the service into your VNet. All traffic to the service can be routed through the private endpoint, so no gateways, NAT devices, ExpressRoute, VPN connections, or public IP addresses are needed. Traffic between your virtual network and the service traverses over the Microsoft backbone network, eliminating exposure from the public Internet. You can provide a level of granularity in access control by allowing connections to specific Azure Relay namespaces. |
| 13 | +A **private endpoint** is a network interface that allows your workloads running in a virtual network to connect privately and securely to a service that has a **private link resource** (for example, a Relay namespace). The private endpoint uses a private IP address from your virtual network, effectively bringing the service into your virtual network. All traffic to the service can be routed through the private endpoint, so no gateways, NAT devices, ExpressRoute, VPN connections, or public IP addresses are needed. Traffic between your virtual network and the service traverses over the Microsoft backbone network, eliminating exposure from the public Internet. You can provide a level of granularity in access control by allowing connections to specific Azure Relay namespaces. |
13 | 14 |
|
14 | 15 | > [!NOTE]
|
15 | 16 | > If you use the **relay listener** over a private link, open ports **9400-9599** for outgoing communication along with the standard relay ports. Note that you need to do this step only for the **relay listener**.
|
16 | 17 |
|
17 |
| -## Add a private endpoint using Azure portal |
18 |
| - |
19 |
| -### Prerequisites |
| 18 | +## Prerequisites |
20 | 19 | To integrate an Azure Relay namespace with Azure Private Link, you need the following entities or permissions:
|
21 | 20 |
|
22 | 21 | - An Azure Relay namespace.
|
23 | 22 | - An Azure virtual network.
|
24 | 23 | - A subnet in the virtual network.
|
25 | 24 | - Owner or contributor permissions on the virtual network.
|
26 | 25 |
|
| 26 | +## Add a private endpoint using Azure portal |
27 | 27 | Your private endpoint and virtual network must be in the same region. When you select a region for the private endpoint using the portal, it will automatically filter only virtual networks that are in that region. Your namespace can be in a different region.
|
28 | 28 |
|
29 | 29 | Your private endpoint uses a private IP address in your virtual network.
|
@@ -151,7 +151,7 @@ There are four provisioning states:
|
151 | 151 | | None | Pending | Connection is created manually and is pending approval from the Azure Relay namespace owner. |
|
152 | 152 | | Approve | Approved | Connection was automatically or manually approved and is ready to be used. |
|
153 | 153 | | Reject | Rejected | Connection was rejected by the Azure Relay namespace owner. |
|
154 |
| -| Remove | Disconnected | Connection was removed by the Azure Relay namespace owner, the private endpoint becomes informative and should be deleted for cleanup. | |
| 154 | +| Remove | Disconnected | Connection was removed by the Azure Relay namespace owner. The private endpoint becomes informative and should be deleted for cleanup. | |
155 | 155 |
|
156 | 156 | ### Approve, reject, or remove a private endpoint connection
|
157 | 157 |
|
@@ -233,7 +233,7 @@ Aliases: <namespace-name>.servicebus.windows.net
|
233 | 233 |
|
234 | 234 | [!INCLUDE [trusted-services](./includes/trusted-services.md)]
|
235 | 235 |
|
236 |
| -## Next Steps |
| 236 | +## Related content |
237 | 237 |
|
238 | 238 | - Learn more about [Azure Private Link](../private-link/private-link-service-overview.md)
|
239 | 239 | - Learn more about [Azure Relay](relay-what-is-it.md)
|
0 commit comments