Skip to content

Commit cfa789e

Browse files
authored
Change in the private endpoint for global sub-resource for AVD
The Global Private Endpoint is no longer mandatory for private Link with AVD. I have personally tested and also had official confirmation from Paul McDaniel that is a Software Engineer on AVD of this behaviour. From Paul note: Three important things with the global PE. You don't need it. Clients can take public routes for discovery if you let them. If you have one. It needs to be singleton in its DNS scope (shared names). If you have one, place it against a "placeholder/unused" workspace, so you don't accidentally delete the workspace. Three important scenarios: Everything private (dicsovery, feed, connection) Only the connection is private (feed and discovery is public ) Both the feed and connection are private , but discovery is public
1 parent 6d9d718 commit cfa789e

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

articles/virtual-desktop/private-link-overview.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,9 @@ When adding Private Link with Azure Virtual Desktop, you have the following supp
3535
|--|--|--|--|
3636
| Connections to host pools | Microsoft.DesktopVirtualization/hostpools | connection | One per host pool |
3737
| Feed download | Microsoft.DesktopVirtualization/workspaces | feed | One per workspace |
38-
| Initial feed discovery | Microsoft.DesktopVirtualization/workspaces | global | **Only one for all your Azure Virtual Desktop deployments** |
38+
| Initial feed discovery* | Microsoft.DesktopVirtualization/workspaces | global | **Only one for all your Azure Virtual Desktop deployments** |
39+
40+
\* In this setup, it’s also possible to operate without any private endpoints for the global sub-resource. This approach streamlines the integration of the private link for Azure Virtual Desktop (AVD) in existing deployments, known as brownfield cases, without affecting other host pools.
3941

4042
1. Clients use public routes while session host VMs use private routes. You need the following private endpoints. Endpoints to workspaces aren't required.
4143

@@ -61,7 +63,7 @@ With the [reverse connect transport](network-connectivity.md#reverse-connect-tra
6163
| Public access **enabled** for client networks, but **disabled** for session host networks | Remote sessions are **denied** if the session host is using a *public* route, regardless of the route the client is using.<br /><br />Remote sessions are **allowed** as long as the session host is using a *private* route, regardless of the route the client is using. |
6264

6365
> [!IMPORTANT]
64-
> - A private endpoint to the global sub-resource of any workspace controls the shared fully qualified domain name (FQDN) for initial feed discovery. This in turn enables feed discovery for all workspaces. Because the workspace connected to the private endpoint is so important, deleting it will cause all feed discovery processes to stop working. We recommend you create an unused placeholder workspace for the global sub-resource.
66+
> - A private endpoint connected to a workspace’s global sub-resource governs the shared FQDN (Fully Qualified Domain Name), facilitating the initial discovery of feeds across all workspaces. It’s crucial to note that this private endpoint is not mandatory; clients have the option to utilize the public pathway for the initial feed discovery. However, the subsequent feed download and the connection to the host pool remain safeguarded by their respective private endpoint. Should you opt for a private endpoint for the global sub-resource, it’s advisable to set up a placeholder workspace that remains unused, specifically for this purpose..
6567
>
6668
> - You can't control access to the workspace used for the initial feed discovery (global sub-resource). If you configure this workspace to only allow private access, the setting is ignored. This workspace is always accessible from public routes.
6769
>
@@ -73,7 +75,7 @@ When a user connects to Azure Virtual Desktop over Private Link, and Azure Virtu
7375

7476
1. With a supported client, a user subscribes to a workspace. The user's device queries DNS for the address `rdweb.wvd.microsoft.com` (or the corresponding address for other Azure environments).
7577

76-
1. Your private DNS zone for **privatelink-global.wvd.microsoft.com** returns the private IP address for the initial feed discovery (global sub-resource).
78+
1. Your private DNS zone for **privatelink-global.wvd.microsoft.com** returns the private IP address for the initial feed discovery (global sub-resource), in case you don't have setup this private endpoint, a public IP address is returned.
7779

7880
1. For each workspace in the feed, a DNS query is made for the address `<workspaceId>.privatelink.wvd.microsoft.com`.
7981

0 commit comments

Comments
 (0)