Skip to content

Commit e0db865

Browse files
committed
updated syntax.
1 parent 1c7f91e commit e0db865

File tree

4 files changed

+31
-31
lines changed

4 files changed

+31
-31
lines changed

articles/private-link/troubleshoot-private-link-connectivity.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -50,12 +50,12 @@ If you experience connectivity problems with your private link setup, review the
5050

5151
- If the state is **Pending**, select it and approve it.
5252

53-
- Select the private endpoint you are connecting from by clicking on its name. Ensure the connection status is **Approved**.
53+
- Select the private endpoint you're connecting from by clicking on its name. Ensure the connection status is **Approved**.
5454

5555
- After both sides are approved, try the connectivity again.
5656

5757
e. Review **Alias** on the **Overview** tab and **Resource ID** on the **Properties** tab.
58-
- Ensure that the **Alias** and **Resource ID** details match the ones you are using to create a private endpoint for this service.
58+
- Ensure that the **Alias** and **Resource ID** details match the ones you're using to create a private endpoint for this service.
5959

6060
f. Review **Visibility** information on the **Overview** tab. Select **See more** in the overview pane to see the details.
6161

@@ -65,7 +65,7 @@ If you experience connectivity problems with your private link setup, review the
6565

6666
- View the load balancer by selecting the load balancer link in the *Overview* pane.
6767

68-
-Confirm the load balancer settings are configured as per your requirements.
68+
- Confirm the load balancer settings are configured as per your requirements.
6969

7070
- Review **Frontend IP configuration**.
7171

@@ -75,9 +75,9 @@ If you experience connectivity problems with your private link setup, review the
7575

7676
- Confirm load balancer is working as per the previous settings.
7777

78-
- Choose a VM located in a subnet different from the one where the load balancer back-end pool resides.
78+
- Choose a virtual machine located in a subnet different from the one where the load balancer back-end pool resides.
7979

80-
- Access the load balancer front end from the previous VM.
80+
- Access the load balancer front end from the previous virtual machine.
8181

8282
- If the connection reaches the back-end pool according to the load-balancing rules, then your load balancer is functioning correctly.
8383

@@ -109,6 +109,6 @@ Contact the [Azure Support](https://portal.azure.com/#blade/Microsoft_Azure_Supp
109109

110110
## Next steps
111111

112-
* [Create a private link service (CLI)](./create-private-link-service-cli.md)
112+
* [Create a private link service (CLI)](./create-private-link-service-cli.md)
113113

114114
* [Azure Private Endpoint troubleshooting guide](troubleshoot-private-endpoint-connectivity.md)

articles/private-link/tutorial-private-endpoint-sql-cli.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -49,9 +49,9 @@ az group create \
4949

5050
## Create a virtual network and bastion host
5151

52-
In this section, you'll create a virtual network, subnet, and bastion host.
52+
In this section, you create a virtual network, subnet, and bastion host.
5353

54-
The bastion host will be used to connect securely to the virtual machine for testing the private endpoint.
54+
The bastion host is used to connect securely to the virtual machine for testing the private endpoint.
5555

5656
Create a virtual network with [az network vnet create](/cli/azure/network/vnet#az-network-vnet-create)
5757

@@ -130,7 +130,7 @@ It can take a few minutes for the Azure Bastion host to deploy.
130130

131131
## Create test virtual machine
132132

133-
In this section, you'll create a virtual machine that will be used to test the private endpoint.
133+
In this section, you create a virtual machine that is used to test the private endpoint.
134134

135135
Create a VM with [az vm create](/cli/azure/vm#az-vm-create). When prompted, provide a password to be used as the credentials for the VM:
136136

@@ -155,7 +155,7 @@ az vm create \
155155

156156
## Create an Azure SQL server
157157

158-
In this section, you'll create a SQL server and database.
158+
In this section, you create a SQL server and database.
159159

160160
Use [az sql server create](/cli/azure/sql/server#az-sql-server-create) to create a SQL server:
161161

@@ -189,7 +189,7 @@ az sql db create \
189189

190190
## Create private endpoint
191191

192-
In this section, you'll create the private endpoint.
192+
In this section, you create the private endpoint.
193193

194194
Use [az sql server list](/cli/azure/sql/server#az-sql-server-list) to place the resource ID of the SQL server into a shell variable.
195195

@@ -220,9 +220,9 @@ az network private-endpoint create \
220220

221221
In this section, you'll create and configure the private DNS zone using [az network private-dns zone create](/cli/azure/network/private-dns/zone#az-network-private-dns-zone-create).
222222

223-
You'll use [az network private-dns link vnet create](/cli/azure/network/private-dns/link/vnet#az-network-private-dns-link-vnet-create) to create the virtual network link to the dns zone.
223+
You use [az network private-dns link vnet create](/cli/azure/network/private-dns/link/vnet#az-network-private-dns-link-vnet-create) to create the virtual network link to the dns zone.
224224

225-
You'll create a dns zone group with [az network private-endpoint dns-zone-group create](/cli/azure/network/private-endpoint/dns-zone-group#az-network-private-endpoint-dns-zone-group-create).
225+
You create a dns zone group with [az network private-endpoint dns-zone-group create](/cli/azure/network/private-endpoint/dns-zone-group#az-network-private-endpoint-dns-zone-group-create).
226226

227227
* Zone named **privatelink.database.windows.net**
228228
* In virtual network **myVNet**.
@@ -253,7 +253,7 @@ az network private-endpoint dns-zone-group create \
253253

254254
## Test connectivity to private endpoint
255255

256-
In this section, you'll use the virtual machine you created in the previous step to connect to the SQL server across the private endpoint.
256+
In this section, you use the virtual machine you created in the previous step to connect to the SQL server across the private endpoint.
257257

258258
1. Sign in to the [Azure portal](https://portal.azure.com).
259259

@@ -271,7 +271,7 @@ In this section, you'll use the virtual machine you created in the previous step
271271

272272
8. Open Windows PowerShell on the server after you connect.
273273

274-
9. Enter `nslookup <sqlserver-name>.database.windows.net`. Replace **\<sqlserver-name>** with the name of the SQL server you created in the previous steps. You'll receive a message similar to what is displayed below:
274+
9. Enter `nslookup <sqlserver-name>.database.windows.net`. Replace **\<sqlserver-name>** with the name of the SQL server you created in the previous steps. You receive a message similar to what is displayed below:
275275

276276
```powershell
277277
Server: UnKnown
@@ -283,7 +283,7 @@ In this section, you'll use the virtual machine you created in the previous step
283283
Aliases: mysqlserver8675.database.windows.net
284284
```
285285
286-
A private IP address of **10.0.0.5** is returned for the SQL server name. This address is in the subnet of the virtual network you created previously.
286+
A private IP address of **10.0.0.5** is returned for the SQL server name. This address is in the subnet of the virtual network you created previously.
287287
288288
289289
10. Install [SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms?preserve-view=true&view=sql-server-2017) on **myVM**.
@@ -328,6 +328,6 @@ In this tutorial, you created a:
328328

329329
You used the virtual machine to test connectivity securely to the SQL server across the private endpoint.
330330

331-
As a next step, you may also be interested in the **Web app with private connectivity to Azure SQL database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
331+
As a next step, review the **Web app with private connectivity to Azure SQL database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
332332
> [!div class="nextstepaction"]
333333
> [Web app with private connectivity to Azure SQL database](/azure/architecture/example-scenario/private-web-app/private-web-app)

articles/private-link/tutorial-private-endpoint-sql-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ In this section, you create a SQL server in Azure.
4747

4848
1. In **SQL databases**, select **+ Create**.
4949

50-
1. In the **Basics** tab of **Create SQL Database**, enter or select the following information:
50+
1. In the **Basics** tab of **Create SQL Database**, enter, or select the following information:
5151

5252
| Setting | Value |
5353
|---|---|
@@ -64,7 +64,7 @@ In this section, you create a SQL server in Azure.
6464

6565
1. Select **Next: Networking**.
6666

67-
1. In the **Networking** tab of **Create SQL Database**, enter or select the following information:
67+
1. In the **Networking** tab of **Create SQL Database**, enter, or select the following information:
6868

6969
| Setting | Value |
7070
|---|---|
@@ -92,7 +92,7 @@ In this section, you create a SQL server in Azure.
9292
1. Select **Create**.
9393

9494
> [!IMPORTANT]
95-
> When adding a Private endpoint connection, public routing to your Azure SQL server is not blocked by default. The setting "Deny public network access" under the "Firewall and virtual networks" blade is left unchecked by default. To disable public network access ensure this is checked.
95+
> When adding a Private endpoint connection, public routing to your Azure SQL server isn't blocked by default. The setting "Deny public network access" under the "Firewall and virtual networks" blade is left unchecked by default. To disable public network access, ensure this is checked.
9696
9797
## Disable public access to Azure SQL logical server
9898

@@ -169,6 +169,6 @@ In this tutorial, you learned how to create:
169169

170170
You used the virtual machine to test connectivity privately and securely to the SQL server across the private endpoint.
171171

172-
As a next step, you may also be interested in the **Web app with private connectivity to Azure SQL Database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
172+
As a next step, review the **Web app with private connectivity to Azure SQL Database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
173173
> [!div class="nextstepaction"]
174174
> [Web app with private connectivity to Azure SQL Database](/azure/architecture/example-scenario/private-web-app/private-web-app)

articles/private-link/tutorial-private-endpoint-sql-powershell.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,9 @@ New-AzResourceGroup -Name 'CreateSQLEndpointTutorial-rg' -Location 'eastus'
4242

4343
## Create a virtual network and bastion host
4444

45-
In this section, you'll create a virtual network, subnet, and bastion host.
45+
In this section, you create a virtual network, subnet, and bastion host.
4646

47-
The bastion host will be used to connect securely to the virtual machine for testing the private endpoint.
47+
The bastion host is used to connect securely to the virtual machine for testing the private endpoint.
4848

4949
Create a virtual network and bastion host with:
5050

@@ -93,7 +93,7 @@ It can take a few minutes for the Azure Bastion host to deploy.
9393

9494
## Create test virtual machine
9595

96-
In this section, you'll create a virtual machine that will be used to test the private endpoint.
96+
In this section, you create a virtual machine that is used to test the private endpoint.
9797

9898
Create the virtual machine with:
9999

@@ -148,7 +148,7 @@ New-AzVM -ResourceGroupName 'CreateSQLEndpointTutorial-rg' -Location 'eastus' -V
148148

149149
## Create an Azure SQL server
150150

151-
In this section, you'll create a SQL server and database using:
151+
In this section, you create a SQL server and database using:
152152

153153
* [New-AzSqlServer](/powershell/module/az.sql/new-azsqlserver)
154154
* [New-AzSQlDatabase](/powershell/module/az.sql/new-azsqldatabase)
@@ -181,7 +181,7 @@ New-AzSqlDatabase @parameters2
181181

182182
## Create private endpoint
183183

184-
In this section, you'll create the private endpoint and connection using:
184+
In this section, you create the private endpoint and connection using:
185185

186186
* [New-AzPrivateLinkServiceConnection](/powershell/module/az.network/New-AzPrivateLinkServiceConnection)
187187
* [New-AzPrivateEndpoint](/powershell/module/az.network/new-azprivateendpoint)
@@ -217,7 +217,7 @@ New-AzPrivateEndpoint @parameters2
217217
```
218218
## Configure the private DNS zone
219219

220-
In this section you'll create and configure the private DNS zone using:
220+
In this section you create and configure the private DNS zone using:
221221

222222
* [New-AzPrivateDnsZone](/powershell/module/az.privatedns/new-azprivatednszone)
223223
* [New-AzPrivateDnsVirtualNetworkLink](/powershell/module/az.privatedns/new-azprivatednsvirtualnetworklink)
@@ -263,7 +263,7 @@ New-AzPrivateDnsZoneGroup @parameters4
263263

264264
## Test connectivity to private endpoint
265265

266-
In this section, you'll use the virtual machine you created in the previous step to connect to the SQL server across the private endpoint.
266+
In this section, you use the virtual machine you created in the previous step to connect to the SQL server across the private endpoint.
267267

268268
1. Sign in to the [Azure portal](https://portal.azure.com).
269269

@@ -281,7 +281,7 @@ In this section, you'll use the virtual machine you created in the previous step
281281

282282
8. Open Windows PowerShell on the server after you connect.
283283

284-
9. Enter `nslookup <sqlserver-name>.database.windows.net`. Replace **\<sqlserver-name>** with the name of the SQL server you created in the previous steps. You'll receive a message similar to what is displayed below:
284+
9. Enter `nslookup <sqlserver-name>.database.windows.net`. Replace **\<sqlserver-name>** with the name of the SQL server you created in the previous steps. You receive a message similar to what is displayed below:
285285

286286
```powershell
287287
Server: UnKnown
@@ -293,7 +293,7 @@ In this section, you'll use the virtual machine you created in the previous step
293293
Aliases: mysqlserver8675.database.windows.net
294294
```
295295
296-
A private IP address of **10.0.0.5** is returned for the SQL server name. This address is in the subnet of the virtual network you created previously.
296+
A private IP address of **10.0.0.5** is returned for the SQL server name. This address is in the subnet of the virtual network you created previously.
297297
298298
299299
10. Install [SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms?preserve-view=true&view=sql-server-2017) on **myVM**.
@@ -338,6 +338,6 @@ In this tutorial, you created a:
338338
339339
You used the virtual machine to test connectivity securely to the SQL server across the private endpoint.
340340
341-
As a next step, you may also be interested in the **Web app with private connectivity to Azure SQL database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
341+
As a next step, review the **Web app with private connectivity to Azure SQL database** architecture scenario, which connects a web application outside of the virtual network to the private endpoint of a database.
342342
> [!div class="nextstepaction"]
343343
> [Web app with private connectivity to Azure SQL database](/azure/architecture/example-scenario/private-web-app/private-web-app)

0 commit comments

Comments
 (0)