Skip to content

Commit e235e34

Browse files
committed
acrolinx language corrections
1 parent 3fb5208 commit e235e34

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/virtual-wan/howto-private-link.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,11 @@ ms.custom: fasttrack-new
1414
---
1515
# Use Private Link in Virtual WAN
1616

17-
[Azure Private Link](../private-link/private-link-overview.md) is a technology that allows you to connect Azure Platform-as-a-Service offerings using private IP address connectivity by exposing [Private Endpoints](../private-link/private-endpoint-overview.md). With Azure Virtual WAN, you can deploy a Private Endpoint in one of the virtual networks connected to any virtual hub. This provides connectivity to any other virtual network or branch connected to the same Virtual WAN.
17+
[Azure Private Link](../private-link/private-link-overview.md) is a technology that allows you to connect Azure Platform-as-a-Service offerings using private IP address connectivity by exposing [Private Endpoints](../private-link/private-endpoint-overview.md). With Azure Virtual WAN, you can deploy a Private Endpoint in one of the virtual networks connected to any virtual hub. This private link provides connectivity to any other virtual network or branch connected to the same Virtual WAN.
1818

1919
## Before you begin
2020

21-
The steps in this article assume that you have already deployed a virtual WAN with one or more hubs, as well as at least two virtual networks connected to Virtual WAN.
21+
The steps in this article assume that you have already deployed a virtual WAN with one or more hubs and at least two virtual networks connected to Virtual WAN.
2222

2323
To create a new virtual WAN and a new hub, use the steps in the following articles:
2424

@@ -28,21 +28,21 @@ To create a new virtual WAN and a new hub, use the steps in the following articl
2828

2929
## <a name="endpoint"></a>Create a private link endpoint
3030

31-
You can create a private link endpoint for many different services. In this example, we will use Azure SQL Database. You can find more information about how to create a private endpoint for an Azure SQL Database in [Quickstart: Create a Private Endpoint using the Azure portal](../private-link/create-private-endpoint-portal.md). The following image shows the network configuration of the Azure SQL Database:
31+
You can create a private link endpoint for many different services. In this example, we are using Azure SQL Database. You can find more information about how to create a private endpoint for an Azure SQL Database in [Quickstart: Create a Private Endpoint using the Azure portal](../private-link/create-private-endpoint-portal.md). The following image shows the network configuration of the Azure SQL Database:
3232

3333
:::image type="content" source="./media/howto-private-link/create-private-link.png" alt-text="create private link" lightbox="./media/howto-private-link/create-private-link.png":::
3434

3535
After creating the Azure SQL Database, you can verify the private endpoint IP address browsing your private endpoints:
3636

3737
:::image type="content" source="./media/howto-private-link/endpoints.png" alt-text="private endpoints" lightbox="./media/howto-private-link/endpoints.png":::
3838

39-
Clicking on the private endpoint we have created, you should see its private IP address, as well as its Fully Qualified Domain Name (FQDN). Note that the private endpoint has an IP address in the range of the VNet where it has been deployed (10.1.3.0/24):
39+
Clicking on the private endpoint we have created, you should see its private IP address and its Fully Qualified Domain Name (FQDN). The private endpoint should have an IP address in the range of the VNet where it has been deployed (10.1.3.0/24):
4040

4141
:::image type="content" source="./media/howto-private-link/sql-endpoint.png" alt-text="SQL endpoint" lightbox="./media/howto-private-link/sql-endpoint.png":::
4242

4343
## <a name="connectivity"></a>Verify connectivity from the same VNet
4444

45-
In this example, we will verify connectivity to the Azure SQL Database from a Linux virtual machine with MS SQL tools installed. The first step is verifying that DNS resolution works and the Azure SQL Database Fully Qualified Domain Name is resolved to a private IP address, in the same VNet where the Private Endpoint has been deployed (10.1.3.0/24):
45+
In this example, we verify connectivity to the Azure SQL Database from a Linux virtual machine with the MS SQL tools installed. The first step is verifying that DNS resolution works and the Azure SQL Database Fully Qualified Domain Name is resolved to a private IP address, in the same VNet where the Private Endpoint has been deployed (10.1.3.0/24):
4646

4747
```bash
4848
nslookup wantest.database.windows.net
@@ -75,7 +75,7 @@ sqlcmd -S wantest.database.windows.net -U $username -P $password -Q "$query"
7575

7676
As you can see, we are using a special SQL query that gives us the source IP address that the SQL server sees from the client. In this case the server sees the client with its private IP (`10.1.3.75`), which means that the traffic goes from the VNet straight into the private endpoint.
7777

78-
Note that you need to set the variables `username` and `password` to match the credentials defined in the Azure SQL Database to make the examples in this guide work.
78+
Set the variables `username` and `password` to match the credentials defined in the Azure SQL Database to make the examples in this guide work.
7979

8080
## <a name="vnet"></a>Connect from a different VNet
8181

@@ -86,7 +86,7 @@ Once you have connectivity between the VNet or the branch to the VNet where the
8686
* If connecting to the private endpoint from a VNet, you can use the same private zone that was created with the Azure SQL Database.
8787
* If connecting to the private endpoint from a branch (Site-to-site VPN, Point-to-site VPN or ExpressRoute), you need to use on-premises DNS resolution.
8888

89-
In this example we will connect from a different VNet, so first we will attach the private DNS zone to the new VNet so that its workloads can resolve the Azure SQL Database Fully Qualified Domain Name to the private IP address. This is done through linking the private DNS zone to the new VNet:
89+
In this example we are connecting from a different VNet. First attach the private DNS zone to the new VNet so that its workloads can resolve the Azure SQL Database Fully Qualified Domain Name to the private IP address. This is done through linking the private DNS zone to the new VNet:
9090

9191
:::image type="content" source="./media/howto-private-link/dns-link.png" alt-text="DNS link" lightbox="./media/howto-private-link/dns-link.png":::
9292

0 commit comments

Comments
 (0)