You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/private-link-security.md
+20-9Lines changed: 20 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -114,23 +114,34 @@ See the visual diagram under the section [How it works](#how-it-works) for the n
114
114
115
115
1. Go to **Create a resource** in the Azure portal and search for **Azure Arc Private Link Scope**. Or you can use the following link to open the [Azure Arc Private Link Scope](https://portal.azure.com/#blade/HubsExtension/BrowseResource/resourceType/Microsoft.HybridCompute%2FprivateLinkScopes) page in the portal.
116
116
117
-
:::image type="content" source="./media/private-link-security/find-scope.png" alt-text="Find Private Link Scope" border="true":::
117
+
:::image type="content" source="./media/private-link-security/private-scope-home.png" lightbox="./media/private-link-security/private-scope-home.png" alt-text="Screenshot of private scope home page with Create button." border="true":::
118
118
119
119
1. Select **Create**.
120
120
121
-
1.Pick a Subscription and Resource Group.
121
+
1.In the **Basics** tab, select a Subscription and Resource Group.
122
122
123
-
1.Give the Azure Arc Private Link Scope a name. It's best to use a meaningful and clear name.
123
+
1.Enter a name for the Azure Arc Private Link Scope. It's best to use a meaningful and clear name.
124
124
125
-
You can optionally require every Azure Arc-enabled machine or server associated with this Azure Arc Private Link Scope to send data to the service through the private endpoint. If you select **Enable public network access**, machines or servers associated with this Azure Arc Private Link Scope can communicate with the service over both private or public networks. You can change this setting after creating the scope if you change your mind.
125
+
Optionally, you can require every Azure Arc-enabled machine or server associated with this Azure Arc Private Link Scope to send data to the service through the private endpoint. To do so, check the box for **Allow public network access** so machines or servers associated with this Azure Arc Private Link Scope can communicate with the service over both private or public networks. You can change this setting after creating the scope if you change your mind.
126
+
127
+
1. Select the **Private endpoint** tab, then select **Create**.
128
+
1. In the **Create private endpoint** window:
129
+
1. Enter a **Name** for the endpoint.
130
+
131
+
1. Choose **Yes** for **Integrate with private DNS zone**, and let it automatically create a new Private DNS Zone.
132
+
133
+
> [!NOTE]
134
+
> If you choose **No** and prefer to manage DNS records manually, first complete setting up your Private Link - including this Private Endpoint and the Private Scope configuration. Then, configure your DNS according to the instructions in [Azure Private Endpoint DNS configuration](../../private-link/private-endpoint-dns.md). Make sure not to create empty records as preparation for your Private Link setup. The DNS records you create can override existing settings and impact your connectivity with Azure Arc-enabled servers.
135
+
136
+
1. Select **OK**.
126
137
127
138
1. Select **Review + Create**.
128
139
129
-
:::image type="content" source="./media/private-link-security/create-private-link-scope.png" alt-text="Create Private Link Scope" border="true":::
140
+
:::image type="content" source="./media/private-link-security/create-private-link-scope.png" alt-text="Screenshot showing the Create Private Link Scope window" border="true":::
130
141
131
142
1. Let the validation pass, and then select **Create**.
132
143
133
-
## Create a private endpoint
144
+
<!--## Create a private endpoint
134
145
135
146
Once your Azure Arc Private Link Scope is created, you need to connect it with one or more virtual networks using a private endpoint. The private endpoint exposes access to the Azure Arc services on a private IP in your virtual network address space.
136
147
@@ -167,7 +178,7 @@ Once your Azure Arc Private Link Scope is created, you need to connect it with o
167
178
168
179
d. Let validation pass.
169
180
170
-
e. Select **Create**.
181
+
e. Select **Create**.-->
171
182
172
183
## Configure on-premises DNS forwarding
173
184
@@ -189,7 +200,7 @@ If you opted out of using Azure private DNS zones during private endpoint creati
189
200
190
201
1. From the left-hand pane, select **DNS configuration** to see a list of the DNS records and corresponding IP addresses you'll need to set up on your DNS server. The FQDNs and IP addresses will change based on the region you selected for your private endpoint and the available IP addresses in your subnet.
1. Follow the guidance from your DNS server vendor to add the necessary DNS zones and A records to match the table in the portal. Ensure that you select a DNS server that is appropriately scoped for your network. Every machine or server that uses this DNS server now resolves the private endpoint IP addresses and must be associated with the Azure Arc Private Link Scope, or the connection will be refused.
195
206
@@ -275,7 +286,7 @@ For Azure Arc-enabled servers that were set up prior to your private link scope,
275
286
> [!NOTE]
276
287
> Only Azure Arc-enabled servers in the same subscription and region as your Private Link Scope is shown.
0 commit comments