Skip to content

Commit 7324b11

Browse files
Merge pull request #311088 from sethmanheim/edgefix
Pull commits for update to IoT Edge
2 parents c8a26db + bb284b8 commit 7324b11

1 file changed

Lines changed: 37 additions & 1 deletion

File tree

articles/iot-edge/using-private-link.md

Lines changed: 37 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Azure Private Link and Private Endpoints to secure Azure IoT traffic
33
description: Learn how to use IoT Edge while completely isolating your network from the internet traffic using various Azure services such as Azure ExpressRoute, Private Link, and DNS Private Resolver
44
author: sethmanheim
55
ms.author: sethm
6-
ms.date: 07/22/2025
6+
ms.date: 01/29/2026
77
ms.topic: concept-article
88
ms.service: azure-iot-edge
99
services: iot-edge
@@ -32,4 +32,40 @@ Azure Private Link lets you use Azure PaaS services and Azure-hosted customer-ow
3232

3333
Azure DNS Private Resolver lets you query Azure DNS private zones from an on-premises environment and the other way around without deploying VM-based DNS servers. Azure DNS Private Resolver makes it easier to manage both private and public IPs. The DNS forwarding ruleset feature in Azure DNS Private Resolver helps an IoT admin easily configure rules and manage which address an endpoint should resolve. To learn more about Azure DNS Private Resolver, see [What is Azure DNS Private Resolver?](../dns/dns-private-resolver-overview.md).
3434

35+
### Configure IoT Edge endpoints when using Private Link
36+
37+
When Private Link is enabled, you must configure IoT Edge to use the **private endpoint FQDNs**, not the public service hostnames. If public hostnames are used, IoT Edge modules fail to connect after public network access is disabled.
38+
39+
#### Which hostname should be used?
40+
41+
| Azure service | Public FQDN | Private Link FQDN | What IoT Edge should use |
42+
|---------------|-------------|-------------------|---------------------------|
43+
| IoT Hub | `<hubname>.azure-devices.net` | `<hubname>.privatelink.azure-devices.net` | Use Private Link FQDN |
44+
| DPS | `global.azure-devices-provisioning.net` | `global.privatelink.azure-devices-provisioning.net` | Use Private Link FQDN |
45+
| Azure Container Registry (ACR) | `<registry>.azurecr.io` | `<registry>.privatelink.azurecr.io` | Use Private Link FQDN |
46+
| Storage (Blob) | `<account>.blob.core.windows.net` | `<account>.privatelink.blob.core.windows.net` | Use Private Link FQDN |
47+
48+
#### Example IoT Edge `config.yaml`
49+
50+
```yaml
51+
provisioning:
52+
source: "dps"
53+
global_endpoint: "global.privatelink.azure-devices-provisioning.net"
54+
scope_id: "<scope-id>"
55+
56+
agent:
57+
env:
58+
IOTEDGE_IOTHUBHOSTNAME: "<hubname>.privatelink.azure-devices.net"
59+
```
60+
61+
#### DNS requirement
62+
63+
Your environment must correctly resolve private endpoint hostnames. Ensure:
64+
65+
- Private DNS zones for IoT Hub, DPS, ACR, and Storage are configured.
66+
- Private DNS zones are linked to your VNET.
67+
- On-premises systems forward DNS queries via Azure DNS Private Resolver (if applicable).
68+
69+
If DNS isn't configured, IoT Edge won't be able to resolve the private endpoint FQDNs.
70+
3571
For a walkthrough example scenario, see [Using Azure Private Link and Private Endpoints to secure Azure IoT traffic](https://kevinsaye.wordpress.com/2020/09/30/using-azure-private-link-and-private-endpoints-to-secure-azure-iot-traffic/). This example shows a possible configuration for a factory network and isn't intended as a production-ready reference.

0 commit comments

Comments
 (0)