You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/environment/overview.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,6 +65,9 @@ If you require physical isolation down to the hardware level, you can deploy you
65
65
66
66
Only I1v2, I2v2, and I3v2 SKU sizes are available in an App Service Environment deployed on dedicated hosts. Extra charges apply for dedicated host deployments.
67
67
68
+
> [!NOTE]
69
+
> Dedicated host deployments are available only in limited regions, and expansion to additional regions isn't planned.
70
+
68
71
Most customers don't require isolation down to the hardware level, so consider the limitations of dedicated host deployments before you use this feature. To determine whether a dedicated host deployment is right for you, review your security and compliance requirements before deployment.
Copy file name to clipboardExpand all lines: articles/application-gateway/private-link-configure.md
+13-29Lines changed: 13 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,30 +30,30 @@ You can configure Application Gateway Private Link using multiple methods:
30
30
- Azure PowerShell
31
31
- Azure CLI
32
32
33
-
# [Azure portal](#tab/portal)
34
-
35
33
## Prerequisites
36
34
37
35
Before configuring Private Link, ensure you have:
38
36
- An existing Application Gateway
39
37
- A virtual network with a dedicated subnet for Private Link (separate from the Application Gateway subnet)
40
38
- Appropriate permissions to create and configure Private Link resources
41
39
42
-
## Define a subnet for Private Link configuration
40
+
## Subnet considerations for Private Link configuration
43
41
44
-
To enable Private Link configuration, you must create a dedicated subnet that's separate from the Application Gateway subnet. This subnet is used exclusively for Private Link IP configurations and can't contain any Application Gateway instances.
42
+
To enable Private Link configuration, you must have a dedicated subnet that's separate from the Application Gateway subnet. This subnet is used exclusively for Private Link IP configurations and can't contain any Application Gateway instances.
45
43
46
-
**Subnet sizing considerations:**
47
44
- Each IP address allocated to this subnet supports up to 65,536 concurrent TCP connections through Private Link
48
45
- To calculate required IP addresses: `n × 65,536` connections, where `n` is the number of IP addresses provisioned
49
46
- Maximum of eight IP addresses per Private Link configuration
50
47
- Only dynamic IP address allocation is supported
48
+
- The subnet must have [Private Link Service Network Policies](../private-link/disable-private-endpoint-network-policy.md#disable-network-policy) disabled
51
49
52
50
> [!IMPORTANT]
53
51
> The combined length of the Application Gateway name and Private Link configuration name must not exceed 70 characters to avoid deployment failures.
54
52
55
53
To create a dedicated subnet for Private Link, see [Add, change, or delete a virtual network subnet](../virtual-network/virtual-network-manage-subnet.md).
56
54
55
+
# [Azure portal](#tab/portal)
56
+
57
57
## Disable network policies on the Private Link subnet
58
58
59
59
To allow Private Link connectivity, you must [disable the Private Link Service Network Policies](../private-link/disable-private-endpoint-network-policy.md#disable-network-policy) on the subnet designated for Private Link IP configurations.
@@ -67,15 +67,14 @@ To disable network policies, follow these steps:
67
67
1. Under **Private link service network policies**, select **Disabled**.
68
68
1. Select **Save** to apply the changes.
69
69
1. Wait a few minutes for the changes to take effect.
70
-
1.verify that the **Private link service network policies** setting is now **Disabled**.
70
+
1.Verify the **Private link service network policies** setting is now **Disabled**.
71
71
72
72
## Configure Private Link
73
73
74
74
The Private Link configuration defines the infrastructure that enables connections from Private Endpoints to your Application Gateway. Before creating the Private Link configuration, ensure that a listener is actively configured to use the target frontend IP configuration.
75
75
76
76
Follow these steps to create the Private Link configuration:
77
77
78
-
79
78
1. Search for and select **Application Gateways**.
80
79
1. Select your Application Gateway instance.
81
80
1. In the left navigation pane, select **Private link**, then select **+ Add**.
@@ -87,9 +86,6 @@ Follow these steps to create the Private Link configuration:
87
86
1. Select **Add** to create the configuration.
88
87
1. From your Application Gateway settings, copy and save the **Resource ID**. This identifier is required when setting up Private Endpoints from different Microsoft Entra tenants.
89
88
90
-
>[!CAUTION]
91
-
>Private link configuration will momentarily cause traffic disruption (less than 1 minute) while the change is applied. Changes are recommended to be conducted during a maintenance window or period of low-traffic. During this time, you may see connection timeouts or 4XX http status codes returned on request. Add/Remove/Approval/Rejection of private endpoints will not cause traffic disruption.
92
-
93
89
## Configure Private Endpoint
94
90
95
91
A Private Endpoint is a network interface that uses a private IP address from your virtual network to connect securely to Azure Application Gateway. Clients use the Private Endpoint's private IP address to establish connections to the Application Gateway through a secure tunnel.
@@ -122,20 +118,9 @@ To create a Private Endpoint, follow these steps:
122
118
> When provisioning a Private Endpoint from a different Microsoft Entra tenant, you must use the Azure Application Gateway Resource ID and specify the frontend IP configuration name as the target sub-resource.
123
119
For example, if your private IP configuration is named `PrivateFrontendIp` in the portal, use `PrivateFrontendIp` as the target sub-resource value.
124
120
125
-
> [!CAUTION]
126
-
> When moving a Private Endpoint to a different subscription, you must first delete the existing connection between the Private Link and Private Endpoint. After deletion, create a new Private Endpoint connection in the target subscription to reestablish connectivity.
127
-
128
-
129
121
130
122
# [Azure PowerShell](#tab/powershell)
131
123
132
-
## Prerequisites
133
-
134
-
Before using PowerShell commands, ensure you have:
135
-
- Azure PowerShell module installed and configured
136
-
- Appropriate permissions to modify Application Gateway and network resources
137
-
- An existing Application Gateway and virtual network (VNet) service
138
-
139
124
## Configure Private Link using PowerShell
140
125
141
126
Use the following PowerShell commands to configure Private Link on an existing Application Gateway:
@@ -211,13 +196,6 @@ The following Azure PowerShell cmdlets are available for managing Application Ga
211
196
212
197
# [Azure CLI](#tab/cli)
213
198
214
-
## Prerequisites
215
-
216
-
Before using Azure CLI commands, ensure you have:
217
-
- Azure CLI installed and configured
218
-
- Appropriate permissions to modify Application Gateway and network resources
219
-
- An existing Application Gateway and virtual network (VNet) service
220
-
221
199
## Configure Private Link using Azure CLI
222
200
223
201
Use the following Azure CLI commands to configure Private Link on an existing Application Gateway:
@@ -269,6 +247,12 @@ az network private-endpoint create \
269
247
--connection-name AppGW-PL-Connection
270
248
```
271
249
250
+
> [!Note]
251
+
> To move a Private Endpoint to a different subscription, you must delete the existing connection between the Private Link and Private Endpoint. After deletion, create a new Private Endpoint connection in the target subscription to reestablish connectivity.
252
+
253
+
>[!CAUTION]
254
+
>Private link configuration will momentarily cause traffic disruption (less than 1 minute) when enabled or disabled. Changes are recommended to be conducted during a maintenance window or period of low-traffic. During this time, you may see connection timeouts or 4XX http status codes returned on request. Add/Remove/Approval/Rejection of private endpoints will not cause traffic disruption.
255
+
272
256
## Azure CLI reference
273
257
274
258
For comprehensive Azure CLI command reference for Application Gateway Private Link configuration, see [Azure CLI - Application Gateway Private Link](/cli/azure/network/application-gateway/private-link).
@@ -282,4 +266,4 @@ To learn more about Azure Private Link and related services:
282
266
-[What is Azure Private Link?](../private-link/private-link-overview.md)
283
267
-[Application Gateway Private Link overview](private-link.md)
284
268
-[Private Link service overview](../private-link/private-link-service-overview.md)
0 commit comments