Blog Post
Reference Architecture for Highly Available Multi-Region Azure Kubernetes Service (AKS)
how much of this has to change if using private endpoints comes into play and you have strict requirements to not route anything over the internet?
I had the same question! I know the cross-region failover traffic between data services like PSQL and Azure Storage Accounts can be handled with Azure DNS, VNETs, and private endpoints; however, as far as I'm aware there's not a fully managed Azure Service for global, private load balancing across regions in terms of ingress since Azure Front Door and Azure Global Load Balancers must have public endpoints. You can configure a private endpoint as a private backend, but it'll still have the initial public ingress (although I'd argue that this is still secure and I suspect would be InfoSec approvable after some convincing). I'm curious what rgarofalo would suggest. Only thing I could think of would be a private AGW with a self-managed DNS failover, but you'd lose some of the L7 capabilities of front door and the more managed failover aspects.