Forum Discussion
Access to the delegated container subnet from the rest of the network
How about following this once again:
1. Check Network Security Groups (NSGs)
• Ensure the NSG attached to the delegated subnet allows inbound traffic from:
o AZUREVLAN1 and AZUREVLAN2 address ranges
o Your on-prem network range
• Add rules to allow traffic on required ports (e.g., TCP 443, TCP 80, or container-specific ports).
2. Update Route Tables
• Delegated subnets may override custom routes. Check if a User-Defined Route (UDR) is attached.
• If not, create a route table and associate it with the delegated subnet:
o Add routes for AZUREVLAN1, AZUREVLAN2, and ONPREM-VLAN pointing to the appropriate next hop (e.g., Azure Firewall, NVA, or VPN Gateway).
3. Enable VNet Peering with “Use Remote Gateway”
• For cross-subscription peering:
o Ensure “Allow forwarded traffic” and “Allow gateway transit” are enabled on AZUREVLAN3.
o On AZUREVLAN1 and AZUREVLAN2, enable “Use remote gateway” to route traffic through AZUREVLAN3’s VPN Gateway.
4. Check Delegation Restrictions
• Some services (e.g., Azure Container Instances) restrict external access by default.
• Review the delegation documentation to confirm whether the service supports external routing.
5. Use Private Endpoints or Service Endpoints
• If the container service supports Private Link, deploy a Private Endpoint in AZUREVLAN1 or AZUREVLAN2 that connects to the container in AZUREVLAN3.
• Alternatively, configure Service Endpoints to allow access from other VNets.