Generally Available: Azure Arc-enabled servers support for private endpoints

Published May 09 2022 12:00 PM 2,631 Views
Microsoft

The Azure Arc team is excited to announce that Azure Arc-enabled servers’ support for private endpoints is now generally available! With private endpoints, you can send traffic from the Azure Connected Machine Agent to Azure over a site-to-site VPN or Express Route circuit instead of the public internet or proxy server. This can help you reduce network exposure and improve security while still allowing you to use Azure Arc to secure, monitor and govern your servers running outside of Azure.

 

How does it work?

 

Private endpoints allow you to connect an Azure service to an Azure virtual network using private IP addresses. Servers and other resources in that virtual network can then communicate with the Azure service using the private IP address and instead of sending data over the internet.


Azure Arc uses a Private Link Scope resource to associate a private endpoint with the non-Azure servers that will use the private endpoint. You’ll also need to set up a site-to-site VPN or Express Route circuit to connect your Azure virtual network with the network where your non-Azure servers are connected.


Once configured, the Connected Machine agent on your Arc-enabled servers will send all metadata updates, extension operations, and guest configuration package downloads over the private endpoint. Network traffic between extensions you’ve installed and the Azure services that support them will also route through the internet unless you’ve configured private endpoints for each of those services. Additionally, the Connected Machine agent will still require access to Azure Active Directory and Azure Resource Manager over the internet.

 

Network architecture diagram of Azure Arc-enabled servers private endpointsNetwork architecture diagram of Azure Arc-enabled servers private endpoints

 

Learn more and get started

 

You can learn more about private endpoints for Azure Arc-enabled servers in our documentation, which covers the concepts, prerequisites, and setup instructions for new and existing servers. There is also an Azure Arc Jumpstart scenario for private endpoints where you can set up a sandbox environment in Azure to learn more about private endpoints and practice working with them without affecting any of your production infrastructure. And lastly, our Azure Arc landing zone accelerator covers network topology and connectivity best practices, as you scale from testing to production workloads

%3CLINGO-SUB%20id%3D%22lingo-sub-3345962%22%20slang%3D%22en-US%22%3EGenerally%20Available%3A%20Azure%20Arc-enabled%20servers%20support%20for%20private%20endpoints%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3345962%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20Azure%20Arc%20team%20is%20excited%20to%20announce%20that%20Azure%20Arc-enabled%20servers%E2%80%99%20support%20for%20private%20endpoints%20is%20now%20generally%20available!%20With%20private%20endpoints%2C%20you%20can%20send%20traffic%20from%20the%20Azure%20Connected%20Machine%20Agent%20to%20Azure%20over%20a%20site-to-site%20VPN%20or%20Express%20Route%20circuit%20instead%20of%20the%20public%20internet%20or%20proxy%20server.%20This%20can%20help%20you%20reduce%20network%20exposure%20and%20improve%20security%20while%20still%20allowing%20you%20to%20use%20Azure%20Arc%20to%20secure%2C%20monitor%20and%20govern%20your%20servers%20running%20outside%20of%20Azure.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-1120715734%22%20id%3D%22toc-hId-1120737902%22%3EHow%20does%20it%20work%3F%3C%2FH4%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EPrivate%20endpoints%20allow%20you%20to%20connect%20an%20Azure%20service%20to%20an%20Azure%20virtual%20network%20using%20private%20IP%20addresses.%20Servers%20and%20other%20resources%20in%20that%20virtual%20network%20can%20then%20communicate%20with%20the%20Azure%20service%20using%20the%20private%20IP%20address%20and%20instead%20of%20sending%20data%20over%20the%20internet.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EAzure%20Arc%20uses%20a%20Private%20Link%20Scope%20resource%20to%20associate%20a%20private%20endpoint%20with%20the%20non-Azure%20servers%20that%20will%20use%20the%20private%20endpoint.%20You%E2%80%99ll%20also%20need%20to%20set%20up%20a%20site-to-site%20VPN%20or%20Express%20Route%20circuit%20to%20connect%20your%20Azure%20virtual%20network%20with%20the%20network%20where%20your%20non-Azure%20servers%20are%20connected.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EOnce%20configured%2C%20the%20Connected%20Machine%20agent%20on%20your%20Arc-enabled%20servers%20will%20send%20all%20metadata%20updates%2C%20extension%20operations%2C%20and%20guest%20configuration%20package%20downloads%20over%20the%20private%20endpoint.%20Network%20traffic%20between%20extensions%20you%E2%80%99ve%20installed%20and%20the%20Azure%20services%20that%20support%20them%20will%20also%20route%20through%20the%20internet%20unless%20you%E2%80%99ve%20configured%20private%20endpoints%20for%20each%20of%20those%20services.%20Additionally%2C%20the%20Connected%20Machine%20agent%20will%20still%20require%20access%20to%20Azure%20Active%20Directory%20and%20Azure%20Resource%20Manager%20over%20the%20internet.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId--686738729%22%20id%3D%22toc-hId--686716561%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22Network%20architecture%20diagram%20of%20Azure%20Arc-enabled%20servers%20private%20endpoints%22%20style%3D%22width%3A%20800px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F370282i303224D90D8B6284%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22ArcServerPrivateLink.png%22%20alt%3D%22Network%20architecture%20diagram%20of%20Azure%20Arc-enabled%20servers%20private%20endpoints%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ENetwork%20architecture%20diagram%20of%20Azure%20Arc-enabled%20servers%20private%20endpoints%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FH4%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-1800774104%22%20id%3D%22toc-hId-1800796272%22%3ELearn%20more%20and%20get%20started%3C%2FH4%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20can%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fazure-arc%2Fservers%2Fprivate-link-security%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3Elearn%20more%20about%20private%20endpoints%20for%20Azure%20Arc-enabled%20servers%20in%20our%20documentation%3C%2FA%3E%2C%20which%20covers%20the%20concepts%2C%20prerequisites%2C%20and%20setup%20instructions%20for%20new%20and%20existing%20servers.%20There%20is%20also%20an%20%3CA%20href%3D%22https%3A%2F%2Fazurearcjumpstart.io%2Fazure_arc_jumpstart%2Fazure_arc_servers%2Fday2%2Farc_privatelink%2F%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EAzure%20Arc%20Jumpstart%20scenario%20for%20private%20endpoints%3C%2FA%3E%20where%20you%20can%20set%20up%20a%20sandbox%20environment%20in%20Azure%20to%20learn%20more%20about%20private%20endpoints%20and%20practice%20working%20with%20them%20without%20affecting%20any%20of%20your%20production%20infrastructure.%20And%20lastly%2C%20our%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fcloud-adoption-framework%2Fscenarios%2Fhybrid%2Farc-enabled-servers%2Feslz-arc-servers-connectivity%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EAzure%20Arc%20landing%20zone%20accelerator%3C%2FA%3E%20covers%20network%20topology%20and%20connectivity%20best%20practices%2C%20as%20you%20scale%20from%20testing%20to%20production%20workloads%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-3345962%22%20slang%3D%22en-US%22%3E%3CP%3EConnect%20your%20servers%20to%20Azure%20Arc%20over%20a%20secure%2C%20private%20connection.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3345962%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Arc%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EServers%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎May 09 2022 11:51 AM
Updated by: