Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This article describes how to use Azure Private Link in a hub-and-spoke network topology. The target audience includes network architects and cloud solution architects. This guide outlines how to use Azure private endpoints to privately access platform as a service (PaaS) resources.
This guide doesn't cover virtual network integration, service endpoints, and other solutions for connecting infrastructure as a service (IaaS) components to Azure PaaS resources. For more information about these solutions, see Integrate Azure services with virtual networks for network isolation.
Azure hub-and-spoke topologies
You can use a hub-and-spoke network topology in Azure to efficiently manage communication services and meet security requirements at scale. For more information, see Hub-and-spoke network topology.
A hub-and-spoke architecture provides the following benefits:
- Deploys individual workloads between central IT teams and workload teams
- Saves costs by minimizing redundant resources
- Manages networks efficiently by centralizing services that multiple workloads share
- Overcomes limits associated with a single Azure subscription
The following diagram shows a typical hub-and-spoke topology that you can deploy in Azure.
Download a Visio file of this architecture.
This architecture is one of two network topology options that Azure supports. This classic reference design uses basic network components like Azure Virtual Network, virtual network peering, and user-defined routes (UDRs). When you use a hub-and-spoke topology, you configure the services, and you must ensure that the network meets security and routing requirements.
Azure Virtual WAN provides an alternative for deployments at scale. This service uses a simplified network design. Virtual WAN reduces the configuration overhead associated with routing and security.
Private Link supports different options for traditional hub-and-spoke networks and for Virtual WAN networks.
Private Link
Private Link provides access to services over a private endpoint network interface. A private endpoint uses a private IP address from your virtual network. You can access various services over that private IP address:
- Azure PaaS services
- Customer-owned services that Azure hosts
- Partner services that Azure hosts
Traffic between your virtual network and the service that you access travels across the Azure network backbone. As a result, you no longer access the service over a public endpoint. For more information, see Private Link.
The following diagram shows how on-premises users connect to a virtual network and use Private Link to access PaaS resources.
Download a Visio file of this architecture.
Choose the best Private Link deployment configuration
You can deploy private endpoints in either a hub or a spoke. A few factors determine which location works best in each situation. Consider the following factors to determine the best configuration for Azure PaaS services and for customer-owned and partner services that Azure hosts.
Determine whether you use Virtual WAN as your network connectivity solution
If you use Virtual WAN, you can only deploy private endpoints on spoke virtual networks that you connect to your virtual hub. You can't deploy resources into your virtual hub or secure hub.
For more information about integrating private endpoints into your network, see the following articles:
Determine whether you use a network virtual appliance such as Azure Firewall
Traffic to private endpoints uses the Azure network backbone and is encrypted. You might need to log or filter that traffic. You might also want to analyze traffic that flows to private endpoints if you use a firewall in the following areas:
- Across spokes
- Between your hub and spokes
- Between on-premises components and your Azure networks
In this case, deploy private endpoints in your hub in a dedicated subnet. This setup provides the following benefits:
Simplifies your secure network address translation (SNAT) rule configuration. You can create a single SNAT rule in your network virtual appliance (NVA) for traffic to the dedicated subnet that contains your private endpoints. You can route traffic to other applications without applying SNAT.
Simplifies your route table configuration. For traffic that flows to private endpoints, you can add a rule to route that traffic through your NVA. You can reuse that rule across all spokes, virtual private network (VPN) gateways, and Azure ExpressRoute gateways.
Enables you to apply network security group rules for inbound traffic in the subnet that you dedicate to a private endpoint. These rules filter traffic to your resources. They provide a single place to control access to your resources.
Centralizes management of private endpoints. If you deploy all private endpoints in one place, you can more efficiently manage them in all virtual networks and subscriptions.
Use this configuration when all workloads need access to each PaaS resource that Private Link protects. If your workloads access different PaaS resources, don't deploy private endpoints in a dedicated subnet. Instead, improve security by following the principle of least privilege:
- Place each private endpoint in a separate subnet.
- Only give workloads that use a protected resource access to that resource.
Determine whether you use a private endpoint from an on-premises system
If you plan on using private endpoints to access resources from an on-premises system, deploy the endpoints in your hub. This setup provides the following benefits:
- You can use network security groups to control access to your resources.
- You can manage your private endpoints in a centralized location.
If you plan on accessing resources from applications that you deploy in Azure, the following factors apply:
- If only one application needs access to your resources, deploy a private endpoint in that application's spoke.
- If more than one application needs access to your resources, deploy a private endpoint in your hub.
Flowchart
The following flowchart summarizes options and recommendations. Every customer has a unique environment, so consider your system's requirements when you decide where to place private endpoints.
Download a Visio file of this architecture.
Considerations
The following factors can affect your private endpoint implementation. They apply to Azure PaaS services and customer-owned and partner services that Azure hosts.
Networking
When you use private endpoints in a spoke virtual network, the subnet's default route table includes a /32
route, with a next hop type of InterfaceEndpoint
.
If you use a traditional hub-and-spoke topology, you can view this effective route at the network-interface level of your virtual machines (VMs). For more information, see Diagnose a VM routing problem.
If you use Virtual WAN, you can view this route in the virtual hub effective routes. For more information, see View virtual hub effective routes.
The /32
route gets propagated to the following areas:
- Any virtual network peering that you configure
- Any VPN or ExpressRoute connection to an on-premises system
To restrict access from your hub or on-premises system to a private endpoint, use a network security group in the subnet where you deploy the private endpoint. Configure appropriate inbound rules.
Name resolution
Components in your virtual network associate a private IP address with each private endpoint. Those components can only resolve that private IP address if you use a specific Domain Name System (DNS) setup. If you use a custom DNS solution, use DNS zone groups. Integrate the private endpoint with a centralized Azure private DNS zone, whether you deploy resources in a hub or a spoke. Link the private DNS zone with all virtual networks that need to resolve your private endpoint DNS name.
In this approach, on-premises and Azure DNS clients can resolve the name and access the private IP address. For a reference implementation, see Private Link and DNS integration at scale.
Costs
When you use private endpoints across a regional virtual network peering, peering fees don't apply for traffic to and from private endpoints.
Peering costs apply with other infrastructure resource traffic that flows across a virtual network peering.
When you deploy private endpoints across different regions, Private Link rates and global peering inbound and outbound rates apply.
For more information, see Bandwidth pricing.
Contributors
Microsoft maintains this article. The following contributors wrote this article.
Principal author:
- Jose Angel Fernandez Rodrigues | Senior Specialist GBB
Other contributor:
- Ivens Applyrs | Product Manager 2
To see nonpublic LinkedIn profiles, sign in to LinkedIn.
Next steps
- Private Link availability
- Private endpoints
- Azure Virtual Network
- Azure DNS
- Private Azure DNS zone
- Use Azure Firewall to inspect traffic destined to a private endpoint
- How network security groups filter network traffic