An Azure service that provides private connectivity from a virtual network to Azure platform as a service, customer-owned, or Microsoft partner services.
Thank you for reaching out. I am answering the follow-up questions you had above.
Our primary route to azure is a site to site vpn with our hq meraki. The hq meraki then routes traffic to an azure meraki vmx, which is a site to site vpn tunnel via the 2 merakis. Is it possible to have 2 site to site vpn tunnels on the same device going to 2 different places, ie 1 tunnel to our hq meraki and the other to azure via the azure vpn gateway?
Based on my understanding. Yes, I think this should be fine just make sure advertise the correct routes to each VPN tunnel. You can follow the configuration guide here for setting Azure S2S VPN using Cisco Meraki device.
In the dropdown, it does not show up as a vnet that can be used for the virtual network gateway.
This can happen if the Virtual Network created is not in the same region you are deploying the VPN Gateway to.
If they are in the same region then this might be transient portal issue and it will help if you can follow the PowerShell tutorial here and see if you are able to deploy VPN Gateway in the Vnet created.
Regarding your original question above, after you have set-up the VPN connectivity, you can follow the guide here for on-premises workloads to resolve the FQDN of a private endpoint.
Hope this helps! Please let me know if you have any additional questions. Thank you!