Problem with VPN site-to-site, app container in a subnet in a vnet peering

Mario E. Esteves Mariño 40 Reputation points
2024-09-19T15:47:03.1433333+00:00

Network-Dev

I have a small problem with the VPN tunnel that was configured with the Virtual Network Gateway resource.

I have 3 resource groups, the GLOBAL resource group is where the Virtual Network Gateway is hosted and it is linked to the 2 resource groups RG-A and RG-B in Hub-Spoke mode.

The tunnel allows me to connect from my on-premise site and I access the elements in the RG-GLOBAL and the resource groups RG-A and RG-B that are within the DEFAULT subnet.

I created a VM in each resource group to confirm connectivity in each subnet, but note that I only access the resources if they are within the default subnet. If they belong to another subnet, the resource becomes inaccessible.

For example, my App Containers are in the infrastructure subnet. And I cannot access them from my on-premise site; but if I put them in the default subnet, access is possible.

What do I need to configure so that, without changing the subnet, the resources are accessible from my on-premise site?

Azure VPN Gateway
Azure VPN Gateway
An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
Azure Virtual Network
Azure Virtual Network
An Azure networking service that is used to provision private networks and optionally to connect to on-premises datacenters.
Azure Container Apps
Azure Container Apps
An Azure service that provides a general-purpose, serverless container platform.
0 comments No comments
{count} votes

Answer accepted by question author
  1. ChaitanyaNaykodi-MSFT 27,661 Reputation points Microsoft Employee Moderator
    2024-09-19T21:49:20.4533333+00:00

    @Mario E. Esteves Mariño

    Based on your question above as only the default subnet on hub and spoke Vnets is reachable from on-prem.

    Thanks

    1 person found this answer helpful.
    0 comments No comments

1 additional answer

Sort by: Most helpful
  1. Mario E. Esteves Mariño 40 Reputation points
    2024-09-23T20:51:41.4266667+00:00

    Good afternoon,

    Thank you very much for your reply. Indeed, that's what I did. I created a virtual machine in each resourcegroup and in each subnet of the virtual network of that resourcegroup. It didn't work until I modified the networks of my firewall (yes, it wasn't enough to just create the total networks of the Virtual Network but also of each subnet). I had to create 12 networks (4 for each Virtual Network) and I was able to reach the VM of each resourcegroup from my OnPremise site.

    Additionally, I created a DNS table in my firewall to allow me to resolve the domain name of the Kubernetes cluster that is generated from the Azure Container Environment and the problem was solved.

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.