That's an interesting question. Since you're only trying to allow East US staff to access Azure resources privately (via Private Endpoints), the East US VNet serves a different purpose compared to the UK South VNet that hosts your core services and integration requirements.
In short, for the East US VNet, a single subnet is sufficient if its only purpose is to host private endpoints for accessing resources hosted in the UK South region.
Private endpoints:
- Are deployed in a subnet of your choice.
- Create a NIC in that subnet that connects privately to the resource’s Private Link endpoint in another region (in your case, UK South).
- Do not require outbound VNet integration, so there's no need for separate subnets like you have in UK South (e.g., for web apps or logic apps).
You would only need additional subnets if you plan to:
- Host web apps, function apps, or logic apps in East US and want VNet outbound integration.
- Require NSGs or UDRs that you want to scope differently for different types of endpoints or apps.
- Use private DNS zones with specific resolution boundaries (less common, but possible in complex setups).
If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.
hth
Marcin