Azure app service with private endpoint - throws 403 on kudu

Soni, Nishant 1 Reputation point
2021-02-09T04:38:18.153+00:00

My application is working as expected on Azure app service. The next step was to make it available only while connected to our corporate VPN. This was done by using vnet integration and that's all working as expected. (Windows Setup, ASP.NET APP) Only concern here is that Kudu advanced tools aren't working so I can't actually access my files for live debugging anymore. It throws a 403 error. Please be aware that the application is not publicly available (can only be accessed while on our VPN). So how can I solve this issue with kudu? There's a CI CD pipeline that deploys to my application service.

Azure App Service
Azure App Service
Azure App Service is a service used to create and deploy scalable, mission-critical web apps.
8,960 questions
{count} votes

1 answer

Sort by: Most helpful
  1. ajkuma 28,036 Reputation points Microsoft Employee Moderator
    2021-02-25T11:25:46.047+00:00

    Updating the answer from comments: to benefit the community:

    "The kudu issue was solved after setting-up the DNS records in the internal zone."

    • For accessing the Kudu console, or Kudu REST API (deployment with Azure DevOps self-hosted agents for example), you must create two records in your Azure DNS private zone or your custom DNS server. Kindly check this document for more details. If you haven't added the records, kindly see if that works.

    Name |Type | Value
    mywebapp.privatelink.azurewebsites.net A PrivateEndpointIP
    mywebapp.scm.privatelink.azurewebsites.net A PrivateEndpointIP

    • Ensure that the release pipeline is running in the right host. Because the endpoint is private for the SCM too, the DevOps Agent must be in a network with access with the endpoint, so mandatory to use self-hosted Devops Agent.

    Just to highlight, you must not change azurewebsites.net record, you need to create only the myapp.privatelink.azurewebsites.net and myapp.scm.privatelink.azurewebsites.net DNS records, as explain in the article, App Service will create the CNAME from public to private. but your app or the SCM must be reached by the public name not the private link one, if not you will have no name to match and no TLS handshake. Private link is for the resolution only.

    • Yes. You can setup a Windows VM on Azure in the same network as the App Service and use that as an agent.

    I have also shared your feedback with the content team, to update the doc with a specific topic about how to deploy code with private endpoint, which should cover all these points. But, there is no ETA to share on the document update at this time.

    private-endpoint#dns: https://learn.microsoft.com/azure/app-service/networking/private-endpoint#dns

    Thanks for your time and collaboration!

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.