Sündmused
17. märts, 21 - 21. märts, 10
Liituge sarjaga, et luua muude arendajate ja ekspertidega skaleeritavad tehisintellektilahendused, mis põhinevad reaalajas kasutusjuhtumitel.
Registreeruge koheSeda brauserit enam ei toetata.
Uusimate funktsioonide, turbevärskenduste ja tehnilise toe kasutamiseks võtke kasutusele Microsoft Edge.
Märkus
Starting June 1, 2024, newly created App Service apps can generate a unique default hostname that uses the naming convention <app-name>-<random-hash>.<region>.azurewebsites.net
. Existing app names remain unchanged. For example:
myapp-ds27dh7271aah175.westus-01.azurewebsites.net
For more information, see Unique Default Hostname for App Service Resource.
Oluline
Private endpoints are available for Windows and Linux apps, containerized or not, hosted on these App Service plans: Basic, Standard, PremiumV2, PremiumV3, IsolatedV2, Functions Premium (sometimes called the Elastic Premium plan).
You can use a private endpoint for your App Service apps. The private endpoint allows clients located in your private network to securely access the app over Azure Private Link. The private endpoint uses an IP address from your Azure virtual network address space. Network traffic between a client on your private network and the app traverses over the virtual network and a Private Link on the Microsoft backbone network. This configuration eliminates exposure from the public Internet.
Using a private endpoint for your app enables you to:
A private endpoint is a special network interface (NIC) for your App Service app in a subnet in your virtual network. When you create a private endpoint for your app, it provides secure connectivity between clients on your private network and your app. The private endpoint is assigned an IP Address from the IP address range of your virtual network. The connection between the private endpoint and the app uses a secure Private Link. Private endpoint is only used for incoming traffic to your app. Outgoing traffic doesn't use this private endpoint. You can inject outgoing traffic to your network in a different subnet through the virtual network integration feature.
Each slot of an app is configured separately. You can use up to 100 private endpoints per slot. You can't share a private endpoint between slots. The subresource name of a slot is sites-<slot-name>
.
The subnet where you plug the private endpoint can have other resources in it. You don't need a dedicated empty subnet. You can also deploy the private endpoint in a different region than your app.
Märkus
The virtual network integration feature can't use the same subnet as private endpoint.
From a security perspective:
In the Web HTTP logs of your app, you find the client source IP. This feature is implemented using the TCP Proxy protocol, forwarding the client IP property up to the app. For more information, see Getting connection Information using TCP Proxy v2.
When you use private endpoint for App Service apps, the requested URL must match the name of your app. By default, <app-name>.azurewebsites.net
. When you use unique default hostname, your app name has the format <app-name>-<random-hash>.<region>.azurewebsites.net
. In the following examples, mywebapp could also represent the full regionalized unique hostname.
By default, without a private endpoint, the public name of your web app is a canonical name to the cluster. For example, the name resolution is:
Name | Type | Value |
---|---|---|
mywebapp.azurewebsites.net | CNAME | clustername.azurewebsites.windows.net |
clustername.azurewebsites.windows.net | CNAME | cloudservicename.cloudapp.net |
cloudservicename.cloudapp.net | A | 192.0.2.13 |
When you deploy a private endpoint, the approach updates the DNS entry to point to the canonical name: mywebapp.privatelink.azurewebsites.net
.
For example, the name resolution is:
Name | Type | Value | Remark |
---|---|---|---|
mywebapp.azurewebsites.net | CNAME | mywebapp.privatelink.azurewebsites.net | |
mywebapp.privatelink.azurewebsites.net | CNAME | clustername.azurewebsites.windows.net | |
clustername.azurewebsites.windows.net | CNAME | cloudservicename.cloudapp.net | |
cloudservicename.cloudapp.net | A | 192.0.2.13 | <--This public IP isn't your private endpoint, you receive a 403 error |
You must set up a private DNS server or an Azure DNS private zone. For tests, you can modify the host entry of your test machine.
The DNS zone that you need to create is: privatelink.azurewebsites.net
. Register the record for your app with a A record and the private endpoint IP.
For example, the name resolution is:
Name | Type | Value | Remark |
---|---|---|---|
mywebapp.azurewebsites.net | CNAME | mywebapp.privatelink.azurewebsites.net | <--Azure creates this CNAME entry in Azure Public DNS to point the app address to the private endpoint address |
mywebapp.privatelink.azurewebsites.net | A | 10.10.10.8 | <--You manage this entry in your DNS system to point to your private endpoint IP address |
After this DNS configuration, you can reach your app privately with the default name mywebapp.azurewebsites.net. You must use this name, because the default certificate is issued for *.azurewebsites.net
.
If you need to use a custom DNS name, add the custom name in your app and you must validate the custom name like any custom name, using public DNS resolution. For more information, see custom DNS validation.
For the Kudu console, or Kudu REST API (deployment with Azure DevOps Services self-hosted agents, for example) you must create two records pointing to the private endpoint IP in your Azure DNS private zone or your custom DNS server. The first is for your app and the second is for the SCM of your app.
Name | Type | Value |
---|---|---|
mywebapp.privatelink.azurewebsites.net | A | PrivateEndpointIP |
mywebapp.scm.privatelink.azurewebsites.net | A | PrivateEndpointIP |
In order to enable private endpoint for apps hosted in an IsolatedV2 plan (App Service Environment v3), enable the private endpoint support at the App Service Environment level. You can activate the feature by the Azure portal in the App Service Environment configuration pane, or through the following CLI:
az appservice ase update --name myasename --allow-new-private-endpoint-connections true
If the virtual network is in a different subscription than the app, ensure that the subscription with the virtual network is registered for the Microsoft.Web
resource provider. To explicitly register the provider, see Register resource provider. You automatically register the provider when you create the first web app in a subscription.
For pricing details, see Azure Private Link pricing.
Microsoft.Web
service endpoint enabled and can't use service endpoint-based access restriction rules.Microsoft.Network/privateEndpoints
. For more information, see Naming rules and restrictions.For up-to-date information about limitations, see Limitations.
Sündmused
17. märts, 21 - 21. märts, 10
Liituge sarjaga, et luua muude arendajate ja ekspertidega skaleeritavad tehisintellektilahendused, mis põhinevad reaalajas kasutusjuhtumitel.
Registreeruge koheKoolitus
Moodul
Design and implement private access to Azure Services - Training
You learn to design and implement private access to Azure Services with Azure Private Link, and virtual network service endpoints.
Sertimine
Microsoft 365 Certified: Endpoint Administrator Associate - Certifications
Plan and execute an endpoint deployment strategy, using essential elements of modern management, co-management approaches, and Microsoft Intune integration.
Dokumentatsioon
Integrate your app with an Azure virtual network - Azure App Service
Integrate your app in Azure App Service with Azure virtual networks.
Networking features - Azure App Service
Learn about the networking features in Azure App Service, and learn which features you need for security or other functionality.
Enable integration with an Azure virtual network - Azure App Service
This how-to article walks you through enabling virtual network integration on an Azure App Service web app.