-
Notifications
You must be signed in to change notification settings - Fork 21.9k
Update NSG and routing information for private endpoints #127748
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update NSG and routing information for private endpoints #127748
Conversation
Clarified the role of network policies and NSG for private endpoints, including routing behavior and enforcement details.
|
@sanuskaria123 : Thanks for your contribution! The author(s) and reviewer(s) have been notified to review your proposed change. |
| ### Are network security groups (NSG) enabled for private endpoints? | ||
|
|
||
| No, they're disabled for private endpoints. While subnets containing the private endpoint can have NSG associated with it, the rules aren't effective on traffic processed by the private endpoint. You must have [network policies enforcement disabled](/azure/private-link/disable-private-endpoint-network-policy) to deploy private endpoints in a subnet. NSG is still enforced on other workloads hosted on the same subnet. Routes on any client subnet use a /32 prefix, changing the default routing behavior requires a similar UDR. | ||
| Network policies are disabled for private endpoints. To enforce Network Security Group (NSG) and User-Defined Route (UDR) rules on private endpoint traffic, network policies must be enabled on the subnet. When network policies are disabled (required to deploy private endpoints), NSG and UDR rules do not apply to traffic processed by the private endpoint. For more information, please visit:https://learn.microsoft.com/en-us/azure/private-link/disable-private-endpoint-network-policy?tabs=network-policy-portal. NSG and UDR rules continue to apply normally to other workloads in the same subnet. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| Network policies are disabled for private endpoints. To enforce Network Security Group (NSG) and User-Defined Route (UDR) rules on private endpoint traffic, network policies must be enabled on the subnet. When network policies are disabled (required to deploy private endpoints), NSG and UDR rules do not apply to traffic processed by the private endpoint. For more information, please visit:https://learn.microsoft.com/en-us/azure/private-link/disable-private-endpoint-network-policy?tabs=network-policy-portal. NSG and UDR rules continue to apply normally to other workloads in the same subnet. | |
| Network policies are disabled for private endpoints. To enforce Network Security Group (NSG) and User-Defined Route (UDR) rules on private endpoint traffic, network policies must be enabled on the subnet. When network policies are disabled (required to deploy private endpoints), NSG and UDR rules do not apply to traffic processed by the private endpoint. For more information, see [Manage network policies for private endpoints](/azure/private-link/disable-private-endpoint-network-policy?tabs=network-policy-portal). NSG and UDR rules continue to apply normally to other workloads in the same subnet. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR clarifies the documentation around network security groups (NSGs) and routing for Azure Managed Redis private endpoints. It explains when and how network policies must be configured to enforce NSG and UDR rules on private endpoint traffic.
Key changes:
- Clarified that network policies must be enabled on the subnet to enforce NSG and UDR rules on private endpoint traffic
- Added reference link to detailed documentation on disabling private endpoint network policies
- Simplified explanation of routing behavior for client subnets accessing private endpoints
Tip: Customize your code reviews with copilot-instructions.md. Create the file or learn how to get started.
|
Learn Build status updates of commit 767f0ca: ✅ Validation status: passed
For more details, please refer to the build report. |
|
Can you review the proposed changes? IMPORTANT: When the changes are ready for publication, adding a #label:"aq-pr-triaged" |
e074ce1
into
MicrosoftDocs:main
Clarified the role of network policies and NSG for private endpoints, including routing behavior and enforcement details.