Drawing out the concepts of Service Endpoints and Private Endpoints in Azure

Поделиться
HTML-код
  • Опубликовано: 12 сен 2024
  • In this video, I'm going to draw out the concepts of Service Endpoints and Private Endpoints in Azure
    See all my available courses here:
    examlabpractice...

Комментарии • 12

  • @ppaavveell1000
    @ppaavveell1000 17 дней назад +1

    Great explanation! Thank you 🙏

  • @richardwaldron1684
    @richardwaldron1684 3 месяца назад +1

    That's the best explanation I've seen, I now understand the concepts, pros and cons. Thanks for posting.

  • @Youdont2012
    @Youdont2012 Месяц назад

    Awesome explanation

  • @zimcanit6647
    @zimcanit6647 Год назад +1

    Fantastic video and VERY insightful! Looking forward to seeing the value-loaded bombs you'll publish in 2023!

    • @examlabpractice
      @examlabpractice  Год назад +1

      Thanks a lot! Looking forward to 2023! And happy new year (in advance) to you as well! :)

  • @Unknown-fu4pq
    @Unknown-fu4pq 10 дней назад

    Lovely

  • @ZFlyingVLover
    @ZFlyingVLover 6 месяцев назад +1

    Private Endpoints ensure that nobody inside the microsoft backbone can access the PAAS resource like a storage account. Thats not the case with Service Endpoints. So from a Cybersec POV they prefer you implement Private endpoints. Also, a Private endpoint can also take advantage of SKUs/circuits such that the connection will be optimized/fast as possible. At least thats my understanding.

  • @zimcanit6647
    @zimcanit6647 Год назад

    Happy new year in advance !

  • @Flora-ho4eo
    @Flora-ho4eo 4 месяца назад

    When first, I started learning cloud, I was told that Cloud is receiving services over the Internet. This is exactly from Microsoft :"cloud computing is the delivery of computing services-including servers, storage, databases, networking, software, analytics, and intelligence-over the internet (“the cloud”) to offer faster innovation." With that being said, I don't understand why in your drawing, Azure is separated from Internet?

    • @examlabpractice
      @examlabpractice  4 месяца назад +2

      Your question touches on an essential aspect of cloud computing and how services like Microsoft Azure operate distinct yet interconnected with the broader Internet.
      Cloud Computing Overview: As Microsoft describes, cloud computing involves delivering various computing services over the Internet. The term "the cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud providers like Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP) manage and maintain these servers in data centers all over the world.
      Azure and the Internet: While Azure services are accessed over the Internet, Azure itself as a platform is logically and physically separated from the public Internet for several reasons:
      Security: Azure provides services to enterprises, many of which require stringent security measures that are not typically part of most Internet-hosted services. By separating the Azure platform from the general Internet, Microsoft can implement higher security protocols, manage control access more strictly, and isolate customer environments from external threats.
      Performance and Reliability: By managing its own global network of data centers, Azure can ensure high levels of performance and reliability. This control over hardware and networking resources allows Azure to optimize for the specific needs of its services and users, unlike the broader Internet which is a patchwork of different networks and technologies.
      Compliance and Privacy: Azure must comply with various international regulations regarding data protection, privacy, and sovereignty. By having a separate infrastructure, it's easier for Azure to ensure compliance with these regulations, giving customers confidence that their data is handled correctly.
      Scalability and Management: Azure provides tools and services that help businesses scale their applications globally. Managing these tools within a separate infrastructure makes it easier to deploy, monitor, and scale services effectively without being limited by the broader Internet's infrastructure constraints.
      In summary, while Azure uses the Internet to deliver its services, it operates its own separate network of servers and infrastructure to enhance security, performance, reliability, and compliance. This separation helps Azure provide a more controlled and consistent environment for its users.

    • @Flora-ho4eo
      @Flora-ho4eo 4 месяца назад

      @@examlabpractice Thank you for your quick response. Could you please make a video how to setup and use private endpoint for let's say for Azure data bricks?

    • @examlabpractice
      @examlabpractice  4 месяца назад +1

      That isn't something I can really get to anytime soon I'm afraid. Here are the general steps to set up a private endpoint for Azure Databricks:
      Prepare Your Azure Environment:
      Ensure you have an Azure subscription and resource group.
      Set up a Virtual Network (VNet) if you do not already have one.
      Create a Private Endpoint:
      Go to the Azure portal and navigate to your Databricks workspace.
      In the workspace settings, find the networking section.
      Click on "Add Private Endpoint". Here, you will:
      Choose the resource type (Databricks).
      Select the subresource (e.g., web, api).
      Provide a name for the private endpoint.
      Choose the VNet and subnet where the private endpoint will reside.
      Configure the private DNS zone integration as part of the private endpoint creation. Azure typically handles DNS configuration, but manual setup might be needed depending on your custom network configurations.
      Configure DNS Settings:
      Ensure that DNS settings within your VNet are configured to resolve the private endpoint. This usually involves linking to a private DNS zone that Azure creates for the endpoint.
      Update your local DNS resolver or on-premises DNS to point to this private DNS if you're connecting from outside Azure's VNet.
      Update Databricks Workspace Configuration:
      Modify the network settings in your Databricks workspace to ensure it aligns with your VNet integration and private endpoint settings.
      This may involve configuring VNet injection or other advanced networking features to suit your organizational needs.
      Testing and Validation:
      After setting up the private endpoint, ensure connectivity from within your VNet to the Databricks workspace using the private link.
      Test accessing Databricks from your environment to ensure that traffic does not go over the public internet.