- Article
- 12 minutes to read
In a private cluster, the control plane or API server has internal IP addresses that are defined in the RFC1918 - Address Allocation for Private Internet document. By using a private cluster, you can ensure network traffic between your API server and your node pools remains on the private network only.
The control plane or API server is in an Azure Kubernetes Service (AKS)-managed Azure subscription. Your cluster or node pool is in your subscription. The server and the cluster or node pool can communicate with each other through the Azure Private Link service in the API server virtual network and a private endpoint that's exposed on the subnet of your AKS cluster.
When you provision a private AKS cluster, AKS by default creates a private FQDN with a private DNS zone and an additional public FQDN with a corresponding A record in Azure public DNS. The agent nodes continue to use the A record in the private DNS zone to resolve the private IP address of the private endpoint for communication to the API server.
The purpose of this article is to help you deploy a private link-based AKS cluster. If you are interested in creating an AKS cluster without any required private link or tunnel, see create an Azure Kubernetes Service cluster with API Server VNet Integration (preview).
Region availability
Private cluster is available in public regions, Azure Government, and Azure China 21Vianet regions where AKS is supported.
Prerequisites
- The Azure CLI version 2.28.0 and higher. Run
az --version
to find the version, and runaz upgrade
to upgrade the version. If you need to install or upgrade, see Install Azure CLI. - The
aks-preview
extension 0.5.29 or higher. - If using Azure Resource Manager (ARM) or the Azure REST API, the AKS API version must be 2021-05-01 or higher.
- Azure Private Link service is supported on Standard Azure Load Balancer only. Basic Azure Load Balancer isn't supported.
- To use a custom DNS server, add the Azure public IP address 168.63.129.16 as the upstream DNS server in the custom DNS server. For more information about the Azure IP address, see What is IP address 168.63.129.16?
Limitations
- IP authorized ranges can't be applied to the private API server endpoint, they only apply to the public API server
- Azure Private Link service limitations apply to private clusters.
- No support for Azure DevOps Microsoft-hosted Agents with private clusters. Consider using Self-hosted Agents.
- If you need to enable Azure Container Registry to work with a private AKS cluster, set up a private link for the container registry in the cluster virtual network or set up peering between the Container Registry virtual network and the private cluster's virtual network.
- No support for converting existing AKS clusters into private clusters
- Deleting or modifying the private endpoint in the customer subnet will cause the cluster to stop functioning.
Create a private AKS cluster
Create a resource group
Create a resource group or use an existing resource group for your AKS cluster.
az group create -l westus -n MyResourceGroup
Default basic networking
az aks create -n <private-cluster-name> -g <private-cluster-resource-group> --load-balancer-sku standard --enable-private-cluster
Where --enable-private-cluster
is a mandatory flag for a private cluster.
Advanced networking
az aks create \ --resource-group <private-cluster-resource-group> \ --name <private-cluster-name> \ --load-balancer-sku standard \ --enable-private-cluster \ --network-plugin azure \ --vnet-subnet-id <subnet-id> \ --docker-bridge-address 172.17.0.1/16 \ --dns-service-ip 10.2.0.10 \ --service-cidr 10.2.0.0/24
Where --enable-private-cluster
is a mandatory flag for a private cluster.
Note
If the Docker bridge address CIDR (172.17.0.1/16) clashes with the subnet CIDR, change the Docker bridge address.
Use custom domains
If you want to configure custom domains that can only be resolved internally, see Use custom domains for more information.
Disable Public FQDN
The following parameters can be leveraged to disable Public FQDN.
Disable Public FQDN on a new AKS cluster
az aks create -n <private-cluster-name> -g <private-cluster-resource-group> --load-balancer-sku standard --enable-private-cluster --enable-managed-identity --assign-identity <ResourceId> --private-dns-zone <private-dns-zone-mode> --disable-public-fqdn
Disable Public FQDN on an existing cluster
az aks update -n <private-cluster-name> -g <private-cluster-resource-group> --disable-public-fqdn
Configure private DNS zone
The following parameters can be used to configure private DNS zone.
- system - This is the default value. If the
--private-dns-zone
argument is omitted, AKS creates a Private DNS zone in the node resource group. - none - the default is public DNS. AKS won't create a private DNS zone.
- CUSTOM_PRIVATE_DNS_ZONE_RESOURCE_ID, requires you to create a private DNS zone only in the following format for Azure global cloud:
privatelink.<region>.azmk8s.io
or<subzone>.privatelink.<region>.azmk8s.io
. You'll need the Resource ID of that private DNS zone going forward. Additionally, you need a user assigned identity or service principal with at least the Private DNS Zone Contributor and Network Contributor roles. When deploying using API server VNet integration, a private DNS zone additionally supports the naming format ofprivate.<region>.azmk8s.io
or<subzone>.private.<region>.azmk8s.io
.- If the private DNS zone is in a different subscription than the AKS cluster, you need to register the Azure provider Microsoft.ContainerServices in both subscriptions.
- "fqdn-subdomain" can be utilized with "CUSTOM_PRIVATE_DNS_ZONE_RESOURCE_ID" only to provide subdomain capabilities to
privatelink.<region>.azmk8s.io
. - If your AKS cluster is configured with an Active Directory service principal, AKS does not support using a system-assigned managed identity with custom private DNS zone.
Create a private AKS cluster with private DNS zone
az aks create -n <private-cluster-name> -g <private-cluster-resource-group> --load-balancer-sku standard --enable-private-cluster --enable-managed-identity --assign-identity <ResourceId> --private-dns-zone [system|none]
Create a private AKS cluster with custom private DNS zone or private DNS subzone
# Custom Private DNS Zone name should be in format "<subzone>.privatelink.<region>.azmk8s.io"az aks create -n <private-cluster-name> -g <private-cluster-resource-group> --load-balancer-sku standard --enable-private-cluster --enable-managed-identity --assign-identity <ResourceId> --private-dns-zone <custom private dns zone or custom private dns subzone ResourceId>
Create a private AKS cluster with custom private DNS zone and custom subdomain
# Custom Private DNS Zone name could be in formats "privatelink.<region>.azmk8s.io" or "<subzone>.privatelink.<region>.azmk8s.io"az aks create -n <private-cluster-name> -g <private-cluster-resource-group> --load-balancer-sku standard --enable-private-cluster --enable-managed-identity --assign-identity <ResourceId> --private-dns-zone <custom private dns zone ResourceId> --fqdn-subdomain <subdomain>
Options for connecting to the private cluster
The API server endpoint has no public IP address. To manage the API server, you'll need to use a VM that has access to the AKS cluster's Azure Virtual Network (VNet). There are several options for establishing network connectivity to the private cluster.
- Create a VM in the same Azure Virtual Network (VNet) as the AKS cluster.
- Use a VM in a separate network and set up Virtual network peering. See the section below for more information on this option.
- Use an Express Route or VPN connection.
- Use the AKS command invoke feature.
- Use a private endpoint connection.
Creating a VM in the same VNET as the AKS cluster is the easiest option. Express Route and VPNs add costs and require additional networking complexity. Virtual network peering requires you to plan your network CIDR ranges to ensure there are no overlapping ranges.
Virtual network peering
Virtual network peering is one way to access your private cluster. To use virtual network peering, you need to set up a link between the virtual network and the private DNS zone.
- From your browser, go to the Azure portal.
- From the Azure portal, go to the node resource group.
- Select the private DNS zone.
- In the left pane, select Virtual network.
- Create a new link to add the virtual network of the VM to the private DNS zone. It takes a few minutes for the DNS zone link to become available.
- In the Azure portal, navigate to the resource group that contains your cluster's virtual network.
- In the right pane, select the virtual network. The virtual network name is in the form aks-vnet-*.
- In the left pane, select Peerings.
- Select Add, add the virtual network of the VM, and then create the peering.
- Go to the virtual network where you have the VM and select Peerings. Select the AKS virtual network, and then create the peering. If the address ranges on the AKS virtual network and the VM's virtual network clash, peering fails. For more information, see Virtual network peering.
Hub and spoke with custom DNS
Hub and spoke architectures are commonly used to deploy networks in Azure. In many of these deployments, DNS settings in the spoke VNets are configured to reference a central DNS forwarder to allow for on-premises and Azure-based DNS resolution. When deploying an AKS cluster into such a networking environment, there are some special considerations that must be taken into account.
By default, when a private cluster is provisioned, a private endpoint (1) and a private DNS zone (2) are created in the cluster-managed resource group. The cluster uses an A record in the private zone to resolve the IP of the private endpoint for communication to the API server.
The private DNS zone is linked only to the VNet that the cluster nodes are attached to (3). This means that the private endpoint can only be resolved by hosts in that linked VNet. In scenarios where no custom DNS is configured on the VNet (default), this works without issue as hosts point at 168.63.129.16 for DNS that can resolve records in the private DNS zone because of the link.
In scenarios where the VNet containing your cluster has custom DNS settings (4), cluster deployment fails unless the private DNS zone is linked to the VNet that contains the custom DNS resolvers (5). This link can be created manually after the private zone is created during cluster provisioning or via automation upon detection of creation of the zone using event-based deployment mechanisms (for example, Azure Event Grid and Azure Functions). To avoid cluster failure during initial deployment, the cluster can be deployed with the private DNS zone resource ID. This only works with resource type Microsoft.ContainerService/managedCluster and API version 2022-07-01. Using an older version with an ARM template or Bicep resource definition is not supported.
Note
Conditional Forwarding doesn't support subdomains.
Note
If you are using Bring Your Own Route Table with kubenet and Bring Your Own DNS with Private Cluster, the cluster creation will fail. You will need to associate the RouteTable in the node resource group to the subnet after the cluster creation failed, in order to make the creation successful.
Use a private endpoint connection
A private endpoint can be set up so that an Azure Virtual Network doesn't need to be peered to communicate to the private cluster. To use a private endpoint, create a new private endpoint in your virtual network then create a link between your virtual network and a new private DNS zone.
Important
If the virtual network is configured with custom DNS servers, private DNS will need to be set up appropriately for the environment. See the virtual networks name resolution documentation for more details.
- From your browser, go to the Azure portal.
- From the Azure portal menu or from Azure Home, select Create a resource.
- Search for Private Endpoint and then select Create > Private Endpoint.
- Select Create.
- On the Basics tab, set up the following options:
- Project details:
- Select an Azure Subscription.
- Select the Azure Resource group where your virtual network is located.
- Instance details:
- Enter a Name for the private endpoint, such as myPrivateEndpoint.
- Select a Region for the private endpoint.
- Project details:
Important
Check that the region selected is the same as the virtual network where you want to connect from, otherwise you won't see your virtual network in the Configuration tab.
- Select Next: Resource when complete.
- On the Resource tab, set up the following options:
- Connection method: Connect to an Azure resource in my directory
- Subscription: Select your Azure subscription where the private cluster is located
- Resource type: Microsoft.ContainerService/managedClusters
- Resource: myPrivateAKSCluster
- Target sub-resource: management
- Select Next: Configuration when complete.
- On the Configuration tab, set up the following options:
- Networking:
- Virtual network: myVirtualNetwork
- Subnet: mySubnet
- Networking:
- Select Next: Tags when complete.
- (Optional) On the Tags tab, set up key-values as needed.
- Select Next: Review + create, and then select Create when validation completes.
Record the private IP address of the private endpoint. This private IP address is used in a later step.
After the private endpoint has been created, create a new private DNS zone with the same name as the private DNS zone that was created by the private cluster.
- Go to the node resource group in the Azure portal.
- Select the private DNS zone and record:
- The name of the private DNS zone, which follows the pattern
*.privatelink.<region>.azmk8s.io
- The name of the A record (excluding the private DNS name)
- The time-to-live (TTL)
- The name of the private DNS zone, which follows the pattern
- From the Azure portal or from the Home page, select Create a resource.
- Search for Private DNS zone and select Create > Private DNS Zone.
- On the Basics tab, set up the following options:
- Project details:
- Select an Azure Subscription
- Select the Azure Resource group where the private endpoint was created
- Instance details:
- Enter the Name of the DNS zone retrieved from previous steps
- Region defaults to the Azure Resource group location
- Project details:
- Select Review + create when complete and select Create when validation completes.
After the private DNS zone is created, create an A record. This record associates the private endpoint to the private cluster.
- Go to the private DNS zone created in previous steps.
- On the Overview page, select + Record set.
- On the Add record set tab, set up the following options:
- Name: Input the name retrieved from the A record in the private cluster's DNS zone
- Type: A - Alias record to IPv4 address
- TTL: Input the number to match the record from the A record private cluster's DNS zone
- TTL Unit: Change the dropdown value to match the A record from the private cluster's DNS zone
- IP address: Input the IP address of the private endpoint that was created previously
Important
When creating the A record, use only the name, and not the fully qualified domain name (FQDN).
Once the A record is created, link the private DNS zone to the virtual network that will access the private cluster.
- Go to the private DNS zone created in previous steps.
- From the left pane, select Virtual network links.
- Create a new link to add the virtual network to the private DNS zone. It takes a few minutes for the DNS zone link to become available.
Warning
If the private cluster is stopped and restarted, the private cluster's original private link service is removed and re-created, which breaks the connection between your private endpoint and the private cluster. To resolve this issue, delete and re-create any user created private endpoints linked to the private cluster. DNS records will also need to be updated if the re-created private endpoints have new IP addresses.
Next steps
For associated best practices, see Best practices for network connectivity and security in AKS.
FAQs
How do I create a private AKS cluster in Azure portal? ›
- Sign in to the Azure portal.
- On the Azure portal menu or from the Home page, select Create a resource.
- Select Containers > Kubernetes Service.
- On the Basics page, configure the following options: ...
- Select Next: Node pools when complete.
- Keep the default Node pools options.
Azure Kubernetes Service (AKS) simplifies deploying a managed Kubernetes cluster in Azure by offloading the operational overhead to Azure. As a hosted Kubernetes service, Azure handles critical tasks, like health monitoring and maintenance.
Does AKS need a public IP? ›At least one public IP or IP prefix is required for allowing egress traffic from the AKS cluster.
How do I create a Kubernetes cluster in Azure CLI? ›- Step 1: Login to Azure Account. ...
- Step 2: Create Resource Group. ...
- Step 3: Create an AKS Cluster. ...
- Step 4: Install Kubectl Utility. ...
- Step 5: Set Variables Path. ...
- Step 6: Connect to AKS Cluster. ...
- Step 7: Verify Your Connection. ...
- Step 8: Deploy Sample Application.
- For Standard clusters, run the following command: gcloud container clusters create private-cluster-1 \ --create-subnetwork name=my-subnet-1 \ ...
- For Autopilot clusters, run the following command: gcloud container clusters create-auto private-cluster-1 \
A private cluster is a type of VPC-native cluster that only depends on internal IP addresses. Nodes, Pods, and Services in a private cluster require unique subnet IP address ranges. You can create and configure private clusters in Standard or Autopilot.
What is the difference between Kubernetes and AKS? ›Kubernetes is the de-facto open source platform for container orchestration but typically requires a lot of overhead in cluster management. AKS helps manage much of the overhead involved, reducing the complexity of deployment and management tasks.
What is the difference between Azure and aks? ›Azure Kubernetes Service
AKS handles critical functionality -- such as managing Kubernetes master nodes -- health monitoring and cluster maintenance. Developers can deploy other third-party Kubernetes services on Azure, but AKS' advantage over those services is its tight integration with other Microsoft cloud services.
ACI provides container logs and few alert diagrams but it is not enough. If something happens with hosted machine you can not see that problem. AKS provides fully control with VMs that you use and you can use remote control or lot of tools like Kudu to connect and look what is going on with your application.
Can a service have its own IP address in Kubernetes? ›Kubernetes gives Pods their own IP addresses and a single DNS name for a set of Pods, and can load-balance across them.
Does a Kubernetes cluster have an IP address? ›
Kubernetes assigns an IP address (the Pod IP) to the virtual network interface in the Pod's network namespace from a range of addresses reserved for Pods on the node. This address range is a subset of the IP address range assigned to the cluster for Pods, which you can configure when you create a cluster.
Does AKS need its own subnet? ›Each AKS cluster must be placed in its own subnet. Avoid using IP address ranges that overlap with existing network resources. Necessary to allow connectivity to on-premises or peered networks in Azure.
What command do you issue to create a Kubernetes cluster? ›The kubectl config set-cluster command allows you to create a new cluster connection by using the API URL. For example, the following command creates a new cluster connection named my-cluster with server 127.0. 0.1:8087 .
How do I create a free Kubernetes cluster in GCP? ›- Go to the Google Kubernetes Engine page in the Google Cloud console. ...
- Click add_box Create.
- In the Cluster basics section, complete the following: ...
- From the navigation pane, under Node Pools, click default-pool.
Minikube. minikube is a tool that runs a single-node Kubernetes cluster locally on your workstation for development and testing purposes.
How do I setup a local Kubernetes cluster? ›- kubectl apply -f backend. service. ...
- To see all the services run the below command:
- k get service.
- This tells you the service name and what type of service it is. ...
- kubectl apply -f backend.deploy.yml kubectl apply -f backend.service.yml.
- Open your text editor and create a new directory. ...
- In the main.tf file, add the provider code. ...
- Set up the first resource for the IAM role. ...
- Once the role is created, attach these two policies to it: ...
- Once the policies are attached, create the EKS cluster. ...
- Set up an IAM role for the worker nodes.
In some cases, services do not require a clusterIP. You can create a “headless service” by specifying none in the spec:clusterIP field of the service manifest. This means Kubernetes does not perform load balancing and proxying, and kube-proxy ignores these services.
What is private endpoint Azure? ›A private endpoint is a special network interface for an Azure service in your Virtual Network (VNet). When you create a private endpoint for your storage account, it provides secure connectivity between clients on your VNet and your storage.
What is private service connect? ›Private Service Connect allows private consumption of services across VPC networks that belong to different groups, teams, projects, or organizations. You can publish and consume services using IP addresses that you define and that are internal to your VPC network.
Why is it called a cluster? ›
Clusters are typically defined as collections or groups of items with similar or different characteristics. The group or collection of items constitutes a cluster.
What are limitations of AKS? ›AKS doesn't set a limit on the container image size. However, it's important to understand that the larger the container image, the higher the memory demand. This could potentially exceed resource limits or the overall available memory of worker nodes.
Is AKS better than EKS? ›AKS guarantees only 99.95% when availability zones are enabled and 99.9% when AZs are disabled. EKS provides 99.95% uptime.
Is AKS container as a service? ›AKS is a free container service where nothing will be charged for Kubernetes cluster management. You'll have to pay only for the cloud resources such as VMs, storage, and network resources you consume makes it the most cost-effective container orchestration service in the market.
Why would you use Azure container Instances instead of Azure Kubernetes service? ›For example, Azure Kubernetes Service can layer orchestration and scale on top of ACI through virtual nodes. If you need a less "opinionated" building block that doesn't align with the scenarios Azure Container Apps is optimizing for, Azure Container Instances is an ideal option.
What is the difference between Azure container instance and Kubernetes? ›AKS offers built-in monitoring. Azure Monitor for containers helps you gain visibility into the performance of your clusters. A self-hosted Kubernetes installation, or ACI without Kubernetes, requires a manual installation and configuration of a monitoring solution. Scaling containerized environments can be complex.
What's the difference between a pod a cluster and a container? ›“A container runs logically in a pod (though it also uses a container runtime); A group of pods, related or unrelated, run on a cluster. A pod is a unit of replication on a cluster; A cluster can contain many pods, related or unrelated [and] grouped under the tight logical borders called namespaces.”
Does AKS use Docker? ›You can continue using Docker node pools and clusters on versions earlier than 1.23, but Docker is no longer supported as of September 2022. For more information, see Add a Windows Server node pool with containerd .
Does AKS use ACI? ›Azure Kubernetes Service (AKS) can use the Virtual Kubelet to provision pods inside Azure Container Instance(ACI) that start in seconds. This enables AKS to run with just enough capacity for your average workload.
Is ACI serverless? ›ACI provides general-purpose, serverless containers-as-a-service that can be used with Logic Apps, App Service, Azure Kubernetes Service, Azure Functions, and other platforms in Azure to serve dev, test, and production workloads. Use ACI for deploying build/test containers, host backend APIs, or as part of a workflow.
How can I create AKS cluster without public IP? ›
- Create a VM in the same Azure Virtual Network (VNet) as the AKS cluster.
- Use a VM in a separate network and set up Virtual network peering. ...
- Use an Express Route or VPN connection.
- Use the AKS command invoke feature.
- Use a private endpoint connection.
You must ensure this range is large enough to provide addresses for all the Kubernetes Services you host in your cluster. For a cluster that runs up to 3000 Services, you need 3000 cluster IP addresses. You need a secondary range of size /20 or larger.
How do I hide my IP from my service provider? ›There are essentially two methods you can choose from to hide your IP address. One is using a proxy server, and the other is using a virtual private network (VPN). Either one will be sufficient, but there are a few cons associated with proxy servers that make VPNs a more optimal choice for many.
How do I expose Kubernetes service to the Internet? ›Create a Service object that exposes the deployment
Make notes of the LoadBalancer Ingress's DNS name and the value of the Port and NodePort exposed by the Service. Use the DNS address and port number to access the Hello World application. The response to a successful request is a hello message: Hello Kubernetes!
You have several options for connecting to nodes, pods and services from outside the cluster: Access services through public IPs. Use a service with type NodePort or LoadBalancer to make the service reachable outside the cluster. See the services and kubectl expose documentation.
Is ClusterIP same as node IP? ›The NodePort type is an extension of the ClusterIP type. So a Service of type NodePort has a cluster IP address. The LoadBalancer type is an extension of the NodePort type. So a Service of type LoadBalancer has a cluster IP address and one or more nodePort values.
What is a private AKS cluster? ›Introduction to AKS Private Clusters
It allows you to manage the lifecycle of Kubernetes clusters at scale. By default, an AKS cluster uses a public IP address for the control plane. However, using a public IP address will expose the control traffic in your cluster to the Internet.
An AKS cluster has at least one node, an Azure virtual machine (VM) that runs the Kubernetes node components and container runtime.
How many pods can run on a node aks? ›On Azure Kubernetes Service (AKS), the default limit is 30 pods per node but it can be increased up to 250.
How do I create a new cluster? ›- From the navigation bar, select the Region to use.
- In the navigation pane, choose Clusters.
- On the Clusters page, choose Create Cluster.
- For Select cluster compatibility, choose one of the following options and then choose Next Step:
What is the correct command for creating a Kubernetes service? ›
The kubectl create service -o yaml --dry-run=client command creates the configuration for the Service, but prints it to stdout as YAML instead of sending it to the Kubernetes API server.
How do I create a cluster in Azure Kubernetes? ›- Sign in to the Azure portal.
- On the Azure portal menu or from the Home page, select Create a resource.
- Select Containers > Kubernetes Service.
- On the Basics page, configure the following options: ...
- Select Next: Node pools when complete.
- Keep the default Node pools options.
Autopilot mode. Autopilot clusters accrue a flat fee of $0.10/hour for each cluster after the free tier, plus the CPU, memory and ephemeral storage resources that are requested by your currently scheduled Pods. You are not charged for system Pods, operating system overhead, unallocated space, or unscheduled Pods.
Where can I get free Kubernetes cluster? ›- Step 1: Logon to IBM Cloud.
- Step 2: Select in the menu "Catalog" and search for "Kubernetes Service" ...
- Step 3: Click on "Kubernetes Service"
- Step 4: Select Free cluster. ...
- Step 5: Click on the Kubernetes Services and select "Free" ...
- Step 6: Press "Create custer"
- Designing and Preparing. Learning. Cloud Provider. Nodes. ...
- Configuring and Installing Base Software on Nodes. Docker. rkt. kubelet. ...
- Bootstrapping the Cluster. etcd. Apiserver, Controller Manager, and Scheduler. ...
- Troubleshooting. Running validate-cluster. Inspect pods and services. ...
- Support Level.
- Learn Kubernetes Basics. Create a Cluster. Using Minikube to Create a Cluster. Interactive Tutorial - Creating a Cluster.
- Configuration.
- Apply Pod Security Standards at the Cluster Level. Apply Pod Security Standards at the Namespace Level. Restrict a Container's Access to Resources with AppArmor. ...
- Services.
Kubernetes clusters allow containers to run across multiple machines and environments: virtual, physical, cloud-based, and on-premises. Kubernetes containers are not restricted to a specific operating system, unlike virtual machines. Instead, they are able to share operating systems and run anywhere.
How do I create a private endpoint in Azure portal? ›- In the search box at the top of the portal, enter Private endpoint. ...
- Select + Create in Private endpoints.
- In the Basics tab of Create a private endpoint, enter or select the following information. ...
- Select Next: Resource.
- In the Resource pane, enter or select the following information.
- Sign in to Azure. Sign in to the Azure portal.
- Create an application gateway. ...
- Add backend pool. ...
- Create a client virtual machine. ...
- Test the application gateway. ...
- Next steps.
Select + Add subnet, then enter Public for Subnet name and 10.0. 0.0/24 for Subnet address range. Select Add. Select + Add subnet, then enter Private for Subnet name and 10.0.
How do I create a private link in Azure? ›
- Sign-in to the Azure portal.
- In the search box at the top of the portal, enter Virtual network. ...
- Select + Create.
- In Create virtual network, enter or select this information in the Basics tab: ...
- Select the IP Addresses tab or select the Next: IP Addresses button at the bottom of the page.