Skip to main content

How to set up Private Endpoints for Azure SQL

Updated this week

Communication between Azure accounts and Druva services is secured with the Azure PrivateLink, ensuring network traffic stays securely within the Azure network and is never exposed to the public Internet. Azure PrivateLink connects to different services via private endpoints— IP addresses within a VNet and subnet.

This topic covers how to set up private endpoints for Azure SQL databases and Azure Managed Instances.

Set up Private endpoints for the Azure SQL databases

Prerequisites

On the Management Console, if you see an option to update the Tenant Registration, click and update your tenant permissions before proceeding.

Procedure

  1. Log in to the Azure Console.

  2. Search your Azure SQL server and create a Private Endpoint for that SQL server in the same region as your SQL resource. For more information on creating a Private Endpoint, see Quickstart: Create a private endpoint by using the Azure portal.



    Note:
    While creating a Private Endpoint,

    1. On the Virtual Network tab, make sure you attach a different VNet/subnet than the one attached to your SQL server.

    2. On the DNS tab, make sure the DNS zone name is privatelink.database.windows.net DNS zone. If not present, create a new DNS zone — privatelink.database.windows.net.


  3. In the Private Endpoint created, go to the Network interface and copy the Private IPv4 address.

  4. Link the virtual network by performing the following steps:

    1. In the top search box, search for Private DNS zones and go to the privatelink.database.windows.net DNS zone.

    2. In the DNS Zone created above, from the left navigation pane, click DNS Management > Virtual Network Links and add a new Virtual Network Link. For detailed steps, see Link the virtual network.



      Note: Make sure you select the same VNet that you used while creating the Private Endpoint.


    3. Add a recordset by clicking DNS Management > Recordsets. Enter the IP address of the Private Endpoint (copied in the Step. 3 above). For detailed steps, see Create another DNS record.

Next Steps

Run discovery and proceed with backups.

Set up Private endpoints for the Azure Managed Instances

Prerequisites

On the Management Console, if you see an option to update the Tenant Registration, click and update your tenant permissions before proceeding.

Procedure

  1. Log in to the Azure Console.

  2. Search your Azure Managed Instance and create a Private Endpoint for that managed instance in the same region as your SQL resource. For more information on creating a Private Endpoint, see Quickstart: Create a private endpoint by using the Azure portal.


    Note:

    While creating a Private Endpoint,

  • On the Virtual Network tab, make sure you attach a different VNet/subnet than the one attached to your managed instance.

  • On the DNS tab, Private DNS integration will be set to No, proceed anyway


    3. In the Private Endpoint created, go to the Network interface and copy the Private IPv4 address.

    4. Link the virtual network by performing the following steps:

    • In the top search box, search for Private DNS zones and check if the region-specific DNS zone is present. If not, create a new one.

      Note:


      While creating the DNS zone, in the instance name, make sure you use the region of the DNS zone of your managed instance. You can get the DNS zone in the fullyQualifiedDomainName property. The format for the same will be privatelink.{dnszone}.database.windows.net.


    • In the DNS Zone created above, from the left navigation pane, click DNS Management > Virtual Network Links and add a new Virtual Network Link. For detailed steps, see Link the virtual network.
      Note: Make sure you select the same VNet that you used while creating the Private Endpoint.

    • Add a recordset by clicking DNS Management > Recordsets. Enter the IP address of the Private Endpoint (copied in the Step. 3 above). For detailed steps, see Create another DNS record.

Next Steps

Run discovery and proceed with backups.

Did this answer your question?