-
Notifications
You must be signed in to change notification settings - Fork 69
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Bastion deployment #202
Comments
Agreed. Azure Bastion would be very useful for connectivity to the deployment. |
I agree that Bastion is needed. Otherwise after deployment how will you connect ? Or did I miss something. |
Hi @MiguelElGallo, The question is whether we should add Bastion to the default Data Landing Zone deployment. |
Alright, that is good enough Thanks! |
I deployed the Bastion, with the "Deploy to Azure" button, in the document says:" 5. Once logged into the VM in a separate browser tab, go to Microsoft Edge and open Azure Portal. From here, navigate to the {prefix}-{environment}-product-synapse001 Synapse workspace inside the {prefix}-{environment}-shared-product resource group for data exploration." |
Hi @MiguelElGallo, |
Hi, |
The URL should look like this: |
Alright, Thanks! Tried that! For some reason ,even I'm using the browser from the bastion, I still get: |
Can you run nslookup for the Synapse endpoints and check whether it resolves to the public IP or the private IP of the private endpoint? This will show us whether the DNS resolution works as expected. If not, you may have forgotten to deploy the |
Hi, |
To which vnet are the Private DNS Zones linked? |
Hi, |
Hi, |
Thanks for the feedback @MiguelElGallo. General guidance is to create a central DNS infrastructure for private endpoints inside an organizational tenant. Otherwise you or your organization will run into a management overhead when scaling within the tenant and when you require to resolve Private Endpoints across Azure Landing Zones. The central network team should not only have a central Firewall, but also should provide a central DNS infrastructure that all Landing Zones can use. For pilots and PoCs we provide the option to also host this inside the Data Management Zone, but general guidance would be to host this in the connectivity hub of Azure Landing Zones. Therefore, we provide the option to either create a Firewall and DNS Zones in the Management Zone OR rely on the shared network infrastructure provided by the core Azure Platform team in the connectivity Hub. I will take note of this feedback, but please also make sure that the implications of a decentralized DNS infrastructure in a tenant are well understood. |
Thanks! |
Hi @MiguelElGallo, |
Please add the option to deploy Bastion to the data-landing-zone templates. It was added to the data management zone portal deployment for Enterprise scale analytics (Azure/data-management-zone@3ec03c8)
The text was updated successfully, but these errors were encountered: