Microsoft Peering vs Private Peering and Private Link for Azure PaaS Access from On-premises

แชร์
ฝัง
  • เผยแพร่เมื่อ 22 ม.ค. 2025

ความคิดเห็น • 81

  • @Southpaw07
    @Southpaw07 3 ปีที่แล้ว +3

    John you are simply the best on the Net, another crisp explanation and to the point . I always come to your channel when i need more details on a particular subject.
    Thanks for all your hard work and making this possible for us to learn Azure

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Wow, thanks. That is very kind.

  • @siliconview
    @siliconview ปีที่แล้ว

    Super super John...this solved my Paas access via ms peering + private peering combo. Thanks a lot!

    • @NTFAQGuy
      @NTFAQGuy  ปีที่แล้ว

      Glad it helped!

  • @jasonfrehner8187
    @jasonfrehner8187 3 ปีที่แล้ว

    I needed a quick refresher and now I am fully understanding...great explanation of those 3 servcies and how they fit together.

  • @cook9628
    @cook9628 3 ปีที่แล้ว

    Brilliant as always. Many Thanks for all your hard work John.

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Very welcome

  • @MrYuk0709
    @MrYuk0709 3 ปีที่แล้ว

    Excellent video. Brilliant John. 👍

  • @yulaw3289
    @yulaw3289 9 หลายเดือนก่อน

    really awesome video, thanks a lot! Please keep the ball rolling 😊

  • @kword1512
    @kword1512 2 ปีที่แล้ว

    Fantastic video, this subject was pretty muddy for me after reading about it on MS Learn but this cleared it up. Thanks!

    • @NTFAQGuy
      @NTFAQGuy  2 ปีที่แล้ว

      Glad it was helpful!

  • @peterrivera8223
    @peterrivera8223 3 ปีที่แล้ว +2

    Great explanation! Thanks so much for the content!

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      Thanks

  • @theJAMATO
    @theJAMATO 3 ปีที่แล้ว

    Great Stuff and perfect timing, much appreciated!. Me and my colleague just talked (argued) about this topic last week. We were thinking about the use cases of MS peering and private peering + private link to access PaaS resources and the differences of them.

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Glad I was timely :)

  • @kdedesko
    @kdedesko ปีที่แล้ว

    Excellent John. Well done.

  • @lucascamargoreis6332
    @lucascamargoreis6332 3 ปีที่แล้ว +1

    HiJohn, your videos are amazing and I have learned a lot from them, thank you very much.
    I'm studying for the new SC-300 exam and I'm looking forward to seeing a video here about this exam.

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Great to hear!

  • @lj7894
    @lj7894 2 ปีที่แล้ว

    Thxs John, just found this! You rock sir!

  • @santiagoleoni3833
    @santiagoleoni3833 3 ปีที่แล้ว +3

    Great video! I'm curious how do you keep all of this knowledge in your head haha, do you keep notes for each service? A video about how you digest knowledge would be great! 😁And thank you for the excellent content as always

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +5

      I keep notes on things. Creating content helps me learn it.

  • @iamdedlok
    @iamdedlok 3 ปีที่แล้ว

    Thanks John! Another awesome video! Loved it!

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Glad you enjoyed it!

  • @experimentaldoggy
    @experimentaldoggy 3 ปีที่แล้ว

    Buddy you're great. Thanks for this deep dive.

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      Very welcome

  • @mikamishra9418
    @mikamishra9418 3 ปีที่แล้ว

    Very nicely explained

  • @laperchungi
    @laperchungi 3 ปีที่แล้ว

    Great explaination !
    Would greatly appreciate a deep dive on Azure policy.

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +2

      i cover policy in the governance master class lesson.

  • @57jpierrem
    @57jpierrem 3 ปีที่แล้ว

    great video, clear precise and super easy to understand, if my network team had seen it before implementing sh..y stuff as they did

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      lol, well, glad it was helpful :-)

  • @srinidatla1079
    @srinidatla1079 3 ปีที่แล้ว

    AWESOME as usual.

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Thank you! Cheers!

  • @LifeisbetterwithaMalinois
    @LifeisbetterwithaMalinois 3 ปีที่แล้ว

    Thanks John...your an inspiration

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      Thanks

  • @ilyasontube
    @ilyasontube 3 ปีที่แล้ว

    Thx for the great content John!

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Glad you enjoy it!

  • @sammuthu1
    @sammuthu1 หลายเดือนก่อน

    Excellent!

  • @TV-yq4sn
    @TV-yq4sn 3 ปีที่แล้ว

    Hi john - you should write a blog or something where all this info lives - would be super helpful

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Learn.onboardtoazure.com

  • @c_str566
    @c_str566 3 ปีที่แล้ว

    Great video! Keep it up.

  • @seiya0618
    @seiya0618 3 ปีที่แล้ว +1

    Hi John, qq, there are BGP communities for actual Azure Regions, would these BGP communities include all of the services (Storage, SQL, etc.) for a given region?

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      Yes

    • @seiya0618
      @seiya0618 3 ปีที่แล้ว

      ​@@NTFAQGuy Thanks for the quick turnaround! This means I should either apply the BGP community for the whole region or apply individual BGP community per Azure services I'd like to make reachable from the ER (rather than relying on the Internet link). Looking at the actual Azure public IP address space, I noticed that lots of regions have IPv6 addresses which wouldn't be usable (for now)

  • @sid0000009
    @sid0000009 3 ปีที่แล้ว

    Hello John, in Azure Data Factory we now have option to create runtime in Azure Managed Vnet which helps us to create Private Link connections to say Storage account/ Azure SQL. But since the Vnet of ADF IR is Azure Managed how would we find out which private IP got assigned to my Storage Account. I think more secured approach is to have the Private link subnet inside the Vnet where the ADF self hosted Runtime also sits . ( and not opt for Azure Managed Network ). Not sure why would be have such a feature in ADF when eventually a Storage account would still have Public end points exposed. Thanks!

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      you don't use the PE in the managed vnet. you would create your own PE to your vnet if required for app access etc.

  • @erniegonzalez1079
    @erniegonzalez1079 3 ปีที่แล้ว

    Hi John, when using a private link (on a storage account), how can one verify (through metrics) traffic is actually traversing the private link and not the public IP? eg. use azcopy to copy data into storage acct. Thanks

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      There are metrics you can view on the endpoint object.

  • @cma9br
    @cma9br 3 ปีที่แล้ว

    Finally a simple and clear explanation! As far as I understand, when possible it is simpler to use Microsoft peering instead of private peering. Is it right?

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      Simpler yes :) but you lose granularity and other functionality. It’s the normal “it depends” :)

  • @James-yl9wm
    @James-yl9wm 3 ปีที่แล้ว

    Hrm, couldn't we use an Azure Firewall dns proxy to fwd the requests to the Azure dns server? I am thinking of the hub and spoke model. With my ER in the hub, along with my Azure Firewall, this would compliment it greatly

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      anything that acts as DNS proxy will work just fine so yes Azure Firewall with proxy forwarding to Azure DNS should be great.

  • @karamveer13
    @karamveer13 3 ปีที่แล้ว

    Hi john
    Just want to understand how azure peering is different from service endpoints or private endpoints. I’m little confused about them.

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      I have other videos where I talk about this but start with the networking video of the master class

  • @venkatramanareddy3537
    @venkatramanareddy3537 3 ปีที่แล้ว

    John if could show us a lab on creating storage and accessing privately from onprem and also about dns stuff in lab.. That could really help us...

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      The ms docs have nice walkthroughs of the click by click adding private endpoint then of course expressroute or s2s vpn.

  • @amjds1341
    @amjds1341 3 ปีที่แล้ว

    Love your content. Can you please also show same things via az cli as well for people are are new to powershell?

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Glad you like the content.

  • @kmember888
    @kmember888 3 ปีที่แล้ว

    Hey John, thanks for this awesome video and others. Do you have any plan on making a video on Enterprise-scale landing zones?

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      Glad you like the video. I don't talk about future plans as if I do then people just continually ask why its not done yet :-)

    • @kmember888
      @kmember888 3 ปีที่แล้ว

      Good advice. Thanks John :)

  • @sid0000009
    @sid0000009 3 ปีที่แล้ว

    gud precise content.... in private end points too we would still have public IPs for the Pass service although not accessible apart from the private IP ? ( same like MS peering )

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      i'm not 100% following the question. Sometimes there is still a public IP but correct you can stop it working. There is some variation by service to specifics.

  • @amishel2006
    @amishel2006 3 ปีที่แล้ว

    Great video. Interesting to understand how private peering and DNS forwarding will behave in hub and spoke networks with virtual hubs and FW. What's the best practice in such cases?

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Hub and spoke wouldn’t really change it. The dns forward could just sit in the hub. Just be consistent in mapping private zones for spokes and hub. As you get more complex setup more considerations that are likely beyond TH-cam comment :)

  • @Guitarist789
    @Guitarist789 3 ปีที่แล้ว

    Superb.

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      Thank you

  • @tmepass4866
    @tmepass4866 ปีที่แล้ว

    Awesome👍

    • @NTFAQGuy
      @NTFAQGuy  ปีที่แล้ว

      Thanks for the visit

  • @azuredoom
    @azuredoom 3 ปีที่แล้ว

    Is there a difference between Microsoft Peering and O365 Peering?

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว

      O365 is a workload you can enable on Microsoft peering if you get an exception

    • @azuredoom
      @azuredoom 3 ปีที่แล้ว

      @@NTFAQGuy Thanks, Been working on getting an exception for a while but could never get a straight answer if they were the same of different.

  • @bryansanchez9653
    @bryansanchez9653 3 ปีที่แล้ว

    Hello John. One quick question. Do i have to create/configure and associate to a VNet that Azure Dns Private Zone you mentioned in min 20.47 or will it be automatically configured for me?

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      It will offer to be azure managed during endpoint creation.

  • @clipper2829
    @clipper2829 3 ปีที่แล้ว

    Great video John!
    Got my AZ-500 exam tomorrow. Any last minute tips?

    • @NTFAQGuy
      @NTFAQGuy  3 ปีที่แล้ว +1

      Good luck. Take your time, attempt every question, don’t stress, it’s just a test :)

  • @patrickboucher892
    @patrickboucher892 3 ปีที่แล้ว +1

    merci John. When I say to myself "well I know this stuff" ==> watch John's video ==> ok need to work and dive deeper!