Step 9. Configure Private Endpoint for SQL Server
To configure DNS settings for the private endpoint created at step 8, do the following:
- Log in to the Microsoft Azure portal.
- Click More services and select Resource groups on the All services page.
- On the Resource groups page, select the resource group to which the necessary SQL Server belongs. The resource group page will open.
- In the Resource list, locate and click the SQL Server that you want to protect. The SQL Server page will open.
- Navigate to Security > Networking.
- In the Private access tab, navigate to the Private endpoint connections section and click the private endpoint created at step 8.
- In the Private endpoint window, navigate to Settings > DNS Configuration and click Add configuration.
- In the Add DNS zone configuration window, do the following:
- From the Subscription drop-down list, select the subscription where the DNS zones created at step 1 reside.
- From the Private DNS zone drop-down list, select the pair of the privatelink.database.windows.net name and the resource group in which the DNS zone was created. Leave the default settings for the other options in this window.
- Click Add.
- In the DNS configuration window, navigate to the newly created DNS configuration and click the link in the Private DNS zone column.
- In the Private DNS zone window, navigate to DNS Management > Virtual network links and click Add.
- In the Add virtual network link window, add to the DNS zone links to the VNets to which the worker instances are connected. To do that, perform the following steps for each VNet link:
- In the Link name field, specify a name for the link.
- From the Subscription drop-down list, select the subscription where the VNet resides.
- From the Virtual network drop-down list, select the name of the VNet.
- Click OK.
- In the Virtual network links window, make sure that you have added links to all the necessary VNets.