Azure Networking Documentation

Troubleshooting Azure Private Link

This guide provides common troubleshooting steps and solutions for issues you might encounter when using Azure Private Link. Private Link enables you to securely access Azure PaaS services and Azure-hosted customer-owned services over a private endpoint from your Azure virtual network.

Common Issues and Resolutions

1. Cannot Connect to the Private Endpoint

If you are unable to establish a connection to your service via the private endpoint, consider the following:

2. Private Endpoint IP Address Not Accessible

When the private endpoint's IP address is not reachable from your virtual network:

3. DNS Resolution Issues

Problems with DNS resolution are frequent causes of Private Link connectivity issues:

Tip: DNS Verification

Use tools like nslookup or dig from within your virtual network to test DNS resolution for your service endpoint. For example: nslookup yourstorageaccount.blob.core.windows.net. The output should show the private IP address of the private endpoint.

4. Service-Specific Configuration

Some Azure services have specific configuration requirements for Private Link:

Advanced Troubleshooting

Using Network Watcher

Azure Network Watcher provides several tools to help diagnose network connectivity issues:

Traffic Analytics

Enable Traffic Analytics for your Network Security Groups and Azure Firewall to gain insights into network traffic flows, identify potential bottlenecks, and troubleshoot connectivity issues.

Azure Monitor and Logs

Leverage Azure Monitor to collect and analyze logs from your private endpoint, target service, and network infrastructure. This can help identify errors or unexpected behavior.

Important: Resource Provider Registration

Ensure that the necessary resource providers are registered for the services you are using with Private Link (e.g., Microsoft.Network, Microsoft.Storage, Microsoft.Sql).

Troubleshooting Checklist

  1. Verify Private Endpoint Status in Azure Portal.
  2. Check Network Security Groups (NSGs) for allowed traffic.
  3. Review Azure Firewall or NVA rules.
  4. Confirm Route Table configurations.
  5. Validate Private DNS Zone creation, linking, and record accuracy.
  6. Test DNS resolution from the client VNet.
  7. Check service-specific firewall and network access settings.
  8. Use Network Watcher tools for in-depth diagnostics.
  9. Monitor Azure Monitor logs for relevant events.
Warning: Deleting Private Endpoints

Deleting a private endpoint will revoke access to the service. Redeployment will be necessary if access is required again.