Connecting resources across Azure Subscription via Private Endpoints
Overview
This guide explains how to enable network connectivity between two Azure resources in different subscriptions using Azure Private Endpoints via Terraform.
The diagram below is a high-level view of the architecture described in the next sections. The ultimate goal is to ensure a clear separation of concerns and resource ownership.
In short:
- Team B manages services in subscription B that need to connect to services in subscription A.
- Team B, the caller, exclusively owns the Private Endpoint.
- The Private Endpoint Terraform code should be maintained in Team B's repository.
- Team A must approve the connection request without further interaction between the two teams.
- Each resource in subscription B requires its own Private Endpoint.
- Multiple applications from the same team should use the same Private Endpoint.
Step-by-Step Implementation
Caller Team: Defines the Private Endpoint in the Terraform codebase
Add the following code in caller's repository to create a Private Endpoint:
resource "azurerm_private_endpoint" "example" {
name = "example-private-endpoint"
location = "caller-resource-location"
resource_group_name = "caller-team-domain-rg"
subnet_id = "caller-team-pep-subnet"
private_service_connection {
name = "example-private-endpoint"
private_connection_resource_id = "/subscriptions/<SUBSCRIPTION_A>/resourceGroups/<RESOURCE_GROUP>/providers/Microsoft.DocumentDB/databaseAccounts/<COSMOSDB_ACCOUNT>"
is_manual_connection = true
}
}
For resources within the same subscription, the is_manual_connection
property
is typically set to false
to bypass the approval step, as the resource owner
is usually the same.
However, since the resources in this scenario are in different subscriptions,
the property must be set to true
to initiate the approval process.
The private_connection_resource_id
value is hardcoded in this example. To have
a reference via Terraform data
block instead, the users that will apply the
Terraform configuration and the Managed Identities federated with the GitHub
workflows need to have the Reader
role on the target resource.
Target Team: Approves the Private Endpoint Request
Once the Terraform configuration is applied, a connection request is created in the target subscription. The target team must approve the request in order to activate the connection.
There are two ways to approve a Private Endpoint connection.
Via Azure Portal
- In the Azure Portal, navigate to
Private Link Center
- Select
Pending Connections
- Locate the request and click
Approve
Via Azure CLI
az network private-endpoint-connection approve \
--resource-group <TARGET_RESOURCE_GROUP> \
--name <PRIVATE_ENDPOINT_NAME> \
--description "<DESCRIPTION>"
::: info
It is recommended to add a meaningful description to the connection, indicating who is trying to connect and why this connection is necessary to facilitate the integration.
:::