Closed drmiru closed 2 years ago
@drmiru Thanks for your comment. We will review the issue and get back to you shortly.
@drmiru does the egress requests from the APIM route via the "Virtual IP (VIP) addresses" defined for the APIM instance? Or a random Azure assigned APIM IP range?
@drmiru does the egress requests from the APIM route via the "Virtual IP (VIP) addresses" defined for the APIM instance? Or a random Azure assigned APIM IP range?
As far as I observed it, the public VIP was source of egress
@drmiru I have checked with the product team and they confirmed that private endpoint will not work with vnet integration. Private endpoints are only for incoming calls and not for outgoing calls.
Limit incoming traffic only to private endpoints, preventing data exfiltration.
@drmiru Hope the above helps and clears things up. We will now proceed to close this thread. If there are further questions regarding this matter, please reopen it and we will gladly continue the discussion.
Sorry, but I don't understand how a private endpoint is useful without working with outgoing calls.
The APIM is private but the backend that the APIM calls must be public. What's the point?
I improve security by putting the APIM in a private context but in the same solution, have I to expose the backend with a public IP?
@MayankBargali-MSFT is vnet integrated egress to be expected soon? currently this private link feature is not adding any value for our use case. for now we have to fall back to custom domains in combination with the internal vnet deployment model.
Enabling private endpoint disables the vnet integration feature. Egress requests from API management are routed via the public IP address, where I'd expect the private endpoint's IP to be the source for egress traffic towards a private web app or private Azure Function.
Document Details
⚠ Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.