-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sample should have private endpoint for Key Vault and Storage Account #93
Comments
Ack on this. Allow us to get back on this. |
@francovanzyl96 , I was able to set storage app setting with private endpoint for a function app deployed on ACA , here is the sample endpoint for the same Can you clarify following:
|
Thanks for the update. What authentication method are you using to access the storage account from the Function app? The Storage Account access is part of my issue, but would love to also see Function App on containers fetching secrets from a Key Vault with a private endpoint. To answer your questions.
|
We need resource id details for this to debug further. Since this is a public forum can you please open support ticket ? We can get your resource details and check why provisioning failed? On a side note did you try re-deploying , ensure resource provisioning is successful (you may check this in the json view of the resource in the Azure Portal) and trigger the durable function? |
Hi @francovanzyl96 , were you able to raise support issue on this. On the other hand can you check if private DNS or private endpoint or IP config issues exist. As a repro suggested the same error message that you were seeing due to network config issues. |
Hi @raorugan, I was not able to raise a support ticket on this yet, would need to redeploy an environment with private endpoints to reproduce the issue again first. Will do this asap and create a support request. On the other hand can you check if private DNS or private endpoint or IP config issues exist - I have checked that private endpoints and private DNS zones are properly created and linked to the correct VNets. Are there any specific checks you would like me to do? |
Azure functions on Azure container apps can access both storage and ACR private end points with private DNS connected with Managed Identity. We double-checked this and works fine. We re-pro'ed the scenario with wrong ip configs and were able to see similar errors that you saw . For checking your environment, configs and troubleshooting raising support ticket is the best. |
Ok thanks and also Key Vault? |
yes , KeyVault as well. Azure service that is reachable through private endpoint from container app environment VNET Internal with managed identity should work |
Ok, I will redeploy it like that and create a support ticket. Thanks for looking into it. |
hello @francovanzyl96 , is the issue resolved? |
Is your feature request related to a problem? Please describe.
The sample would be more practical and secure if the Azure Key Vault and Storage Account resources have private endpoints deployed. Additionally the Azure Container Registry could also have a private endpoint.
Describe the solution you'd like
I would like to see a sample where Azure Key Vault and Storage Account resources have private endpoints deployed. Additionally the Azure Container Registry could also have a private endpoint. I would also like to see samples of how the App Settings should be configured to force all outbound traffic from the Function App to go over the private VNet attached to the Container Apps Environment.
Describe alternatives you've considered
I have attempted to use the App Settings as described for deploying Function Apps on App Service Plans, however this does not seem to include a solution for accessing Key Vault secrets over a private endpoint connection.
Additional context
The text was updated successfully, but these errors were encountered: