Private endpoints for Azure Data Explorer

Use private endpoints for your cluster to let clients on a virtual network securely access data over a private link. Private endpoints use private IP addresses from your virtual network address space to connect to your cluster securely. Network traffic between clients on the virtual network and the cluster traverses the virtual network and a private link on the Microsoft backbone network, avoiding exposure to the public internet.

Private endpoints for your cluster let you:

  • Secure the cluster by setting the firewall to block all connections on the public endpoint.
  • Increase virtual network security by blocking data exfiltration.
  • Securely connect to clusters from on-premises networks through a VPN gateway or ExpressRoutes with private peering.

Overview

A private endpoint is a special network interface for an Azure service in your virtual network. It's assigned IP addresses from the IP address range of your virtual network. Creating a private endpoint for your cluster provides secure connectivity between clients on your virtual network and your cluster. The private endpoint and the cluster connect using a secure private link.

Screenshot of the private endpoint architecture schema for Azure Data Explorer.

Applications in the virtual network connect to the cluster over the private endpoint. The connection strings and authorization mechanisms are the same as those used to connect to a public endpoint.

Creating a private endpoint for a cluster in your virtual network sends a consent request to the cluster owner for approval. If the user requesting the creation of the private endpoint is also an owner of the cluster, the request is automatically approved. Cluster owners can manage consent requests and private endpoints for the cluster in the Azure portal, under Private endpoints.

Secure your cluster to accept connections only from your virtual network by configuring the cluster firewall to deny access through its public endpoint by default. You don't need a firewall rule to allow traffic from a virtual network that has a private endpoint because the cluster firewall only controls access for the public endpoint. In contrast, private endpoints rely on the consent flow for granting subnets access to the cluster.

Plan the size of the subnet in your virtual network

The size of the subnet that hosts a private endpoint for a cluster can't be changed after the subnet is deployed. The private endpoint consumes multiple IP addresses in your virtual network. In extreme scenarios, like high-end ingestion, the number of IP addresses used by the private endpoint can increase. The cause of this increase is due an increased number of transient storage accounts required as staging accounts for ingesting into your cluster. If this scenario applies to your environment, plan for it when determining the subnet size.

Note

The relevant ingestion scenarios that would be responsible for scaling out the transient storage accounts are ingestion from a local file and async ingestion from a blob.

Use the following information to help you determine the total number of IP addresses required by your private endpoint:

Use Number of IP addresses
Engine service 1
Data management service 1
Transient storage accounts 6
Azure reserved addresses 5
Total 13

Note

The absolute minimum size for the subnet is /28 (14 usable IP addresses). If you plan to create an Azure Data Explorer cluster for extreme ingestion workloads, use a /24 netmask to stay on the safe side.

If you created a subnet that is too small, you can delete it and create a new one with a larger address range. After recreating the subnet, create a new private endpoint for the cluster.

Connect to a private endpoint

Clients on a virtual network using a private endpoint should use the same connection string for the cluster as clients connecting to a public endpoint. DNS resolution automatically routes connections from the virtual network to the cluster over a private link.

Important

Use the same connection string to connect to the cluster using private endpoints as you'd use to connect to a public endpoint. Don't connect to the cluster using its private link subdomain URL.

By default, Azure Data Explorer creates a private DNS zone attached to the virtual network with the necessary updates for the private endpoints. However, if you're using your own DNS server, you might need to make more changes to your DNS configuration.

Screenshot of the DNS configuration page, showing the DNS configuration of the private endpoint.

Azure Data Explorer creates multiple customer visible FQDNs as part of the private endpoint deployment. In addition to the query and ingestion FQDN, it comes with several FQDNs for blob / table / queue endpoints (needed for ingestion scenarios).

Disable public access

To increase security, you also can disable public access to the cluster in the Azure portal.

Screenshot of the networking page in Azure Data Explorer showing the disable public access option.

Managed private endpoints

You can use a managed private endpoint to either enable the cluster to securely access your ingestion- or query-related services via their private endpoint. The Azure Data Explorer cluster can then access your resources via a private IP address.

Diagram of the managed private endpoint architecture for Azure Data Explorer.

Note

We recommend using Managed Identity connect to Azure Storage and Azure Event Hubs instead of managed private endpoints. To connect using managed identities, configure the Azure Storage or Event Hubs resources to recognize Azure Data Explorer as a trusted service. Then, use Managed Identity to grant access by creating a network rule exception for trusted Azure services.```

Supported services

Azure Data Explorer supports creating managed private endpoints to the following services:

Limitations

Private endpoints aren't supported for virtual network injected Azure Data Explorer clusters.

Implications on cost

Private endpoints or managed private endpoints are resources that incur extra costs. The cost varies depending on the selected solution architecture. For more information, see Azure Private Link pricing.