Skip to content

Azure private link support #20873

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 24 commits into
base: support-azure
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
24 commits
Select commit Hold shift + click to select a range
905a0af
Create set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 27, 2025
9c6276d
Azure private link user doc
nicole-yc Apr 28, 2025
c4f073f
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
25fecc2
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
d90fc2e
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
b31a567
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
2b57e20
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
7669a41
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
7ad640c
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
cc944a2
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
45db46d
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
bcdc47e
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
1f4dece
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
f2d1625
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
41cbba5
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
bc19146
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
1b216b1
Update tidb-cloud/set-up-private-endpoint-connections-on-azure.md
nicole-yc Apr 30, 2025
2c9cc85
commit after rework
nicole-yc Apr 30, 2025
c5e8d6c
commit after rework again
nicole-yc Apr 30, 2025
21c46db
commit after rework again again
nicole-yc May 1, 2025
702c1bf
Update set-up-private-endpoint-connections-on-azure.md
nicole-yc May 1, 2025
c7e4d7d
Update set-up-private-endpoint-connections-on-azure.md
nicole-yc May 3, 2025
b5c953c
minor formatting and wording updates
qiancai May 6, 2025
8db01fc
Update TOC-tidb-cloud.md
qiancai May 6, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 2 additions & 1 deletion TOC-tidb-cloud.md
Original file line number Diff line number Diff line change
Expand Up @@ -156,7 +156,8 @@
- Connect to Your TiDB Cloud Dedicated Cluster
- [Connection Method Overview](/tidb-cloud/connect-to-tidb-cluster.md)
- [Connect via Public Connection](/tidb-cloud/connect-via-standard-connection.md)
- [Connect via Private Endpoint with AWS](/tidb-cloud/set-up-private-endpoint-connections.md)
- [Connect via Private Endpoint with AWS](/tidb-cloud/set-up-private-endpoint-connections-on-aws.md)
- [Connect via Private Endpoint with Azure](/tidb-cloud/set-up-private-endpoint-connections-on-azure.md)
- [Connect via Private Endpoint (Private Service Connect) with Google Cloud](/tidb-cloud/set-up-private-endpoint-connections-on-google-cloud.md)
- [Connect via VPC Peering](/tidb-cloud/set-up-vpc-peering-connections.md)
- [Connect via SQL Shell](/tidb-cloud/connect-via-sql-shell.md)
Expand Down
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added media/tidb-cloud/azure-private-endpoint-arch.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
121 changes: 121 additions & 0 deletions tidb-cloud/set-up-private-endpoint-connections-on-azure.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,121 @@
---
title: Connect to a TiDB Cloud Dedicated Cluster via Azure Private Endpoint
summary: Learn how to connect to your TiDB Cloud cluster via Azure Private Endpoint.
---

# Connect to a TiDB Cloud Dedicated Cluster via Azure Private Endpoint

This document describes how to connect to your TiDB Cloud Dedicated cluster via Azure Private Endpoint.

> **Tip:**
>
> - To learn how to connect to a TiDB Cloud Dedicated cluster via private endpoint with AWS, see [Connect to TiDB Cloud Dedicated via Private Endpoint with AWS](/tidb-cloud/set-up-private-endpoint-connections.md).
> - To learn how to connect to a TiDB Cloud Dedicated cluster via private endpoint with Google Cloud, see [Connect to TiDB Cloud Dedicated via Private Service Connect with Google Cloud](/tidb-cloud/set-up-private-endpoint-connections-on-google-cloud.md)
> - To learn how to connect to a TiDB Cloud Serverless cluster via private endpoint, see [Connect to TiDB Cloud Serverless via Private Endpoint](/tidb-cloud/set-up-private-endpoint-connections-serverless.md).
TiDB Cloud supports highly secure and one-way access to the TiDB Cloud service hosted in an Azure virtual network via [Azure Private Link](https://learn.microsoft.com/en-us/azure/private-link/private-link-overview), as if the service were in your own virtual network. You can create a private endpoint in your virtual network, and then connect to the TiDB Cloud service via the endpoint with permission.

Powered by Azure Private Link, the endpoint connection is secure and private, and does not expose your data to the public internet. In addition, the endpoint connection supports CIDR overlap and is easier for network management.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think it's necessary to mention CIDR overlapping here.

Copy link
Author

@nicole-yc nicole-yc Apr 30, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I will keep this because the sentence is same as AWS and GCP. Thanks!


The architecture of Azure Private Link is as follows, based on the [Azure documentation](https://learn.microsoft.com/en-us/azure/private-link/private-link-service-overview):

![Azure Private Link architecture](/media/tidb-cloud/azure-private-endpoint-arch.png)

For more detailed definitions of the private endpoint and endpoint service, see the following Azure documents:

- [What is Azure Private Link](https://learn.microsoft.com/en-us/azure/private-link/private-link-overview)
- [What is a private endpoint](https://learn.microsoft.com/en-us/azure/private-link/private-endpoint-overview)
- [Create a private endpoint](https://learn.microsoft.com/en-us/azure/private-link/create-private-endpoint-portal?tabs=dynamic-ip)

## Restrictions

- Only the `Organization Owner` and `Project Owner` roles can create private endpoints.
- The private endpoint and the TiDB cluster to be connected must be located in the same region.

## Set up a private endpoint with Azure Private Link

To connect to your TiDB Cloud Dedicated cluster via a private endpoint, complete the following steps:

1. [Select a TiDB cluster](#step-1-select-a-tidb-cluster)
2. [Create an Azure private endpoint](#step-2-create-an-azure-private-endpoint)
3. [Accept the endpoint](#step-3-accept-the-endpoint)
4. [Connect to your TiDB cluster](#step-4-connect-to-your-tidb-cluster)

If you have multiple clusters, you need to repeat these steps for each cluster that you want to connect to using Azure Private Link.

### Step 1. Select a TiDB cluster

1. On the [**Clusters**](https://tidbcloud.com/console/clusters) page, click the name of your target TiDB cluster to go to its overview page.
2. Click **Connect** in the upper-right corner. A connection dialog is displayed.
3. In the **Connection Type** drop-down list, select **Private Endpoint**, and then click **Create Private Endpoint Connection** to open the **Create Azure Private Endpoint Connection** dialog.

> **Note:**
>
> If you have already created a private endpoint connection, the active endpoint will appear in the connection dialog. To create additional private endpoint connections, navigate to the **Networking** page in the left navigation pane.
### Step 2. Create an Azure private endpoint

1. In the **Create Azure Private Endpoint Connection** dialog, copy the TiDB Cloud resource ID of the private link service and leave the dialog open for later use.

> **Note:**
>
> For each TiDB Cloud Dedicated cluster, the corresponding endpoint service is automatically created 3 to 4 minutes after the cluster creation.
2. Log in to the [Azure portal](https://portal.azure.com/), and then create a private endpoint for your cluster using the copied TiDB Cloud resource ID as follows:

1. In the Azure portal, search for **Private endpoint**, and then select **Private endpoint** in the result.
2. On the **Private endpoint** page, click **+ Create**.
3. In the **Basics** tab, fill in the project and instance information, and then click **Next: Resource**.
4. In the **Resource** tab, choose **Connect to an Azure resource by resource ID or alias** as the **connection method**, paste the TiDB Cloud resource ID to the **Resource ID or alias** field, and then click **Next: Virtual Network**.
5. Complete the rest of the configurations of this private endpoint, and then click **Create**. For more information, see [Create a private endpoint](https://learn.microsoft.com/en-us/azure/private-link/create-private-endpoint-portal?tabs=dynamic-ip#create-a-private-endpoint) in Azure documentation.

3. After the private endpoint is created, click **Go to resource**, and then do the following:

- Click **Properties** in the left navigation pane, and copy its **Resource ID** for later use.

![Azure private endpoint resource ID](/media/tidb-cloud/azure-private-endpoint-resource-id.png)

- Click **DNS configuration** in the left navigation pane, and then copy its **IP address** for later use.

![Azure private endpoint DNS IP](/media/tidb-cloud/azure-private-endpoint-dns-ip.png)

### Step 3. Accept the endpoint

1. Return to the **Create Azure Private Endpoint Connection** dialog in the TiDB Cloud console, and then paste the copied **Resource ID** and **IP address** into the corresponding fields.
2. Click **Verify Endpoint** to validate the private endpoint access. If you encounter any error, follow the error message for troubleshooting, and then try again.
3. Once verification is successful, click **Accept Endpoint** to approve the connection from your private endpoint.

### Step 4. Connect to your TiDB cluster

After you have accepted the endpoint connection, you are redirected back to the connection dialog.

1. Wait for the private endpoint connection status to become **Active** (approximately 5 minutes). You can go to the **Networking** page of the cluster to check its status.
2. In the **Connect With** drop-down list, select your preferred connection method. The corresponding connection string is displayed at the bottom of the dialog.
3. Connect to your cluster with the connection string.

### Private endpoint status reference

You can view the statuses of private endpoints or private endpoint services on the **Networking** page of your cluster.

The possible statuses of a private endpoint are explained as follows:

- **Discovered**: TiDB Cloud can automatically detect your private endpoint associated with the endpoint service before accepting the request to prevent the need for creating another one.
- **Pending**: waiting for processing.
- **Active**: your private endpoint is ready to use. You cannot edit the private endpoint of this status.
- **Deleting**: the private endpoint is being deleted.
- **Failed**: the private endpoint creation fails. You can click **Edit** of that row to retry the creation.

The possible statuses of a private endpoint service are explained as follows:

- **Creating**: the endpoint service is being created, which takes 3 to 5 minutes.
- **Active**: the endpoint service is created, no matter whether the private endpoint is created or not.

## Troubleshooting

### TiDB Cloud fails to create an endpoint service. What should I do?

The endpoint service is created automatically after you open the **Create Azure Private Endpoint** page and choose the TiDB cluster. If it shows as failed or remains in the **Creating** state for a long time, submit a [support ticket](/tidb-cloud/tidb-cloud-support.md) for assistance.

### If I cancel the action during setup, what should I do before accepting the private endpoint?

The Azure private endpoint connection feature can automatically detect your private endpoints. This means if you cancel your action during the setup of a private endpoint connection, you can still view your created endpoint on the networking page. If the cancellation is unintentional, you can continue to edit it to complete the setup. If the cancellation is deliberate, you can delete the endpoint directly in the TiDB Cloud console.