Skip to main content

Using Azure private endpoints with managed services

Note

This topic applies only to Striim Cloud on Azure (Enterprise and Mission Critical).

This topic describes how to configure Azure Private Endpoints to connect Striim Cloud to supported managed services securely and privately. The use of private endpoints as a source or target has been certified with the following Microsoft services:

  • Azure Cosmos for MongoDB

  • Azure Data Lake Storage Gen2

  • Azure Database for MySQL

  • Azure Databricks

  • Azure Event Hub

  • Azure Key Vault

  • Azure Managed SQL Instance

  • Azure SQL Database

  • Azure Synapse (SQL)

  • Microsoft Fabric Lakehouse

networking-azure-managed-only_001.png

Using private endpoints has been certified with the following non-Microsoft services:

  • MongoDB Atlas

  • Snowflake

  • Databricks

For advanced use cases that require cross-tenant access—such as integrating with Microsoft Fabric Lakehouse—see Using Azure Private Link with Microsoft Fabric Lakehouse.

Note

To configure a private endpoint for Snowflake, contact Striim support.

Prerequisites

You may need permissions in Azure to create a database, virtual machine, standard load balancer, Azure Private Link service, or private endpoint. You may also need permission to approve the endpoints created. Some Microsoft services auto-approve private endpoints.

Before configuring Striim Cloud, do the following in Azure.

For Microsoft services

  • Get the Resource ID for the Azure-managed service. The Resource ID can be obtained by navigating to the resource in the Azure Portal, selecting Properties and copying the 'ID' field. The tooltip says 'Resource ID'.

For MongoDB Atlas

  • Create a private endpoint from the MongoDB Atlas endpoint page. This creates a Private Link service which has a Resource ID attached to it. Once you configure the resource ID in Striim Console, you will receive an email from Striim that contains the Resource ID and IP address of the private endpoint. You will use these values to configure the private endpoint in MongoDB Atlas.

See Quickstart: Create a Private Link service by using the Azure portal.

See What is a private endpoint? and related topics.

Configuring an Azure private endpoint in Striim Cloud

  1. Make sure the Striim Cloud service is running.

  2. In the Striim Cloud Console, select the Services tab, then select More > View Details > Secure connection for the Striim Cloud service.

  3. In the Private Endpoints section, click Create Private Endpoint and enter the following:

  4. Click Create Private Endpoint.

    The new private endpoint will be in the Creating state while connecting to Azure. For MongoDB only, it will then be in the Pending state until you provide the Resource ID and IP address that you receive through an email from Striim, at which point the state of the private endpoint will be auto-approved and in the Running state.

    Other services may require approval before going to the Running state.

  5. The private endpoint in Striim will then be in the Running state.

Specifying Azure private endpoints in sources and targets

For ADLS Gen2 Writer or Azure Event Hub Writer, if a running Striim Cloud private endpoint is associated with the same service as the SAS key specified in the adapter properties, the adapter will use it automatically.Azure Event Hub Writer

For MongoDB Reader or MongoDB Writer for MongoDB Atlas, obtain the connection string URL from MongoDB Atlas and use this URL in the TQL to connect with the private endpoint. In the MongoDB Atlas Database home page, click on Connect. Click Connect with MongoDB Compass. Copy the provided connection string.MongoDB Writer

For Database Reader, Database Writer, or MySQL Reader for Azure Database for MySQL:Database ReaderDatabase WriterMySQL CDC reader

  1. In the Striim Cloud Console, select the Services tab, then select More > View Details > Secure connection for the Striim Cloud service.

  2. In the Private Endpoints section, copy the appropriate FQDN value and use it in place of the IP address, host name, or network name in the adapter's Connection URL property value.

    PrivateEndpoint2.png