Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
As organizations increasingly adopt cloud services, ensuring secure and efficient access to these resources becomes paramount. FinOps hubs offer flexible options to support public or private access to data networking, depending on your needs. This guide explains how each data access option works and how to configure private networking to securely access data in FinOps hubs.
How public access works
Public access in FinOps hubs has the following traits:
- Access is controlled via role-based access control (RBAC) and communications encrypted via transport layer security (TLS).
- Storage is accessible via public IP addresses (firewall set to public).
- Data Explorer (if deployed) is accessible via public IP addresses (firewall set to public).
- Key Vault is accessible via public IP addresses (firewall set to public).
- Azure Data Factory is configured to use the public integration runtime.
How private access works
Private access is a more secure option that places FinOps hubs resources on an isolated network and limits access via private networking:
- Public network access is disabled by default.
- Storage is accessible via private IP address and trusted Azure services - firewall is set to default deny with bypass for services on trusted list.
- Data Explorer (if deployed) is accessible via private IP address - firewall is set to default deny with no exceptions.
- Key vault is accessible via private IP address and trusted Azure services - firewall is set to default deny with bypass for services on trusted list.
- Azure Data Factory is configured to use the public integration runtime, which helps reduce costs.
- A virtual network is deployed to ensure communication between all components during deployment and at runtime remains private.
Note that private networking incurs extra cost for networking resources, connectivity, and dedicated compute in Azure Data Factory. For a detailed cost estimate, please refer to the Azure pricing calculator.
Comparing network access options
The following table compares the network access options available in FinOps hubs:
Component | Public | Private | Benefit |
---|---|---|---|
Storage | Accessible over the internet¹ | Access restricted to the FinOps hub network, peered networks (for example, corporate vNet), and trusted Azure services | Data only accessible when at work or on the corporate VPN |
Azure Data Explorer | Accessible over the internet¹ | Access restricted to the FinOps hub network, peered networks (for example, corporate vNet), and trusted Azure services | Data only accessible when at work or on the corporate VPN |
Key vault | Accessible over the internet¹ | Access restricted to the FinOps hub network, peered networks (for example, corporate vNet), and trusted Azure services | Keys and secrets are never accessible via to the open internet |
Azure Data Factory | Uses public compute pool | Managed integration runtime in a private network with Data Explorer, storage, and key vault | All data processing happens inside the network |
Virtual Network | Not used | FinOps hub traffic happens within an isolated vNet | Everything remains private; ideal for regulated environments |
¹ While resources are accessible over the internet, access is still protected by role-based access control (RBAC).
Enabling private networking
To enable private networking when deploying a new or updating an existing FinOps hub instance, set Access to Private on the Advanced tab.
Before enabling private access, review the networking details on this page to understand the extra configuration required in order to connect to your hub instance. Once enabled, your FinOps hub instance is inaccessible until network access is configured outside of the FinOps hub instance. We recommend sharing this with your network admins to ensure the IP range meets network standards and they understand how to connect your hub instance to the existing network.
FinOps hub virtual network
When private access is selected, your FinOps hub instance includes a virtual network to ensure communication between its various components remain private.
- The virtual network should be a /26 (64 IP addresses) in size. This setting enables the minimum required subnet sizes for Container Services (used during deployments for running scripts) and Data Explorer.
- The IP range can be set at the time of deployment and defaults to 10.20.30.0/26.
If necessary, you can create the virtual network, subnets, and optionally peer it with your hub network before deploying FinOps hubs if you follow these requirements:
- The virtual network should be a /26 (64 IP addresses in size).
- The name should be
<HubName>-vNet
. - The virtual network must be divided into three subnets with the service delegations as specified:
- private-endpoint-subnet (/28) – no service delegations configured; hosts private endpoints for storage and key vault.
- script-subnet (/28) – delegated to container services for running scripts during deployment.
- dataExplorer-subnet (/27) – delegated to Azure Data Explorer.
Private endpoints and DNS
Communication between the various FinOps hub components is encrypted using TLS. For TLS certificate validation to succeed when using private networking, reliable ___domain name system (DNS) name resolution is required. DNS zones, private endpoints, and DNS entries guarantee name resolution between FinOps hub components.
- privatelink.blob.core.windows.net – for Data Explorer and storage used by deployment scripts
- privatelink.dfs.core.windows.net – for Data Explorer and the data lake hosting the FinOps data and pipeline configuration
- privatelink.table.core.windows.net – for Data Explorer
- privatelink.queue.core.windows.net – for Data Explorer
- privatelink.vaultcore.azure.net – for Azure Key Vault
- privatelink.{___location}.kusto.windows.net – for Data Explorer
Important
Altering the DNS configuration of the FinOps hub virtual network isn't recommended. FinOps hub components require reliable name resolution for deployments and upgrades to succeed. Data Factory pipelines also require reliable name resolution between components.
Network peering, routing, and name resolution
When private access is selected, the FinOps hub instance is deployed to an isolated spoke virtual network. Multiple options exist to enable private connectivity to the FinOps hub virtual network including:
- Peering the FinOps hub network with another Azure vNet.
- Peering the FinOps hub network with an Azure vWAN hub.
- Extending the FinOps hub network address space and deploying a VPN gateway.
- Extending the FinOps hub network address space and deploying a Power BI data gateway.
- Allowing one's corporate firewall and VPN IP ranges access over the public internet via the storage and Data Explorer firewalls.
To access FinOps hub data from an existing virtual network, configure A records in your existing virtual network to access storage or Data Explorer. CNAME records may also be required depending on your DNS solution.
Required | Name | Description |
---|---|---|
Required | <storage_account_name>.privatelink.dfs.core.windows.net | A record to access storage |
Optional | <storage_account_name>.dfs.core.windows.net | CNAME to the storage A record |
Required | <data_explorer_name>.privatelink.<azure_location>.kusto.windows.net | A record to access Data Explorer |
Optional | <data_explorer_name>.<azure_location>.kusto.windows.net | CNAME to the Data Explorer A record |
Network peering example
In this example:
- The FinOps hub virtual network is peered to a network hub.
- Azure firewall acts as core the router.
- DNS entries for storage and Data Explorer are added to Azure DNS Resolver to ensure reliable name resolution.
- A route table is attached to the network gateway subnet to ensure traffic from on-premises can route to the peered vNet.
This network topology follows the Hub-Spoke network architecture guidance outlined in the Cloud Adoption Framework for Azure and the Azure Architecture Center.
Give feedback
Let us know how we're doing with a quick review. We use these reviews to improve and expand FinOps tools and resources.
If you're looking for something specific, vote for an existing or create a new idea. Share ideas with others to get more votes. We focus on ideas with the most votes.