Connect SAP Private Link Service to Microsoft Azure Private Link Service (Kyma)
Requires Customer/Partner License
Beginner
10 min.
Connect SAP Private Link service to Microsoft Azure Private Link Service and bind the service instance on a Kyma cluster.
You will learn
- How to create a SAP Private Link service instance to connect to your Microsoft Azure Private Link Service using kubectl CLI
- How to bind the service instance to your Kyma cluster using kubectl CLI
Prerequisites
- You have a global account and subaccount on SAP Business Technology Platform with SAP Private Link service entitlement: Set Up SAP Private Link service .
- You have created a Microsoft Azure Private Link Service in the Azure Portal. You only have to create the Load Balancer resources (pool and rules) and the private link service. The section “Create a private endpoint” can be skipped, as SAP Private Link service will establish the connection for you. See Create a Private Link service by using the Azure portal.
When creating the Azure Private Link service, make sure you allowlist the SAP BTP CF Subscription IDs as described in Only allow requests from SAP BTP CF’s Azure subscription. - You have enabled Kyma Runtime and configured kubectl CLI. See Enable SAP BTP, Kyma Runtime Using the Command Line
SAP Private Link service establishes a private connection between applications running on SAP BTP and selected services in your own IaaS provider accounts. By reusing the private link functionality of our partner IaaS providers, you can access your services through private network connections to avoid data transfer via the public internet.
