0

I can successfully connect to my blob storage using private endpoint with VPN configured. However, when I tried to access the table storage, the same storage account with the blob storage, I encountered an error code 403. But when I enable the network to public, I can access back the table storage.

I have tried changing the network connection back to public and I can access the table storage, however, when I changed back to the private endpoint network connection, I cannot access the table storage again. But the blob, file storage works fine. The same issues encountered using azure portal and storage explorer.

2
  • Do you have a private endpoint for your table storage? I.e. Note that private endpoints are required per service; not per storage account; so each of blob, file, table, queue, web and data lake have their own endpoints. Also, is DNS correctly configured - i.e. if you try to resolve your storageaccountname.table.core.windows.net FQDN to an IP what happens; do you see the public or private IP? Issues here could mean missing records, or misconfiguraiton with DNS VNet integration, DNS conditional forwarders, or similar. Commented Jun 2 at 13:51
  • 1
    Thanks. I have successfully accessed the table storage. Just created another private endpoint. Commented Jun 3 at 1:15

1 Answer 1

0

The 403 error when accessing Table storage through the private endpoint because Azure requires separate private endpoints for each service(Blob, File, Table, Queue, etc.) within the same storage account. This happens because Blob, File, Table, Queue each have their own subdomain in Azure (*.blob.core.windows.net, *.file.core.windows.net, etc.).

  • Private endpoints are tied to these subdomains individually.

  • When private access is needed, each subdomain must have its own private endpoint. enter image description here

Even though they’re under the same storage account, each of these services uses a separate DNS endpoint and requires its own private endpoint for private access.

For Table storage, the endpoint is :

<your-storage-account-name>.table.core.windows.net

In the Azure portal or via the CLI, create a new private endpoint and specify the Table service.

Verify that the DNS name (<your-storage-account-name>.table.core.windows.net) resolves to the private IP address of your new Table private endpoint. If you’re using Azure DNS Private Zones, make sure it includes an entry for this FQDN.

For example, you can verify with:

nslookup <your-storage-account-name>.table.core.windows.net

If it doesn’t resolve to the private IP, update your DNS configuration (such as the private DNS zone link to your VNet).

Once the new private endpoint is in place and DNS resolves correctly, try accessing your Table storage again through your VPN/virtual network. It should now work without requiring public access.

References:

Sign up to request clarification or add additional context in comments.

Comments

Your Answer

By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.