Documentation Index
Fetch the complete documentation index at: https://astronomer-preview.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Airflow 3This feature is only available for Airflow 3.x Deployments.
Overview
By default, Remote Execution Agents communicate with the Astro orchestration plane over the public internet. With Azure Private Link, you can route this traffic through a private connection within Azure, which provides enhanced security and can simplify network configurations for organizations with strict security requirements. The setup involves creating a Private Endpoint in your Azure subscription that connects to Astronomer’s Private Link Service. Once configured, your Remote Execution Agents can communicate with Astro through this private connection.Prerequisites
- An Astro Deployment configured for Remote Execution.
- Remote Execution Agents installed in an Azure environment (Azure Kubernetes Service (AKS)).
- Access to the Azure portal with permissions to create Private Endpoints, Private DNS zones, and modify networking configurations.
Astro-side configuration
Before you can create a Private Endpoint, Astronomer must configure the Private Link Service on the Astro side. Contact Astronomer support with the following information:- Your Astro Cluster ID.
Create a Private Endpoint
After receiving the Private Link Service alias from Astronomer Support, create a Private Endpoint in your Azure subscription.astro-privatelink.Configure DNS resolution
After creating the Private Endpoint, configure DNS so that your Remote Execution Agents resolve the Astro orchestration plane hostname to the Private Endpoint IP address.Create a private DNS zone
external.astronomer.run as the zone name.clxxxxxxxxx.external.astronomer.run, enter clxxxxxxxxx.Verify the connection
After Astronomer support approves your endpoint connection, verify that your Remote Execution Agents can communicate with Astro through the Private Endpoint. Validate in the Astro UI that the agents are heartbeating and reporting a Healthy status. You can also verify from within your network using the following instructions.- Connect to a host within your VNet that has network access to the Private Endpoint.
- Run a DNS lookup to confirm the hostname resolves to a private IP address:
- Test connectivity to the endpoint:
404 page not found. If the connection is successful, your Remote Execution Agents will use the Private Endpoint for all communication with the Astro orchestration plane.
Multiple Remote Execution Agents
Only one Private Link Service is required per Astro cluster. If you have multiple Remote Execution Agents across different VNets, you can either create a Private Endpoint in each VNet (the Private Link Service alias remains unchanged) or use a single Private Endpoint across your network.If you previously created a private DNS zone, you can associate additional VNets with the same zone rather than creating new zones for each VNet.
Restrict traffic to the Private Endpoint
After verifying that the Private Endpoint works correctly, you can optionally configure your Remote Execution Agents to only allow traffic through the Private Endpoint. This ensures that all communication with Astro uses the private connection. To restrict traffic:- Take note of your Astro Cluster ID, under Organization Settings > Clusters > Cluster details.
- In the Astro UI, navigate to your Deployment and go to Settings.
- In your Deployment Advanced settings, add the cluster CIDR range to the Allowed IP address ranges list.