Session
Behind the wall of fire: Navigating Power Platform Networking
Do you think your Power Platform VNET injection is going to be smooth? Think again.
After spending over five years debugging Power Platform at enterprise scale - including one of the world's 100 largest companies - I've seen firsthand how enabling VNET injection can silently break custom connectors or SQL Server connections, how DNS misconfigurations can make entire environments unresponsive, and how Microsoft's own connector implementation doesn't fully route traffic through the gateway it's supposed to use. Yes, you read that right.
In this session, I'll explain basics and walk you through the real-world chaos of Power Platform networking in corporate environments, armed with actual error logs, HAR traces, and debugging war stories. This session covers what Microsoft's documentation won't give you.
We will talk about:
- VNET Injection Pitfalls - How enabling VNET injection can break existing resources, including On-Premises Data Gateway connections and SQL Server operations
- DNS: The Silent Killer - Understanding the critical differences between External DNS, Internal DNS, and Azure Resource DNS in corporate environments - and why DNS fallback to the internet can cause false "Unavailable" errors.
- Private Endpoints & VNET Peering - What you can (and can't) create Private Endpoints for, and the address planning mistakes that haunt you later.
- The Golden Rule - Don't trust anyone, anywhere... including Microsoft. A live debugging methodology for when three parties are pointing fingers, and nothing works.
By the end, you'll have a practical playbook for navigating Power Platform networking in complex enterprise environments - and know exactly where the landmines are buried before you step on them.
Target Audience - Level 300-400 (Experienced/Advanced):
Power Platform administrators, Azure network engineers, solution architects, and IT professionals managing Power Platform in enterprise environments with VNET injection, On-Premises Data Gateways, or hybrid connectivity.
Preferred Session Duration:
45-75 minutes for comprehensive coverage, including Q&A.
Session Format:
Architecture Overview and Networking Fundamentals (15%), VNET Injection Deep Dive with real error demonstrations (30%), DNS Configuration & Debugging (20%), Live Debugging Methodology & Tooling (25%), Q&A (10%)
Approximate Presentation Plan:
1. Power Platform Networking Architecture - How connectors, gateways, and VNET injection actually work under the hood
2. VNET Injection: What Breaks - Real-world SQL connector operation matrix showing which actions work and which fail, with actual error traces
3. DNS in Corporate Environments - The three DNS layers, fallback traps, and how to configure DNS for VNET-injected environments
4. Private Endpoints & VNET Peering - Limitations, Databricks example, address space planning, and resources you can't create PEs for
5. The Debugging Playbook - nslookup techniques, sandbox isolation, HAR trace analysis, and getting Microsoft to check connector logs
6. Q&A Session
Keywords:
- Power Platform
- VNET Injection
- Virtual Network
- On-Premises Data Gateway
- SQL Server Connector
- DNS Configuration
- Private Endpoints
- VNET Peering
- Azure Networking
- Enterprise Security
- Subnet Delegation
- Zero Trust
- Hybrid Connectivity
Jan Chlebek
MCT, Business Applications & Automation CoE Lead @ Clouds On Mars
PoznaĆ, Poland
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top