Hi @thanakrit rungchatkamol
Thanks for the question and using MS Q&A platform.
1.Ensure there's appropriate peering in place for the virtual networks for subscriptions A and B to secure, safe communication between those two networks for private endpoint access.
2.Private DNS Configuration : It should be assured the private DNS zone exists and has been linked appropriately for Subscription B. Through it, the private endpoints of a DNS name resolution happens as expected.
3. Using nslookup command to check whether the Private DNS zone of Subscription B resolves private endpoint DNS names. If this fails to resolve, it will not work.
4. Using OpenSSL, verify the SSL certificate for your private endpoint is valid and matches the expected hostname, otherwise SSL errors can result.
5.Test that the private endpoint in subscription A is set up properly to use the correct private DNS zone in subscription B, or DNS resolution and access simply will not work if improperly linked.
references:
https://learn.microsoft.com/en-us/azure/private-link/private-endpoint-dns-integration
https://learn.microsoft.com/en-us/azure/machine-learning/how-to-troubleshoot-secure-connection-workspace?view=azureml-api-2&source=recommendations
https://learn.microsoft.com/en-us/azure/private-link/private-endpoint-dns