Currently, if a service is created with a published port, the load balancer is automatically updated to provide external access to that port.
This is an awesome feature (kudos!), BUT, in some cases I may want to expose a service only for internal use via an ssh tunnel. Is there a way – perhaps with service labels? – to prevent the Azure agent from updating the load balancer for published ports?
You should also be able to run the service normally and then run a container, that you attach to the network that has your “hidden” services, to do the SSH tunnelling: