You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/workspace-manager.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,6 +81,10 @@ Workspace manager groups allow you to organize workspaces together based on busi
81
81
## Publish the Group definition
82
82
At this point, the content items selected haven't been published to the member workspace(s) yet.
83
83
84
+
> [!NOTE]
85
+
> The publish action will fail if the [maximum publish operations](#known-limitations) are exceeded.
86
+
> Consider splitting up member workspaces into additional groups if you approach this limit.
87
+
84
88
1. Select the group > **Publish content**.
85
89
86
90
:::image type="content" source="media/workspace-manager/publish-group.png" alt-text="Screenshot shows the group publish window.":::
@@ -111,6 +115,7 @@ Common reasons for failure include:
111
115
- A member workspace has been deleted.
112
116
113
117
### Known limitations
118
+
- The maximum published operations per group is 2000. *Published operations* = (*member workspaces*) * (*content items*).<br>For example, if you have 10 member workspaces in a group and you publish 20 content items in that group,<br>*published operations* = *10* * *20* = *200*.
114
119
- Playbooks attributed or attached to analytics and automation rules aren't currently supported.
115
120
- Workbooks stored in bring-your-own-storage aren't currently supported.
116
121
- Workspace manager only manages content items published from the central workspace. It doesn't manage content created locally from member workspace(s).
@@ -15,91 +15,40 @@ Azure Elastic storage area network (SAN) Preview allows you to secure and contro
15
15
16
16
This article describes how to configure your Elastic SAN to allow access from your Azure virtual network infrastructure.
17
17
18
-
You can configure your Elastic SAN volume groups to allow access only from endpoints on specific virtual network subnets. The allowed subnets may belong to virtual networks in the same subscription, or those in a different subscription, including a subscription belonging to a different Azure Active Directory tenant.
19
-
20
18
To configure network access to your Elastic SAN:
21
19
22
20
> [!div class="checklist"]
23
21
> -[Configure a virtual network endpoint](#configure-a-virtual-network-endpoint).
24
-
> -[Configure virtual network rules](#configure-virtual-network-rules) to control the source and type of traffic to your Elastic SAN.
To decide which type of endpoint works best for you, see [Compare Private Endpoints and Service Endpoints](../../virtual-network/vnet-integration-for-azure-services.md#compare-private-endpoints-and-service-endpoints).
35
-
36
-
Each volume group can be configured to allow access from either public storage service endpoints or private endpoints, but not both at the same time. Once network access is configured for a volume group, the configuration is inherited by all volumes belonging to the group.
37
-
38
-
The process for enabling each type of endpoint follows:
39
-
40
-
-[Configure an Azure Storage service endpoint](#configure-an-azure-storage-service-endpoint)
41
-
-[Configure a private endpoint](#configure-a-private-endpoint)
42
-
43
-
### Configure an Azure Storage service endpoint
44
-
45
-
You can configure an Azure Storage service endpoint from the virtual network where access is required. You must have permission to the `Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action`[Azure resource provider operation](../../role-based-access-control/resource-provider-operations.md#microsoftnetwork) via a custom Azure role to configure a service endpoint.
46
-
47
-
> [!NOTE]
48
-
> Configuration of rules that grant access to subnets in virtual networks that are a part of a different Azure Active Directory tenant are currently only supported through PowerShell, CLI and REST APIs. These rules cannot be configured through the Azure portal, though they may be viewed in the portal.
49
-
50
-
# [Portal](#tab/azure-portal)
51
-
52
-
1. Navigate to your virtual network and select **Service Endpoints**.
53
-
1. Select **+ Add**.
54
-
1. On the **Add service endpoints** screen:
55
-
1. For **Service** select **Microsoft.Storage.Global** to add a [cross-region service endpoint](../common/storage-network-security.md#azure-storage-cross-region-service-endpoints).
56
-
57
-
> [!NOTE]
58
-
> You might see **Microsoft.Storage** listed as an available storage service endpoint. That option is for intra-region endpoints which exist for backward compatibility only. Always use cross-region endpoints unless you have a specific reason for using intra-region ones.
59
-
60
-
1. For **Subnets** select all the subnets where you want to allow access.
61
-
1. Select **Add**.
26
+
You can configure your Elastic SAN volume groups to allow access only from endpoints on specific virtual network subnets. The allowed subnets may belong to virtual networks in the same subscription, or those in a different subscription, including a subscription belonging to a different Azure Active Directory tenant.
62
27
63
-
:::image type="content" source="media/elastic-san-create/elastic-san-service-endpoint.png" alt-text="Screenshot of the virtual network service endpoint page, adding the storage service endpoint." lightbox="media/elastic-san-create/elastic-san-service-endpoint.png":::
28
+
You can allow access to your Elastic SAN volume group from two types of Azure virtual network endpoints:
-[Storage service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md)
66
32
67
-
Use this sample code to create a storage service endpoint for your Elastic SAN volume group with PowerShell.
33
+
A private endpoint uses one or more private IP addresses from your virtual network subnet to access an Elastic SAN volume group over the Microsoft backbone network. With a private endpoint, traffic between your virtual network and the volume group are secured over a private link.
68
34
69
-
```powershell
70
-
# Define some variables
71
-
$RgName = "<ResourceGroupName>"
72
-
$VnetName = "<VnetName>"
73
-
$SubnetName = "<SubnetName>"
35
+
Virtual network service endpoints are public and accessible via the internet. You can [Configure virtual network rules](#configure-virtual-network-rules) to control access to your volume group when using storage service endpoints.
Network rules only apply to the public endpoints of a volume group, not private endpoints. The process of approving the creation of a private endpoint grants implicit access to traffic from the subnet that hosts the private endpoint. You can use [Network Policies](../../private-link/disable-private-endpoint-network-policy.md) to control traffic over private endpoints if you want to refine access rules. If you want to use private endpoints exclusively, do not enable service endpoints for the volume group.
To decide which type of endpoint works best for you, see [Compare Private Endpoints and Service Endpoints](../../virtual-network/vnet-integration-for-azure-services.md#compare-private-endpoints-and-service-endpoints).
84
40
85
-
Use this sample code to create a storage service endpoint for your Elastic SAN volume group with the Azure CLI.
41
+
Once network access is configured for a volume group, the configuration is inherited by all volumes belonging to the group.
The process for enabling each type of endpoint follows:
96
44
97
-
---
45
+
-[Configure a private endpoint](#configure-a-private-endpoint)
46
+
-[Configure an Azure Storage service endpoint](#configure-an-azure-storage-service-endpoint)
98
47
99
48
### Configure a private endpoint
100
49
101
50
> [!IMPORTANT]
102
-
> -Private endpoints for Elastic SAN Preview are supported in all regions that Elastic SAN is available in if you deploy with [locally-redundant storage (LRS)](elastic-san-planning.md#redundancy) as their redundancy option. Private endpoints aren't currently supported Elastic SANs deployed using [zone-redundant storage (ZRS)](elastic-san-planning.md#redundancy) as their redundancy option.
51
+
> -For Elastic SANs using [locally-redundant storage (LRS)](elastic-san-planning.md#redundancy) as their redundancy option, private endpoints are supported in all regions that Elastic SAN is available. Private endpoints aren't currently supported for elastic SANs using [zone-redundant storage (ZRS)](elastic-san-planning.md#redundancy) as their redundancy option.
103
52
>
104
53
> - Before you can create a private endpoint connection to a volume group, it must contain at least one volume.
105
54
@@ -109,6 +58,8 @@ There are two steps involved in configuring a private endpoint connection:
109
58
> - Creating the endpoint and the associated connection.
110
59
> - Approving the connection.
111
60
61
+
You can also use [Network Policies](../../private-link/disable-private-endpoint-network-policy.md) to refine access control over private endpoints.
62
+
112
63
To create a private endpoint for an Elastic SAN volume group, you must have the [Elastic SAN Volume Group Owner](../../role-based-access-control/built-in-roles.md#elastic-san-volume-group-owner) role. To approve a new private endpoint connection, you must have permission to the [Azure resource provider operation](../../role-based-access-control/resource-provider-operations.md#microsoftelasticsan)`Microsoft.ElasticSan/elasticSans/PrivateEndpointConnectionsApproval/action`. Permission for this operation is included in the [Elastic SAN Network Admin](../../role-based-access-control/built-in-roles.md#elastic-san-owner) role, but it can also be granted via a custom Azure role.
113
64
114
65
If you create the endpoint from a user account that has all of the necessary roles and permissions required for creation and approval, the process can be completed in one step. If not, it will require two separate steps by two different users.
@@ -284,7 +235,67 @@ az network private-endpoint-connection approve \
284
235
285
236
---
286
237
287
-
## Configure virtual network rules
238
+
### Configure an Azure Storage service endpoint
239
+
240
+
To configure an Azure Storage service endpoint from the virtual network where access is required, you must have permission to the `Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action`[Azure resource provider operation](../../role-based-access-control/resource-provider-operations.md#microsoftnetwork) via a custom Azure role to configure a service endpoint.
241
+
242
+
Virtual network service endpoints are public and accessible via the internet. You can [Configure virtual network rules](#configure-virtual-network-rules) to control access to your volume group when using storage service endpoints.
243
+
244
+
> [!NOTE]
245
+
> Configuration of rules that grant access to subnets in virtual networks that are a part of a different Azure Active Directory tenant are currently only supported through PowerShell, CLI and REST APIs. These rules cannot be configured through the Azure portal, though they may be viewed in the portal.
246
+
247
+
# [Portal](#tab/azure-portal)
248
+
249
+
1. Navigate to your virtual network and select **Service Endpoints**.
250
+
1. Select **+ Add**.
251
+
1. On the **Add service endpoints** screen:
252
+
1. For **Service** select **Microsoft.Storage.Global** to add a [cross-region service endpoint](../common/storage-network-security.md#azure-storage-cross-region-service-endpoints).
253
+
254
+
> [!NOTE]
255
+
> You might see **Microsoft.Storage** listed as an available storage service endpoint. That option is for intra-region endpoints which exist for backward compatibility only. Always use cross-region endpoints unless you have a specific reason for using intra-region ones.
256
+
257
+
1. For **Subnets** select all the subnets where you want to allow access.
258
+
1. Select **Add**.
259
+
260
+
:::image type="content" source="media/elastic-san-create/elastic-san-service-endpoint.png" alt-text="Screenshot of the virtual network service endpoint page, adding the storage service endpoint." lightbox="media/elastic-san-create/elastic-san-service-endpoint.png":::
261
+
262
+
# [PowerShell](#tab/azure-powershell)
263
+
264
+
Use this sample code to create a storage service endpoint for your Elastic SAN volume group with PowerShell.
All incoming requests for data over a service endpoint are blocked by default. Only applications that request data from allowed sources that you configure in your network rules will be able to access your data.
288
299
289
300
You can manage virtual network rules for volume groups through the Azure portal, PowerShell, or CLI.
290
301
@@ -376,7 +387,6 @@ You can manage virtual network rules for volume groups through the Azure portal,
0 commit comments