You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/event-hubs/event-hubs-ip-filtering.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,12 +11,12 @@ By default, Event Hubs namespaces are accessible from internet as long as the re
11
11
This feature is helpful in scenarios in which Azure Event Hubs should be only accessible from certain well-known sites. Firewall rules enable you to configure rules to accept traffic originating from specific IPv4 addresses. For example, if you use Event Hubs with [Azure Express Route][express-route], you can create a **firewall rule** to allow traffic from only your on-premises infrastructure IP addresses.
12
12
13
13
## IP firewall rules
14
-
The IP firewall rules are applied at the Event Hubs namespace level. So, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that doesn't match an allowed IP rule on the Event Hubs namespace is rejected as unauthorized. The response doesn't mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
14
+
You specify IP firewall rules at the Event Hubs namespace level. So, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that doesn't match an allowed IP rule on the Event Hubs namespace is rejected as unauthorized. The response doesn't mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
15
15
16
16
17
17
## Important points
18
18
- This feature isn't supported in the **basic** tier.
19
-
- Turning on firewall rules for your Event Hubs namespace blocks incoming requests by default, unless requests originate from a service operating from allowed public IP addresses. Requests that are blocked include those from other Azure services, from the Azure portal, from logging and metrics services, and so on. As an exception, you can allow access to Event Hubs resources from certain **trusted services** even when the IP filtering is enabled. For a list of trusted services, see [Trusted Microsoft services](#trusted-microsoft-services).
19
+
- Turning on firewall rules for your Event Hubs namespace blocks incoming requests by default, unless requests originate from a service operating from allowed public IP addresses. Requests that are blocked include the requests from other Azure services, from the Azure portal, from logging and metrics services, and so on. As an exception, you can allow access to Event Hubs resources from certain **trusted services** even when the IP filtering is enabled. For a list of trusted services, see [Trusted Microsoft services](#trusted-microsoft-services).
20
20
- Specify **at least one IP firewall rule or virtual network rule** for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network. If there are no IP and virtual network rules, the namespace can be accessed over the public internet (using the access key).
21
21
22
22
@@ -28,7 +28,7 @@ This section shows you how to use the Azure portal to create IP firewall rules f
28
28
1. On the **Networking** page, for **Public network access**, choose **Selected networks** option to allow access from only specified IP addresses.
29
29
30
30
Here are more details about options available in the **Public network access** page:
31
-
-**Disabled**. This option disables any public access to the namespace. The namespace will be accessible only through [private endpoints](private-link-service.md).
31
+
-**Disabled**. This option disables any public access to the namespace. The namespace is accessible only through [private endpoints](private-link-service.md).
32
32
-**Selected networks**. This option enables public access to the namespace using an access key from selected networks.
33
33
34
34
> [!IMPORTANT]
@@ -164,7 +164,7 @@ For more information about these properties, see [Create or Update Network Rule
164
164
165
165
### Azure portal
166
166
167
-
Azure portal always uses the latest API version to get and set properties. If you had previously configured your namespace using **2021-01-01-preview and earlier** with `defaultAction` set to `Deny`, and specified zero IP filters and VNet rules, the portal would have previously checked **Selected Networks** on the **Networking** page of your namespace. Now, it checks the **All networks** option.
167
+
Azure portal always uses the latest API version to get and set properties. If you had configured your namespace using **2021-01-01-preview and earlier** with `defaultAction` set to `Deny`, and specified zero IP filters and VNet rules, the portal would have previously checked **Selected Networks** on the **Networking** page of your namespace. Now, it checks the **All networks** option.
168
168
169
169
:::image type="content" source="./media/event-hubs-firewall/firewall-all-networks-selected.png" lightbox="./media/event-hubs-firewall/firewall-all-networks-selected.png" alt-text="Screenshot that shows the Public access page with the All networks option selected.":::
Copy file name to clipboardExpand all lines: articles/event-hubs/private-link-service.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ For more information, see [What is Azure Private Link?](../private-link/private-
22
22
23
23
### Prerequisites
24
24
25
-
To integrate an Event Hubs namespace with Azure Private Link, you'll need the following entities or permissions:
25
+
To integrate an Event Hubs namespace with Azure Private Link, you need the following entities or permissions:
26
26
27
27
- An Event Hubs namespace.
28
28
- An Azure virtual network.
@@ -42,7 +42,7 @@ If you already have an Event Hubs namespace, you can create a private link conne
42
42
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Select **Disabled** if you want the namespace to be accessed only via private endpoints.
43
43
44
44
Here are more details about options available in the **Public network access** page:
45
-
-**Disabled**. This option disables any public access to the namespace. The namespace will be accessible only through [private endpoints](private-link-service.md).
45
+
-**Disabled**. This option disables any public access to the namespace. The namespace is accessible only through [private endpoints](private-link-service.md).
46
46
-**Selected networks**. This option enables public access to the namespace using an access key from selected networks.
47
47
48
48
> [!IMPORTANT]
@@ -57,7 +57,7 @@ If you already have an Event Hubs namespace, you can create a private link conne
57
57
2. Select the **resource group** for the private endpoint resource.
58
58
3. Enter a **name** for the private endpoint.
59
59
1. Enter a **name for the network interface**.
60
-
1. Select a **region** for the private endpoint. Your private endpoint must be in the same region as your virtual network, but can be in a different region from the private link resource that you are connecting to.
60
+
1. Select a **region** for the private endpoint. Your private endpoint must be in the same region as your virtual network, but can be in a different region from the private link resource that you're connecting to.
61
61
1. Select **Next: Resource >** button at the bottom of the page.
62
62
63
63
:::image type="content" source="./media/private-link-service/create-private-endpoint-basics-page.png" alt-text="Screenshot showing the Basics page of the Create private endpoint wizard.":::
@@ -197,7 +197,7 @@ There are four provisioning states:
197
197
5. Go to the appropriate section below based on the operation you want to: approve, reject, or remove.
198
198
199
199
### Approve a private endpoint connection
200
-
1. If there are any connections that are pending, you'll see a connection listed with **Pending** in the provisioning state.
200
+
1. If there are any connections that are pending, you see a connection listed with **Pending** in the provisioning state.
201
201
2. Select the **private endpoint** you wish to approve
202
202
3. Select the **Approve** button.
203
203
@@ -207,7 +207,7 @@ There are four provisioning states:
207
207
208
208
### Reject a private endpoint connection
209
209
210
-
1. If there are any private endpoint connections you want to reject, whether it's a pending request or existing connection, select the connection and click the **Reject** button.
210
+
1. If there are any private endpoint connections you want to reject, whether it's a pending request or existing connection, select the connection and select the **Reject** button.
0 commit comments