Skip to content

Commit 07c6455

Browse files
committed
minor updats
1 parent 3e709df commit 07c6455

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

articles/event-hubs/event-hubs-ip-filtering.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,12 @@ By default, Event Hubs namespaces are accessible from internet as long as the re
1111
This feature is helpful in scenarios in which Azure Event Hubs should be only accessible from certain well-known sites. Firewall rules enable you to configure rules to accept traffic originating from specific IPv4 addresses. For example, if you use Event Hubs with [Azure Express Route][express-route], you can create a **firewall rule** to allow traffic from only your on-premises infrastructure IP addresses.
1212

1313
## IP firewall rules
14-
The IP firewall rules are applied at the Event Hubs namespace level. So, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that doesn't match an allowed IP rule on the Event Hubs namespace is rejected as unauthorized. The response doesn't mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
14+
You specify IP firewall rules at the Event Hubs namespace level. So, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that doesn't match an allowed IP rule on the Event Hubs namespace is rejected as unauthorized. The response doesn't mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
1515

1616

1717
## Important points
1818
- This feature isn't supported in the **basic** tier.
19-
- Turning on firewall rules for your Event Hubs namespace blocks incoming requests by default, unless requests originate from a service operating from allowed public IP addresses. Requests that are blocked include those from other Azure services, from the Azure portal, from logging and metrics services, and so on. As an exception, you can allow access to Event Hubs resources from certain **trusted services** even when the IP filtering is enabled. For a list of trusted services, see [Trusted Microsoft services](#trusted-microsoft-services).
19+
- Turning on firewall rules for your Event Hubs namespace blocks incoming requests by default, unless requests originate from a service operating from allowed public IP addresses. Requests that are blocked include the requests from other Azure services, from the Azure portal, from logging and metrics services, and so on. As an exception, you can allow access to Event Hubs resources from certain **trusted services** even when the IP filtering is enabled. For a list of trusted services, see [Trusted Microsoft services](#trusted-microsoft-services).
2020
- Specify **at least one IP firewall rule or virtual network rule** for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network. If there are no IP and virtual network rules, the namespace can be accessed over the public internet (using the access key).
2121

2222

@@ -28,7 +28,7 @@ This section shows you how to use the Azure portal to create IP firewall rules f
2828
1. On the **Networking** page, for **Public network access**, choose **Selected networks** option to allow access from only specified IP addresses.
2929

3030
Here are more details about options available in the **Public network access** page:
31-
- **Disabled**. This option disables any public access to the namespace. The namespace will be accessible only through [private endpoints](private-link-service.md).
31+
- **Disabled**. This option disables any public access to the namespace. The namespace is accessible only through [private endpoints](private-link-service.md).
3232
- **Selected networks**. This option enables public access to the namespace using an access key from selected networks.
3333

3434
> [!IMPORTANT]
@@ -164,7 +164,7 @@ For more information about these properties, see [Create or Update Network Rule
164164
165165
### Azure portal
166166

167-
Azure portal always uses the latest API version to get and set properties. If you had previously configured your namespace using **2021-01-01-preview and earlier** with `defaultAction` set to `Deny`, and specified zero IP filters and VNet rules, the portal would have previously checked **Selected Networks** on the **Networking** page of your namespace. Now, it checks the **All networks** option.
167+
Azure portal always uses the latest API version to get and set properties. If you had configured your namespace using **2021-01-01-preview and earlier** with `defaultAction` set to `Deny`, and specified zero IP filters and VNet rules, the portal would have previously checked **Selected Networks** on the **Networking** page of your namespace. Now, it checks the **All networks** option.
168168

169169
:::image type="content" source="./media/event-hubs-firewall/firewall-all-networks-selected.png" lightbox="./media/event-hubs-firewall/firewall-all-networks-selected.png" alt-text="Screenshot that shows the Public access page with the All networks option selected.":::
170170

articles/event-hubs/private-link-service.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ For more information, see [What is Azure Private Link?](../private-link/private-
2222

2323
### Prerequisites
2424

25-
To integrate an Event Hubs namespace with Azure Private Link, you'll need the following entities or permissions:
25+
To integrate an Event Hubs namespace with Azure Private Link, you need the following entities or permissions:
2626

2727
- An Event Hubs namespace.
2828
- An Azure virtual network.
@@ -42,7 +42,7 @@ If you already have an Event Hubs namespace, you can create a private link conne
4242
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Select **Disabled** if you want the namespace to be accessed only via private endpoints.
4343

4444
Here are more details about options available in the **Public network access** page:
45-
- **Disabled**. This option disables any public access to the namespace. The namespace will be accessible only through [private endpoints](private-link-service.md).
45+
- **Disabled**. This option disables any public access to the namespace. The namespace is accessible only through [private endpoints](private-link-service.md).
4646
- **Selected networks**. This option enables public access to the namespace using an access key from selected networks.
4747

4848
> [!IMPORTANT]
@@ -57,7 +57,7 @@ If you already have an Event Hubs namespace, you can create a private link conne
5757
2. Select the **resource group** for the private endpoint resource.
5858
3. Enter a **name** for the private endpoint.
5959
1. Enter a **name for the network interface**.
60-
1. Select a **region** for the private endpoint. Your private endpoint must be in the same region as your virtual network, but can be in a different region from the private link resource that you are connecting to.
60+
1. Select a **region** for the private endpoint. Your private endpoint must be in the same region as your virtual network, but can be in a different region from the private link resource that you're connecting to.
6161
1. Select **Next: Resource >** button at the bottom of the page.
6262

6363
:::image type="content" source="./media/private-link-service/create-private-endpoint-basics-page.png" alt-text="Screenshot showing the Basics page of the Create private endpoint wizard.":::
@@ -197,7 +197,7 @@ There are four provisioning states:
197197
5. Go to the appropriate section below based on the operation you want to: approve, reject, or remove.
198198

199199
### Approve a private endpoint connection
200-
1. If there are any connections that are pending, you'll see a connection listed with **Pending** in the provisioning state.
200+
1. If there are any connections that are pending, you see a connection listed with **Pending** in the provisioning state.
201201
2. Select the **private endpoint** you wish to approve
202202
3. Select the **Approve** button.
203203

@@ -207,7 +207,7 @@ There are four provisioning states:
207207

208208
### Reject a private endpoint connection
209209

210-
1. If there are any private endpoint connections you want to reject, whether it's a pending request or existing connection, select the connection and click the **Reject** button.
210+
1. If there are any private endpoint connections you want to reject, whether it's a pending request or existing connection, select the connection and select the **Reject** button.
211211

212212
![Reject private endpoint](./media/private-link-service/private-endpoint-reject-button.png)
213213
2. On the **Reject connection** page, enter a comment (optional), and select **Yes**. If you select **No**, nothing happens.
@@ -217,7 +217,7 @@ There are four provisioning states:
217217

218218
1. To remove a private endpoint connection, select it in the list, and select **Remove** on the toolbar.
219219
2. On the **Delete connection** page, select **Yes** to confirm the deletion of the private endpoint. If you select **No**, nothing happens.
220-
3. You should see the status changed to **Disconnected**. Then, the endpoint will disappear from the list.
220+
3. You should see the status changed to **Disconnected**. Then, the endpoint disappears from the list.
221221

222222
## Validate that the private link connection works
223223

0 commit comments

Comments
 (0)