Skip to content

Commit 1f3240b

Browse files
authored
Merge pull request #178389 from chez-charlie/release-branch-1
Network rule for Storage Private Endpoint
2 parents dc3c088 + 0e22814 commit 1f3240b

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/data-factory/how-to-create-event-trigger.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,9 @@ For a ten-minute introduction and demonstration of this feature, watch the follo
2727
> [!NOTE]
2828
> The integration described in this article depends on [Azure Event Grid](https://azure.microsoft.com/services/event-grid/). Make sure that your subscription is registered with the Event Grid resource provider. For more info, see [Resource providers and types](../azure-resource-manager/management/resource-providers-and-types.md#azure-portal). You must be able to do the *Microsoft.EventGrid/eventSubscriptions/** action. This action is part of the EventGrid EventSubscription Contributor built-in role.
2929
30+
> [!NOTE]
31+
> If the blob storage account resides behind a [private endpoint](../storage/common/storage-private-endpoints.md) and blocks public network access, you need to configure network rules to allow communications from blob storage to Azure Event Grid. You can either grant storage access to trusted Azure services, such as Event Grid, following [Storage documentation](../storage/common/storage-network-security.md#grant-access-to-trusted-azure-services), or configure private endpoints for Event Grid that map to VNet address space, following [Event Grid documentation](../event-grid/configure-private-endpoints.md)
32+
3033
## Create a trigger with UI
3134

3235
This section shows you how to create a storage event trigger within the Azure Data Factory and Synapse pipeline User Interface.
@@ -90,7 +93,7 @@ The following table provides an overview of the schema elements that are related
9093
| **scope** | The Azure Resource Manager resource ID of the Storage Account. | String | Azure Resource Manager ID | Yes |
9194
| **events** | The type of events that cause this trigger to fire. | Array | Microsoft.Storage.BlobCreated, Microsoft.Storage.BlobDeleted | Yes, any combination of these values. |
9295
| **blobPathBeginsWith** | The blob path must begin with the pattern provided for the trigger to fire. For example, `/records/blobs/december/` only fires the trigger for blobs in the `december` folder under the `records` container. | String | | Provide a value for at least one of these properties: `blobPathBeginsWith` or `blobPathEndsWith`. |
93-
| **blobPathEndsWith** | The blob path must end with the pattern provided for the trigger to fire. For example, `december/boxes.csv` only fires the trigger for blobs named `boxes` in a `december` folder. | String | | You have to provide a value for at least one of these properties: `blobPathBeginsWith` or `blobPathEndsWith`. |
96+
| **blobPathEndsWith** | The blob path must end with the pattern provided for the trigger to fire. For example, `december/boxes.csv` only fires the trigger for blobs named `boxes` in a `december` folder. | String | | Provide a value for at least one of these properties: `blobPathBeginsWith` or `blobPathEndsWith`. |
9497
| **ignoreEmptyBlobs** | Whether or not zero-byte blobs will trigger a pipeline run. By default, this is set to true. | Boolean | true or false | No |
9598

9699
## Examples of storage event triggers
@@ -114,7 +117,7 @@ This section provides examples of storage event trigger settings.
114117

115118
Azure Data Factory and Synapse pipelines use Azure role-based access control (Azure RBAC) to ensure that unauthorized access to listen to, subscribe to updates from, and trigger pipelines linked to blob events, are strictly prohibited.
116119

117-
* To successfully create a new or update an existing Storage Event Trigger, the Azure account signed into the the service needs to have appropriate access to the relevant storage account. Otherwise, the operation will fail with _Access Denied_.
120+
* To successfully create a new or update an existing Storage Event Trigger, the Azure account signed into the service needs to have appropriate access to the relevant storage account. Otherwise, the operation will fail with _Access Denied_.
118121
* Azure Data Factory and Azure Synapse need no special permission to your Event Grid, and you do _not_ need to assign special RBAC permission to the Data Factory or Azure Synapse service principal for the operation.
119122

120123
Any of following RBAC settings works for storage event trigger:

0 commit comments

Comments
 (0)