You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/event-hubs/event-hubs-ip-filtering.md
+45-26Lines changed: 45 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Azure Event Hubs Firewall Rules | Microsoft Docs
3
3
description: Use Firewall Rules to allow connections from specific IP addresses to Azure Event Hubs.
4
4
ms.topic: article
5
-
ms.date: 02/23/2022
5
+
ms.date: 02/15/2023
6
6
---
7
7
8
8
# Allow access to Azure Event Hubs namespaces from specific IP addresses or ranges
@@ -11,12 +11,12 @@ By default, Event Hubs namespaces are accessible from internet as long as the re
11
11
This feature is helpful in scenarios in which Azure Event Hubs should be only accessible from certain well-known sites. Firewall rules enable you to configure rules to accept traffic originating from specific IPv4 addresses. For example, if you use Event Hubs with [Azure Express Route][express-route], you can create a **firewall rule** to allow traffic from only your on-premises infrastructure IP addresses.
12
12
13
13
## IP firewall rules
14
-
The IP firewall rules are applied at the Event Hubs namespace level. So, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that doesn't match an allowed IP rule on the Event Hubs namespace is rejected as unauthorized. The response doesn't mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
14
+
You specify IP firewall rules at the Event Hubs namespace level. So, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that doesn't match an allowed IP rule on the Event Hubs namespace is rejected as unauthorized. The response doesn't mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
15
15
16
16
17
17
## Important points
18
18
- This feature isn't supported in the **basic** tier.
19
-
- Turning on firewall rules for your Event Hubs namespace blocks incoming requests by default, unless requests originate from a service operating from allowed public IP addresses. Requests that are blocked include those from other Azure services, from the Azure portal, from logging and metrics services, and so on. As an exception, you can allow access to Event Hubs resources from certain **trusted services** even when the IP filtering is enabled. For a list of trusted services, see [Trusted Microsoft services](#trusted-microsoft-services).
19
+
- Turning on firewall rules for your Event Hubs namespace blocks incoming requests by default, unless requests originate from a service operating from allowed public IP addresses. Requests that are blocked include the requests from other Azure services, from the Azure portal, from logging and metrics services, and so on. As an exception, you can allow access to Event Hubs resources from certain **trusted services** even when the IP filtering is enabled. For a list of trusted services, see [Trusted Microsoft services](#trusted-microsoft-services).
20
20
- Specify **at least one IP firewall rule or virtual network rule** for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network. If there are no IP and virtual network rules, the namespace can be accessed over the public internet (using the access key).
21
21
22
22
@@ -25,20 +25,16 @@ This section shows you how to use the Azure portal to create IP firewall rules f
25
25
26
26
1. Navigate to your **Event Hubs namespace** in the [Azure portal](https://portal.azure.com).
27
27
4. Select **Networking** under **Settings** on the left menu.
28
-
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Choose**Selected networks** option to allow access from only specified IP addresses.
29
-
-**Disabled**. This option disables any public access to the namespace. The namespace will be accessible only through [private endpoints](private-link-service.md).
30
-
31
-
:::image type="content" source="./media/event-hubs-firewall/public-access-disabled.png" alt-text="Networking page - public access tab - public network access is disabled.":::
28
+
1. On the **Networking** page, for **Public network access**, choose**Selected networks** option to allow access from only specified IP addresses.
29
+
30
+
Here are more details about options available in the **Public network access** page:
31
+
-**Disabled**. This option disables any publicaccess to the namespace. The namespace is accessible only through [private endpoints](private-link-service.md).
32
32
-**Selected networks**. This option enables public access to the namespace using an access key from selected networks.
33
33
34
34
> [!IMPORTANT]
35
-
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
36
-
37
-
:::image type="content" source="./media/event-hubs-firewall/selected-networks.png" alt-text="Networking page with the selected networks option selected." lightbox="./media/event-hubs-firewall/selected-networks.png":::
35
+
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
38
36
-**All networks** (default). This option enables public access from all networks using an access key. If you select the **All networks** option, the event hub accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
39
-
40
-
:::image type="content" source="./media/event-hubs-firewall/firewall-all-networks-selected.png" lightbox="./media/event-hubs-firewall/firewall-all-networks-selected.png" alt-text="Screenshot that shows the Public access page with the All networks option selected.":::
41
-
1. To restrict access to **specific IP addresses**, follow these steps:
37
+
1. To restrict access to **specific IP addresses**, select **Selected networks** option, and then follow these steps:
42
38
1. In the **Firewall** section, select **Add your client IP address** option to give your current client IP the access to the namespace.
43
39
3. For **address range**, enter a specific IPv4 address or a range of IPv4 address in CIDR notation.
44
40
@@ -71,56 +67,79 @@ The following Resource Manager template enables adding an IP filter rule to an e
To deploy the template, follow the instructions for [Azure Resource Manager][lnk-deploy].
@@ -145,7 +164,7 @@ For more information about these properties, see [Create or Update Network Rule
145
164
146
165
### Azure portal
147
166
148
-
Azure portal always uses the latest API version to get and set properties. If you had previously configured your namespace using **2021-01-01-preview and earlier** with `defaultAction` set to `Deny`, and specified zero IP filters and VNet rules, the portal would have previously checked **Selected Networks** on the **Networking** page of your namespace. Now, it checks the **All networks** option.
167
+
Azure portal always uses the latest API version to get and set properties. If you had configured your namespace using **2021-01-01-preview and earlier** with `defaultAction` set to `Deny`, and specified zero IP filters and VNet rules, the portal would have previously checked **Selected Networks** on the **Networking** page of your namespace. Now, it checks the **All networks** option.
149
168
150
169
:::image type="content" source="./media/event-hubs-firewall/firewall-all-networks-selected.png" lightbox="./media/event-hubs-firewall/firewall-all-networks-selected.png" alt-text="Screenshot that shows the Public access page with the All networks option selected.":::
Copy file name to clipboardExpand all lines: articles/event-hubs/event-hubs-service-endpoints.md
+4-8Lines changed: 4 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Virtual Network service endpoints - Azure Event Hubs | Microsoft Docs
3
3
description: This article provides information on how to add a Microsoft.EventHub service endpoint to a virtual network.
4
4
ms.topic: article
5
-
ms.date: 02/23/2021
5
+
ms.date: 02/15/2023
6
6
---
7
7
8
8
# Allow access to Azure Event Hubs namespaces from specific virtual networks
@@ -40,18 +40,14 @@ This section shows you how to use Azure portal to add a virtual network service
40
40
1. Navigate to your **Event Hubs namespace** in the [Azure portal](https://portal.azure.com).
41
41
4. Select **Networking** under **Settings** on the left menu.
42
42
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Choose **Selected networks** option to allow access only from specific virtual networks.
43
+
44
+
Here are more details about options available in the **Public network access** page:
43
45
-**Disabled**. This option disables any public access to the namespace. The namespace will be accessible only through [private endpoints](private-link-service.md).
44
-
45
-
:::image type="content" source="./media/event-hubs-firewall/public-access-disabled.png" alt-text="Networking page - public access tab - public network access is disabled.":::
46
46
-**Selected networks**. This option enables public access to the namespace using an access key from selected networks.
47
47
48
48
> [!IMPORTANT]
49
-
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
50
-
51
-
:::image type="content" source="./media/event-hubs-firewall/selected-networks.png" alt-text="Networking page with the selected networks option selected." lightbox="./media/event-hubs-firewall/selected-networks.png":::
49
+
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
52
50
-**All networks** (default). This option enables public access from all networks using an access key. If you select the **All networks** option, the event hub accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
53
-
54
-
:::image type="content" source="./media/event-hubs-firewall/firewall-all-networks-selected.png" lightbox="./media/event-hubs-firewall/firewall-all-networks-selected.png" alt-text="Screenshot that shows the Public access page with the All networks option selected.":::
55
51
1. To restrict access to specific networks, choose the **Selected Networks** option at the top of the page if it isn't already selected.
56
52
2. In the **Virtual networks** section of the page, select **+Add existing virtual network***. Select **+ Create new virtual network** if you want to create a new VNet.
Copy file name to clipboardExpand all lines: articles/event-hubs/private-link-service.md
+10-14Lines changed: 10 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Integrate Azure Event Hubs with Azure Private Link Service
3
3
description: Learn how to integrate Azure Event Hubs with Azure Private Link Service
4
-
ms.date: 08/26/2022
4
+
ms.date: 02/15/2023
5
5
ms.topic: article
6
6
ms.custom: devx-track-azurepowershell
7
7
---
@@ -22,7 +22,7 @@ For more information, see [What is Azure Private Link?](../private-link/private-
22
22
23
23
### Prerequisites
24
24
25
-
To integrate an Event Hubs namespace with Azure Private Link, you'll need the following entities or permissions:
25
+
To integrate an Event Hubs namespace with Azure Private Link, you need the following entities or permissions:
26
26
27
27
- An Event Hubs namespace.
28
28
- An Azure virtual network.
@@ -40,18 +40,14 @@ If you already have an Event Hubs namespace, you can create a private link conne
40
40
2. In the search bar, type in **event hubs**.
41
41
3. Select the **namespace** from the list to which you want to add a private endpoint.
42
42
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Select **Disabled** if you want the namespace to be accessed only via private endpoints.
43
-
-**Disabled**. This option disables any public access to the namespace. The namespace will be accessible only through [private endpoints](private-link-service.md).
44
-
45
-
:::image type="content" source="./media/event-hubs-firewall/public-access-disabled.png" alt-text="Networking page - public access tab - public network access is disabled.":::
43
+
44
+
Here are more details about options available in the **Public network access** page:
45
+
-**Disabled**. This option disables any publicaccess to the namespace. The namespace is accessible only through [private endpoints](private-link-service.md).
46
46
-**Selected networks**. This option enables public access to the namespace using an access key from selected networks.
47
47
48
48
> [!IMPORTANT]
49
-
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
50
-
51
-
:::image type="content" source="./media/event-hubs-firewall/selected-networks.png" alt-text="Networking page with the selected networks option selected." lightbox="./media/event-hubs-firewall/selected-networks.png":::
49
+
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
52
50
-**All networks** (default). This option enables public access from all networks using an access key. If you select the **All networks** option, the event hub accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
53
-
54
-
:::image type="content" source="./media/event-hubs-firewall/firewall-all-networks-selected.png" lightbox="./media/event-hubs-firewall/firewall-all-networks-selected.png" alt-text="Screenshot that shows the Public access page with the All networks option selected.":::
55
51
1. Switch to the **Private endpoint connections** tab.
56
52
1. Select the **+ Private Endpoint** button at the top of the page.
57
53
@@ -61,7 +57,7 @@ If you already have an Event Hubs namespace, you can create a private link conne
61
57
2. Select the **resource group** for the private endpoint resource.
62
58
3. Enter a **name** for the private endpoint.
63
59
1. Enter a **name for the network interface**.
64
-
1. Select a **region** for the private endpoint. Your private endpoint must be in the same region as your virtual network, but can be in a different region from the private link resource that you are connecting to.
60
+
1. Select a **region** for the private endpoint. Your private endpoint must be in the same region as your virtual network, but can be in a different region from the private link resource that you're connecting to.
65
61
1. Select **Next: Resource >** button at the bottom of the page.
66
62
67
63
:::image type="content" source="./media/private-link-service/create-private-endpoint-basics-page.png" alt-text="Screenshot showing the Basics page of the Create private endpoint wizard.":::
@@ -201,7 +197,7 @@ There are four provisioning states:
201
197
5. Go to the appropriate section below based on the operation you want to: approve, reject, or remove.
202
198
203
199
### Approve a private endpoint connection
204
-
1. If there are any connections that are pending, you'll see a connection listed with **Pending** in the provisioning state.
200
+
1. If there are any connections that are pending, you see a connection listed with **Pending** in the provisioning state.
205
201
2. Select the **private endpoint** you wish to approve
206
202
3. Select the **Approve** button.
207
203
@@ -211,7 +207,7 @@ There are four provisioning states:
211
207
212
208
### Reject a private endpoint connection
213
209
214
-
1. If there are any private endpoint connections you want to reject, whether it's a pending request or existing connection, select the connection and click the **Reject** button.
210
+
1. If there are any private endpoint connections you want to reject, whether it's a pending request or existing connection, select the connection and select the **Reject** button.
0 commit comments