You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/event-hubs/event-hubs-ip-filtering.md
+41-22Lines changed: 41 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Azure Event Hubs Firewall Rules | Microsoft Docs
3
3
description: Use Firewall Rules to allow connections from specific IP addresses to Azure Event Hubs.
4
4
ms.topic: article
5
-
ms.date: 02/23/2022
5
+
ms.date: 02/15/2023
6
6
---
7
7
8
8
# Allow access to Azure Event Hubs namespaces from specific IP addresses or ranges
@@ -25,20 +25,16 @@ This section shows you how to use the Azure portal to create IP firewall rules f
25
25
26
26
1. Navigate to your **Event Hubs namespace** in the [Azure portal](https://portal.azure.com).
27
27
4. Select **Networking** under **Settings** on the left menu.
28
-
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Choose **Selected networks** option to allow access from only specified IP addresses.
28
+
1. On the **Networking** page, for **Public network access**, choose **Selected networks** option to allow access from only specified IP addresses.
29
+
30
+
Here are more details about options available in the **Public network access** page:
29
31
-**Disabled**. This option disables any public access to the namespace. The namespace will be accessible only through [private endpoints](private-link-service.md).
30
-
31
-
:::image type="content" source="./media/event-hubs-firewall/public-access-disabled.png" alt-text="Networking page - public access tab - public network access is disabled.":::
32
32
-**Selected networks**. This option enables public access to the namespace using an access key from selected networks.
33
33
34
34
> [!IMPORTANT]
35
-
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
36
-
37
-
:::image type="content" source="./media/event-hubs-firewall/selected-networks.png" alt-text="Networking page with the selected networks option selected." lightbox="./media/event-hubs-firewall/selected-networks.png":::
35
+
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
38
36
-**All networks** (default). This option enables public access from all networks using an access key. If you select the **All networks** option, the event hub accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
39
-
40
-
:::image type="content" source="./media/event-hubs-firewall/firewall-all-networks-selected.png" lightbox="./media/event-hubs-firewall/firewall-all-networks-selected.png" alt-text="Screenshot that shows the Public access page with the All networks option selected.":::
41
-
1. To restrict access to **specific IP addresses**, follow these steps:
37
+
1. To restrict access to **specific IP addresses**, select **Selected networks** option, and then follow these steps:
42
38
1. In the **Firewall** section, select **Add your client IP address** option to give your current client IP the access to the namespace.
43
39
3. For **address range**, enter a specific IPv4 address or a range of IPv4 address in CIDR notation.
44
40
@@ -71,56 +67,79 @@ The following Resource Manager template enables adding an IP filter rule to an e
Copy file name to clipboardExpand all lines: articles/event-hubs/event-hubs-service-endpoints.md
+4-8Lines changed: 4 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Virtual Network service endpoints - Azure Event Hubs | Microsoft Docs
3
3
description: This article provides information on how to add a Microsoft.EventHub service endpoint to a virtual network.
4
4
ms.topic: article
5
-
ms.date: 02/23/2021
5
+
ms.date: 02/15/2023
6
6
---
7
7
8
8
# Allow access to Azure Event Hubs namespaces from specific virtual networks
@@ -40,18 +40,14 @@ This section shows you how to use Azure portal to add a virtual network service
40
40
1. Navigate to your **Event Hubs namespace** in the [Azure portal](https://portal.azure.com).
41
41
4. Select **Networking** under **Settings** on the left menu.
42
42
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Choose **Selected networks** option to allow access only from specific virtual networks.
43
+
44
+
Here are more details about options available in the **Public network access** page:
43
45
-**Disabled**. This option disables any public access to the namespace. The namespace will be accessible only through [private endpoints](private-link-service.md).
44
-
45
-
:::image type="content" source="./media/event-hubs-firewall/public-access-disabled.png" alt-text="Networking page - public access tab - public network access is disabled.":::
46
46
-**Selected networks**. This option enables public access to the namespace using an access key from selected networks.
47
47
48
48
> [!IMPORTANT]
49
-
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
50
-
51
-
:::image type="content" source="./media/event-hubs-firewall/selected-networks.png" alt-text="Networking page with the selected networks option selected." lightbox="./media/event-hubs-firewall/selected-networks.png":::
49
+
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
52
50
-**All networks** (default). This option enables public access from all networks using an access key. If you select the **All networks** option, the event hub accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
53
-
54
-
:::image type="content" source="./media/event-hubs-firewall/firewall-all-networks-selected.png" lightbox="./media/event-hubs-firewall/firewall-all-networks-selected.png" alt-text="Screenshot that shows the Public access page with the All networks option selected.":::
55
51
1. To restrict access to specific networks, choose the **Selected Networks** option at the top of the page if it isn't already selected.
56
52
2. In the **Virtual networks** section of the page, select **+Add existing virtual network***. Select **+ Create new virtual network** if you want to create a new VNet.
Copy file name to clipboardExpand all lines: articles/event-hubs/private-link-service.md
+4-8Lines changed: 4 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Integrate Azure Event Hubs with Azure Private Link Service
3
3
description: Learn how to integrate Azure Event Hubs with Azure Private Link Service
4
-
ms.date: 08/26/2022
4
+
ms.date: 02/15/2023
5
5
ms.topic: article
6
6
ms.custom: devx-track-azurepowershell
7
7
---
@@ -40,18 +40,14 @@ If you already have an Event Hubs namespace, you can create a private link conne
40
40
2. In the search bar, type in **event hubs**.
41
41
3. Select the **namespace** from the list to which you want to add a private endpoint.
42
42
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Select **Disabled** if you want the namespace to be accessed only via private endpoints.
43
+
44
+
Here are more details about options available in the **Public network access** page:
43
45
-**Disabled**. This option disables any public access to the namespace. The namespace will be accessible only through [private endpoints](private-link-service.md).
44
-
45
-
:::image type="content" source="./media/event-hubs-firewall/public-access-disabled.png" alt-text="Networking page - public access tab - public network access is disabled.":::
46
46
-**Selected networks**. This option enables public access to the namespace using an access key from selected networks.
47
47
48
48
> [!IMPORTANT]
49
-
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
50
-
51
-
:::image type="content" source="./media/event-hubs-firewall/selected-networks.png" alt-text="Networking page with the selected networks option selected." lightbox="./media/event-hubs-firewall/selected-networks.png":::
49
+
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
52
50
-**All networks** (default). This option enables public access from all networks using an access key. If you select the **All networks** option, the event hub accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
53
-
54
-
:::image type="content" source="./media/event-hubs-firewall/firewall-all-networks-selected.png" lightbox="./media/event-hubs-firewall/firewall-all-networks-selected.png" alt-text="Screenshot that shows the Public access page with the All networks option selected.":::
55
51
1. Switch to the **Private endpoint connections** tab.
56
52
1. Select the **+ Private Endpoint** button at the top of the page.
0 commit comments