Skip to content

Commit 40e7641

Browse files
authored
Merge pull request #210425 from spelluru/egridupdates0907
quick updates
2 parents 30ff78d + 239a928 commit 40e7641

File tree

3 files changed

+11
-13
lines changed

3 files changed

+11
-13
lines changed

articles/event-grid/cloudevents-schema.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -117,9 +117,7 @@ New-AzEventGridSubscription `
117117
-DeliverySchema CloudEventSchemaV1_0
118118
```
119119

120-
Currently, you can't use an Event Grid trigger for an Azure Functions app when the event is delivered in the CloudEvents schema. Use an HTTP trigger. For examples of implementing an HTTP trigger that receives events in the CloudEvents schema, see [Using CloudEvents with Azure Functions](#azure-functions).
121-
122-
## Endpoint validation with CloudEvents v1.0
120+
## Endpoint validation with CloudEvents v1.0
123121

124122
If you're already familiar with Event Grid, you might be aware of the endpoint validation handshake for preventing abuse. CloudEvents v1.0 implements its own [abuse protection semantics](webhook-event-delivery.md) by using the HTTP OPTIONS method. To read more about it, see [HTTP 1.1 Web Hooks for event delivery - Version 1.0](https://github.com/cloudevents/spec/blob/v1.0/http-webhook.md#4-abuse-protection). When you use the CloudEvents schema for output, Event Grid uses the CloudEvents v1.0 abuse protection in place of the Event Grid validation event mechanism.
125123

articles/event-grid/consume-private-endpoints.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 05/17/2022
99
Currently, it's not possible to deliver events using [private endpoints](../private-link/private-endpoint-overview.md). That is, there is no support if you have strict network isolation requirements where your delivered events traffic must not leave the private IP space.
1010

1111
## Use managed identity
12-
However, if your requirements call for a secure way to send events using an encrypted channel and a known identity of the sender (in this case, Event Grid) using public IP space, you could deliver events to Event Hubs, Service Bus, or Azure Storage service using an Azure event grid custom topic or a domain with system-managed identity. For details about delivering events using managed identity, see [Event delivery using a managed identity](managed-service-identity.md).
12+
However, if your requirements call for a secure way to send events using an encrypted channel and a known identity of the sender (in this case, Event Grid) using public IP space, you could deliver events to Event Hubs, Service Bus, or Azure Storage service using an Azure Event Grid custom topic or a domain with system-assigned or user-assigned managed identity. For details about delivering events using managed identity, see [Event delivery using a managed identity](managed-service-identity.md).
1313

1414
Then, you can use a private link configured in Azure Functions or your webhook deployed on your virtual network to pull events. See the sample: [Connect to private endpoints with Azure Functions](/samples/azure-samples/azure-functions-private-endpoints/connect-to-private-endpoints-with-azure-functions/).
1515

@@ -22,25 +22,25 @@ Under this configuration, the secured traffic from Event Grid to Event Hubs, Ser
2222
## Deliver events to Event Hubs using managed identity
2323
To deliver events to event hubs in your Event Hubs namespace using managed identity, follow these steps:
2424

25-
1. Enable system-assigned identity: [system topics](enable-identity-system-topics.md), [custom topics, and domains](enable-identity-custom-topics-domains.md).
25+
1. Enable system-assigned or user-assigned managed identity: [system topics](enable-identity-system-topics.md), [custom topics, and domains](enable-identity-custom-topics-domains.md).
2626
1. [Add the identity to the **Azure Event Hubs Data Sender** role on the Event Hubs namespace](../event-hubs/authenticate-managed-identity.md#to-assign-azure-roles-using-the-azure-portal).
2727
1. [Enable the **Allow trusted Microsoft services to bypass this firewall** setting on your Event Hubs namespace](../event-hubs/event-hubs-service-endpoints.md#trusted-microsoft-services).
28-
1. [Configure the event subscription](managed-service-identity.md#create-event-subscriptions-that-use-an-identity) that uses an event hub as an endpoint to use the system-assigned identity.
28+
1. [Configure the event subscription](managed-service-identity.md#create-event-subscriptions-that-use-an-identity) that uses an event hub as an endpoint to use the system-assigned or user-assigned managed identity.
2929

3030
## Deliver events to Service Bus using managed identity
3131
To deliver events to Service Bus queues or topics in your Service Bus namespace using managed identity, follow these steps:
3232

33-
1. Enable system-assigned identity: [system topics](enable-identity-system-topics.md), [custom topics, and domains](enable-identity-custom-topics-domains.md).
33+
1. Enable system-assigned or user-assigned managed identity: [system topics](enable-identity-system-topics.md), [custom topics, and domains](enable-identity-custom-topics-domains.md).
3434
1. [Add the identity to the **Azure Service Bus Data Sender**](../service-bus-messaging/service-bus-managed-service-identity.md#azure-built-in-roles-for-azure-service-bus) role on the Service Bus namespace
3535
1. [Enable the **Allow trusted Microsoft services to bypass this firewall** setting on your Service Bus namespace](../service-bus-messaging/service-bus-service-endpoints.md#trusted-microsoft-services).
36-
1. [Configure the event subscription](managed-service-identity.md) that uses a Service Bus queue or topic as an endpoint to use the system-assigned identity.
36+
1. [Configure the event subscription](managed-service-identity.md) that uses a Service Bus queue or topic as an endpoint to use the system-assigned or user-assigned managed identity.
3737

3838
## Deliver events to Storage using managed identity
3939
To deliver events to Storage queues using managed identity, follow these steps:
4040

41-
1. Enable system-assigned identity: [system topics](enable-identity-system-topics.md), [custom topics, and domains](enable-identity-custom-topics-domains.md).
41+
1. Enable system-assigned or user-assigned managed identity: [system topics](enable-identity-system-topics.md), [custom topics, and domains](enable-identity-custom-topics-domains.md).
4242
1. [Add the identity to the **Storage Queue Data Message Sender**](../storage/blobs/assign-azure-role-data-access.md) role on Azure Storage queue.
43-
1. [Configure the event subscription](managed-service-identity.md#create-event-subscriptions-that-use-an-identity) that uses a Storage queue as an endpoint to use the system-assigned identity.
43+
1. [Configure the event subscription](managed-service-identity.md#create-event-subscriptions-that-use-an-identity) that uses a Storage queue as an endpoint to use the system-assigned or user-assigned managed identity.
4444

4545

4646
## Next steps

includes/event-grid-limits.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
author: spelluru
66
ms.service: event-grid
77
ms.topic: include
8-
ms.date: 03/24/2022
8+
ms.date: 09/07/2022
99
ms.author: spelluru
1010
ms.custom: include file
1111
---
@@ -23,7 +23,7 @@ The following limits apply to Azure Event Grid **topics** (system, custom, and
2323
| Event size | 1 MB<br/>This limit can't be increased. |
2424
| Number of incoming events per batch | 5,000<br/>This limit can't be increased. |
2525
| Private endpoint connections per topic | 64<br/>This limit can't be increased. |
26-
| IP Firewall rules per topic | 16 |
26+
| IP Firewall rules per topic | 128 |
2727

2828
The following limits apply to Azure Event Grid **domains**.
2929

@@ -35,6 +35,6 @@ The following limits apply to Azure Event Grid **domains**.
3535
| Publish rate for an event domain (ingress) | 5,000 events/sec or 5 MB/sec (whichever is met first) |
3636
| Event Domains per Azure Subscription | 100 |
3737
| Private endpoint connections per domain | 64 |
38-
| IP Firewall rules per domain | 16 |
38+
| IP Firewall rules per domain | 128 |
3939

4040

0 commit comments

Comments
 (0)