Skip to content

Commit 6832563

Browse files
committed
storage global service endpoints ga
1 parent ac43744 commit 6832563

File tree

2 files changed

+10
-87
lines changed

2 files changed

+10
-87
lines changed

articles/storage/common/storage-network-security.md

Lines changed: 7 additions & 84 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: storage
55
author: jimmart-dev
66
ms.service: storage
77
ms.topic: how-to
8-
ms.date: 10/04/2022
8+
ms.date: 04/08/2023
99
ms.author: jammart
1010
ms.reviewer: santoshc
1111
ms.subservice: common
@@ -145,99 +145,24 @@ Storage account and the virtual networks granted access may be in different subs
145145
146146
### Available virtual network regions
147147
148-
By default, service endpoints work between virtual networks and service instances in the same Azure region. When using service endpoints with Azure Storage, service endpoints also work between virtual networks and service instances in a [paired region](../../best-practices-availability-paired-regions.md). If you want to use a service endpoint to grant access to virtual networks in other regions, you must register the `AllowGlobalTagsForStorage` feature in the subscription of the virtual network. This capability is currently in public preview.
148+
Service endpoints for Azure Storage work between virtual networks and service instances in any region.
149149
150-
Service endpoints allow continuity during a regional failover and access to read-only geo-redundant storage (RA-GRS) instances. Network rules that grant access from a virtual network to a storage account also grant access to any RA-GRS instance.
150+
Configuring service endpoints between virtual networks and service instances in a [paired region](../../best-practices-availability-paired-regions.md) can be an important part of your disaster recovery plan. Service endpoints allow continuity during a regional failover and access to read-only geo-redundant storage (RA-GRS) instances. Network rules that grant access from a virtual network to a storage account also grant access to any RA-GRS instance.
151151
152152
When planning for disaster recovery during a regional outage, you should create the VNets in the paired region in advance. Enable service endpoints for Azure Storage, with network rules granting access from these alternative virtual networks. Then apply these rules to your geo-redundant storage accounts.
153153
154-
### Enabling access to virtual networks in other regions (preview)
154+
#### About global service endpoints for Azure Storage
155155
156-
>
157-
> [!IMPORTANT]
158-
> This capability is currently in PREVIEW.
159-
>
160-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
161-
162-
To enable access from a virtual network that is located in another region over service endpoints, register the `AllowGlobalTagsForStorage` feature in the subscription of the virtual network. All the subnets in the subscription that has the _AllowedGlobalTagsForStorage_ feature enabled will no longer use a public IP address to communicate with any storage account. Instead, all the traffic from these subnets to storage accounts will use a private IP address as a source IP. As a result, any storage accounts that use IP network rules to permit traffic from those subnets will no longer have an effect.
163-
164-
> [!NOTE]
165-
> For updating the existing service endpoints to access a storage account in another region, perform an [update subnet](/cli/azure/network/vnet/subnet#az-network-vnet-subnet-update&preserve-view=true) operation on the subnet after registering the subscription with the `AllowGlobalTagsForStorage` feature. Similarly, to go back to the old configuration, perform an [update subnet](/cli/azure/network/vnet/subnet#az-network-vnet-subnet-update&preserve-view=true) operation after deregistering the subscription with the `AllowGlobalTagsForStorage` feature.
166-
167-
168-
#### [Portal](#tab/azure-portal)
169-
170-
During the preview you must use either PowerShell or the Azure CLI to enable this feature.
171-
172-
#### [PowerShell](#tab/azure-powershell)
173-
174-
1. Open a Windows PowerShell command window.
175-
176-
1. Sign in to your Azure subscription with the `Connect-AzAccount` command and follow the on-screen directions.
177-
178-
```powershell
179-
Connect-AzAccount
180-
```
181-
182-
2. If your identity is associated with more than one subscription, then set your active subscription to the subscription of the virtual network.
183-
184-
```powershell
185-
$context = Get-AzSubscription -SubscriptionId <subscription-id>
186-
Set-AzContext $context
187-
```
188-
189-
Replace the `<subscription-id>` placeholder value with the ID of your subscription.
156+
Global service endpoints for Azure became generally available in April of 2023. With global service endpoints, subnets_will no longer use a public IP address to communicate with any storage account. Instead, all the traffic from subnets to storage accounts will use a private IP address as a source IP. As a result, any storage accounts that use IP network rules to permit traffic from those subnets will no longer have an effect.
190157
191-
3. Register the `AllowGlobalTagsForStorage` feature by using the [Register-AzProviderFeature](/powershell/module/az.resources/register-azproviderfeature) command.
192-
193-
```powershell
194-
Register-AzProviderFeature -ProviderNamespace Microsoft.Network -FeatureName AllowGlobalTagsForStorage
195-
```
196-
197-
> [!NOTE]
198-
> The registration process might not complete immediately. Make sure to verify that the feature is registered before using it.
199-
200-
4. To verify that the registration is complete, use the [Get-AzProviderFeature](/powershell/module/az.resources/get-azproviderfeature) command.
201-
202-
```powershell
203-
Get-AzProviderFeature -ProviderNamespace Microsoft.Network -FeatureName AllowGlobalTagsForStorage
204-
```
205-
206-
#### [Azure CLI](#tab/azure-cli)
207-
208-
1. Open the [Azure Cloud Shell](../../cloud-shell/overview.md), or if you've [installed](/cli/azure/install-azure-cli) the Azure CLI locally, open a command console application such as Windows PowerShell.
209-
210-
2. If your identity is associated with more than one subscription, then set your active subscription to subscription of the virtual network.
211-
212-
```azurecli-interactive
213-
az account set --subscription <subscription-id>
214-
```
215-
216-
Replace the `<subscription-id>` placeholder value with the ID of your subscription.
217-
218-
3. Register the `AllowGlobalTagsForStorage` feature by using the [az feature register](/cli/azure/feature#az-feature-register) command.
219-
220-
```azurecli
221-
az feature register --namespace Microsoft.Network --name AllowGlobalTagsForStorage
222-
```
223-
224-
> [!NOTE]
225-
> The registration process might not complete immediately. Make sure to verify that the feature is registered before using it.
226-
227-
4. To verify that the registration is complete, use the [az feature](/cli/azure/feature#az-feature-show) command.
228-
229-
```azurecli
230-
az feature show --namespace Microsoft.Network --name AllowGlobalTagsForStorage
231-
```
232-
233-
---
158+
To use global service endpoints, it might be necessary to delete existing **Microsoft.Storage** endpoints and recreate them as global ones (**Microsoft.Storage.Global**).
234159
235160
### Managing virtual network rules
236161
237162
You can manage virtual network rules for storage accounts through the Azure portal, PowerShell, or CLIv2.
238163
239164
> [!NOTE]
240-
> If you registered the `AllowGlobalTagsForStorage` feature, and you want to enable access to your storage account from a virtual network/subnet in another Azure AD tenant, or in a region other than the region of the storage account or its paired region, then you must use PowerShell or the Azure CLI. The Azure portal does not show subnets in other Azure AD tenants or in regions other than the region of the storage account or its paired region, and hence cannot be used to configure access rules for virtual networks in other regions.
165+
> If you want to enable access to your storage account from a virtual network/subnet in another Azure AD tenant, you must use PowerShell or the Azure CLI. The Azure portal does not show subnets in other Azure AD tenants.
241166
242167
#### [Portal](#tab/azure-portal)
243168
@@ -253,8 +178,6 @@ You can manage virtual network rules for storage accounts through the Azure port
253178
> If a service endpoint for Azure Storage wasn't previously configured for the selected virtual network and subnets, you can configure it as part of this operation.
254179
>
255180
> Presently, only virtual networks belonging to the same Azure Active Directory tenant are shown for selection during rule creation. To grant access to a subnet in a virtual network belonging to another tenant, please use , PowerShell, CLI or REST APIs.
256-
>
257-
> Even if you registered the `AllowGlobalTagsForStorageOnly` feature, subnets in regions other than the region of the storage account or its paired region aren't shown for selection. If you want to enable access to your storage account from a virtual network/subnet in a different region, use the instructions in the PowerShell or Azure CLI tabs.
258181
259182
5. To remove a virtual network or subnet rule, select **...** to open the context menu for the virtual network or subnet, and select **Remove**.
260183

articles/virtual-network/virtual-network-service-endpoints-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: asudbring
77
ms.service: virtual-network
88
ms.topic: conceptual
99
ms.workload: infrastructure-services
10-
ms.date: 10/20/2022
10+
ms.date: 04/08/2023
1111
ms.author: allensu
1212
ms.custom:
1313
---
@@ -57,7 +57,7 @@ Service endpoints provide the following benefits:
5757

5858
- The feature is available only to virtual networks deployed through the Azure Resource Manager deployment model.
5959
- Endpoints are enabled on subnets configured in Azure virtual networks. Endpoints can't be used for traffic from your on-premise services to Azure services. For more information, see [Secure Azure service access from on-premises](#secure-azure-services-to-virtual-networks)
60-
- For Azure SQL, a service endpoint applies only to Azure service traffic within a virtual network's region. For Azure Storage, you can [enable access to virtual networks in other regions](../storage/common/storage-network-security.md?tabs=azure-portal) in preview.
60+
- For Azure SQL, a service endpoint applies only to Azure service traffic within a virtual network's region.
6161
- For Azure Data Lake Storage (ADLS) Gen 1, the VNet Integration capability is only available for virtual networks within the same region. Also note that virtual network integration for ADLS Gen1 uses the virtual network service endpoint security between your virtual network and Azure Active Directory (Azure AD) to generate extra security claims in the access token. These claims are then used to authenticate your virtual network to your Data Lake Storage Gen1 account and allow access. The *Microsoft.AzureActiveDirectory* tag listed under services supporting service endpoints is used only for supporting service endpoints to ADLS Gen 1. Azure AD doesn't support service endpoints natively. For more information about Azure Data Lake Store Gen 1 VNet integration, see [Network security in Azure Data Lake Storage Gen1](../data-lake-store/data-lake-store-network-security.md?toc=%2fazure%2fvirtual-network%2ftoc.json).
6262

6363
## Secure Azure services to virtual networks
@@ -80,7 +80,7 @@ Service endpoints provide the following benefits:
8080

8181
- Configure service endpoints on a subnet in a virtual network. Endpoints work with any type of compute instances running within that subnet.
8282
- You can configure multiple service endpoints for all supported Azure services (Azure Storage or Azure SQL Database, for example) on a subnet.
83-
- For Azure SQL Database, virtual networks must be in the same region as the Azure service resource. For Azure Storage, you can [enable access to virtual networks in other regions](../storage/common/storage-network-security.md?tabs=azure-portal) in preview. For all other services, you can secure Azure service resources to virtual networks in any region.
83+
- For Azure SQL Database, virtual networks must be in the same region as the Azure service resource. For all other services, you can secure Azure service resources to virtual networks in any region.
8484
- The virtual network where the endpoint is configured can be in the same or different subscription than the Azure service resource. For more information on permissions required for setting up endpoints and securing Azure services, see [Provisioning](#provisioning).
8585
- For supported services, you can secure new or existing resources to virtual networks using service endpoints.
8686

0 commit comments

Comments
 (0)