You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-infrastructure-as-code.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2016,7 +2016,7 @@ You might also need to use these settings when your function app has network res
2016
2016
::: zone pivot="flex-consumption-plan,premium-plan,dedicated-plan"
2017
2017
### Considerations for network restrictions
2018
2018
2019
-
When you're restricting access to the storage account through the private endpoints, you aren't able to access the storage account through the portal or any device outside the virtual network. You can give access to your secured IP address or virtual network in the storage account by [Managing the default network access rule](../storage/common/storage-network-security.md#change-the-default-network-access-rule).
2019
+
When you're restricting access to the storage account through the private endpoints, you aren't able to access the storage account through the portal or any device outside the virtual network. You can give access to your secured IP address or virtual network in the storage account by [Managing the default network access rule](../storage/common/storage-network-security-set-default-access.md).
Copy file name to clipboardExpand all lines: articles/remote-rendering/how-tos/create-an-account.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,7 +74,7 @@ The value for **`arrAccountKey`** can either be primary or secondary key.
74
74
75
75
This paragraph explains how to link storage accounts to your Remote Rendering account. With a linked account, it isn't necessary anymore to generate a SAS URI every time you want to interact with the data in your account. Instead, you can use the storage account names directly as described in the [loading a model section](../concepts/models.md#loading-models).
76
76
77
-
Another advantage of this approach is that the storage access level can be limited to private endpoints as described in the [Azure documentation how to configure Storage firewalls and virtual networks](../../storage/common/storage-network-security.md#change-the-default-network-access-rule). Loading from blob storage through a SAS token on the other hand only works if the blob storage has been configured with the "Enabled from all networks" option.
77
+
Another advantage of this approach is that the storage access level can be limited to private endpoints as described in the [Azure documentation how to configure Storage firewalls and virtual networks](../../storage/common/storage-network-security-set-default-access.md). Loading from blob storage through a SAS token on the other hand only works if the blob storage has been configured with the "Enabled from all networks" option.
78
78
79
79
The steps in this paragraph have to be performed for each storage account that should use this access method. If you haven't created storage accounts yet, you can walk through the respective step in the [convert a model for rendering quickstart](../quickstarts/convert-model.md#storage-account-creation).
Copy file name to clipboardExpand all lines: articles/remote-rendering/resources/troubleshoot.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ Sometimes during [linking of a storage account](../how-tos/create-an-account.md#
26
26
27
27
## Cannot load model through a SAS token
28
28
29
-
If the client application fails to load a model from storage through a valid SAS-token, it might be caused by the [public network access level](../../storage/common/storage-network-security.md#change-the-default-network-access-rule) configured on the blob storage. Loading an ARR model from SAS token only works if it has been configured with the "Enabled from all networks" option:
29
+
If the client application fails to load a model from storage through a valid SAS-token, it might be caused by the [public network access level](../../storage/common/storage-network-security-set-default-access.md) configured on the blob storage. Loading an ARR model from SAS token only works if it has been configured with the "Enabled from all networks" option:
30
30

31
31
32
32
If limiting to private endpoints is a requirement, the [storage account must be linked](../how-tos/create-an-account.md#link-storage-accounts) and the model must be loaded through the non-SAS code path as [described here](../tutorials/unity/security/security.md#securing-your-content-in-azure-blob-storage).
Copy file name to clipboardExpand all lines: articles/storage/common/storage-network-security.md
+16-12Lines changed: 16 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,31 +19,35 @@ When you disable public network access to your storage account, all incoming req
19
19
> Clients from allowed sources must also meet the authorization requirements of the storage account to access the data. See [Authorization](storage-network-security-overview.md).
You can enable traffic from specific subnets in one or more virtual networks. These virtual networks can come from any subscription, in any Microsoft Entra tenant and from any Azure region. To enable traffic, you create a *virtual network rule*. Each storage account supports up to **400** virtual network rules. You can combine these rules with [IP network rules](storage-network-security-ip-address-range.md).
26
+
You can enable traffic from specific subnets in one or more virtual networks. These virtual networks can come from any subscription, in any Microsoft Entra tenant and from any Azure region. To enable traffic, you create a *virtual network rule* for each subnet. Each storage account supports up to **400** virtual network rules. You can combine these rules with [IP network rules](storage-network-security-ip-address-range.md).
26
27
27
-
To enable traffic from a virtual network, you must enable a Virtual Network *service endpoint* for Azure Storage in the virtual network settings. Service endpoints provides secure and direct connectivity to Azure services over an optimized route over the Azure backbone network. These endpoints enable private IP addresses in the virtual network to reach the endpoint of an Azure service without needing a public IP address on the virtual network. The identities of the subnet and the virtual network are also transmitted with each request. To learn more, see [Virtual Network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
28
+
To enable traffic from a virtual network, you must enable a Virtual Network *service endpoint* for Azure Storage in the virtual network settings. To learn more about service endpoints, see [Virtual Network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
28
29
29
-
### Azure Storage service endpoint
30
+
The following table describes each type of service endpoint that you can enable for Azure Storage:
30
31
31
-
The Azure Storage service endpoint *(Microsoft.Storage)* is designed to enable communication between a virtual network and storage accounts that are located in the **same region**.
32
+
| Service endpoint | Resource name | Description |
33
+
|---|---|--|
34
+
| Azure Storage endpoint | Microsoft.Storage | Allows traffic from a virtual network that is located in the **same region** as the storage account. |
35
+
| Azure Storage cross-region service endpoint | Microsoft.Storage.Global | Allows traffic from a virtual network that is located in **any region**. |
To learn how to configure a virtual network rule and enable service endpoints, see [Configure Azure Storage to accept requests from virtual networks](storage-network-security-virtual-networks.md).
34
38
35
-
### Azure Storagecross-region service endpoint
39
+
Local and cross-region service endpoints can't coexist on the same subnet. To replace existing service endpoints with cross-region ones, delete the existing `Microsoft.Storage` endpoints and re-create them as cross-region endpoints (`Microsoft.Storage.Global`).
36
40
37
-
The Azure Storage cross-region service endpoint *(Microsoft.Storage.Global)* is designed to enable communication between a virtual network and storage accounts that are located in the **any region**.
Configuring service endpoints between virtual networks and service instances in a [paired region](../../best-practices-availability-paired-regions.md) can be an important part of your disaster recovery plan. Service endpoints allow continuity during a regional failover and access to read-only geo-redundant storage (RA-GRS) instances. Network rules that grant access from a virtual network to a storage account also grant access to any RA-GRS instance.
44
+
### Paired regions
40
45
41
-
When you're planning for disaster recovery during a regional outage, create the virtual networks in the paired region in advance. Enable service endpoints for Azure Storage, with network rules granting access from these alternative virtual networks. Then apply these rules to your geo-redundant storage accounts.
46
+
By default, service endpoints work between virtual networks and service instances in the same Azure region. When using service endpoints with Azure Storage, service endpoints also work between virtual networks and service instances in a [paired region](../../best-practices-availability-paired-regions.md).
42
47
43
-
Local and cross-region service endpoints can't coexist on the same subnet. To replace existing service endpoints with cross-region ones, delete the existing `Microsoft.Storage`endpoints and re-create them as cross-region endpoints (`Microsoft.Storage.Global`).
48
+
Configuring service endpoints between virtual networks and service instances in a [paired region](../../best-practices-availability-paired-regions.md) can be an important part of your disaster recovery plan. Service endpoints allow continuity during a regional failover and access to read-only geo-redundant storage (RA-GRS) instances. Network rules that grant access from a virtual network to a storage account also grant access to any RA-GRS instance.
When you're planning for disaster recovery during a regional outage, create the virtual networks in the paired region in advance. Enable service endpoints for Azure Storage, with network rules granting access from these alternative virtual networks. Then apply these rules to your geo-redundant storage accounts.
Copy file name to clipboardExpand all lines: articles/storage/common/storage-private-endpoints.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,7 @@ Storage account owners can manage consent requests and the private endpoints thr
44
44
> [!TIP]
45
45
> If you want to restrict access to your storage account through the private endpoint only, configure the storage firewall to deny or control access through the public endpoint.
46
46
47
-
You can secure your storage account to only accept connections from your VNet by [configuring the storage firewall](storage-network-security.md#change-the-default-network-access-rule) to deny access through its public endpoint by default. You don't need a firewall rule to allow traffic from a VNet that has a private endpoint, since the storage firewall only controls access through the public endpoint. Private endpoints instead rely on the consent flow for granting subnets access to the storage service.
47
+
You can secure your storage account to only accept connections from your VNet by [configuring the storage firewall](storage-network-security-set-default-access.md) to deny access through its public endpoint by default. You don't need a firewall rule to allow traffic from a VNet that has a private endpoint, since the storage firewall only controls access through the public endpoint. Private endpoints instead rely on the consent flow for granting subnets access to the storage service.
48
48
49
49
> [!NOTE]
50
50
> When copying blobs between storage accounts, your client must have network access to both accounts. So if you choose to use a private link for only one account (either the source or the destination), make sure that your client has network access to the other account. To learn about other ways to configure network access, see [Configure Azure Storage firewalls and virtual networks](storage-network-security.md?toc=/azure/storage/blobs/toc.json).
0 commit comments