Skip to content

Commit 8eb6efb

Browse files
authored
Merge pull request #227711 from spelluru/sbusnetworking0216
Service Bus: Networking UI updates
2 parents 5b3d8d0 + 1a3ed5f commit 8eb6efb

11 files changed

+232
-147
lines changed

articles/event-hubs/event-hubs-ip-filtering.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,17 @@ You specify IP firewall rules at the Event Hubs namespace level. So, the rules a
2121

2222

2323
## Use Azure portal
24+
25+
When creating a namespace, you can either allow public only (from all networks) or private only (only via private endpoints) access to the namespace. Once the namespace is created, you can allow access from specific IP addresses or from specific virtual networks (using network service endpoints).
26+
27+
### Configure public access when creating a namespace
28+
To enable public access, select **Public access** on the **Networking** page of the namespace creation wizard.
29+
30+
:::image type="content" source="./media/event-hubs-firewall/create-namespace-public-access.png" alt-text="Screenshot showing the Networking page of the Create namespace wizard with Public access option selected.":::
31+
32+
After you create the namespace, select **Networking** on the left menu of the **Event Hubs Namespace** page. You see that **All Networks** option is selected. You can select **Selected Networks** option and allow access from specific IP addresses or specific virtual networks. The next section provides you details on configuring IP firewall to specify the IP addresses from which the access is allowed.
33+
34+
### Configure IP firewall for an existing namespace
2435
This section shows you how to use the Azure portal to create IP firewall rules for an Event Hubs namespace.
2536

2637
1. Navigate to your **Event Hubs namespace** in the [Azure portal](https://portal.azure.com).
@@ -147,6 +158,17 @@ To deploy the template, follow the instructions for [Azure Resource Manager][lnk
147158
> [!IMPORTANT]
148159
> If there are no IP and virtual network rules, all the traffic flows into the namespace even if you set the `defaultAction` to `deny`. The namespace can be accessed over the public internet (using the access key). Specify at least one IP rule or virtual network rule for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network.
149160
161+
## Use Azure CLI
162+
Use [`az eventhubs namespace network-rule`](/cli/azure/eventhubs/namespace/network-rule) add, list, update, and remove commands to manage IP firewall rules for an Event Hubs namespace.
163+
164+
## Use Azure PowerShell
165+
Use the following Azure PowerShell commands to add, list, remove, update, and delete IP firewall rules.
166+
167+
- [`Add-AzEventHubIPRule`](/powershell/module/az.eventhub/add-azeventhubiprule) to add an IP firewall rule.
168+
- [`New-AzEventHubIPRuleConfig`](/powershell/module/az.eventhub/new-azeventhubipruleconfig) and [`Set-AzEventHubNetworkRuleSet`](/powershell/module/az.eventhub/set-azeventhubnetworkruleset) together to add an IP firewall rule
169+
- [`Remove-AzEventHubIPRule`](/powershell/module/az.eventhub/remove-azeventhubiprule) to remove an IP firewall rule.
170+
171+
150172
## Default action and public network access
151173

152174
### REST API

articles/event-hubs/event-hubs-service-endpoints.md

Lines changed: 23 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,14 +35,24 @@ Binding an Event Hubs namespace to a virtual network is a two-step process. You
3535
The virtual network rule is an association of the Event Hubs namespace with a virtual network subnet. While the rule exists, all workloads bound to the subnet are granted access to the Event Hubs namespace. Event Hubs itself never establishes outbound connections, doesn't need to gain access, and is therefore never granted access to your subnet by enabling this rule.
3636

3737
## Use Azure portal
38+
When creating a namespace, you can either allow public only (from all networks) or private only (only via private endpoints) access to the namespace. Once the namespace is created, you can allow access from specific IP addresses or from specific virtual networks (using network service endpoints).
39+
40+
### Configure public access when creating a namespace
41+
To enable public access, select **Public access** on the **Networking** page of the namespace creation wizard.
42+
43+
:::image type="content" source="./media/event-hubs-firewall/create-namespace-public-access.png" alt-text="Screenshot showing the Networking page of the Create namespace wizard with Public access option selected.":::
44+
45+
After you create the namespace, select **Networking** on the left menu of the **Service Bus Namespace** page. You see that **All Networks** option is selected. You can select **Selected Networks** option and allow access from specific IP addresses or specific virtual networks. The next section provides you details on specifying the networks from which the access is allowed.
46+
47+
### Configure selected networks for an existing namespace
3848
This section shows you how to use Azure portal to add a virtual network service endpoint. To limit access, you need to integrate the virtual network service endpoint for this Event Hubs namespace.
3949

4050
1. Navigate to your **Event Hubs namespace** in the [Azure portal](https://portal.azure.com).
4151
4. Select **Networking** under **Settings** on the left menu.
4252
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Choose **Selected networks** option to allow access only from specific virtual networks.
4353

4454
Here are more details about options available in the **Public network access** page:
45-
- **Disabled**. This option disables any public access to the namespace. The namespace will be accessible only through [private endpoints](private-link-service.md).
55+
- **Disabled**. This option disables any public access to the namespace. The namespace is accessible only through [private endpoints](private-link-service.md).
4656
- **Selected networks**. This option enables public access to the namespace using an access key from selected networks.
4757

4858
> [!IMPORTANT]
@@ -55,7 +65,7 @@ This section shows you how to use Azure portal to add a virtual network service
5565

5666
> [!IMPORTANT]
5767
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
58-
3. Select the virtual network from the list of virtual networks, and then pick the **subnet**. You have to enable the service endpoint before adding the virtual network to the list. If the service endpoint isn't enabled, the portal will prompt you to enable it.
68+
3. Select the virtual network from the list of virtual networks, and then pick the **subnet**. You have to enable the service endpoint before adding the virtual network to the list. If the service endpoint isn't enabled, the portal prompts you to enable it.
5969

6070
:::image type="content" source="./media/event-hubs-tutorial-vnet-and-firewalls/select-subnet.png" lightbox="./media/event-hubs-tutorial-vnet-and-firewalls/select-subnet.png" alt-text="Image showing the selection of a subnet.":::
6171
4. You should see the following successful message after the service endpoint for the subnet is enabled for **Microsoft.EventHub**. Select **Add** at the bottom of the page to add the network.
@@ -187,6 +197,17 @@ To deploy the template, follow the instructions for [Azure Resource Manager][lnk
187197
> [!IMPORTANT]
188198
> If there are no IP and virtual network rules, all the traffic flows into the namespace even if you set the `defaultAction` to `deny`. The namespace can be accessed over the public internet (using the access key). Specify at least one IP rule or virtual network rule for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network.
189199
200+
## Use Azure CLI
201+
Use [`az eventhubs namespace network-rule`](/cli/azure/eventhubs/namespace/network-rule) add, list, update, and remove commands to manage virtual network rules for a Service Bus namespace.
202+
203+
## Use Azure PowerShell
204+
Use the following Azure PowerShell commands to add, list, remove, update, and delete network rules for a Service Bus namespace.
205+
206+
- [`Add-AzEventHubVirtualNetworkRule`](/powershell/module/az.eventhub/add-azeventhubvirtualnetworkrule) to add a virtual network rule.
207+
- [`New-AzEventHubVirtualNetworkRuleConfig`](/powershell/module/az.eventhub/new-azeventhubipruleconfig) and [`Set-AzEventHubNetworkRuleSet`](/powershell/module/az.eventhub/set-azeventhubnetworkruleset) together to add a virtual network rule.
208+
- [`Remove-AzEventHubVirtualNetworkRule`](/powershell/module/az.eventhub/remove-azeventhubvirtualnetworkrule) to remove s virtual network rule.
209+
210+
190211
## default action and public network access
191212

192213
### REST API
24.8 KB
Loading
44 KB
Loading

articles/event-hubs/private-link-service.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,15 @@ Your private endpoint and virtual network must be in the same region. When you s
3333

3434
Your private endpoint uses a private IP address in your virtual network.
3535

36-
### Steps
36+
### Configure private access when creating a namespace
37+
When creating a namespace, you can either allow public only (from all networks) or private only (only via private endpoints) access to the namespace.
38+
39+
If you select the **Private access** option on the **Networking** page of the namespace creation wizard, you can add a private endpoint on the page by selecting **+ Private endpoint** button. See the next section for the detailed steps for adding a private endpoint.
40+
41+
:::image type="content" source="./media/private-link-service/create-namespace-private-access.png" alt-text="Screenshot showing the Networking page of the Create namespace wizard with Private access option selected.":::
42+
43+
44+
### Configure private access for an existing namespace
3745
If you already have an Event Hubs namespace, you can create a private link connection by following these steps:
3846

3947
1. Sign in to the [Azure portal](https://portal.azure.com).
44.3 KB
Loading
25 KB
Loading
Loading

articles/service-bus-messaging/private-link-service.md

Lines changed: 19 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Integrate Azure Service Bus with Azure Private Link Service
33
description: Learn how to integrate Azure Service Bus with Azure Private Link Service
44
author: spelluru
55
ms.author: spelluru
6-
ms.date: 08/26/2022
6+
ms.date: 02/16/2023
77
ms.topic: article
88
ms.custom: devx-track-azurepowershell
99
---
@@ -29,7 +29,7 @@ For more information, see [What is Azure Private Link?](../private-link/private-
2929

3030
### Prerequisites
3131

32-
To integrate a Service Bus namespace with Azure Private Link, you'll need the following entities or permissions:
32+
To integrate a Service Bus namespace with Azure Private Link, you need the following entities or permissions:
3333

3434
- A Service Bus namespace.
3535
- An Azure virtual network.
@@ -38,7 +38,15 @@ To integrate a Service Bus namespace with Azure Private Link, you'll need the fo
3838

3939
Your private endpoint and virtual network must be in the same region. When you select a region for the private endpoint using the portal, it will automatically filter only virtual networks that are in that region. Your Service Bus namespace can be in a different region. And, Your private endpoint uses a private IP address in your virtual network.
4040

41-
### Steps
41+
### Configure private access when creating a namespace
42+
When creating a namespace, you can either allow public only (from all networks) or private only (only via private endpoints) access to the namespace.
43+
44+
If you select the **Private access** option on the **Networking** page of the namespace creation wizard, you can add a private endpoint on the page by selecting **+ Private endpoint** button. See the next section for the detailed steps for adding a private endpoint.
45+
46+
:::image type="content" source="./media/private-link-service/create-namespace-private-access.png" alt-text="Screenshot showing the Networking page of the Create namespace wizard with Private access option selected.":::
47+
48+
49+
### Configure private access for an existing namespace
4250

4351
If you already have an existing namespace, you can create a private endpoint by following these steps:
4452

@@ -50,18 +58,12 @@ If you already have an existing namespace, you can create a private endpoint by
5058
> [!NOTE]
5159
> You see the **Networking** tab only for **premium** namespaces.
5260
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Select **Disabled** if you want the namespace to be accessed only via private endpoints.
53-
- **Disabled**. This option disables any public access to the namespace. The namespace will be accessible only through [private endpoints](private-link-service.md).
54-
55-
:::image type="content" source="./media/service-bus-ip-filtering/public-access-disabled.png" alt-text="Networking page - public access tab - public network access is disabled.":::
61+
- **Disabled**. This option disables any public access to the namespace. The namespace is accessible only through [private endpoints](private-link-service.md).
5662
- **Selected networks**. This option enables public access to the namespace using an access key from selected networks.
5763

5864
> [!IMPORTANT]
59-
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
60-
61-
:::image type="content" source="./media/service-bus-ip-filtering/selected-networks.png" alt-text="Networking page with the selected networks option selected." lightbox="./media/service-bus-ip-filtering/selected-networks.png":::
62-
- **All networks** (default). This option enables public access from all networks using an access key. If you select the **All networks** option, the Service Bus namespace accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
63-
64-
:::image type="content" source="./media/service-bus-ip-filtering/firewall-all-networks-selected.png" alt-text="Screenshot of the Azure portal Networking page. The option to allow access from All networks is selected on the Firewalls and virtual networks tab.":::
65+
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
66+
- **All networks** (default). This option enables public access from all networks using an access key. If you select the **All networks** option, Service Bus accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
6567
5. To allow access to the namespace via private endpoints, select the **Private endpoint connections** tab at the top of the page
6668
6. Select the **+ Private Endpoint** button at the top of the page.
6769

@@ -71,7 +73,7 @@ If you already have an existing namespace, you can create a private endpoint by
7173
2. Select the **resource group** for the private endpoint resource.
7274
3. Enter a **name** for the private endpoint.
7375
1. Enter a **name for the network interface**.
74-
1. Select a **region** for the private endpoint. Your private endpoint must be in the same region as your virtual network, but can be in a different region from the private link resource that you are connecting to.
76+
1. Select a **region** for the private endpoint. Your private endpoint must be in the same region as your virtual network, but can be in a different region from the private link resource that you're connecting to.
7577
1. Select **Next: Resource >** button at the bottom of the page.
7678

7779
:::image type="content" source="./media/private-link-service/create-private-endpoint-basics-page.png" alt-text="Screenshot showing the Basics page of the Create private endpoint wizard.":::
@@ -94,7 +96,7 @@ If you already have an existing namespace, you can create a private endpoint by
9496
1. On the **Review + create**, review all the settings, and select **Create** to create the private endpoint.
9597

9698
:::image type="content" source="./media/private-link-service/create-private-endpoint-review-create-page.png" alt-text="Screenshot showing the Review and Create page of the Create private endpoint wizard.":::
97-
12. Confirm that the private endpoint is created. If you are the owner of the resource and had selected **Connect to an Azure resource in my directory** option for the **Connection method**, the endpoint connection should be **auto-approved**. If it's in the **pending** state, see the [Manage private endpoints using Azure portal](#manage-private-endpoints-using-azure-portal) section.
99+
12. Confirm that the private endpoint is created. If you're the owner of the resource and had selected **Connect to an Azure resource in my directory** option for the **Connection method**, the endpoint connection should be **auto-approved**. If it's in the **pending** state, see the [Manage private endpoints using Azure portal](#manage-private-endpoints-using-azure-portal) section.
98100

99101
![Private endpoint created](./media/private-link-service/private-endpoint-created.png)
100102

@@ -188,7 +190,7 @@ There are four provisioning states:
188190

189191
### Approve a private endpoint connection
190192

191-
1. If there are any connections that are pending, you will see a connection listed with **Pending** in the provisioning state.
193+
1. If there are any connections that are pending, you'll see a connection listed with **Pending** in the provisioning state.
192194
2. Select the **private endpoint** you wish to approve
193195
3. Select the **Approve** button.
194196

@@ -202,7 +204,7 @@ There are four provisioning states:
202204

203205
### Reject a private endpoint connection
204206

205-
1. If there are any private endpoint connections you want to reject, whether it is a pending request or existing connection that was approved earlier, select the endpoint connection and click the **Reject** button.
207+
1. If there are any private endpoint connections you want to reject, whether it's a pending request or existing connection that was approved earlier, select the endpoint connection and select the **Reject** button.
206208

207209
![Reject button](./media/private-link-service/private-endpoint-reject.png)
208210
2. On the **Reject connection** page, enter an optional comment, and select **Yes**. If you select **No**, nothing happens.
@@ -221,7 +223,7 @@ There are four provisioning states:
221223
2. On the **Delete connection** page, select **Yes** to confirm the deletion of the private endpoint. If you select **No**, nothing happens.
222224

223225
![Delete connection page](./media/private-link-service/delete-connection-page.png)
224-
3. You should see the status changed to **Disconnected**. Then, the endpoint will disappear from the list.
226+
3. You should see the status changed to **Disconnected**. Then, the endpoint disappears from the list.
225227

226228
## Validate that the private link connection works
227229

0 commit comments

Comments
 (0)