You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/event-hubs/event-hubs-ip-filtering.md
+22Lines changed: 22 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,17 @@ You specify IP firewall rules at the Event Hubs namespace level. So, the rules a
21
21
22
22
23
23
## Use Azure portal
24
+
25
+
When creating a namespace, you can either allow public only (from all networks) or private only (only via private endpoints) access to the namespace. Once the namespace is created, you can allow access from specific IP addresses or from specific virtual networks (using network service endpoints).
26
+
27
+
### Configure public access when creating a namespace
28
+
To enable public access, select **Public access** on the **Networking** page of the namespace creation wizard.
29
+
30
+
:::image type="content" source="./media/event-hubs-firewall/create-namespace-public-access.png" alt-text="Screenshot showing the Networking page of the Create namespace wizard with Public access option selected.":::
31
+
32
+
After you create the namespace, select **Networking** on the left menu of the **Event Hubs Namespace** page. You see that **All Networks** option is selected. You can select **Selected Networks** option and allow access from specific IP addresses or specific virtual networks. The next section provides you details on configuring IP firewall to specify the IP addresses from which the access is allowed.
33
+
34
+
### Configure IP firewall for an existing namespace
24
35
This section shows you how to use the Azure portal to create IP firewall rules for an Event Hubs namespace.
25
36
26
37
1. Navigate to your **Event Hubs namespace** in the [Azure portal](https://portal.azure.com).
@@ -147,6 +158,17 @@ To deploy the template, follow the instructions for [Azure Resource Manager][lnk
147
158
> [!IMPORTANT]
148
159
> If there are no IP and virtual network rules, all the traffic flows into the namespace even if you set the `defaultAction` to `deny`. The namespace can be accessed over the public internet (using the access key). Specify at least one IP rule or virtual network rule for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network.
149
160
161
+
## Use Azure CLI
162
+
Use [`az eventhubs namespace network-rule`](/cli/azure/eventhubs/namespace/network-rule) add, list, update, and remove commands to manage IP firewall rules for an Event Hubs namespace.
163
+
164
+
## Use Azure PowerShell
165
+
Use the following Azure PowerShell commands to add, list, remove, update, and delete IP firewall rules.
166
+
167
+
-[`Add-AzEventHubIPRule`](/powershell/module/az.eventhub/add-azeventhubiprule) to add an IP firewall rule.
168
+
-[`New-AzEventHubIPRuleConfig`](/powershell/module/az.eventhub/new-azeventhubipruleconfig) and [`Set-AzEventHubNetworkRuleSet`](/powershell/module/az.eventhub/set-azeventhubnetworkruleset) together to add an IP firewall rule
169
+
-[`Remove-AzEventHubIPRule`](/powershell/module/az.eventhub/remove-azeventhubiprule) to remove an IP firewall rule.
Copy file name to clipboardExpand all lines: articles/event-hubs/event-hubs-service-endpoints.md
+23-2Lines changed: 23 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,14 +35,24 @@ Binding an Event Hubs namespace to a virtual network is a two-step process. You
35
35
The virtual network rule is an association of the Event Hubs namespace with a virtual network subnet. While the rule exists, all workloads bound to the subnet are granted access to the Event Hubs namespace. Event Hubs itself never establishes outbound connections, doesn't need to gain access, and is therefore never granted access to your subnet by enabling this rule.
36
36
37
37
## Use Azure portal
38
+
When creating a namespace, you can either allow public only (from all networks) or private only (only via private endpoints) access to the namespace. Once the namespace is created, you can allow access from specific IP addresses or from specific virtual networks (using network service endpoints).
39
+
40
+
### Configure public access when creating a namespace
41
+
To enable public access, select **Public access** on the **Networking** page of the namespace creation wizard.
42
+
43
+
:::image type="content" source="./media/event-hubs-firewall/create-namespace-public-access.png" alt-text="Screenshot showing the Networking page of the Create namespace wizard with Public access option selected.":::
44
+
45
+
After you create the namespace, select **Networking** on the left menu of the **Service Bus Namespace** page. You see that **All Networks** option is selected. You can select **Selected Networks** option and allow access from specific IP addresses or specific virtual networks. The next section provides you details on specifying the networks from which the access is allowed.
46
+
47
+
### Configure selected networks for an existing namespace
38
48
This section shows you how to use Azure portal to add a virtual network service endpoint. To limit access, you need to integrate the virtual network service endpoint for this Event Hubs namespace.
39
49
40
50
1. Navigate to your **Event Hubs namespace** in the [Azure portal](https://portal.azure.com).
41
51
4. Select **Networking** under **Settings** on the left menu.
42
52
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Choose **Selected networks** option to allow access only from specific virtual networks.
43
53
44
54
Here are more details about options available in the **Public network access** page:
45
-
-**Disabled**. This option disables any public access to the namespace. The namespace will be accessible only through [private endpoints](private-link-service.md).
55
+
-**Disabled**. This option disables any public access to the namespace. The namespace is accessible only through [private endpoints](private-link-service.md).
46
56
-**Selected networks**. This option enables public access to the namespace using an access key from selected networks.
47
57
48
58
> [!IMPORTANT]
@@ -55,7 +65,7 @@ This section shows you how to use Azure portal to add a virtual network service
55
65
56
66
> [!IMPORTANT]
57
67
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
58
-
3. Select the virtual network from the list of virtual networks, and then pick the **subnet**. You have to enable the service endpoint before adding the virtual network to the list. If the service endpoint isn't enabled, the portal will prompt you to enable it.
68
+
3. Select the virtual network from the list of virtual networks, and then pick the **subnet**. You have to enable the service endpoint before adding the virtual network to the list. If the service endpoint isn't enabled, the portal prompts you to enable it.
59
69
60
70
:::image type="content" source="./media/event-hubs-tutorial-vnet-and-firewalls/select-subnet.png" lightbox="./media/event-hubs-tutorial-vnet-and-firewalls/select-subnet.png" alt-text="Image showing the selection of a subnet.":::
61
71
4. You should see the following successful message after the service endpoint for the subnet is enabled for **Microsoft.EventHub**. Select **Add** at the bottom of the page to add the network.
@@ -187,6 +197,17 @@ To deploy the template, follow the instructions for [Azure Resource Manager][lnk
187
197
> [!IMPORTANT]
188
198
> If there are no IP and virtual network rules, all the traffic flows into the namespace even if you set the `defaultAction` to `deny`. The namespace can be accessed over the public internet (using the access key). Specify at least one IP rule or virtual network rule for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network.
189
199
200
+
## Use Azure CLI
201
+
Use [`az eventhubs namespace network-rule`](/cli/azure/eventhubs/namespace/network-rule) add, list, update, and remove commands to manage virtual network rules for a Service Bus namespace.
202
+
203
+
## Use Azure PowerShell
204
+
Use the following Azure PowerShell commands to add, list, remove, update, and delete network rules for a Service Bus namespace.
205
+
206
+
-[`Add-AzEventHubVirtualNetworkRule`](/powershell/module/az.eventhub/add-azeventhubvirtualnetworkrule) to add a virtual network rule.
207
+
-[`New-AzEventHubVirtualNetworkRuleConfig`](/powershell/module/az.eventhub/new-azeventhubipruleconfig) and [`Set-AzEventHubNetworkRuleSet`](/powershell/module/az.eventhub/set-azeventhubnetworkruleset) together to add a virtual network rule.
208
+
-[`Remove-AzEventHubVirtualNetworkRule`](/powershell/module/az.eventhub/remove-azeventhubvirtualnetworkrule) to remove s virtual network rule.
Copy file name to clipboardExpand all lines: articles/event-hubs/private-link-service.md
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,15 @@ Your private endpoint and virtual network must be in the same region. When you s
33
33
34
34
Your private endpoint uses a private IP address in your virtual network.
35
35
36
-
### Steps
36
+
### Configure private access when creating a namespace
37
+
When creating a namespace, you can either allow public only (from all networks) or private only (only via private endpoints) access to the namespace.
38
+
39
+
If you select the **Private access** option on the **Networking** page of the namespace creation wizard, you can add a private endpoint on the page by selecting **+ Private endpoint** button. See the next section for the detailed steps for adding a private endpoint.
40
+
41
+
:::image type="content" source="./media/private-link-service/create-namespace-private-access.png" alt-text="Screenshot showing the Networking page of the Create namespace wizard with Private access option selected.":::
42
+
43
+
44
+
### Configure private access for an existing namespace
37
45
If you already have an Event Hubs namespace, you can create a private link connection by following these steps:
38
46
39
47
1. Sign in to the [Azure portal](https://portal.azure.com).
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/private-link-service.md
+19-17Lines changed: 19 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Integrate Azure Service Bus with Azure Private Link Service
3
3
description: Learn how to integrate Azure Service Bus with Azure Private Link Service
4
4
author: spelluru
5
5
ms.author: spelluru
6
-
ms.date: 08/26/2022
6
+
ms.date: 02/16/2023
7
7
ms.topic: article
8
8
ms.custom: devx-track-azurepowershell
9
9
---
@@ -29,7 +29,7 @@ For more information, see [What is Azure Private Link?](../private-link/private-
29
29
30
30
### Prerequisites
31
31
32
-
To integrate a Service Bus namespace with Azure Private Link, you'll need the following entities or permissions:
32
+
To integrate a Service Bus namespace with Azure Private Link, you need the following entities or permissions:
33
33
34
34
- A Service Bus namespace.
35
35
- An Azure virtual network.
@@ -38,7 +38,15 @@ To integrate a Service Bus namespace with Azure Private Link, you'll need the fo
38
38
39
39
Your private endpoint and virtual network must be in the same region. When you select a region for the private endpoint using the portal, it will automatically filter only virtual networks that are in that region. Your Service Bus namespace can be in a different region. And, Your private endpoint uses a private IP address in your virtual network.
40
40
41
-
### Steps
41
+
### Configure private access when creating a namespace
42
+
When creating a namespace, you can either allow public only (from all networks) or private only (only via private endpoints) access to the namespace.
43
+
44
+
If you select the **Private access** option on the **Networking** page of the namespace creation wizard, you can add a private endpoint on the page by selecting **+ Private endpoint** button. See the next section for the detailed steps for adding a private endpoint.
45
+
46
+
:::image type="content" source="./media/private-link-service/create-namespace-private-access.png" alt-text="Screenshot showing the Networking page of the Create namespace wizard with Private access option selected.":::
47
+
48
+
49
+
### Configure private access for an existing namespace
42
50
43
51
If you already have an existing namespace, you can create a private endpoint by following these steps:
44
52
@@ -50,18 +58,12 @@ If you already have an existing namespace, you can create a private endpoint by
50
58
> [!NOTE]
51
59
> You see the **Networking** tab only for **premium** namespaces.
52
60
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Select **Disabled** if you want the namespace to be accessed only via private endpoints.
53
-
-**Disabled**. This option disables any public access to the namespace. The namespace will be accessible only through [private endpoints](private-link-service.md).
54
-
55
-
:::image type="content" source="./media/service-bus-ip-filtering/public-access-disabled.png" alt-text="Networking page - public access tab - public network access is disabled.":::
61
+
-**Disabled**. This option disables any public access to the namespace. The namespace is accessible only through [private endpoints](private-link-service.md).
56
62
-**Selected networks**. This option enables public access to the namespace using an access key from selected networks.
57
63
58
64
> [!IMPORTANT]
59
-
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
60
-
61
-
:::image type="content" source="./media/service-bus-ip-filtering/selected-networks.png" alt-text="Networking page with the selected networks option selected." lightbox="./media/service-bus-ip-filtering/selected-networks.png":::
62
-
-**All networks** (default). This option enables public access from all networks using an access key. If you select the **All networks** option, the Service Bus namespace accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
63
-
64
-
:::image type="content" source="./media/service-bus-ip-filtering/firewall-all-networks-selected.png" alt-text="Screenshot of the Azure portal Networking page. The option to allow access from All networks is selected on the Firewalls and virtual networks tab.":::
65
+
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
66
+
-**All networks** (default). This option enables public access from all networks using an access key. If you select the **All networks** option, Service Bus accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
65
67
5. To allow access to the namespace via private endpoints, select the **Private endpoint connections** tab at the top of the page
66
68
6. Select the **+ Private Endpoint** button at the top of the page.
67
69
@@ -71,7 +73,7 @@ If you already have an existing namespace, you can create a private endpoint by
71
73
2. Select the **resource group** for the private endpoint resource.
72
74
3. Enter a **name** for the private endpoint.
73
75
1. Enter a **name for the network interface**.
74
-
1. Select a **region** for the private endpoint. Your private endpoint must be in the same region as your virtual network, but can be in a different region from the private link resource that you are connecting to.
76
+
1. Select a **region** for the private endpoint. Your private endpoint must be in the same region as your virtual network, but can be in a different region from the private link resource that you're connecting to.
75
77
1. Select **Next: Resource >** button at the bottom of the page.
76
78
77
79
:::image type="content" source="./media/private-link-service/create-private-endpoint-basics-page.png" alt-text="Screenshot showing the Basics page of the Create private endpoint wizard.":::
@@ -94,7 +96,7 @@ If you already have an existing namespace, you can create a private endpoint by
94
96
1. On the **Review + create**, review all the settings, and select **Create** to create the private endpoint.
95
97
96
98
:::image type="content" source="./media/private-link-service/create-private-endpoint-review-create-page.png" alt-text="Screenshot showing the Review and Create page of the Create private endpoint wizard.":::
97
-
12. Confirm that the private endpoint is created. If you are the owner of the resource and had selected **Connect to an Azure resource in my directory** option for the **Connection method**, the endpoint connection should be **auto-approved**. If it's in the **pending** state, see the [Manage private endpoints using Azure portal](#manage-private-endpoints-using-azure-portal) section.
99
+
12. Confirm that the private endpoint is created. If you're the owner of the resource and had selected **Connect to an Azure resource in my directory** option for the **Connection method**, the endpoint connection should be **auto-approved**. If it's in the **pending** state, see the [Manage private endpoints using Azure portal](#manage-private-endpoints-using-azure-portal) section.
@@ -188,7 +190,7 @@ There are four provisioning states:
188
190
189
191
### Approve a private endpoint connection
190
192
191
-
1. If there are any connections that are pending, you will see a connection listed with **Pending** in the provisioning state.
193
+
1. If there are any connections that are pending, you'll see a connection listed with **Pending** in the provisioning state.
192
194
2. Select the **private endpoint** you wish to approve
193
195
3. Select the **Approve** button.
194
196
@@ -202,7 +204,7 @@ There are four provisioning states:
202
204
203
205
### Reject a private endpoint connection
204
206
205
-
1. If there are any private endpoint connections you want to reject, whether it is a pending request or existing connection that was approved earlier, select the endpoint connection and click the **Reject** button.
207
+
1. If there are any private endpoint connections you want to reject, whether it's a pending request or existing connection that was approved earlier, select the endpoint connection and select the **Reject** button.
0 commit comments