Skip to content

Commit a20a9c5

Browse files
committed
include file for Relay trusted services
1 parent df2821f commit a20a9c5

File tree

3 files changed

+25
-14
lines changed

3 files changed

+25
-14
lines changed
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
author: spelluru
3+
ms.service: service-bus-relay
4+
ms.topic: include
5+
ms.date: 06/26/2023
6+
ms.author: spelluru
7+
---
8+
9+
## Trusted services
10+
The following services are the trusted services for Azure Relay.
11+
- Azure Event Grid
12+
- Azure IoT Hub
13+
- Azure Stream Analytics
14+
- Azure Monitor
15+
- Azure API Management
16+
- Azure Synapse
17+
- Azure Data Explorer
18+
- Azure IoT Central
19+
- Azure Healthcare Data Services
20+
- Azure Digital Twins
21+
- Azure Arc

articles/azure-relay/ip-firewall-virtual-networks.md

Lines changed: 1 addition & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -120,20 +120,8 @@ The template takes one parameter: **ipMask**, which is a single IPv4 address or
120120
121121
To deploy the template, follow the instructions for [Azure Resource Manager](../azure-resource-manager/templates/deploy-powershell.md).
122122

123-
## Trusted services
124-
The following services are the trusted services for Azure Relay.
125-
- Azure Event Grid
126-
- Azure IoT Hub
127-
- Azure Stream Analytics
128-
- Azure Monitor
129-
- Azure API Management
130-
- Azure Synapse
131-
- Azure Data Explorer
132-
- Azure IoT Central
133-
- Azure Healthcare Data Services
134-
- Azure Digital Twins
135-
- Azure Arc
136123

124+
[!INCLUDE [trusted-services](./includes/trusted-services.md)]
137125

138126
## Next steps
139127
To learn about other network security-related features, see [Network security](network-security.md).

articles/azure-relay/private-link-service.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The following procedure provides step-by-step instructions for disabling public
3737
3. Select the **namespace** from the list to which you want to add a private endpoint.
3838
4. On the left menu, select the **Networking** tab under **Settings**.
3939
1. On the **Networking** page, for **Public network access**, select **Disabled** if you want the namespace to be accessed only via private endpoints.
40-
1. For **Allow trusted Microsoft services to bypass this firewall**, select **Yes** if you want to allow [trusted Microsoft services](#trusted-microsoft-services) to bypass this firewall.
40+
1. For **Allow trusted Microsoft services to bypass this firewall**, select **Yes** if you want to allow [trusted Microsoft services](#trusted-services) to bypass this firewall.
4141

4242
:::image type="content" source="./media/private-link-service/public-access-disabled.png" alt-text="Screenshot of the Networking page with public network access as Disabled.":::
4343
1. Select the **Private endpoint connections** tab at the top of the page
@@ -231,6 +231,8 @@ Aliases: <namespace-name>.servicebus.windows.net
231231
- Maximum number of Azure Relay namespaces with private endpoints per subscription: 64.
232232
- Network Security Group (NSG) rules and User-Defined Routes don't apply to Private Endpoint. For more information, see [Azure Private Link service: Limitations](../private-link/private-link-service-overview.md#limitations)
233233

234+
[!INCLUDE [trusted-services](./includes/trusted-services.md)]
235+
234236
## Next Steps
235237

236238
- Learn more about [Azure Private Link](../private-link/private-link-service-overview.md)

0 commit comments

Comments
 (0)