Skip to content

Commit a529968

Browse files
Merge pull request #242956 from spelluru/sbmonitor0626
freshness
2 parents e1685b9 + a20a9c5 commit a529968

File tree

9 files changed

+43
-35
lines changed

9 files changed

+43
-35
lines changed
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
author: spelluru
3+
ms.service: service-bus-relay
4+
ms.topic: include
5+
ms.date: 06/26/2023
6+
ms.author: spelluru
7+
---
8+
9+
## Trusted services
10+
The following services are the trusted services for Azure Relay.
11+
- Azure Event Grid
12+
- Azure IoT Hub
13+
- Azure Stream Analytics
14+
- Azure Monitor
15+
- Azure API Management
16+
- Azure Synapse
17+
- Azure Data Explorer
18+
- Azure IoT Central
19+
- Azure Healthcare Data Services
20+
- Azure Digital Twins
21+
- Azure Arc

articles/azure-relay/ip-firewall-virtual-networks.md

Lines changed: 1 addition & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -120,20 +120,8 @@ The template takes one parameter: **ipMask**, which is a single IPv4 address or
120120
121121
To deploy the template, follow the instructions for [Azure Resource Manager](../azure-resource-manager/templates/deploy-powershell.md).
122122

123-
## Trusted services
124-
The following services are the trusted services for Azure Relay.
125-
- Azure Event Grid
126-
- Azure IoT Hub
127-
- Azure Stream Analytics
128-
- Azure Monitor
129-
- Azure API Management
130-
- Azure Synapse
131-
- Azure Data Explorer
132-
- Azure IoT Central
133-
- Azure Healthcare Data Services
134-
- Azure Digital Twins
135-
- Azure Arc
136123

124+
[!INCLUDE [trusted-services](./includes/trusted-services.md)]
137125

138126
## Next steps
139127
To learn about other network security-related features, see [Network security](network-security.md).
42.3 KB
Loading

articles/azure-relay/private-link-service.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,15 +28,20 @@ Your private endpoint and virtual network must be in the same region. When you s
2828

2929
Your private endpoint uses a private IP address in your virtual network.
3030

31-
### Steps
32-
For step-by-step instructions on creating a new Azure Relay namespace and entities in it, see [Create an Azure Relay namespace using the Azure portal](relay-create-namespace-portal.md).
31+
### Configure private access for a Relay namespace
32+
The following procedure provides step-by-step instructions for disabling public access to a Relay namespace and then adding a private endpoint to the namespace.
33+
3334

3435
1. Sign in to the [Azure portal](https://portal.azure.com).
3536
2. In the search bar, type in **Relays**.
3637
3. Select the **namespace** from the list to which you want to add a private endpoint.
3738
4. On the left menu, select the **Networking** tab under **Settings**.
38-
5. Select the **Private endpoint connections** tab at the top of the page
39-
6. Select the **+ Private Endpoint** button at the top of the page.
39+
1. On the **Networking** page, for **Public network access**, select **Disabled** if you want the namespace to be accessed only via private endpoints.
40+
1. For **Allow trusted Microsoft services to bypass this firewall**, select **Yes** if you want to allow [trusted Microsoft services](#trusted-services) to bypass this firewall.
41+
42+
:::image type="content" source="./media/private-link-service/public-access-disabled.png" alt-text="Screenshot of the Networking page with public network access as Disabled.":::
43+
1. Select the **Private endpoint connections** tab at the top of the page
44+
1. Select the **+ Private Endpoint** button at the top of the page.
4045

4146
:::image type="content" source="./media/private-link-service/add-private-endpoint-button.png" alt-text="Screenshot showing the selection of the Add private endpoint button on the Private endpoint connections tab of the Networking page.":::
4247
7. On the **Basics** page, follow these steps:
@@ -226,6 +231,8 @@ Aliases: <namespace-name>.servicebus.windows.net
226231
- Maximum number of Azure Relay namespaces with private endpoints per subscription: 64.
227232
- Network Security Group (NSG) rules and User-Defined Routes don't apply to Private Endpoint. For more information, see [Azure Private Link service: Limitations](../private-link/private-link-service-overview.md#limitations)
228233

234+
[!INCLUDE [trusted-services](./includes/trusted-services.md)]
235+
229236
## Next Steps
230237

231238
- Learn more about [Azure Private Link](../private-link/private-link-service-overview.md)
52.9 KB
Loading

articles/event-hubs/private-link-service.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -47,15 +47,10 @@ If you already have an Event Hubs namespace, you can create a private link conne
4747
1. Sign in to the [Azure portal](https://portal.azure.com).
4848
2. In the search bar, type in **event hubs**.
4949
3. Select the **namespace** from the list to which you want to add a private endpoint.
50-
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Select **Disabled** if you want the namespace to be accessed only via private endpoints.
50+
1. On the **Networking** page, for **Public network access**, select **Disabled** if you want the namespace to be accessed only via private endpoints.
51+
1. For **Allow trusted Microsoft services to bypass this firewall**, select **Yes** if you want to allow [trusted Microsoft services](#trusted-microsoft-services) to bypass this firewall.
5152

52-
Here are more details about options available in the **Public network access** page:
53-
- **Disabled**. This option disables any public access to the namespace. The namespace is accessible only through [private endpoints](private-link-service.md).
54-
- **Selected networks**. This option enables public access to the namespace using an access key from selected networks.
55-
56-
> [!IMPORTANT]
57-
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
58-
- **All networks** (default). This option enables public access from all networks using an access key. If you select the **All networks** option, the event hub accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
53+
:::image type="content" source="./media/private-link-service/public-access-disabled.png" alt-text="Screenshot of the Networking page with public network access as Disabled.":::
5954
1. Switch to the **Private endpoint connections** tab.
6055
1. Select the **+ Private Endpoint** button at the top of the page.
6156

53.1 KB
Loading

articles/service-bus-messaging/monitor-service-bus.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Monitoring Azure Service Bus
33
description: Learn how to use Azure Monitor to view, analyze, and create alerts on metrics from Azure Service Bus.
44
ms.topic: conceptual
55
ms.custom: subject-monitoring
6-
ms.date: 02/10/2022
6+
ms.date: 06/26/2023
77
---
88

99
# Monitor Azure Service Bus

articles/service-bus-messaging/private-link-service.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -57,15 +57,12 @@ If you already have an existing namespace, you can create a private endpoint by
5757

5858
> [!NOTE]
5959
> You see the **Networking** tab only for **premium** namespaces.
60-
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Select **Disabled** if you want the namespace to be accessed only via private endpoints.
61-
- **Disabled**. This option disables any public access to the namespace. The namespace is accessible only through [private endpoints](private-link-service.md).
62-
- **Selected networks**. This option enables public access to the namespace using an access key from selected networks.
60+
1. On the **Networking** page, for **Public network access**, select **Disabled** if you want the namespace to be accessed only via private endpoints.
61+
1. For **Allow trusted Microsoft services to bypass this firewall**, select **Yes** if you want to allow [trusted Microsoft services](#trusted-microsoft-services) to bypass this firewall.
6362

64-
> [!IMPORTANT]
65-
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
66-
- **All networks** (default). This option enables public access from all networks using an access key. If you select the **All networks** option, Service Bus accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
67-
5. To allow access to the namespace via private endpoints, select the **Private endpoint connections** tab at the top of the page
68-
6. Select the **+ Private Endpoint** button at the top of the page.
63+
:::image type="content" source="./media/private-link-service/public-access-disabled.png" alt-text="Screenshot of the Networking page with public network access as Disabled.":::
64+
1. To allow access to the namespace via private endpoints, select the **Private endpoint connections** tab at the top of the page
65+
1. Select the **+ Private Endpoint** button at the top of the page.
6966

7067
![Add private endpoint button](./media/private-link-service/private-link-service-3.png)
7168
7. On the **Basics** page, follow these steps:
@@ -190,7 +187,7 @@ There are four provisioning states:
190187

191188
### Approve a private endpoint connection
192189

193-
1. If there are any connections that are pending, you'll see a connection listed with **Pending** in the provisioning state.
190+
1. If there are any connections that are pending, you see a connection listed with **Pending** in the provisioning state.
194191
2. Select the **private endpoint** you wish to approve
195192
3. Select the **Approve** button.
196193

0 commit comments

Comments
 (0)