Skip to content

Commit a9c4d63

Browse files
committed
added PowerShell and CLI commands
1 parent 5f3bd35 commit a9c4d63

File tree

2 files changed

+21
-0
lines changed

2 files changed

+21
-0
lines changed

articles/service-bus-messaging/service-bus-ip-filtering.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,16 @@ To deploy the template, follow the instructions for [Azure Resource Manager][lnk
136136
> [!IMPORTANT]
137137
> If there are no IP and virtual network rules, all the traffic flows into the namespace even if you set the `defaultAction` to `deny`. The namespace can be accessed over the public internet (using the access key). Specify at least one IP rule or virtual network rule for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network.
138138
139+
## Use Azure CLI
140+
Use [az servicebus namespace network-rule](/cli/azure/servicebus/namespace/network-rule) add, list, update, and remove commands to manage IP firewall rules for a Service Bus namespace.
141+
142+
## Use Azure PowerShell
143+
Use the following Azure PowerShell commands to add, list, remove, update, and delete IP firewall rules.
144+
145+
- [Add-AzServiceBusIPRule](/powershell/module/az.servicebus/add-azservicebusiprule) to add an IP firewall rule.
146+
- [New-AzServiceBusIPRuleConfig](/powershell/module/az.servicebus/new-azservicebusipruleconfig) and [Set-AzServiceBusNetworkRuleSet](/powershell/module/az.servicebus/set-azservicebusnetworkruleset) together to add an IP firewall rule
147+
- [Remove-AzServiceBusIPRule](/powershell/module/az.servicebus/remove-azservicebusiprule) to remove an IP firewall rule.
148+
139149
## default action and public network access
140150

141151
### REST API

articles/service-bus-messaging/service-bus-service-endpoints.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -207,6 +207,17 @@ To deploy the template, follow the instructions for [Azure Resource Manager][lnk
207207
> [!IMPORTANT]
208208
> If there are no IP and virtual network rules, all the traffic flows into the namespace even if you set the `defaultAction` to `deny`. The namespace can be accessed over the public internet (using the access key). Specify at least one IP rule or virtual network rule for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network.
209209
210+
## Use Azure CLI
211+
Use [az servicebus namespace network-rule](/cli/azure/servicebus/namespace/network-rule) add, list, update, and remove commands to manage virtual network rules for a Service Bus namespace.
212+
213+
## Use Azure PowerShell
214+
Use the following Azure PowerShell commands to add, list, remove, update, and delete network rules for a Service Bus namespace.
215+
216+
- [Add-AzServiceBusVirtualNetworkRule](/powershell/module/az.servicebus/add-azservicebusvirtualnetworkrule) to add a virtual network rule.
217+
- [New-AzServiceBusVirtualNetworkRuleConfig](/powershell/module/az.servicebus/new-azservicebusipruleconfig) and [Set-AzServiceBusNetworkRuleSet](/powershell/module/az.servicebus/set-azservicebusnetworkruleset) together to add a virtual network rule.
218+
- [Remove-AzServiceBusVirtualNetworkRule](https://learn.microsoft.com/en-us/powershell/module/az.servicebus/remove-azservicebusvirtualnetworkrule) to remove s virtual network rule.
219+
220+
210221
## default action and public network access
211222

212223
### REST API

0 commit comments

Comments
 (0)