You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/connect-virtual-network-vnet-isolated-environment.md
+26-27Lines changed: 26 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -104,40 +104,39 @@ To make sure that your ISE is accessible and that the logic apps in that ISE can
104
104
This table describes the ports that your ISE requires to be accessible and the purpose for those ports. To help reduce complexity when you set up security rules, the table uses [service tags](../virtual-network/service-tags-overview.md) that represent groups of IP address prefixes for a specific Azure service. Where noted, *internal ISE* and *external ISE* refer to the [access endpoint that's selected during ISE creation](connect-virtual-network-vnet-isolated-environment.md#create-environment). For more information, review [Endpoint access](connect-virtual-network-vnet-isolated-environment-overview.md#endpoint-access).
105
105
106
106
> [!IMPORTANT]
107
+
>
107
108
> For all rules, make sure that you set source ports to `*` because source ports are ephemeral.
108
109
109
110
#### Inbound security rules
110
111
111
-
| Purpose | Source service tag or IP addresses | Source ports | Destination service tag or IP addresses | Destination ports | Notes |
| Intersubnet communication within virtual network | Address space for the virtual network with ISE subnets | * | Address space for the virtual network with ISE subnets | * | Required for traffic to flow *between* the subnets in your virtual network. <p><p>**Important**: For traffic to flow between the *components* in each subnet, make sure that you open all the ports within each subnet. |
114
-
| Both: <p>Communication to your logic app <p><p>Runs history for logic app| Internal ISE: <br>**VirtualNetwork** <p><p>External ISE: **Internet** or see **Notes**| * |**VirtualNetwork**| 443 | Rather than use the **Internet** service tag, you can specify the source IP address for these items: <p><p>- The computer or service that calls any request triggers or webhooks in your logic app <p>- The computer or service from where you want to access logic app runs history <p><p>**Important**: Closing or blocking this port prevents calls to logic apps that have request triggers or webhooks. You're also prevented from accessing inputs and outputs for each step in runs history. However, you're not prevented from accessing logic app runs history.|
115
-
| Azure Logic Apps designer - dynamic properties |**LogicAppsManagement**| * |**VirtualNetwork**| 454 | Requests come from the Azure Logic Apps access endpoint's [inbound IP addresses](logic-apps-limits-and-config.md#inbound) for that region. <p><p>**Important**: If you're working with Azure Government cloud, the **LogicAppsManagement** service tag won't work. Instead, you have to provide the Azure Logic Apps [inbound IP addresses](logic-apps-limits-and-config.md#azure-government-inbound) for Azure Government. |
116
-
| Network health check |**LogicApps**| * |**VirtualNetwork**| 454 | Requests come from the Azure Logic Apps access endpoint's [inbound IP addresses](logic-apps-limits-and-config.md#inbound) and [outbound IP addresses](logic-apps-limits-and-config.md#outbound) for that region. <p><p>**Important**: If you're working with Azure Government cloud, the **LogicApps** service tag won't work. Instead, you have to provide both the Azure Logic Apps [inbound IP addresses](logic-apps-limits-and-config.md#azure-government-inbound) and [outbound IP addresses](logic-apps-limits-and-config.md#azure-government-outbound) for Azure Government. |
117
-
| Connector deployment |**AzureConnectors**| * |**VirtualNetwork**| 454 | Required to deploy and update connectors. Closing or blocking this port causes ISE deployments to fail and prevents connector updates and fixes. <p><p>**Important**: If you're working with Azure Government cloud, the **AzureConnectors** service tag won't work. Instead, you have to provide the [managed connector outbound IP addresses](logic-apps-limits-and-config.md#azure-government-outbound) for Azure Government. |
| Communication from Azure Traffic Manager |**AzureTrafficManager**| * |**VirtualNetwork**| Internal ISE: 454 <p><p>External ISE: 443 ||
120
-
| Both: <p>Connector policy deployment <p>API Management - management endpoint |**APIManagement**| * |**VirtualNetwork**| 3443 | For connector policy deployment, port access is required to deploy and update connectors. Closing or blocking this port causes ISE deployments to fail and prevents connector updates and fixes. |
121
-
| Access Azure Cache for Redis Instances between Role Instances |**VirtualNetwork**| * |**VirtualNetwork**| 6379 - 6383, plus see **Notes**| For ISE to work with Azure Cache for Redis, you must open these [outbound and inbound ports described by the Azure Cache for Redis FAQ](../azure-cache-for-redis/cache-how-to-premium-vnet.md#outbound-port-requirements). |
122
-
|||||||
112
+
| Source ports | Destination ports | Source service tag or IP addresses | Destination service tag or IP addresses | Purpose | Notes |
| * | * | Address space for the virtual network with ISE subnets | Address space for the virtual network with ISE subnets | Intersubnet communication within virtual network. | Required for traffic to flow *between* the subnets in your virtual network. <br><br>**Important**: For traffic to flow between the *components* in each subnet, make sure that you open all the ports within each subnet. |
115
+
| * | 443 | Internal ISE: <br>**VirtualNetwork** <br><br>External ISE: **Internet** or see **Notes**|**VirtualNetwork**| - Communication to your logic app <br><br>- Runs history for your logic app | Rather than use the **Internet** service tag, you can specify the source IP address for these items: <br><br>- The computer or service that calls any request triggers or webhooks in your logic app <br><br>- The computer or service from where you want to access logic app runs history <br><br>**Important**: Closing or blocking this port prevents calls to logic apps that have request triggers or webhooks. You're also prevented from accessing inputs and outputs for each step in runs history. However, you're not prevented from accessing logic app runs history. |
116
+
| * | 454 |**LogicAppsManagement**|**VirtualNetwork**| Azure Logic Apps designer - dynamic properties| Requests come from the Azure Logic Apps access endpoint's [inbound IP addresses](logic-apps-limits-and-config.md#inbound) for that region. <br><br>**Important**: If you're working with Azure Government cloud, the **LogicAppsManagement** service tag won't work. Instead, you have to provide the Azure Logic Apps [inbound IP addresses](logic-apps-limits-and-config.md#azure-government-inbound) for Azure Government. |
117
+
| * | 454 |**LogicApps**|**VirtualNetwork**| Network health check | Requests come from the Azure Logic Apps access endpoint's [inbound IP addresses](logic-apps-limits-and-config.md#inbound) and [outbound IP addresses](logic-apps-limits-and-config.md#outbound) for that region. <br><br>**Important**: If you're working with Azure Government cloud, the **LogicApps** service tag won't work. Instead, you have to provide both the Azure Logic Apps [inbound IP addresses](logic-apps-limits-and-config.md#azure-government-inbound) and [outbound IP addresses](logic-apps-limits-and-config.md#azure-government-outbound) for Azure Government. |
118
+
| * | 454 |**AzureConnectors**|**VirtualNetwork**| Connector deployment | Required to deploy and update connectors. Closing or blocking this port causes ISE deployments to fail and prevents connector updates and fixes. <br><br>**Important**: If you're working with Azure Government cloud, the **AzureConnectors** service tag won't work. Instead, you have to provide the [managed connector outbound IP addresses](logic-apps-limits-and-config.md#azure-government-outbound) for Azure Government. |
| * | Internal ISE: 454 <br><br>External ISE: 443 |**AzureTrafficManager**|**VirtualNetwork**| Communication from Azure Traffic Manager ||
121
+
| * | 3443 |**APIManagement**|**VirtualNetwork**| Connector policy deployment <br><br>API Management - management endpoint | For connector policy deployment, port access is required to deploy and update connectors. Closing or blocking this port causes ISE deployments to fail and prevents connector updates and fixes. |
122
+
| * | 6379 - 6383, plus see **Notes**|**VirtualNetwork**|**VirtualNetwork**| Access Azure Cache for Redis Instances between Role Instances | For ISE to work with Azure Cache for Redis, you must open these [outbound and inbound ports described by the Azure Cache for Redis FAQ](../azure-cache-for-redis/cache-how-to-premium-vnet.md#outbound-port-requirements). |
123
123
124
124
#### Outbound security rules
125
125
126
-
| Purpose | Source service tag or IP addresses | Source ports | Destination service tag or IP addresses | Destination ports | Notes |
| Intersubnet communication within virtual network | Address space for the virtual network with ISE subnets | * | Address space for the virtual network with ISE subnets | * | Required for traffic to flow *between* the subnets in your virtual network. <p><p>**Important**: For traffic to flow between the *components* in each subnet, make sure that you open all the ports within each subnet. |
129
-
| Communication from your logic app |**VirtualNetwork**| * | Internet | 443, 80 | This rule is required for Secure Socket Layer (SSL) certificate verification. This check is for various internal and external sites, which is the reason that the Internet is required as the destination. |
130
-
| Communication from your logic app |**VirtualNetwork**| * | Varies based on destination | Varies based on destination | Destination ports vary based on the endpoints for the external services with which your logic app needs to communicate. <p><p>For example, the destination port is port 25 for an SMTP service, port 22 for an SFTP service, and so on. |
131
-
| Azure Active Directory |**VirtualNetwork**| * |**AzureActiveDirectory**| 80, 443 ||
| Azure Resource Health |**VirtualNetwork**| * |**AzureMonitor**| 1886 | Required for publishing health status to Resource Health. |
137
-
| Dependency from Log to Event Hub policy and monitoring agent |**VirtualNetwork**| * |**EventHub**| 5672 ||
138
-
| Access Azure Cache for Redis Instances between Role Instances |**VirtualNetwork**| * |**VirtualNetwork**| 6379 - 6383, plus see **Notes**| For ISE to work with Azure Cache for Redis, you must open these [outbound and inbound ports described by the Azure Cache for Redis FAQ](../azure-cache-for-redis/cache-how-to-premium-vnet.md#outbound-port-requirements). |
139
-
| DNS name resolution |**VirtualNetwork**| * | IP addresses for any custom Domain Name System (DNS) servers on your virtual network | 53 | Required only when you use custom DNS servers on your virtual network |
140
-
|||||||
126
+
| Source ports | Destination ports | Source service tag or IP addresses | Destination service tag or IP addresses | Purpose | Notes |
| * | * | Address space for the virtual network with ISE subnets | Address space for the virtual network with ISE subnets | Intersubnet communication within virtual network | Required for traffic to flow *between* the subnets in your virtual network. <br><br>**Important**: For traffic to flow between the *components* in each subnet, make sure that you open all the ports within each subnet. |
129
+
| * | 443, 80 |**VirtualNetwork**| Internet | Communication from your logic app | This rule is required for Secure Socket Layer (SSL) certificate verification. This check is for various internal and external sites, which is the reason that the Internet is required as the destination. |
130
+
| * | Varies based on destination |**VirtualNetwork**| Varies based on destination | Communication from your logic app | Destination ports vary based on the endpoints for the external services with which your logic app needs to communicate. <br><br>For example, the destination port is port 25 for an SMTP service, port 22 for an SFTP service, and so on. |
131
+
| * | 80, 443 |**VirtualNetwork**|**AzureActiveDirectory**| Azure Active Directory ||
| * | 1886 |**VirtualNetwork**|**AzureMonitor**| Azure Resource Health | Required for publishing health status to Resource Health. |
137
+
| * | 5672 |**VirtualNetwork**|**EventHub**| Dependency from Log to Event Hubs policy and monitoring agent ||
138
+
| * | 6379 - 6383, plus see **Notes**|**VirtualNetwork**|**VirtualNetwork**| Access Azure Cache for Redis Instances between Role Instances | For ISE to work with Azure Cache for Redis, you must open these [outbound and inbound ports described by the Azure Cache for Redis FAQ](../azure-cache-for-redis/cache-how-to-premium-vnet.md#outbound-port-requirements). |
139
+
| * | 53 |**VirtualNetwork**| IP addresses for any custom Domain Name System (DNS) servers on your virtual network | DNS name resolution | Required only when you use custom DNS servers on your virtual network |
141
140
142
141
In addition, you need to add outbound rules for [App Service Environment (ASE)](../app-service/environment/intro.md):
Copy file name to clipboardExpand all lines: articles/logic-apps/deploy-single-tenant-logic-apps-private-storage-account.md
+13-8Lines changed: 13 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,12 @@ ms.date: 08/20/2022
16
16
17
17
When you create a single-tenant Standard logic app resource, you're required to have a storage account for storing logic app artifacts. You can restrict access to this storage account so that only the resources inside a virtual network can connect to your logic app workflow. Azure Storage supports adding private endpoints to your storage account.
18
18
19
-
This article describes the steps to follow for deploying such logic apps to protected private storage accounts. For more information, review [Use private endpoints for Azure Storage](../storage/common/storage-private-endpoints.md).
19
+
This article describes the steps to follow for deploying such logic apps to protected private storage accounts.
20
+
21
+
For more information, review the following documentation:
22
+
23
+
-[Secure traffic between Standard logic apps and Azure virtual networks using private endpoints](secure-single-tenant-workflow-virtual-network-private-endpoint.md)
24
+
-[Use private endpoints for Azure Storage](../storage/common/storage-private-endpoints.md)
@@ -36,7 +41,7 @@ This deployment method requires that temporary public access to your storage acc
36
41
37
42
1. Deploy your logic app resource by using either the Azure portal or Visual Studio Code.
38
43
39
-
1. After deployment finishes, enable VNet integration between your logic app and the private endpoints on the virtual network that connects to your storage account.
44
+
1. After deployment finishes, enable virtual network integration between your logic app and the private endpoints on the virtual network that connects to your storage account.
40
45
41
46
1. In the [Azure portal](https://portal.azure.com), open your logic app resource.
42
47
@@ -68,11 +73,11 @@ This deployment method requires that temporary public access to your storage acc
68
73
This deployment method doesn't require public access to the storage account. For an example ARM template, review [Deploy logic app using secured storage account with private endpoints](https://github.com/VeeraMS/LogicApp-deployment-with-Secure-Storage). The example template creates the following resources:
69
74
70
75
- A storage account that denies the public traffic
71
-
- An Azure VNet and subnets
76
+
- An Azure virtual network and subnets
72
77
- Private DNS zones and private endpoints for Blob, File, Queue, and Table services
73
78
- A file share for the Azure Logic Apps runtime directories and files. For more information, review [Host and app settings for logic apps in single-tenant Azure Logic Apps](edit-app-settings-host-settings.md).
74
79
- An App Service plan (Workflow Standard WS1) for hosting Standard logic app resources
75
-
- A Standard logic app resource with a network configuration that's set up to use VNet integration. This configuration enables the logic app to access the storage account through private endpoints.
80
+
- A Standard logic app resource with a network configuration that's set up to use virtual network integration. This configuration enables the logic app to access the storage account through private endpoints.
76
81
77
82
## Troubleshoot common errors
78
83
@@ -86,7 +91,7 @@ The following errors commonly happen with a private storage account that's behin
86
91
87
92
As the logic app isn't running when these errors occur, you can't use the Kudu console debugging service on the Azure platform to troubleshoot these errors. However, you can use the following methods instead:
88
93
89
-
- Create an Azure virtual machine (VM) inside a different subnet within the same VNet that's integrated with your logic app. Try to connect from the VM to the storage account.
94
+
- Create an Azure virtual machine (VM) inside a different subnet within the same virtual network that's integrated with your logic app. Try to connect from the VM to the storage account.
90
95
91
96
- Check access to the storage account services by using the [Storage Explorer tool](https://azure.microsoft.com/features/storage-explorer/#overview).
92
97
@@ -114,19 +119,19 @@ As the logic app isn't running when these errors occur, you can't use the Kudu c
1. If the queries resolve from the VM, continue with the following steps:
124
129
125
130
1. In the VM, find the DNS server that's used for resolution.
126
131
127
132
1. In your logic app, [find and set the `WEBSITE_DNS_SERVER` app setting](edit-app-settings-host-settings.md?tabs=azure-portal?tabs=azure-portal#manage-app-settings---localsettingsjson) to the same DNS server value that you found in the previous step.
128
133
129
-
1. Check that the VNet integration is set up correctly with the appropriate VNET and subnet in your logic app.
134
+
1. Check that the virtual network integration is set up correctly with the appropriate virtual network and subnet in your logic app.
0 commit comments