Skip to content

Commit ebf2c0e

Browse files
authored
Merge pull request #111261 from spelluru/ehubnetwork0413
added the warning back
2 parents 4d335de + 02f83a8 commit ebf2c0e

File tree

2 files changed

+32
-0
lines changed

2 files changed

+32
-0
lines changed

articles/event-hubs/event-hubs-ip-filtering.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,22 @@ By default, Event Hubs namespaces are accessible from internet as long as the re
2020

2121
This feature is helpful in scenarios in which Azure Event Hubs should be only accessible from certain well-known sites. Firewall rules enable you to configure rules to accept traffic originating from specific IPv4 addresses. For example, if you use Event Hubs with [Azure Express Route][express-route], you can create a **firewall rule** to allow traffic from only your on-premises infrastructure IP addresses.
2222

23+
>[!WARNING]
24+
> Enabling IP filtering can prevent other Azure services from interacting with Event Hubs.
25+
>
26+
> Trusted Microsoft services are not supported when Virtual Networks are implemented.
27+
>
28+
> Common Azure scenarios that don't work with Virtual Networks (note that the list is **NOT** exhaustive) -
29+
> - Azure Stream Analytics
30+
> - Integration with Azure Event Grid
31+
> - Azure IoT Hub Routes
32+
> - Azure IoT Device Explorer
33+
>
34+
> The following Microsoft services are required to be on a virtual network
35+
> - Azure Web Apps
36+
> - Azure Functions
37+
38+
2339
## IP firewall rules
2440
The IP firewall rules are applied at the Event Hubs namespace level. Therefore, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that does not match an allowed IP rule on the Event Hubs namespace is rejected as unauthorized. The response does not mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
2541

articles/event-hubs/event-hubs-service-endpoints.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,22 @@ Once configured to bound to at least one virtual network subnet service endpoint
2323

2424
The result is a private and isolated relationship between the workloads bound to the subnet and the respective Event Hubs namespace, in spite of the observable network address of the messaging service endpoint being in a public IP range. There is an exception to this behavior. Enabling a service endpoint, by default, enables the `denyall` rule in the [IP firewall](event-hubs-ip-filtering.md) associated with the virtual network. You can add specific IP addresses in the IP firewall to enable access to the Event Hub public endpoint.
2525

26+
>[!WARNING]
27+
> Implementing Virtual Networks integration can prevent other Azure services from interacting with Event Hubs.
28+
>
29+
> Trusted Microsoft services are not supported when Virtual Networks are implemented.
30+
>
31+
> Common Azure scenarios that don't work with Virtual Networks (note that the list is **NOT** exhaustive) -
32+
> - Azure Stream Analytics
33+
> - Integration with Azure Event Grid
34+
> - Azure IoT Hub Routes
35+
> - Azure IoT Device Explorer
36+
>
37+
> The following Microsoft services are required to be on a virtual network
38+
> - Azure Web Apps
39+
> - Azure Functions
40+
41+
2642
> [!IMPORTANT]
2743
> Virtual networks are supported in **standard** and **dedicated** tiers of Event Hubs. It's not supported in the **basic** tier.
2844

0 commit comments

Comments
 (0)