Skip to content

Commit fcd3078

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into topic-ddos
2 parents 096cb46 + 6f3c9c7 commit fcd3078

File tree

76 files changed

+807
-302
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+807
-302
lines changed

articles/automation/delete-account.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,13 @@ description: This article tells how to delete and your Automation account across
44
services: automation
55
ms.service: azure-automation
66
ms.subservice: process-automation
7-
ms.date: 10/10/2024
7+
ms.date: 12/28/2024
88
ms.topic: how-to
99
---
1010

1111
# Manage your Azure Automation account
1212

13-
After you enable an Azure Automation account to help automate IT or business process, or enable its other features to support operations management of your Azure and non-Azure machines such as Update Management, you may decide to stop using the Automation account. If you have enabled features that depend on integration with an Azure Monitor Log Analytics workspace, there are more steps required to complete this action.
13+
After you enable an Azure Automation account to help automate IT or business process, or enable its other features to support operations management of your Azure and non-Azure machines, you may decide to stop using the Automation account. If you have enabled features that depend on integration with an Azure Monitor Log Analytics workspace, there are more steps required to complete this action.
1414

1515
This article tells you how to completely remove your Automation account through the Azure portal, using Azure PowerShell, the Azure CLI, or the REST API and restore your deleted Azure Automation account.
1616

articles/azure-resource-manager/bicep/frequently-asked-questions.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ metadata:
33
title: Bicep frequently asked questions
44
description: Answers to common questions about using Bicep to deploy resources to Azure.
55
ms.topic: faq
6+
ms.date: 01/21/2022
67

78
title: Frequently asked questions for Bicep
89
summary: |

articles/azure-resource-manager/templates/create-visual-studio-deployment-project.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 10/24/2024
1111
> The Azure Resource Group project is now in extended support, meaning we will continue to support existing features and capabilities but won't prioritize adding new features.
1212
1313
> [!NOTE]
14-
> For the best and most secure experience, we strongly recommend updating your Visual Studio installation to the [latest Long-Term Support (LTS) version](/visualstudio/install/update-visual-studio). Upgrading will improve both the reliability and overall performance of your Visual Studio environment. If you choose not to upgrade, you may encounter the issues documented in [Issues when creating and deploying Azure resource groups through Visual Studio](https://learn.microsoft.com/troubleshoot/developer/visualstudio/ide/troubleshoot-create-deploy-resource-group).
14+
> For the best and most secure experience, we strongly recommend updating your Visual Studio installation to the [latest Long-Term Support (LTS) version](/visualstudio/install/update-visual-studio). Upgrading will improve both the reliability and overall performance of your Visual Studio environment. If you choose not to upgrade, you may encounter the issues documented in [Issues when creating and deploying Azure resource groups through Visual Studio](/troubleshoot/developer/visualstudio/ide/troubleshoot-create-deploy-resource-group).
1515
1616
With Visual Studio, you can create a project that deploys your infrastructure and code to Azure. For example, you can deploy the web host, website, and code for the website. Visual Studio provides many different starter templates for deploying common scenarios. In this article, you deploy a web app.
1717

articles/azure-resource-manager/templates/update-visual-studio-deployment-script.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 10/24/2024
1111
> The Azure Resource Group project is now in extended support, meaning we will continue to support existing features and capabilities but won't prioritize adding new features.
1212
1313
> [!NOTE]
14-
> For the best and most secure experience, we strongly recommend updating your Visual Studio installation to the [latest Long-Term Support (LTS) version](/visualstudio/install/update-visual-studio). Upgrading will improve both the reliability and overall performance of your Visual Studio environment. If you choose not to upgrade, you may encounter the issues documented in [Issues when creating and deploying Azure resource groups through Visual Studio](https://learn.microsoft.com/troubleshoot/developer/visualstudio/ide/troubleshoot-create-deploy-resource-group).
14+
> For the best and most secure experience, we strongly recommend updating your Visual Studio installation to the [latest Long-Term Support (LTS) version](/visualstudio/install/update-visual-studio). Upgrading will improve both the reliability and overall performance of your Visual Studio environment. If you choose not to upgrade, you may encounter the issues documented in [Issues when creating and deploying Azure resource groups through Visual Studio](/troubleshoot/developer/visualstudio/ide/troubleshoot-create-deploy-resource-group).
1515
1616
Visual Studio 16.4 supports using the Az PowerShell module in the template deployment script. However, Visual Studio doesn't automatically install that module. To use the Az module, you need to take four steps:
1717

articles/azure-signalr/howto-network-access-control.md

Lines changed: 165 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -12,35 +12,95 @@ ms.author: lianwei
1212

1313
# Configure network access control
1414

15-
Azure SignalR Service enables you to secure and control the level of access to your service endpoint based on the request type and subset of networks. When network rules are configured, only applications requesting data over the specified set of networks can access your SignalR Service.
15+
Azure SignalR Service allows you to secure and manage access to your service endpoint based on request types and network subsets. When you configure network access control rules, only applications making requests from the specified networks can access your SignalR Service.
1616

17-
SignalR Service has a public endpoint that is accessible through the internet. You can also create [private endpoints for your Azure SignalR Service](howto-private-endpoints.md). A private endpoint assigns a private IP address from your VNet to the SignalR Service, and secures all traffic between your VNet and the SignalR Service over a private link. The SignalR Service network access control provides access control for both public and private endpoints.
17+
:::image type="content" alt-text="Screenshot showing network access control decision flow chart." source="media\howto-network-access-control\network-acl-decision-flow-chart.png" :::
1818

19-
Optionally, you can choose to allow or deny certain types of requests for the public endpoint and each private endpoint. For example, you can block all [Server Connections](signalr-concept-internals.md#application-server-connections) from public endpoint and make sure they only originate from a specific VNet.
19+
> [!IMPORTANT]
20+
> An application that accesses a SignalR Service when network access control rules are in effect still requires proper authorization for the request.
2021
21-
An application that accesses a SignalR Service when network access control rules are in effect still requires proper authorization for the request.
2222

23-
## Scenario A - No public traffic
23+
## Public Network Access
2424

25-
To completely deny all public traffic, first configure the public network rule to allow no request type. Then, you can configure rules that grant access to traffic from specific VNets. This configuration enables you to build a secure network boundary for your applications.
25+
We offer a single, unified switch to simplify the configuration of public network access. The switch has following options:
2626

27-
## Scenario B - Only client connections from public network
27+
* Disabled: Completely blocks public network access. All other network access control rules are ignored for public networks.
28+
* Enabled: Allows public network access, which is further regulated by additional network access control rules.
2829

29-
In this scenario, you can configure the public network rule to only allow [Client Connections](signalr-concept-internals.md#client-connections) from the public network. You can then configure private network rules to allow other types of requests originating from a specific VNet. This configuration hides your app servers from the public network and establishes secure connections between your app servers and SignalR Service.
30+
### [Configure Public Network Access via Portal](#tab/azure-portal)
3031

31-
## Managing network access control
32+
1. Go to the SignalR Service instance you want to secure.
33+
1. Select **Networking** from the left side menu. Select **Public access** tab:
34+
35+
:::image type="content" alt-text="Screenshot showing how to configure public network access." source="media\howto-network-access-control\portal-public-network-access.png" :::
36+
37+
1. Select **Disabled** or **Enabled**.
38+
39+
1. Select **Save** to apply your changes.
40+
41+
### [Configure Public Network Access via Bicep](#tab/bicep)
42+
43+
The following template disables public network access:
44+
45+
```bicep
46+
resource signalr 'Microsoft.SignalRService/SignalR@2024-08-01-preview' = {
47+
name: 'foobar'
48+
location: 'eastus'
49+
properties: {
50+
publicNetworkAccess: 'Disabled'
51+
}
52+
}
53+
```
54+
55+
-----
56+
57+
58+
## Default Action
59+
60+
The default action is applied when no other rule matches.
3261

33-
You can manage network access control for SignalR Service through the Azure portal.
62+
### [Configure Default Action via Portal](#tab/azure-portal)
3463

3564
1. Go to the SignalR Service instance you want to secure.
3665
1. Select **Network access control** from the left side menu.
3766

38-
![Network ACL on portal](media/howto-network-access-control/portal.png)
67+
![Default action on portal](media/howto-network-access-control/portal-default-action.png)
68+
69+
1. To edit the default action, toggle the **Allow/Deny** button.
70+
1. Select **Save** to apply your changes.
71+
72+
### [Configure Default Action via Bicep](#tab/bicep)
73+
74+
The following template sets the default action to `Deny`.
75+
76+
```bicep
77+
resource signalr 'Microsoft.SignalRService/SignalR@2024-08-01-preview' = {
78+
name: 'foobar'
79+
location: 'eastus'
80+
properties: {
81+
networkACLs: {
82+
defaultAction: 'Deny'
83+
}
84+
}
85+
```
86+
87+
-----
3988

40-
1. To edit default action, toggle the **Allow/Deny** button.
4189

42-
> [!TIP]
43-
> The default action is the action the service takes when no access control rule matches a request. For example, if the default action is **Deny**, then the request types that are not explicitly approved will be denied.
90+
## Request Type Rules
91+
92+
You can configure rules to allow or deny specified request types for both the public network and each [private endpoint](howto-private-endpoints.md).
93+
94+
For example, [Server Connections](signalr-concept-internals.md#application-server-connections) are typically high-privileged. To enhance security, you may want to restrict their origin. You can configure rules to block all Server Connections from public network, and only allow they originate from a specifiec virtual network.
95+
96+
If no rule matches, the default action is applied.
97+
98+
### [Configure Request Type Rules via Portal](#tab/azure-portal)
99+
100+
1. Go to the SignalR Service instance you want to secure.
101+
1. Select **Network access control** from the left side menu.
102+
103+
![Request type rules on portal](media/howto-network-access-control/portal-request-type-rules.png)
44104

45105
1. To edit public network rule, select allowed types of requests under **Public network**.
46106

@@ -52,6 +112,97 @@ You can manage network access control for SignalR Service through the Azure port
52112

53113
1. Select **Save** to apply your changes.
54114

115+
### [Configure Request Type Rules via Bicep](#tab/bicep)
116+
117+
The following template denies all requests from the public network except client connections. Additionally, it allows only Server Connections, REST API calls, and Trace calls from a specific private endpoint.
118+
119+
The name of the private endpoint connection can be inspected in the `privateEndpointConnections` sub-resource. It's automatically generated by the system.
120+
121+
```bicep
122+
resource signalr 'Microsoft.SignalRService/SignalR@2024-08-01-preview' = {
123+
name: 'foobar'
124+
location: 'eastus'
125+
properties: {
126+
networkACLs: {
127+
defaultAction: 'Deny'
128+
publicNetwork: {
129+
allow: ['ClientConnection']
130+
}
131+
privateEndpoints: [
132+
{
133+
name: 'foo.8e4d6671-8d62-4bb7-8c41-827dde9c1a05'
134+
allow: ['ServerConnection', 'ClientConnection', 'RESTAPI', 'Trace']
135+
}
136+
]
137+
}
138+
}
139+
```
140+
141+
-----
142+
143+
144+
## IP Rules
145+
146+
IP rules allow you to grant or deny access to specific public internet IP address ranges. These rules can be used to permit access for certain internet-based services and on-premises networks or to block general internet traffic.
147+
148+
The following restrictions apply:
149+
150+
* You can configure up to 30 rules.
151+
* Address ranges must be specified using [CIDR notation](https://tools.ietf.org/html/rfc4632), such as `16.17.18.0/24`. Both IPv4 and IPv6 addresses are supported.
152+
* IP rules are evaluated in the order they are defined. If no rule matches, the default action is applied.
153+
* IP rules apply only to public traffic and cannot block traffic from private endpoints.
154+
155+
### [Configure IP Rules via Portal](#tab/azure-portal)
156+
157+
1. Go to the SignalR Service instance you want to secure.
158+
1. Select **Networking** from the left side menu. Select **Access control rules** tab:
159+
160+
:::image type="content" alt-text="Screenshot showing how to configure IP rules." source="media\howto-network-access-control\portal-ip-rules.png" :::
161+
162+
1. Edit the list under **IP rules** section.
163+
164+
1. Select **Save** to apply your changes.
165+
166+
### [Configure IP Rules via Bicep](#tab/bicep)
167+
168+
The following template has these effects:
169+
170+
* Requests from `123.0.0.0/8` and `2603::/8` are allowed.
171+
* Requests from all other IP ranges are denied.
172+
173+
```bicep
174+
resource signalr 'Microsoft.SignalRService/SignalR@2024-08-01-preview' = {
175+
name: 'foobar'
176+
location: 'eastus'
177+
properties: {
178+
networkACLs: {
179+
defaultAction: 'Deny'
180+
ipRules: [
181+
{
182+
value: '123.0.0.0/8'
183+
action: 'Allow'
184+
}
185+
{
186+
value: '2603::/8'
187+
action: 'Allow'
188+
}
189+
{
190+
value: '0.0.0.0/0'
191+
action: 'Deny'
192+
}
193+
{
194+
value: '::/0'
195+
action: 'Deny'
196+
}
197+
]
198+
}
199+
}
200+
}
201+
```
202+
203+
-----
204+
205+
55206
## Next steps
56207

57208
Learn more about [Azure Private Link](../private-link/private-link-overview.md).

articles/azure-signalr/howto-private-endpoints.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ When you create a private endpoint for an Azure SignalR Service in your VNet, a
3737
Azure SignalR Service owners can manage consent requests and the private endpoints, through the '*Private endpoints*' tab for the Azure SignalR Service in the [Azure portal](https://portal.azure.com).
3838

3939
> [!TIP]
40-
> If you want to restrict access to your Azure SignalR Service through the private endpoint only, [configure the Network Access Control](howto-network-access-control.md#managing-network-access-control) to deny or control access through the public endpoint.
40+
> If you want to restrict access to your Azure SignalR Service through the private endpoint only, [configure the Network Access Control](howto-network-access-control.md) to deny or control access through the public endpoint.
4141
4242
### Connecting to private endpoints
4343

75.9 KB
Loading
111 KB
Loading
93.1 KB
Loading
61.4 KB
Loading

0 commit comments

Comments
 (0)