Skip to content

Commit fd3d492

Browse files
authored
Merge pull request #112469 from spelluru/sbusnote0423
added note
2 parents f56dd2c + cd0637b commit fd3d492

File tree

3 files changed

+43
-1
lines changed

3 files changed

+43
-1
lines changed

articles/service-bus-messaging/private-link-service.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,21 @@ A private endpoint is a network interface that connects you privately and secure
1818

1919
For more information, see [What is Azure Private Link?](../private-link/private-link-overview.md)
2020

21-
> [!NOTE]
21+
>[!WARNING]
22+
> Implementing private endpoints can prevent other Azure services from interacting with Service Bus.
23+
>
24+
> Trusted Microsoft services are not supported when Virtual Networks are implemented.
25+
>
26+
> Common Azure scenarios that don't work with Virtual Networks (note that the list is **NOT** exhaustive) -
27+
> - Integration with Azure Event Grid
28+
> - Azure IoT Hub Routes
29+
> - Azure IoT Device Explorer
30+
>
31+
> The below Microsoft services are required to be on a virtual network
32+
> - Azure App Service
33+
> - Azure Functions
34+
35+
> [!IMPORTANT]
2236
> This feature is supported with the **premium** tier of Azure Service Bus. For more information about the premium tier, see the [Service Bus Premium and Standard messaging tiers](service-bus-premium-messaging.md) article.
2337
>
2438
> This feature is currently in **preview**.

articles/service-bus-messaging/service-bus-ip-filtering.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,20 @@ This feature is helpful in scenarios in which Azure Service Bus should be only a
2626
## IP firewall rules
2727
The IP firewall rules are applied at the Service Bus namespace level. Therefore, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that does not match an allowed IP rule on the Service Bus namespace is rejected as unauthorized. The response does not mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
2828

29+
>[!WARNING]
30+
> Implementing Firewall rules can prevent other Azure services from interacting with Service Bus.
31+
>
32+
> Trusted Microsoft services are not supported when IP Filtering (Firewall rules) are implemented, and will be made available soon.
33+
>
34+
> Common Azure scenarios that don't work with IP Filtering (note that the list is **NOT** exhaustive) -
35+
> - Integration with Azure Event Grid
36+
> - Azure IoT Hub Routes
37+
> - Azure IoT Device Explorer
38+
>
39+
> The following Microsoft services are required to be on a virtual network
40+
> - Azure App Service
41+
> - Azure Functions
42+
2943
## Use Azure portal
3044
This section shows you how to use the Azure portal to create IP firewall rules for a Service Bus namespace.
3145

articles/service-bus-messaging/service-bus-service-endpoints.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,20 @@ Once configured to be bound to at least one virtual network subnet service endpo
2121

2222
The result is a private and isolated relationship between the workloads bound to the subnet and the respective Service Bus namespace, in spite of the observable network address of the messaging service endpoint being in a public IP range.
2323

24+
>[!WARNING]
25+
> Implementing Virtual Networks integration can prevent other Azure services from interacting with Service Bus.
26+
>
27+
> Trusted Microsoft services are not supported when Virtual Networks are implemented.
28+
>
29+
> Common Azure scenarios that don't work with Virtual Networks (note that the list is **NOT** exhaustive) -
30+
> - Integration with Azure Event Grid
31+
> - Azure IoT Hub Routes
32+
> - Azure IoT Device Explorer
33+
>
34+
> The below Microsoft services are required to be on a virtual network
35+
> - Azure App Service
36+
> - Azure Functions
37+
2438
> [!IMPORTANT]
2539
> Virtual Networks are supported only in [Premium tier](service-bus-premium-messaging.md) Service Bus namespaces.
2640
>

0 commit comments

Comments
 (0)