Skip to content

Commit d5d7a41

Browse files
Merge pull request #2526 from MicrosoftDocs/main638735977994410579sync_temp
For protected branch, push strategy should use PR and merge to target branch method to work around git push error
2 parents 4632015 + 95738d4 commit d5d7a41

File tree

2 files changed

+6
-0
lines changed

2 files changed

+6
-0
lines changed

data-explorer/security-network-managed-private-endpoint-create.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,9 @@ ms.date: 11/18/2024
1010

1111
Managed private endpoints are required to connect to Azure resources that are highly protected. They're one-way private connections that allow Azure Data Explorer to connect to other protected services. In this article, you'll learn how to create a managed private endpoint and connect it to your data source.
1212

13+
> [!NOTE]
14+
> We recommend using Managed Identity connect to [Azure Storage](/azure/storage/common/storage-network-security?tabs=azure-portal#grant-access-to-trusted-azure-services) and [Azure Event Hubs](/azure/event-hubs/event-hubs-ip-filtering#trusted-microsoft-services) instead of managed private endpoints. To connect using managed identities, configure the Azure Storage or Event Hubs resources to recognize Azure Data Explorer as a trusted service. Then, use [Managed Identity](/azure/data-explorer/managed-identities-overview) to grant access by creating a network rule exception for trusted Azure services.
15+
1316
## Prerequisites
1417

1518
* An Azure subscription. Create a [free Azure account](https://azure.microsoft.com/free/).

data-explorer/security-network-private-endpoint.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,9 @@ You can use a managed private endpoint to either enable the cluster to securely
7878

7979
:::image type="content" source="media/security-network-private-endpoint/pe-mpe.png" alt-text="Diagram showing the schema of the managed private endpoint architecture.":::
8080

81+
> [!NOTE]
82+
> We recommend using Managed Identity connect to [Azure Storage](/azure/storage/common/storage-network-security?tabs=azure-portal#grant-access-to-trusted-azure-services) and [Azure Event Hubs](/azure/event-hubs/event-hubs-ip-filtering#trusted-microsoft-services) instead of managed private endpoints. To connect using managed identities, configure the Azure Storage or Event Hubs resources to recognize Azure Data Explorer as a trusted service. Then, use [Managed Identity](/azure/data-explorer/managed-identities-overview) to grant access by creating a network rule exception for trusted Azure services.```
83+
8184
### Supported services
8285

8386
Azure Data Explorer supports creating managed private endpoints to the following services:

0 commit comments

Comments
 (0)