Skip to content

Commit fc55222

Browse files
committed
minor edits
1 parent 3d8d63e commit fc55222

File tree

2 files changed

+48
-48
lines changed

2 files changed

+48
-48
lines changed

docs/send-data/collect-from-other-data-sources/azure-blob-storage/block-blob/full-vnet-integration.md

Lines changed: 47 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -12,20 +12,20 @@ If you prefer to restrict access and keep your storage account behind a firewall
1212

1313
1. Download the ARM template [https://github.com/SumoLogic/sumologic-azure-function/blob/azure\_premium\_template\_vnet\_integration/BlockBlobReader/src/blobreaderdeploywithPremiumPlan.json](https://github.com/SumoLogic/sumologic-azure-function/blob/azure_premium_template_vnet_integration/BlockBlobReader/src/blobreaderdeploywithPremiumPlan.json) that provisions the required resources, including a premium-tier Service Bus.
1414
2. Create the following networking resources:
15-
- Virtual Network. For example, `brvnet`.
16-
:::note
17-
Only the Storage service endpoint associated with the functions and storage accounts is needed for the subnet.
18-
:::
19-
<img src={useBaseUrl('/img/send-data/blockblob/block-blob-vnet-creation.png')} alt="Virtual Network creation with storage service endpoint" style={{border: '1px solid gray'}} width="800" />
20-
- Subnet. For example, `brsubnet`.
21-
- Network Security Group (NSG). For example, `brnsg`.
22-
:::note
23-
NSG rules remain as default; no changes required.
24-
:::
25-
<img src={useBaseUrl('/img/send-data/blockblob/block-blob-NSG-rules.png')} alt="NSG rules configuration" style={{border: '1px solid gray'}} width="800" />
15+
- Virtual Network. For example, `brvnet`.
16+
:::note
17+
Only the Storage service endpoint associated with the functions and storage accounts is needed for the subnet.
18+
:::
19+
<img src={useBaseUrl('/img/send-data/blockblob/block-blob-vnet-creation.png')} alt="Virtual Network creation with storage service endpoint" style={{border: '1px solid gray'}} width="800" />
20+
- Subnet. For example, `brsubnet`.
21+
- Network Security Group (NSG). For example, `brnsg`.
22+
:::note
23+
NSG rules remain as default; no changes required.
24+
:::
25+
<img src={useBaseUrl('/img/send-data/blockblob/block-blob-NSG-rules.png')} alt="NSG rules configuration" style={{border: '1px solid gray'}} width="800" />
2626
3. Enable the Virtual Network integration on each function app by navigating to **Function App** > **Networking** > **Outbound Traffic Configuration**.
27-
<img src={useBaseUrl('/img/send-data/blockblob/block-blob-task-consumer-with-vnet-integration-outbound.png')} alt="TaskConsumer VNet integration outbound configuration" style={{border: '1px solid gray'}} width="800" />
28-
<img src={useBaseUrl('/img/send-data/blockblob/block-blob-vnet-in-task-consumer.png')} alt="VNet integration in TaskConsumer" style={{border: '1px solid gray'}} width="800" />
27+
<img src={useBaseUrl('/img/send-data/blockblob/block-blob-task-consumer-with-vnet-integration-outbound.png')} alt="TaskConsumer VNet integration outbound configuration" style={{border: '1px solid gray'}} width="800" />
28+
<img src={useBaseUrl('/img/send-data/blockblob/block-blob-vnet-in-task-consumer.png')} alt="VNet integration in TaskConsumer" style={{border: '1px solid gray'}} width="800" />
2929
4. Follow the steps below to restrict access to the Storage Account storing NSG flow logs, so that only certain networks can access it:
3030
1. Navigate to **Storage Account** > **Networking** > **Firewalls and virtual networks**.
3131
2. Choose the selected networks.
@@ -62,42 +62,42 @@ If you prefer to restrict access and keep your storage account behind a firewall
6262
3. Configure the Event Grid subscription that uses an **Event Hub** as an endpoint and choose **System Assigned** identity for authentication.
6363
<img src={useBaseUrl('/img/send-data/blockblob/block-blob-event-hub-subscription-identity.png')} alt="Event Hub subscription identity configuration" style={{border: '1px solid gray'}} width="800" />
6464
10. Ensure your Virtual Network has service endpoints enabled for:
65-
- Storage
66-
- Service Bus
67-
- Event Hub
68-
<img src={useBaseUrl('/img/send-data/blockblob/block-blob-service-endpoint-enabling-vnet.png')} alt="Enabling service endpoints in VNet" style={{border: '1px solid gray'}} width="800" />
65+
- Storage
66+
- Service Bus
67+
- Event Hub
68+
<img src={useBaseUrl('/img/send-data/blockblob/block-blob-service-endpoint-enabling-vnet.png')} alt="Enabling service endpoints in VNet" style={{border: '1px solid gray'}} width="800" />
6969
11. To validate the function execution, navigate to **Function App** > **BlobTaskConsumer** > **Monitoring** > **Invocations**.
70-
:::note
71-
You should see the invocation logs if everything is correctly configured.
72-
:::
73-
<img src={useBaseUrl('/img/send-data/blockblob/block-blob-validation.png')} alt="Block blob validation logs" style={{border: '1px solid gray'}} width="800" />
70+
:::note
71+
You should see the invocation logs if everything is correctly configured.
72+
:::
73+
<img src={useBaseUrl('/img/send-data/blockblob/block-blob-validation.png')} alt="Block blob validation logs" style={{border: '1px solid gray'}} width="800" />
7474
12. Replace the standard Service Bus with a premium tier.
75-
:::note
76-
The Service Bus provisioned via the current ARM template is configured with the standard tier, which does not support Virtual Network integration. To enable Virtual Network integration, it is recommended to create a new Service Bus with the premium tier.
77-
:::
78-
Follow the steps below to create a new Service Bus on the premium tier:
79-
a. Create a new premium Service Bus namespace:
80-
1. Use the same resource group and location as the old Service Bus.
81-
2. Enable partitioning.
82-
3. Initially allow public access (can restrict later).
83-
b. Create a new queue named `blobrangetaskqueue` with the following parameters:
84-
1. Maximum queue size: 40 GB
85-
2. Maximum message size: 1024 KB
86-
3. Maximum delivery count: 3
87-
4. Time to live: 14 days
88-
5. Message lock duration: 5 minutes
89-
6. Enable the dead letter queue.
90-
c. Update the connection strings in all three functions (Producer, Consumer, DLQ):
91-
Under **Shared access policies**, select the [RootManageSharedAccessKey](https://portal.azure.com/#) and copy the primary key from the newly created Service Bus on the premium tier as the value of `shared_access_key_value`:
92-
`Endpoint=sb://<servicebus_namespace_name>.servicebus.windows.net/;SharedAccessKeyName=RootManageSharedAccessKey;SharedAccessKey=<shared_access_key_value>`
93-
d. Restrict Public Access:
94-
1. Navigate to **Service Bus** > **Networking**.
95-
2. Set **Public** network access to **Selected** networks.
96-
3. Choose the subnet created earlier.
75+
:::note
76+
The Service Bus provisioned via the current ARM template is configured with the standard tier, which does not support Virtual Network integration. To enable Virtual Network integration, it is recommended to create a new Service Bus with the premium tier.
77+
:::
78+
Follow the steps below to create a new Service Bus on the premium tier:
79+
1. Create a new premium Service Bus namespace:
80+
1. Use the same resource group and location as the old Service Bus.
81+
2. Enable partitioning.
82+
3. Initially allow public access (can restrict later).
83+
2. Create a new queue named `blobrangetaskqueue` with the following parameters:
84+
1. Maximum queue size: 40 GB
85+
2. Maximum message size: 1024 KB
86+
3. Maximum delivery count: 3
87+
4. Time to live: 14 days
88+
5. Message lock duration: 5 minutes
89+
6. Enable the dead letter queue.
90+
3. Update the connection strings in all three functions (Producer, Consumer, DLQ):
91+
Under **Shared access policies**, select the [RootManageSharedAccessKey](https://portal.azure.com/#) and copy the primary key from the newly created Service Bus on the premium tier as the value of `shared_access_key_value`:
92+
`Endpoint=sb://<servicebus_namespace_name>.servicebus.windows.net/;SharedAccessKeyName=RootManageSharedAccessKey;SharedAccessKey=<shared_access_key_value>`
93+
4. Restrict Public Access:
94+
1. Navigate to **Service Bus** > **Networking**.
95+
2. Set **Public** network access to **Selected** networks.
96+
3. Choose the subnet created earlier.
9797

9898
### References
9999

100-
[https://learn.microsoft.com/en-us/azure/event-hubs/event-hubs-service-endpoints](https://learn.microsoft.com/en-us/azure/event-hubs/event-hubs-service-endpoints)
101-
[https://learn.microsoft.com/en-us/azure/azure-functions/configure-networking-how-to?tabs=portal\#3-enable-application-and-configuration-routing](https://learn.microsoft.com/en-us/azure/azure-functions/configure-networking-how-to?tabs=portal#3-enable-application-and-configuration-routing)
102-
[https://learn.microsoft.com/en-us/azure/app-service/configure-vnet-integration-routing\#content-share](https://learn.microsoft.com/en-us/azure/app-service/configure-vnet-integration-routing#content-share)
103-
[https://learn.microsoft.com/en-us/azure/azure-functions/functions-app-settings\#website\_contentovervnet](https://learn.microsoft.com/en-us/azure/azure-functions/functions-app-settings#website_contentovervnet)
100+
- [https://learn.microsoft.com/en-us/azure/event-hubs/event-hubs-service-endpoints](https://learn.microsoft.com/en-us/azure/event-hubs/event-hubs-service-endpoints)
101+
- [https://learn.microsoft.com/en-us/azure/azure-functions/configure-networking-how-to?tabs=portal\#3-enable-application-and-configuration-routing](https://learn.microsoft.com/en-us/azure/azure-functions/configure-networking-how-to?tabs=portal#3-enable-application-and-configuration-routing)
102+
- [https://learn.microsoft.com/en-us/azure/app-service/configure-vnet-integration-routing\#content-share](https://learn.microsoft.com/en-us/azure/app-service/configure-vnet-integration-routing#content-share)
103+
- [https://learn.microsoft.com/en-us/azure/azure-functions/functions-app-settings\#website\_contentovervnet](https://learn.microsoft.com/en-us/azure/azure-functions/functions-app-settings#website_contentovervnet)

sidebars.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -715,7 +715,7 @@ module.exports = {
715715
link: { type: 'doc', id: 'send-data/collect-from-other-data-sources/azure-blob-storage/block-blob/index' },
716716
items: [
717717
'send-data/collect-from-other-data-sources/azure-blob-storage/block-blob/collect-logs',
718-
'send-data/collect-from-other-data-sources/azure-blob-storage/block-blob/full-vnet-integration',
718+
'send-data/collect-from-other-data-sources/azure-blob-storage/block-blob/block-blob-full-vnet-integration',
719719
],
720720
},
721721
{

0 commit comments

Comments
 (0)