Skip to content

Commit b40addb

Browse files
boylejjCopilotsaritaidpmex4527
authored
Update GEI documentation to include virtual network firewall rules when using Azure Blob Storage (#56908)
Co-authored-by: Copilot <[email protected]> Co-authored-by: Sarita Iyer <[email protected]> Co-authored-by: Daniel Perez <[email protected]>
1 parent 63fcce3 commit b40addb

File tree

4 files changed

+18
-0
lines changed

4 files changed

+18
-0
lines changed

content/migrations/using-github-enterprise-importer/migrating-between-github-products/managing-access-for-a-migration-between-github-products.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,10 @@ If the source of your migration is {% data variables.product.prodname_ghe_server
136136

137137
{% data reusables.enterprise-migration-tool.identifying-githubs-ip-ranges %}
138138

139+
### Virtual network firewall rules for Azure Blob Storage for {% data variables.product.prodname_dotcom_the_website %}
140+
141+
{% data reusables.enterprise-migration-tool.identify-gei-vnet-firewall-rules %}
142+
139143
### IP ranges for {% data variables.enterprise.data_residency_site %}
140144

141145
{% data reusables.enterprise-migration-tool.ip-ranges-ghecom %}

content/migrations/using-github-enterprise-importer/migrating-from-azure-devops-to-github-enterprise-cloud/managing-access-for-a-migration-from-azure-devops.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,10 @@ To grant the migrator role using the CLI, you must have installed the {% data va
9090

9191
{% data reusables.enterprise-migration-tool.identifying-githubs-ip-ranges %}
9292

93+
### Virtual network firewall rules for Azure Blob Storage for {% data variables.product.prodname_dotcom_the_website %}
94+
95+
{% data reusables.enterprise-migration-tool.identify-gei-vnet-firewall-rules %}
96+
9397
### IP ranges for {% data variables.enterprise.data_residency_site %}
9498

9599
{% data reusables.enterprise-migration-tool.ip-ranges-ghecom %}

content/migrations/using-github-enterprise-importer/migrating-from-bitbucket-server-to-github-enterprise-cloud/managing-access-for-a-migration-from-bitbucket-server.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -116,6 +116,10 @@ For more information, see [AUTOTITLE](/enterprise-cloud@latest/organizations/kee
116116

117117
{% data reusables.enterprise-migration-tool.identifying-githubs-ip-ranges %}
118118

119+
### Virtual network firewall rules for Azure Blob Storage for {% data variables.product.prodname_dotcom_the_website %}
120+
121+
{% data reusables.enterprise-migration-tool.identify-gei-vnet-firewall-rules %}
122+
119123
### IP ranges for {% data variables.enterprise.data_residency_site %}
120124

121125
{% data reusables.enterprise-migration-tool.ip-ranges-ghecom %}
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
Customers with Azure Blob Storage configured for storing repository data for migrations must add virtual network firewall rules to their storage accounts to allow GEI to access the repository data. This requires the use of the Azure CLI or PowerShell, as adding these virtual network firewall rules on the Azure Portal is currently unsupported. The following virtual network subnet IDs must be added to the virtual network firewall rules for your storage account:
2+
3+
* `/subscriptions/495e10ff-6097-4190-a1de-b031fcb96f66/resourceGroups/ghr-network-service-4c5846fa-dc07-4153-8d08-a16a9b437a5a-3-eastus2/providers/Microsoft.Network/virtualNetworks/4c5846fa-dc07-4153-8d08-a16a9b437a5a-3/subnets/4c5846fa-dc07-4153-8d08-a16a9b437a5a-3`
4+
* `/subscriptions/d3bde7c9-46be-429b-81a8-258387be6dde/resourceGroups/ghr-network-service-4c5846fa-dc07-4153-8d08-a16a9b437a5a-3-westus3/providers/Microsoft.Network/virtualNetworks/4c5846fa-dc07-4153-8d08-a16a9b437a5a-3/subnets/4c5846fa-dc07-4153-8d08-a16a9b437a5a-3`
5+
6+
To add the virtual network firewall rules to your Azure Storage account, you can follow step 5 in the documentation for [creating a virtual network rule for Azure Storage](https://learn.microsoft.com/azure/storage/common/storage-network-security-virtual-networks?tabs=azure-cli) using the network subnet IDs provided above. Be sure to provide the `--subscription` argument with the subscription ID tied to the storage account.

0 commit comments

Comments
 (0)