You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/event-hubs/event-hubs-ip-filtering.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ This section shows you how to use the Azure portal to create IP firewall rules f
70
70
71
71
> [!IMPORTANT]
72
72
> We recommend that you add IPv6 addresses to the list of allowed IP addresses now so that your clients don't break when the service eventually switches to supporting only IPv6.
73
-
1. In the **Exception** section, specify whether you want to **allow trusted Microsoft services to bypass this firewall**. See [Trusted Microsoft services](#trusted-microsoft-services) for details.
73
+
1. In the **Exception** section, specify whether you want to **allow trusted Microsoft services to access this resource**. See [Trusted Microsoft services](#trusted-microsoft-services) for details.
74
74
75
75
:::image type="content" source="./media/event-hubs-firewall/firewall-selected-networks-trusted-access-disabled.png" lightbox="./media/event-hubs-firewall/firewall-selected-networks-trusted-access-disabled.png" alt-text="Firewall section highlighted in the Public access tab of the Networking page.":::
76
76
1. Select **Save** on the toolbar to save the settings. Wait for a few minutes for the confirmation to show up on the portal notifications.
Copy file name to clipboardExpand all lines: articles/event-hubs/event-hubs-service-endpoints.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,7 +108,7 @@ This section shows you how to use Azure portal to add a virtual network service
108
108
109
109
> [!NOTE]
110
110
> If you're unable to enable the service endpoint, you can ignore the missing virtual network service endpoint by using the Resource Manager template. This functionality isn't available on the portal.
111
-
1.Specify whether you want to **allow trusted Microsoft services to bypass this firewall**. See [Trusted Microsoft services](#trusted-microsoft-services) for details.
111
+
1.In the **Exception** section, specify whether you want to **allow trusted Microsoft services to access this resource**. See [Trusted Microsoft services](#trusted-microsoft-services) for details.
112
112
1. Select **Save** on the toolbar to save the settings. Wait a few minutes for the confirmation to appear in the portal notifications.
113
113
114
114
:::image type="content" source="./media/event-hubs-tutorial-vnet-and-firewalls/save-vnet.png" lightbox="./media/event-hubs-tutorial-vnet-and-firewalls/save-vnet.png" alt-text="Image showing the saving of virtual network.":::
Copy file name to clipboardExpand all lines: articles/event-hubs/private-link-service.md
+40-24Lines changed: 40 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,25 @@
1
1
---
2
-
title: Integrate Azure Event Hubs with Azure Private Link Service
3
-
description: This article describes how to allow access to your Event Hubs namespace only via private endpoints by using the Azure Private Link Service.
4
-
ms.date: 07/31/2024
2
+
title: Restrict Event Hubs Namespace to Private Endpoints
3
+
description: Learn how to securely integrate Azure Event Hubs with Azure Private Link Service to enable private endpoint access and enhance your network security.
4
+
#customer intent: As an IT admin, I want to configure Azure Private Link for my Event Hubs namespace so that I can ensure secure communication within my virtual network.
5
+
ms.date: 01/30/2026
5
6
ms.topic: how-to
6
7
ms.custom: sfi-image-nochange
7
8
# customer intent: As an IT admin, I want to restrict access to an Event Hubs namespace to a private endpoint in a virtual network.
8
9
---
9
10
10
11
# Allow access to Azure Event Hubs namespaces via private endpoints
12
+
11
13
Azure Private Link Service enables you to access Azure Services (for example, Azure Event Hubs, Azure Storage, and Azure Cosmos DB) and Azure hosted customer/partner services over a **private endpoint** in your virtual network.
12
14
13
15
A private endpoint is a network interface that connects you privately and securely to a service powered by Azure Private Link. The private endpoint uses a private IP address from your virtual network, effectively bringing the service into your virtual network. All traffic to the service is routed through the private endpoint, so no gateways, NAT devices, ExpressRoute or VPN connections, or public IP addresses are needed. Traffic between your virtual network and the service traverses over the Microsoft backbone network, eliminating exposure from the public Internet. You can connect to an instance of an Azure resource, giving you the highest level of granularity in access control.
14
16
15
17
For more information, see [What is Azure Private Link?](../private-link/private-link-overview.md)
16
18
17
19
## Important points
20
+
18
21
- This feature isn't supported in the **basic** tier.
19
22
- Enabling private endpoints can prevent other Azure services from interacting with Event Hubs. Requests that are blocked include those from other Azure services, from the Azure portal, from logging and metrics services, and so on. As an exception, you can allow access to Event Hubs resources from certain **trusted services** even when private endpoints are enabled. For a list of trusted services, see [Trusted services](#trusted-microsoft-services).
20
-
- Specify **at least one IP rule or virtual network rule** for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network. If there are no IP and virtual network rules, the namespace can be accessed over the public internet (using the access key).
21
23
22
24
## Add a private endpoint using Azure portal
23
25
@@ -39,23 +41,38 @@ When creating a namespace, you can either allow public only (from all networks)
39
41
40
42
If you select the **Private access** option on the **Networking** page of the namespace creation wizard, you can add a private endpoint on the page by selecting **+ Private endpoint** button. See the next section for the detailed steps for adding a private endpoint.
41
43
42
-
:::image type="content" source="./media/private-link-service/create-namespace-private-access.png" alt-text="Screenshot showing the Networking page of the Create namespace wizard with Private access option selected.":::
44
+
:::image type="content" source="./media/private-link-service/create-namespace-private-access.png" alt-text="Screenshot showing the Networking page of the Create namespace wizard with Private access option selected." lightbox="./media/private-link-service/create-namespace-private-access.png":::
43
45
44
46
45
47
### Configure private access for an existing namespace
46
48
If you already have an Event Hubs namespace, you can create a private link connection by following these steps:
47
49
48
-
1. Sign in to the [Azure portal](https://portal.azure.com).
49
-
2. In the search bar, type in **event hubs**.
50
-
3. Select the **namespace** from the list to which you want to add a private endpoint.
51
-
1. On the **Networking** page, for **Public network access**, select **Disabled** if you want the namespace to be accessed only via private endpoints.
52
-
1. For **Allow trusted Microsoft services to bypass this firewall**, select **Yes** if you want to allow [trusted Microsoft services](#trusted-microsoft-services) to bypass this firewall.
50
+
#### Disable public access
51
+
52
+
Disable public access to your Event Hubs namespace to allow access only via private endpoints.
53
+
54
+
1. Navigate to your **Event Hubs namespace** in the [Azure portal](https://portal.azure.com).
55
+
1. Select **Networking** under **Settings** on the left menu.
56
+
1. On the **Networking** page, select **Manage** under **Public network access**.
57
+
58
+
:::image type="content" source="./media/event-hubs-firewall/manage-public-network-access.png" alt-text="Screenshot showing the Public access page with Manage button highlighted." lightbox="./media/event-hubs-firewall/enable-selected-networks.png":::
59
+
1. On the **Public network access** page, select **Disable** to restrict inbound access while allowing outbound access. In the pop-up, select **Proceed** to confirm.
60
+
61
+
:::image type="content" source="./media/private-link-service/disable-public-access.png" alt-text="Screenshot showing the Public network access page with Disable option selected." lightbox="./media/event-hubs-firewall/disable-public-access.png":::
62
+
1. On the **Public network access** page, select **Save** at the bottom of the page.
53
63
54
-
:::image type="content" source="./media/private-link-service/public-access-disabled.png" alt-text="Screenshot of the Networking page with public network access as Disabled." lightbox="./media/private-link-service/public-access-disabled.png":::
55
-
1. Switch to the **Private endpoint connections** tab.
56
-
1. Select the **+ Private Endpoint** button at the top of the page.
64
+
:::image type="content" source="./media/private-link-service/disable-public-access-main.png" alt-text="Screenshot showing the Public network access page with Disable option selected in the main page." lightbox="./media/event-hubs-firewall/disable-public-access-main.png":::
65
+
1. In the **Exception** section, specify whether you want to **allow trusted Microsoft services to access this resource**. See [Trusted Microsoft services](#trusted-microsoft-services) for details.
1. Select the **Azure subscription** in which you want to create the private endpoint.
61
78
2. Select the **resource group** for the private endpoint resource.
@@ -64,10 +81,10 @@ If you already have an Event Hubs namespace, you can create a private link conne
64
81
1. Select a **region** for the private endpoint. Your private endpoint must be in the same region as your virtual network, but can be in a different region from the private link resource that you're connecting to.
65
82
1. Select **Next: Resource >** button at the bottom of the page.
66
83
67
-
:::image type="content" source="./media/private-link-service/create-private-endpoint-basics-page.png" alt-text="Screenshot showing the Basics page of the Create private endpoint wizard.":::
84
+
:::image type="content" source="./media/private-link-service/create-private-endpoint-basics-page.png" alt-text="Screenshot showing the Basics page of the Create private endpoint wizard." lightbox="./media/private-link-service/create-private-endpoint-basics-page.png":::
68
85
8. On the **Resource** page, review settings, and select **Next: Virtual Network**.
69
86
70
-
:::image type="content" source="./media/private-link-service/create-private-endpoint-resource-page.png" alt-text="Screenshot showing the Resource page of the Create private endpoint wizard.":::
87
+
:::image type="content" source="./media/private-link-service/create-private-endpoint-resource-page.png" alt-text="Screenshot showing the Resource page of the Create private endpoint wizard." lightbox="./media/private-link-service/create-private-endpoint-resource-page.png":::
71
88
9. On the **Virtual Network** page, you select the subnet in a virtual network to where you want to deploy the private endpoint.
72
89
1. Select a **virtual network**. Only virtual networks in the currently selected subscription and location are listed in the drop-down list.
73
90
2. Select a **subnet** in the virtual network you selected.
@@ -76,15 +93,15 @@ If you already have an Event Hubs namespace, you can create a private link conne
76
93
1. For **Application security group**, select an existing application security group or create one that's to be associated with the private endpoint.
77
94
1. Select **Next: DNS >** button at the bottom of the page.
78
95
79
-
:::image type="content" source="./media/private-link-service/create-private-endpoint-configuration-page.png" alt-text="Screenshot showing the Virtual Network page of the Create private endpoint wizard.":::
96
+
:::image type="content" source="./media/private-link-service/create-private-endpoint-configuration-page.png" alt-text="Screenshot showing the Virtual Network page of the Create private endpoint wizard." lightbox="./media/private-link-service/create-private-endpoint-configuration-page.png":::
80
97
10. On the **DNS** page, select whether you want the private endpoint to be integrated with a private DNS zone, and then select **Next: Tags**.
81
98
1. On the **Tags** page, create any tags (names and values) that you want to associate with the private endpoint resource. Then, select **Review + create** button at the bottom of the page.
82
99
1. On the **Review + create**, review all the settings, and select **Create** to create the private endpoint.
83
100
84
-

101
+
:::image type="content" source="./media/private-link-service/create-private-endpoint-review-create-page.png" alt-text="Screenshot that shows the Review + create page.":::
85
102
12. Confirm that you see the private endpoint connection you created shows up in the list of endpoints. Refresh the page and switch to the **Private endpoint connections** tab. In this example, the private endpoint is auto-approved because you connected to an Azure resource in your directory and you have sufficient permissions.
86
103
87
-

104
+
:::image type="content" source="./media/private-link-service/private-endpoint-created.png" alt-text="Screenshot showing the Private endpoint connections page with the newly created private endpoint." lightbox="./media/private-link-service/private-endpoint-created.png":::
@@ -201,25 +218,24 @@ There are four provisioning states:
201
218
5. Go to the appropriate following section based on the operation you want to: approve, reject, or remove.
202
219
203
220
### Approve a private endpoint connection
221
+
204
222
1. If there are any connections that are pending, you see a connection listed with **Pending** in the provisioning state.
205
223
2. Select the **private endpoint** you wish to approve
206
224
3. Select the **Approve** button.
207
-
208
-
:::image type="content" source="./media/private-link-service/approve-private-endpoint.png" alt-text="Screenshot that shows the Private endpoint connections tab with the Approve button highlighted.":::
209
225
4. On the **Approve connection** page, add a comment (optional), and select **Yes**. If you select **No**, nothing happens.
210
226
5. You should see the status of the private endpoint connection in the list changed to **Approved**.
211
227
212
228
### Reject a private endpoint connection
213
229
214
230
1. If there are any private endpoint connections you want to reject, whether it's a pending request or existing connection, select the connection and select the **Reject** button.
215
231
216
-
:::image type="content" source="./media/private-link-service/private-endpoint-reject-button.png" alt-text="Screenshot that shows the Private endpoint connections tab with the Reject button highlighted.":::
232
+
:::image type="content" source="./media/private-link-service/private-endpoint-reject-button.png" alt-text="Screenshot that shows the Private endpoint connections tab with the Reject button highlighted." lightbox="./media/private-link-service/private-endpoint-reject-button.png":::
217
233
2. On the **Reject connection** page, enter a comment (optional), and select **Yes**. If you select **No**, nothing happens.
218
234
3. You should see the status of the private endpoint connection in the list changed to **Rejected**.
219
235
220
-
### Remove a private endpoint connection
236
+
### Delete a private endpoint connection
221
237
222
-
1. To remove a private endpoint connection, select it in the list, and select **Remove** on the toolbar.
238
+
1. To delete a private endpoint connection, select it in the list, and select **Delete** on the toolbar.
223
239
2. On the **Delete connection** page, select **Yes** to confirm the deletion of the private endpoint. If you select **No**, nothing happens.
224
240
3. You should see the status changed to **Disconnected**. Then, the endpoint disappears from the list.
0 commit comments