title | description | services | documentationcenter | author | manager | ms.service | ms.devlang | ms.custom | ms.topic | ms.date | ms.author |
---|---|---|---|---|---|---|---|---|---|---|---|
Azure Event Hubs Firewall Rules | Microsoft Docs |
Use Firewall Rules to allow connections from specific IP addresses to Azure Event Hubs. |
event-hubs |
spelluru |
timlt |
event-hubs |
na |
seodec18 |
article |
12/06/2018 |
spelluru |
For scenarios in which Azure Event Hubs should be only accessible from certain well-known sites, firewall rules enable you to configure rules for accepting traffic originating from specific IPv4 addresses. For example, these addresses may be those of a corporate NAT gateway.
If you are looking to setup your Event Hubs namespace such that it should receive traffic from only a specified range of IP addresses and reject everything else, then you can leverage a Firewall rule to block Event Hub endpoints from other IP addresses. For example, if you use Event Hubs with Azure Express Route, you can create a Firewall rule to restrict the traffic from your on-premises infrastructure IP addresses.
The IP filter rules are applied at the Event Hubs namespace level. Therefore, the rules apply to all connections from clients using any supported protocol.
Any connection attempt from an IP address that does not match an allowed IP rule on the Event Hubs namespace is rejected as unauthorized. The response does not mention the IP rule.
By default, the IP Filter grid in the portal for Event Hubs is empty. This default setting means that your event hub accepts connections from any IP address. This default setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
Warning
Implementing Firewalls can prevent other Azure services from interacting with Event Hubs.
Trusted Microsoft services are not supported when IP Filtering (Firewalls) are implemented, and will be made available soon.
Common Azure scenarios that don't work with IP Filtering (note that the list is NOT exhaustive) -
- Azure Monitor
- Azure Stream Analytics
- Integration with Azure Event Grid
- Azure IoT Hub Routes
- Azure IoT Device Explorer
- Azure Data Explorer
The below Microsoft services are required to be on a virtual network
- Azure Web Apps
- Azure Functions
Important
Firewall rules are supported in standard and dedicated tiers of Event Hubs. It's not supported in basic tier.
The following Resource Manager template enables adding an IP filter rule to an existing Event Hubs namespace.
Template parameters:
- ipMask is a single IPv4 address or a block of IP addresses in CIDR notation. For example, in CIDR notation 70.37.104.0/24 represents the 256 IPv4 addresses from 70.37.104.0 to 70.37.104.255, with 24 indicating the number of significant prefix bits for the range.
Note
While there are no deny rules possible, the Azure Resource Manager template has the default action set to "Allow" which doesn't restrict connections. When making Virtual Network or Firewalls rules, we must change the "defaultAction"
from
"defaultAction": "Allow"
to
"defaultAction": "Deny"
{
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"eventhubNamespaceName": {
"type": "string",
"metadata": {
"description": "Name of the Event Hubs namespace"
}
},
"location": {
"type": "string",
"metadata": {
"description": "Location for Namespace"
}
}
},
"variables": {
"namespaceNetworkRuleSetName": "[concat(parameters('eventhubNamespaceName'), concat('/', 'default'))]",
},
"resources": [
{
"apiVersion": "2018-01-01-preview",
"name": "[parameters('eventhubNamespaceName')]",
"type": "Microsoft.EventHub/namespaces",
"location": "[parameters('location')]",
"sku": {
"name": "Standard",
"tier": "Standard"
},
"properties": { }
},
{
"apiVersion": "2018-01-01-preview",
"name": "[variables('namespaceNetworkRuleSetName')]",
"type": "Microsoft.EventHub/namespaces/networkruleset",
"dependsOn": [
"[concat('Microsoft.EventHub/namespaces/', parameters('eventhubNamespaceName'))]"
],
"properties": {
"virtualNetworkRules": [<YOUR EXISTING VIRTUAL NETWORK RULES>],
"ipRules":
[
{
"ipMask":"10.1.1.1",
"action":"Allow"
},
{
"ipMask":"11.0.0.0/24",
"action":"Allow"
}
],
"defaultAction": "Deny"
}
}
],
"outputs": { }
}
To deploy the template, follow the instructions for Azure Resource Manager.
For constraining access to Event Hubs to Azure virtual networks, see the following link: