-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for "public network access" and firewall rules in Event Grid #9400
Comments
Hi @piotrgwiazda, i'm currently working on a solution for your issue. But i think the az-cli command you've depicted above is not working. As it seems, inbound-ip-rules can only be applied if public-network-access is set to |
Hi. You are right that the |
@piotrgwiazda Alright. You'll have to wait until the first PR is accepted as it's the common base. I'll start with an implementation tomorrow, but i think it will take some time as the private endpoints configuration model is not trivial. |
The Private Endpoint configuration for Event Grid works fine with the
For standalone topic:
Configuration of IP filters is a separate configuration. Correct. |
Yes, you're right. Here an example how to use it if one is searching for it. resource "azurerm_eventgrid_domain" "example" {
name = "example-domain"
location = azurerm_resource_group.example.location
resource_group_name = azurerm_resource_group.example.name
}
resource "azurerm_virtual_network" "example" {
name = "example-vnet"
address_space = ["10.0.0.0/16"]
location = azurerm_resource_group.example.location
resource_group_name = azurerm_resource_group.example.name
}
resource "azurerm_subnet" "example" {
name = "example-subnet"
resource_group_name = azurerm_resource_group.example.name
virtual_network_name = azurerm_virtual_network.example.name
address_prefixes = ["10.0.1.0/24"]
enforce_private_link_endpoint_network_policies = true
}
resource "azurerm_private_endpoint" "example" {
name = "example-endpoint"
location = azurerm_resource_group.example.location
resource_group_name = azurerm_resource_group.example.name
subnet_id = azurerm_subnet.example.id
private_service_connection {
name = "example-privateserviceconnection"
private_connection_resource_id = azurerm_eventgrid_domain.example.id
is_manual_connection = false
subresource_names = ["domain"]
}
} If the related PR is merged, one is able to disable Public Network access via Terraform as well. |
Co-authored-by: kt <[email protected]> Fixes #9400
This has been released in version 2.43.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example: provider "azurerm" {
version = "~> 2.43.0"
}
# ... other configuration ... |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
Community Note
Description
Please add the support for
Just like in
New or Affected Resource(s)
Potential Terraform Configuration
Just follow the same pattern as in databases (PostgreSQL, Azure SQL etc) or event hub/service bus.
References
https://docs.microsoft.com/en-us/azure/event-grid/configure-firewall
The text was updated successfully, but these errors were encountered: