Azure Event Hubs Firewall Rules - Azure Event Hubs (2023)

  • Article
  • 9 minutes to read

By default, Event Hubs namespaces are accessible from internet as long as the request comes with valid authentication and authorization. With IP firewall, you can restrict it further to only a set of IPv4 addresses or IPv4 address ranges in CIDR (Classless Inter-Domain Routing) notation.

This feature is helpful in scenarios in which Azure Event Hubs should be only accessible from certain well-known sites. Firewall rules enable you to configure rules to accept traffic originating from specific IPv4 addresses. For example, if you use Event Hubs with Azure Express Route, you can create a firewall rule to allow traffic from only your on-premises infrastructure IP addresses.

IP firewall rules

You specify IP firewall rules at the Event Hubs namespace level. So, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that doesn't match an allowed IP rule on the Event Hubs namespace is rejected as unauthorized. The response doesn't mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.

Important points

  • This feature isn't supported in the basic tier.
  • Turning on firewall rules for your Event Hubs namespace blocks incoming requests by default, unless requests originate from a service operating from allowed public IP addresses. Requests that are blocked include the requests from other Azure services, from the Azure portal, from logging and metrics services, and so on. As an exception, you can allow access to Event Hubs resources from certain trusted services even when the IP filtering is enabled. For a list of trusted services, see Trusted Microsoft services.
  • Specify at least one IP firewall rule or virtual network rule for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network. If there are no IP and virtual network rules, the namespace can be accessed over the public internet (using the access key).

Use Azure portal

When creating a namespace, you can either allow public only (from all networks) or private only (only via private endpoints) access to the namespace. Once the namespace is created, you can allow access from specific IP addresses or from specific virtual networks (using network service endpoints).

Configure public access when creating a namespace

To enable public access, select Public access on the Networking page of the namespace creation wizard.

Azure Event Hubs Firewall Rules - Azure Event Hubs (1)

After you create the namespace, select Networking on the left menu of the Event Hubs Namespace page. You see that All Networks option is selected. You can select Selected Networks option and allow access from specific IP addresses or specific virtual networks. The next section provides you details on configuring IP firewall to specify the IP addresses from which the access is allowed.

Configure IP firewall for an existing namespace

This section shows you how to use the Azure portal to create IP firewall rules for an Event Hubs namespace.

  1. Navigate to your Event Hubs namespace in the Azure portal.

  2. Select Networking under Settings on the left menu.

  3. On the Networking page, for Public network access, choose Selected networks option to allow access from only specified IP addresses.

    Here are more details about options available in the Public network access page:

    • Disabled. This option disables any public access to the namespace. The namespace is accessible only through private endpoints.

    • Selected networks. This option enables public access to the namespace using an access key from selected networks.

      Important

      If you choose Selected networks, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose Disabled if you want to restrict all traffic to this namespace over private endpoints only.

    • All networks (default). This option enables public access from all networks using an access key. If you select the All networks option, the event hub accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.

  4. To restrict access to specific IP addresses, select Selected networks option, and then follow these steps:

    1. In the Firewall section, select Add your client IP address option to give your current client IP the access to the namespace.

    2. For address range, enter a specific IPv4 address or a range of IPv4 address in CIDR notation.

      To restrict access to specific virtual networks, see Allow access from specific networks.

    3. Specify whether you want to allow trusted Microsoft services to bypass this firewall. See Trusted Microsoft services for details.

  5. Select Save on the toolbar to save the settings. Wait for a few minutes for the confirmation to show up on the portal notifications.

    Note

    To restrict access to specific virtual networks, see Allow access from specific networks.

Trusted Microsoft services

When you enable the AllowtrustedMicrosoftservicestobypassthisfirewall setting, the following services within the same tenant are granted access to your Event Hubs resources.

Trusted serviceSupported usage scenarios
Azure Event GridAllows Azure Event Grid to send events to event hubs in your Event Hubs namespace. You also need to do the following steps:
  • Enable system-assigned identity for a topic or a domain
  • Add the identity to the Azure Event Hubs Data Sender role on the Event Hubs namespace
  • Then, configure the event subscription that uses an event hub as an endpoint to use the system-assigned identity.

For more information, see Event delivery with a managed identity

Azure Monitor (Diagnostic Settings and Action Groups)Allows Azure Monitor to send diagnostic information and alert notifications to event hubs in your Event Hubs namespace. Azure Monitor can read from the event hub and also write data to the event hub.
Azure Data ExplorerAllows Azure Data Explorer to receive events from Event Hub using the Managed Identity of the cluster. You need to do the following steps:
  • Configure the Managed Identity on Azure Data Explorer
  • Grant the Event Hubs Data Receiver role to the identity, on the Event Hub
Azure Stream AnalyticsAllows an Azure Stream Analytics job to read data from (input) or write data to (output) event hubs in your Event Hubs namespace.

Important: The Stream Analytics job should be configured to use a managed identity to access the event hub. For more information, see Use managed identities to access Event Hub from an Azure Stream Analytics job (Preview).

Azure IoT HubAllows IoT Hub to send messages to event hubs in your Event Hub namespace. You also need to do the following steps:
  • Enable system-assigned identity for your IoT hub
  • Add the identity to the Azure Event Hubs Data Sender role on the Event Hubs namespace.
  • Then, configure the IoT Hub that uses an event hub as a custom endpoint to use the identity-based authentication.
Azure API Management

The API Management service allows you to send events to an event hub in your Event Hubs namespace.

  • You can trigger custom workflows by sending events to your event hub when an API is invoked by using the send-request policy.
  • You can also treat an event hub as your backend in an API. For a sample policy, see Authenticate using a managed identity to access an event hub. You also need to do the following steps:
    1. Enable system-assigned identity on the API Management instance. For instructions, see Use managed identities in Azure API Management.
    2. Add the identity to the Azure Event Hubs Data Sender role on the Event Hubs namespace
Azure IoT Central

Allows IoT Central to export data to event hubs in your Event Hub namespace. You also need to do the following steps:

  • Enable system-assigned identity for your IoT Central application.
  • Add the identity to the Azure Event Hubs Data Sender role on the Event Hubs namespace.
  • Then, configure the Event Hubs export destination on your IoT Central application to use identity-based authentication.

Use Resource Manager template

Important

The Firewall feature isn't supported in the basic tier.

The following Resource Manager template enables adding an IP filter rule to an existing Event Hubs namespace.

ipMask in the template is a single IPv4 address or a block of IP addresses in CIDR notation. For example, in CIDR notation 70.37.104.0/24 represents the 256 IPv4 addresses from 70.37.104.0 to 70.37.104.255, with 24 indicating the number of significant prefix bits for the range.

Note

The default value of the defaultAction is Allow. When adding virtual network or firewalls rules, make sure you set the defaultAction to Deny.

{ "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "1.0.0.0", "parameters": { "namespace_name": { "defaultValue": "contosoehub1333", "type": "String" } }, "variables": {}, "resources": [ { "type": "Microsoft.EventHub/namespaces", "apiVersion": "2022-01-01-preview", "name": "[parameters('namespace_name')]", "location": "East US", "sku": { "name": "Standard", "tier": "Standard", "capacity": 1 }, "properties": { "minimumTlsVersion": "1.2", "publicNetworkAccess": "Enabled", "disableLocalAuth": false, "zoneRedundant": true, "isAutoInflateEnabled": false, "maximumThroughputUnits": 0, "kafkaEnabled": true } }, { "type": "Microsoft.EventHub/namespaces/authorizationrules", "apiVersion": "2022-01-01-preview", "name": "[concat(parameters('namespace_name'), '/RootManageSharedAccessKey')]", "location": "eastus", "dependsOn": [ "[resourceId('Microsoft.EventHub/namespaces', parameters('namespace_name'))]" ], "properties": { "rights": [ "Listen", "Manage", "Send" ] } }, { "type": "Microsoft.EventHub/namespaces/networkRuleSets", "apiVersion": "2022-01-01-preview", "name": "[concat(parameters('namespace_name'), '/default')]", "location": "East US", "dependsOn": [ "[resourceId('Microsoft.EventHub/namespaces', parameters('namespace_name'))]" ], "properties": { "publicNetworkAccess": "Enabled", "defaultAction": "Deny", "virtualNetworkRules": [], "ipRules": [ { "ipMask": "10.1.1.1", "action": "Allow" }, { "ipMask": "11.0.0.0/24", "action": "Allow" }, { "ipMask": "172.72.157.204", "action": "Allow" } ] } } ]}

To deploy the template, follow the instructions for Azure Resource Manager.

Important

If there are no IP and virtual network rules, all the traffic flows into the namespace even if you set the defaultAction to deny. The namespace can be accessed over the public internet (using the access key). Specify at least one IP rule or virtual network rule for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network.

Use Azure CLI

Use az eventhubs namespace network-rule add, list, update, and remove commands to manage IP firewall rules for an Event Hubs namespace.

Use Azure PowerShell

Use the following Azure PowerShell commands to add, list, remove, update, and delete IP firewall rules.

  • Add-AzEventHubIPRule to add an IP firewall rule.
  • New-AzEventHubIPRuleConfig and Set-AzEventHubNetworkRuleSet together to add an IP firewall rule
  • Remove-AzEventHubIPRule to remove an IP firewall rule.

Default action and public network access

REST API

The default value of the defaultAction property was Deny for API version 2021-01-01-preview and earlier. However, the deny rule isn't enforced unless you set IP filters or virtual network (VNet) rules. That is, if you didn't have any IP filters or VNet rules, it's treated as Allow.

From API version 2021-06-01-preview onwards, the default value of the defaultAction property is Allow, to accurately reflect the service-side enforcement. If the default action is set to Deny, IP filters and VNet rules are enforced. If the default action is set to Allow, IP filters and VNet rules aren't enforced. The service remembers the rules when you turn them off and then back on again.

The API version 2021-06-01-preview onwards also introduces a new property named publicNetworkAccess. If it's set to Disabled, operations are restricted to private links only. If it's set to Enabled, operations are allowed over the public internet.

For more information about these properties, see Create or Update Network Rule Set and Create or Update Private Endpoint Connections.

Note

None of the above settings bypass validation of claims via SAS or Azure AD authentication. The authentication check always runs after the service validates the network checks that are configured by defaultAction, publicNetworkAccess, privateEndpointConnections settings.

Azure portal

Azure portal always uses the latest API version to get and set properties. If you had configured your namespace using 2021-01-01-preview and earlier with defaultAction set to Deny, and specified zero IP filters and VNet rules, the portal would have previously checked Selected Networks on the Networking page of your namespace. Now, it checks the All networks option.

Next steps

For constraining access to Event Hubs to Azure virtual networks, see the following link:

  • Virtual Network Service Endpoints for Event Hubs
Top Articles
Latest Posts
Article information

Author: Delena Feil

Last Updated: 10/17/2022

Views: 5284

Rating: 4.4 / 5 (45 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Delena Feil

Birthday: 1998-08-29

Address: 747 Lubowitz Run, Sidmouth, HI 90646-5543

Phone: +99513241752844

Job: Design Supervisor

Hobby: Digital arts, Lacemaking, Air sports, Running, Scouting, Shooting, Puzzles

Introduction: My name is Delena Feil, I am a clean, splendid, calm, fancy, jolly, bright, faithful person who loves writing and wants to share my knowledge and understanding with you.