Hi, Suki Azure,
I would like simple add answers of my collogues and answer to urs Q.
Is adding the customer's public IP to the Event Hub firewall sufficient?
Yes, but with caveats:
- Provides basic IP-based access control
- Lacks advanced security features (threat inspection, logging)
- Recommended to combine with SAS tokens for production workloads
Do I need an Azure Firewall rule too?
- Recommended for:
- Additional security layer
- Traffic logging/monitoring
- Future scalability (if more partners need access)
How to create the firewall rule? Use an Application Rule (not Network Rule):
# Create Application Rule
How does traffic flow with Azure Firewall?!
- Traffic path: Customer ->Azure Firewall (inspection) -> Event Hub
- Requires:
- A Route Table directing Event Hub traffic to Azure Firewall
- Firewall's public IP as the allowed IP in Event Hub firewall
- NAT rule if using Firewall's public IP (optional)
And at the end links for official MSFT doc's
- Azure Event Hub IP Filtering (Your Current Setup)
- Restrict access to Event Hubs using IP addresses
- Covers basic IP whitelisting configuration
- Azure Firewall Integration
- Azure Firewall application rules
- Explains FQDN-based filtering for services like Event Hub
- Combined Architecture
- Secure Azure PaaS services with Azure Firewall
- Specifically covers securing Event Hub behind Azure Firewall
- Routing Configuration
- Forced tunneling through Azure Firewall
- Explains how to route traffic properly
- Advanced Security
- Event Hub network security best practices
- Includes SAS token recommendations
- Cross-Tenant Considerations
Hope that's will finally show u all clear picture.
Best regards,
Alex
P.S. If my answer help to you, please Accept my answer