-
Notifications
You must be signed in to change notification settings - Fork 20
Add specific NSGs for APIM and Container Apps with flow logs and Traffic Analytics #136
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
…w logs Co-authored-by: simonkurtz-MSFT <84809797+simonkurtz-MSFT@users.noreply.github.com>
🐍 Python 3.14 Results
|
Python 3.14 Detailed Test Results1 458 tests +6 1 458 ✅ +6 12s ⏱️ -7s Results for commit 309d543. ± Comparison against base commit ee33f72. This pull request removes 15 and adds 21 tests. Note that renamed tests count towards both.♻️ This comment has been updated with latest results. |
🐍 Python 3.13 Results
|
🐍 Python 3.12 Results
|
Python 3.12 Detailed Test Results1 458 tests +6 1 458 ✅ +6 16s ⏱️ -3s Results for commit 309d543. ± Comparison against base commit ee33f72. This pull request removes 15 and adds 21 tests. Note that renamed tests count towards both.♻️ This comment has been updated with latest results. |
Python 3.13 Detailed Test Results1 458 tests +6 1 458 ✅ +6 14s ⏱️ -5s Results for commit 309d543. ± Comparison against base commit ee33f72. This pull request removes 15 and adds 21 tests. Note that renamed tests count towards both.♻️ This comment has been updated with latest results. |
…w logs Co-authored-by: simonkurtz-MSFT <84809797+simonkurtz-MSFT@users.noreply.github.com>
…services' into copilot/add-nsg-rules-for-azure-services
API Management and Container Apps subnets used generic
nsg-defaultwithout ingress restrictions or flow logging. This creates specific NSGs enforcing least-privilege access with comprehensive monitoring.NSG Modules
Created reusable modules in
shared/bicep/modules/vnet/v1/:AzureFrontDoor.Backend) or App Gateway (subnet-based)All NSGs include priority 4096 deny-all inbound rule and required outbound connectivity (Storage, SQL, Key Vault, Azure Monitor for APIM).
Infrastructure Changes
afd-apim-pe: APIM subnet →
nsg-apim-pe(Front Door), ACA subnet →nsg-acaappgw-apim: Added deny-all rule to existing App Gateway NSG, ACA subnet →
nsg-acaappgw-apim-pe: APIM subnet →
nsg-apim-pe(App Gateway), App Gateway NSG enhanced, ACA subnet →nsg-acaAll three infrastructures now deploy:
Example Usage
Warning
Firewall rules blocked me from connecting to one or more addresses (expand for details)
I tried to connect to the following addresses, but was blocked by firewall rules:
aka.ms/usr/local/bin/bicep bicep build shared/bicep/modules/vnet/v1/nsg-apim-vnet.bicep(dns block)/usr/local/bin/bicep bicep build shared/bicep/modules/vnet/v1/nsg-apim-pe.bicep(dns block)/usr/local/bin/bicep bicep build shared/bicep/modules/vnet/v1/nsg-aca.bicep(dns block)eastus.data.mcr.microsoft.com/usr/local/bin/bicep bicep build infrastructure/appgw-apim/main.bicep(dns block)/usr/local/bin/bicep bicep build infrastructure/appgw-apim-pe/main.bicep(dns block)If you need me to access, download, or install something from one of these locations, you can either:
Original prompt
💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.