From 8e25fc7b3f50e67a4cc336f5efdc1836c56a4501 Mon Sep 17 00:00:00 2001 From: Cody Gagnon Date: Wed, 28 Aug 2024 05:58:07 -0700 Subject: [PATCH] note on disabling public network access (#27220) --- website/docs/r/servicebus_namespace.html.markdown | 2 ++ 1 file changed, 2 insertions(+) diff --git a/website/docs/r/servicebus_namespace.html.markdown b/website/docs/r/servicebus_namespace.html.markdown index dad83f7c8793..94d2d20cf3c4 100644 --- a/website/docs/r/servicebus_namespace.html.markdown +++ b/website/docs/r/servicebus_namespace.html.markdown @@ -99,6 +99,8 @@ A `network_rule_set` block supports the following: * `public_network_access_enabled` - (Optional) Whether to allow traffic over public network. Possible values are `true` and `false`. Defaults to `true`. +-> **Note:** To disable public network access, you must also configure the property `public_network_access_enabled`. + * `trusted_services_allowed` - (Optional) Are Azure Services that are known and trusted for this resource type are allowed to bypass firewall configuration? See [Trusted Microsoft Services](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/service-bus-messaging/includes/service-bus-trusted-services.md) * `ip_rules` - (Optional) One or more IP Addresses, or CIDR Blocks which should be able to access the ServiceBus Namespace.