-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for Network Access Control in SignalR #11777
Comments
@katbyte , you can close this issue as with this new #12434, this feature is completed. Thanks, @neil-yechenwei ! With this I can now officially complete my blog series 😁 For others, you can use the below code to implement NAC. Here is the official docs resource "azurerm_private_endpoint" "example" {
name = "example-privateendpoint"
resource_group_name = azurerm_resource_group.example.name
location = azurerm_resource_group.example.location
subnet_id = azurerm_subnet.example.id
private_service_connection {
name = "psc-sig-test"
is_manual_connection = false
private_connection_resource_id = azurerm_signalr_service.example.id
subresource_names = ["signalr"]
}
}
resource "azurerm_signalr_service_network_acl" "example" {
signalr_service_id = azurerm_signalr_service.example.id
default_action = "Deny"
public_network {
allowed_request_types = ["ClientConnection"]
}
private_endpoint {
id = azurerm_private_endpoint.example.id
allowed_request_types = ["ServerConnection"]
}
} |
Fixed via #12434 |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
New or Affected Resource(s)
Potential Terraform Configuration
Corresponds to the image below
References
The text was updated successfully, but these errors were encountered: