Skip to content

Az.StackHCI Attestation firewall and network updates #16935

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Apr 2, 2022

Conversation

bnichms
Copy link
Contributor

@bnichms bnichms commented Jan 26, 2022

Description

Firewall rules for Attestation network to block all other traffic
Changes so Cluster ignores Attestation network

Checklist

  • I have read the Submitting Changes section of CONTRIBUTING.md
  • The title of the PR is clear and informative
  • The appropriate ChangeLog.md file(s) has been updated:
    • For any service, the ChangeLog.md file can be found at src/{{SERVICE}}/{{SERVICE}}/ChangeLog.md
    • A snippet outlining the change(s) made in the PR should be written under the ## Upcoming Release header -- no new version header should be added
  • The PR does not introduce breaking changes
  • If applicable, the changes made in the PR have proper test coverage
  • [NA] For public API changes to cmdlets:
    • a cmdlet design review was approved for the changes in this repository (Microsoft internal only)
      • {Please put the link here}
    • the markdown help files have been regenerated using the commands listed here

@bnichms bnichms force-pushed the user/bnichms/azshcifirewalletc branch from abc0660 to 76cfc18 Compare March 30, 2022 19:35
@bnichms bnichms changed the title Az.StackHCI No Admin Consent required, Firewall rule, and logging update Az.StackHCI Attestation firewall and network updates Mar 30, 2022
@bnichms bnichms marked this pull request as ready for review March 30, 2022 21:10
@isra-fel isra-fel self-assigned this Mar 31, 2022
Copy link
Member

@isra-fel isra-fel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@isra-fel
Copy link
Member

isra-fel commented Apr 1, 2022

/azp run azure-powershell - security-tools

@azure-pipelines
Copy link
Contributor

Azure Pipelines successfully started running 1 pipeline(s).

@isra-fel isra-fel merged commit 712b4c7 into Azure:main Apr 2, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants