Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Suggestion: Add warning when deploying rules to existing Azure Firewall Policy #177

Closed
abdale opened this issue Sep 23, 2021 · 6 comments · Fixed by #178
Closed

Suggestion: Add warning when deploying rules to existing Azure Firewall Policy #177

abdale opened this issue Sep 23, 2021 · 6 comments · Fixed by #178
Assignees
Labels
committed Committed item feature Feature Requests

Comments

@abdale
Copy link
Contributor

abdale commented Sep 23, 2021

The issue:

image

When deploying to using an existing Firewall inside of an existing ESLZ setup, if during ESLZ deployment the DNS proxy was not enabled, the data management landing zone deployment fails as it requires the DNS proxy to be enabled. It might be an idea to include a warning here that please ensure DNS proxy is enabled in your existing firewall policy as seen below otherwise deployment will fail.

image

@abdale abdale added the feature Feature Requests label Sep 23, 2021
@marvinbuss
Copy link
Collaborator

marvinbuss commented Sep 23, 2021

Thanks @abdale. Can you please submit the exact error message that you are seeing?
Is this a validation error in the portal or something that happens when deploying the template?
Thanks!

@abdale
Copy link
Contributor Author

abdale commented Sep 23, 2021

I'll re-deploy and grab that error. This is not a validation error, it happened during deployment.

@marvinbuss
Copy link
Collaborator

Thanks @abdale! :)

@abdale
Copy link
Contributor Author

abdale commented Sep 23, 2021

Here's the error:

{"code":"DeploymentFailed","message":"At least one resource deployment operation failed. Please list deployment operations for details. Please see https://aka.ms/DeployOperations for usage details.","details":[{"code":"BadRequest","message":"{\r\n \"status\": \"Failed\",\r\n \"error\": {\r\n \"code\": \"FirewallPolicyNetworkRuleFqdnNotSupported\",\r\n \"message\": \"Invalid Rule Collection Group /subscriptions/28ff86d9-55b6-417c-9fda-6ff56a59d9ec/resourcegroups/abdale-vnethub-eastus2/providers/Microsoft.Network/firewallPolicies/abdale-azfwpolicy-eastus2/ruleCollectionGroups/networkrules-rulecollection. In order to use Fqdns in Network Rule Azure-NetworkRule-001, DNS Proxy must be enabled in Firewall Policy /subscriptions/28ff86d9-55b6-417c-9fda-6ff56a59d9ec/resourcegroups/abdale-vnethub-eastus2/providers/Microsoft.Network/firewallPolicies/abdale-azfwpolicy-eastus2.\"\r\n }\r\n}"}]}

Screenshot:

image

@marvinbuss
Copy link
Collaborator

Thanks @abdale! I will fix this later today and also introduce some improvements to overcome this issue.

@marvinbuss marvinbuss added the committed Committed item label Sep 24, 2021
@marvinbuss marvinbuss linked a pull request Sep 24, 2021 that will close this issue
@marvinbuss
Copy link
Collaborator

Please track changes here: #178 👍

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
committed Committed item feature Feature Requests
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants