Hello @Ramadhas, Arun Chander,
Thanks for reaching out to Microsoft Q&A.
I understand you're experiencing an issue with Azure Firewall blocking access to the Power BI blob storage endpoint, even though the Network Rule permits the Storage service tag.
This behavior is expected, as Azure Firewall processes HTTPS traffic through Application Rules rather than Network Rules. The existing Network Rule with Service Tag = Storage is only applicable to protocols other than HTTP/S. To address this
- To enable the SHIR VM to access the Power BI Dataflow Blob Storage endpoint, please create an Application Rule permitting HTTPS traffic to
*.blob.core.windows.net. - It's recommended to use explicit FQDNs or FQDN tags rather than just service tags.
- You may also want to set up Azure Private Link for more secure and reliable access.
This allows HTTPS traffic from the SHIR VM to Azure Blob Storage, ensuring it is permitted and not dropped after the initial hop.
I noticed in your comment that you mentioned having an application rule.
Could you please check the destination configuration:
- Does the Application Rule specifically include
*.blob.core.windows.netor other Storage FQDNs? - If you’re using a broader Service Tag like Storage, keep in mind that Application Rules only support FQDNs or FQDN tags, not service tags.
Supporting document:
https://learn.microsoft.com/en-us/azure/firewall/rule-processing
Customer has performed the below step to resolve the issue
We identified a misroute where all Azure Storage traffic was being forced through the VPN gateway. After removing this route, the traffic is now reaching Microsoft Blob successfully without any issues. Thank you for your support.
Please validate the above and let us know if you still face the issue, please provide the requested information in private message.
Please "Accept the Answer" if the information helped you. This will help us and others in the community as well.