An Azure service that is used to develop microservices and orchestrate containers on Windows and Linux.
Hello @Abhay Punjabi
I've to address all your concerns listed out in small question and answer format below, kindly go through them one by one.
Why are these storage accounts being flagged?
Storage accounts under SFC_*GUID* resource groups are automatically created by Service Fabric Managed Clusters for diagnostics and operations. Because they’re created dynamically, they don’t always inherit network restrictions by default, which triggers security alerts.
How can we secure them if we didn’t create them?
You can apply network controls after creation:
- Allow access only from the VNETs/subnets used by your Service Fabric cluster
or - Use Network Security Perimeters (NSPs) to manage access with service-tag-based rules.
Do we need to allow anything else? Yes. The storage accounts must still allow required access for diagnostics, logging, and operational recovery scenarios used by the cluster.
Can we use NSPs instead of VNET rules?
Yes. NSPs are supported and are a good alternative. You can start in Learning mode to avoid alerts, then move to Enforced mode after validating in non-production.
What should we test first? Before applying changes in production, confirm:
- No cluster warnings related to diagnostics
- Logs remain accessible
- Normal cluster operations continue
What about Service Fabric Managed Clusters (SFMC)? For SFMC, you can associate the storage account directly with your NSP. Once configured, the linkage happens automatically.