Hi @Chan Ratiyaponpun
Thank you for confirming the steps and sharing your Azure region (Southeast Asia) .
You're absolutely right: currently, Microsoft Purview’s AutoResolve Integration Runtime (IR) does not fall under service tags like DataFactory
, AzureConnectors
, or MicrosoftPurviewPolicyDistribution
. These tags do not cover all outbound traffic used by Purview when connecting to external sources like AWS Redshift.
To securely connect Purview to Redshift without allowing all IPs, the recommended approach is to:
- Deploy a Self-Hosted Integration Runtime (SHIR)
- Host it in your own Azure Virtual Network (in Southeast Asia).
- Route outbound traffic through a NAT Gateway or assign a static public IP.
- Add that public IP to your AWS Redshift security group (port 5439).
- This gives you predictable IP control, which is not possible with AutoResolve IR since it's managed and shared across Microsoft tenants.
Further Information:
- Microsoft does not publish a dedicated IP list for Purview AutoResolve IR.
- If you still prefer to use IP whitelisting with AutoResolve IR, you could extract all CIDRs from the Azure IP Ranges JSON for the Southeast Asia region, but this list can change weekly and may still not fully resolve the issue.
References:
https://learn.microsoft.com/en-us/purview/legacy/concept-best-practices-network
https://learn.microsoft.com/en-us/azure/virtual-network/service-tags-overview
If this is helpful, please click Accept Answer and kindly upvote it so that other people who faces similar issue may get benefitted from it.
Let me know if you have any further Queries.