Skip to content

Commit 05bf08e

Browse files
Merge pull request #278313 from mumian/0614-postgresql
Add postgresql lock considerations
2 parents e1951df + 386686e commit 05bf08e

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/azure-resource-manager/management/lock-resources.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Protect your Azure resources with a lock
33
description: You can safeguard Azure resources from updates or deletions by locking all users and roles.
44
ms.topic: conceptual
5-
ms.date: 03/08/2024
5+
ms.date: 06/14/2024
66
ms.custom: devx-track-azurecli, devx-track-azurepowershell
77
content_well_notification:
88
- AI-contribution
@@ -101,6 +101,8 @@ Applying locks can lead to unexpected results. Some operations, which don't seem
101101

102102
- A cannot-delete lock on a **Virtual Machine** that is protected by **Site Recovery** prevents certain resource links related to Site Recovery from being removed properly when you remove the protection or disable replication. If you plan to protect the VM again later, you need to remove the lock before disabling protection. If you don't remove the lock, you need to follow certain steps to clean up the stale links before you can protect the VM. For more information, see [Troubleshoot Azure VM replication](../../site-recovery/azure-to-azure-troubleshoot-errors.md#replication-not-enabled-on-vm-with-stale-resources-error-code-150226).
103103

104+
- For **Postgresql**, the virtual network shouldn't have any resource locks set at the virtual network or subnet level, as locks may interfere with network and DNS operations. Before creating the server in a virtual network, ensure you remove any delete or read-only locks from your virtual network and all subnets. You can reapply the locks after the server is created.
105+
104106
## Who can create or delete locks
105107

106108
To create or delete management locks, you need access to `Microsoft.Authorization/*` or `Microsoft.Authorization/locks/*` actions. Users assigned to the **Owner** and the **User Access Administrator** roles have the required access. Some specialized built-in roles also grant this access. You can create a custom role with the required permissions.

0 commit comments

Comments
 (0)