Skip to content

Commit 16aa0db

Browse files
authored
Merge pull request #96811 from rohitnayakmsft/connectivitydocs
Doc updates based on supportability work items from case reviews
2 parents 2f57a53 + 93bec98 commit 16aa0db

File tree

3 files changed

+17
-7
lines changed

3 files changed

+17
-7
lines changed

articles/sql-database/sql-database-connect-query-ssms.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ In SMSS, connect to your Azure SQL Database server.
7171

7272
![connect to server](./media/sql-database-connect-query-ssms/connect.png)
7373

74-
3. Select **Options** in the **Connect to Server** dialog box. In the **Connect to database** drop-down menu, select **mySampleDatabase**.
74+
3. Select **Options** in the **Connect to Server** dialog box. In the **Connect to database** drop-down menu, select **mySampleDatabase**.If you leave the drop down to default, the connection is made to **master** database.
7575

7676
![connect to db on server](./media/sql-database-connect-query-ssms/options-connect-to-db.png)
7777

articles/sql-database/sql-database-connectivity-architecture.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,15 @@ The following steps describe how a connection is established to an Azure SQL dat
3333

3434
Azure SQL Database supports the following three options for the connection policy setting of a SQL Database server:
3535

36-
- **Redirect (recommended):** Clients establish connections directly to the node hosting the database. To enable connectivity, the clients must allow outbound firewall rules to all Azure IP addresses in the region using Network Security Groups (NSG) with [service tags](../virtual-network/security-overview.md#service-tags) for ports 11000-11999, not just the Azure SQL Database gateway IP addresses on port 1433. Because packets go directly to the database, latency and throughput have improved performance.
37-
- **Proxy:** In this mode, all connections are proxied via the Azure SQL Database gateways. To enable connectivity, the client must have outbound firewall rules that allow only the Azure SQL Database gateway IP addresses (usually two IP addresses per region). Choosing this mode can result in higher latency and lower throughput, depending on nature of the workload. We highly recommend the `Redirect` connection policy over the `Proxy` connection policy for the lowest latency and highest throughput.
38-
- **Default:** This is the connection policy in effect on all servers after creation unless you explicitly alter the connection policy to either `Proxy` or `Redirect`. The effective policy depends on whether connections originate from within Azure (`Redirect`) or outside of Azure (`Proxy`).
36+
- **Redirect (recommended):** Clients establish connections directly to the node hosting the database, leading to reduced latency and improved throughout. For connections to use this mode clients need to
37+
- Allow inbound and outbound communication from the client to all Azure IP addresses in the region on ports in the range of 11000 11999.
38+
- Allow inbound and outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
39+
40+
- **Proxy:** In this mode, all connections are proxied via the Azure SQL Database gateways,leading to increased latency and reduced throughout. For connections to use this mode clients need to allow inbound and outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
41+
42+
- **Default:** This is the connection policy in effect on all servers after creation unless you explicitly alter the connection policy to either `Proxy` or `Redirect`. The default policy is`Redirect` for all client connections originating inside of Azure (e.g. from an Azure Virtual Machine) and `Proxy`for all client connections originating inside ( e.g. connections from your local workstation)
43+
44+
We highly recommend the `Redirect` connection policy over the `Proxy` connection policy for the lowest latency and highest throughput.However, you will need to meet the additional requirements for allowing network traffic as outlined above. If the client is an Azure Virtual Machine you can accomplish this using Network Security Groups (NSG) with [service tags](../virtual-network/security-overview.md#service-tags). If the client is connecting from a workstation on-premises then you may need to work with your network admin to allow network traffic through your corporate firewall.
3945

4046
## Connectivity from within Azure
4147

@@ -50,7 +56,7 @@ If you are connecting from outside Azure, your connections have a connection pol
5056
![architecture overview](./media/sql-database-connectivity-architecture/connectivity-onprem.png)
5157

5258
> [!IMPORTANT]
53-
> Additionally open ports 14000-14999 to enable [Connecting with DAC](https://docs.microsoft.com/en-us/sql/database-engine/configure-windows/diagnostic-connection-for-database-administrators?view=sql-server-2017#connecting-with-dac)
59+
> Additionally open ports 14000-14999 to enable [Connecting with DAC](https://docs.microsoft.com/sql/database-engine/configure-windows/diagnostic-connection-for-database-administrators?view=sql-server-2017#connecting-with-dac)
5460
5561

5662
## Azure SQL Database gateway IP addresses

articles/sql-database/sql-database-firewall-configure.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -185,8 +185,10 @@ The following example uses PowerShell to set a server-level IP firewall rule:
185185
```powershell
186186
New-AzSqlServerFirewallRule -ResourceGroupName "myResourceGroup" `
187187
-ServerName $servername `
188-
-FirewallRuleName "AllowSome" -StartIpAddress "0.0.0.0" -EndIpAddress "0.0.0.0"
188+
-FirewallRuleName "ContosoIPRange" -StartIpAddress "192.168.1.0" -EndIpAddress "192.168.1.255"
189189
```
190+
> [!TIP]
191+
> For $servername specify the server name and not the fully qualified DNS name e.g. specify **mysqldbserver** instead of **mysqldbserver.database.windows.net**
190192
191193
> [!TIP]
192194
> For PowerShell examples in the context of a quickstart, see [Create DB - PowerShell](sql-database-powershell-samples.md) and [Create a single database and configure a SQL Database server-level IP firewall rule using PowerShell](scripts/sql-database-create-and-configure-database-powershell.md).
@@ -205,8 +207,10 @@ The following example uses CLI to set a server-level IP firewall rule:
205207

206208
```azurecli-interactive
207209
az sql server firewall-rule create --resource-group myResourceGroup --server $servername \
208-
-n AllowYourIp --start-ip-address 0.0.0.0 --end-ip-address 0.0.0.0
210+
-n ContosoIPRange --start-ip-address 192.168.1.0 --end-ip-address 192.168.1.255
209211
```
212+
> [!TIP]
213+
> For $servername specify the server name and not the fully qualified DNS name e.g. specify **mysqldbserver** instead of **mysqldbserver.database.windows.net**
210214
211215
> [!TIP]
212216
> For a CLI example in the context of a quickstart, see [Create DB - Azure CLI](sql-database-cli-samples.md) and [Create a single database and configure a SQL Database IP firewall rule using the Azure CLI](scripts/sql-database-create-and-configure-database-cli.md).

0 commit comments

Comments
 (0)