You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/postgresql/flexible-server/concepts-networking-private-link.md
+34-12Lines changed: 34 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,12 +12,37 @@ ms.custom:
12
12
ms.topic: conceptual
13
13
---
14
14
15
-
# Azure Database for PostgreSQL - Flexible Server networking with Private Link - Preview
15
+
# Azure Database for PostgreSQL - Flexible Server networking with Private Link
16
16
17
17
**Azure Private Link** allows you to create private endpoints for Azure Database for PostgreSQL flexible server to bring it inside your Virtual Network (virtual network). That functionality is introduced **in addition** to already [existing networking capabilities provided by VNET Integration](./concepts-networking-private.md), which is currently in general availability with Azure Database for PostgreSQL flexible server. With **Private Link**, traffic between your virtual network and the service travels the Microsoft backbone network. Exposing your service to the public internet is no longer necessary. You can create your own private link service in your virtual network and deliver it to your customers. Setup and consumption using Azure Private Link is consistent across Azure PaaS, customer-owned, and shared partner services.
18
18
19
19
> [!NOTE]
20
-
> Azure Database for PostgreSQL flexible server supports Private Link based networking in Preview.
20
+
> Azure Database for PostgreSQL flexible server supports Private Link based networking in General Availability in following regions:
21
+
> * Canada East
22
+
> * Poland Central
23
+
> * Italy North
24
+
> * South India
25
+
> * UK West
26
+
> * Japan West
27
+
> * France South
28
+
> * Qatar Central
29
+
> * Jio India West
30
+
> * Australia Central
31
+
> * Korea South
32
+
> * Switzerland West
33
+
> * UAE Central
34
+
> * Australia Central 2
35
+
> * Germany North
36
+
> * Norway West
37
+
> * Brazil Southeast
38
+
> * South Africa West
39
+
>
40
+
> **You can create new Azure Database for PostgreSQL - Flexible Server, with Azure Private Link based networking utilizing Private Endpoints in these above listed regions under General Availability.**
41
+
> **In the rest of Azure regions where Azure Database for PostgreSQL - Flexible Server is available, Azure Database for PostgreSQL flexible server supports Private Link based networking in Preview at this time.**
42
+
>
43
+
> **Important Prerequisite for regions where this feature is in Preview** Azure Database for PostgreSQL flexible server support for Private Endpoints in Preview requires enablement of [**Azure Database for PostgreSQL flexible server Private Endpoint capability** preview feature in your subscription](../../azure-resource-manager/management/preview-features.md). Only **after preview feature is enabled** you can create servers which are PE capable, i.e. can be networked using Private Link.
44
+
45
+
21
46
22
47
Private Link is exposed to users through two Azure resource types:
23
48
@@ -31,10 +56,6 @@ For a list to PaaS services that support Private Link functionality, review the
31
56
32
57
The same public service instance can be referenced by multiple private endpoints in different VNets/subnets, even if they belong to different users/subscriptions (including within differing Microsoft Entra ID tenants) or if they have overlapping address spaces.
33
58
34
-
> [!NOTE]
35
-
> **Important Prerequisite:** Azure Database for PostgreSQL flexible server support for Private Endpoints in Preview requires enablement of [**Azure Database for PostgreSQL flexible server Private Endpoint capability** preview feature in your subscription](../../azure-resource-manager/management/preview-features.md).
36
-
> Only **after preview feature is enabled** you can create servers which are PE capable, i.e. can be networked using Private Link.
37
-
38
59
39
60
## Key Benefits of Azure Private Link
40
61
@@ -58,23 +79,24 @@ Clients can connect to the private endpoint from the same VNet, peered VNet in s
58
79
59
80
In Preview of Private Endpoint for Azure Database for PostgreSQL flexible server, there are certain limitations as explain in cross feature availability matrix below.
60
81
61
-
Cross Feature Availability Matrix for preview of Private Endpoint in Azure Database for PostgreSQL flexible server.
82
+
Cross Feature Availability Matrix for Private Endpoint in Azure Database for PostgreSQL flexible server.
62
83
63
84
|**Feature**|**Availability**|**Notes**|
64
85
| --- | --- | --- |
65
86
| High Availability (HA) | Yes |Works as designed |
66
-
| Read Replica |No||
87
+
| Read Replica |Yes|**Limitation: support replica site swap only with single replica.**|
67
88
| Point in Time Restore (PITR) | Yes |Works as designed |
68
89
| Allowing also public/internet access with firewall rules | Yes | Works as designed|
69
90
| Major Version Upgrade (MVU) | Yes | Works as designed |
70
91
| Microsoft Entra Authentication (Entra Auth) | Yes | Works as designed |
71
92
| Connection pooling with PGBouncer | Yes | Works as designed |
72
93
| Private Endpoint DNS | Yes | Works as designed and [documented](../../private-link/private-endpoint-dns.md)|
94
+
| Encryption with Customer Managed Keys (CMK)| Yes| Works as designed|
73
95
74
96
75
97
### Connect from an Azure VM in Peered Virtual Network
76
98
77
-
Configure [VNet peering](../../virtual-network/tutorial-connect-virtual-networks-powershell.md) to establish connectivity to Azure Database for PostgreSQL flexible server from an Azure VM in a peered VNet.
99
+
Configure [virtual network peering](../../virtual-network/tutorial-connect-virtual-networks-powershell.md) to establish connectivity to Azure Database for PostgreSQL flexible server from an Azure VM in a peered virtual network.
78
100
79
101
### Connect from an Azure VM in VNet-to-VNet environment
80
102
@@ -89,7 +111,7 @@ To establish connectivity from an on-premises environment to the Azure Database
89
111
90
112
## Network Security and Private Link
91
113
92
-
When you use private endpoints, traffic is secured to a **private-link resource**. The platform validates network connections, allowing only those that reach the specified private-link resource. To access more subresources within the same Azure service, more private endpoints with corresponding targets are required. In the case of Azure Storage, for instance, you would need separate private endpoints to access the file and blob subresources.
114
+
When you use private endpoints, traffic is secured to a **private-link resource**. The platform validates network connections, allowing only those connections that reach the specified private-link resource. To access more subresources within the same Azure service, more private endpoints with corresponding targets are required. In the case of Azure Storage, for instance, you would need separate private endpoints to access the file and blob subresources.
93
115
94
116
**Private endpoints** provide a privately accessible IP address for the Azure service, but don't necessarily restrict public network access to it. All other Azure services require another [access controls](../../event-hubs/event-hubs-ip-filtering.md), however. These controls provide an extra network security layer to your resources, providing protection that helps prevent access to the Azure service associated with the private-link resource.
95
117
@@ -126,10 +148,10 @@ The following situations and outcomes are possible when you use Private Link in
126
148
127
149
## Troubleshooting connectivity issues with Private Endpoint based networking
128
150
129
-
Following are basic areas to check if you are having connectivity issues using Private Endpoint based networking:
151
+
Following are basic areas to check if you're having connectivity issues using Private Endpoint based networking:
130
152
131
153
1.**Verify IP Address Assignments:** Check that the private endpoint has the correct IP address assigned and that there are no conflicts with other resources. For more information on private endpoint and IP see this [doc](../../private-link/manage-private-endpoint.md)
132
-
2.**Check Network Security Groups (NSGs):** Review the NSG rules for the private endpoint's subnet to ensure the necessary traffic is allowed and does not have conflicting rules. For more information on NSG see this [doc](../../virtual-network/network-security-groups-overview.md)
154
+
2.**Check Network Security Groups (NSGs):** Review the NSG rules for the private endpoint's subnet to ensure the necessary traffic is allowed and doesn't have conflicting rules. For more information on NSG see this [doc](../../virtual-network/network-security-groups-overview.md)
133
155
3.**Validate Route Table Configuration:** Ensure the route tables associated with the private endpoint's subnet and the connected resources are correctly configured with the appropriate routes.
134
156
4.**Use Network Monitoring and Diagnostics:** Leverage Azure Network Watcher to monitor and diagnose network traffic using tools like Connection Monitor or Packet Capture. For more information on network diagnostics see this [doc](../../network-watcher/network-watcher-overview.md)
0 commit comments