Skip to content

Commit 40e95af

Browse files
committed
Update concepts-networking-private-link.md
1 parent d1aa7a5 commit 40e95af

File tree

1 file changed

+34
-12
lines changed

1 file changed

+34
-12
lines changed

articles/postgresql/flexible-server/concepts-networking-private-link.md

Lines changed: 34 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -12,12 +12,37 @@ ms.custom:
1212
ms.topic: conceptual
1313
---
1414

15-
# Azure Database for PostgreSQL - Flexible Server networking with Private Link - Preview
15+
# Azure Database for PostgreSQL - Flexible Server networking with Private Link
1616

1717
**Azure Private Link** allows you to create private endpoints for Azure Database for PostgreSQL flexible server to bring it inside your Virtual Network (virtual network). That functionality is introduced **in addition** to already [existing networking capabilities provided by VNET Integration](./concepts-networking-private.md), which is currently in general availability with Azure Database for PostgreSQL flexible server. With **Private Link**, traffic between your virtual network and the service travels the Microsoft backbone network. Exposing your service to the public internet is no longer necessary. You can create your own private link service in your virtual network and deliver it to your customers. Setup and consumption using Azure Private Link is consistent across Azure PaaS, customer-owned, and shared partner services.
1818

1919
> [!NOTE]
20-
> Azure Database for PostgreSQL flexible server supports Private Link based networking in Preview.
20+
> Azure Database for PostgreSQL flexible server supports Private Link based networking in General Availability in following regions:
21+
> * Canada East
22+
> * Poland Central
23+
> * Italy North
24+
> * South India
25+
> * UK West
26+
> * Japan West
27+
> * France South
28+
> * Qatar Central
29+
> * Jio India West
30+
> * Australia Central
31+
> * Korea South
32+
> * Switzerland West
33+
> * UAE Central
34+
> * Australia Central 2
35+
> * Germany North
36+
> * Norway West
37+
> * Brazil Southeast
38+
> * South Africa West
39+
>
40+
> **You can create new Azure Database for PostgreSQL - Flexible Server, with Azure Private Link based networking utilizing Private Endpoints in these above listed regions under General Availability.**
41+
> **In the rest of Azure regions where Azure Database for PostgreSQL - Flexible Server is available, Azure Database for PostgreSQL flexible server supports Private Link based networking in Preview at this time.**
42+
>
43+
> **Important Prerequisite for regions where this feature is in Preview** Azure Database for PostgreSQL flexible server support for Private Endpoints in Preview requires enablement of [**Azure Database for PostgreSQL flexible server Private Endpoint capability** preview feature in your subscription](../../azure-resource-manager/management/preview-features.md). Only **after preview feature is enabled** you can create servers which are PE capable, i.e. can be networked using Private Link.
44+
45+
2146

2247
Private Link is exposed to users through two Azure resource types:
2348

@@ -31,10 +56,6 @@ For a list to PaaS services that support Private Link functionality, review the
3156

3257
The same public service instance can be referenced by multiple private endpoints in different VNets/subnets, even if they belong to different users/subscriptions (including within differing Microsoft Entra ID tenants) or if they have overlapping address spaces.
3358

34-
> [!NOTE]
35-
> **Important Prerequisite:** Azure Database for PostgreSQL flexible server support for Private Endpoints in Preview requires enablement of [**Azure Database for PostgreSQL flexible server Private Endpoint capability** preview feature in your subscription](../../azure-resource-manager/management/preview-features.md).
36-
> Only **after preview feature is enabled** you can create servers which are PE capable, i.e. can be networked using Private Link.
37-
3859

3960
## Key Benefits of Azure Private Link
4061

@@ -58,23 +79,24 @@ Clients can connect to the private endpoint from the same VNet, peered VNet in s
5879

5980
In Preview of Private Endpoint for Azure Database for PostgreSQL flexible server, there are certain limitations as explain in cross feature availability matrix below.
6081

61-
Cross Feature Availability Matrix for preview of Private Endpoint in Azure Database for PostgreSQL flexible server.
82+
Cross Feature Availability Matrix for Private Endpoint in Azure Database for PostgreSQL flexible server.
6283

6384
| **Feature** | **Availability** | **Notes** |
6485
| --- | --- | --- |
6586
| High Availability (HA) | Yes |Works as designed |
66-
| Read Replica | No | |
87+
| Read Replica | Yes | **Limitation: support replica site swap only with single replica.**|
6788
| Point in Time Restore (PITR) | Yes |Works as designed |
6889
| Allowing also public/internet access with firewall rules | Yes | Works as designed|
6990
| Major Version Upgrade (MVU) | Yes | Works as designed |
7091
| Microsoft Entra Authentication (Entra Auth) | Yes | Works as designed |
7192
| Connection pooling with PGBouncer | Yes | Works as designed |
7293
| Private Endpoint DNS | Yes | Works as designed and [documented](../../private-link/private-endpoint-dns.md) |
94+
| Encryption with Customer Managed Keys (CMK)| Yes| Works as designed|
7395

7496

7597
### Connect from an Azure VM in Peered Virtual Network
7698

77-
Configure [VNet peering](../../virtual-network/tutorial-connect-virtual-networks-powershell.md) to establish connectivity to Azure Database for PostgreSQL flexible server from an Azure VM in a peered VNet.
99+
Configure [virtual network peering](../../virtual-network/tutorial-connect-virtual-networks-powershell.md) to establish connectivity to Azure Database for PostgreSQL flexible server from an Azure VM in a peered virtual network.
78100

79101
### Connect from an Azure VM in VNet-to-VNet environment
80102

@@ -89,7 +111,7 @@ To establish connectivity from an on-premises environment to the Azure Database
89111

90112
## Network Security and Private Link
91113

92-
When you use private endpoints, traffic is secured to a **private-link resource**. The platform validates network connections, allowing only those that reach the specified private-link resource. To access more subresources within the same Azure service, more private endpoints with corresponding targets are required. In the case of Azure Storage, for instance, you would need separate private endpoints to access the file and blob subresources.
114+
When you use private endpoints, traffic is secured to a **private-link resource**. The platform validates network connections, allowing only those connections that reach the specified private-link resource. To access more subresources within the same Azure service, more private endpoints with corresponding targets are required. In the case of Azure Storage, for instance, you would need separate private endpoints to access the file and blob subresources.
93115

94116
**Private endpoints** provide a privately accessible IP address for the Azure service, but don't necessarily restrict public network access to it. All other Azure services require another [access controls](../../event-hubs/event-hubs-ip-filtering.md), however. These controls provide an extra network security layer to your resources, providing protection that helps prevent access to the Azure service associated with the private-link resource.
95117

@@ -126,10 +148,10 @@ The following situations and outcomes are possible when you use Private Link in
126148

127149
## Troubleshooting connectivity issues with Private Endpoint based networking
128150

129-
Following are basic areas to check if you are having connectivity issues using Private Endpoint based networking:
151+
Following are basic areas to check if you're having connectivity issues using Private Endpoint based networking:
130152

131153
1. **Verify IP Address Assignments:** Check that the private endpoint has the correct IP address assigned and that there are no conflicts with other resources. For more information on private endpoint and IP see this [doc](../../private-link/manage-private-endpoint.md)
132-
2. **Check Network Security Groups (NSGs):** Review the NSG rules for the private endpoint's subnet to ensure the necessary traffic is allowed and does not have conflicting rules. For more information on NSG see this [doc](../../virtual-network/network-security-groups-overview.md)
154+
2. **Check Network Security Groups (NSGs):** Review the NSG rules for the private endpoint's subnet to ensure the necessary traffic is allowed and doesn't have conflicting rules. For more information on NSG see this [doc](../../virtual-network/network-security-groups-overview.md)
133155
3. **Validate Route Table Configuration:** Ensure the route tables associated with the private endpoint's subnet and the connected resources are correctly configured with the appropriate routes.
134156
4. **Use Network Monitoring and Diagnostics:** Leverage Azure Network Watcher to monitor and diagnose network traffic using tools like Connection Monitor or Packet Capture. For more information on network diagnostics see this [doc](../../network-watcher/network-watcher-overview.md)
135157

0 commit comments

Comments
 (0)