Skip to content

Commit 4e3dad4

Browse files
Merge pull request #219949 from GennadNY/gennadyk897
changes
2 parents cd188da + a9aabaf commit 4e3dad4

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

articles/postgresql/flexible-server/concepts-pgbouncer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ Utilizing an application side pool together with PgBouncer on the database serve
9292
* If you change the compute tier from General Purpose or Memory Optimized to Burstable tier, you will lose the PgBouncer capability.
9393
* Whenever the server is restarted during scale operations, HA failover, or a restart, the PgBouncer is also restarted along with the server virtual machine. Hence the existing connections have to be re-established.
9494
* Due to a known issue, the portal does not show all PgBouncer parameters. Once you enable PgBouncer and save the parameter, you have to exit Parameter screen (for example, click Overview) and then get back to Parameters page.
95-
* [SCRAM authentication](how-to-connect-scram.md) is not supported with PgBouncer.
95+
9696

9797
## Next steps
9898

articles/postgresql/flexible-server/how-to-connect-scram.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ To access the PostgreSQL database server using SCRAM method of authentication, y
8181
8. You can then connect from the client that supports SCRAM authentication to your server.
8282

8383
> [!Note]
84-
> SCRAM authentication is not supported when connected to the built-in managed [PgBouncer](concepts-pgbouncer.md).
84+
> SCRAM authentication is also supported when connected to the built-in managed [PgBouncer](concepts-pgbouncer.md). Above tutorial is valid for setting up connectivity using SCRAM authentication via built-in PgBouncer feature.
8585

8686
## Next steps
8787
- [Create and manage Azure Database for PostgreSQL - Flexible Server virtual network using Azure CLI](./how-to-manage-virtual-network-cli.md).

articles/postgresql/single-server/concepts-certificate-rotation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ The new certificate is rolled out and in effect starting December, 2022 (12/2022
2626

2727
## What change will be performed starting December 2022 (12/2022)?
2828

29-
Starting December 2022, the [BaltimoreCyberTrustRoot root certificate](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) will be replaced with a **compliant version** known as [DigiCertGlobalRootG2 root certificate ](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem). If your applications take advantage of **verify-ca** or **verify-full** as value of [**sslmode** parameter](https://www.postgresql.org/docs/current/libpq-ssl.html) in the database client connectivity will need to follow directions below to add new certificates to certificate store to maintain connectivity.
29+
Starting December 2022, the [BaltimoreCyberTrustRoot root certificate](https://www.digicert.com/CACerts/BaltimoreCyberTrustRoot.crt.pem) will be replaced with a **compliant version** known as [DigiCertGlobalRootG2 root certificate ](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt.pem). If your applications take advantage of **verify-ca** or **verify-full** as value of [**sslmode** parameter](https://www.postgresql.org/docs/current/libpq-ssl.html) in the database client connectivity will need to follow directions below to add new certificates to certificate store to maintain connectivity.
3030

3131
## Do I need to make any changes on my client to maintain connectivity?
3232

0 commit comments

Comments
 (0)