Skip to content

Commit 594c866

Browse files
committed
fix naming
1 parent d858392 commit 594c866

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

articles/mariadb/concepts-firewall-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Consider the following points when access to the Microsoft Azure Database for Ma
5757
* Get static IP addressing instead for your client computers, and then add the IP addresses as firewall rules.
5858

5959
* **Server's IP appears to be public:**
60-
Connections to the Azure Database for PostgreSQL server are routed through a publicly accessible Azure gateway. However, the actual server IP is not publicly accessible. For more information, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
60+
Connections to the Azure Database for MariaDB server are routed through a publicly accessible Azure gateway. However, the actual server IP is protected by the firewall. For more information, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
6161

6262
## Next steps
6363
- [Create and manage Azure Database for MariaDB firewall rules using the Azure portal](./howto-manage-firewall-portal.md)

articles/mysql/concepts-firewall-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Consider the following points when access to the Microsoft Azure Database for My
5555
* Get static IP addressing instead for your client computers, and then add the IP addresses as firewall rules.
5656

5757
* **Server's IP appears to be public:**
58-
Connections to the Azure Database for PostgreSQL server are routed through a publicly accessible Azure gateway. However, the actual server IP is not publicly accessible. For more information, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
58+
Connections to the Azure Database for MySQL server are routed through a publicly accessible Azure gateway. However, the actual server IP is protected by the firewall. For more information, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
5959

6060
## Next steps
6161

articles/postgresql/concepts-firewall-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Consider the following points when access to the Microsoft Azure Database for Po
5757
* Get static IP addressing instead for your client computers, and then add the static IP address as a firewall rule.
5858

5959
* **Server's IP appears to be public:**
60-
Connections to the Azure Database for PostgreSQL server are routed through a publicly accessible Azure gateway. However, the actual server IP is not publicly accessible. For more information, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
60+
Connections to the Azure Database for PostgreSQL server are routed through a publicly accessible Azure gateway. However, the actual server IP is protected by the firewall. For more information, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
6161

6262
## Next steps
6363
For articles on creating server-level and database-level firewall rules, see:

0 commit comments

Comments
 (0)