Skip to content

Commit 7083d88

Browse files
committed
Adding new content for private link
1 parent 4975f64 commit 7083d88

11 files changed

+37
-33
lines changed

articles/mariadb/concepts-data-access-security-private-link.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,12 @@ author: kummanish
55
ms.author: manishku
66
ms.service: mariadb
77
ms.topic: conceptual
8-
ms.date: 01/05/2020
8+
ms.date: 01/09/2020
99
---
1010

1111
# Private Link for Azure Database for MariaDB (Preview)
1212

13-
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside the customer’s private VNet. The PaaS resources can be accessed using the private IP address just like any other resource in the VNet. This significantly simplifies the network configuration by keeping access rules private.
13+
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside the customer’s private VNet. The PaaS resources can be accessed using the private IP address just like any other resource in the VNet.
1414

1515
For a list to PaaS services that support Private Link functionality, go to the [Private Link Documentation page](https://docs.microsoft.com/azure/private-link/index). A private endpoint is a private IP address within a specific [VNet](https://docs.microsoft.com/azure/virtual-network/virtual-networks-overview) and Subnet.
1616

@@ -19,15 +19,16 @@ For a list to PaaS services that support Private Link functionality, go to the [
1919
2020
## Data exfiltration prevention
2121

22-
Data ex-filtration in Azure Database for MariaDB is when an authorized user, such as a database admin is able extract data from one system and move it another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
22+
Data ex-filtration in Azure Database for MariaDB is when an authorized user, such as a database admin is able to extract data from one system and move it to another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
2323

2424
Consider a scenario with a user running MariaDB workbench inside an Azure VM connecting to an Azure Database for MariaDB instance. This MariaDB instance is in the West US data center. The example below shows how to limit access with public endpoints on Azure Database for MariaDB using network access controls.
2525

2626
* Disable all Azure service traffic to Azure Database for MariaDB via the public endpoint by setting Allow Azure Services to OFF. Ensure no IP addresses are allowed in the server either via [firewall rules](https://docs.microsoft.com/azure/mariadb/concepts-firewall-rules) or [virtual network service endpoints](https://docs.microsoft.com/azure/mariadb/concepts-data-access-and-security-vnet).
2727

28-
* Only allow traffic to the Azure Database for MariaDB using the Private IP address of the VM. For more information, see the articles on Service Endpoint and VNet firewall rules.
28+
* Only allow traffic to the Azure Database for MariaDB using the Private IP address of the VM. For more information, see the articles on [Service Endpoint](concepts-data-access-security-vnet.md) and [VNet firewall rules](howto-manage-vnet-portal.md).
29+
30+
* On the Azure VM, narrow down the scope of outgoing connection by using Network Security Groups (NSGs) and Service Tags as follows:
2931

30-
* On the Azure VM, narrow down the scope of outgoing connection by using Network Security Groups (NSGs) and Service Tags as follows
3132
* Specify an NSG rule to allow traffic for Service Tag = SQL.WestUs - only allowing connection to Azure Database for MariaDB in West US
3233
* Specify an NSG rule (with a higher priority) to deny traffic for Service Tag = SQL - denying connections to MariaDB Database in all regions</br></br>
3334

@@ -41,7 +42,7 @@ When customers connect to the public endpoint from on-premises machines, their I
4142

4243
With Private Link, customers can enable cross-premises access to the private endpoint using ExpressRoute, private peering, or VPN tunneling. Customers can then disable all access via the public endpoint and not use the IP-based firewall to allow any IP addresses.
4344

44-
With Private Link, customers can enable cross-premises access to the private endpoint using Express Route (ER) private peering or VPN tunnel. They can subsequently disable all access via public endpoint and not use the IP-based firewall.
45+
With Private Link, customers can enable cross-premises access to the private endpoint using [Express Route](https://azure.microsoft.com/services/expressroute/) (ER), private peering or [VPN tunnel](https://docs.microsoft.com/azure/vpn-gateway/). They can subsequently disable all access via public endpoint and not use the IP-based firewall.
4546

4647
## How to set up Private Link for Azure Database for MariaDB
4748

articles/mariadb/howto-configure-privatelink-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kummanish
55
ms.author: manishku
66
ms.service: mariadb
77
ms.topic: conceptual
8-
ms.date: 01/05/2020
8+
ms.date: 01/09/2020
99
---
1010

1111
# Create and manage Private Link for Azure Database for MariaDB (Preview) using CLI

articles/mariadb/howto-configure-privatelink-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kummanish
55
ms.author: manishku
66
ms.service: mariadb
77
ms.topic: conceptual
8-
ms.date: 01/05/2020
8+
ms.date: 01/09/2020
99
---
1010

1111
# Create and manage Private Link for Azure Database for MariaDB (Preview) using Portal
@@ -90,7 +90,7 @@ In this section, you will create a Virtual Network and the subnet to host the VM
9090

9191
1. When you see the **Validation passed** message, select **Create**.
9292

93-
## Create an Azure Database for MariaDB Single server
93+
## Create an Azure Database for MariaDB
9494

9595
In this section, you will create an Azure Database for MariaDB server in Azure.
9696

articles/mysql/concepts-data-access-security-private-link.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,12 @@ author: kummanish
55
ms.author: manishku
66
ms.service: mysql
77
ms.topic: conceptual
8-
ms.date: 01/05/2020
8+
ms.date: 01/09/2020
99
---
1010

1111
# Private Link for Azure Database for MySQL (Preview)
1212

13-
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside the customer’s private VNet. The PaaS resources can be accessed using the private IP address just like any other resource in the VNet. This significantly simplifies the network configuration by keeping access rules private.
13+
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside the customer’s private VNet. The PaaS resources can be accessed using the private IP address just like any other resource in the VNet.
1414

1515
For a list to PaaS services that support Private Link functionality, go to the [Private Link Documentation page](https://docs.microsoft.com/azure/private-link/index). A private endpoint is a private IP address within a specific [VNet](https://docs.microsoft.com/azure/virtual-network/virtual-networks-overview) and Subnet.
1616

@@ -19,29 +19,30 @@ For a list to PaaS services that support Private Link functionality, go to the [
1919
2020
## Data exfiltration prevention
2121

22-
Data ex-filtration in Azure Database for MySQL is when an authorized user, such as a database admin is able extract data from one system and move it another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
22+
Data ex-filtration in Azure Database for MySQL is when an authorized user, such as a database admin is able to extract data from one system and move it to another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
2323

2424
Consider a scenario with a user running MySQL workbench inside an Azure VM connecting to an Azure Database for MySQL. This MySQL instance is in the West US data center. The example below shows how to limit access with public endpoints on Azure Database for MySQL using network access controls.
2525

2626
* Disable all Azure service traffic to Azure Database for MySQL via the public endpoint by setting Allow Azure Services to OFF. Ensure no IP addresses are allowed in the server either via [firewall rules](https://docs.microsoft.com/azure/mysql/concepts-firewall-rules) or [virtual network service endpoints](https://docs.microsoft.com/azure/mysql/concepts-data-access-and-security-vnet).
2727

28-
* Only allow traffic to the Azure Database for MySQL using the Private IP address of the VM. For more information, see the articles on Service Endpoint and VNet firewall rules.
28+
* Only allow traffic to the Azure Database for MySQL using the Private IP address of the VM. For more information, see the articles on [Service Endpoint](concepts-data-access-and-security-vnet.md) and [VNet firewall rules](howto-manage-vnet-using-portal.md).
29+
30+
* On the Azure VM, narrow down the scope of outgoing connection by using Network Security Groups (NSGs) and Service Tags as follows
2931

30-
* On the Azure VM, narrow down the scope of outgoing connection by using Network Security Groups (NSGs) and Service Tags as follows
3132
* Specify an NSG rule to allow traffic for Service Tag = SQL.WestUs - only allowing connection to Azure Database for MySQL in West US
3233
* Specify an NSG rule (with a higher priority) to deny traffic for Service Tag = SQL - denying connections to MySQL Database in all regions</br></br>
3334

34-
At the end of this setup, the Azure VM can connect only to Azure Database for MySQL in the West US region. However, the connectivity isn't restricted to a single Azure Database for MySQL Single server. The VM can still connect to any Azure Database for MySQL in the West US region, including the databases that aren't part of the subscription. While we've reduced the scope of data exfiltration in the above scenario to a specific region, we haven't eliminated it altogether.</br>
35+
At the end of this setup, the Azure VM can connect only to Azure Database for MySQL in the West US region. However, the connectivity isn't restricted to a single Azure Database for MySQL. The VM can still connect to any Azure Database for MySQL in the West US region, including the databases that aren't part of the subscription. While we've reduced the scope of data exfiltration in the above scenario to a specific region, we haven't eliminated it altogether.</br>
3536

36-
With Private Link, customers can now set up network access controls like NSGs to restrict access to the private endpoint. Individual Azure PaaS resources are then mapped to specific private endpoints. A malicious insider can only access the mapped PaaS resource (for example an Azure Database for MySQL Single server) and no other resource.
37+
With Private Link, customers can now set up network access controls like NSGs to restrict access to the private endpoint. Individual Azure PaaS resources are then mapped to specific private endpoints. A malicious insider can only access the mapped PaaS resource (for example an Azure Database for MySQL) and no other resource.
3738

3839
## On-premises connectivity over private peering
3940

4041
When customers connect to the public endpoint from on-premises machines, their IP address needs to be added to the IP-based firewall using a Server-level firewall rule. While this model works well for allowing access to individual machines for dev or test workloads, it's difficult to manage in a production environment.
4142

4243
With Private Link, customers can enable cross-premises access to the private endpoint using ExpressRoute, private peering, or VPN tunneling. Customers can then disable all access via the public endpoint and not use the IP-based firewall to allow any IP addresses.
4344

44-
With Private Link, customers can enable cross-premises access to the private endpoint using Express Route (ER) private peering or VPN tunnel. They can subsequently disable all access via public endpoint and not use the IP-based firewall.
45+
With Private Link, customers can enable cross-premises access to the private endpoint using [Express Route](https://azure.microsoft.com/services/expressroute/) (ER), private peering or [VPN tunnel](https://docs.microsoft.com/azure/vpn-gateway/). They can subsequently disable all access via public endpoint and not use the IP-based firewall.
4546

4647
## How to set up Private Link for Azure Database for MySQL
4748

articles/mysql/howto-configure-privatelink-cli.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kummanish
55
ms.author: manishku
66
ms.service: mysql
77
ms.topic: conceptual
8-
ms.date: 01/05/2020
8+
ms.date: 01/09/2020
99
---
1010

1111
# Create and manage Private Link for Azure Database for MySQL (Preview) using CLI
@@ -163,9 +163,9 @@ Connect to the VM *myVm* from the internet as follows:
163163
| Setting | Value |
164164
| ------- | ----- |
165165
| Connection Name| Select the connection name of your choice.|
166-
| Hostname | Select *mydemoserver.mariadb.privatelink.database.azure.com* |
167-
| Username | Enter username as *username@servername* which is provided during the MariaDB server creation. |
168-
| Password | Enter a password provided during the MariaDB server creation. |
166+
| Hostname | Select *mydemoserver.mysql.privatelink.database.azure.com* |
167+
| Username | Enter username as *username@servername* which is provided during the MySQL server creation. |
168+
| Password | Enter a password provided during the MySQL server creation. |
169169
||
170170
171171
5. Select Connect.

articles/mysql/howto-configure-privatelink-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kummanish
55
ms.author: manishku
66
ms.service: mysql
77
ms.topic: conceptual
8-
ms.date: 01/05/2020
8+
ms.date: 01/09/2020
99
---
1010

1111
# Create and manage Private Link for Azure Database for MySQL (Preview) using Portal
@@ -90,7 +90,7 @@ In this section, you will create a Virtual Network and the subnet to host the VM
9090

9191
1. When you see the **Validation passed** message, select **Create**.
9292

93-
## Create an Azure Database for MySQL Single server
93+
## Create an Azure Database for MySQL
9494

9595
In this section, you will create an Azure Database for MySQL server in Azure.
9696

articles/postgresql/concepts-data-access-and-security-private-link.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,12 @@ author: kummanish
55
ms.author: manishku
66
ms.service: postgresql
77
ms.topic: conceptual
8-
ms.date: 12/23/2019
8+
ms.date: 01/09/2020
99
---
1010

1111
# Private Link for Azure Database for PostgreSQL-Single server (Preview)
1212

13-
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside the customer’s private VNet. The PaaS resources can be accessed using the private IP address just like any other resource in the VNet. This significantly simplifies the network configuration by keeping access rules private.
13+
Private Link allows you to connect to various PaaS services in Azure via a private endpoint. Azure Private Link essentially brings Azure services inside the customer’s private VNet. The PaaS resources can be accessed using the private IP address just like any other resource in the VNet.
1414

1515
For a list to PaaS services that support Private Link functionality, go to the [Private Link Documentation page](https://docs.microsoft.com/azure/private-link/index). A private endpoint is a private IP address within a specific [VNet](https://docs.microsoft.com/azure/virtual-network/virtual-networks-overview) and Subnet.
1616

@@ -19,15 +19,16 @@ For a list to PaaS services that support Private Link functionality, go to the [
1919
2020
## Data exfiltration prevention
2121

22-
Data ex-filtration in Azure Database for PostgreSQL Single server is when an authorized user, such as a database admin is able extract data from one system and move it another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
22+
Data ex-filtration in Azure Database for PostgreSQL Single server is when an authorized user, such as a database admin is able to extract data from one system and move it to another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
2323

2424
Consider a scenario with a user running PostgreSQL Single server workbench inside an Azure VM connecting to an Azure Database for PostgreSQL Single server instance. This PostgreSQL Single server instance is in the West US data center. The example below shows how to limit access with public endpoints on Azure Database for PostgreSQL Single server using network access controls.
2525

2626
* Disable all Azure service traffic to Azure Database for PostgreSQL Single server via the public endpoint by setting Allow Azure Services to OFF. Ensure no IP addresses are allowed in the server either via [firewall rules](https://docs.microsoft.com/azure/postgresql/concepts-firewall-rules) or [virtual network service endpoints](https://docs.microsoft.com/azure/postgresql/concepts-data-access-and-security-vnet).
2727

28-
* Only allow traffic to the Azure Database for PostgreSQL Single server using the Private IP address of the VM. For more information, see the articles on Service Endpoint and VNet firewall rules.
28+
* Only allow traffic to the Azure Database for PostgreSQL Single server using the Private IP address of the VM. For more information, see the articles on [Service Endpoint](concepts-data-access-and-security-vnet.md) and [VNet firewall rules.](howto-manage-vnet-using-portal.md)
29+
30+
* On the Azure VM, narrow down the scope of outgoing connection by using Network Security Groups (NSGs) and Service Tags as follows
2931

30-
* On the Azure VM, narrow down the scope of outgoing connection by using Network Security Groups (NSGs) and Service Tags as follows
3132
* Specify an NSG rule to allow traffic for Service Tag = SQL.WestUs - only allowing connection to Azure Database for PostgreSQL Single server in West US
3233
* Specify an NSG rule (with a higher priority) to deny traffic for Service Tag = SQL - denying connections to PostgreSQL Database in all regions</br></br>
3334

@@ -39,7 +40,8 @@ With Private Link, customers can now set up network access controls like NSGs to
3940

4041
When customers connect to the public endpoint from on-premises machines, their IP address needs to be added to the IP-based firewall using a Server-level firewall rule. While this model works well for allowing access to individual machines for dev or test workloads, it's difficult to manage in a production environment.
4142

42-
With Private Link, customers can enable cross-premises access to the private endpoint using ExpressRoute, private peering, or VPN tunneling. Customers can then disable all access via the public endpoint and not use the IP-based firewall to allow any IP addresses.
43+
With Private Link, customers can enable cross-premises access to the private endpoint using [Express Route](https://azure.microsoft.com/services/expressroute/) (ER), private peering or [VPN tunnel](https://docs.microsoft.com/azure/vpn-gateway/). They can subsequently disable all access via public endpoint and not use the IP-based firewall.
44+
4345

4446
With Private Link, customers can enable cross-premises access to the private endpoint using Express Route (ER) private peering or VPN tunnel. They can subsequently disable all access via public endpoint and not use the IP-based firewall.
4547

articles/postgresql/howto-configure-privatelink-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kummanish
55
ms.author: manishku
66
ms.service: postgresql
77
ms.topic: conceptual
8-
ms.date: 01/04/2020
8+
ms.date: 01/09/2020
99
---
1010

1111
# Create and manage Private Link for Azure Database for PostgreSQL - Single server (Preview) using CLI

articles/postgresql/howto-configure-privatelink-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kummanish
55
ms.author: manishku
66
ms.service: postgresql
77
ms.topic: conceptual
8-
ms.date: 01/04/2020
8+
ms.date: 01/09/2020
99
---
1010

1111
# Create and manage Private Link for Azure Database for PostgreSQL - Single server (Preview) using Portal

articles/private-link/private-endpoint-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: malopMSFT
77

88
ms.service: private-link
99
ms.topic: conceptual
10-
ms.date: 09/16/2019
10+
ms.date: 01/09/2020
1111
ms.author: allensu
1212
---
1313
# What is Azure Private Endpoint?

0 commit comments

Comments
 (0)