Skip to content

Commit 74623a5

Browse files
authored
Merge pull request #93633 from ajlam/patch-1
Update firewall rules docs to include vnet
2 parents 78d9024 + e2242ed commit 74623a5

File tree

3 files changed

+17
-7
lines changed

3 files changed

+17
-7
lines changed

articles/mariadb/concepts-firewall-rules.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ajlam
55
ms.author: andrela
66
ms.service: mariadb
77
ms.topic: conceptual
8-
ms.date: 09/22/2019
8+
ms.date: 10/25/2019
99
---
1010

1111
# Azure Database for MariaDB server firewall rules
@@ -38,10 +38,13 @@ To allow applications from Azure to connect to your Azure Database for MariaDB s
3838
3939
![Configure Allow access to Azure services in the portal](./media/concepts-firewall-rules/allow-azure-services.png)
4040

41+
### Connecting from a VNet
42+
To connect securely to your Azure Database for MariaDB server from a VNet, consider using [VNet service endpoints](./concepts-data-access-security-vnet.md).
43+
4144
## Programmatically managing firewall rules
4245
In addition to the Azure portal, firewall rules can be managed programmatically by using the Azure CLI.
4346

44-
<!--See also [Create and manage Azure Database for MariaDB firewall rules using Azure CLI](./howto-manage-firewall-using-cli.md)-->
47+
See also [Create and manage Azure Database for MariaDB firewall rules using Azure CLI](./howto-manage-firewall-cli.md).
4548

4649
## Troubleshooting firewall issues
4750
Consider the following points when access to the Microsoft Azure Database for MariaDB server service does not behave as expected:
@@ -61,6 +64,5 @@ Connections to the Azure Database for MariaDB server are routed through a public
6164

6265
## Next steps
6366
- [Create and manage Azure Database for MariaDB firewall rules using the Azure portal](./howto-manage-firewall-portal.md)
64-
65-
<!--
66-
- [Create and manage Azure Database for MariaDB firewall rules using Azure CLI](./howto-manage-firewall-using-cli.md) -->
67+
- [Create and manage Azure Database for MariaDB firewall rules using Azure CLI](./howto-manage-firewall-cli.md)
68+
- [VNet service endpoints in Azure Database for MariaDB](./concepts-data-access-security-vnet.md)

articles/mysql/concepts-firewall-rules.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ajlam
55
ms.author: andrela
66
ms.service: mysql
77
ms.topic: conceptual
8-
ms.date: 09/22/2019
8+
ms.date: 10/25/2019
99
---
1010

1111
# Azure Database for MySQL server firewall rules
@@ -38,6 +38,9 @@ To allow applications from Azure to connect to your Azure Database for MySQL ser
3838
3939
![Configure Allow access to Azure services in the portal](./media/concepts-firewall-rules/allow-azure-services.png)
4040

41+
### Connecting from a VNet
42+
To connect securely to your Azure Database for MySQL server from a VNet, consider using [VNet service endpoints](./concepts-data-access-and-security-vnet.md).
43+
4144
## Programmatically managing firewall rules
4245
In addition to the Azure portal, firewall rules can be managed programmatically by using the Azure CLI. See also [Create and manage Azure Database for MySQL firewall rules using Azure CLI](./howto-manage-firewall-using-cli.md)
4346

@@ -61,3 +64,4 @@ Connections to the Azure Database for MySQL server are routed through a publicly
6164

6265
* [Create and manage Azure Database for MySQL firewall rules using the Azure portal](./howto-manage-firewall-using-portal.md)
6366
* [Create and manage Azure Database for MySQL firewall rules using Azure CLI](./howto-manage-firewall-using-cli.md)
67+
- [VNet service endpoints in Azure Database for MySQL](./concepts-data-access-and-security-vnet.md)

articles/postgresql/concepts-firewall-rules.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: rachel-msft
55
ms.author: raagyema
66
ms.service: postgresql
77
ms.topic: conceptual
8-
ms.date: 09/22/2019
8+
ms.date: 10/25/2019
99
---
1010
# Firewall rules in Azure Database for PostgreSQL - Single Server
1111
Azure Database for PostgreSQL server firewall prevents all access to your database server until you specify which computers have permission. The firewall grants access to the server based on the originating IP address of each request.
@@ -36,6 +36,9 @@ To allow applications from Azure to connect to your Azure Database for PostgreSQ
3636
3737
![Configure Allow access to Azure services in the portal](media/concepts-firewall-rules/allow-azure-services.png)
3838

39+
### Connecting from a VNet
40+
To connect securely to your Azure Database for PostgreSQL server from a VNet, consider using [VNet service endpoints](./concepts-data-access-and-security-vnet.md).
41+
3942
## Programmatically managing firewall rules
4043
In addition to the Azure portal, firewall rules can be managed programmatically using Azure CLI.
4144
See also [Create and manage Azure Database for PostgreSQL firewall rules using Azure CLI](howto-manage-firewall-using-cli.md)
@@ -63,3 +66,4 @@ Connections to the Azure Database for PostgreSQL server are routed through a pub
6366
For articles on creating server-level and database-level firewall rules, see:
6467
* [Create and manage Azure Database for PostgreSQL firewall rules using the Azure portal](howto-manage-firewall-using-portal.md)
6568
* [Create and manage Azure Database for PostgreSQL firewall rules using Azure CLI](howto-manage-firewall-using-cli.md)
69+
- [VNet service endpoints in Azure Database for PostgreSQL](./concepts-data-access-and-security-vnet.md)

0 commit comments

Comments
 (0)