You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/mariadb/concepts-firewall-rules.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: ajlam
5
5
ms.author: andrela
6
6
ms.service: mariadb
7
7
ms.topic: conceptual
8
-
ms.date: 09/22/2019
8
+
ms.date: 10/25/2019
9
9
---
10
10
11
11
# Azure Database for MariaDB server firewall rules
@@ -38,10 +38,13 @@ To allow applications from Azure to connect to your Azure Database for MariaDB s
38
38
39
39

40
40
41
+
### Connecting from a VNet
42
+
To connect securely to your Azure Database for MariaDB server from a VNet, consider using [VNet service endpoints](./concepts-data-access-security-vnet.md).
43
+
41
44
## Programmatically managing firewall rules
42
45
In addition to the Azure portal, firewall rules can be managed programmatically by using the Azure CLI.
43
46
44
-
<!--See also [Create and manage Azure Database for MariaDB firewall rules using Azure CLI](./howto-manage-firewall-using-cli.md)-->
47
+
See also [Create and manage Azure Database for MariaDB firewall rules using Azure CLI](./howto-manage-firewall-cli.md).
45
48
46
49
## Troubleshooting firewall issues
47
50
Consider the following points when access to the Microsoft Azure Database for MariaDB server service does not behave as expected:
@@ -61,6 +64,5 @@ Connections to the Azure Database for MariaDB server are routed through a public
61
64
62
65
## Next steps
63
66
-[Create and manage Azure Database for MariaDB firewall rules using the Azure portal](./howto-manage-firewall-portal.md)
64
-
65
-
<!--
66
-
- [Create and manage Azure Database for MariaDB firewall rules using Azure CLI](./howto-manage-firewall-using-cli.md) -->
67
+
-[Create and manage Azure Database for MariaDB firewall rules using Azure CLI](./howto-manage-firewall-cli.md)
68
+
-[VNet service endpoints in Azure Database for MariaDB](./concepts-data-access-security-vnet.md)
Copy file name to clipboardExpand all lines: articles/mysql/concepts-firewall-rules.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: ajlam
5
5
ms.author: andrela
6
6
ms.service: mysql
7
7
ms.topic: conceptual
8
-
ms.date: 09/22/2019
8
+
ms.date: 10/25/2019
9
9
---
10
10
11
11
# Azure Database for MySQL server firewall rules
@@ -38,6 +38,9 @@ To allow applications from Azure to connect to your Azure Database for MySQL ser
38
38
39
39

40
40
41
+
### Connecting from a VNet
42
+
To connect securely to your Azure Database for MySQL server from a VNet, consider using [VNet service endpoints](./concepts-data-access-and-security-vnet.md).
43
+
41
44
## Programmatically managing firewall rules
42
45
In addition to the Azure portal, firewall rules can be managed programmatically by using the Azure CLI. See also [Create and manage Azure Database for MySQL firewall rules using Azure CLI](./howto-manage-firewall-using-cli.md)
43
46
@@ -61,3 +64,4 @@ Connections to the Azure Database for MySQL server are routed through a publicly
61
64
62
65
*[Create and manage Azure Database for MySQL firewall rules using the Azure portal](./howto-manage-firewall-using-portal.md)
63
66
*[Create and manage Azure Database for MySQL firewall rules using Azure CLI](./howto-manage-firewall-using-cli.md)
67
+
-[VNet service endpoints in Azure Database for MySQL](./concepts-data-access-and-security-vnet.md)
Copy file name to clipboardExpand all lines: articles/postgresql/concepts-firewall-rules.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: rachel-msft
5
5
ms.author: raagyema
6
6
ms.service: postgresql
7
7
ms.topic: conceptual
8
-
ms.date: 09/22/2019
8
+
ms.date: 10/25/2019
9
9
---
10
10
# Firewall rules in Azure Database for PostgreSQL - Single Server
11
11
Azure Database for PostgreSQL server firewall prevents all access to your database server until you specify which computers have permission. The firewall grants access to the server based on the originating IP address of each request.
@@ -36,6 +36,9 @@ To allow applications from Azure to connect to your Azure Database for PostgreSQ
36
36
37
37

38
38
39
+
### Connecting from a VNet
40
+
To connect securely to your Azure Database for PostgreSQL server from a VNet, consider using [VNet service endpoints](./concepts-data-access-and-security-vnet.md).
41
+
39
42
## Programmatically managing firewall rules
40
43
In addition to the Azure portal, firewall rules can be managed programmatically using Azure CLI.
41
44
See also [Create and manage Azure Database for PostgreSQL firewall rules using Azure CLI](howto-manage-firewall-using-cli.md)
@@ -63,3 +66,4 @@ Connections to the Azure Database for PostgreSQL server are routed through a pub
63
66
For articles on creating server-level and database-level firewall rules, see:
64
67
*[Create and manage Azure Database for PostgreSQL firewall rules using the Azure portal](howto-manage-firewall-using-portal.md)
65
68
*[Create and manage Azure Database for PostgreSQL firewall rules using Azure CLI](howto-manage-firewall-using-cli.md)
69
+
-[VNet service endpoints in Azure Database for PostgreSQL](./concepts-data-access-and-security-vnet.md)
0 commit comments