Skip to content

Commit 952f230

Browse files
authored
Merge pull request #180134 from jonels-msft/hsc-access-screens
Update public/private access interface
2 parents b90873b + d736f3b commit 952f230

11 files changed

+29
-34
lines changed

articles/postgresql/howto-hyperscale-manage-firewall-using-portal.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: jonels
66
ms.service: postgresql
77
ms.subservice: hyperscale-citus
88
ms.topic: how-to
9-
ms.date: 10/15/2021
9+
ms.date: 11/16/2021
1010
---
1111
# Manage public access for Azure Database for PostgreSQL - Hyperscale (Citus)
1212

@@ -22,28 +22,30 @@ To step through this how-to guide, you need:
2222
## Create a server-level firewall rule in the Azure portal
2323

2424
> [!NOTE]
25-
> These settings are also accessible during the creation of an Azure Database for PostgreSQL - Hyperscale (Citus) server group. Under the **Networking** tab, click **Public endpoint**.
26-
25+
> These settings are also accessible during the creation of an Azure Database for PostgreSQL - Hyperscale (Citus) server group. Under the **Networking** tab, select **Public access (allowed IP address)**.
26+
>
2727
> :::image type="content" source="./media/howto-hyperscale-manage-firewall-using-portal/0-create-public-access.png" alt-text="Azure portal - networking tab":::
2828
2929
1. On the PostgreSQL server group page, under the Security heading, click **Networking** to open the Firewall rules.
3030

3131
:::image type="content" source="./media/howto-hyperscale-manage-firewall-using-portal/1-connection-security.png" alt-text="Azure portal - click Networking":::
3232

33-
2. If desired, select **Enable access to the worker nodes**. With this option, the firewall rules will allow access to all worker nodes as well as the coordinator node.
33+
2. Select **Allow public access from Azure services and resources within Azure to this server group**.
34+
35+
3. If desired, select **Enable access to the worker nodes**. With this option, the firewall rules will allow access to all worker nodes as well as the coordinator node.
3436

35-
3. Click **Add current client IP address** to create a firewall rule with the public IP address of your computer, as perceived by the Azure system.
37+
4. Click **Add current client IP address** to create a firewall rule with the public IP address of your computer, as perceived by the Azure system.
3638

3739
Alternately, clicking **+Add 0.0.0.0 - 255.255.255.255** (to the right of option B) allows not just your IP, but the whole internet to access the coordinator node's port 5432. In this situation, clients still must log in with the correct username and password to use the cluster. Nevertheless, we recommend allowing worldwide access for only short periods of time and for only non-production databases.
3840

39-
4. Verify your IP address before saving the configuration. In some situations, the IP address observed by Azure portal differs from the IP address used when accessing the internet and Azure servers. Thus, you may need to change the Start IP and End IP to make the rule function as expected.
41+
5. Verify your IP address before saving the configuration. In some situations, the IP address observed by Azure portal differs from the IP address used when accessing the internet and Azure servers. Thus, you may need to change the Start IP and End IP to make the rule function as expected.
4042
Use a search engine or other online tool to check your own IP address. For example, search for "what is my IP."
4143

4244
:::image type="content" source="./media/howto-hyperscale-manage-firewall-using-portal/3-what-is-my-ip.png" alt-text="Bing search for What is my IP":::
4345

44-
5. Add more address ranges. In the firewall rules, you can specify a single IP address or a range of addresses. If you want to limit the rule to a single IP address, type the same address in the field for Start IP and End IP. Opening the firewall enables administrators, users, and applications to access the coordinator node on port 5432.
46+
6. Add more address ranges. In the firewall rules, you can specify a single IP address or a range of addresses. If you want to limit the rule to a single IP address, type the same address in the field for Start IP and End IP. Opening the firewall enables administrators, users, and applications to access the coordinator node on port 5432.
4547

46-
6. Click **Save** on the toolbar to save this server-level firewall rule. Wait for the confirmation that the update to the firewall rules was successful.
48+
7. Click **Save** on the toolbar to save this server-level firewall rule. Wait for the confirmation that the update to the firewall rules was successful.
4749

4850
## Connecting from Azure
4951

articles/postgresql/howto-hyperscale-private-access.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,14 @@ ms.author: jonels
66
ms.service: postgresql
77
ms.subservice: hyperscale-citus
88
ms.topic: how-to
9-
ms.date: 10/15/2021
9+
ms.date: 11/16/2021
1010
---
1111

1212
# Private access (preview) in Azure Database for PostgreSQL Hyperscale (Citus)
1313

1414
[Private access](concepts-hyperscale-private-access.md) (preview) allows
1515
resources in an Azure virtual network to connect securely and privately to
16-
nodes in a Hyperscale (Citus) server group. This howto assumes you've already
16+
nodes in a Hyperscale (Citus) server group. This how-to assumes you've already
1717
created a virtual network and subnet. For an example of setting up
1818
prerequisites, see the [private access
1919
tutorial](tutorial-hyperscale-private-access.md).
@@ -72,7 +72,7 @@ To create a private endpoint to a node in an existing server group, open the
7272

7373
:::image type="content" source="media/howto-hyperscale-private-access/networking.png" alt-text="Networking screen":::
7474

75-
1. In the **Basics** tab, confirm the **Subscription**, **Resource group**, and
75+
2. In the **Basics** tab, confirm the **Subscription**, **Resource group**, and
7676
**Region**. Enter a **Name** for the endpoint, such as `my-server-group-eq`.
7777

7878
> [!NOTE]
@@ -82,16 +82,16 @@ To create a private endpoint to a node in an existing server group, open the
8282
> default values for the form fields may not be correct; check them and
8383
> update if necessary.
8484

85-
2. Select **Next: Resource >**. In the **Target sub-resource** choose the target
85+
3. Select **Next: Resource >**. In the **Target sub-resource** choose the target
8686
node of the server group. Generally `coordinator` is the desired node.
8787

88-
3. Select **Next: Configuration >**. Choose the desired **Virtual network** and
88+
4. Select **Next: Configuration >**. Choose the desired **Virtual network** and
8989
**Subnet**. Customize the **Private DNS integration** or accept its default
9090
settings.
9191

92-
4. Select **Next: Tags >** and add any desired tags.
92+
5. Select **Next: Tags >** and add any desired tags.
9393

94-
5. Finally, select **Review + create >**. Review the settings and select
94+
6. Finally, select **Review + create >**. Review the settings and select
9595
**Create** when satisfied.
9696

9797
## Next steps
45.1 KB
Loading
45.5 KB
Loading

articles/postgresql/quickstart-create-hyperscale-basic-tier.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: postgresql
77
ms.subservice: hyperscale-citus
88
ms.custom: mvc
99
ms.topic: quickstart
10-
ms.date: 08/03/2021
10+
ms.date: 11/16/2021
1111
#Customer intent: As a developer, I want to provision a hyperscale server group so that I can run queries quickly on large datasets.
1212
---
1313

articles/postgresql/quickstart-create-hyperscale-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: postgresql
77
ms.subservice: hyperscale-citus
88
ms.custom: mvc
99
ms.topic: quickstart
10-
ms.date: 08/17/2020
10+
ms.date: 11/16/2021
1111
#Customer intent: As a developer, I want to provision a hyperscale server group so that I can run queries quickly on large datasets.
1212
---
1313

articles/postgresql/tutorial-hyperscale-server-group.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.subservice: hyperscale-citus
88
ms.custom: mvc
99
ms.devlang: azurecli
1010
ms.topic: tutorial
11-
ms.date: 12/16/2020
11+
ms.date: 11/16/2021
1212
---
1313

1414
# Tutorial: create server group

includes/azure-postgresql-hyperscale-create-basic-tier.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
ms.service: postgresql
66
ms.subservice: hyperscale-citus
77
ms.topic: include
8-
ms.date: 08/03/2021
8+
ms.date: 11/16/2021
99
ms.author: jonels
1010
ms.custom: include file
1111
---
@@ -36,18 +36,15 @@ Follow these steps to create an Azure Database for PostgreSQL server:
3636
- Click **Save**.
3737
6. Click **Next : Networking >** at the bottom of the screen.
3838

39-
7. In the **Networking** tab, click the **Public endpoint** radio button.
39+
7. In the **Networking** tab, select **Allow public access from Azure services and resources within Azure to this server group**. Then select **+ Add current client IP address**.
4040
![Public endpoint selected](./media/azure-postgresql-hyperscale-create-db/network-public-endpoint.png)
41-
8. Click the link **+ Add current client IP address**.
42-
![Added client IP](./media/azure-postgresql-hyperscale-create-db/network-add-client-ip.png)
43-
4441
> [!NOTE]
4542
> Azure PostgreSQL server communicates over port 5432. If you are trying to connect from within a corporate network, outbound traffic over port 5432 may not be allowed by your network's firewall. If so, you cannot connect to your Hyperscale (Citus) cluster unless your IT department opens port 5432.
4643
>
4744
48-
9. Click **Review + create** and then **Create** to provision the server. Provisioning takes a few minutes.
49-
10. The page will redirect to monitor deployment. When the live status changes from **Your deployment is underway** to **Your deployment is complete**, click the **Outputs** menu item on the left of the page.
50-
11. The outputs page will contain a coordinator hostname with a button next to it to copy the value to the clipboard. Record this information for later use.
45+
8. Click **Review + create** and then **Create** to provision the server. Provisioning takes a few minutes.
46+
9. The page will redirect to monitor deployment. When the live status changes from **Your deployment is underway** to **Your deployment is complete**, click the **Outputs** menu item on the left of the page.
47+
10. The outputs page will contain a coordinator hostname with a button next to it to copy the value to the clipboard. Record this information for later use.
5148

5249
## Connect to the database using psql
5350

includes/azure-postgresql-hyperscale-create-db.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -35,19 +35,15 @@ Follow these steps to create an Azure Database for PostgreSQL server:
3535
3636
5. Click **Configure server group**. Leave the settings in that section unchanged and click **Save**.
3737
6. Click **Next : Networking >** at the bottom of the screen.
38-
39-
7. In the **Networking** tab, click the **Public endpoint** radio button.
38+
7. In the **Networking** tab, select **Allow public access from Azure services and resources within Azure to this server group**. Then select **+ Add current client IP address**.
4039
![Public endpoint selected](./media/azure-postgresql-hyperscale-create-db/network-public-endpoint.png)
41-
8. Click the link **+ Add current client IP address**.
42-
![Added client IP](./media/azure-postgresql-hyperscale-create-db/network-add-client-ip.png)
43-
4440
> [!NOTE]
4541
> Azure PostgreSQL server communicates over port 5432. If you are trying to connect from within a corporate network, outbound traffic over port 5432 may not be allowed by your network's firewall. If so, you cannot connect to your Hyperscale (Citus) cluster unless your IT department opens port 5432.
4642
>
4743
48-
9. Click **Review + create** and then **Create** to provision the server. Provisioning takes a few minutes.
49-
10. The page will redirect to monitor deployment. When the live status changes from **Your deployment is underway** to **Your deployment is complete**, click the **Outputs** menu item on the left of the page.
50-
11. The outputs page will contain a coordinator hostname with a button next to it to copy the value to the clipboard. Record this information for later use.
44+
8. Click **Review + create** and then **Create** to provision the server. Provisioning takes a few minutes.
45+
9. The page will redirect to monitor deployment. When the live status changes from **Your deployment is underway** to **Your deployment is complete**, click the **Outputs** menu item on the left of the page.
46+
10. The outputs page will contain a coordinator hostname with a button next to it to copy the value to the clipboard. Record this information for later use.
5147

5248
### Connect to the database using psql
5349

Binary file not shown.

0 commit comments

Comments
 (0)