Skip to content

Commit 9e0effa

Browse files
Merge pull request #270379 from markingmyname/charles
update articles
2 parents 85665d4 + f6f28d3 commit 9e0effa

File tree

3 files changed

+11
-15
lines changed

3 files changed

+11
-15
lines changed

articles/postgresql/flexible-server/how-to-connect-with-managed-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ You learn how to:
2525

2626
## Prerequisites
2727

28-
- If you're not familiar with the managed identities for Azure resources feature, see this [overview](../../../articles/active-directory/managed-identities-azure-resources/overview.md). If you don't have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/) before you continue.
29-
- To do the required resource creation and role management, your account needs "Owner" permissions at the appropriate scope (your subscription or resource group). If you need assistance with a role assignment, see [Assign Azure roles to manage access to your Azure subscription resources](../../../articles/role-based-access-control/role-assignments-portal.md).
28+
- If you're not familiar with the managed identities for Azure resources feature, visit [What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview). If you don't have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/) before you continue.
29+
- To do the required resource creation and role management, your account needs "Owner" permissions at the appropriate scope (your subscription or resource group). If you need assistance with a role assignment, see [Assign Azure roles using the Azure portal](../../../articles/role-based-access-control/role-assignments-portal.md).
3030
- You need an Azure VM (for example, running Ubuntu Linux) that you'd like to use to access your database using Managed Identity
3131
- You need an Azure Database for PostgreSQL flexible server instance that has [Microsoft Entra authentication](how-to-configure-sign-in-azure-ad-authentication.md) configured
3232
- To follow the C# example, first, complete the guide on how to [Connect with C#](connect-csharp.md)

articles/postgresql/hyperscale/moved.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,21 +12,17 @@ ms.date: 09/24/2023
1212

1313
# Azure Database for PostgreSQL - Hyperscale (Citus) is now Azure Cosmos DB for PostgreSQL
1414

15-
Existing Hyperscale (Citus) server groups automatically became [Azure
16-
Cosmos DB for PostgreSQL](../../cosmos-db/postgresql/introduction.md) clusters
17-
under the new name in October 2022. All features and pricing, including
18-
reserved compute pricing and regional availability, were preserved under the
19-
new name.
15+
Existing Hyperscale (Citus) server groups automatically became [Azure Cosmos DB for PostgreSQL](../../cosmos-db/postgresql/introduction.md) clusters under the new name in October 2022. All features and pricing, including reserved compute pricing and regional availability, were preserved under the new name.
2016

2117
## Find your cluster in the renamed service
2218

2319
View the list of Azure Cosmos DB for PostgreSQL clusters in your subscription.
2420

25-
# [Direct link](#tab/direct)
21+
#### [Direct link](#tab/direct)
2622

2723
Go to the [list of Azure Cosmos DB for PostgreSQL clusters](https://portal.azure.com/#browse/Microsoft.DBforPostgreSQL%2FserverGroupsv2) in the Azure portal.
2824

29-
# [Portal search](#tab/portal-search)
25+
#### [Portal search](#tab/portal-search)
3026

3127
In the [Azure portal](https://portal.azure.com), search for `postgresql` and
3228
select **Azure Cosmos DB for PostgreSQL Cluster** from the results.

articles/postgresql/single-server/concepts-data-access-and-security-private-link.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ With Private Link, you can enable cross-premises access to the private endpoint
5050

5151
> [!NOTE]
5252
> In some cases the Azure Database for PostgreSQL and the VNet-subnet are in different subscriptions. In these cases you must ensure the following configurations:
53-
> - Make sure that both the subscription has the **Microsoft.DBforPostgreSQL** resource provider registered. For more information, refer to [resource-manager-registration][resource-manager-portal]
53+
> - Make sure that both the subscription has the **Microsoft.DBforPostgreSQL** resource provider registered.
5454
5555
## Configure Private Link for Azure Database for PostgreSQL Single server
5656

@@ -122,22 +122,22 @@ If you want to rely only on private endpoints for accessing their Azure Database
122122

123123
When this setting is set to *YES* only connections via private endpoints are allowed to your Azure Database for PostgreSQL. When this setting is set to *NO* clients can connect to your Azure Database for PostgreSQL based on your firewall or VNet service endpoint setting. Additionally, once the value of the Private network access is set, customers cannot add and/or update existing 'Firewall rules' and 'VNet service endpoint rules'.
124124

125-
> [!Note]
125+
> [!NOTE]
126126
> This feature is available in all Azure regions where Azure Database for PostgreSQL - Single server supports General Purpose and Memory Optimized pricing tiers.
127127
>
128128
> This setting does not have any impact on the SSL and TLS configurations for your Azure Database for PostgreSQL Single server.
129129
130130
To learn how to set the **Deny Public Network Access** for your Azure Database for PostgreSQL Single server from Azure portal, refer to [How to configure Deny Public Network Access](how-to-deny-public-network-access.md).
131131

132-
## Next steps
132+
## Related content
133133

134134
To learn more about Azure Database for PostgreSQL Single server security features, see the following articles:
135135

136-
* To configure a firewall for Azure Database for PostgreSQL Single server, see [Firewall support](./concepts-firewall-rules.md).
136+
- To configure a firewall for Azure Database for PostgreSQL Single server, see [Firewall support](./concepts-firewall-rules.md).
137137

138-
* To learn how to configure a virtual network service endpoint for your Azure Database for PostgreSQL Single server, see [Configure access from virtual networks](./concepts-data-access-and-security-vnet.md).
138+
- To learn how to configure a virtual network service endpoint for your Azure Database for PostgreSQL Single server, see [Configure access from virtual networks](./concepts-data-access-and-security-vnet.md).
139139

140-
* For an overview of Azure Database for PostgreSQL Single server connectivity, see [Azure Database for PostgreSQL Connectivity Architecture](./concepts-connectivity-architecture.md)
140+
- For an overview of Azure Database for PostgreSQL Single server connectivity, see [Azure Database for PostgreSQL Connectivity Architecture](./concepts-connectivity-architecture.md)
141141

142142
<!-- Link references, to text, Within this same GitHub repo. -->
143143
[resource-manager-portal]: ../../azure-resource-manager/management/resource-providers-and-types.md

0 commit comments

Comments
 (0)