You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/postgresql/flexible-server/how-to-connect-with-managed-identity.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,8 +25,8 @@ You learn how to:
25
25
26
26
## Prerequisites
27
27
28
-
- If you're not familiar with the managed identities for Azure resources feature, see this [overview](../../../articles/active-directory/managed-identities-azure-resources/overview.md). If you don't have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/) before you continue.
29
-
- To do the required resource creation and role management, your account needs "Owner" permissions at the appropriate scope (your subscription or resource group). If you need assistance with a role assignment, see [Assign Azure roles to manage access to your Azure subscription resources](../../../articles/role-based-access-control/role-assignments-portal.md).
28
+
- If you're not familiar with the managed identities for Azure resources feature, visit [What are managed identities for Azure resources?](/entra/identity/managed-identities-azure-resources/overview). If you don't have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/) before you continue.
29
+
- To do the required resource creation and role management, your account needs "Owner" permissions at the appropriate scope (your subscription or resource group). If you need assistance with a role assignment, see [Assign Azure roles using the Azure portal](../../../articles/role-based-access-control/role-assignments-portal.md).
30
30
- You need an Azure VM (for example, running Ubuntu Linux) that you'd like to use to access your database using Managed Identity
31
31
- You need an Azure Database for PostgreSQL flexible server instance that has [Microsoft Entra authentication](how-to-configure-sign-in-azure-ad-authentication.md) configured
32
32
- To follow the C# example, first, complete the guide on how to [Connect with C#](connect-csharp.md)
Copy file name to clipboardExpand all lines: articles/postgresql/hyperscale/moved.md
+3-7Lines changed: 3 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,21 +12,17 @@ ms.date: 09/24/2023
12
12
13
13
# Azure Database for PostgreSQL - Hyperscale (Citus) is now Azure Cosmos DB for PostgreSQL
14
14
15
-
Existing Hyperscale (Citus) server groups automatically became [Azure
16
-
Cosmos DB for PostgreSQL](../../cosmos-db/postgresql/introduction.md) clusters
17
-
under the new name in October 2022. All features and pricing, including
18
-
reserved compute pricing and regional availability, were preserved under the
19
-
new name.
15
+
Existing Hyperscale (Citus) server groups automatically became [Azure Cosmos DB for PostgreSQL](../../cosmos-db/postgresql/introduction.md) clusters under the new name in October 2022. All features and pricing, including reserved compute pricing and regional availability, were preserved under the new name.
20
16
21
17
## Find your cluster in the renamed service
22
18
23
19
View the list of Azure Cosmos DB for PostgreSQL clusters in your subscription.
24
20
25
-
# [Direct link](#tab/direct)
21
+
####[Direct link](#tab/direct)
26
22
27
23
Go to the [list of Azure Cosmos DB for PostgreSQL clusters](https://portal.azure.com/#browse/Microsoft.DBforPostgreSQL%2FserverGroupsv2) in the Azure portal.
28
24
29
-
# [Portal search](#tab/portal-search)
25
+
####[Portal search](#tab/portal-search)
30
26
31
27
In the [Azure portal](https://portal.azure.com), search for `postgresql` and
32
28
select **Azure Cosmos DB for PostgreSQL Cluster** from the results.
Copy file name to clipboardExpand all lines: articles/postgresql/single-server/concepts-data-access-and-security-private-link.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ With Private Link, you can enable cross-premises access to the private endpoint
50
50
51
51
> [!NOTE]
52
52
> In some cases the Azure Database for PostgreSQL and the VNet-subnet are in different subscriptions. In these cases you must ensure the following configurations:
53
-
> - Make sure that both the subscription has the **Microsoft.DBforPostgreSQL** resource provider registered. For more information, refer to [resource-manager-registration][resource-manager-portal]
53
+
> - Make sure that both the subscription has the **Microsoft.DBforPostgreSQL** resource provider registered.
54
54
55
55
## Configure Private Link for Azure Database for PostgreSQL Single server
56
56
@@ -122,22 +122,22 @@ If you want to rely only on private endpoints for accessing their Azure Database
122
122
123
123
When this setting is set to *YES* only connections via private endpoints are allowed to your Azure Database for PostgreSQL. When this setting is set to *NO* clients can connect to your Azure Database for PostgreSQL based on your firewall or VNet service endpoint setting. Additionally, once the value of the Private network access is set, customers cannot add and/or update existing 'Firewall rules' and 'VNet service endpoint rules'.
124
124
125
-
> [!Note]
125
+
> [!NOTE]
126
126
> This feature is available in all Azure regions where Azure Database for PostgreSQL - Single server supports General Purpose and Memory Optimized pricing tiers.
127
127
>
128
128
> This setting does not have any impact on the SSL and TLS configurations for your Azure Database for PostgreSQL Single server.
129
129
130
130
To learn how to set the **Deny Public Network Access** for your Azure Database for PostgreSQL Single server from Azure portal, refer to [How to configure Deny Public Network Access](how-to-deny-public-network-access.md).
131
131
132
-
## Next steps
132
+
## Related content
133
133
134
134
To learn more about Azure Database for PostgreSQL Single server security features, see the following articles:
135
135
136
-
* To configure a firewall for Azure Database for PostgreSQL Single server, see [Firewall support](./concepts-firewall-rules.md).
136
+
- To configure a firewall for Azure Database for PostgreSQL Single server, see [Firewall support](./concepts-firewall-rules.md).
137
137
138
-
* To learn how to configure a virtual network service endpoint for your Azure Database for PostgreSQL Single server, see [Configure access from virtual networks](./concepts-data-access-and-security-vnet.md).
138
+
- To learn how to configure a virtual network service endpoint for your Azure Database for PostgreSQL Single server, see [Configure access from virtual networks](./concepts-data-access-and-security-vnet.md).
139
139
140
-
* For an overview of Azure Database for PostgreSQL Single server connectivity, see [Azure Database for PostgreSQL Connectivity Architecture](./concepts-connectivity-architecture.md)
140
+
- For an overview of Azure Database for PostgreSQL Single server connectivity, see [Azure Database for PostgreSQL Connectivity Architecture](./concepts-connectivity-architecture.md)
141
141
142
142
<!-- Link references, to text, Within this same GitHub repo. -->
0 commit comments