Skip to content

Commit a40b353

Browse files
committed
Update concepts-networking.md
1 parent c93aebe commit a40b353

File tree

1 file changed

+9
-0
lines changed

1 file changed

+9
-0
lines changed

articles/postgresql/flexible-server/concepts-networking.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,9 +58,15 @@ Here are some concepts to be familiar with when you're using virtual networks wi
5858

5959
Your flexible server must be in a subnet that's *delegated*. That is, only Azure Database for PostgreSQL - Flexible Server instances can use that subnet. No other Azure resource types can be in the delegated subnet. You delegate a subnet by assigning its delegation property as `Microsoft.DBforPostgreSQL/flexibleServers`.
6060
The smallest CIDR range you can specify for the subnet is /28, which provides sixteen IP addresses, however the first and last address in any network or subnet can't be assigned to any individual host. Azure reserves five IPs to be utilized internally by Azure networking, which include two IPs that cannot be assigned to host, mentioned above. This leaves you eleven available IP addresses for /28 CIDR range, whereas a single Flexible Server with High Availability features utilizes 4 addresses.
61+
For Replication and Azure AD connections please make sure Route Tables do not affect traffic.A common pattern is route all outbound traffic via an Azure Firewall or a custom / on premise network filtering appliance.
62+
If the subnet has a Route Table associated with the rule to route all traffic to a virtual appliance:
63+
* Add a rule with Destination Service Tag “AzureActiveDirectory” and next hop “Internet”
64+
* Add a rule with Destination IP range same as PostgreSQL subnet range and next hop “Virtual Network”
65+
6166

6267
> [!IMPORTANT]
6368
> The names `AzureFirewallSubnet`, `AzureFirewallManagementSubnet`, `AzureBastionSubnet`, and `GatewaySubnet` are reserved within Azure. Don't use any of these as your subnet name.
69+
> For Azure Storage connection please make sure PostgreSQL delegated subnet has Service Endpoints for Azure Storage in the region of the VNet. The endpoints are created by default, but please take care not to remove these manually.
6470
6571
* **Network security group (NSG)**. Security rules in NSGs enable you to filter the type of network traffic that can flow in and out of virtual network subnets and network interfaces. For more information, see the [NSG overview](../../virtual-network/network-security-groups-overview.md).
6672

@@ -142,6 +148,9 @@ By default DNS name resolution is scoped to a virtual network. This means that a
142148

143149
In order to resolve this issue, you must make sure clients in VNET1 can access the Flexible Server Private DNS Zone. This can be achieved by adding a [virtual network link](../../dns/private-dns-virtual-network-links.md) to the Private DNS Zone of your Flexible Server instance.
144150

151+
152+
153+
145154
### Unsupported virtual network scenarios
146155

147156
Here are some limitations for working with virtual networks:

0 commit comments

Comments
 (0)