Skip to content

Commit b058943

Browse files
authored
Merge pull request #279233 from markingmyname/sud
[MySQL] New network article from private link to public
2 parents 896941c + 99a6ceb commit b058943

File tree

12 files changed

+95
-12
lines changed

12 files changed

+95
-12
lines changed

articles/mysql/flexible-server/concepts-networking-vnet.md

Lines changed: 26 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,15 @@ description: Learn about private access networking option in Azure Database for
44
author: SudheeshGH
55
ms.author: sunaray
66
ms.reviewer: maghan
7-
ms.date: 06/18/2024
7+
ms.date: 07/08/2024
88
ms.service: mysql
99
ms.subservice: flexible-server
1010
ms.topic: conceptual
1111
---
1212

1313
# Private Network Access using virtual network integration for Azure Database for MySQL - Flexible Server
1414

15-
[!INCLUDE[applies-to-mysql-flexible-server](../includes/applies-to-mysql-flexible-server.md)]
15+
[!INCLUDE [applies-to-mysql-flexible-server](../includes/applies-to-mysql-flexible-server.md)]
1616

1717
This article describes the private connectivity option for Azure Database for MySQL flexible server. You learn in detail the virtual network concepts for Azure Database for MySQL flexible server to create a server securely in Azure.
1818

@@ -29,17 +29,17 @@ Azure Database for MySQL flexible server supports client connectivity from:
2929

3030
Subnets enable you to segment the virtual network into one or more subnetworks and allocate a portion of the virtual network's address space to which you can then deploy Azure resources. Azure Database for MySQL flexible server requires a [delegated subnet](../../virtual-network/subnet-delegation-overview.md). A delegated subnet is an explicit identifier that a subnet can host only Azure Database for MySQL flexible server instances. By delegating the subnet, the service gets direct permissions to create service-specific resources to manage your Azure Database for MySQL flexible server instance seamlessly.
3131

32-
> [!NOTE]
33-
> The smallest CIDR range you can specify for the subnet to host Azure Database for MySQL flexible server is /29, which provides eight IP addresses. However, the first and last address in any network or subnet cant be assigned to any individual host. Azure reserves five IP addresses for internal use by Azure networking, including the two IP addresses that can't be assigned to a host. This leaves three available IP addresses for a /29 CIDR range. For Azure Database for MySQL flexible server, it's required to allocate one IP address per node from the delegated subnet when private access is enabled. HA-enabled servers require two IP addresses, and a Non-HA server requires one IP address. It is recommended to reserve at least two IP addresses per Azure Database for MySQL flexible server instance, as high availability options can be enabled later.
32+
> [!NOTE]
33+
> The smallest CIDR range you can specify for the subnet to host Azure Database for MySQL flexible server is /29, which provides eight IP addresses. However, the first and last address in any network or subnet can't be assigned to any individual host. Azure reserves five IP addresses for internal use by Azure networking, including the two IP addresses that can't be assigned to a host. This leaves three available IP addresses for a /29 CIDR range. For Azure Database for MySQL flexible server, it's required to allocate one IP address per node from the delegated subnet when private access is enabled. HA-enabled servers require two IP addresses, and a Non-HA server requires one IP address. It is recommended to reserve at least two IP addresses per Azure Database for MySQL flexible server instance, as high availability options can be enabled later.
3434
Azure Database for MySQL flexible server integrates with Azure [Private DNS zones](../../dns/private-dns-privatednszone.md) to provide a reliable, secure DNS service to manage and resolve domain names in a virtual network without the need to add a custom DNS solution. A private DNS zone can be linked to one or more virtual networks by creating [virtual network links](../../dns/private-dns-virtual-network-links.md)
3535

36-
:::image type="content" source="./media/concepts-networking/vnet-diagram.png" alt-text="Flexible server MySQL VNET":::
36+
:::image type="content" source="media/concepts-networking-vnet/vnet-diagram.png" alt-text="Screenshot of Flexible server MySQL VNET." lightbox="media/concepts-networking-vnet/vnet-diagram.png":::
3737

3838
In the above diagram,
3939

40-
1. Azure Database for MySQL flexible server instances are injected into a delegated subnet - 10.0.1.0/24 of virtual network **VNet-1**.
41-
2. Applications deployed on different subnets within the same virtual network can access the Azure Database for MySQL flexible server instances directly.
42-
3. Applications deployed on a different virtual network **VNet-2** don't have direct access to Azure Database for MySQL flexible server instances. Before they can access an instance, you must perform a [private DNS zone virtual network peering](#private-dns-zone-and-virtual-network-peering).
40+
1. Azure Databases for MySQL flexible server instances are injected into a delegated subnet - 10.0.1.0/24 of virtual network **VNet-1**.
41+
1. Applications deployed on different subnets within the same virtual network can access the Azure Database for MySQL flexible server instances directly.
42+
1. Applications deployed on a different virtual network **VNet-2** don't have direct access to Azure Database for MySQL flexible server instances. Before they can access an instance, you must perform a [private DNS zone virtual network peering](#private-dns-zone-and-virtual-network-peering).
4343

4444
## Virtual network concepts
4545

@@ -118,7 +118,22 @@ You can then use the Azure Database for MySQL flexible server servername (FQDN)
118118
- Private DNS integration config can't be changed after deployment.
119119
- Subnet size (address spaces) can't be increased after resources exist in the subnet.
120120

121-
## Next steps
121+
## Move from private access (virtual network integrated) network to public access or private link
122+
123+
Azure Database for MySQL flexible server can be transitioned from private access (virtual network Integrated) to public access, with the option to use Private Link. This functionality enables servers to switch from virtual network integrated to Private Link/Public infrastructure seamlessly, without the need to alter the server name or migrate data, simplifying the process for customers.
124+
125+
> [!NOTE]
126+
> That once the transition is made, it cannot be reversed. The transition involves a downtime of approximately 5-10 minutes for Non-HA servers and about 20 minutes for HA-enabled servers.
127+
128+
The process is conducted in offline mode and consists of two steps:
129+
130+
1. Detaching the server from the virtual network infrastructure.
131+
1. Establishing a Private Link or enabling public access.
132+
133+
- For guidance on transitioning from Private access network to Public access or Private Link, visit [Move from private access (virtual network integrated) to public access or Private Link with the Azure portal](how-to-network-from-private-to-public.md). This resource offers step-by-step instructions to facilitate the process.
134+
135+
## Related content
122136

123-
- Learn how to enable private access (virtual network integration) using the [Azure portal](how-to-manage-virtual-network-portal.md) or [Azure CLI](how-to-manage-virtual-network-cli.md).
124-
- Learn how to [use TLS](how-to-connect-tls-ssl.md).
137+
- [Azure portal](how-to-manage-virtual-network-portal.md)
138+
- [Azure CLI](how-to-manage-virtual-network-cli.md)
139+
- [Use TLS](how-to-connect-tls-ssl.md)
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
---
2+
title: How to network from a private access to public access or Private Link in Azure Database for MySQL
3+
description: Learn about moving an Azure Database for MySQL from private access (virtual network integrated) to public access or a Private Link with the Azure portal.
4+
author: SudheeshGH
5+
ms.author: sunaray
6+
ms.reviewer: maghan
7+
ms.date: 07/08/2024
8+
ms.service: mysql
9+
ms.subservice: flexible-server
10+
ms.topic: how-to
11+
---
12+
13+
# Move from private access (virtual network integrated) to public access or Private Link with the Azure portal
14+
15+
[!INCLUDE [applies-to-mysql-flexible-server](../includes/applies-to-mysql-flexible-server.md)]
16+
17+
This article describes moving an Azure Database for MySQL flexible server from Private access (virtual network integrated) to Public access or a Private Link with the Azure portal.
18+
19+
## Prerequisites
20+
21+
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/).
22+
- An Azure Database for MySQL server started with private access (integrated virtual network).
23+
- An Azure Virtual Network with a subnet and a service endpoint to the Azure Database for MySQL server.
24+
- An Azure Database for MySQL server with a private endpoint.
25+
26+
## How to move from private access
27+
28+
The steps below describe moving from private access (virtual network integrated) to public access or Private Link with the Azure portal.
29+
30+
1. In the Azure portal, select your existing Azure Database for MySQL flexible server instance.
31+
32+
1. On the Private access (virtual network Integrated) Azure Database for MySQL flexible server instance page, select **Networking** from the front panel to open the high availability page.
33+
34+
1. Select **Move to Private Link**.
35+
36+
> [!NOTE]
37+
> A warning appears explaining that this operation is irreversible and has downtime.
38+
39+
:::image type="content" source="media/how-to-network-from-private-to-public/network-page.png" alt-text="Screenshot of the Azure network page to begin the process." lightbox="media/how-to-network-from-private-to-public/network-page.png":::
40+
41+
1. Once you select **Yes**, a wizard appears with two steps.
42+
43+
## Work in the wizard
44+
45+
1. Detach the server from the virtual network infrastructure and transition it to the Private Link or Public access infrastructure.
46+
47+
:::image type="content" source="media/how-to-network-from-private-to-public/allow-public-access.png" alt-text="Screenshot of the Azure allow public access page." lightbox="media/how-to-network-from-private-to-public/allow-public-access.png":::
48+
49+
If you need public access only, you need to check `Allow public access to this resource through the internet using a public IP address`, or If you need private access only, then move to step 2 and don't check `Allow public access to this resource through the internet using a public IP address`. If you need public and private access, check the box for `Allow public access to this resource through the internet using a public IP address` and move to Step 2 to create a private link.
50+
51+
1. Once you select **Next**, detaching the server is initiated.
52+
53+
:::image type="content" source="media/how-to-network-from-private-to-public/move-to-private-link.png" alt-text="Screenshot of the Azure move to private link page." lightbox="media/how-to-network-from-private-to-public/move-to-private-link.png":::
54+
55+
1. Once detached, you can create a private link.
56+
57+
:::image type="content" source="media/how-to-network-from-private-to-public/add-private-endpoint.png" alt-text="Screenshot of teh Azure add a private endpoint page." lightbox="media/how-to-network-from-private-to-public/add-private-endpoint.png":::
58+
59+
1. When the server detaches from the virtual network, the server is put into an updating state. You can monitor the status of the server in the portal.
60+
61+
You can select to configure the network setting or move to the networking pane and configure public access, private endpoint, or both.
62+
63+
> [!NOTE]
64+
> After detaching the server from the virtual network infrastructure, if you didn't opt for "Allow public access to this resource through the internet using a public IP address" and omitted Step 2 or exited the portal before completing the necessary steps, your server becomes inaccessible. You encounter a specific message indicating the server's update status.
65+
66+
## Related content
67+
68+
- [Private Link - Azure Database for MySQL - Flexible Server | Microsoft Learn](/azure/mysql/flexible-server/concepts-networking-private-link)
69+
- [Public Network Access overview - Azure Database for MySQL - Flexible Server | Microsoft Learn](/azure/mysql/flexible-server/concepts-networking-public)
41.5 KB
Loading
307 KB
Loading
197 KB
Loading
201 KB
Loading
175 KB
Loading
170 KB
Loading
176 KB
Loading

0 commit comments

Comments
 (0)