@@ -47,7 +47,7 @@ When you enable an IP access control policy programmatically, you need to add th
47
47
| ------| ----------|
48
48
| China| 139.217.8.252|
49
49
| US Gov| 52.244.48.71|
50
- | All other regions| 104.42.195.92,40.76.54.131,52.176.6.30,52.169.50.45,52.187.184.26 |
50
+ | All other regions| 104.42.195.92|
51
51
52
52
You can enable requests to access the Azure portal by selecting the ** Allow access from Azure portal** option, as shown in the following screenshot:
53
53
@@ -160,16 +160,16 @@ The example below shows how the **ipRules** property is exposed in API version 2
160
160
"enableAutomaticFailover" : " [parameters('automaticFailover')]" ,
161
161
"ipRules" : [
162
162
{
163
- "ipAddressOrRange" : " 40.76.54.131 "
163
+ "ipAddressOrRange" : " 13.91.105.215 "
164
164
},
165
165
{
166
- "ipAddressOrRange" : " 52.176.6.30 "
166
+ "ipAddressOrRange" : " 4.210.172.107 "
167
167
},
168
168
{
169
- "ipAddressOrRange" : " 52.169.50.45 "
169
+ "ipAddressOrRange" : " 13.88.56.148 "
170
170
},
171
171
{
172
- "ipAddressOrRange" : " 52.187.184.26 "
172
+ "ipAddressOrRange" : " 40.91.218.243 "
173
173
}
174
174
]
175
175
}
@@ -190,7 +190,7 @@ Here's the same example for any API version prior to 2020-04-01:
190
190
"locations" : " [variables('locations')]" ,
191
191
"databaseAccountOfferType" : " Standard" ,
192
192
"enableAutomaticFailover" : " [parameters('automaticFailover')]" ,
193
- "ipRangeFilter" :" 40.76.54.131,52.176.6.30,52.169.50.45,52.187.184.26 "
193
+ "ipRangeFilter" :" 13.91.105.215,4.210.172.107,13.88.56.148,40.91.218.243 "
194
194
}
195
195
}
196
196
```
0 commit comments