Skip to content

Commit cb0bf4a

Browse files
committed
Cosmetic changes
1 parent 0c05363 commit cb0bf4a

12 files changed

+57
-33
lines changed

articles/mariadb/TOC.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -138,6 +138,14 @@
138138
href: howto-auto-grow-storage-portal.md
139139
- name: Azure CLI
140140
href: howto-auto-grow-storage-cli.md
141+
- name: Deny Public Network Access
142+
items:
143+
- name: Azure portal
144+
href: howto-deny-public-network-access.md
145+
- name: Minimum TLS configuration
146+
items:
147+
- name: Azure portal
148+
href: howto-tls-configurations.md
141149
- name: Access server logs
142150
items:
143151
- name: Slow query logs

articles/mariadb/concepts-data-access-security-private-link.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ The following situations and outcomes are possible when you use Private Link in
107107

108108
If you want to rely completely only on private endpoints for accessing their Azure Database for MariaDB, you can disable setting all public endpoints ([firewall rules](concepts-firewall-rules.md) and [VNet service endpoints](concepts-data-access-security-vnet.md)) by setting the **Deny Public Network Access** configuration on the database server.
109109

110-
When this setting is set to *YES*, only connections via private endpoints are allowed to your Azure Database for MariaDB. When this setting is set to *NO*, clients can connect to your Azure Database for MariaDB based on your firewall or VNet service endpoint settings. Additionally, once the value of the Private network access is set, you cannot add and/or update existing firewall and VNet service endpoint rules.
110+
When this setting is set to *YES*, only connections via private endpoints are allowed to your Azure Database for MariaDB. When this setting is set to *NO*, clients can connect to your Azure Database for MariaDB based on your firewall or VNet service endpoint settings. Additionally, once the value of the Private network access is set, you cannot add and/or update existing firewall and VNet service endpoint rules.
111111

112112
> [!Note]
113113
> This feature is available in all Azure regions where Azure Database for PostgreSQL - Single server supports General Purpose and Memory Optimized pricing tiers.

articles/mariadb/howto-deny-public-network-access.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,17 +22,17 @@ To complete this how-to guide, you need:
2222

2323
Follow these steps to set MariaDB server Deny Public Network Access:
2424

25-
* In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for MariaDB server.
25+
1. In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for MariaDB server.
2626

27-
* On the MariaDB server page, under **Settings**, click **Connection security** to open the connection security configuration page.
27+
1. On the MariaDB server page, under **Settings**, click **Connection security** to open the connection security configuration page.
2828

29-
* In Deny Public Network Access, select **Yes** to enable deny public access for your MariaDB server.
29+
1. In Deny Public Network Access, select **Yes** to enable deny public access for your MariaDB server.
3030

3131
![Azure Database for MariaDB Deny network access](./media/howto-deny-public-network-access/deny-public-network-access.PNG)
3232

33-
* Click **Save** to save the changes.
33+
1. Click **Save** to save the changes.
3434

35-
* A notification will confirm that connection security setting was successfully enabled.
35+
1. A notification will confirm that connection security setting was successfully enabled.
3636

3737
![Azure Database for MariaDB Deny network access success](./media/howto-deny-public-network-access/deny-public-network-access-success.png)
3838

articles/mariadb/howto-tls-configurations.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24,17 +24,17 @@ To complete this how-to guide, you need:
2424

2525
Follow these steps to set MariaDB server minimum TLS version:
2626

27-
* In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for MariaDB server.
27+
1. In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for MariaDB server.
2828

29-
* On the MariaDB server page, under **Settings**, click **Connection security** to open the connection security configuration page.
29+
1. On the MariaDB server page, under **Settings**, click **Connection security** to open the connection security configuration page.
3030

31-
* In **Minimum TLS version**, select **1.2** to deny connections with TLS version less than TLS 1.2 for your MariaDB server.
31+
1. In **Minimum TLS version**, select **1.2** to deny connections with TLS version less than TLS 1.2 for your MariaDB server.
3232

3333
![Azure Database for MariaDB TLS configuration](./media/howto-tls-configurations/tls-configurations.png)
3434

35-
* Click **Save** to save the changes.
35+
1. Click **Save** to save the changes.
3636

37-
* A notification will confirm that connection security setting was successfully enabled.
37+
1. A notification will confirm that connection security setting was successfully enabled.
3838

3939
![Azure Database for MariaDB TLS configuration success](./media/howto-tls-configurations/tls-configurations-success.png)
4040

articles/mysql/TOC.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -246,6 +246,14 @@
246246
items:
247247
- name: Configure Azure AD integration
248248
href: howto-configure-sign-in-azure-ad-authentication.md
249+
- name: Deny Public Network Access
250+
items:
251+
- name: Azure portal
252+
href: howto-deny-public-network-access.md
253+
- name: Minimum TLS configuration
254+
items:
255+
- name: Azure portal
256+
href: howto-tls-configurations.md
249257
- name: Restart server
250258
items:
251259
- name: Azure portal

articles/mysql/concepts-data-access-security-private-link.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ The following situations and outcomes are possible when you use Private Link in
106106

107107
If you want to rely only on private endpoints for accessing their Azure Database for MySQL, you can disable setting all public endpoints (i.e. [firewall rules](concepts-firewall-rules.md) and [VNet service endpoints](concepts-data-access-and-security-vnet.md)) by setting the **Deny Public Network Access** configuration on the database server.
108108

109-
When this setting is set to *YES*, only connections via private endpoints are allowed to your Azure Database for MySQL. When this setting is set to *NO*, clients can connect to your Azure Database for MySQL based on your firewall or VNet service endpoint settings. Additionally, once the value of the Private network access is set, you cannot add and/or update existing firewall and VNet service endpoint rules.
109+
When this setting is set to *YES*, only connections via private endpoints are allowed to your Azure Database for MySQL. When this setting is set to *NO*, clients can connect to your Azure Database for MySQL based on your firewall or VNet service endpoint settings. Additionally, once the value of the Private network access is set, you cannot add and/or update existing firewall and VNet service endpoint rules.
110110

111111
> [!Note]
112112
> This feature is available in all Azure regions where Azure Database for PostgreSQL - Single server supports General Purpose and Memory Optimized pricing tiers.

articles/mysql/howto-deny-public-network-access.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,17 +22,17 @@ To complete this how-to guide, you need:
2222

2323
Follow these steps to set MySQL server Deny Public Network Access:
2424

25-
* In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for MySQL server.
25+
1. In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for MySQL server.
2626

27-
* On the MySQL server page, under **Settings**, click **Connection security** to open the connection security configuration page.
27+
1. On the MySQL server page, under **Settings**, click **Connection security** to open the connection security configuration page.
2828

29-
* In **Deny Public Network Access**, select **Yes** to enable deny public access for your MySQL server.
29+
1. In **Deny Public Network Access**, select **Yes** to enable deny public access for your MySQL server.
3030

3131
![Azure Database for MySQL Deny network access](./media/howto-deny-public-network-access/setting-deny-public-network-access.PNG)
3232

33-
* Click **Save** to save the changes.
33+
1. Click **Save** to save the changes.
3434

35-
* A notification will confirm that connection security setting was successfully enabled.
35+
1. A notification will confirm that connection security setting was successfully enabled.
3636

3737
![Azure Database for MySQL Deny network access success](./media/howto-deny-public-network-access/setting-deny-public-network-access-success.png)
3838

articles/mysql/howto-tls-configurations.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24,17 +24,17 @@ To complete this how-to guide, you need:
2424

2525
Follow these steps to set MySQL server minimum TLS version:
2626

27-
* In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for MySQL server.
27+
1. In the [Azure portal](https://portal.azure.com/), select your existing Azure Database for MySQL server.
2828

29-
* On the MySQL server page, under **Settings**, click **Connection security** to open the connection security configuration page.
29+
1. On the MySQL server page, under **Settings**, click **Connection security** to open the connection security configuration page.
3030

31-
* In **Minimum TLS version**, select **1.2** to deny connections with TLS version less than TLS 1.2 for your MySQL server.
31+
1. In **Minimum TLS version**, select **1.2** to deny connections with TLS version less than TLS 1.2 for your MySQL server.
3232

3333
![Azure Database for MySQL TLS configuration](./media/howto-tls-configurations/setting-tls-value.png)
3434

35-
* Click **Save** to save the changes.
35+
1. Click **Save** to save the changes.
3636

37-
* A notification will confirm that connection security setting was successfully enabled.
37+
1. A notification will confirm that connection security setting was successfully enabled.
3838

3939
![Azure Database for MySQL TLS configuration success](./media/howto-tls-configurations/setting-tls-value-success.png)
4040

articles/postgresql/TOC.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -273,6 +273,14 @@
273273
href: howto-restart-server-portal.md
274274
- name: Azure CLI
275275
href: howto-restart-server-cli.md
276+
- name: Deny Public Network Access
277+
items:
278+
- name: Azure portal
279+
href: howto-deny-public-network-access.md
280+
- name: Minimum TLS configuration
281+
items:
282+
- name: Azure portal
283+
href: howto-tls-configurations.md
276284
- name: Replication
277285
items:
278286
- name: Manage read replicas Azure portal

articles/postgresql/concepts-data-access-and-security-private-link.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ The following situations and outcomes are possible when you use Private Link in
106106

107107
If you want to rely only on private endpoints for accessing their Azure Database for PostgreSQL Single server, you can disable setting all public endpoints([firewall rules](concepts-firewall-rules.md) and [VNet service endpoints](concepts-data-access-and-security-vnet.md)) by setting the **Deny Public Network Access** configuration on the database server.
108108

109-
When this setting is set to *YES* only connections via private endpoints are allowed to your Azure Database for PostgreSQL. When this setting is set to *NO* clients can connect to your Azure Database for PostgreSQL based on your firewall or VNet service endpoint setting. Additionally, once the value of the Private network access is set to customers cannot add and/or update existing ‘Firewall rules’ and ‘VNet service endpoint rule
109+
When this setting is set to *YES* only connections via private endpoints are allowed to your Azure Database for PostgreSQL. When this setting is set to *NO* clients can connect to your Azure Database for PostgreSQL based on your firewall or VNet service endpoint setting. Additionally, once the value of the Private network access is set to customers cannot add and/or update existing ‘Firewall rules’ and ‘VNet service endpoint rule
110110

111111
> [!Note]
112112
> This feature is available in all Azure regions where Azure Database for PostgreSQL - Single server supports General Purpose and Memory Optimized pricing tiers.

0 commit comments

Comments
 (0)