Skip to content

Commit cceaa3d

Browse files
authored
Merge pull request #89375 from rachel-msft/edits922
Firewall edit
2 parents a23b0d0 + ce7d948 commit cceaa3d

File tree

3 files changed

+23
-14
lines changed

3 files changed

+23
-14
lines changed

articles/mariadb/concepts-firewall-rules.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ajlam
55
ms.author: andrela
66
ms.service: mariadb
77
ms.topic: conceptual
8-
ms.date: 09/24/2018
8+
ms.date: 09/22/2019
99
---
1010

1111
# Azure Database for MariaDB server firewall rules
@@ -43,7 +43,7 @@ In addition to the Azure portal, firewall rules can be managed programmatically
4343

4444
<!--See also [Create and manage Azure Database for MariaDB firewall rules using Azure CLI](./howto-manage-firewall-using-cli.md)-->
4545

46-
## Troubleshooting the database firewall
46+
## Troubleshooting firewall issues
4747
Consider the following points when access to the Microsoft Azure Database for MariaDB server service does not behave as expected:
4848

4949
* **Changes to the allow list have not taken effect yet:** There may be as much as a five-minute delay for changes to the Azure Database for MariaDB Server firewall configuration to take effect.
@@ -52,9 +52,12 @@ Consider the following points when access to the Microsoft Azure Database for Ma
5252

5353
* **Dynamic IP address:** If you have an Internet connection with dynamic IP addressing and you are having trouble getting through the firewall, you can try one of the following solutions:
5454

55-
* Ask your Internet Service Provider (ISP) for the IP address range assigned to your client computers that access the Azure Database for MariaDB server, and then add the IP address range as a firewall rule.
55+
* Ask your Internet Service Provider (ISP) for the IP address range assigned to your client computers that access the Azure Database for MariaDB server, and then add the IP address range as a firewall rule.
5656

57-
* Get static IP addressing instead for your client computers, and then add the IP addresses as firewall rules.
57+
* Get static IP addressing instead for your client computers, and then add the IP addresses as firewall rules.
58+
59+
* **Server's IP appears to be public:**
60+
Connections to the Azure Database for PostgreSQL server are routed through a publicly accessible Azure gateway. However, the actual server IP is not publicly accessible. For more information, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
5861

5962
## Next steps
6063
- [Create and manage Azure Database for MariaDB firewall rules using the Azure portal](./howto-manage-firewall-portal.md)

articles/mysql/concepts-firewall-rules.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ajlam
55
ms.author: andrela
66
ms.service: mysql
77
ms.topic: conceptual
8-
ms.date: 02/28/2018
8+
ms.date: 09/22/2019
99
---
1010

1111
# Azure Database for MySQL server firewall rules
@@ -41,7 +41,7 @@ To allow applications from Azure to connect to your Azure Database for MySQL ser
4141
## Programmatically managing firewall rules
4242
In addition to the Azure portal, firewall rules can be managed programmatically by using the Azure CLI. See also [Create and manage Azure Database for MySQL firewall rules using Azure CLI](./howto-manage-firewall-using-cli.md)
4343

44-
## Troubleshooting the database firewall
44+
## Troubleshooting firewall issues
4545
Consider the following points when access to the Microsoft Azure Database for MySQL server service does not behave as expected:
4646

4747
* **Changes to the allow list have not taken effect yet:** There may be as much as a five-minute delay for changes to the Azure Database for MySQL Server firewall configuration to take effect.
@@ -50,9 +50,12 @@ Consider the following points when access to the Microsoft Azure Database for My
5050

5151
* **Dynamic IP address:** If you have an Internet connection with dynamic IP addressing and you are having trouble getting through the firewall, you can try one of the following solutions:
5252

53-
* Ask your Internet Service Provider (ISP) for the IP address range assigned to your client computers that access the Azure Database for MySQL server, and then add the IP address range as a firewall rule.
53+
* Ask your Internet Service Provider (ISP) for the IP address range assigned to your client computers that access the Azure Database for MySQL server, and then add the IP address range as a firewall rule.
5454

55-
* Get static IP addressing instead for your client computers, and then add the IP addresses as firewall rules.
55+
* Get static IP addressing instead for your client computers, and then add the IP addresses as firewall rules.
56+
57+
* **Server's IP appears to be public:**
58+
Connections to the Azure Database for PostgreSQL server are routed through a publicly accessible Azure gateway. However, the actual server IP is not publicly accessible. For more information, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
5659

5760
## Next steps
5861

articles/postgresql/concepts-firewall-rules.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: rachel-msft
55
ms.author: raagyema
66
ms.service: postgresql
77
ms.topic: conceptual
8-
ms.date: 5/6/2019
8+
ms.date: 09/22/2019
99
---
1010
# Firewall rules in Azure Database for PostgreSQL - Single Server
1111
Azure Database for PostgreSQL server firewall prevents all access to your database server until you specify which computers have permission. The firewall grants access to the server based on the originating IP address of each request.
@@ -40,21 +40,24 @@ To allow applications from Azure to connect to your Azure Database for PostgreSQ
4040
In addition to the Azure portal, firewall rules can be managed programmatically using Azure CLI.
4141
See also [Create and manage Azure Database for PostgreSQL firewall rules using Azure CLI](howto-manage-firewall-using-cli.md)
4242

43-
## Troubleshooting the database server firewall
43+
## Troubleshooting firewall issues
4444
Consider the following points when access to the Microsoft Azure Database for PostgreSQL Server service does not behave as you expect:
4545

4646
* **Changes to the allow list have not taken effect yet:** There may be as much as a five-minute delay for changes to the Azure Database for PostgreSQL Server firewall configuration to take effect.
4747

4848
* **The login is not authorized or an incorrect password was used:** If a login does not have permissions on the Azure Database for PostgreSQL server or the password used is incorrect, the connection to the Azure Database for PostgreSQL server is denied. Creating a firewall setting only provides clients with an opportunity to attempt connecting to your server; each client must still provide the necessary security credentials.
4949

50-
For example, using a JDBC client, the following error may appear.
51-
> java.util.concurrent.ExecutionException: java.lang.RuntimeException: org.postgresql.util.PSQLException: FATAL: password authentication failed for user "yourusername"
50+
For example, using a JDBC client, the following error may appear.
51+
> java.util.concurrent.ExecutionException: java.lang.RuntimeException: org.postgresql.util.PSQLException: FATAL: password authentication failed for user "yourusername"
5252
5353
* **Dynamic IP address:** If you have an Internet connection with dynamic IP addressing and you are having trouble getting through the firewall, you could try one of the following solutions:
5454

55-
* Ask your Internet Service Provider (ISP) for the IP address range assigned to your client computers that access the Azure Database for PostgreSQL Server, and then add the IP address range as a firewall rule.
55+
* Ask your Internet Service Provider (ISP) for the IP address range assigned to your client computers that access the Azure Database for PostgreSQL Server, and then add the IP address range as a firewall rule.
5656

57-
* Get static IP addressing instead for your client computers, and then add the static IP address as a firewall rule.
57+
* Get static IP addressing instead for your client computers, and then add the static IP address as a firewall rule.
58+
59+
* **Server's IP appears to be public:**
60+
Connections to the Azure Database for PostgreSQL server are routed through a publicly accessible Azure gateway. However, the actual server IP is not publicly accessible. For more information, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
5861

5962
## Next steps
6063
For articles on creating server-level and database-level firewall rules, see:

0 commit comments

Comments
 (0)