You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/mariadb/concepts-firewall-rules.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: ajlam
5
5
ms.author: andrela
6
6
ms.service: mariadb
7
7
ms.topic: conceptual
8
-
ms.date: 09/24/2018
8
+
ms.date: 09/22/2019
9
9
---
10
10
11
11
# Azure Database for MariaDB server firewall rules
@@ -43,7 +43,7 @@ In addition to the Azure portal, firewall rules can be managed programmatically
43
43
44
44
<!--See also [Create and manage Azure Database for MariaDB firewall rules using Azure CLI](./howto-manage-firewall-using-cli.md)-->
45
45
46
-
## Troubleshooting the database firewall
46
+
## Troubleshooting firewall issues
47
47
Consider the following points when access to the Microsoft Azure Database for MariaDB server service does not behave as expected:
48
48
49
49
***Changes to the allow list have not taken effect yet:** There may be as much as a five-minute delay for changes to the Azure Database for MariaDB Server firewall configuration to take effect.
@@ -52,9 +52,12 @@ Consider the following points when access to the Microsoft Azure Database for Ma
52
52
53
53
***Dynamic IP address:** If you have an Internet connection with dynamic IP addressing and you are having trouble getting through the firewall, you can try one of the following solutions:
54
54
55
-
* Ask your Internet Service Provider (ISP) for the IP address range assigned to your client computers that access the Azure Database for MariaDB server, and then add the IP address range as a firewall rule.
55
+
* Ask your Internet Service Provider (ISP) for the IP address range assigned to your client computers that access the Azure Database for MariaDB server, and then add the IP address range as a firewall rule.
56
56
57
-
* Get static IP addressing instead for your client computers, and then add the IP addresses as firewall rules.
57
+
* Get static IP addressing instead for your client computers, and then add the IP addresses as firewall rules.
58
+
59
+
***Server's IP appears to be public:**
60
+
Connections to the Azure Database for PostgreSQL server are routed through a publicly accessible Azure gateway. However, the actual server IP is not publicly accessible. For more information, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
58
61
59
62
## Next steps
60
63
-[Create and manage Azure Database for MariaDB firewall rules using the Azure portal](./howto-manage-firewall-portal.md)
Copy file name to clipboardExpand all lines: articles/mysql/concepts-firewall-rules.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: ajlam
5
5
ms.author: andrela
6
6
ms.service: mysql
7
7
ms.topic: conceptual
8
-
ms.date: 02/28/2018
8
+
ms.date: 09/22/2019
9
9
---
10
10
11
11
# Azure Database for MySQL server firewall rules
@@ -41,7 +41,7 @@ To allow applications from Azure to connect to your Azure Database for MySQL ser
41
41
## Programmatically managing firewall rules
42
42
In addition to the Azure portal, firewall rules can be managed programmatically by using the Azure CLI. See also [Create and manage Azure Database for MySQL firewall rules using Azure CLI](./howto-manage-firewall-using-cli.md)
43
43
44
-
## Troubleshooting the database firewall
44
+
## Troubleshooting firewall issues
45
45
Consider the following points when access to the Microsoft Azure Database for MySQL server service does not behave as expected:
46
46
47
47
***Changes to the allow list have not taken effect yet:** There may be as much as a five-minute delay for changes to the Azure Database for MySQL Server firewall configuration to take effect.
@@ -50,9 +50,12 @@ Consider the following points when access to the Microsoft Azure Database for My
50
50
51
51
***Dynamic IP address:** If you have an Internet connection with dynamic IP addressing and you are having trouble getting through the firewall, you can try one of the following solutions:
52
52
53
-
* Ask your Internet Service Provider (ISP) for the IP address range assigned to your client computers that access the Azure Database for MySQL server, and then add the IP address range as a firewall rule.
53
+
* Ask your Internet Service Provider (ISP) for the IP address range assigned to your client computers that access the Azure Database for MySQL server, and then add the IP address range as a firewall rule.
54
54
55
-
* Get static IP addressing instead for your client computers, and then add the IP addresses as firewall rules.
55
+
* Get static IP addressing instead for your client computers, and then add the IP addresses as firewall rules.
56
+
57
+
***Server's IP appears to be public:**
58
+
Connections to the Azure Database for PostgreSQL server are routed through a publicly accessible Azure gateway. However, the actual server IP is not publicly accessible. For more information, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
Copy file name to clipboardExpand all lines: articles/postgresql/concepts-firewall-rules.md
+9-6Lines changed: 9 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: rachel-msft
5
5
ms.author: raagyema
6
6
ms.service: postgresql
7
7
ms.topic: conceptual
8
-
ms.date: 5/6/2019
8
+
ms.date: 09/22/2019
9
9
---
10
10
# Firewall rules in Azure Database for PostgreSQL - Single Server
11
11
Azure Database for PostgreSQL server firewall prevents all access to your database server until you specify which computers have permission. The firewall grants access to the server based on the originating IP address of each request.
@@ -40,21 +40,24 @@ To allow applications from Azure to connect to your Azure Database for PostgreSQ
40
40
In addition to the Azure portal, firewall rules can be managed programmatically using Azure CLI.
41
41
See also [Create and manage Azure Database for PostgreSQL firewall rules using Azure CLI](howto-manage-firewall-using-cli.md)
42
42
43
-
## Troubleshooting the database server firewall
43
+
## Troubleshooting firewall issues
44
44
Consider the following points when access to the Microsoft Azure Database for PostgreSQL Server service does not behave as you expect:
45
45
46
46
***Changes to the allow list have not taken effect yet:** There may be as much as a five-minute delay for changes to the Azure Database for PostgreSQL Server firewall configuration to take effect.
47
47
48
48
***The login is not authorized or an incorrect password was used:** If a login does not have permissions on the Azure Database for PostgreSQL server or the password used is incorrect, the connection to the Azure Database for PostgreSQL server is denied. Creating a firewall setting only provides clients with an opportunity to attempt connecting to your server; each client must still provide the necessary security credentials.
49
49
50
-
For example, using a JDBC client, the following error may appear.
51
-
> java.util.concurrent.ExecutionException: java.lang.RuntimeException: org.postgresql.util.PSQLException: FATAL: password authentication failed for user "yourusername"
50
+
For example, using a JDBC client, the following error may appear.
51
+
> java.util.concurrent.ExecutionException: java.lang.RuntimeException: org.postgresql.util.PSQLException: FATAL: password authentication failed for user "yourusername"
52
52
53
53
***Dynamic IP address:** If you have an Internet connection with dynamic IP addressing and you are having trouble getting through the firewall, you could try one of the following solutions:
54
54
55
-
* Ask your Internet Service Provider (ISP) for the IP address range assigned to your client computers that access the Azure Database for PostgreSQL Server, and then add the IP address range as a firewall rule.
55
+
* Ask your Internet Service Provider (ISP) for the IP address range assigned to your client computers that access the Azure Database for PostgreSQL Server, and then add the IP address range as a firewall rule.
56
56
57
-
* Get static IP addressing instead for your client computers, and then add the static IP address as a firewall rule.
57
+
* Get static IP addressing instead for your client computers, and then add the static IP address as a firewall rule.
58
+
59
+
***Server's IP appears to be public:**
60
+
Connections to the Azure Database for PostgreSQL server are routed through a publicly accessible Azure gateway. However, the actual server IP is not publicly accessible. For more information, visit the [connectivity architecture article](concepts-connectivity-architecture.md).
58
61
59
62
## Next steps
60
63
For articles on creating server-level and database-level firewall rules, see:
0 commit comments