Skip to content

Commit e2242ed

Browse files
committed
fix links.
1 parent 1aaf19a commit e2242ed

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/mysql/concepts-firewall-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ To allow applications from Azure to connect to your Azure Database for MySQL ser
3939
![Configure Allow access to Azure services in the portal](./media/concepts-firewall-rules/allow-azure-services.png)
4040

4141
### Connecting from a VNet
42-
To connect securely to your Azure Database for MySQL server from a VNet, consider using [VNet service endpoints](./concepts-data-access-security-vnet.md).
42+
To connect securely to your Azure Database for MySQL server from a VNet, consider using [VNet service endpoints](./concepts-data-access-and-security-vnet.md).
4343

4444
## Programmatically managing firewall rules
4545
In addition to the Azure portal, firewall rules can be managed programmatically by using the Azure CLI. See also [Create and manage Azure Database for MySQL firewall rules using Azure CLI](./howto-manage-firewall-using-cli.md)
@@ -64,4 +64,4 @@ Connections to the Azure Database for MySQL server are routed through a publicly
6464

6565
* [Create and manage Azure Database for MySQL firewall rules using the Azure portal](./howto-manage-firewall-using-portal.md)
6666
* [Create and manage Azure Database for MySQL firewall rules using Azure CLI](./howto-manage-firewall-using-cli.md)
67-
- [VNet service endpoints in Azure Database for MySQL](./concepts-data-access-security-vnet.md)
67+
- [VNet service endpoints in Azure Database for MySQL](./concepts-data-access-and-security-vnet.md)

articles/postgresql/concepts-firewall-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ To allow applications from Azure to connect to your Azure Database for PostgreSQ
3737
![Configure Allow access to Azure services in the portal](media/concepts-firewall-rules/allow-azure-services.png)
3838

3939
### Connecting from a VNet
40-
To connect securely to your Azure Database for PostgreSQL server from a VNet, consider using [VNet service endpoints](./concepts-data-access-security-vnet.md).
40+
To connect securely to your Azure Database for PostgreSQL server from a VNet, consider using [VNet service endpoints](./concepts-data-access-and-security-vnet.md).
4141

4242
## Programmatically managing firewall rules
4343
In addition to the Azure portal, firewall rules can be managed programmatically using Azure CLI.
@@ -66,4 +66,4 @@ Connections to the Azure Database for PostgreSQL server are routed through a pub
6666
For articles on creating server-level and database-level firewall rules, see:
6767
* [Create and manage Azure Database for PostgreSQL firewall rules using the Azure portal](howto-manage-firewall-using-portal.md)
6868
* [Create and manage Azure Database for PostgreSQL firewall rules using Azure CLI](howto-manage-firewall-using-cli.md)
69-
- [VNet service endpoints in Azure Database for PostgreSQL](./concepts-data-access-security-vnet.md)
69+
- [VNet service endpoints in Azure Database for PostgreSQL](./concepts-data-access-and-security-vnet.md)

0 commit comments

Comments
 (0)