Skip to content

Commit f13e7d2

Browse files
committed
Learn Editor: Update how-to-manage-firewall-cli.md
1 parent 5e7360d commit f13e7d2

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/mysql/flexible-server/how-to-manage-firewall-cli.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -110,19 +110,19 @@ Use the `az mysql flexible-server firewall-rule create` command to create new fi
110110
To allow access to a range of IP addresses, provide the IP address as the Start and End IP addresses, as in this example.
111111
112112
```azurecli-interactive
113-
az mysql flexible-server firewall-rule create --name mydemoserver --start-ip-address 13.83.152.0 --end-ip-address 13.83.152.15
113+
az mysql flexible-server firewall-rule create --resource-group testGroup --name mydemoserver --start-ip-address 13.83.152.0 --end-ip-address 13.83.152.15
114114
```
115115

116116
To allow access for a single IP address, provide the single IP address, as in this example.
117117

118118
```azurecli-interactive
119-
az mysql flexible-server firewall-rule create --name mydemoserver --start-ip-address 1.1.1.1
119+
az mysql flexible-server firewall-rule create --resource-group testGroup --name mydemoserver --start-ip-address 1.1.1.1
120120
```
121121

122122
To allow applications from Azure IP addresses to connect to your Azure Database for MySQL flexible server instance, provide the IP address 0.0.0.0 as the Start IP, as in this example.
123123

124124
```azurecli-interactive
125-
az mysql flexible-server firewall-rule create --name mydemoserver --start-ip-address 0.0.0.0
125+
az mysql flexible-server firewall-rule create --resource-group testGroup --name mydemoserver --start-ip-address 0.0.0.0
126126
```
127127

128128
> [!IMPORTANT]

0 commit comments

Comments
 (0)