Skip to content

Commit f89a22d

Browse files
authored
Merge pull request #43921 from paulkel/patch-29
Correct assumption all MI subnets will be in 10.x.x.x/8
2 parents 283a799 + 83cbf0d commit f89a22d

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/sql-database/sql-database-managed-instance-connectivity-architecture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,7 @@ Deploy a managed instance in a dedicated subnet inside the virtual network. The
272272
|mi-216-220-208-20-nexthop-internet|216.220.208.0/20|Internet|
273273
||||
274274

275-
\* MI SUBNET refers to the IP address range for the subnet in the form 10.x.x.x/y. You can find this information in the Azure portal, in subnet properties.
275+
\* MI SUBNET refers to the IP address range for the subnet in the form x.x.x.x/y. You can find this information in the Azure portal, in subnet properties.
276276

277277
In addition, you can add entries to the route table to route traffic that has on-premises private IP ranges as a destination through the virtual network gateway or virtual network appliance (NVA).
278278

@@ -309,7 +309,7 @@ Deploy a managed instance in a dedicated subnet inside the virtual network. The
309309
> [!IMPORTANT]
310310
> Ensure there is only one inbound rule for ports 9000, 9003, 1438, 1440, 1452 and one outbound rule for ports 443, 12000. Managed Instance provisioning through Azure Resource Manager deployments will fail if inbound and outbound rules are configured separately for each port. If these ports are in separate rules, the deployment will fail with error code `VnetSubnetConflictWithIntendedPolicy`
311311
312-
\* MI SUBNET refers to the IP address range for the subnet in the form 10.x.x.x/y. You can find this information in the Azure portal, in subnet properties.
312+
\* MI SUBNET refers to the IP address range for the subnet in the form x.x.x.x/y. You can find this information in the Azure portal, in subnet properties.
313313

314314
> [!IMPORTANT]
315315
> Although required inbound security rules allow traffic from _any_ source on ports 9000, 9003, 1438, 1440, and 1452, these ports are protected by a built-in firewall. For more information, see [Determine the management endpoint address](sql-database-managed-instance-find-management-endpoint-ip-address.md).

0 commit comments

Comments
 (0)