Deny Public Network Access in Azure Database for PostgreSQL Single server using Azure portal
APPLIES TO:
Azure Database for PostgreSQL - Single Server
Important
Azure Database for PostgreSQL - Single Server is on the retirement path. We strongly recommend that you upgrade to Azure Database for PostgreSQL - Flexible Server. For more information about migrating to Azure Database for PostgreSQL - Flexible Server, see What's happening to Azure Database for PostgreSQL Single Server?.
This article describes how you can configure an Azure Database for PostgreSQL Single server to deny all public configurations and allow only connections through private endpoints to further enhance the network security.
Prerequisites
To complete this how-to guide, you need:
- An Azure Database for PostgreSQL Single server with General Purpose or Memory Optimized pricing tier.
Set Deny Public Network Access
Follow these steps to set PostgreSQL Single server Deny Public Network Access:
In the Azure portal, select your existing Azure Database for PostgreSQL Single server.
On the PostgreSQL Single server page, under Settings, select Connection security to open the connection security configuration page.
In Deny Public Network Access, select Yes to enable deny public access for your PostgreSQL Single server.
Select Save to save the changes.
A notification will confirm that connection security setting was successfully enabled.
Next steps
Learn about how to create alerts on metrics.
Зворотний зв’язок
https://aka.ms/ContentUserFeedback.
Очікується незабаром: протягом 2024 року ми будемо припиняти використання механізму реєстрації проблем у GitHub для зворотного зв’язку щодо вмісту й замінювати його новою системою зворотного зв’язку. Докладніше:Надіслати й переглянути відгук про