Virtual network rule: A virtual network rule for your Azure Database for MySQL server is a subnet that is listed in the access control list (ACL) of your Azure Database for MySQL server. It is important to note when applying the Microsoft.Sql service tag to a VNet service endpoint it will configure service endpoint traffic for all Azure SQL Database, Azure Database for MySQL and Azure Database for PostgreSQL servers on the subnet. This service tag also applies to the Azure Database for MySQL and PostgreSQL services. In this article we are interested in the type name of Microsoft.Sql, which refers to the Azure service named SQL Database. Virtual Network service endpoint: A Virtual Network service endpoint is a subnet whose property values include one or more formal Azure service type names. Compute nodes that are outside of your virtual network cannot access your virtual network unless you configure your security to allow access. One subnet can contain multiple VMs or other compute nodes. Any Azure virtual machines (VMs) that you have are assigned to subnets. Subnet: A virtual network contains subnets. Virtual network: You can have virtual networks associated with your Azure subscription. Private Link provides a private IP address in your VNet for the Azure Database for MySQL server. You can also consider using Private Link for connections. In case of VNet peering, if traffic is flowing through a common VNet Gateway with service endpoints and is supposed to flow to the peer, please create an ACL/VNet rule to allow Azure Virtual Machines in the Gateway VNet to access the Azure Database for MySQL server. This feature is available in all regions of Azure where Azure Database for MySQL is deployed for General Purpose and Memory Optimized servers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |