Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SQL Firewall Rules: support for allow access to azure services #675

Merged
merged 1 commit into from
Jan 9, 2018

Conversation

tombuildsstuff
Copy link
Contributor

Adding a disclaimer about allow access to azure services

Fixes #275

Copy link
Member

@radeksimko radeksimko left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do I read it right that Azure does not have anything like AWS' VPC Endpoints (yet) hence traffic to Azure's services has to go over the internet? 😮

@tombuildsstuff
Copy link
Contributor Author

Do I read it right that Azure does not have anything like AWS' VPC Endpoints (yet) hence traffic to Azure's services has to go over the internet? 😮

VPC-esque functionality exists for some services (e.g. Redis and App Services) but are public by default for SQL / App Service / Redis / Key Vault afaik.

@tombuildsstuff tombuildsstuff merged commit 9329a56 into master Jan 9, 2018
@tombuildsstuff tombuildsstuff deleted the docs-sql-firewall-rules branch January 9, 2018 16:17
@wtfiwtz
Copy link

wtfiwtz commented Feb 7, 2018

For SQL, if you use Express Route, there are two public IP addresses used.

https://docs.microsoft.com/en-us/azure/sql-database/sql-database-vnet-service-endpoint-rule-overview

You can also add a "virtual network" to the SQL server through the portal or powershell.
https://docs.microsoft.com/en-us/azure/sql-database/sql-database-vnet-service-endpoint-rule-powershell

@rem-aj
Copy link

rem-aj commented Mar 7, 2018

Hello @tombuildsstuff with regards to the earlier OP and link to https://docs.microsoft.com/en-us/azure/sql-database/sql-database-vnet-service-endpoint-rule-powershell

I do not see any support for adding a vnet rule to an azure SQL server - Can we add support for this by any chance? Right now I have to manually add the virtual network rule from the console to allow my servers to talk to the Azure SQL in a secure manner.

@tombuildsstuff
Copy link
Contributor Author

tombuildsstuff commented Mar 7, 2018

@bostonmoto would you mind opening a separate issue about this? Thanks!

@rem-aj
Copy link

rem-aj commented Mar 8, 2018

No problem @tombuildsstuff I have done so here - #955
Thanks!

@ghost
Copy link

ghost commented Mar 31, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks!

@ghost ghost locked and limited conversation to collaborators Mar 31, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
documentation service/mssql Microsoft SQL Server
Projects
None yet
Development

Successfully merging this pull request may close these issues.

azurerm_sql_firewall_rule / azurerm_sql_server missing option for "Allow access to Azure service"s
4 participants