Private Link for Azure Database for MySQL – Flexible Server (General Availability)

This post has been republished via RSS; it originally appeared at: New blog articles in Microsoft Community Hub.

We're thrilled to announce the general availability (GA) of Azure Private Link support for Azure Database for MySQL - Flexible Server (available in all public regions). This exciting feature allows you to establish secure connections to your Azure Database for MySQL flexible servers directly within the Azure environment using private endpoints, just as you can with various other Platform as a Service (PaaS) offerings and customer-owned/partner services on Azure.

 

Now, you can effortlessly access your MySQL flexible servers from any resource within your dedicated Virtual Network (VNet) or peered VNets, enabling a seamless integration with other Azure servicesBid farewell to the complexities of VNet management!

 

Sudheesh_N_0-1694501969028.png

 

With this feature, Azure Database for MySQL - Flexible Server now offers three distinct methods for configuring connectivity to your servers:

 

  • Public Access:  Your flexible server is accessed through a public endpoint, represented by a publicly resolvable DNS address. You retain the flexibility to define firewall rules that specify the range of permissible IP addresses allowed to access your server. 
  • Private Endpoint (via Azure Private Link):  Private endpoints provide a secure means to access Azure Database for MySQL - Flexible Server via a Private Link, allowing both public and private access simultaneously. If necessary, you have the choice to restrict public access using “Allow public access to this resource through the internet using a public IP address” setting, ensuring that connections are exclusively routed through private endpoints for heightened network security. It's also possible to configure or update Private Link settings either during or after the creation of the server. 
  • Private Access (VNet Integration):  Private Access enable secure data access to the Azure Database for MySQL - Flexible Server with VNet integration. A delegated subnet is required for leveraging this feature and it can only be enabled during server creation. Private Access doesn’t support any public endpoints by design and cannot communicate with clients or servers within the virtual network.

 

How do I get started?

 

For details on getting started, watch the demo video below or refer to the following articles in our product documentation:

 

 

Conclusion 

 

The Private link feature empowers you to securely connect to Azure database for MySQL – Flexible Server. Take advantage of this revolutionary feature for enhanced security and reduced the risk of data filtration.

 

If you have any feedback or questions about the information provided above, please leave a comment below or email us at AskAzureDBforMySQL@service.microsoft.com . Thank you.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.