Skip to content

Commit 6de1b41

Browse files
Merge pull request #261751 from SudheeshGH/docs-editor/concepts-networking-private-li-1703133760
Update concepts-networking-private-link.md
2 parents a21a24f + 06d9873 commit 6de1b41

1 file changed

Lines changed: 0 additions & 13 deletions

File tree

articles/mysql/flexible-server/concepts-networking-private-link.md

Lines changed: 0 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -29,19 +29,6 @@ Here are some benefits for using the networking private link feature with Azure
2929

3030
Data exfiltration in Azure Database for MySQL flexible server is when an authorized user, such as a database admin, can extract data from one system and move it to another location or system outside the organization. For example, the user moves the data to a storage account owned by a third party.
3131

32-
Consider a scenario with a user running MySQL Workbench inside an Azure Virtual Machine (VM) connecting to an Azure Database for MySQL flexible server instance provisioned in West US. The example below shows how to limit access with public endpoints on Azure Database for MySQL flexible server using network access controls.
33-
34-
- Disable all Azure service traffic to Azure Database for MySQL flexible server via the public endpoint by setting *Allow Azure Services* to OFF. Ensure no IP addresses or ranges can access the server via [firewall rules](../single-server/concepts-firewall-rules.md).
35-
36-
- Only allow traffic to the Azure Database for MySQL flexible server instance using the Private IP address of the VM. For more information, see the article on [VNet firewall rules](../single-server/how-to-manage-vnet-using-portal.md).
37-
38-
- On the Azure VM, narrow down the scope of outgoing connection by using Network Security Groups (NSGs) and Service Tags as follows
39-
40-
- Specify an NSG rule to allow traffic for *Service Tag = SQL.WestUs* - only allowing connection to Azure Database for MySQL flexible server in West US
41-
- Specify an NSG rule (with a higher priority) to deny traffic for *Service Tag = SQL* - denying connections to Update to Azure Database for MySQL flexible server in all regions
42-
43-
At the end of this setup, the Azure VM can connect only to Azure Database for MySQL flexible server in the West US region. However, the connectivity isn't restricted to a single Azure Database for MySQL flexible server instance. The VM can still connect to any Azure Database for MySQL flexible server instance in the West US region, including the databases that aren't part of the subscription. While we've reduced the scope of data exfiltration in the above scenario to a specific region, we still need to eliminate it.
44-
4532
With Private Link, you can now set up network access controls like NSGs to restrict access to the private endpoint. By mapping individual Azure PaaS resources to specific private endpoints, access is limited solely to the designated PaaS resource. This effectively restricts a malicious user from accessing any other resource beyond their authorized scope.
4633

4734
### On-premises connectivity over private peering

0 commit comments

Comments
 (0)