-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
az postgres allow access to azure services #7168
Comments
@tjprescott if you ask me. It is really a bug. But I can't determine if the Azure CLI contains the bug. All I know is when I use the Azure CLI to turn on Allow Access To Azure Serices, it is not working. |
Hi @pascalnaber the "Question" label is often used by us to flag a new issue. The service team will need to investigate this and determine how they want to classify it as they maintain these commands. |
I can confirm that the functionality works when executing an ARM template. So the CLI is not working correct. ARM is doing it correct.
|
@tjprescott, @pascalnaber |
This has been resolved in the latest release. @tjprescott please close. |
Can confirm this worked for me with az cli 2.18.0 e.g.
|
I want "Allow Access To Azure Services" to be turned on for a postgres database.
There is no direct option for this in the CLI, but I found out that this can be done by adding a firewall rule with a specific name and ip-address:
az postgres server firewall-rule create -g$(RESOURCEGROUP_DATA_NAME) -s $ (DATABASESERVER_NAME) -n "AllowAllWindowsAzureIps" --start-ip-address "0.0.0.0" --end-ip-address "0.0.0.0"
The button in the portal is turned on now. This looks great, but onfortunately it is not working.
After disabling it in the portal and enable it again to make it really working for other services to have access to the database.
The text was updated successfully, but these errors were encountered: