What's new?
- You can now removed unapproved Firewall IP Ranges on PostgreSQL servers and flexi servers. To get started, set the
Azure > PostgreSQL > Server > Firewall > IP Ranges > Approved > *
andAzure > PostgreSQL > Flexible Server > Firewall > IP Ranges > Approved > *
policies respectively. - You can now stop unapproved flexi servers. To get started, set the
Azure > PostgreSQL > Flexible Server > Approved
policy toEnforce: Stop unapproved
orEnforce: Stop unapproved if new
.
Control Types
- Azure > PostgreSQL > Flexible Server > Firewall
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges > Approved
- Azure > PostgreSQL > Server > Firewall
- Azure > PostgreSQL > Server > Firewall > IP Ranges
- Azure > PostgreSQL > Server > Firewall > IP Ranges > Approved
Policy Types
- Azure > PostgreSQL > Flexible Server > Firewall
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges > Approved
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges > Approved > Compiled Rules
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges > Approved > IP Addresses
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges > Approved > Rules
- Azure > PostgreSQL > Server > Firewall
- Azure > PostgreSQL > Server > Firewall > IP Ranges
- Azure > PostgreSQL > Server > Firewall > IP Ranges > Approved
- Azure > PostgreSQL > Server > Firewall > IP Ranges > Approved > Compiled Rules
- Azure > PostgreSQL > Server > Firewall > IP Ranges > Approved > IP Addresses
- Azure > PostgreSQL > Server > Firewall > IP Ranges > Approved > Rules
Action Types
- Azure > PostgreSQL > Flexible Server > Stop
- Azure > PostgreSQL > Server > Update Firewall IP Ranges