What's new?
- You can now removed unapproved Firewall IP Ranges on PostgreSQL servers and flexi servers. To get started, set the
Azure > PostgreSQL > Server > Firewall > IP Ranges > Approved > *andAzure > PostgreSQL > Flexible Server > Firewall > IP Ranges > Approved > *policies respectively. - You can now stop unapproved flexi servers. To get started, set the
Azure > PostgreSQL > Flexible Server > Approvedpolicy toEnforce: Stop unapprovedorEnforce: Stop unapproved if new.
Control Types
- Azure > PostgreSQL > Flexible Server > Firewall
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges > Approved
- Azure > PostgreSQL > Server > Firewall
- Azure > PostgreSQL > Server > Firewall > IP Ranges
- Azure > PostgreSQL > Server > Firewall > IP Ranges > Approved
Policy Types
- Azure > PostgreSQL > Flexible Server > Firewall
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges > Approved
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges > Approved > Compiled Rules
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges > Approved > IP Addresses
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges > Approved > Rules
- Azure > PostgreSQL > Server > Firewall
- Azure > PostgreSQL > Server > Firewall > IP Ranges
- Azure > PostgreSQL > Server > Firewall > IP Ranges > Approved
- Azure > PostgreSQL > Server > Firewall > IP Ranges > Approved > Compiled Rules
- Azure > PostgreSQL > Server > Firewall > IP Ranges > Approved > IP Addresses
- Azure > PostgreSQL > Server > Firewall > IP Ranges > Approved > Rules
Action Types
- Azure > PostgreSQL > Flexible Server > Stop
- Azure > PostgreSQL > Server > Update Firewall IP Ranges