Firewall missing allow azure services access
The server security settings are missing the allow azure services option, as im having to manually enter in ip addresses that my web apps and the cloud shell uses.
‘Allow access to Azure services’ is now enabled for Azure Database for MySQL service. Please go to the Connection Security blade in your service instance.
Azure Database for MySQL team
@Fernando please vote for VNet support in this idea: https://feedback.azure.com/forums/597982-azure-database-for-mysql/suggestions/19273909-vnet-integration
It should include VNets as well. We might run Kubernetes clusters in one of those...
Miracle Zhou commented
@367451749-tao-wu: any update?
Add the option to enable other Azure Services (e.g. Web Apps) to connect the database without white-listing every single IP
Andrew Bailey commented
This is a serious barrier to adoption. There are two official workarounds at the moment (https://docs.microsoft.com/en-us/azure/mysql/howto-connect-webapp):
1) Disable the firewall by allowing all IP addresses.
2) Enter the IP addresses for the app service manually but accept the possibility that they could change without warning and bring your system down.
Neither answer here is suitable for a production system. Any update on when this is due?
Tao Wu commented
We are working on this now and will have it in the next few months. Follow us @AzureDBMySQL on Twitter for announcements of new features.