SQL Azure Firewall Rules on New Portal (2014) - azure

Another year and another Azure portal redesign. I'm now running in the new Preview and I cannot find where to allow a firewall rule so that outside IP addresses (Visual Studio on my own machine) can access Azure SQL.
Does anyone know where this can be set?

Sure, here's the journey: Click Browse, select SQL databases, select your database, now in the database blade click on the server (not the database), you'll now see the server blade where you can click on the Firewall settings. VoilĂ !

Related

How to connect from Web App to SQL Database in another region "privately"?

Is there a way to establish a connection from Azure Web App to Azure SQL Database in another region "privately", that is without having to leave database open to the public.
Specifically, I would like my database to have the following firewall options set on the database:
"Deny public network access" - YES
"Allow Azure services and resources to access this server" - NO
What I have tried unsuccessfully (it is possible that I got something wrong in my setup):
VNET-VNET peering - allows cross region VNET connection but does not seem to work for Web App
SQL Database Private Endpoint - Endpoint was created in VNET hosted in the same region as Web App.
Update:
Tried to follow instructions in Azure Global VNet peering and WebApps but I am not sure what VNET should gateways be created in? Create a gateway first in the remote network then checked "App Service Plan" blade, then created Gateway in the Web App VNET, still no luck.
In the "App Service Plan" blade, all of the gateway related settings are greyed out and gateway status is "N/A". "Sync Network" button is greyed out.
You should be able to do this using a Private Link, there are instructions on the following Microsoft documentation: Multi-region web app with private connectivity to database
However, the part about adding the private link (i.e. part 3a of the "Deploy this scenario" section) isn't very clear as to what settings you need to select when actually creating the Private Link so I have created a blog post which helps to explain this part a bit better with screenshots: Connect from Azure Web App to Azure SQL Database in another region using Private Link
Firstly, your linked SO answer is used to access Azure VMs from Azure web app. The Azure VMs are Azure IaaS. However, the Azure SQL database is Azure PaaS. You don't need to follow it in this scenario.
If you want to connect from Web App to Azure SQL Database in another region in a security way, you could do the these two steps:
Enable regional VNet Integration with app service in the same region.
Add the integrated subnet in the firewall and virtual networks in the Azure SQL database server. If selected subnet does not have service endpoint enabled for Microsoft.Sql. Enabling access may take up to 15 minutes to complete.
For more information, you could refer to this blog.
The above method will add the integrated subnet in the SQL server firewall. If you don't like to add it, you may consider to use Azure Private Link and with gateway required VNet integration. See this blog for more information. You could make sure you have set up the gateway in your virtual network (it will have private endpoint for SQL database and in the same region as the SQL database) well. see Use cases of Private Link for Azure SQL Database for more details.

How to enable the access to Azure services in my AZURE SQL database server?

I'm trying to create a "Integration Runtime" (AZURE-SSIS type) in my data factory. (To run my SSIS packages in cloud) I already have a virtual machine (Azure SQL data base server Up and running).
While during the IR creation process I'm not able to link my AZURE SQL database SSISDB catalog to "Catalog database server endpoint" (OR) the server is not showing up in the drop down box.
In the MSDN blog it says
"Confirm that the **Allow access to Azure services** setting is enabled for the database server. This is not applicable when you use Azure SQL Database with virtual network service endpoints/Managed Instance to host SSISDB."
Could anyone know how to enable this feature ? I hope by enabling this feature I can link my server in the IR and run the packages in the cloud.
Thanks
To allow applications from Azure to connect to your Azure SQL server,
Azure connections must be enabled. When an application from Azure
attempts to connect to your database server, the firewall verifies
that Azure connections are allowed. A firewall setting with starting
and ending address equal to 0.0.0.0 indicates Azure connections are
allowed. If the connection attempt is not allowed, the request does
not reach the Azure SQL Database server.
you can do it any way, powershell, az cli, arm templates. if you go to the portal to the firewall blade, there would be a button to do that.
https://learn.microsoft.com/en-us/azure/sql-database/sql-database-firewall-configure
Please take a look where is located on below image.
On this documentation you will have instructions how to reach that screen.

Azure SQL Server configuration SQL Server Connectivity Level locked/grayed out

We have an Azure VM where SQL Server 2017 is installed. When the VM was set up, the level "local" was selected. Now we determined it should be private and not "local". We clicked the Edit pencil icon on the portal but the drop down box with supposedly 3 possible option values (public, private, local) is grayed out.
What can be done to open the drop down box and change the SQL Server connectivity level? SQL Server is configured with tcp/ip/named pipes/shared memory enabled and the SQL Server service was restarted but that made no difference.
Thanks
It seems your browser issue. I test on Edge, I could modify it.
I suggest you could change a browser or change a PC and test again.

connect to windows azure database from VS 2012 Express

I have been following this example
http://www.windowsazure.com/en-us/develop/net/tutorials/web-site-with-sql-database/
and I could not connect to windows azure database. It gives me the following error
"A network-related error occurred while establishing a connection to SQL Server. The server was not found or was not accessible."
I have the IP address set, and made a firewall role already.
Any ideas :(
First test whether your ISP (Internet Provider) or corporate system administrator is not blocking outgoing connections on port 1433! This is very common issue with accessing SQL Azure from own laptop/computer.
To test firewall setting just navigate to the web management portal for your SQL Azure Instance. It has a default address:
https://[your_server_name].database.windows.net/?langid=en-us
This will open web management (Silverlight) portal for your SQL Azure Server. You can use to test whether you have correctly configured Firewall Rules on the Azure side. If you have done so, you will be able to log-in from the browser. Note that even if it uses the browser the management portal still respects the Firewall rules for the SQL Azure database.
If cannot log-in from the SQL Azure management portal, then check again your real IP address and make sure it matches the firewall rules.
If you can login from the portal, but not from Visual Studio - then check with your system administrators (or Internet provider support line) whether they have blocked outgoing connections on port 1433. If this is the case you cannot do anything, but just work from the web portal.

Access MS SQL Server from a web application present in linux machine?

I can access MS Sql from a web application resides in Windows. But it is not possible with a web application reside in Linux. com.microsoft.sqlserver.jdbc.SQLServerDriver is used in this application.
Following are the configurations.
Tomcat 6
MS SQL 2005
jdk6
Driver :com.microsoft.sqlserver.jdbc.SQLServerDriver
There aren't problems. Just make sure that the server in which resides the web app have network visibility on the server where reside MS SQL 2005.
Make sure also that MS SQL 2005 have network connection enabled. To do that look at those lines from microsoft documentation:
"You must enable remote connections for each instance of SQL Server 2005 that you want to connect to from a remote computer. To do this, follow these steps:
Click Start, point to Programs, point to Microsoft SQL Server 2005, point to Configuration Tools, and then click SQL Server Surface Area Configuration.
On the SQL Server 2005 Surface Area Configuration page, click Surface Area Configuration for Services and Connections.
On the Surface Area Configuration for Services and Connections page, expand Database Engine, click Remote Connections, click Local and remote connections, click the appropriate protocol to enable for your environment, and then click Apply.
Note Click OK when you receive the following message:
Changes to Connection Settings will not take effect until you restart the Database Engine service.
On the Surface Area Configuration for Services and Connections page, expand Database Engine, click Service, click Stop, wait until the MSSQLSERVER service stops, and then click Start to restart the MSSQLSERVER service."

Resources