Events
Sep 15, 6 AM - Sep 17, 3 PM
The best SQL community-led learning event. Sept 2025. Save €200 with code FABLEARN.
Get registeredThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Important
Azure Database for MariaDB is on the retirement path. We strongly recommend that you migrate to Azure Database for MySQL. For more information about migrating to Azure Database for MySQL, see What's happening to Azure Database for MariaDB?.
This article describes how you can configure an Azure Database for MariaDB server to deny all public configurations and allow only connections through private endpoints to further enhance the network security.
To complete this how-to guide, you need:
Follow these steps to set MariaDB server Deny Public Network Access:
In the Azure portal, select your existing Azure Database for MariaDB server.
On the MariaDB server page, under Settings, select Connection security to open the connection security configuration page.
In Deny Public Network Access, select Yes to enable deny public access for your MariaDB server.
Select Save to save the changes.
A notification will confirm that connection security setting was successfully enabled.
Learn about how to create alerts on metrics.
Events
Sep 15, 6 AM - Sep 17, 3 PM
The best SQL community-led learning event. Sept 2025. Save €200 with code FABLEARN.
Get registered