Policy: Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges > Approved > IP Addresses
Configure PostgreSQL flexible server to allow access from specific internet IP addresses. This configuration grants access to specific internet-based services and on-premises networks, and blocks general internet traffic. Provide allowed internet IP addresses in the form of individual startIpAddress and endIpAddress like in the below example. Example: - startIpAddress: 203.0.113.5
endIpAddress: 203.0.113.5
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
- Azure > PostgreSQL > Flexible Server > Firewall
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges
- Azure > PostgreSQL > Flexible Server > Firewall > IP Ranges > Approved
Policy Specification
Schema Type |
|
---|---|
Default |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/resourceApproved
- tmod:@turbot/azure-postgresql#/policy/types/flexibleServerFirewallIpRangesApprovedIpAddresses
- turbot graphql policy-type --id "tmod:@turbot/azure-postgresql#/policy/types/flexibleServerFirewallIpRangesApprovedIpAddresses"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/azure-postgresql#/policy/types/flexibleServerFirewallIpRangesApprovedIpAddresses"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI