Deny Public Network Access in Azure Database for PostgreSQL Single server using Azure portal

This article describes how you can configure an Azure Database for PostgreSQL Single server to deny all public configurations and allow only connections through private endpoints to further enhance the network security.

Prerequisites

To complete this how-to guide, you need:

Set Deny Public Network Access

Follow these steps to set PostgreSQL Single server Deny Public Network Access:

  1. In the Azure portal, select your existing Azure Database for PostgreSQL Single server.

  2. On the PostgreSQL Single server page, under Settings, click Connection security to open the connection security configuration page.

  3. In Deny Public Network Access, select Yes to enable deny public access for your PostgreSQL Single server.

    Azure Database for PostgreSQL Single server Deny network access

  4. Click Save to save the changes.

  5. A notification will confirm that connection security setting was successfully enabled.

    Azure Database for PostgreSQL Single server Deny network access success

Next steps

Learn about how to create alerts on metrics.