Skip to content

Commit 90cb004

Browse files
authored
Merge pull request #24078 from WilliamDAssafMSFT/20220902-connectivity-architecture-images-refresh
20220902 connectivity architecture images refresh
2 parents 11f3d27 + 7c18c91 commit 90cb004

7 files changed

Lines changed: 4523 additions & 12 deletions

File tree

azure-sql/database/connectivity-architecture.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: This article explains the Azure SQL Database connectivity architect
55
author: rohitnayakmsft
66
ms.author: rohitna
77
ms.reviewer: wiassaf, mathoma, vanto
8-
ms.date: 07/13/2022
8+
ms.date: 09/06/2022
99
ms.service: sql-database
1010
ms.subservice: connect
1111
ms.topic: conceptual
@@ -14,21 +14,23 @@ ms.custom:
1414
- "sqldbrb=1"
1515
---
1616
# Azure SQL Database and Azure Synapse Analytics connectivity architecture
17+
1718
[!INCLUDE[appliesto-sqldb-asa](../includes/appliesto-sqldb-asa.md)]
1819

1920
This article explains architecture of various components that direct network traffic to a server in Azure SQL Database or Azure Synapse Analytics. It also explains different connection policies and how it impacts clients connecting from within Azure and clients connecting from outside of Azure.
2021

21-
This article does *not* apply to **Azure SQL Managed Instance**. Refer to [Connectivity architecture for a managed instance](../managed-instance/connectivity-architecture-overview.md).
22+
- For settings that control connectivity to the [logical server](logical-servers.md) for Azure SQL Database and dedicated SQL pools in Azure Synapse Analytics, see [connectivity settings](connectivity-settings.md).
23+
- This article does *not* apply to **Azure SQL Managed Instance**. Refer to [Connectivity architecture for Azure SQL Managed Instance](../managed-instance/connectivity-architecture-overview.md).
2224

2325
## Connectivity architecture
2426

2527
The following diagram provides a high-level overview of the connectivity architecture.
2628

27-
![Diagram that shows a high-level overview of the connectivity architecture.](./media/connectivity-architecture/connectivity-overview.png)
29+
:::image type="content" source="./media/connectivity-architecture/connectivity-overview.svg" alt-text="Diagram that shows a high-level overview of the connectivity architecture.":::
2830

2931
The following steps describe how a connection is established to Azure SQL Database:
3032

31-
- Clients connect to the gateway, that has a public IP address and listens on port 1433.
33+
- Clients connect to the gateway that has a public IP address and listens on port 1433.
3234
- The gateway, depending on the effective connection policy, redirects or proxies the traffic to the right database cluster.
3335
- Inside the database cluster, traffic is forwarded to the appropriate database.
3436

@@ -46,32 +48,32 @@ Servers in SQL Database and Azure Synapse support the following three options fo
4648

4749
We highly recommend the `Redirect` connection policy over the `Proxy` connection policy for the lowest latency and highest throughput. However, you will need to meet the additional requirements for allowing network traffic as outlined above. If the client is an Azure Virtual Machine, you can accomplish this using Network Security Groups (NSG) with [service tags](/azure/virtual-network/network-security-groups-overview#service-tags). If the client is connecting from a workstation on-premises then you may need to work with your network admin to allow network traffic through your corporate firewall.
4850

49-
> [!IMPORTANT]
51+
> [!IMPORTANT]
5052
> Connections to private endpoint only support **Proxy** as the [connection policy](connectivity-architecture.md#connection-policy).
5153
5254
## Connectivity from within Azure
5355

5456
If you are connecting from within Azure your connections have a connection policy of `Redirect` by default. A policy of `Redirect` means that after the TCP session is established to Azure SQL Database, the client session is then redirected to the right database cluster with a change to the destination virtual IP from that of the Azure SQL Database gateway to that of the cluster. Thereafter, all subsequent packets flow directly to the cluster, bypassing the Azure SQL Database gateway. The following diagram illustrates this traffic flow.
5557

56-
![architecture overview](./media/connectivity-architecture/connectivity-azure.png)
58+
:::image type="content" source="./media/connectivity-architecture/connectivity-azure.svg" alt-text="Diagram of the architecture overview of Azure SQL connectivity via redirection within Azure.":::
5759

5860
## Connectivity from outside of Azure
5961

6062
If you are connecting from outside Azure, your connections have a connection policy of `Proxy` by default. A policy of `Proxy` means that the TCP session is established via the Azure SQL Database gateway and all subsequent packets flow via the gateway. The following diagram illustrates this traffic flow.
6163

62-
![Diagram that shows how the TCP session is established via the Azure SQL Database gateway and all subsequent packets flow via the gateway.](./media/connectivity-architecture/connectivity-onprem.png)
64+
:::image type="content" source="./media/connectivity-architecture/connectivity-outside-azure.svg" alt-text="Diagram that shows how the TCP session is established via the Azure SQL Database gateway and all subsequent packets flow via the gateway.":::
6365

64-
> [!IMPORTANT]
65-
> Additionally open TCP ports 1434 and 14000-14999 to enable [Connecting with DAC](/sql/database-engine/configure-windows/diagnostic-connection-for-database-administrators#connecting-with-dac)
66+
> [!IMPORTANT]
67+
> Open TCP ports 1434 and 14000-14999 to enable [Connecting with DAC](/sql/database-engine/configure-windows/diagnostic-connection-for-database-administrators#connecting-with-dac).
6668
6769
## Gateway IP addresses
6870

6971
The table below lists the individual Gateway IP addresses and also Gateway IP address ranges per region.
7072

7173
Periodically, we will retire Gateways using old hardware and migrate the traffic to new Gateways as per the process outlined at [Azure SQL Database traffic migration to newer Gateways](gateway-migration.md). We strongly encourage customers to use the **Gateway IP address subnets** in order to not be impacted by this activity in a region.
7274

73-
> [!IMPORTANT]
74-
> Logins for SQL Database or Azure Synapse can land on **any of the Gateways in a region**. For consistent connectivity to SQL Database or Azure Synapse, allow network traffic to and from **ALL** Gateway IP addresses and Gateway IP address subnets for the region.
75+
> [!IMPORTANT]
76+
> Logins for SQL Database or Azure Synapse can land on **any of the Gateways in a region**. For consistent connectivity to SQL Database or Azure Synapse, allow network traffic to and from **ALL** Gateway IP addresses and Gateway IP address subnets for the region.
7577
7678
| Region name | Gateway IP addresses | Gateway IP address subnets |
7779
| --- | --- | --- |
@@ -84,7 +86,7 @@ Periodically, we will retire Gateways using old hardware and migrate the traffic
8486
| Canada East | 40.86.226.166, 52.242.30.154, 40.69.105.9 , 40.69.105.10 | 40.69.105.32/29|
8587
| Central US | 13.67.215.62, 52.182.137.15, 104.208.21.1, 13.89.169.20 | 104.208.21.192/29, 13.89.168.192/29, 52.182.136.192/29 |
8688
| China East | 139.219.130.35 | 52.130.112.136/29 |
87-
| China East 2 | 40.73.82.1 | 52.130.120.88/29 |
89+
| China East 2 | 40.73.82.1 | 52.130.120.88/29 |
8890
| China North | 139.219.15.17 | 52.130.128.88/29 |
8991
| China North 2 | 40.73.50.0 | 52.130.40.64/29 |
9092
| East Asia | 52.175.33.150, 13.75.32.4, 13.75.32.14, 20.205.77.200, 20.205.83.224 | 13.75.32.192/29, 13.75.33.192/29 |
@@ -125,3 +127,5 @@ Periodically, we will retire Gateways using old hardware and migrate the traffic
125127
- For information on how to change the Azure SQL Database connection policy for a server, see [conn-policy](/cli/azure/sql/server/conn-policy).
126128
- For information about Azure SQL Database connection behavior for clients that use ADO.NET 4.5 or a later version, see [Ports beyond 1433 for ADO.NET 4.5](adonet-v12-develop-direct-route-ports.md).
127129
- For general application development overview information, see [SQL Database Application Development Overview](develop-overview.md).
130+
- Refer to [Azure IP Ranges and Service Tags – Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519)
131+
- [What is a logical SQL server in Azure SQL Database and Azure Synapse?](logical-servers.md)
Binary file not shown.

0 commit comments

Comments
 (0)