Adventures with Azure DevOps: Connect to Azure Database for MySQL

I have been doing a lot around Azure DevOps as of late, and started dipping my toe into the CI/CD for databases, thought of calling it DataOps, but that doesn’t look like the correct term.

Anyway, in my Azure DevOps pipeline I wanted to run a few tasks against an Azure Database for MySQL, e.g. create a new schema, create tables, load test data, etc.

Before I created my pipeline with all the tasks, I wanted to first make sure that Azure DevOps would be able to hit the Azure Database for MySQL. I assumed it would, but this was new to me.

To set things up, I first created an Azure Database for MySQL.

In the Connection Security section of my Azure Database for MySQL, I added my IP address so I could connect from my desktop.

Connection Security Settings

Using MySQL Workbench, I created a schema called schema1 and a table called table1, not very original, but gets the job done.

I also added a couple of rows of data to table1 which consists of two columns named, you guessed it, named Column1 and Column2.

MySQL Workbench

In Azure DevOps, I created a new YML pipeline, called MySQL Test, and started a new azure-pipelines.yml file.

The code in the azure-pipelines.yml file looks like the following:


All the pipeline does is execute a query against the schema1 schema using the AzureMysqlDeployment@1 task.

Note, there is no trigger defined in the yml file, so you have to run it manually to see it in action.

I also leveraged variables in my pipeline to pass in secrets, normally I would pull these secrets from an Azure Key Vault, but tried to keep things simple.

DevOps Pipeline Variables

Everything looks good!

I ran my pipeline, and everything looked like it passed, but wanted to take a further look at the logs, specifically for the AzureMysqlDeployment@1 task.

Pipeline Run Results

Hmmm. Interesting.

While it says the IP address cannot connect, it still executes the query successfully.

That is odd.

See my update below, think I figured out what happened.

Let’s see what happens when I Allow access to Azure services in Connection Security for the Azure Database for MySQL.

Enable Allow access to Azure services

Let’s run the pipeline again.

Pipeline Run Results

That looks better.

No firewall issues, but still odd my initial run was still able to run the query, will dig into that a little further, but for now, I am able to successfully connect to my Azure Database for MySQL from Azure DevOps!

Well, that’s it! Thanks for reading!


Was struggling with why my query still ran when I had not added a firewall rule, diving into the AzureMysqlDeployment@1 task a little deeper and I discovered an argument called IpDetectionMethod.

For successful execution of the task, we need to enable administrators to access the Azure Database for MySQL Server from the IP Address of the automation agent. By selecting auto-detect you can automatically add firewall exception for range of possible IP Address of automation agent or else you can specify the range explicitly.

– Azure Database for Mysql Deployment task

So it looks like when it encounters that error it adds a firewall rule so that the script can run.

Not sure if I like that or not.

See Azure Database for Mysql Deployment task – Azure Pipelines | Microsoft Docs for more information.

Leave a Reply

Your email address will not be published.