You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-apps/aspire-dashboard.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,12 @@ author: craigshoemaker
6
6
ms.service: azure-container-apps
7
7
ms.custom: devx-track-azurecli, devx-track-dotnet
8
8
ms.topic: how-to
9
-
ms.date: 1/14/2025
9
+
ms.date: 05/02/2025
10
10
ms.author: cshoe
11
11
zone_pivot_groups: azure-azd-cli-portal
12
12
---
13
13
14
-
# Read real time app data with Aspire Dashboard in Azure Container Apps (preview)
14
+
# Read real time app data with Aspire Dashboard in Azure Container Apps
15
15
16
16
The [Aspire Dashboard](/dotnet/aspire/fundamentals/dashboard/overview) displays live data about how applications and other resources are running within an environment.
# Tutorial: Enable Azure Container Apps on Azure Arc-enabled Kubernetes
14
14
15
15
With [Azure Arc-enabled Kubernetes clusters](/azure/azure-arc/kubernetes/overview), you can create a [Container Apps enabled custom location](azure-arc-create-container-app.md) in your on-premises or cloud Kubernetes cluster to deploy your Azure Container Apps applications as you would any other region.
Copy file name to clipboardExpand all lines: articles/container-apps/azure-arc-overview.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,11 +5,11 @@ services: container-apps
5
5
author: craigshoemaker
6
6
ms.service: azure-container-apps
7
7
ms.topic: conceptual
8
-
ms.date: 03/06/2025
8
+
ms.date: 05/02/2025
9
9
ms.author: cshoe
10
10
---
11
11
12
-
# Azure Container Apps on Azure Arc (Preview)
12
+
# Azure Container Apps on Azure Arc
13
13
14
14
You can run Container Apps on an Azure Arc-enabled AKS or AKS on Azure Local cluster.
15
15
@@ -36,7 +36,7 @@ The following public preview limitations apply to Azure Container Apps on Azure
36
36
37
37
| Limitation | Details |
38
38
|---|---|
39
-
| Supported Azure regions | East US, West Europe, East Asia|
39
+
| Supported Azure regions |Central US, East Asia, East US, North Central US, Southeast Asia, Sweden Central, UK South, West Europe, West US|
40
40
| Cluster networking requirement | Must support [LoadBalancer](https://kubernetes.io/docs/concepts/services-networking/service/#loadbalancer) service type |
# Create a private link to an Azure Container App with Azure Front Door (preview)
14
+
# Create a private link to an Azure Container App with Azure Front Door
15
15
16
16
In this article, you learn how to connect directly from Azure Front Door to your Azure Container Apps using a private link instead of the public internet. In this tutorial, you create an Azure Container Apps workload profiles environment, an Azure Front Door, and connect them securely through a private link. You then verify the connectivity between your container app and the Azure Front Door.
# Use a private endpoint with an Azure Container Apps environment (preview)
14
+
# Use a private endpoint with an Azure Container Apps environment
15
15
16
16
In this article, you learn how to use a private endpoint to securely access your Azure Container App without exposing it to the public Internet.
17
17
18
18
A private endpoint uses a private IP address from your virtual network (VNet). This endpoint connects you privately and securely to a service powered by [Azure Private Link](/azure/private-link/private-link-overview).
19
19
20
-
Private endpoints on Azure Container Apps only support inbound HTTP traffic. TCP traffic isn't supported.
Copy file name to clipboardExpand all lines: articles/container-apps/ingress-overview.md
+19-11Lines changed: 19 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.service: azure-container-apps
7
7
ms.custom:
8
8
- ignite-2024
9
9
ms.topic: conceptual
10
-
ms.date: 05/03/2023
10
+
ms.date: 05/02/2025
11
11
ms.author: cshoe
12
12
---
13
13
@@ -55,7 +55,7 @@ With HTTP ingress enabled, your container app has:
55
55
- Endpoints that expose ports 80 (for HTTP) and 443 (for HTTPS)
56
56
- By default, HTTP requests to port 80 are automatically redirected to HTTPS on 443
57
57
- A fully qualified domain name (FQDN)
58
-
- Request timeout is 240 seconds
58
+
- Request time out is 240 seconds
59
59
60
60
#### HTTP headers
61
61
@@ -64,7 +64,7 @@ HTTP ingress adds headers to pass metadata about the client request to your cont
64
64
| Header | Description | Values |
65
65
|---|---|---|
66
66
|`X-Forwarded-Proto`| Protocol used by the client to connect with the Container Apps service. |`http` or `https`|
67
-
|`X-Forwarded-For`| The IP address of the client that sent the request. | IP address of the sender. If specified in intital request, it will be overwritten. |
67
+
|`X-Forwarded-For`| The IP address of the client that sent the request. | IP address of the sender. If specified in initial request, it is overwritten. |
68
68
|`X-Forwarded-Host`| The host name the client used to connect with the Container Apps service. ||
69
69
|`X-Forwarded-Client-Cert`| The client certificate if `clientCertificateMode` is set. | Semicolon separated list of Hash, Cert, and Chain. For example: `Hash=....;Cert="...";Chain="...";`|
70
70
@@ -73,7 +73,7 @@ HTTP ingress adds headers to pass metadata about the client request to your cont
73
73
Container Apps supports TCP-based protocols other than HTTP or HTTPS. For example, you can use TCP ingress to expose a container app that uses the [Redis protocol](https://redis.io/topics/protocol).
74
74
75
75
> [!NOTE]
76
-
> External TCP ingress is only supported for Container Apps environments that use a [custom VNET](vnet-custom.md). TCP ingress is not supported for apps that accept inbound traffic through a [private endpoint](networking.md#private-endpoint).
76
+
> External TCP ingress is only supported for Container Apps environments that use a [custom VNET](vnet-custom.md).
77
77
78
78
With TCP ingress enabled, your container app:
79
79
@@ -88,14 +88,22 @@ In addition to the main HTTP/TCP port for your container apps, you might expose
88
88
> To use this feature, you must have the container apps CLI extension. Run `az extension add -n containerapp` in order to install the latest version of the container apps CLI extension.
89
89
90
90
The following apply to additional TCP ports:
91
-
- Additional TCP ports can only be external if the app itself is set as external and the container app is using a custom VNet.
92
-
- Any externally exposed additional TCP ports must be unique across the entire Container Apps environment. This includes all external additional TCP ports, external main TCP ports, and 80/443 ports used by built-in HTTP ingress. If the additional ports are internal, the same port can be shared by multiple apps.
93
-
- If an exposed port isn't provided, the exposed port will default to match the target port.
91
+
92
+
- More TCP ports can only be external if the app itself is set as external and the container app is using a custom VNet.
93
+
94
+
- Any externally exposed extra TCP ports must be unique across the entire Container Apps environment. This includes all external extra TCP ports, external main TCP ports, and 80/443 ports used by built-in HTTP ingress. If the extra ports are internal, you can share the same port by multiple apps.
95
+
96
+
- If an exposed port isn't provided, the exposed port defaults to match the target port.
97
+
94
98
- Each target port must be unique, and the same target port can't be exposed on different exposed ports.
95
-
- There's a maximum of five additional ports per app. If additional ports are required, please open a support request.
96
-
- Only the main ingress port supports built-in HTTP features such as CORS and session affinity. When running HTTP on top of the additional TCP ports, these built-in features aren't supported.
97
99
98
-
Visit the [how to article on ingress](ingress-how-to.md#use-additional-tcp-ports) for more information on how to enable additional ports for your container apps.
100
+
- There's a maximum of five additional ports per app. If additional ports are required, open a support request.
101
+
102
+
- Only the main ingress port supports built-in HTTP features such as CORS and session affinity. When running HTTP on top of the extra TCP ports, these built-in features aren't supported.
103
+
104
+
- Port number `36985` is a reserved for internal health checks and isn't available to TCP applications or extra exposed ports on HTTP applications.
105
+
106
+
For more information on how to enable extra ports, see [Configure ingress for your app](ingress-how-to.md#use-additional-tcp-ports).
99
107
100
108
## Domain names
101
109
@@ -125,7 +133,7 @@ Containers Apps allows you to split incoming traffic between active revisions. W
125
133
126
134
## Session affinity
127
135
128
-
Session affinity, also known as sticky sessions, is a feature that allows you to route all HTTP requests from a client to the same container app replica. This feature is useful for stateful applications that require a consistent connection to the same replica. For more information, see [Session affinity](sticky-sessions.md).
136
+
Session affinity, also known as sticky sessions, is a feature that allows you to route all HTTP requests from a client to the same container app replica. This feature is useful for stateful applications that require a consistent connection to the same replica. For more information, see [Session affinity](sticky-sessions.md).
Copy file name to clipboardExpand all lines: articles/container-apps/networking.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: container-apps
5
5
author: craigshoemaker
6
6
ms.service: azure-container-apps
7
7
ms.topic: conceptual
8
-
ms.date: 03/20/2025
8
+
ms.date: 05/02/2025
9
9
ms.author: cshoe
10
10
---
11
11
@@ -310,7 +310,7 @@ In order to connect to your container apps through a private endpoint, you must
310
310
### Environment security
311
311
312
312
> [!NOTE]
313
-
> To control ingress traffic, you can also [use private endpoints with a private connection to Azure Front Door](how-to-integrate-with-azure-front-door.md) in place of Application Gateway. This feature is in preview.
313
+
> To control ingress traffic, you can also [use private endpoints with a private connection to Azure Front Door](how-to-integrate-with-azure-front-door.md) in place of Application Gateway.
314
314
315
315
:::image type="content" source="media/networking/locked-down-network.png" alt-text="Diagram of how to fully lock down your network for Container Apps.":::
0 commit comments