Skip to content

Commit 2502558

Browse files
committed
Fix warnings.
1 parent 1e73f0f commit 2502558

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

articles/container-apps/firewall-integration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ You can lock down a network via NSGs with more restrictive rules than the defaul
1818
In the workload profiles environment, user-defined routes (UDRs) and [securing outbound traffic with a firewall](./using-azure-firewall.md) are supported.
1919

2020
> [!NOTE]
21-
> For a guide on how to set up UDR with Container Apps to restrict outbound traffic with Azure Firewall, visit the how to for [Container Apps and Azure Firewall](user-defined-routes).
21+
> For a guide on how to set up UDR with Container Apps to restrict outbound traffic with Azure Firewall, visit the how to for [Container Apps and Azure Firewall](user-defined-routes.md).
2222
23-
When using an external workload profiles environment, inbound traffic to Azure Container Apps is routed through the public IP that exists in the [managed resource group](./networking-configuration.md#ports-and-ip-addresses) rather than through your subnet. This means that locking down inbound traffic via NSG or Firewall on an external workload profiles environment isn't supported. For more information, see [Control outbound traffic with user defined routes](./user-defined-routes.md).
23+
When using an external workload profiles environment, inbound traffic to Azure Container Apps is routed through the public IP that exists in the [managed resource group](./networking.md#ports-and-ip-addresses) rather than through your subnet. This means that locking down inbound traffic via NSG or Firewall on an external workload profiles environment isn't supported. For more information, see [Control outbound traffic with user defined routes](./user-defined-routes.md).
2424

2525
In the Consumption only environment, express routes aren't supported, and custom user-defined routes (UDRs) have limited support. For more information on the level of UDR support available in a Consumption-only environment, see the [FAQ](faq.yml#do-consumption-only-environments-support-custom-user-defined-routes-).
2626

articles/container-apps/ingress-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ HTTP ingress adds headers to pass metadata about the client request to your cont
7373
Container Apps supports TCP-based protocols other than HTTP or HTTPS. For example, you can use TCP ingress to expose a container app that uses the [Redis protocol](https://redis.io/topics/protocol).
7474

7575
> [!NOTE]
76-
> External TCP ingress is only supported for Container Apps environments that use a [virtual network](vnet-custom.md). TCP ingress is not supported for apps that accept inbound traffic through a [private endpoint](networking.md#private-endpoint).
76+
> External TCP ingress is only supported for Container Apps environments that use a [virtual network](vnet-custom.md). TCP ingress is not supported for apps that accept inbound traffic through a [private endpoint](custom-virtual-networks.md#private-endpoint-preview).
7777
7878
With TCP ingress enabled, your container app:
7979

articles/spring-apps/migration/migrate-to-azure-container-apps-network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ Azure Container Apps supports deployment with a private DNS zone. For more infor
134134

135135
## Access an app in Azure Container Apps within a customer virtual network
136136

137-
Azure Container Apps provides both [Public network access](../../container-apps/networking.md#public-network-access) and [Private endpoint](../../container-apps/networking.md#private-endpoint) features to expose applications to the internet or to secure them within a private network. Similarly, Azure Spring Apps supports these features as described in the following articles:
137+
Azure Container Apps provides both [Public network access](../../container-apps/networking.md#public-network-access) and [Private endpoint](../../container-apps/custom-virtual-networks.md#private-endpoint-preview) features to expose applications to the internet or to secure them within a private network. Similarly, Azure Spring Apps supports these features as described in the following articles:
138138

139139
- [Access an app in Azure Spring Apps in a virtual network](../basic-standard/access-app-virtual-network.md)
140140
- [Access applications using Azure Spring Apps Standard consumption and dedicated plan in a virtual network](../consumption-dedicated/quickstart-access-standard-consumption-within-virtual-network.md)

0 commit comments

Comments
 (0)