Skip to content

Commit 29d5222

Browse files
author
ecfan
committed
UX updates
1 parent 46eb08e commit 29d5222

File tree

2 files changed

+29
-16
lines changed

2 files changed

+29
-16
lines changed

articles/logic-apps/deploy-single-tenant-logic-apps-private-storage-account.md

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.suite: integration
66
ms.reviewer: estfan, azla
77
ms.topic: how-to
88
ms.custom: engagement-fy23, devx-track-arm-template
9-
ms.date: 10/09/2023
9+
ms.date: 07/04/2024
1010
# Customer intent: As a developer, I want to deploy Standard logic apps to Azure storage accounts that use private endpoints.
1111
---
1212

@@ -30,6 +30,7 @@ For more information, review the following documentation:
3030
This deployment method requires that temporary public access to your storage account. If you can't enable public access due to your organization's policies, you can still deploy your logic app to a private storage account. However, you have to [deploy with an Azure Resource Manager template (ARM template)](#deploy-arm-template), which is described in a later section.
3131

3232
> [!NOTE]
33+
>
3334
> An exception to the previous rule is that you can use the Azure portal to deploy your logic app to an App Service Environment,
3435
> even if the storage account is protected with a private endpoint. However, you'll need connectivity between the
3536
> subnet used by the App Service Environment and the subnet used by the storage account's private endpoint.
@@ -46,17 +47,25 @@ This deployment method requires that temporary public access to your storage acc
4647

4748
1. Deploy your logic app resource by using either the Azure portal or Visual Studio Code.
4849

49-
1. After deployment finishes, enable virtual network integration between your logic app and the private endpoints on the virtual network that connects to your storage account.
50+
1. After deployment finishes, enable virtual network integration between your logic app and the private endpoints on the virtual network connected to your storage account.
5051

5152
1. In the [Azure portal](https://portal.azure.com), open your logic app resource.
5253

5354
1. On the logic app resource menu, under **Settings**, select **Networking**.
5455

55-
1. Select **VNet integration** on **Outbound Traffic** card to enable integration with a virtual network connecting to your storage account.
56+
1. In the **Outbound traffic configuration** section, next to **Virtual network integration**, select **Not configured** > **Add virtual network integration** .
5657

57-
1. To access your logic app workflow data over the virtual network, in your logic app resource settings, set the `WEBSITE_CONTENTOVERVNET` setting to `1`.
58+
1. On the **Add virtual network integration** pane that opens, select your Azure subscription and your virtual network.
5859

59-
If you use your own domain name server (DNS) with your virtual network, set your logic app resource's `WEBSITE_DNS_SERVER` app setting to the IP address for your DNS. If you have a secondary DNS, add another app setting named `WEBSITE_DNS_ALT_SERVER`, and set the value also to the IP for your secondary DNS.
60+
1. From the **Subnet** list, select the subnet where you want to add your logic app. When you're done, select **Connect**.
61+
62+
1. To access your logic app workflow data over the virtual network, follow these steps:
63+
64+
1. On the logic app resource menu, under **Settings**, select **Environment variables**.
65+
66+
1. On the **App settings** tab, add the **WEBSITE_CONTENTOVERVNET** app setting, if none exist, and set the value to **1**.
67+
68+
1. If you use your own domain name server (DNS) with your virtual network, add the **WEBSITE_DNS_SERVER** app setting, if none exist, and set the value to the IP address for your DNS. If you have a secondary DNS, add another app setting named **WEBSITE_DNS_ALT_SERVER**, and set the value to the IP for your secondary DNS.
6069

6170
1. After you apply these app settings, you can remove public access from your storage account.
6271

@@ -67,6 +76,7 @@ This deployment method requires that temporary public access to your storage acc
6776
1. On the **Networking** pane, on the **Firewalls and virtual networks** tab, under **Allow access from**, clear **Selected networks**, and add virtual networks as necessary.
6877

6978
> [!NOTE]
79+
>
7080
> Your logic app might experience an interruption because the connectivity switch between public and private endpoints might take time.
7181
> This disruption might result in your workflows temporarily disappearing. If this behavior happens, you can try to reload your workflows
7282
> by restarting the logic app and waiting several minutes.
@@ -92,7 +102,6 @@ The following errors commonly happen with a private storage account that's behin
92102
|---------|-------|
93103
| Access to the `host.json` file is denied | `"System.Private.CoreLib: Access to the path 'C:\\home\\site\\wwwroot\\host.json' is denied."` |
94104
| Can't load workflows in the logic app resource | `"Encountered an error (ServiceUnavailable) from host runtime."` |
95-
|||
96105

97106
As the logic app isn't running when these errors occur, you can't use the Kudu console debugging service on the Azure platform to troubleshoot these errors. However, you can use the following methods instead:
98107

articles/logic-apps/secure-single-tenant-workflow-virtual-network-private-endpoint.md

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -95,13 +95,15 @@ For more information, review [Create single-tenant logic app workflows in Azure
9595

9696
### Set up private endpoint connection
9797

98-
1. On your logic app menu, under **Settings**, select **Networking**.
98+
1. On the logic app resource menu, under **Settings**, select **Networking**.
9999

100-
1. On the **Networking** page, on the **Inbound traffic** card, select **Private endpoints**.
100+
1. On the **Networking** page, in the **Inbound traffic configuration** section, select the link next to **Private endpoints**.
101101

102-
1. On the **Private Endpoint connections**, select **Add**.
102+
1. On the **Private Endpoint connections** page, select **Add** > **Express** or **Advanced**.
103103

104-
1. On the **Add Private Endpoint** pane that opens, provide the requested information about the endpoint.
104+
For more information about the **Advanced** option, see [Create a private endpoint](../private-link/create-private-endpoint-portal.md#create-a-private-endpoint).
105+
106+
1. On the **Add Private Endpoint** pane, provide the requested information about the endpoint.
105107

106108
For more information, review [Private Endpoint properties](../private-link/private-endpoint-overview.md#private-endpoint-properties).
107109

@@ -154,17 +156,19 @@ For more information, review the following documentation:
154156

155157
### Set up virtual network integration
156158

157-
1. In the Azure portal, on the logic app resource menu, under **Settings**, select **Networking**.
159+
1. In the [Azure portal](https://portal.azure.com), on the logic app resource menu, under **Settings**, select **Networking**.
160+
161+
1. On the **Networking** page, in the **Outbound traffic configuration** section, select the link next to **Virtual network integration**.
158162

159-
1. On the **Networking** pane, on the **Outbound traffic** card, select **VNet integration**.
163+
1. On the **Virtual network integration** page, select **Add virtual network integration**.
160164

161-
1. On the **VNet Integration** pane, select **Add Vnet**.
165+
1. On the **Add virtual network integration** pane, select the subscription, the virtual network that connects to your internal service, and the subnet where to add the logic app. When you finish, select **Connect**.
162166

163-
1. On the **Add VNet Integration** pane, select the subscription and the virtual network that connects to your internal service.
167+
On the **Virtual Network Integration** page, by default, the **Outbound internet traffic** setting is selected, which routes all outbound traffic through the virtual network. In this scenario, the app setting named **WEBSITE_VNET_ROUTE_ALL** is ignored.
164168

165-
After you add virtual network integration, on the **VNet Integration** pane, the **Route All** setting is enabled by default. This setting routes all outbound traffic through the virtual network. When this setting is enabled, the `WEBSITE_VNET_ROUTE_ALL` app setting is ignored.
169+
To find this app setting, on the logic app resource menu, under **Settings**, select **Environment variables**.
166170

167-
1. If you use your own domain name server (DNS) with your virtual network, set your logic app resource's `WEBSITE_DNS_SERVER` app setting to the IP address for your DNS. If you have a secondary DNS, add another app setting named `WEBSITE_DNS_ALT_SERVER`, and set the value also to the IP for your DNS.
171+
1. If you use your own domain name server (DNS) with your virtual network, add the **WEBSITE_DNS_SERVER** app setting, if none exist, and set the value to the IP address for your DNS. If you have a secondary DNS, add another app setting named **WEBSITE_DNS_ALT_SERVER**, and set the value to the IP for your secondary DNS.
168172

169173
1. After Azure successfully provisions the virtual network integration, try to run the workflow again.
170174

0 commit comments

Comments
 (0)