You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/spring-apps/how-to-configure-palo-alto.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ The rest of this article assumes you have the following two pre-configured netwo
53
53
54
54
Next, create three CSV files.
55
55
56
-
Name the first file *AzureSpringAppsServices.csv*. This file should contain ingress ports for Azure Spring Apps. The values in the following example are for demonstration purposes only. For all of the required values, see the [Azure Spring Apps network requirements](./vnet-customer-responsibilities.md#azure-spring-apps-network-requirements) section of [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md).
56
+
Name the first file *AzureSpringAppsServices.csv*. This file should contain ingress ports for Azure Spring Apps. The values in the following example are for demonstration purposes only. For all of the required values, see the [Azure Global required network rules](./vnet-customer-responsibilities.md#azure-global-required-network-rules) section of [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md).
57
57
58
58
```CSV
59
59
name,protocol,port,tag
@@ -64,7 +64,7 @@ ASC_445,tcp,445,AzureSpringApps
64
64
ASC_123,udp,123,AzureSpringApps
65
65
```
66
66
67
-
Name the second file *AzureSpringAppsUrlCategories.csv*. This file should contain the addresses (with wildcards) that should be available for egress from Azure Spring Apps. The values in the following example are for demonstration purposes only. For up-to-date values, see [Azure Spring Apps FQDN requirements/application rules](./vnet-customer-responsibilities.md#azure-spring-apps-fqdn-requirementsapplication-rules).
67
+
Name the second file *AzureSpringAppsUrlCategories.csv*. This file should contain the addresses (with wildcards) that should be available for egress from Azure Spring Apps. The values in the following example are for demonstration purposes only. For up-to-date values, see the [Azure Global required FQDN / application rules](./vnet-customer-responsibilities.md#azure-global-required-fqdn--application-rules) section of [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md).
Copy file name to clipboardExpand all lines: articles/spring-apps/vnet-customer-responsibilities.md
+32-9Lines changed: 32 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,22 +27,22 @@ By default, Azure Spring Apps has unrestricted outbound (egress) internet access
27
27
The following list shows the resource requirements for Azure Spring Apps services. As a general requirement, you shouldn't modify resource groups created by Azure Spring Apps and the underlying network resources.
28
28
29
29
- Don't modify resource groups created and owned by Azure Spring Apps.
30
-
- By default, these resource groups are named as `ap-svc-rt_[SERVICE-INSTANCE-NAME]_[REGION]*` and `ap_[SERVICE-INSTANCE-NAME]_[REGION]*`.
30
+
- By default, these resource groups are named `ap-svc-rt_<service-instance-name>_<region>*` and `ap_<service-instance-name>_<region>*`.
31
31
- Don't block Azure Spring Apps from updating resources in these resource groups.
32
32
- Don't modify subnets used by Azure Spring Apps.
33
33
- Don't create more than one Azure Spring Apps service instance in the same subnet.
34
34
- When using a firewall to control traffic, don't block the following egress traffic to Azure Spring Apps components that operate, maintain, and support the service instance.
|\*:443 *or*[ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - AzureCloud:443 | TCP:443 | Azure Spring Apps Service Management. |Information of service instance "requiredTraffics" could be known in resource payload, under "networkProfile" section. |
41
-
|\*.azurecr.io:443 *or*[ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - AzureContainerRegistry:443 | TCP:443 | Azure Container Registry. | Can be replaced by enabling *Azure Container Registry*[service endpoint in virtual network](../virtual-network/virtual-network-service-endpoints-overview.md). |
42
-
|\*.core.windows.net:443 and \*.core.windows.net:445 *or*[ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Storage:443 and Storage:445 | TCP:443, TCP:445 | Azure Files | Can be replaced by enabling *Azure Storage*[service endpoint in virtual network](../virtual-network/virtual-network-service-endpoints-overview.md). |
43
-
|\*.servicebus.windows.net:443 *or*[ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - EventHub:443 | TCP:443 | Azure Event Hubs. | Can be replaced by enabling *Azure Event Hubs*[service endpoint in virtual network](../virtual-network/virtual-network-service-endpoints-overview.md). |
|\*:443 *or*[ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - AzureCloud:443 | TCP:443 | Azure Spring Apps Service Management. |For information about the service instance `requiredTraffics`, see the resource payload, under the `networkProfile` section.|
41
+
|\*.azurecr.io:443 *or*[ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - AzureContainerRegistry:443 | TCP:443 | Azure Container Registry. | Can be replaced by enabling the *Azure Container Registry*[service endpoint in the virtual network](../virtual-network/virtual-network-service-endpoints-overview.md). |
42
+
|\*.core.windows.net:443 and \*.core.windows.net:445 *or*[ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Storage:443 and Storage:445 | TCP:443, TCP:445 | Azure Files | Can be replaced by enabling the *Azure Storage*[service endpoint in the virtual network](../virtual-network/virtual-network-service-endpoints-overview.md). |
43
+
|\*.servicebus.windows.net:443 *or*[ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - EventHub:443 | TCP:443 | Azure Event Hubs. | Can be replaced by enabling the *Azure Event Hubs*[service endpoint in the virtual network](../virtual-network/virtual-network-service-endpoints-overview.md). |
44
44
45
-
## Azure Spring Apps FQDN requirements/application rules
45
+
## Azure Global required FQDN / application rules
46
46
47
47
Azure Firewall provides the FQDN tag **AzureKubernetesService** to simplify the following configurations:
48
48
@@ -56,6 +56,29 @@ Azure Firewall provides the FQDN tag **AzureKubernetesService** to simplify the
56
56
| <i>packages.microsoft.com</i> | HTTPS:443 | Microsoft packages repository. |
57
57
| <i>acs-mirror.azureedge.net</i> | HTTPS:443 | Repository required to install required binaries like kubenet and Azure CNI. |
58
58
59
+
## Microsoft Azure operated by 21Vianet required network rules
|\*:443 *or*[ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - AzureCloud:443 | TCP:443 | Azure Spring Apps Service Management. | For information about the service instance `requiredTraffics`, see the resource payload, under the `networkProfile` section. |
64
+
|\*.azurecr.cn:443 *or*[ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - AzureContainerRegistry:443 | TCP:443 | Azure Container Registry. | Can be replaced by enabling the *Azure Container Registry*[service endpoint in the virtual network](../virtual-network/virtual-network-service-endpoints-overview.md). |
65
+
|\*.core.chinacloudapi.cn:443 and \*.core.chinacloudapi.cn:445 *or*[ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - Storage:443 and Storage:445 | TCP:443, TCP:445 | Azure Files | Can be replaced by enabling the *Azure Storage*[service endpoint in the virtual network](../virtual-network/virtual-network-service-endpoints-overview.md). |
66
+
|\*.servicebus.chinacloudapi.cn:443 *or*[ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - EventHub:443 | TCP:443 | Azure Event Hubs. | Can be replaced by enabling the *Azure Event Hubs*[service endpoint in the virtual network](../virtual-network/virtual-network-service-endpoints-overview.md). |
67
+
68
+
## Microsoft Azure operated by 21Vianet required FQDN / application rules
69
+
70
+
Azure Firewall provides the FQDN tag `AzureKubernetesService` to simplify the following configurations:
0 commit comments