Skip to content

Commit 3ace32f

Browse files
Apply suggestions from code review
Co-authored-by: Karl Erickson <[email protected]>
1 parent f3fb67b commit 3ace32f

File tree

2 files changed

+35
-34
lines changed

2 files changed

+35
-34
lines changed

articles/spring-apps/how-to-configure-enterprise-spring-cloud-gateway.md

Lines changed: 19 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,8 @@ A Spring Cloud Gateway instance routes traffic according to rules. Both *scale i
2424

2525
VMware Spring Cloud Gateway includes the following features:
2626

27-
- Dynamic routing configuration, that's independent of applications that can be applied and changed without recompiling.
28-
- Commercial API route filters, for transporting authorized JSON Web Token (JWT) claims to application services.
27+
- Dynamic routing configuration, independent of individual applications, that you can apply and change without recompiling.
28+
- Commercial API route filters for transporting authorized JSON Web Token (JWT) claims to application services.
2929
- Client certificate authorization.
3030
- Rate-limiting approaches.
3131
- Circuit breaker configuration.
@@ -38,7 +38,7 @@ To integrate with API portal for VMware Tanzu, VMware Spring Cloud Gateway autom
3838
- An already provisioned Azure Spring Apps Enterprise tier service instance with VMware Spring Cloud Gateway enabled. For more information, see [Quickstart: Build and deploy apps to Azure Spring Apps using the Enterprise tier](quickstart-deploy-apps-enterprise.md).
3939

4040
> [!NOTE]
41-
> You must enable VMware Spring Cloud Gateway when you provision your Azure Spring Apps service instance. You cannot enable VMware Spring Cloud Gateway after provisioning.
41+
> You must enable VMware Spring Cloud Gateway when you provision your Azure Spring Apps service instance. You can't enable VMware Spring Cloud Gateway after provisioning.
4242
4343
- Azure CLI version 2.0.67 or later. For more information, see [How to install the Azure CLI](/cli/azure/install-azure-cli).
4444

@@ -48,19 +48,19 @@ This section describes how to assign a public endpoint to Spring Cloud Gateway a
4848

4949
#### [Azure portal](#tab/Azure-portal)
5050

51-
To assign an endpoint in the Azure portal, do the following steps:
51+
To assign an endpoint in the Azure portal, use the following steps:
5252

5353
1. Open your Azure Spring Apps instance.
5454
1. Select **Spring Cloud Gateway** in the navigation pane, and then select **Overview**.
5555
1. Set **Assign endpoint** to **Yes**.
5656

57-
After a few minutes, **URL** will show the configured endpoint URL. Save the URL to use later.
57+
After a few minutes, **URL** shows the configured endpoint URL. Save the URL to use later.
5858

5959
:::image type="content" source="media/how-to-configure-enterprise-spring-cloud-gateway/gateway-overview.png" alt-text="Screenshot of Azure portal showing the Spring Cloud Gateway overview page for an Azure Spring Apps instance with the Assign endpoint buttons highlighted and the configured endpoint URL displayed." lightbox="media/how-to-configure-enterprise-spring-cloud-gateway/gateway-overview.png":::
6060

6161
#### [Azure CLI](#tab/Azure-CLI)
6262

63-
The following command assigns the endpoint.
63+
Use the following command to assign the endpoint.
6464

6565
```azurecli
6666
az spring gateway update --assign-endpoint
@@ -72,13 +72,13 @@ az spring gateway update --assign-endpoint
7272

7373
You can configure VMware Spring Cloud Gateway metadata, which automatically generates OpenAPI version 3 documentation, to display route groups in API portal for VMware Tanzu. For more information, see [Use API portal for VMware Tanzu](./how-to-use-enterprise-api-portal.md).
7474

75-
The available metadata options are described in the following table.
75+
The following table describes the available metadata options:
7676

7777
| Property | Description |
7878
|---------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
7979
| title | A title that describes the context of the APIs available on the Gateway instance. The default value is `Spring Cloud Gateway for K8S`. |
8080
| description | A detailed description of the APIs available on the Gateway instance. The default value is `Generated OpenAPI 3 document that describes the API routes configured for '[Gateway instance name]' Spring Cloud Gateway instance deployed under '[namespace]' namespace.*.` |
81-
| documentation | The location of API documentation that is available on the Gateway instance. |
81+
| documentation | The location of API documentation that's available on the Gateway instance. |
8282
| version | The version of APIs available on this Gateway instance. The default value is `unspecified`. |
8383
| serverUrl | The base URL to access APIs on the Gateway instance. |
8484

@@ -100,7 +100,7 @@ To edit metadata in the Azure portal, do these steps:
100100

101101
#### [Azure CLI](#tab/Azure-CLI)
102102

103-
Use the following command to configure VMware Spring Cloud Gateway metadata properties. You'll need the endpoint URL obtained from the [Configure Spring Cloud Gateway](#configure-spring-cloud-gateway) section.
103+
Use the following command to configure VMware Spring Cloud Gateway metadata properties. You need the endpoint URL obtained from the [Configure Spring Cloud Gateway](#configure-spring-cloud-gateway) section.
104104

105105
```azurecli
106106
az spring gateway update \
@@ -115,7 +115,7 @@ az spring gateway update \
115115

116116
## Configure single sign-on (SSO)
117117

118-
VMware Spring Cloud Gateway supports authentication and authorization using single sign-on (SSO), using an OpenID identity provider, which supports OpenID Connect Discovery protocol.
118+
VMware Spring Cloud Gateway supports authentication and authorization using single sign-on (SSO) with an OpenID identity provider, which supports the OpenID Connect Discovery protocol.
119119

120120
| Property | Required? | Description |
121121
|----------------|-----------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
@@ -130,7 +130,7 @@ You can use the Azure portal and the Azure CLI to edit SSO properties.
130130

131131
#### [Azure portal](#tab/Azure-portal)
132132

133-
To edit SSO properties in the Azure portal, do these steps:
133+
To edit SSO properties in the Azure portal, use the following steps:
134134

135135
1. Open your Azure Spring Apps instance.
136136
1. Select **Spring Cloud Gateway** in the navigation pane, and then select **Configuration**.
@@ -141,7 +141,7 @@ To edit SSO properties in the Azure portal, do these steps:
141141

142142
#### [Azure CLI](#tab/Azure-CLI)
143143

144-
The following command configures SSO properties for VMware Spring Cloud Gateway.
144+
Use the following command to configure SSO properties for VMware Spring Cloud Gateway.
145145

146146
```azurecli
147147
az spring gateway update \
@@ -162,7 +162,7 @@ az spring gateway update \
162162
163163
## Configure single sign-on (SSO) logout
164164

165-
VMware Spring Cloud Gateway service instances provide a default API endpoint to log out of the current SSO session. The path to this endpoint is `/scg-logout`. The logout results in two outcomes depending on how you call the logout endpoint:
165+
VMware Spring Cloud Gateway service instances provide a default API endpoint to log out of the current SSO session. The path to this endpoint is `/scg-logout`. The logout results in one of the following outcomes, depending on how you call the logout endpoint:
166166

167167
- Logout of session and redirect to the identity provider (IdP) logout.
168168
- Logout the service instance session.
@@ -173,9 +173,9 @@ If you send a `GET` request to the `/scg-logout` endpoint, then the endpoint sen
173173

174174
The following steps describe an example of how to implement the function in your microservices:
175175

176-
1. Get a route config to route the logout request to your application. For example, see the `Animal Rescue UI Pages` route config in [Azure samples](https://github.com/Azure-Samples/animal-rescue/blob/0e343a27f44cc4a4bfbf699280476b0517854d7b/frontend/azure/api-route-config.json#L32) on GitHub.
176+
1. Get a route config to route the logout request to your application. For example, see the Animal Rescue UI pages route config in the [animal-rescue](https://github.com/Azure-Samples/animal-rescue/blob/0e343a27f44cc4a4bfbf699280476b0517854d7b/frontend/azure/api-route-config.json#L32) repository on GitHub.
177177

178-
1. Add whatever logout logic you need to the application. At the end, you need to a `GET` request to the gateway's `/scg-logout` endpoint as shown in the `return` value for the `getActionButton` method in [Azure samples](https://github.com/Azure-Samples/animal-rescue/blob/0e343a27f44cc4a4bfbf699280476b0517854d7b/frontend/src/App.js#L84) .
178+
1. Add whatever logout logic you need to the application. At the end, you need to a `GET` request to the gateway's `/scg-logout` endpoint as shown in the `return` value for the `getActionButton` method in the [animal-rescue](https://github.com/Azure-Samples/animal-rescue/blob/0e343a27f44cc4a4bfbf699280476b0517854d7b/frontend/src/App.js#L84) repository.
179179

180180
> [!NOTE]
181181
> The value of the redirect parameter must be a valid path on the gateway service instance. You can't redirect to an external URL.
@@ -262,7 +262,7 @@ Updating the configuration can take a few minutes. You should get a notification
262262
263263
#### [Azure CLI](#tab/Azure-CLI)
264264
265-
Use the following command to set up APM using Azure CLI.
265+
Use the following command to set up APM using Azure CLI:
266266
267267
```azurecli
268268
az spring gateway update \
@@ -271,20 +271,21 @@ az spring gateway update \
271271
--secrets <key=value>
272272
```
273273
274-
Allowed values for `--apm-types` are `ApplicationInsights`, `AppDynamics`, `Dynatrace`, `NewRelic`, and `ElasticAPM`. The following command shows the usage using Application Insights as an example.
274+
The allowed values for `--apm-types` are `ApplicationInsights`, `AppDynamics`, `Dynatrace`, `NewRelic`, and `ElasticAPM`. The following command shows the usage using Application Insights as an example.
275275
276276
```azurecli
277277
az spring gateway update \
278278
--apm-types ApplicationInsights \
279279
--properties APPLICATIONINSIGHTS_CONNECTION_STRING=<THE CONNECTION STRING OF YOUR APPINSIGHTS> APPLICATIONINSIGHTS_SAMPLE_RATE=10
280280
```
281281
282-
You can also put environment variables in `--secrets` parameter instead of `--properties`, which makes environment variable more secure in network transmission and data storage in backend.
282+
You can also put environment variables in the `--secrets` parameter instead of `--properties`, which makes the environment variable more secure in network transmission and data storage in the backend.
283283
284284
---
285285
286286
> [!NOTE]
287287
> Azure Spring Apps upgrades the APM agent and deployed apps with the same cadence to keep compatibility of agents between Spring Cloud Gateway and Spring apps.
288+
>
288289
> By default, Azure Spring Apps prints the logs of the APM Java agent to `STDOUT`. These logs are included with the Spring Cloud Gateway logs. You can check the version of the APM agent used in the logs. You can query these logs in Log Analytics to troubleshoot.
289290
> To make the APM agents work correctly, increase the CPU and memory of Spring Cloud Gateway.
290291

articles/spring-apps/quickstart-configure-single-sign-on-enterprise.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -65,20 +65,20 @@ Follow these steps to configure single sign-on using an existing Identity Provid
6565

6666
To register the application with Azure Active Directory, follow these steps. If you're using an existing provider's credentials, skip ahead to the following section, [Deploy the Identity Service application](#deploy-the-identity-service-application).
6767

68-
1. Use the following command to create an application registration with Azure Active Directory and save the output.
68+
1. Use the following command to create an application registration with Azure Active Directory and save the output:
6969

7070
```azurecli
7171
az ad app create --display-name <app-registration-name> > ad.json
7272
```
7373

74-
1. Use the following command to retrieve the application ID and collect the client secret.
74+
1. Use the following command to retrieve the application ID and collect the client secret:
7575

7676
```azurecli
7777
APPLICATION_ID=$(cat ad.json | jq -r '.appId')
7878
az ad app credential reset --id ${APPLICATION_ID} --append > sso.json
7979
```
8080

81-
1. Use the following command to assign a Service Principal to the application registration.
81+
1. Use the following command to assign a Service Principal to the application registration:
8282

8383
```azurecli
8484
az ad sp create --id ${APPLICATION_ID}
@@ -134,7 +134,7 @@ To complete the single sign-on experience, use the following steps to deploy the
134134

135135
1. Navigate to the project folder.
136136

137-
1. Use the following command to create the `identity-service` application.
137+
1. Use the following command to create the `identity-service` application:
138138

139139
```azurecli
140140
az spring app create \
@@ -143,7 +143,7 @@ To complete the single sign-on experience, use the following steps to deploy the
143143
--service <Azure-Spring-Apps-service-instance-name>
144144
```
145145

146-
1. Use the following command to enable externalized configuration for the identity service by binding to Application Configuration Service.
146+
1. Use the following command to enable externalized configuration for the identity service by binding to Application Configuration Service:
147147

148148
```azurecli
149149
az spring application-configuration-service bind \
@@ -152,7 +152,7 @@ To complete the single sign-on experience, use the following steps to deploy the
152152
--service <Azure-Spring-Apps-service-instance-name>
153153
```
154154

155-
1. Use the following command to enable service discovery and registration for the identity service by binding to Service Registry.
155+
1. Use the following command to enable service discovery and registration for the identity service by binding to Service Registry:
156156

157157
```azurecli
158158
az spring service-registry bind \
@@ -161,7 +161,7 @@ To complete the single sign-on experience, use the following steps to deploy the
161161
--service <Azure-Spring-Apps-service-instance-name>
162162
```
163163

164-
1. Use the following command to deploy the identity service.
164+
1. Use the following command to deploy the identity service:
165165

166166
```azurecli
167167
az spring app deploy \
@@ -173,7 +173,7 @@ To complete the single sign-on experience, use the following steps to deploy the
173173
--env "JWK_URI=<jwk-uri>"
174174
```
175175

176-
1. Use the following command to route requests to the identity service.
176+
1. Use the following command to route requests to the identity service:
177177

178178
```azurecli
179179
az spring gateway route-config create \
@@ -188,7 +188,7 @@ To complete the single sign-on experience, use the following steps to deploy the
188188

189189
You can configure Spring Cloud Gateway to authenticate requests using single sign-on. To configure Spring Cloud Gateway to use single sign-on, follow these steps:
190190

191-
1. Use the following commands to configure Spring Cloud Gateway to use single sign-on.
191+
1. Use the following commands to configure Spring Cloud Gateway to use single sign-on:
192192

193193
```azurecli
194194
GATEWAY_URL=$(az spring gateway show \
@@ -209,7 +209,7 @@ You can configure Spring Cloud Gateway to authenticate requests using single sig
209209
--issuer-uri <issuer-uri>
210210
```
211211

212-
1. Instruct the cart service application to use Spring Cloud Gateway for authentication. Use the following command to provide the necessary environment variables.
212+
1. Instruct the cart service application to use Spring Cloud Gateway for authentication. Use the following command to provide the necessary environment variables:
213213

214214
```azurecli
215215
az spring app update \
@@ -219,7 +219,7 @@ You can configure Spring Cloud Gateway to authenticate requests using single sig
219219
--env "AUTH_URL=https://${GATEWAY_URL}" "CART_PORT=8080"
220220
```
221221

222-
1. Instruct the order service application to use Spring Cloud Gateway for authentication. Use the following command to provide the necessary environment variables.
222+
1. Instruct the order service application to use Spring Cloud Gateway for authentication. Use the following command to provide the necessary environment variables:
223223

224224
```azurecli
225225
az spring app update \
@@ -229,17 +229,17 @@ You can configure Spring Cloud Gateway to authenticate requests using single sig
229229
--env "AcmeServiceSettings__AuthUrl=https://${GATEWAY_URL}"
230230
```
231231

232-
1. Use the following command to retrieve the URL for Spring Cloud Gateway.
232+
1. Use the following command to retrieve the URL for Spring Cloud Gateway:
233233

234234
```bash
235235
echo "https://${GATEWAY_URL}"
236236
```
237237

238-
You can open the output URL in a browser to explore the updated application. The Log In function is now operational, allowing you to add items to the cart and place orders. After you sign in, the customer information button will display the signed-in username.
238+
You can open the output URL in a browser to explore the updated application. The Log In function is now operational, allowing you to add items to the cart and place orders. After you sign in, the customer information button displays the signed-in username.
239239

240240
## Configure single sign-on for API portal
241241

242-
You can configure API portal for VMware Tanzu to use single sign-on to require authentication before exploring APIs. Use the following commands to configure single sign-on for API portal.
242+
You can configure API portal for VMware Tanzu to use single sign-on to require authentication before exploring APIs. Use the following commands to configure single sign-on for API portal:
243243

244244
```azurecli
245245
PORTAL_URL=$(az spring api-portal show \
@@ -255,7 +255,7 @@ az spring api-portal update \
255255
--issuer-uri <issuer-uri>
256256
```
257257

258-
Use the following commands to retrieve the URL for API portal.
258+
Use the following commands to retrieve the URL for API portal:
259259

260260
```azurecli
261261
PORTAL_URL=$(az spring api-portal show \
@@ -265,7 +265,7 @@ PORTAL_URL=$(az spring api-portal show \
265265
echo "https://${PORTAL_URL}"
266266
```
267267

268-
You can open the output URL in a browser to explore the application APIs. You are directed to sign on before exploring APIs.
268+
You can open the output URL in a browser to explore the application APIs. You're directed to sign on before exploring APIs.
269269

270270
---
271271

0 commit comments

Comments
 (0)