You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> When using workload profiles, inbound NSG rules only apply for traffic going through your virtual network. If your container apps are set to accept traffic from the public internet, incoming traffic will go through the public endpoint instead of the virtual network.
32
+
> When using workload profiles, inbound NSG rules only apply for traffic going through your virtual network. If your container apps are set to accept traffic from the public internet, incoming traffic goes through the public endpoint instead of the virtual network.
| TCP | Your Client IPs |\*| Your container app's subnet<sup>1</sup> |`443`| Allow your Client IPs to access Azure Container Apps. |
43
+
| TCP | Your client IPs |\*| Your container app's subnet<sup>1</sup> |`443`| Allow your Client IPs to access Azure Container Apps. |
44
+
| TCP | Your client IPs |\*| The `staticIP` of your container app environment |`443`| Allow your Client IPs to access Azure Container Apps. |
44
45
| TCP | AzureLoadBalancer |\*| Your container app's subnet |`30,000-32,676`<sup>2</sup> | Allow Azure Load Balancer to probe backend pools. |
46
+
| TCP | Your container app's subnet |\*| Your container app's subnet |\*| Required to allow the container app envoy sidecar to connect to envoy service. |
45
47
46
48
---
47
49
48
50
<sup>1</sup> This address is passed as a parameter when you create an environment. For example, `10.0.0.0/21`.
49
-
<sup>2</sup> The full range is required when creating your Azure Container Apps as a port within the range will by dynamically allocated. Once created, the required ports are 2 immutable, static values, and you can update your NSG rules.
51
+
<sup>2</sup> The full range is required when creating your Azure Container Apps as a port within the range will by dynamically allocated. Once created, the required ports are two immutable, static values, and you can update your NSG rules.
| TCP | Your container app's subnet<sup>1</sup> |\*| Your Container Registry | Your container registry's port | This is required to communicate with your container registry. For example, when using ACR, you need `AzureContainerRegistry` and `AzureActiveDirectory` for the destination, and the port will be your container registry's port unless using private endpoints.<sup>2</sup> |
59
-
| TCP | Your container app's subnet |\*|`AzureMonitor`|`443`| Allows outbound calls to Azure Monitor. |
60
61
| TCP | Your container app's subnet |\*|`MicrosoftContainerRegistry`|`443`| This is the service tag for Microsoft container registry for system containers. |
61
62
| TCP | Your container app's subnet |\*|`AzureFrontDoor.FirstParty`|`443`| This is a dependency of the `MicrosoftContainerRegistry` service tag. |
| TCP | Your container app's subnet<sup>1</sup> |\*| Your Container Registry | Your container registry's port | This is required to communicate with your container registry. For example, when using ACR, you need `AzureContainerRegistry` and `AzureActiveDirectory` for the destination, and the port will be your container registry's port unless using private endpoints.<sup>2</sup> |
71
72
| UDP | Your container app's subnet |\*|`AzureCloud.<REGION>`|`1194`| Required for internal AKS secure connection between underlying nodes and control plane. Replace `<REGION>` with the region where your container app is deployed. |
72
73
| TCP | Your container app's subnet |\*|`AzureCloud.<REGION>`|`9000`| Required for internal AKS secure connection between underlying nodes and control plane. Replace `<REGION>` with the region where your container app is deployed. |
73
-
| TCP | Your container app's subnet |\*|`AzureMonitor`|`443`| Allows outbound calls to Azure Monitor. |
74
74
| TCP | Your container app's subnet |\*|`AzureCloud`|`443`| Allowing all outbound on port `443` provides a way to allow all FQDN based outbound dependencies that don't have a static IP. |
0 commit comments