Skip to content

Commit 462df9b

Browse files
authored
Merge pull request #216626 from KarlErickson/karler-fix-vnet
vnet -> virtual network
2 parents 4481a93 + 2bd19a6 commit 462df9b

10 files changed

+25
-25
lines changed

articles/spring-apps/concept-outbound-type.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ By default, Azure Spring Apps provisions a Standard SKU Load Balancer that you c
3030

3131
## Limitations
3232

33-
- You can only define `OutboundType` when you create a new Azure Spring Apps service instance, and you can't updated it afterwards. `OutboundType` works only with a VNet instance.
33+
- You can only define `OutboundType` when you create a new Azure Spring Apps service instance, and you can't updated it afterwards. `OutboundType` works only with a virtual network.
3434
- Setting `outboundType` to `UserDefinedRouting` requires a user-defined route with valid outbound connectivity for your instance.
3535
- Setting `outboundType` to `UserDefinedRouting` implies that the ingress source IP routed to the load-balancer may not match the instance's outgoing egress destination address.
3636

@@ -50,7 +50,7 @@ The default `outboundType` value is `loadBalancer`. If `outboundType` is set to
5050
If `outboundType` is set to `userDefinedRouting`, Azure Spring Apps won't automatically configure egress paths. You must set up egress paths yourself. You could still find two load balancers in your resource group. They're only used for internal traffic and won't expose any public IP. You must prepare two route tables associated with two subnets: one to service the runtime and another for the user app.
5151

5252
> [!IMPORTANT]
53-
> An `outboundType` of `userDefinedRouting` requires a route for `0.0.0.0/0` and the next hop destination of a network virtual appliance in the route table. For more information, see [Customer responsibilities for running Azure Spring Apps in VNET](vnet-customer-responsibilities.md).
53+
> An `outboundType` of `userDefinedRouting` requires a route for `0.0.0.0/0` and the next hop destination of a network virtual appliance in the route table. For more information, see [Customer responsibilities for running Azure Spring Apps in a virtual network](vnet-customer-responsibilities.md).
5454
5555
## See also
5656

articles/spring-apps/how-to-access-app-from-internet-virtual-network.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ If you don't want to use Application Gateway for advanced operations, you can ex
2525

2626
- An Azure Spring Apps service instance deployed in a virtual network and an app created in it. For more information, see [Deploy Azure Spring Apps in a virtual network](./how-to-deploy-in-azure-virtual-network.md).
2727

28-
## Assign a public fully qualified domain name (FQDN) for your application in a VNet injection instance
28+
## Assign a public fully qualified domain name (FQDN) for your application in a virtual network injection instance
2929

3030

3131
### [Azure portal](#tab/azure-portal)
@@ -65,10 +65,10 @@ You can use a public URL to access your application both inside and outside the
6565
To ensure the security of your applications when you expose a public endpoint for them, secure the endpoint by filtering network traffic to your service with a network security group. For more information, see [Tutorial: Filter network traffic with a network security group using the Azure portal](../virtual-network/tutorial-filter-network-traffic.md). A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources. For each rule, you can specify source and destination, port, and protocol.
6666

6767
> [!NOTE]
68-
> If you couldn't access your application in VNet injection instance from internet after you have assigned a public FQDN, check your network security group first to see whether you have allowed such inbound traffic.
68+
> If you couldn't access your application in a virtual network injection instance from internet after you have assigned a public FQDN, check your network security group first to see whether you have allowed such inbound traffic.
6969
7070
## Next steps
7171

7272
- [Expose applications with end-to-end TLS in a virtual network](./expose-apps-gateway-end-to-end-tls.md)
7373
- [Troubleshooting Azure Spring Apps in virtual networks](./troubleshooting-vnet.md)
74-
- [Customer responsibilities for running Azure Spring Apps in VNET](./vnet-customer-responsibilities.md)
74+
- [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md)

articles/spring-apps/how-to-appdynamics-java-agent-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -237,9 +237,9 @@ The AppDynamics Agent will be upgraded regularly with JDK (quarterly). Agent upg
237237
* Existing applications using AppDynamics Agent before upgrade will be unchanged, but will require restart or redeploy to engage the new version of AppDynamics Agent.
238238
* Applications created after upgrade will use the new version of AppDynamics Agent.
239239

240-
## Configure VNet injection instance outbound traffic
240+
## Configure virtual network injection instance outbound traffic
241241

242-
For VNet injection instances of Azure Spring Apps, make sure the outbound traffic is configured correctly for AppDynamics Agent. For details, see [SaaS Domains and IP Ranges](https://docs.appdynamics.com/display/PAA/SaaS+Domains+and+IP+Ranges) and [Customer responsibilities for running Azure Spring Apps in VNET](vnet-customer-responsibilities.md).
242+
For virtual network injection instances of Azure Spring Apps, make sure the outbound traffic is configured correctly for AppDynamics Agent. For details, see [SaaS Domains and IP Ranges](https://docs.appdynamics.com/display/PAA/SaaS+Domains+and+IP+Ranges) and [Customer responsibilities for running Azure Spring Apps in a virtual network](vnet-customer-responsibilities.md).
243243

244244
## Understand the limitations
245245

articles/spring-apps/how-to-configure-palo-alto.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This article describes how to use Azure Spring Apps with a Palo Alto firewall.
2222

2323
For example, the [Azure Spring Apps reference architecture](./reference-architecture.md) includes an Azure Firewall to secure your applications. However, if your current deployments include a Palo Alto firewall, you can omit the Azure Firewall from the Azure Spring Apps deployment and use Palo Alto instead, as described in this article.
2424

25-
You should keep configuration information, such as rules and address wildcards, in CSV files in a Git repository. This article shows you how to use automation to apply these files to Palo Alto. To understand the configuration to be applied to Palo Alto, see [Customer responsibilities for running Azure Spring Apps in VNET](./vnet-customer-responsibilities.md).
25+
You should keep configuration information, such as rules and address wildcards, in CSV files in a Git repository. This article shows you how to use automation to apply these files to Palo Alto. To understand the configuration to be applied to Palo Alto, see [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md).
2626

2727
> [!Note]
2828
> In describing the use of REST APIs, this article uses the PowerShell variable syntax to indicate names and values that are left to your discretion. Be sure to use the same values in all the steps.
@@ -53,7 +53,7 @@ The rest of this article assumes you have the following two pre-configured netwo
5353

5454
Next, create three CSV files.
5555

56-
Name the first file *AzureSpringAppsServices.csv*. This file should contain ingress ports for Azure Spring Apps. The values in the following example are for demonstration purposes only. For all of the required values, see the [Azure Spring Apps network requirements](./vnet-customer-responsibilities.md#azure-spring-apps-network-requirements) section of [Customer responsibilities for running Azure Spring Apps in VNET](./vnet-customer-responsibilities.md).
56+
Name the first file *AzureSpringAppsServices.csv*. This file should contain ingress ports for Azure Spring Apps. The values in the following example are for demonstration purposes only. For all of the required values, see the [Azure Spring Apps network requirements](./vnet-customer-responsibilities.md#azure-spring-apps-network-requirements) section of [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md).
5757

5858
```CSV
5959
name,protocol,port,tag

articles/spring-apps/how-to-dynatrace-one-agent-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -203,9 +203,9 @@ The Dynatrace OneAgent auto-upgrade is disabled and will be upgraded quarterly w
203203
* Existing applications using Dynatrace OneAgent before upgrade will be unchanged, but will require restart or redeploy to engage the new version of Dynatrace OneAgent.
204204
* Applications created after upgrade will use the new version of Dynatrace OneAgent.
205205

206-
## VNet injection instance outbound traffic configuration
206+
## Virtual network injection instance outbound traffic configuration
207207

208-
For a VNet injection instance of Azure Spring Apps, you need to make sure the outbound traffic for Dynatrace communication endpoints is configured correctly for Dynatrace OneAgent. For information about how to get `communicationEndpoints`, see [Deployment API - GET connectivity information for OneAgent](https://www.dynatrace.com/support/help/dynatrace-api/environment-api/deployment/oneagent/get-connectivity-info/). For more information, see [Customer responsibilities for running Azure Spring Apps in VNET](vnet-customer-responsibilities.md).
208+
For a virtual network injection instance of Azure Spring Apps, you need to make sure the outbound traffic for Dynatrace communication endpoints is configured correctly for Dynatrace OneAgent. For information about how to get `communicationEndpoints`, see [Deployment API - GET connectivity information for OneAgent](https://www.dynatrace.com/support/help/dynatrace-api/environment-api/deployment/oneagent/get-connectivity-info/). For more information, see [Customer responsibilities for running Azure Spring Apps in a virtual network](vnet-customer-responsibilities.md).
209209

210210
## Dynatrace support model
211211

articles/spring-apps/how-to-self-diagnose-running-in-vnet.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: "How to self-diagnose Azure Spring Apps VNET"
3-
description: Learn how to self-diagnose and solve problems in Azure Spring Apps running in VNET.
2+
title: "How to self-diagnose Azure Spring Apps with virtual networks"
3+
description: Learn how to self-diagnose and solve problems in Azure Spring Apps running in virtual networks.
44
author: karlerickson
55
ms.author: karler
66
ms.service: spring-apps
@@ -9,14 +9,14 @@ ms.date: 01/25/2021
99
ms.custom: devx-track-java, event-tier1-build-2022
1010
---
1111

12-
# Self-diagnose running Azure Spring Apps in VNET
12+
# Self-diagnose running Azure Spring Apps in virtual networks
1313

1414
> [!NOTE]
1515
> Azure Spring Apps is the new name for the Azure Spring Cloud service. Although the service has a new name, you'll see the old name in some places for a while as we work to update assets such as screenshots, videos, and diagrams.
1616
1717
**This article applies to:** ✔️ Basic/Standard tier ✔️ Enterprise tier
1818

19-
This article shows you how to use Azure Spring Apps diagnostics to diagnose and solve problems in Azure Spring Apps running in VNET.
19+
This article shows you how to use Azure Spring Apps diagnostics to diagnose and solve problems in Azure Spring Apps running in virtual networks.
2020

2121
Azure Spring Apps diagnostics supports interactive troubleshooting apps running in virtual networks without configuration. Azure Spring Apps diagnostics identifies problems and guides you to information that helps troubleshoot and resolve them.
2222

@@ -33,7 +33,7 @@ The following procedure starts diagnostics for networked applications.
3333

3434
## View a diagnostic report
3535

36-
After you select the **Networking** category, you can view two issues related to Networking specific to your VNet injected Azure Spring Apps: **DNS Resolution** and **Required Outbound Traffic**.
36+
After you select the **Networking** category, you can view two issues related to Networking specific to your virtual-network injected Azure Spring Apps instances: **DNS Resolution** and **Required Outbound Traffic**.
3737

3838
![Self diagnostic options](media/spring-cloud-self-diagnose-vnet/self-diagostic-dns-req-outbound-options.png)
3939

articles/spring-apps/reference-architecture.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,10 +35,10 @@ Azure Spring Apps requires two dedicated subnets:
3535
* Service runtime
3636
* Spring Boot applications
3737

38-
Each of these subnets requires a dedicated Azure Spring Apps cluster. Multiple clusters can't share the same subnets. The minimum size of each subnet is /28. The number of application instances that Azure Spring Apps can support varies based on the size of the subnet. You can find the detailed Virtual Network (VNET) requirements in the [Virtual network requirements][11] section of [Deploy Azure Spring Apps in a virtual network][17].
38+
Each of these subnets requires a dedicated Azure Spring Apps cluster. Multiple clusters can't share the same subnets. The minimum size of each subnet is /28. The number of application instances that Azure Spring Apps can support varies based on the size of the subnet. You can find the detailed virtual network requirements in the [Virtual network requirements][11] section of [Deploy Azure Spring Apps in a virtual network][17].
3939

4040
> [!WARNING]
41-
> The selected subnet size can't overlap with the existing VNET address space, and shouldn't overlap with any peered or on-premises subnet address ranges.
41+
> The selected subnet size can't overlap with the existing virtual network address space, and shouldn't overlap with any peered or on-premises subnet address ranges.
4242
4343
## Use cases
4444

@@ -235,7 +235,7 @@ The following list shows the CIS controls that address network security in this
235235
| 6.5 | Ensure that Network Watcher is 'Enabled'. |
236236
| 6.6 | Ensure that ingress using UDP is restricted from the internet. |
237237

238-
Azure Spring Apps requires management traffic to egress from Azure when deployed in a secured environment. You must allow the network and application rules listed in [Customer responsibilities for running Azure Spring Apps in VNET](./vnet-customer-responsibilities.md).
238+
Azure Spring Apps requires management traffic to egress from Azure when deployed in a secured environment. You must allow the network and application rules listed in [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md).
239239

240240
#### Application security
241241

articles/spring-apps/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,7 @@ items:
234234
href: how-to-create-user-defined-route-instance.md
235235
- name: Customize the ingress configuration in Azure Spring Apps
236236
href: how-to-configure-ingress.md
237-
- name: Customer responsibilities running Azure Spring Apps in VNET
237+
- name: Customer responsibilities running Azure Spring Apps in a virtual network
238238
href: vnet-customer-responsibilities.md
239239
- name: Troubleshooting Azure Spring Apps in virtual networks
240240
href: troubleshooting-vnet.md
@@ -274,7 +274,7 @@ items:
274274
items:
275275
- name: Self diagnose and solve problems
276276
href: how-to-self-diagnose-solve.md
277-
- name: Self diagnose running in VNET
277+
- name: Self diagnose running in virtual networks
278278
href: how-to-self-diagnose-running-in-vnet.md
279279
- name: Troubleshoot common issues
280280
href: troubleshoot.md

articles/spring-apps/troubleshooting-vnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ To set up the Azure Spring Apps service instance by using the Resource Manager t
3838
| Error Message | How to fix |
3939
|------|------|
4040
| Resources created by Azure Spring Apps were disallowed by policy. | Network resources will be created when deploy Azure Spring Apps in your own virtual network. Please check whether you have [Azure Policy](../governance/policy/overview.md) defined to block those creation. Resources failed to be created can be found in error message. |
41-
| Required traffic is not allowlisted. | Please refer to [Customer Responsibilities for Running Azure Spring Apps in VNET](./vnet-customer-responsibilities.md) to ensure required traffic is allowlisted. |
41+
| Required traffic is not allowlisted. | Please refer to [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md) to ensure required traffic is allowlisted. |
4242

4343
## My application can't be registered
4444

articles/spring-apps/vnet-customer-responsibilities.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: "Customer responsibilities running Azure Spring Apps in vnet"
3-
description: This article describes customer responsibilities running Azure Spring Apps in vnet.
2+
title: "Customer responsibilities running Azure Spring Apps in a virtual network"
3+
description: This article describes customer responsibilities running Azure Spring Apps in a virtual network.
44
author: karlerickson
55
ms.author: karler
66
ms.service: spring-apps
@@ -9,7 +9,7 @@ ms.date: 11/02/2021
99
ms.custom: devx-track-java, event-tier1-build-2022
1010
---
1111

12-
# Customer responsibilities for running Azure Spring Apps in VNET
12+
# Customer responsibilities for running Azure Spring Apps in a virtual network
1313

1414
> [!NOTE]
1515
> Azure Spring Apps is the new name for the Azure Spring Cloud service. Although the service has a new name, you'll see the old name in some places for a while as we work to update assets such as screenshots, videos, and diagrams.

0 commit comments

Comments
 (0)