Skip to content

Commit 5a6df24

Browse files
author
RoseHJM
committed
Fixed blocking issues
1 parent 6d2bc00 commit 5a6df24

File tree

2 files changed

+7
-9
lines changed

2 files changed

+7
-9
lines changed

articles/deployment-environments/how-to-configure-extensibility-model-custom-image.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: azure-deployment-environments
66
ms.custom: devx-track-azurecli, devx-track-bicep
77
author: RoseHJM
88
ms.author: rosemalcolm
9-
ms.date: 09/25/2024
9+
ms.date: 09/28/2024
1010
ms.topic: how-to
1111
zone_pivot_groups: ade-extensibility-iac-framework
1212

@@ -65,7 +65,7 @@ The main steps you'll follow when using a container image are:
6565
- For a private registry, give the DevCenter ACR permissions.
6666
1. Add your image location to the `runner` parameter in your environment definition
6767
1. Deploy environments that use your custom image.
68-
1.
68+
6969
The first step in the process is to choose the type of image you want to use. Select the corresponding tab to see the process.
7070

7171
### [Use a sample container image](#tab/sample/)
@@ -513,13 +513,13 @@ Select the appropriate tab to learn more about each approach.
513513

514514
### [Private registry](#tab/private-registry/)
515515

516-
**Use a private registry with secured access**
516+
### Use a private registry with secured access
517517

518518
By default, access to pull or push content from an Azure Container Registry is only available to authenticated users. You can further secure access to ACR by limiting access from certain networks and assigning specific roles.
519519

520520
To create an instance of ACR, which can be done through the Azure CLI, the Azure portal, PowerShell commands, and more, follow one of the [quickstarts](/azure/container-registry/container-registry-get-started-azure-cli).
521521

522-
**1. Limit network access**
522+
#### Limit network access
523523

524524
To secure network access to your ACR, you can limit access to your own networks, or disable public network access entirely. If you limit network access, you must enable the firewall exception *Allow trusted Microsoft services to access this container registry*.
525525

@@ -536,7 +536,7 @@ To disable access from public networks:
536536

537537
:::image type="content" source="media/how-to-configure-extensibility-bicep-container-image/container-registry-network-disable-public.png" alt-text="Screenshot of the ACR network settings, with Allow trusted Microsoft services to access this container registry and Save highlighted.":::
538538

539-
**2. Assign the AcrPull role**
539+
#### Assign the AcrPull role
540540

541541
Creating environments by using container images uses the ADE infrastructure, including projects and environment types. Each project has one or more project environment types, which need read access to the container image that defines the environment to be deployed. To access the images within your ACR securely, assign the AcrPull role to each project environment type.
542542

@@ -569,7 +569,7 @@ docker push {YOUR_REGISTRY}.azurecr.io/{YOUR_IMAGE_LOCATION}:{YOUR_TAG}
569569
```
570570
### [Public registry](#tab/public-registry/)
571571

572-
**Use a public registry with anonymous pull**
572+
### Use a public registry with anonymous pull
573573

574574
To set up your registry to have anonymous image pull enabled, run the following commands in the Azure CLI:
575575

articles/deployment-environments/troubleshoot-custom-image-logs-errors.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,10 @@ ms.service: azure-deployment-environments
55
ms.topic: troubleshooting-general
66
author: RoseHJM
77
ms.author: rosemalcolm
8-
ms.date: 09/23/2024
8+
ms.date: 09/28/2024
99
---
1010
# Troubleshooting Custom Image Deployment Errors
1111

12-
# [Linux](#tab/linux)
13-
1412
ADE stores error details for a failed deployment in the *$ADE_ERROR_LOG* file within the container.
1513

1614
To troubleshoot a failed deployment:

0 commit comments

Comments
 (0)