You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/environment/ase-multi-tenant-comparison.md
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,16 +9,16 @@ ms.topic: article
9
9
10
10
# App Service Environment v3 and App Service public multitenant comparison
11
11
12
-
An App Service Environment is an Azure App Service feature that provides a fully isolated and dedicated environment for running App Service apps securely at high scale. Compared to the public multitenant offering, where the underlying compute is shared with other customers, App Service Environment provides enhanced security, isolation, and network access control. This article provides a comparison between the notable features of App Service Environment v3 and the public multitenant offering of App Service.
12
+
An App Service Environment is an Azure App Service feature that provides a fully isolated and dedicated environment for running App Service apps securely at high scale. Compared to the public multitenant offering, where the supporting infrastructure is shared with other customers, App Service Environment provides enhanced security, isolation, and network access control. This article provides a comparison between the differentiating features of App Service Environment v3 and the public multitenant offering of App Service.
13
13
14
14
### Hosting
15
15
16
16
|Feature |App Service Environment v3 |App Service public multitenant |
17
17
|---------|---------|---------|
18
-
|Hosting environment|Fully isolated and dedicated compute|Shared environment. Workers running your apps are dedicated, but the supporting infrastructure is shared with other customers. |
18
+
|Hosting environment|[Fully isolated and dedicated compute](overview.md)|[Shared environment](../../app-service/overview.md). Workers running your apps are dedicated, but the supporting infrastructure is shared with other customers. |
|Remote file storage|Fully dedicated to the App Service Environment |Remote file storage for the application is dedicated, but the storage is hosted on a shared file server |
23
23
|Private inbound configuration|Yes, using ILB App Service Environment variation |Yes, via private endpoint |
24
24
|Planned maintenance|[Manual upgrade preference is available](how-to-upgrade-preference.md). Maintenance is nondisruptive to your apps. |The platform handles maintenance and is nondisruptive to your apps |
@@ -37,16 +37,16 @@ Both App Service Environment v3 and the public multitenant offering run on [Virt
37
37
38
38
|Feature |App Service Environment v3 |App Service public multitenant |
39
39
|---------|---------|---------|
40
-
|Custom domains|A [custom domain suffix](how-to-custom-domain-suffix.md) can be added to the App Service Environment and all apps inherit the domain suffix. Custom domains can also be added directly to the apps. |Custom domains can be added directly to the apps.|
40
+
|Custom domains|A [custom domain suffix](how-to-custom-domain-suffix.md) can be added to the App Service Environment and all apps inherit the domain suffix. Custom domains can also be added directly to the apps. |[Custom domains](../../app-service/tutorial-secure-domain-certificate.md) can be added directly to the apps.|
41
41
|Custom domain on private DNS (no domain verification required)|Yes, on an Internal Load Balancer (ILB) App Service Environment|No, the custom domain needs to resolve via public DNS|
42
42
|Inbound TLS|Yes, you can manage SSL certificates directly within the environment, including the ability to upload and bind custom SSL certificates|Yes, you can bring your own certificate or use a certificate provided by Azure |
43
43
|Inbound TLS using certificates issues by private certificate authority (CA)|Supported|No|
44
44
|Outbound calls using client certificates issues by private CA|[Supported only from custom code in Windows code-based apps](overview-certificates.md#private-client-certificate). You can load your own root CA certificate into the trusted root store.|Not supported for source-code based deployments. Supported if deploying using either Windows containers or Linux containers (you can install arbitrary dependencies including private CA issued client certificates inside of a custom container for both platform variants).|
45
-
|App Service Managed Certificates|No|Supported|
45
+
|App Service Managed Certificates|[No](overview-certificates.md#limitations)|[Supported](../../app-service/configure-ssl-app-service-certificate.md)|
46
46
|Certificates shared across apps|Yes|No, you must upload the certificate to every app|
47
47
|Public certificate limit|1,000 public certificates per App Service Plan|1,000 public certificates per App Service Plan|
48
48
|End to end TLS encryption for inbound calls|Supported|Supported in preview for Linux, not supported on Windows|
49
-
|Change TLS cipher suite order|Supported|Supported with min TLS cipher suite feature|
49
+
|Change TLS cipher suite order|[Supported](app-service-app-service-environment-custom-settings.md#change-tls-cipher-suite-order)|[Supported with min TLS cipher suite feature](../../app-service/configure-ssl-bindings.md#enforce-tls-versions)|
50
50
51
51
### Networking
52
52
@@ -57,11 +57,11 @@ Both App Service Environment v3 and the public multitenant offering run on [Virt
57
57
|IP access restrictions for inbound traffic|Yes, [must be explicitly enabled](../../app-service/networking-features.md#access-restrictions)|Yes, [must be explicitly enabled](../../app-service/networking-features.md#access-restrictions)|
58
58
|Network security group (NSG) integration|Supports inbound and outbound traffic control |Can use NSG for inbound traffic control using the subnet that sourced the IP of a private endpoint (Note: requires private endpoints). Supports outbound network restrictions with NSG on the virtual network integration subnet. |
59
59
|UDR integration|Supports outbound traffic routing, [must be explicitly enabled](networking.md#network-routing)|Supports outbound traffic routing, [must be explicitly enabled](../../app-service/networking-features.md#network-secure-outbound-traffic-azure-firewall)|
60
-
|Route outbound traffic over virtual network|Yes, all apps are in the same subnet and all outbound traffic is routed through the virtual network by default |Supported |
60
+
|Route outbound traffic over virtual network|Yes, all apps are in the same subnet and all outbound traffic is routed through the virtual network by default |[Supported](../../app-service/overview-vnet-integration.md#routes)|
61
61
|[Block inbound traffic to App Service functionality hosted on non-HTTP ports](../../app-service/networking-features.md#app-service-ports)|Supported, NSG can be used to block inbound traffic to non-HTTP ports |Not supported. In some cases (FTP and remote debugging), functionality can be explicitly disabled on a per-application basis. However, inbound network traffic can't be blocked using NSGs since the underlying App Service platform hosting infrastructure owns the listed ports. |
62
-
|Pull Docker containers over virtual network|Supported, uses the App Service Environment's subnet|Supported|
63
-
|Azure Functions storage account access over virtual network|Supported, uses the App Service Environment's subnet|Supported|
64
-
|Backup/restore over a virtual network|Supported, uses the App Service Environment's subnet|Supported|
62
+
|Pull Docker containers over virtual network|Supported, uses the App Service Environment's subnet|[Supported](./../app-service/networking-features.md#container-image-pull)|
63
+
|Azure Functions storage account access over virtual network|Supported, uses the App Service Environment's subnet|[Supported](./../app-service/networking-features.md#content-share)|
64
+
|Backup/restore over a virtual network|Supported, uses the App Service Environment's subnet|[Supported](./../app-service/networking-features.md#backuprestore)|
65
65
|Maximum outbound TCP/IP connections per virtual machine instance|16,000|1,920 per P1V3 instance. 3,968 per P2V3 instance. 8,064 per P3V3 instance|
66
66
|Maximum SNAT ports per virtual machine instance|Dynamic: 256 - 1,024 depending on total instance count|128 per instance|
67
67
@@ -71,10 +71,10 @@ App Service Environment v3 tends to be more expensive than the public multitenan
71
71
72
72
|Feature |App Service Environment v3 |App Service public multitenant |
73
73
|---------|---------|---------|
74
-
|Pricing |Pay per instance|Pay per instance|
75
-
|Reserved instances|Available|Available|
76
-
|Savings plans|Available|Available|
77
-
|Availability zone pricing|There's a minimum charge of 18 cores. There's no added charge for availability zone support if you have 18 or more cores across your App Service plan instances. If you have fewer than 18 cores across your App Service plans in the zone redundant App Service Environment, the difference between 18 cores and the sum of the cores from the running instance count is charged as Windows I1v2 instances.|Three instance minimum enforced per App Service plan|
74
+
|Pricing |[Pay per instance](overview.md#pricing)|[Pay per instance](../../app-service/overview-hosting-plans.md)|
|Availability zone pricing|[There's a minimum charge of 18 cores.](overview.md#pricing) There's no added charge for availability zone support if you have 18 or more cores across your App Service plan instances. If you have fewer than 18 cores across your App Service plans in the zone redundant App Service Environment, the difference between 18 cores and the sum of the cores from the running instance count is charged as Windows I1v2 instances.|[Three instance minimum enforced per App Service plan](/azure/reliability/reliability-app-service.md#pricing)|
78
78
79
79
### Frequently asked questions
80
80
@@ -87,9 +87,9 @@ App Service Environment v3 tends to be more expensive than the public multitenan
87
87
88
88
#### How do I know which offering is right for me?
89
89
90
-
Deciding between App Service Environment v3 and the public multitenant offering depends on your specific requirements. There are a few key factors to consider when deciding between the two offerings.
90
+
Deciding between App Service Environment v3 and the public multitenant offering depends on your specific requirements. There are a few key factors to consider when deciding between the two offerings. The following are some common scenarios to help you decide which offering is right for you.
91
91
92
-
If you need a fully isolated and dedicated environment for running your apps, then App Service Environment v3 is the right choice for you. If you don't need a fully isolated environment and you're okay with sharing the underlying compute with other customers, then the public multitenant offering is the right choice for you.
92
+
If you need a fully isolated and dedicated environment for running your apps, then App Service Environment v3 is the right choice for you. If you don't need a fully isolated environment and you're okay with sharing the supporting infrastructure with other customers, then the public multitenant offering is the right choice for you.
93
93
94
94
If you need nearly instantaneous scaling times, then the public multitenant offering is the right choice for you. If you need to scale out to more than 30 instances, then App Service Environment v3 is the right choice for you.
95
95
@@ -99,7 +99,7 @@ If you want to simplify your networking configuration and have all your apps in
99
99
100
100
#### Can I use App Service Environment v3 and the public multitenant offering together?
101
101
102
-
Yes, you can use App Service Environment v3 and the public multitenant offering together. You can use App Service Environment v3 for your most critical apps that require a fully isolated and dedicated environment, and you can use the public multitenant offering for your apps that don't require a fully isolated environment.
102
+
Yes, you can use App Service Environment v3 and the public multitenant offering together. You can use App Service Environment v3 for your most critical apps that require a fully isolated and dedicated environment. You can use the public multitenant offering for your apps that don't require a fully isolated environment.
103
103
104
104
#### Can I migrate from the public multitenant offering to App Service Environment v3?
0 commit comments