Skip to content

Commit 662e89d

Browse files
committed
edit #108057
1 parent 64efd7e commit 662e89d

File tree

2 files changed

+11
-10
lines changed

2 files changed

+11
-10
lines changed

articles/spring-apps/concept-outbound-type.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,11 @@ ms.custom: devx-track-java, engagement-fy23
1616
1717
**This article applies to:** ✔️ Java ✔️ C#
1818

19-
**This article applies to:** ✔️ Basic/Standard tier ✔️ Enterprise tier
19+
**This article applies to:** ✔️ Basic/Standard ✔️ Enterprise
2020

2121
This article describes how to customize an instance's egress route to support custom network scenarios. For example, you might want to customize an instance's egress route for networks that disallow public IPs and require the instance to sit behind a network virtual appliance (NVA).
2222

23-
By default, Azure Spring Apps provisions a Standard SKU Load Balancer that you can set up and use for egress. However, the default setup may not meet the requirements of all scenarios. For example, public IPs may not be allowed, or more hops may be required for egress.
23+
By default, Azure Spring Apps provisions a Standard SKU Load Balancer that you can set up and use for egress. However, the default setup may not meet the requirements of all scenarios. For example, public IPs may not be allowed, or more hops may be required for egress. When you use this feature to customize egress, Azure Spring Apps won't create public IP resources.
2424

2525
## Prerequisites
2626

articles/spring-apps/how-to-create-user-defined-route-instance.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.custom: devx-track-java, devx-track-azurecli
1313

1414
**This article applies to:** ✔️ Java ✔️ C#
1515

16-
**This article applies to:** ✔️ Basic/Standard tier ✔️ Enterprise tier
16+
**This article applies to:** ✔️ Basic/Standard ✔️ Enterprise
1717

1818
This article describes how to secure outbound traffic from your applications hosted in Azure Spring Apps. The article provides an example of a user-defined route. A user-defined route is an advanced feature that lets you fully control egress traffic. You can use a user-defined route in scenarios such as disallowing an Azure Spring Apps autogenerated public IP address.
1919

@@ -35,10 +35,11 @@ The following illustration shows an example of an Azure Spring Apps virtual netw
3535

3636
This diagram illustrates the following features of the architecture:
3737

38-
* Public ingress traffic must flow through firewall filters.
39-
* Each Azure Spring Apps instance is isolated within a dedicated subnet.
40-
* The firewall is owned and managed by customers.
41-
* This structure ensures that the firewall enables a healthy environment for all the functions you need.
38+
- Public ingress traffic must flow through firewall filters.
39+
- Each Azure Spring Apps instance is isolated within a dedicated subnet.
40+
- The firewall is owned and managed by customers.
41+
- This structure ensures that the firewall enables a healthy environment for all the functions you need.
42+
- Azure Spring Apps doesn't automatically generate public IP resources.
4243

4344
### Define environment variables
4445

@@ -110,7 +111,7 @@ az network vnet subnet create \
110111
Use the following command to create and set up an Azure Firewall instance with a user-defined route, and to configure Azure Firewall outbound rules. The firewall lets you configure granular egress traffic rules from Azure Spring Apps.
111112

112113
> [!IMPORTANT]
113-
> If your cluster or application creates a large number of outbound connections directed to the same destination or to a small subset of destinations, you might require more firewall front-end IP addresses to avoid reaching the maximum ports per front-end IP address. For more information on how to create an Azure Firewall instance with multiple IP addresses, see [Quickstart: Create an Azure Firewall instance with multiple public IP addresses - ARM template](../firewall/quick-create-multiple-ip-template.md). Create a Standard SKU public IP resource that will be used as the Azure Firewall front-end address.
114+
> If your cluster or application creates a large number of outbound connections directed to the same destination or to a small subset of destinations, you might require more firewall front-end IP addresses to avoid reaching the maximum ports per front-end IP address. For more information on how to create an Azure Firewall instance with multiple IP addresses, see [Quickstart: Create an Azure Firewall instance with multiple public IP addresses - ARM template](../firewall/quick-create-multiple-ip-template.md). Create a Standard SKU public IP resource for use as the Azure Firewall front-end address.
114115
115116
```azurecli
116117
az network public-ip create \
@@ -137,7 +138,7 @@ az network firewall create \
137138
The following example shows how to assign the IP address that you created to the firewall front end.
138139

139140
> [!NOTE]
140-
> Setting up the public IP address to the Azure Firewall instance might take a few minutes. To use a fully qualified domain name (FQDN) on network rules, enable a DNS proxy. After you enable the proxy, the firewall will listen on port 53 and forward DNS requests to the specified DNS server. The firewall can then translate the FQDN automatically.
141+
> Setting up the public IP address to the Azure Firewall instance might take a few minutes. To use a fully qualified domain name (FQDN) on network rules, enable a DNS proxy. After you enable the proxy, the firewall listens on port 53 and forwards DNS requests to the specified DNS server. The firewall can then translate the FQDN automatically.
141142
142143
```azurecli
143144
# Configure the firewall IP address.
@@ -319,7 +320,7 @@ az spring create \
319320
--outbound-type userDefinedRouting
320321
```
321322

322-
You can now access the public IP address of the firewall from the internet. The firewall will route traffic into Azure Spring Apps subnets according to your routing rules.
323+
You can now access the public IP address of the firewall from the internet. The firewall routes traffic into Azure Spring Apps subnets according to your routing rules.
323324

324325
## Next steps
325326

0 commit comments

Comments
 (0)