Skip to content

Commit 69c3be2

Browse files
Merge pull request #212215 from gabesmsft/patch-8
Update ingress.md
2 parents 69af2d6 + 59db63d commit 69c3be2

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

articles/container-apps/ingress.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.custom: ignite-fall-2021, event-tier1-build-2022
1212

1313
# Set up HTTPS ingress in Azure Container Apps
1414

15-
Azure Container Apps allows you to expose your container app to the public web by enabling ingress. When you enable ingress, you don't need to create an Azure Load Balancer, public IP address, or any other Azure resources to enable incoming HTTPS requests.
15+
Azure Container Apps allows you to expose your container app to the public web, to your VNET, or to other container apps within your environment by enabling ingress. When you enable ingress, you don't need to create an Azure Load Balancer, public IP address, or any other Azure resources to enable incoming HTTPS requests.
1616

1717
With ingress enabled, your container app features the following characteristics:
1818

@@ -64,7 +64,11 @@ With ingress enabled, your application is assigned a fully qualified domain name
6464
| External | `<APP_NAME>.<UNIQUE_IDENTIFIER>.<REGION_NAME>.azurecontainerapps.io`|
6565
| Internal | `<APP_NAME>.internal.<UNIQUE_IDENTIFIER>.<REGION_NAME>.azurecontainerapps.io` |
6666

67-
Your Container Apps environment has a single public IP address for applications with `external` ingress visibility, and a single internal IP address for applications with `internal` ingress visibility. Therefore, all applications within a Container Apps environment with `external` ingress visibility share a single public IP address. Similarly, all applications within a Container Apps environment with `internal` ingress visibility share a single internal IP address. HTTP traffic is routed to individual applications based on the FQDN in the host header.
67+
HTTP traffic is routed to individual applications based on the FQDN in the host header.
68+
69+
For applications with external ingress visibility, the following conditions apply:
70+
- An internal Container Apps environment has a single private IP address for applications. For container apps in internal Environments, you must configure [DNS](./networking.md#dns) for VNET-scope ingress.
71+
- An external Container Apps environment or Container Apps environment that is not in a VNET has a single public IP address for applications.
6872

6973
You can get access to the environment's unique identifier by querying the environment settings.
7074

0 commit comments

Comments
 (0)