Skip to content

Commit 76c5301

Browse files
how-to-create-udr-instance edit pass
1 parent 4c342bf commit 76c5301

File tree

1 file changed

+25
-22
lines changed

1 file changed

+25
-22
lines changed

articles/spring-apps/how-to-create-udr-instance.md

Lines changed: 25 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,6 @@ This article describes how to secure outbound traffic from your Azure Spring App
2727
- [Customer responsibilities for running Azure Spring Apps in VNET](vnet-customer-responsibilities.md)
2828
- [Customize Azure Spring Cloud egress with a User-Defined Route](concept-outbound-type.md)
2929

30-
3130
## Azure Spring Apps UDR instance example
3231

3332
The following illustration shows an example of an Azure Spring Apps VNet instance using a user-defined route.
@@ -64,15 +63,15 @@ This section shows how to provision a virtual network with three separate subnet
6463
First create a resource group, as shown in the following example.
6564

6665
```azurecli
67-
# Create Resource Group
66+
# Create resource group.
6867
6968
az group create --name $RG --location $LOC
7069
```
7170

7271
Then create a virtual network with three subnets to host the ASA instance and the Azure Firewall, as shown in the following example.
7372

7473
```azurecli
75-
# Dedicated virtual network with ASA app subnet
74+
# Dedicated virtual network with ASA app subnet.
7675
7776
az network vnet create \
7877
--resource-group $RG \
@@ -82,15 +81,15 @@ az network vnet create \
8281
--subnet-name $ASA_APP_SUBNET_NAME \
8382
--subnet-prefix 10.42.1.0/24
8483
85-
# Dedicated subnet for ASA service runtime subnet
84+
# Dedicated subnet for ASA service runtime subnet.
8685
8786
az network vnet subnet create \
8887
--resource-group $RG \
8988
--vnet-name $VNET_NAME \
9089
--name $ASA_SERVICE_RUNTIME_SUBNET_NAME\
9190
--address-prefix 10.42.2.0/24
9291
93-
# Dedicated subnet for Azure Firewall (Firewall name cannot be changed)
92+
# Dedicated subnet for Azure Firewall. (Firewall name cannot be changed.)
9493
9594
az network vnet subnet create \
9695
--resource-group $RG \
@@ -113,11 +112,11 @@ az network public-ip create -g $RG -n $FWPUBLICIP_NAME -l $LOC --sku "Standard"
113112
The following example shows how to install the Azure Firewall preview CLI extension and deploy Azure Firewall.
114113

115114
```azurecli
116-
# Install Azure Firewall preview CLI extension
115+
# Install Azure Firewall preview CLI extension.
117116
118117
az extension add --name azure-firewall
119118
120-
# Deploy Azure Firewall
119+
# Deploy Azure Firewall.
121120
122121
az network firewall create -g $RG -n $FWNAME -l $LOC --enable-dns-proxy true
123122
```
@@ -128,28 +127,28 @@ The following example shows how to assign the IP address you created to the fire
128127
> Setting up the public IP address to the Azure Firewall may take a few minutes. To leverage FQDN on network rules, enable DNS proxy. When enabled, the firewall will listen on port 53 and forward DNS requests to the specified DNS server. The firewall can then translate the FQDN automatically.
129128
130129
```azurecli
131-
# Configure Firewall IP Config
130+
# Configure firewall IP config.
132131
133132
az network firewall ip-config create -g $RG -f $FWNAME -n $FWIPCONFIG_NAME --public-ip-address $FWPUBLICIP_NAME --vnet-name $VNET_NAME
134133
```
135134

136135
When the operation has completed, save the firewall front-end IP address for configuration later, as shown in the following example.
137136

138137
```azurecli
139-
# Capture Firewall IP Address for Later Use
138+
# Capture firewall IP address for later use.
140139
141140
FWPUBLIC_IP=$(az network public-ip show -g $RG -n $FWPUBLICIP_NAME --query "ipAddress" -o tsv)
142141
FWPRIVATE_IP=$(az network firewall show -g $RG -n $FWNAME --query "ipConfigurations[0].privateIpAddress" -o tsv | tr -d '[:space:]')
143142
```
144143

145144
### Create a UDR with a hop to Azure Firewall
146145

147-
Azure automatically routes traffic between Azure subnets, virtual networks, and on-premises networks. If you want to change any of Azure's default routing, you do so by creating a route table.
146+
Azure automatically routes traffic between Azure subnets, virtual networks, and on-premises networks. If you want to change Azure's default routing, create a route table.
148147

149-
Create an empty route table to be associated with a given subnet. The route table will define the next hop as the Azure Firewall created above. Each subnet can have zero or one route table associated to it.
148+
The following example shows how to create a route table to be associated with a specified subnet. The route table defines the next hop, as in the Azure Firewall you created. Each subnet can one route table associated with it, or could have no associated route table.
150149

151150
```azurecli
152-
# Create UDR and add a route for Azure Firewall
151+
# Create UDR and add a route for Azure Firewall.
153152
154153
az network route-table create -g $RG -l $LOC --name $APP_ROUTE_TABLE_NAME
155154
az network route-table route create -g $RG --name $FWROUTE_NAME --route-table-name $APP_ROUTE_TABLE_NAME --address-prefix 0.0.0.0/0 --next-hop-type VirtualAppliance --next-hop-ip-address $FWPRIVATE_IP
@@ -159,34 +158,36 @@ az network route-table route create -g $RG --name $FWROUTE_NAME --route-table-na
159158

160159
### Adding firewall rules
161160

162-
Add [necessary rules](vnet-customer-responsibilities.md) for ASA
161+
The following example shows hot to add rules to your firewall. For more information, see [Customer responsibilities for running Azure Spring Apps in VNET](vnet-customer-responsibilities.md).
163162

164163
```azurecli
165-
# Add FW Network Rules
164+
# Add firewall network rules.
166165
167166
az network firewall network-rule create -g $RG -f $FWNAME --collection-name 'asafwnr' -n 'apiudp' --protocols 'UDP' --source-addresses '*' --destination-addresses "AzureCloud" --destination-ports 1194 --action allow --priority 100
168167
az network firewall network-rule create -g $RG -f $FWNAME --collection-name 'asafwnr' -n 'springcloudtcp' --protocols 'TCP' --source-addresses '*' --destination-addresses "AzureCloud" --destination-ports 443 445
169168
az network firewall network-rule create -g $RG -f $FWNAME --collection-name 'asafwnr' -n 'time' --protocols 'UDP' --source-addresses '*' --destination-fqdns 'ntp.ubuntu.com' --destination-ports 123
170169
171-
# Add FW Application Rules
170+
# Add firewall application rules.
172171
173172
az network firewall application-rule create -g $RG -f $FWNAME --collection-name 'aksfwar' -n 'fqdn' --source-addresses '*' --protocols 'http=80' 'https=443' --fqdn-tags "AzureKubernetesService" --action allow --priority 100
174173
```
175174

176175
### Associate the route tables to Subnets
177176

178-
To associate the cluster with the firewall, the dedicated subnet for the cluster's subnet must reference the route table created above. App and service runtime subnets need to be associated with corresponding route tables.
177+
To associate the cluster with the firewall, the dedicated subnet for the cluster's subnet must reference the route table you created. App and service runtime subnets must be associated with corresponding route tables. The following example shows how to associate a route table with a subnet.
179178

180179
```azurecli
181-
# Associate route table with next hop to Firewall to the ASA subnet
180+
# Associate route table with next hop to Firewall to the Azure Spring Apps subnet.
182181
183182
az network vnet subnet update -g $RG --vnet-name $VNET_NAME --name $ASA_APP_SUBNET_NAME --route-table $APP_ROUTE_TABLE_NAME
184183
185184
az network vnet subnet update -g $RG --vnet-name $VNET_NAME --name $ASA_SERVICE_RUNTIME_SUBNET_NAME --route-table $SERVICE_RUNTIME_ROUTE_TABLE_NAME
186185
187186
```
188187

189-
### Follow the following doc to add role for ASA RP
188+
### Add a role for an Azure Spring Apps RP
189+
190+
The following example shows how to add a role for an Azure Spring Apps RP.
190191

191192
```azurecli
192193
VIRTUAL_NETWORK_RESOURCE_ID=`az network vnet show \
@@ -201,15 +202,17 @@ az role assignment create \
201202
--assignee e8de9221-a19c-4c81-b814-fd37c6caf9d2
202203
```
203204

204-
### Create a UDR ASA instance
205+
### Create a UDR Azure Spring Apps instance
206+
207+
The following example shows how to create a UDR Azure Spring Apps instance.
205208

206209
```azurecli
207210
az spring create -n $ASA_NAME -g $RG --vnet $VNET_NAME --app-subnet $ASA_APP_SUBNET_NAME --service-runtime-subnet $ASA_SERVICE_RUNTIME_SUBNET_NAME --outbound-type userDefinedRouting
208211
```
209212

210-
Now you can access the public IP of the firewall from the internet, and the firewall will route the traffic into the ASA subnets according to your routing rules.
213+
You can now access the public IP of the firewall from the internet. The firewall will route traffic into Azure Spring Apps subnets according to your routing rules.
211214

212215
## Next steps
213216

214-
- [Troubleshooting Azure Spring Apps in VNET](troubleshooting-vnet.md)
215-
- [Customer Responsibilities Azure Spring Apps in VNET](vnet-customer-responsibilities.md)
217+
- [Troubleshooting Azure Spring Apps in virtual networks](troubleshooting-vnet.md)
218+
- [Customer responsibilities for running Azure Spring Apps in VNET](vnet-customer-responsibilities.md)

0 commit comments

Comments
 (0)