You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -22,7 +22,6 @@ Some more complex solutions may require creating a chain of trust to establish s
22
22
The following scenarios are **not** supported:
23
23
24
24
- Different proxy configurations per node pool
25
-
- Updating HTTP/HTTPS proxy settings post cluster creation
26
25
- User/Password authentication
27
26
- Custom CAs for API server communication
28
27
- Windows-based clusters
@@ -109,7 +108,10 @@ In your template, provide values for *httpProxy*, *httpsProxy*, and *noProxy*. I
109
108
110
109
## Updating Proxy configurations
111
110
112
-
Values for *httpProxy*, and *httpsProxy* can't be changed after cluster creation. However, the values for *trustedCa* and *NoProxy* can be changed and applied to the cluster with the [az aks update][az-aks-update] command. An aks update for *NoProxy* will automatically inject new environment variables into pods with the new *NoProxy* values. Pods must be rotated for the apps to pick it up. For components under kubernetes, like containerd and the node itself, this won't take effect until a node image upgrade is performed.
111
+
> [!NOTE]
112
+
> If switching to a new proxy, the new proxy must already exist for the update to be successful. Then, after the upgrade is completed the old proxy can be deleted.
113
+
114
+
Values for *httpProxy*, *httpsProxy*, *trustedCa* and *NoProxy* can be changed and applied to the cluster with the [az aks update][az-aks-update] command. An aks update for *httpProxy*, *httpsProxy*, and/or *NoProxy* will automatically inject new environment variables into pods with the new *httpProxy*, *httpsProxy*, or *NoProxy* values. Pods must be rotated for the apps to pick it up. For components under kubernetes, like containerd and the node itself, this won't take effect until a node image upgrade is performed.
113
115
114
116
For example, assuming a new file has been created with the base64 encoded string of the new CA cert called *aks-proxy-config-2.json*, the following action updates the cluster. Or, you need to add new endpoint urls for your applications to No Proxy:
Copy file name to clipboardExpand all lines: articles/app-service/configure-vnet-integration-enable.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,11 +27,11 @@ If the virtual network is in a different subscription than the app, you must ens
27
27
28
28
## Configure in the Azure portal
29
29
30
-
1. Go to **Networking** in the App Service portal. Under **Outbound Traffic**, select **VNet integration**.
30
+
1. Go to **Networking** in the App Service portal. Under **Outbound traffic configuration**, select **Virtual network integration**.
31
31
32
-
1. Select **Add VNet**.
32
+
1. Select **Add virtual network integration**.
33
33
34
-
:::image type="content" source="./media/configure-vnet-integration-enable/vnetint-app.png" alt-text="Screenshot that shows selecting VNet integration.":::
34
+
:::image type="content" source="./media/configure-vnet-integration-enable/vnetint-app.png" alt-text="Screenshot that shows selecting Virtual network integration.":::
35
35
36
36
1. The dropdown list contains all the virtual networks in your subscription in the same region. Select an empty pre-existing subnet or create a new subnet.
Copy file name to clipboardExpand all lines: articles/app-service/configure-vnet-integration-routing.md
+21-13Lines changed: 21 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,47 +9,47 @@ ms.date: 10/20/2021
9
9
10
10
# Manage Azure App Service virtual network integration routing
11
11
12
-
Through application routing or configuration routing options, you can configure what traffic will be sent through the virtual network integration. See the [overview section](./overview-vnet-integration.md#routes) for more details.
12
+
Through application routing or configuration routing options, you can configure what traffic is sent through the virtual network integration. For more information, see the [overview section](./overview-vnet-integration.md#routes).
13
13
14
14
## Prerequisites
15
15
16
16
Your app is already integrated using the regional virtual network integration feature.
17
17
18
18
## Configure application routing
19
19
20
-
Application routing defines what traffic is routed from your app and into the virtual network. We recommend that you use the **Route All** site setting to enable routing of all traffic. Using the configuration setting allows you to audit the behavior with [a built-in policy](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F33228571-70a4-4fa1-8ca1-26d0aba8d6ef). The existing `WEBSITE_VNET_ROUTE_ALL` app setting can still be used, and you can enable all traffic routing with either setting.
20
+
Application routing defines what traffic is routed from your app and into the virtual network. We recommend that you use the `vnetRouteAllEnabled` site setting to enable routing of all traffic. Using the configuration setting allows you to audit the behavior with [a built-in policy](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F33228571-70a4-4fa1-8ca1-26d0aba8d6ef). The existing `WEBSITE_VNET_ROUTE_ALL` app setting can still be used, and you can enable all traffic routing with either setting.
21
21
22
22
### Configure in the Azure portal
23
23
24
-
Follow these steps to disable **Route All** in your app through the portal.
24
+
Follow these steps to disable outbound internet traffic routing in your app through the portal.
25
25
26
-
:::image type="content" source="./media/configure-vnet-integration-routing/vnetint-route-all-enabled.png" alt-text="Screenshot that shows enabling Route All.":::
26
+
:::image type="content" source="./media/configure-vnet-integration-routing/vnetint-route-all-enabled.png" alt-text="Screenshot that shows enabling outbound internet traffic.":::
27
27
28
-
1. Go to **Networking** > **VNet integration** in your app portal.
29
-
1.Set **Route All** to **Disabled**.
28
+
1. Go to **Networking** > **Virtual network integration** in your app portal.
29
+
1.Uncheck the **Outbound internet traffic** setting.
30
30
31
-
:::image type="content" source="./media/configure-vnet-integration-routing/vnetint-route-all-disabling.png" alt-text="Screenshot that shows disabling Route All.":::
31
+
:::image type="content" source="./media/configure-vnet-integration-routing/vnetint-route-all-disabling.png" alt-text="Screenshot that shows disabling outbound internet traffic.":::
32
32
33
-
1. Select **Yes** to confirm.
33
+
1. Select **Apply** to confirm.
34
34
35
35
### Configure with the Azure CLI
36
36
37
-
You can also configure **Route All** by using the Azure CLI.
37
+
You can also configure **Outbound internet traffic** by using the Azure CLI.
When you're using virtual network integration, you can configure how parts of the configuration traffic are managed. By default, configuration traffic will go directly over the public route, but for the mentioned individual components, you can actively configure it to be routed through the virtual network integration.
45
+
When you're using virtual network integration, you can configure how parts of the configuration traffic are managed. By default, configuration traffic goes directly over the public route, but for the mentioned individual components, you can actively configure it to be routed through the virtual network integration.
46
46
47
47
### Container image pull
48
48
49
49
Routing container image pull over virtual network integration can be configured using the Azure CLI.
We recommend that you use the site property to enable routing image pull traffic through the virtual network integration. Using the configuration setting allows you to audit the behavior with Azure Policy. The existing `WEBSITE_PULL_IMAGE_OVER_VNET` app setting with the value `true` can still be used, and you can enable routing through the virtual network with either setting.
@@ -59,11 +59,19 @@ We recommend that you use the site property to enable routing image pull traffic
59
59
Routing content share over virtual network integration can be configured using the Azure CLI. In addition to enabling the feature, you must also ensure that any firewall or Network Security Group configured on traffic from the subnet allow traffic to port 443 and 445.
We recommend that you use the site property to enable content share traffic through the virtual network integration. Using the configuration setting allows you to audit the behavior with Azure Policy. The existing `WEBSITE_CONTENTOVERVNET` app setting with the value `1` can still be used, and you can enable routing through the virtual network with either setting.
66
66
67
+
### Backup/restore
68
+
69
+
Routing backup traffic over virtual network integration can be configured using the Azure CLI. Database backup isn't supported over the virtual network integration.
0 commit comments