Skip to content

Commit 8bacd4c

Browse files
committed
resolve comments
1 parent b9ed00c commit 8bacd4c

File tree

2 files changed

+17
-17
lines changed

2 files changed

+17
-17
lines changed

articles/azure-signalr/signalr-howto-reverse-proxy-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ A reverse proxy server can be used in front of Azure SignalR Service. Reverse pr
1414

1515
A common architecture using a reverse proxy server with Azure SignalR is as below:
1616

17-
:::image type="content" source="./media/signalr-howto-reverse-proxy-overview/architecture.png" alt-text="Architecture using Azure SignalR with a reverse proxy server.":::
17+
:::image type="content" source="./media/signalr-howto-reverse-proxy-overview/architecture.png" alt-text="Diagram that shows the architecture using Azure SignalR with a reverse proxy server.":::
1818

1919
## General practices
2020
There are several general practices to follow when using a reverse proxy in front of SignalR Service.

articles/azure-signalr/signalr-howto-work-with-app-gateway.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This article contains two parts,
2121
* [The first part](#set-up-and-configure-application-gateway) shows how to configure Application Gateway so that the clients can access SignalR through Application Gateway.
2222
* [The second part](#secure-signalr-service) shows how to secure SignalR Service by adding access control to SignalR Service and only allow traffic from Application Gateway.
2323

24-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/architecture.png" alt-text="The architecture of using SignalR Service with Application Gateway.":::
24+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/architecture.png" alt-text="Diagram that shows the architecture of using SignalR Service with Application Gateway.":::
2525

2626
## Set up and configure Application Gateway
2727

@@ -45,20 +45,20 @@ Create from the portal an Application Gateway instance **_AG1_**:
4545

4646
- Accept the default values for the other settings and then select **Next: Frontends**
4747

48-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/basics.png" alt-text="Create Application Gateway instance with Basics tab.":::
48+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/basics.png" alt-text="Screenshot of creating Application Gateway instance with Basics tab.":::
4949

5050
* On the **Frontends** tab:
5151
- **Frontend IP address type**: **Public**.
5252
- Select **Add new** for the **Public IP address** and enter *myAGPublicIPAddress* for the public IP address name, and then select **OK**.
5353
- Select **Next: Backends**
54-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/application-gateway-create-frontends.png" alt-text="Create Application Gateway instance with Frontends tab.":::
54+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/application-gateway-create-frontends.png" alt-text="Screenshot of creating Application Gateway instance with Frontends tab.":::
5555

5656
* On the **Backends** tab, select **Add a backend pool**:
5757
- **Name**: Enter **_signalr_** for the SignalR Service resource backend pool.
5858
- Backend targets **Target**: the **host name** of your SignalR Service instance **_ASRS1_**, for example `asrs1.service.signalr.net`
5959
- Select **Next: Configuration**
6060

61-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/application-gateway-create-backends.png" alt-text="Set up the application gateway backend pool for the SignalR Service.":::
61+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/application-gateway-create-backends.png" alt-text="Screenshot of setting up the application gateway backend pool for the SignalR Service.":::
6262

6363
* On the **Configuration** tab, select **Add a routing rule** in the **Routing rules** column:
6464
- **Rule name**: **_myRoutingRule_**
@@ -70,7 +70,7 @@ Create from the portal an Application Gateway instance **_AG1_**:
7070
* We use the HTTP frontend protocol on Application Gateway in this article to simplify the demo and help you get started easier. But in reality, you may need to enable HTTPs and Customer Domain on it with production scenario.
7171
- Accept the default values for the other settings on the **Listener** tab
7272

73-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/application-gateway-create-rule-listener.png" alt-text="Set up the application gateway routing rule listener tab for the SignalR Service.":::
73+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/application-gateway-create-rule-listener.png" alt-text="Screenshot of setting up the application gateway routing rule listener tab for the SignalR Service.":::
7474
- On the **Backend targets** tab, use the following values:
7575
* **Target type**: Backend pool
7676
* **Backend target**: select **signalr** we previously created
@@ -82,19 +82,19 @@ Create from the portal an Application Gateway instance **_AG1_**:
8282
* **Host name override**: **Pick host name from backend target**
8383
* Others keep the default values
8484

85-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/application-gateway-setup-backend.png" alt-text="Set up the application gateway backend setting for the SignalR Service.":::
85+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/application-gateway-setup-backend.png" alt-text="Screenshot of setting up the application gateway backend setting for the SignalR Service.":::
8686

87-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/application-gateway-create-rule-backends.png" alt-text="Creating backend targets for application gateway.":::
87+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/application-gateway-create-rule-backends.png" alt-text="Screenshot of creating backend targets for application gateway.":::
8888

8989
* Review and create the **_AG1_**
9090

91-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/application-gateway-review.png" alt-text="Review and create the application gateway instance.":::
91+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/application-gateway-review.png" alt-text="Screenshot of reviewing and creating the application gateway instance.":::
9292

9393
### Configure Application Gateway health probe
9494

9595
When **_AG1_** is created, go to **Health probes** tab under **Settings** section in the portal, change the health probe path to `/api/health`
9696

97-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/health-probe.png" alt-text="Set up the application gateway backend health probe for the SignalR Service.":::
97+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/health-probe.png" alt-text="Screenshot of setting up the application gateway backend health probe for the SignalR Service.":::
9898

9999
### Quick test
100100

@@ -111,7 +111,7 @@ When **_AG1_** is created, go to **Health probes** tab under **Settings** sectio
111111
```
112112
* Go to the Overview tab of **_AG1_**, and find out the Frontend public IP address
113113

114-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/quick-test.png" alt-text="Quick test SignalR Service health endpoint through Application Gateway.":::
114+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/quick-test.png" alt-text="Screenshot of quick testing SignalR Service health endpoint through Application Gateway.":::
115115

116116
* Visit the health endpoint through **_AG1_** `http://<frontend-public-IP-address>/client`, and it also returns *400* with error message *'hub' query parameter is required.* It means the request successfully went through Application Gateway to SignalR Service and did the request validation.
117117

@@ -135,7 +135,7 @@ Now, the traffic can reach SignalR Service through the Application Gateway. The
135135
* **Client endpoint**: Enter the URL using frontend public IP address of **_AG1_**, for example `http://20.88.8.8`. It's a connection string generator when using reverse proxies, and the value isn't preserved when next time you come back to this tab. When value entered, the connection string appends a `ClientEndpoint` section.
136136
* Copy the Connection string
137137

138-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/connection-string.png" alt-text="Get the connection string for SignalR Service with client endpoint.":::
138+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/connection-string.png" alt-text="Screenshot of getting the connection string for SignalR Service with client endpoint.":::
139139

140140
* Clone the GitHub repo https://github.com/aspnet/AzureSignalR-samples
141141
* Go to samples/Chatroom folder:
@@ -149,7 +149,7 @@ Now, the traffic can reach SignalR Service through the Application Gateway. The
149149
```
150150
* Open http://localhost:5000 from the browser and use F12 to view the network traces, you can see that the WebSocket connection is established through **_AG1_** 
151151
152-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/chat-local-run.png" alt-text="Run chat application locally with App Gateway and SignalR Service.":::
152+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/chat-local-run.png" alt-text="Screenshot of running chat application locally with App Gateway and SignalR Service.":::
153153
154154
## Secure SignalR Service
155155
@@ -165,7 +165,7 @@ Let's configure SignalR Service to only allow private access. You can find more
165165
* Go the **Networking** tab:
166166
* On **Public access** tab: **Public network access** change to **Disabled** and **Save**, now you're no longer able to access SignalR Service from public network
167167

168-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/disable-public-access.png" alt-text="Disable public access for SignalR Service.":::
168+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/disable-public-access.png" alt-text="Screenshot of disabling public access for SignalR Service.":::
169169

170170
* On **Private access** tab, select **+ Private endpoint**:
171171
* On **Basics** tab:
@@ -185,7 +185,7 @@ Let's configure SignalR Service to only allow private access. You can find more
185185
* **Integration with private DNS zone**: **Yes**
186186
* Review and create the private endpoint
187187

188-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/application-gateway-setup-private-endpoint.png" alt-text="Set up the private endpoint resource for the SignalR Service.":::
188+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/application-gateway-setup-private-endpoint.png" alt-text="Screenshot of setting up the private endpoint resource for the SignalR Service.":::
189189

190190
### Refresh Application Gateway backend pool
191191
Since Application Gateway was set up before there was a private endpoint for it to use, we need to **refresh** the backend pool for it to look at the Private DNS Zone and figure out that it should route the traffic to the private endpoint instead of the public address. We do the **refresh** by setting the backend FQDN to some other value and then changing it back.
@@ -271,7 +271,7 @@ Now the web app is deployed, let's go to the portal for **_WA1_** and make the f
271271

272272

273273

274-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/web-app-settings.png" alt-text="Configure web app connection string.":::
274+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/web-app-settings.png" alt-text="Screenshot of configuring web app connection string.":::
275275

276276
* On the **TLS/SSL settings** tab:
277277
* **HTTPS Only**: **Off**. To Simplify the demo, we used the HTTP frontend protocol on Application Gateway. Therefore, we need to turn off this option to avoid changing the HTTP URL to HTTPs automatically.
@@ -283,7 +283,7 @@ Now the web app is deployed, let's go to the portal for **_WA1_** and make the f
283283
> Sometimes you need to disable browser's auto https redirection and browser cache to prevent the URL from redirecting to HTTPS automatically.
284284
285285
286-
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/web-app-run.png" alt-text="Run chat application in Azure with App Gateway and SignalR Service.":::
286+
:::image type="content" source="./media/signalr-howto-work-with-app-gateway/web-app-run.png" alt-text="Screenshot of running chat application in Azure with App Gateway and SignalR Service.":::
287287
288288
## Next steps
289289

0 commit comments

Comments
 (0)