Skip to content

Commit 906e95b

Browse files
committed
fix file links
1 parent ebcf159 commit 906e95b

File tree

7 files changed

+8
-8
lines changed

7 files changed

+8
-8
lines changed

articles/container-apps/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -388,7 +388,7 @@
388388
- name: Managing outbound connections with Azure Firewall
389389
href: use-azure-firewall.md
390390
- name: Private endpoints and DNS
391-
href: private-endpoints-and-dns.md
391+
href: private-endpoints-with-dns.md
392392
- name: Securing a custom VNET with an NSG
393393
href: firewall-integration.md
394394
- name: Tutorials

articles/container-apps/custom-domains-certificates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ Azure Container Apps allows you to bind one or more custom domains to a containe
114114
1. Once the operation is complete, you see your domain name in the list of custom domains with a status of *Secured*. Navigate to your domain to verify that it's accessible.
115115

116116
> [!NOTE]
117-
> For container apps in internal Container Apps environments, [extra configuration](./private-endpoints-and-dns.md) is required to use custom domains with VNET-scope ingress.
117+
> For container apps in internal Container Apps environments, [extra configuration](./private-endpoints-with-dns.md) is required to use custom domains with VNET-scope ingress.
118118
119119
::: zone-end
120120

articles/container-apps/troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ You can use the *diagnose and solve problems* tool to find issues with your cont
5858
If you receive an error message when you try to deploy a new revision, verify that Container Apps is able to pull your container image.
5959

6060
- Ensure your container environment firewall isn't blocking access to the container registry. For more information, see [Control outbound traffic with user defined routes](./user-defined-routes.md).
61-
- If your existing VNet uses a custom DNS server instead of the default Azure-provided DNS server, verify your DNS server is configured correctly and that DNS lookup of the container registry doesn't fail. For more information, see [DNS](./private-endpoint-with-dns.md).
61+
- If your existing VNet uses a custom DNS server instead of the default Azure-provided DNS server, verify your DNS server is configured correctly and that DNS lookup of the container registry doesn't fail. For more information, see [DNS](./private-endpoints-with-dns.md).
6262
- If you used the Container Apps cloud build feature to generate a container image for you (see [Code-to-cloud path for Azure Container Apps](./code-to-cloud-options.md#new-to-containers), your image isn't publicly accessible, so this section doesn't apply.
6363

6464
For a Docker container that can run as a console application, verify that your image is publicly accessible by running the following command in an elevated command prompt. Before you run this command, replace placeholders surrounded by `<>` with your values.

articles/container-apps/use-azure-firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,4 +60,4 @@ Network rules allow or deny traffic based on the network and transport layer. Wh
6060
## Next steps
6161

6262
> [!div class="nextstepaction"]
63-
> [Configure a DNS for virtual networks in Azure Container Apps environments](private-endpoints-and-dns.md)
63+
> [Configure a DNS for virtual networks in Azure Container Apps environments](private-endpoints-with-dns.md)

articles/container-apps/vnet-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -407,7 +407,7 @@ Remove-AzResourceGroup -Name $ResourceGroupName -Force
407407

408408
## Additional resources
409409

410-
- To use VNet-scope ingress, you must set up [DNS](./private-endpoint-with-dns.md).
410+
- To use VNet-scope ingress, you must set up [DNS](./private-endpoints-with-dns.md).
411411

412412
## Next steps
413413

articles/spring-apps/migration/migrate-to-azure-container-apps-network.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -126,15 +126,15 @@ For more information, see [Securing a custom VNET in Azure Container Apps with N
126126

127127
Both Azure Spring Apps and Azure Container Apps support the use of custom DNS servers in a customer virtual network. We recommend adding Azure DNS IP `168.63.129.16` as the upstream DNS server in the custom DNS server.
128128

129-
For more information, see [DNS for virtual networks in Azure Container Apps environments](../../container-apps/dns.md).
129+
For more information, see [DNS for virtual networks in Azure Container Apps environments](../../container-apps/private-endpoints-with-dns.md#dns).
130130

131131
Currently, Azure Container Apps in a Consumption-only environment type doesn't support flushing DNS settings changes as Azure Spring Apps does. For more information, see [Flush DNS settings changes in Azure Spring Apps](../basic-standard/how-to-use-flush-dns-settings.md). However, the workload profile type of environment automatically refreshes DNS settings every 5 minutes.
132132

133133
Azure Container Apps supports deployment with a private DNS zone. For more information, see the [Deploy with a private DNS](../../container-apps/vnet-custom.md#deploy-with-a-private-dns) section of [Provide a virtual network to an Azure Container Apps environment](../../container-apps/vnet-custom.md). This approach provides a more flexible way to support linking a private DNS zone than using Azure Spring Apps. For more information, see the [Link the private DNS zone with Azure Spring Apps](../basic-standard/access-app-virtual-network.md#link-the-private-dns-zone-with-azure-spring-apps) section of [Access an app in Azure Spring Apps in a virtual network](../basic-standard/access-app-virtual-network.md).
134134

135135
## Access an app in Azure Container Apps within a customer virtual network
136136

137-
Azure Container Apps provides both [Public network access](../../container-apps/networking.md#public-network-access) and [Private endpoint](../../container-apps/dns.md) features to expose applications to the internet or to secure them within a private network. Similarly, Azure Spring Apps supports these features as described in the following articles:
137+
Azure Container Apps provides both [Public network access](../../container-apps/networking.md#public-network-access) and [Private endpoint](../../container-apps/private-endpoints-with-dns.md) features to expose applications to the internet or to secure them within a private network. Similarly, Azure Spring Apps supports these features as described in the following articles:
138138

139139
- [Access an app in Azure Spring Apps in a virtual network](../basic-standard/access-app-virtual-network.md)
140140
- [Access applications using Azure Spring Apps Standard consumption and dedicated plan in a virtual network](../consumption-dedicated/quickstart-access-standard-consumption-within-virtual-network.md)

redirects/.openpublishing.redirection.sentinel.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1261,7 +1261,7 @@
12611261
"redirect_document_id": false
12621262
},
12631263
{
1264-
"source_path_from_root": "/articles/sentinel/data-connectors/dns.md",
1264+
"source_path_from_root": "/articles/sentinel/data-connectors/private-endpoints-with-dns.md",
12651265
"redirect_url": "/azure/sentinel/data-connectors/windows-dns-events-via-ama",
12661266
"redirect_document_id": false
12671267
},

0 commit comments

Comments
 (0)