You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-apps/custom-domains-certificates.md
+25-5Lines changed: 25 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,21 +63,41 @@ Azure Container Apps allows you to bind one or more custom domains to a containe
63
63
| Apex domain | A record | An apex domain is a domain at the root level of your domain. For example, if your DNS (Domain Name System) zone is `contoso.com`, then `contoso.com` is the apex domain. |
64
64
| Subdomain | CNAME | A subdomain is a domain that is part of another domain. For example, if your DNS zone is `contoso.com`, then `www.contoso.com` is an example of a subdomain that can be configured in the zone. |
65
65
66
-
1. Using the DNS provider that is hosting your domain, create DNS records based on the *Hostname record type* you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you own it.
66
+
1. Using the DNS provider that is hosting your domain, create DNS records based on the *Hostname record type* you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you own it. The setup depends on whether you are using custom domains with the private endpoint (preview) feature:
67
67
68
+
# [General](#tab/general)
69
+
68
70
- If you selected *A record*, create the following DNS records:
69
71
70
72
| Record type | Host | Value |
71
73
|--|--|--|
72
-
| A |`@`| The IP address of your Container Apps environment |
73
-
| TXT |`asuid`| The domain verification code |
74
+
| A |`@`| The IP address of your Container Apps environment.|
75
+
| TXT |`asuid`| The domain verification code.|
74
76
75
77
- If you selected *CNAME*, create the following DNS records:
76
78
77
79
| Record type | Host | Value |
78
80
|--|--|--|
79
-
| CNAME | The subdomain (for example, `www`) | The automatically generated domain of your container app |
80
-
| TXT |`asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code |
81
+
| CNAME | The subdomain (for example, `www`) | The generated domain of your container app. |
82
+
| TXT |`asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code. |
83
+
84
+
# [Private endpoint](#tab/private-endpoint)
85
+
86
+
- If you selected *A record*, you need to have a private DNS zone which has the same DNS zone name as your public DNS. Create the following DNS records on your private DNS zone:
87
+
88
+
| Record type | Host | Value |
89
+
|--|--|--|
90
+
| A |`@`| The Private IP of your private endpoint on your container apps environment. |
91
+
| TXT |`asuid`| The domain verification code. |
92
+
93
+
- If you selected *CNAME*, create the following DNS records:
94
+
95
+
| Record type | Host | Value |
96
+
|--|--|--|
97
+
| CNAME | The subdomain (for example, `www`) | The generated domain of your container app. |
98
+
| TXT |`asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code. |
Copy file name to clipboardExpand all lines: articles/container-apps/custom-domains-managed-certificates.md
+54-12Lines changed: 54 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,21 +62,41 @@ The requirements are:
62
62
| Apex domain | A record | An apex domain is a domain at the root level of your domain. For example, if your DNS zone is `contoso.com`, then `contoso.com` is the apex domain. |
63
63
| Subdomain | CNAME | A subdomain is a domain that is part of another domain. For example, if your DNS zone is `contoso.com`, then `www.contoso.com` is an example of a subdomain that can be configured in the zone. |
64
64
65
-
1. Using the DNS provider that is hosting your domain, create DNS records based on the *Hostname record type* you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you're the owner.
65
+
1. Using the DNS provider that is hosting your domain, create DNS records based on the *Hostname record type* you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you're the owner. The setup depends on whether you are using custom domains with the private endpoint (preview) feature:
66
66
67
+
# [General](#tab/general)
68
+
67
69
- If you selected *A record*, create the following DNS records:
68
70
69
71
| Record type | Host | Value |
70
72
|--|--|--|
71
-
| A |`@`| The IP address of your Container Apps environment |
72
-
| TXT |`asuid`| The domain verification code |
73
+
| A |`@`| The IP address of your Container Apps environment.|
74
+
| TXT |`asuid`| The domain verification code.|
73
75
74
76
- If you selected *CNAME*, create the following DNS records:
75
77
76
78
| Record type | Host | Value |
77
79
|--|--|--|
78
-
| CNAME | The subdomain (for example, `www`) | The automatically generated `<appname>.<region>.azurecontainerapps.io` domain of your container app |
79
-
| TXT |`asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code |
80
+
| CNAME | The subdomain (for example, `www`) | The generated domain of your container app. |
81
+
| TXT |`asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code. |
82
+
83
+
# [Private endpoint](#tab/private-endpoint)
84
+
85
+
- If you selected *A record*, you need to have a private DNS zone which has the same DNS zone name as your public DNS. Create the following DNS records on your private DNS zone:
86
+
87
+
| Record type | Host | Value |
88
+
|--|--|--|
89
+
| A |`@`| The Private IP of your private endpoint on your container apps environment. |
90
+
| TXT |`asuid`| The domain verification code. |
91
+
92
+
- If you selected *CNAME*, create the following DNS records:
93
+
94
+
| Record type | Host | Value |
95
+
|--|--|--|
96
+
| CNAME | The subdomain (for example, `www`) | The generated domain of your container app. |
97
+
| TXT |`asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code. |
98
+
99
+
---
80
100
81
101
1. Select **Validate**.
82
102
@@ -149,21 +169,43 @@ Container Apps supports apex domains and subdomains. Each domain type requires a
149
169
150
170
Replace `<CONTAINER_APP_NAME>` with the name of your container app, and `<RESOURCE_GROUP_NAME>` with the name of the resource group that contains your container app.
151
171
152
-
1. Using the DNS provider that is hosting your domain, create DNS records based on the record type you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you own it.
172
+
1. Using the DNS provider that is hosting your domain, create DNS records based on the record type you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you own it. The setup depends on whether you are using custom domains with the private endpoint (preview) feature:
173
+
174
+
# [General](#tab/general)
175
+
176
+
- If you selected *A record*, create the following DNS records:
177
+
178
+
| Record type | Host | Value |
179
+
|--|--|--|
180
+
| A | `@` | The IP address of your Container Apps environment. |
181
+
| TXT | `asuid` | The domain verification code. |
182
+
183
+
- If you selected *CNAME*, create the following DNS records:
184
+
185
+
| Record type | Host | Value |
186
+
|--|--|--|
187
+
| CNAME | The subdomain (for example, `www`) | The generated domain of your container app. |
188
+
| TXT | `asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code. |
189
+
190
+
# [Private endpoint](#tab/private-endpoint)
191
+
192
+
When using a private endpoint for your incoming traffic, you need to [create a private DNS zone](how-to-use-private-endpoint.md#configure-the-private-dns-zone).
153
193
154
-
- If you're configuring an apex domain, create the following DNS records:
194
+
- If you selected *A record*, create the following DNS records:
155
195
156
196
| Record type | Host | Value |
157
197
|--|--|--|
158
-
| A | `@` | The IP address of your Container Apps environment |
159
-
| TXT | `asuid` | The domain verification code |
198
+
| A | `@` | The Private IP of your private endpoint on your container apps environment. |
199
+
| TXT | `asuid` | The domain verification code. |
160
200
161
-
- If you're configuring a subdomain, create the following DNS records:
201
+
- If you selected *CNAME*, create the following DNS records:
162
202
163
203
| Record type | Host | Value |
164
204
|--|--|--|
165
-
| CNAME | The subdomain (for example, `www`) | The automatically generated domain of your container app |
166
-
| TXT | `asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code |
205
+
| CNAME | The subdomain (for example, `www`) | The generated domain of your container app. |
206
+
| TXT | `asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code. |
Copy file name to clipboardExpand all lines: articles/container-apps/ingress-overview.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.author: cshoe
11
11
12
12
# Ingress in Azure Container Apps
13
13
14
-
Azure Container Apps allows you to expose your container app to the public web, your virtual network (VNET), and other container apps within your environment by enabling ingress. Ingress settings are enforced through a set of rules that control the routing of external and internal traffic to your container app. When you enable ingress, you don't need to create an Azure Load Balancer, public IP address, or any other Azure resources to enable incoming HTTP requests or TCP traffic.
14
+
Azure Container Apps allows you to expose your container app to the public web, your virtual network (VNET), and other container apps within your environment by enabling ingress. Ingress settings are enforced through a set of rules that control the routing of external and internal traffic to your container app. When you enable ingress, you don't need to create an Azure Load Balancer, public IP address, or any other Azure resources to enable incoming HTTP requests or TCP traffic.
15
15
16
16
Ingress supports:
17
17
@@ -36,7 +36,7 @@ When you enable ingress, you can choose between two types of ingress:
36
36
- External: Accepts traffic from both the public internet and your container app's internal environment.
37
37
- Internal: Allows only internal access from within your container app's environment.
38
38
39
-
Each container app within an environment can be configured with different ingress settings. For example, in a scenario with multiple microservice apps, to increase security you might have a single container app that receives public requests and passes the requests to a background service. In this scenario, you would configure the public-facing container app with external ingress and the internal-facing container app with internal ingress.
39
+
Each container app within an environment can be configured with different ingress settings. For example, in a scenario with multiple microservice apps, to increase security you might have a single container app that receives public requests and passes the requests to a background service. In this scenario, you would configure the public-facing container app with external ingress and the internal-facing container app with internal ingress.
40
40
41
41
## Protocol types
42
42
@@ -71,12 +71,12 @@ HTTP ingress adds headers to pass metadata about the client request to your cont
71
71
Container Apps supports TCP-based protocols other than HTTP or HTTPS. For example, you can use TCP ingress to expose a container app that uses the [Redis protocol](https://redis.io/topics/protocol).
72
72
73
73
> [!NOTE]
74
-
> External TCP ingress is only supported for Container Apps environments that use a [custom VNET](vnet-custom.md).
74
+
> External TCP ingress is only supported for Container Apps environments that use a [custom VNET](vnet-custom.md). TCP ingress is not supported for apps that accept inbound traffic through a [private endpoint](networking.md#private-endpoint).
75
75
76
76
With TCP ingress enabled, your container app:
77
77
78
78
- Is accessible to other container apps in the same environment via its name (defined by the `name` property in the Container Apps resource) and exposed port number.
79
-
- Is accessible externally via its fully qualified domain name (FQDN) and exposed port number if the ingress is set to "external".
79
+
- Is accessible externally via its fully qualified domain name (FQDN) and exposed port number if the ingress is set to `external`.
@@ -90,7 +90,7 @@ The following apply to additional TCP ports:
90
90
- Any externally exposed additional TCP ports must be unique across the entire Container Apps environment. This includes all external additional TCP ports, external main TCP ports, and 80/443 ports used by built-in HTTP ingress. If the additional ports are internal, the same port can be shared by multiple apps.
91
91
- If an exposed port isn't provided, the exposed port will default to match the target port.
92
92
- Each target port must be unique, and the same target port can't be exposed on different exposed ports.
93
-
- There's a maximum of 5 additional ports per app. If additional ports are required, please open a support request.
93
+
- There's a maximum of five additional ports per app. If additional ports are required, please open a support request.
94
94
- Only the main ingress port supports built-in HTTP features such as CORS and session affinity. When running HTTP on top of the additional TCP ports, these built-in features aren't supported.
95
95
96
96
Visit the [how to article on ingress](ingress-how-to.md#use-additional-tcp-ports) for more information on how to enable additional ports for your container apps.
@@ -100,7 +100,7 @@ Visit the [how to article on ingress](ingress-how-to.md#use-additional-tcp-ports
100
100
You can access your app in the following ways:
101
101
102
102
- The default fully qualified domain name (FQDN): Each app in a Container Apps environment is automatically assigned an FQDN based on the environment's DNS suffix. To customize an environment's DNS suffix, see [Custom environment DNS Suffix](environment-custom-dns-suffix.md).
103
-
- A custom domain name: You can configure a custom DNS domain for your Container Apps environment. For more information, see [Custom domain names and certificates](./custom-domains-certificates.md).
103
+
- A custom domain name: You can configure a custom DNS domain for your Container Apps environment. For more information, see [Custom domain names and certificates](./custom-domains-certificates.md).
104
104
- The app name: You can use the app name for communication between apps in the same environment.
105
105
106
106
To get the FQDN for your app, see [Location](connect-apps.md#location).
@@ -111,15 +111,15 @@ Container Apps supports IP restrictions for ingress. You can create rules to eit
111
111
112
112
## Authentication
113
113
114
-
Azure Container Apps provides built-in authentication and authorization features to secure your external ingress-enabled container app. For more information, see [Authentication and authorization in Azure Container Apps](authentication.md).
114
+
Azure Container Apps provides built-in authentication and authorization features to secure your external ingress-enabled container app. For more information, see [Authentication and authorization in Azure Container Apps](authentication.md).
115
115
116
116
You can configure your app to support client certificates (mTLS) for authentication and traffic encryption. For more information, see [Configure client certificates](client-certificate-authorization.md).
117
117
118
118
For details on how to use peer-to-peer environment level network encryption, see the [networking overview](./networking.md#peer-to-peer-encryption).
119
119
120
120
## Traffic splitting
121
121
122
-
Containers Apps allows you to split incoming traffic between active revisions. When you define a splitting rule, you assign the percentage of inbound traffic to go to different revisions. For more information, see [Traffic splitting](traffic-splitting.md).
122
+
Containers Apps allows you to split incoming traffic between active revisions. When you define a splitting rule, you assign the percentage of inbound traffic to go to different revisions. For more information, see [Traffic splitting](traffic-splitting.md).
0 commit comments