Skip to content

Commit 943e339

Browse files
Merge pull request #290023 from cachai2/fix-pe-conceptual-ignite-branch
Fix pe conceptual ignite branch
2 parents da17416 + aa5d3d6 commit 943e339

File tree

5 files changed

+139
-34
lines changed

5 files changed

+139
-34
lines changed

articles/container-apps/custom-domains-certificates.md

Lines changed: 25 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -63,21 +63,41 @@ Azure Container Apps allows you to bind one or more custom domains to a containe
6363
| Apex domain | A record | An apex domain is a domain at the root level of your domain. For example, if your DNS (Domain Name System) zone is `contoso.com`, then `contoso.com` is the apex domain. |
6464
| Subdomain | CNAME | A subdomain is a domain that is part of another domain. For example, if your DNS zone is `contoso.com`, then `www.contoso.com` is an example of a subdomain that can be configured in the zone. |
6565

66-
1. Using the DNS provider that is hosting your domain, create DNS records based on the *Hostname record type* you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you own it.
66+
1. Using the DNS provider that is hosting your domain, create DNS records based on the *Hostname record type* you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you own it. The setup depends on whether you are using custom domains with the private endpoint (preview) feature:
6767

68+
# [General](#tab/general)
69+
6870
- If you selected *A record*, create the following DNS records:
6971

7072
| Record type | Host | Value |
7173
|--|--|--|
72-
| A | `@` | The IP address of your Container Apps environment |
73-
| TXT | `asuid` | The domain verification code |
74+
| A | `@` | The IP address of your Container Apps environment. |
75+
| TXT | `asuid` | The domain verification code. |
7476

7577
- If you selected *CNAME*, create the following DNS records:
7678

7779
| Record type | Host | Value |
7880
|--|--|--|
79-
| CNAME | The subdomain (for example, `www`) | The automatically generated domain of your container app |
80-
| TXT | `asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code |
81+
| CNAME | The subdomain (for example, `www`) | The generated domain of your container app. |
82+
| TXT | `asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code. |
83+
84+
# [Private endpoint](#tab/private-endpoint)
85+
86+
- If you selected *A record*, you need to have a private DNS zone which has the same DNS zone name as your public DNS. Create the following DNS records on your private DNS zone:
87+
88+
| Record type | Host | Value |
89+
|--|--|--|
90+
| A | `@` | The Private IP of your private endpoint on your container apps environment. |
91+
| TXT | `asuid` | The domain verification code. |
92+
93+
- If you selected *CNAME*, create the following DNS records:
94+
95+
| Record type | Host | Value |
96+
|--|--|--|
97+
| CNAME | The subdomain (for example, `www`) | The generated domain of your container app. |
98+
| TXT | `asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code. |
99+
100+
---
81101

82102
1. Select the **Validate** button.
83103

articles/container-apps/custom-domains-managed-certificates.md

Lines changed: 54 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -62,21 +62,41 @@ The requirements are:
6262
| Apex domain | A record | An apex domain is a domain at the root level of your domain. For example, if your DNS zone is `contoso.com`, then `contoso.com` is the apex domain. |
6363
| Subdomain | CNAME | A subdomain is a domain that is part of another domain. For example, if your DNS zone is `contoso.com`, then `www.contoso.com` is an example of a subdomain that can be configured in the zone. |
6464

65-
1. Using the DNS provider that is hosting your domain, create DNS records based on the *Hostname record type* you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you're the owner.
65+
1. Using the DNS provider that is hosting your domain, create DNS records based on the *Hostname record type* you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you're the owner. The setup depends on whether you are using custom domains with the private endpoint (preview) feature:
6666

67+
# [General](#tab/general)
68+
6769
- If you selected *A record*, create the following DNS records:
6870

6971
| Record type | Host | Value |
7072
|--|--|--|
71-
| A | `@` | The IP address of your Container Apps environment |
72-
| TXT | `asuid` | The domain verification code |
73+
| A | `@` | The IP address of your Container Apps environment. |
74+
| TXT | `asuid` | The domain verification code. |
7375

7476
- If you selected *CNAME*, create the following DNS records:
7577

7678
| Record type | Host | Value |
7779
|--|--|--|
78-
| CNAME | The subdomain (for example, `www`) | The automatically generated `<appname>.<region>.azurecontainerapps.io` domain of your container app |
79-
| TXT | `asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code |
80+
| CNAME | The subdomain (for example, `www`) | The generated domain of your container app. |
81+
| TXT | `asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code. |
82+
83+
# [Private endpoint](#tab/private-endpoint)
84+
85+
- If you selected *A record*, you need to have a private DNS zone which has the same DNS zone name as your public DNS. Create the following DNS records on your private DNS zone:
86+
87+
| Record type | Host | Value |
88+
|--|--|--|
89+
| A | `@` | The Private IP of your private endpoint on your container apps environment. |
90+
| TXT | `asuid` | The domain verification code. |
91+
92+
- If you selected *CNAME*, create the following DNS records:
93+
94+
| Record type | Host | Value |
95+
|--|--|--|
96+
| CNAME | The subdomain (for example, `www`) | The generated domain of your container app. |
97+
| TXT | `asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code. |
98+
99+
---
80100

81101
1. Select **Validate**.
82102

@@ -149,21 +169,43 @@ Container Apps supports apex domains and subdomains. Each domain type requires a
149169
150170
Replace `<CONTAINER_APP_NAME>` with the name of your container app, and `<RESOURCE_GROUP_NAME>` with the name of the resource group that contains your container app.
151171
152-
1. Using the DNS provider that is hosting your domain, create DNS records based on the record type you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you own it.
172+
1. Using the DNS provider that is hosting your domain, create DNS records based on the record type you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you own it. The setup depends on whether you are using custom domains with the private endpoint (preview) feature:
173+
174+
# [General](#tab/general)
175+
176+
- If you selected *A record*, create the following DNS records:
177+
178+
| Record type | Host | Value |
179+
|--|--|--|
180+
| A | `@` | The IP address of your Container Apps environment. |
181+
| TXT | `asuid` | The domain verification code. |
182+
183+
- If you selected *CNAME*, create the following DNS records:
184+
185+
| Record type | Host | Value |
186+
|--|--|--|
187+
| CNAME | The subdomain (for example, `www`) | The generated domain of your container app. |
188+
| TXT | `asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code. |
189+
190+
# [Private endpoint](#tab/private-endpoint)
191+
192+
When using a private endpoint for your incoming traffic, you need to [create a private DNS zone](how-to-use-private-endpoint.md#configure-the-private-dns-zone).
153193
154-
- If you're configuring an apex domain, create the following DNS records:
194+
- If you selected *A record*, create the following DNS records:
155195
156196
| Record type | Host | Value |
157197
|--|--|--|
158-
| A | `@` | The IP address of your Container Apps environment |
159-
| TXT | `asuid` | The domain verification code |
198+
| A | `@` | The Private IP of your private endpoint on your container apps environment. |
199+
| TXT | `asuid` | The domain verification code. |
160200
161-
- If you're configuring a subdomain, create the following DNS records:
201+
- If you selected *CNAME*, create the following DNS records:
162202
163203
| Record type | Host | Value |
164204
|--|--|--|
165-
| CNAME | The subdomain (for example, `www`) | The automatically generated domain of your container app |
166-
| TXT | `asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code |
205+
| CNAME | The subdomain (for example, `www`) | The generated domain of your container app. |
206+
| TXT | `asuid.` followed by the subdomain (for example, `asuid.www`) | The domain verification code. |
207+
208+
---
167209
168210
1. Add the domain to your container app.
169211

articles/container-apps/ingress-overview.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.author: cshoe
1111

1212
# Ingress in Azure Container Apps
1313

14-
Azure Container Apps allows you to expose your container app to the public web, your virtual network (VNET), and other container apps within your environment by enabling ingress. Ingress settings are enforced through a set of rules that control the routing of external and internal traffic to your container app. When you enable ingress, you don't need to create an Azure Load Balancer, public IP address, or any other Azure resources to enable incoming HTTP requests or TCP traffic.
14+
Azure Container Apps allows you to expose your container app to the public web, your virtual network (VNET), and other container apps within your environment by enabling ingress. Ingress settings are enforced through a set of rules that control the routing of external and internal traffic to your container app. When you enable ingress, you don't need to create an Azure Load Balancer, public IP address, or any other Azure resources to enable incoming HTTP requests or TCP traffic.
1515

1616
Ingress supports:
1717

@@ -36,7 +36,7 @@ When you enable ingress, you can choose between two types of ingress:
3636
- External: Accepts traffic from both the public internet and your container app's internal environment.
3737
- Internal: Allows only internal access from within your container app's environment.
3838

39-
Each container app within an environment can be configured with different ingress settings. For example, in a scenario with multiple microservice apps, to increase security you might have a single container app that receives public requests and passes the requests to a background service. In this scenario, you would configure the public-facing container app with external ingress and the internal-facing container app with internal ingress.
39+
Each container app within an environment can be configured with different ingress settings. For example, in a scenario with multiple microservice apps, to increase security you might have a single container app that receives public requests and passes the requests to a background service. In this scenario, you would configure the public-facing container app with external ingress and the internal-facing container app with internal ingress.
4040

4141
## Protocol types
4242

@@ -71,12 +71,12 @@ HTTP ingress adds headers to pass metadata about the client request to your cont
7171
Container Apps supports TCP-based protocols other than HTTP or HTTPS. For example, you can use TCP ingress to expose a container app that uses the [Redis protocol](https://redis.io/topics/protocol).
7272

7373
> [!NOTE]
74-
> External TCP ingress is only supported for Container Apps environments that use a [custom VNET](vnet-custom.md).
74+
> External TCP ingress is only supported for Container Apps environments that use a [custom VNET](vnet-custom.md). TCP ingress is not supported for apps that accept inbound traffic through a [private endpoint](networking.md#private-endpoint).
7575
7676
With TCP ingress enabled, your container app:
7777

7878
- Is accessible to other container apps in the same environment via its name (defined by the `name` property in the Container Apps resource) and exposed port number.
79-
- Is accessible externally via its fully qualified domain name (FQDN) and exposed port number if the ingress is set to "external".
79+
- Is accessible externally via its fully qualified domain name (FQDN) and exposed port number if the ingress is set to `external`.
8080

8181
## <a name="additional-tcp-ports"></a>Additional TCP ports
8282

@@ -90,7 +90,7 @@ The following apply to additional TCP ports:
9090
- Any externally exposed additional TCP ports must be unique across the entire Container Apps environment. This includes all external additional TCP ports, external main TCP ports, and 80/443 ports used by built-in HTTP ingress. If the additional ports are internal, the same port can be shared by multiple apps.
9191
- If an exposed port isn't provided, the exposed port will default to match the target port.
9292
- Each target port must be unique, and the same target port can't be exposed on different exposed ports.
93-
- There's a maximum of 5 additional ports per app. If additional ports are required, please open a support request.
93+
- There's a maximum of five additional ports per app. If additional ports are required, please open a support request.
9494
- Only the main ingress port supports built-in HTTP features such as CORS and session affinity. When running HTTP on top of the additional TCP ports, these built-in features aren't supported.
9595

9696
Visit the [how to article on ingress](ingress-how-to.md#use-additional-tcp-ports) for more information on how to enable additional ports for your container apps.
@@ -100,7 +100,7 @@ Visit the [how to article on ingress](ingress-how-to.md#use-additional-tcp-ports
100100
You can access your app in the following ways:
101101

102102
- The default fully qualified domain name (FQDN): Each app in a Container Apps environment is automatically assigned an FQDN based on the environment's DNS suffix. To customize an environment's DNS suffix, see [Custom environment DNS Suffix](environment-custom-dns-suffix.md).
103-
- A custom domain name: You can configure a custom DNS domain for your Container Apps environment. For more information, see [Custom domain names and certificates](./custom-domains-certificates.md).
103+
- A custom domain name: You can configure a custom DNS domain for your Container Apps environment. For more information, see [Custom domain names and certificates](./custom-domains-certificates.md).
104104
- The app name: You can use the app name for communication between apps in the same environment.
105105

106106
To get the FQDN for your app, see [Location](connect-apps.md#location).
@@ -111,15 +111,15 @@ Container Apps supports IP restrictions for ingress. You can create rules to eit
111111

112112
## Authentication
113113

114-
Azure Container Apps provides built-in authentication and authorization features to secure your external ingress-enabled container app. For more information, see [Authentication and authorization in Azure Container Apps](authentication.md).
114+
Azure Container Apps provides built-in authentication and authorization features to secure your external ingress-enabled container app. For more information, see [Authentication and authorization in Azure Container Apps](authentication.md).
115115

116116
You can configure your app to support client certificates (mTLS) for authentication and traffic encryption. For more information, see [Configure client certificates](client-certificate-authorization.md).
117117

118118
For details on how to use peer-to-peer environment level network encryption, see the [networking overview](./networking.md#peer-to-peer-encryption).
119119

120120
## Traffic splitting
121121

122-
Containers Apps allows you to split incoming traffic between active revisions. When you define a splitting rule, you assign the percentage of inbound traffic to go to different revisions. For more information, see [Traffic splitting](traffic-splitting.md).
122+
Containers Apps allows you to split incoming traffic between active revisions. When you define a splitting rule, you assign the percentage of inbound traffic to go to different revisions. For more information, see [Traffic splitting](traffic-splitting.md).
123123

124124
## Session affinity
125125

0 commit comments

Comments
 (0)