Skip to content

Commit 955eb7f

Browse files
committed
Update per cachai review
1 parent e9dfa64 commit 955eb7f

File tree

4 files changed

+90
-95
lines changed

4 files changed

+90
-95
lines changed

articles/container-apps/custom-virtual-networks.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -123,6 +123,30 @@ If you're using the CLI, the parameter to define the subnet resource ID is `infr
123123

124124
If you're using the Azure CLI with a Consumption only environment and the [platformReservedCidr](vnet-custom-internal.md#networking-parameters) range is defined, both subnets must not overlap with the IP range defined in `platformReservedCidr`.
125125

126+
## <a name="private-endpoint"></a>Private endpoint (preview)
127+
128+
Azure private endpoint enables clients located in your private network to securely connect to your Azure Container Apps environment through Azure Private Link. A private link connection eliminates exposure to the public internet. Private endpoints use a private IP address in your Azure virtual network address space.
129+
130+
This feature is supported for both Consumption and Dedicated plans in workload profile environments.
131+
132+
#### Tutorials
133+
- To learn more about how to configure private endpoints in Azure Container Apps, see the [Use a private endpoint with an Azure Container Apps environment](how-to-use-private-endpoint.md) tutorial.
134+
- Private link connectivity with Azure Front Door is supported for Azure Container Apps. Refer to [create a private link with Azure Front Door](how-to-integrate-with-azure-front-door.md) for more information.
135+
136+
#### Considerations
137+
- Private endpoints on Azure Container Apps only support inbound HTTP traffic. TCP traffic isn't supported.
138+
- To use a private endpoint with a custom domain and an *Apex domain* as the *Hostname record type*, you must configure a private DNS zone with the same name as your public DNS. In the record set, configure your private endpoint's private IP address instead of the container app environment's IP address. When you configure your custom domain with CNAME, the setup is unchanged. For more information, see [Set up custom domain with existing certificate](custom-domains-certificates.md).
139+
- Your private endpoint's VNet can be separate from the VNet integrated with your container app.
140+
- You can add a private endpoint to both new and existing workload profile environments.
141+
142+
In order to connect to your container apps through a private endpoint, you must configure a private DNS zone.
143+
144+
| Service | subresource | Private DNS zone name |
145+
|--|--|--|
146+
| Azure Container Apps (Microsoft.App/ManagedEnvironments) | managedEnvironment | privatelink.{regionName}.azurecontainerapps.io |
147+
148+
You can also [use private endpoints with a private connection to Azure Front Door](how-to-integrate-with-azure-front-door.md) in place of Application Gateway. This feature is in preview.
149+
126150
## NAT gateway integration
127151

128152
You can use NAT Gateway to simplify outbound connectivity for your outbound internet traffic in your virtual network in a workload profiles environment.

articles/container-apps/firewall-integration.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,12 @@ Network Security Groups (NSGs) needed to configure virtual networks closely rese
1515

1616
You can lock down a network via NSGs with more restrictive rules than the default NSG rules to control all inbound and outbound traffic for the Container Apps environment at the subscription level.
1717

18-
In the workload profiles environment, user-defined routes (UDRs) and [securing outbound traffic with a firewall](./using-azure-firewall.md) are supported. When using an external workload profiles environment, inbound traffic to Azure Container Apps is routed through the public IP that exists in the [managed resource group](./networking-configuration.md#ports-and-ip-addresses) rather than through your subnet. This means that locking down inbound traffic via NSG or Firewall on an external workload profiles environment isn't supported. For more information, see [Control outbound traffic with user defined routes](./user-defined-routes.md).
18+
In the workload profiles environment, user-defined routes (UDRs) and [securing outbound traffic with a firewall](./using-azure-firewall.md) are supported.
19+
20+
> [!NOTE]
21+
> For a guide on how to set up UDR with Container Apps to restrict outbound traffic with Azure Firewall, visit the how to for [Container Apps and Azure Firewall](user-defined-routes).
22+
23+
When using an external workload profiles environment, inbound traffic to Azure Container Apps is routed through the public IP that exists in the [managed resource group](./networking-configuration.md#ports-and-ip-addresses) rather than through your subnet. This means that locking down inbound traffic via NSG or Firewall on an external workload profiles environment isn't supported. For more information, see [Control outbound traffic with user defined routes](./user-defined-routes.md).
1924

2025
In the Consumption only environment, express routes aren't supported, and custom user-defined routes (UDRs) have limited support. For more information on the level of UDR support available in a Consumption-only environment, see the [FAQ](faq.yml#do-consumption-only-environments-support-custom-user-defined-routes-).
2126

@@ -51,7 +56,6 @@ The following tables describe how to configure a collection of NSG allow rules.
5156
<sup>1</sup> This address is passed as a parameter when you create an environment. For example, `10.0.0.0/21`.
5257
<sup>2</sup> The full range is required when creating your Azure Container Apps as a port within the range will by dynamically allocated. Once created, the required ports are two immutable, static values, and you can update your NSG rules.
5358

54-
5559
### Outbound
5660

5761
# [Workload profiles environment](#tab/workload-profiles)

articles/container-apps/networking-configuration.md

Lines changed: 1 addition & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -5,60 +5,14 @@ services: container-apps
55
author: craigshoemaker
66
ms.service: azure-container-apps
77
ms.topic: conceptual
8-
ms.date: 04/03/2025
8+
ms.date: 04/11/2025
99
ms.author: cshoe
1010
---
1111

1212
# Networking configuration in Azure Container Apps environment
1313

1414
Azure Container Apps run in the context of an environment, with its own virtual network (VNet). This VNet creates a secure boundary around your Azure Container Apps [environment](environment.md). This article tells you how to configure your VNet.
1515

16-
## HTTP edge proxy behavior
17-
18-
Azure Container Apps uses an edge HTTP proxy that terminates Transport Layer Security (TLS) and routes requests to each application.
19-
20-
HTTP applications scale based on the number of HTTP requests and connections. Envoy routes internal traffic inside clusters.
21-
22-
Downstream connections support HTTP1.1 and HTTP2 and Envoy automatically detects and upgrades connections if the client connection requires an upgrade.
23-
24-
Upstream connections are defined by setting the `transport` property on the [ingress](azure-resource-manager-api-spec.md#propertiesconfiguration) object.
25-
26-
### Ingress configuration
27-
28-
Under the [ingress](azure-resource-manager-api-spec.md#propertiesconfiguration) section, you can configure the following settings:
29-
30-
- Ingress: You can enable or disable ingress for your container app.
31-
32-
- Ingress traffic: You can accept traffic to your container app from anywhere, or you can limit it to traffic from within the same Container Apps environment.
33-
34-
- Traffic split rules: You can define traffic splitting rules between different revisions of your application. For more information, see [Traffic splitting](traffic-splitting.md).
35-
36-
For more information about different networking scenarios, see [Ingress in Azure Container Apps](ingress-overview.md).
37-
38-
## Portal dependencies
39-
40-
For every app in Azure Container Apps, there are two URLs.
41-
42-
The Container Apps runtime initially generates a fully qualified domain name (FQDN) used to access your app. See the *Application Url* in the *Overview* window of your container app in the Azure portal for the FQDN of your container app.
43-
44-
A second URL is also generated for you. This location grants access to the log streaming service and the console. If necessary, you may need to add `https://azurecontainerapps.dev/` to the allowlist of your firewall or proxy.
45-
46-
## Ports and IP addresses
47-
48-
The following ports are exposed for inbound connections.
49-
50-
| Protocol | Port(s) |
51-
|--|--|
52-
| HTTP/HTTPS | 80, 443 |
53-
54-
IP addresses are broken down into the following types:
55-
56-
| Type | Description |
57-
|--|--|
58-
| Public inbound IP address | Used for application traffic in an external deployment, and management traffic in both internal and external deployments. |
59-
| Outbound public IP | Used as the "from" IP for outbound connections that leave the virtual network. These connections aren't routed down a VPN. Outbound IPs may change over time. Using a NAT gateway or other proxy for outbound traffic from a Container Apps environment is only supported in a [workload profiles environment](workload-profiles-overview.md). |
60-
| Internal load balancer IP address | This address only exists in an [internal environment](networking.md#accessibility-level). |
61-
6216
## Managed resources
6317

6418
When you deploy an internal or an external environment into your own network, a new resource group is created in the Azure subscription where your environment is hosted. This resource group contains infrastructure components managed by the Azure Container Apps platform. Don't modify the services in this group or the resource group itself.

0 commit comments

Comments
 (0)