You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/tutorial-connect-msi-keyvault.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,14 +48,13 @@ Prepare your environment for the Azure CLI.
48
48
az group create --name $groupName --location $region
49
49
```
50
50
51
-
1. Create a Cognitive Services resource and get the subscription key (saved in the `csKey1` variable). Replace *\<cs-resource-name>* with a unique name of your choice.
51
+
1. Create a Cognitive Services resource. Replace *\<cs-resource-name>* with a unique name of your choice.
Copy file name to clipboardExpand all lines: articles/app-service/tutorial-networking-isolate-vnet.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ The tutorial continues to use the following environment variables from the previ
73
73
74
74
Because your Key Vault and Cognitive Services resources will sit behind [private endpoints](../private-link/private-endpoint-overview.md), you need to define [private DNS zones](../dns/private-dns-privatednszone.md) for them. These zones are used to host the DNS records for private endpoints and allow the clients to find the back-end services by name.
75
75
76
-
1. Create two private DNS zones, one of your key vault and one for your Cognitive Services resource.
76
+
1. Create two private DNS zones, one one for your Cognitive Services resource and one for your key vault.
77
77
78
78
```azurecli-interactive
79
79
az network private-dns zone create --resource-group $groupName --name privatelink.cognitiveservices.azure.com
@@ -94,7 +94,7 @@ Because your Key Vault and Cognitive Services resources will sit behind [private
94
94
1. In the private endpoint subnet of your VNet, create a private endpoint for your key vault.
95
95
96
96
```azurecli-interactive
97
-
# Save Cognitive Services resource ID in a variable for convenience
97
+
# Get Cognitive Services resource ID
98
98
csResourceId=$(az cognitiveservices account show --resource-group $groupName --name $csResourceName --query id --output tsv)
@@ -109,11 +109,14 @@ Because your Key Vault and Cognitive Services resources will sit behind [private
109
109
1. Block public traffic to the Cognitive Services resource.
110
110
111
111
```azurecli-interactive
112
-
az rest --uri $csResourceId?api-version=2017-04-18 --method PATCH --body '{"properties":{"publicNetworkAccess":"Disabled"}}' --headers 'Content-Type=application/json'
112
+
az rest --uri $csResourceId?api-version=2021-04-30 --method PATCH --body '{"properties":{"publicNetworkAccess":"Disabled"}}' --headers 'Content-Type=application/json'
113
+
114
+
# Repeat following command until output is "Succeeded"
115
+
az cognitiveservices account show --resource-group $groupName --name $csResourceName --query properties.provisioningState
113
116
```
114
117
115
118
> [!NOTE]
116
-
> Within a few minutes of you blocking public traffic, you can observe the behavior change in the sample app. You can still load the app, but if you try click the **Detect** button, you get an `HTTP 500` error. The app has lost its connectivity to the Cognitive Services resource through the shared networking.
119
+
> Make sure the provisioning state of your change is `"Succeeded"`. Then you can observe the behavior change in the sample app. You can still load the app, but if you try click the **Detect** button, you get an `HTTP 500` error. The app has lost its connectivity to the Cognitive Services resource through the shared networking.
117
120
118
121
1. Repeat the steps above for the key vault.
119
122
@@ -162,9 +165,7 @@ The two private endpoints are only accessible to clients inside the VNet you cre
162
165
163
166
VNet integration allows outbound traffic to flow directly into the VNet. By default, only local IP traffic defined in [RFC-1918](https://tools.ietf.org/html/rfc1918#section-3) is routed to the VNet, which is what you need for the private endpoints. To route all your traffic to the VNet, see [Manage virtual network integration routing](configure-vnet-integration-routing.md). Routing all traffic can also be used if you want to route internet traffic through your VNet e.g. through an [Azure VNet NAT](../virtual-network/nat-gateway/nat-overview.md) or an [Azure Firewall](../firewall/overview.md).
164
167
165
-
1. In the browser, navigate to `<app-name>.azurewebsites.net` again and wait for the integration to take effect. If you get detection results back, then you're connecting to the Cognitive Services endpoint with key vault references. If you get an HTTP 500 error, wait a few minutes and try again.
166
-
167
-
<!-- TODO - This seems to take a long time to take effect. -->
168
+
1. In the browser, navigate to `<app-name>.azurewebsites.net` again and wait for the integration to take effect. If you get an HTTP 500 error, wait a few minutes and try again. If you can load the page and get detection results, then you're connecting to the Cognitive Services endpoint with key vault references.
0 commit comments