Skip to content

Commit 97f95d4

Browse files
im-samzggailey777
andauthored
Apply suggestions from code review
Glenn's suggestions, subordinated headers after "Connecting to Azure Services...", rewrote the NSG paragraph Co-authored-by: Glenn Gailey <[email protected]>
1 parent 586bd83 commit 97f95d4

File tree

2 files changed

+10
-8
lines changed

2 files changed

+10
-8
lines changed

articles/azure-functions/functions-networking-options.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -163,13 +163,13 @@ In the Elastic Premium and Dedicated (App Service) plans, the required address s
163163

164164
Since subnet size can't be changed after assignment, use a subnet that's large enough to accommodate whatever scale your app might reach. To avoid any issues with subnet capacity for Functions Elastic Premium plans, you should use a /24 with 256 addresses for Windows and a /26 with 64 addresses for Linux. When creating subnets in Azure portal as part of integrating with the virtual network, a minimum size of /24 and /26 is required for Windows and Linux respectively.
165165

166-
The Flex Consumption plan allows for multiple Flex Consumption apps to integrate with the same subnet. This is not the case for the Elastic Premium and Dedicated (App Service) hosting plan. These plans only support two virtual networks to be connected with each App Service plan. Multiple apps from a single App Service plan can join the same subnet, but apps from a different one cannot use that subnet.
166+
The Flex Consumption plan allows for multiple apps running in the Flex Consumption plan to integrate with the same subnet. This isn't the case for the Elastic Premium and Dedicated (App Service) hosting plans. These plans only allow two virtual networks to be connected with each App Service plan. Multiple apps from a single App Service plan can join the same subnet, but apps from a different plan can't use that same subnet.
167167

168168
The feature is fully supported for both Windows and Linux apps, including [custom containers](../app-service/configure-custom-container.md). All of the behaviors act the same between Windows apps and Linux apps.
169169

170170
### Network security groups
171171

172-
You can use network security groups to block inbound and outbound traffic to resources in a virtual network. An app that uses regional virtual network integration can use a [network security group][VNETnsg] to block outbound traffic to resources in your virtual network or the internet. To block traffic to public addresses, you must have virtual network integration with Route All enabled. The inbound rules in an NSG don't apply to your app because virtual network integration affects only outbound traffic from your app.
172+
You can use [network security groups][VNETnsg] to control traffic between resources in your virtual network. For example, you can create a security rule that blocks your app's outbound traffic from reaching a resource in your virtual network or from leaving the network. These security rules apply to apps that have configured virtual network integration. To block traffic to public addresses, you must have virtual network integration and Route All enabled. The inbound rules in an NSG don't apply to your app because virtual network integration affects only outbound traffic from your app.
173173

174174
To control inbound traffic to your app, use the Access Restrictions feature. An NSG that's applied to your integration subnet is in effect regardless of any routes applied to your integration subnet. If your function app is virtual network integrated with [Route All](../app-service/configure-vnet-integration-routing.md#configure-application-routing) enabled, and you don't have any routes that affect public address traffic on your integration subnet, all of your outbound traffic is still subject to NSGs assigned to your integration subnet. When Route All isn't enabled, NSGs are only applied to RFC1918 traffic.
175175

@@ -208,10 +208,12 @@ As used in Azure Functions, each hybrid connection correlates to a single TCP ho
208208
To learn more, see the [App Service documentation for Hybrid Connections](../app-service/app-service-hybrid-connections.md). These same configuration steps support Azure Functions.
209209

210210
>[!IMPORTANT]
211-
> Hybrid Connections is only supported on Windows plans. Linux isn't supported.
211+
> Hybrid Connections is only supported when your function app runs on Windows. Linux apps aren't supported.
212212
213213
## Connecting to Azure Services through a virtual network
214214

215+
Virtual network integration enables your function app to access resources in a virtual network. This section overviews things you should consider when attempting to connect your app to certain services.
216+
215217
### Restrict your storage account to a virtual network
216218

217219
> [!NOTE]
@@ -221,13 +223,13 @@ When you create a function app, you must create or link to a general-purpose Azu
221223

222224
You can use a network restricted storage account with function apps on the Flex Consumption, Elastic Premium, and Dedicated (App Service) plans; the Consumption plan isn't supported. For the Elastic Premium and Dedicated plan, you'll have to ensure that private [content share routing](../app-service/configure-vnet-integration-routing.md#content-share) is set. To learn how to set up a function app with a storage account secured with a virtual network, see [Restrict your storage account to a virtual network](configure-networking-how-to.md#restrict-your-storage-account-to-a-virtual-network).
223225

224-
## Use Key Vault references
226+
### Use Key Vault references
225227

226228
You can use Azure Key Vault references to use secrets from Azure Key Vault in your Azure Functions application without requiring any code changes. Azure Key Vault is a service that provides centralized secrets management, with full control over access policies and audit history.
227229

228230
If virtual network integration is configured for the app, [Key Vault references](../app-service/app-service-key-vault-references.md) may be used to retrieve secrets from a network-restricted vault.
229231

230-
## Virtual network triggers (non-HTTP)
232+
### Virtual network triggers (non-HTTP)
231233

232234
Your workload may require your app to be triggered from an event source protected by a virtual network. There's two options if you want your app to dynamically scale with the amount of events in these trigger sources:
233235

@@ -236,7 +238,7 @@ Your workload may require your app to be triggered from an event source protecte
236238

237239
Function apps running on the [Dedicated (App Service)](./dedicated-plan.md) plans do not dynamically scale based on events. Rather, scale out is dictated by [auto-scale](./dedicated-plan.md#scaling) rules you define.
238240

239-
### Elastic Premium plan with virtual network triggers
241+
#### Elastic Premium plan with virtual network triggers
240242

241243
The [Elastic Premium plan](functions-premium-plan.md) lets you create functions that are triggered by services secured by a virtual network. These non-HTTP triggers are known as _virtual network triggers_.
242244

@@ -288,7 +290,7 @@ The extensions in this table support dynamic scale monitoring of virtual network
288290
> [!IMPORTANT]
289291
> When you enable virtual network trigger monitoring, only triggers for these extensions can cause your app to scale dynamically. You can still use triggers from extensions that aren't in this table, but they won't cause scaling beyond their pre-warmed instance count. For a complete list of all trigger and binding extensions, see [Triggers and bindings](./functions-triggers-bindings.md#supported-bindings).
290292
291-
### App Service plan and App Service Environment with virtual network triggers
293+
#### App Service plan and App Service Environment with virtual network triggers
292294

293295
When your function app runs in either an App Service plan or an App Service Environment, you can write functions that are triggered by resources secured by a virtual network. For your functions to get triggered correctly, your app must be connected to a virtual network with access to the resource defined in the trigger connection.
294296

articles/azure-functions/run-functions-from-deployment-package.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ For more information, see [this announcement](https://github.com/Azure/app-servi
2828

2929
## Enable functions to run from a package
3030

31-
Function apps on the [Flex Consumption](./flex-consumption-plan) hosting plan run from a package by default. No special configuration needs to be done.
31+
Function apps on the [Flex Consumption](./flex-consumption-plan.md) hosting plan run from a package by default. No special configuration needs to be done.
3232

3333
To enable your function app to run from a package on the [Consumption](./consumption-plan.md), [Elastic Premium](./functions-premium-plan.md), and [Dedicated (App Service)](./dedicated-plan.md) hosting plans, add a `WEBSITE_RUN_FROM_PACKAGE` app setting to your function app. The `WEBSITE_RUN_FROM_PACKAGE` app setting can have one of the following values:
3434

0 commit comments

Comments
 (0)