Skip to content

Commit 9b2f2b9

Browse files
More VS Code edits.
1 parent 7fd9cb0 commit 9b2f2b9

File tree

4 files changed

+25
-25
lines changed

4 files changed

+25
-25
lines changed

articles/spring-apps/basic-standard/how-to-configure-palo-alto.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The rest of this article assumes you have the following two pre-configured netwo
5252

5353
Next, create three CSV files.
5454

55-
Name the first file *AzureSpringAppsServices.csv*. This file should contain ingress ports for Azure Spring Apps. The values in the following example are for demonstration purposes only. For all of the required values, see the [Azure Global required network rules](./vnet-customer-responsibilities.md#azure-global-required-network-rules) section of [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md).
55+
Name the first file **AzureSpringAppsServices.csv**. This file should contain ingress ports for Azure Spring Apps. The values in the following example are for demonstration purposes only. For all of the required values, see the [Azure Global required network rules](./vnet-customer-responsibilities.md#azure-global-required-network-rules) section of [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md).
5656

5757
```CSV
5858
name,protocol,port,tag
@@ -63,7 +63,7 @@ ASC_445,tcp,445,AzureSpringApps
6363
ASC_123,udp,123,AzureSpringApps
6464
```
6565

66-
Name the second file *AzureSpringAppsUrlCategories.csv*. This file should contain the addresses (with wildcards) that should be available for egress from Azure Spring Apps. The values in the following example are for demonstration purposes only. For up-to-date values, see the [Azure Global required FQDN / application rules](./vnet-customer-responsibilities.md#azure-global-required-fqdn--application-rules) section of [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md).
66+
Name the second file **AzureSpringAppsUrlCategories.csv**. This file should contain the addresses (with wildcards) that should be available for egress from Azure Spring Apps. The values in the following example are for demonstration purposes only. For up-to-date values, see the [Azure Global required FQDN / application rules](./vnet-customer-responsibilities.md#azure-global-required-fqdn--application-rules) section of [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md).
6767

6868
```CSV
6969
name,description
@@ -81,7 +81,7 @@ crl.microsoft.com,
8181
crl3.digicert.com
8282
```
8383

84-
Name the third file *AzureMonitorAddresses.csv*. This file should contain all addresses and IP ranges to be made available for metrics and monitoring via Azure Monitor, if you're using Azure monitor. The values in the following example are for demonstration purposes only. For up-to-date values, see [IP addresses used by Azure Monitor](/azure/azure-monitor/ip-addresses).
84+
Name the third file **AzureMonitorAddresses.csv**. This file should contain all addresses and IP ranges to be made available for metrics and monitoring via Azure Monitor, if you're using Azure monitor. The values in the following example are for demonstration purposes only. For up-to-date values, see [IP addresses used by Azure Monitor](/azure/azure-monitor/ip-addresses).
8585

8686
```CSV
8787
name,type,address,tag
@@ -127,7 +127,7 @@ $url = "https://${PaloAltoIpAddress}/restapi/v9.1/Objects/ServiceGroups?location
127127
Invoke-RestMethod -Method Delete -Uri $url -Headers $paloAltoHeaders -SkipCertificateCheck
128128
```
129129

130-
Delete each Palo Alto service (as defined in *AzureSpringAppsServices.csv*) as shown in the following example:
130+
Delete each Palo Alto service (as defined in **AzureSpringAppsServices.csv**) as shown in the following example:
131131

132132
```powershell
133133
Get-Content .\AzureSpringAppsServices.csv | ConvertFrom-Csv | select name | ForEach-Object {
@@ -138,7 +138,7 @@ Get-Content .\AzureSpringAppsServices.csv | ConvertFrom-Csv | select name | ForE
138138

139139
## Create a service and service group
140140

141-
To automate the creation of services based on the *AzureSpringAppsServices.csv* file you created earlier, use the following example.
141+
To automate the creation of services based on the **AzureSpringAppsServices.csv** file you created earlier, use the following example.
142142

143143
```powershell
144144
# Define a function to create and submit a Palo Alto service creation request
@@ -258,7 +258,7 @@ Invoke-RestMethod -Method Post -Uri $url -SkipCertificateCheck -Headers $paloAl
258258

259259
## Create a security rule
260260

261-
Next, create a JSON file to contain a security rule. Name the file *SecurityRule.json* and add the following content. The names of the two zones `Trust` and `UnTrust` match the zone names described earlier in the [Configure Palo Alto](#configure-palo-alto) section. The `service/member` entry contains the name of the service group created in the previous steps.
261+
Next, create a JSON file to contain a security rule. Name the file **SecurityRule.json** and add the following content. The names of the two zones `Trust` and `UnTrust` match the zone names described earlier in the [Configure Palo Alto](#configure-palo-alto) section. The `service/member` entry contains the name of the service group created in the previous steps.
262262

263263
```json
264264
{
@@ -338,7 +338,7 @@ Invoke-WebRequest -Uri $url -Method Post -Headers $paloAltoHeaders -Body (Get-Co
338338

339339
## Create Azure Monitor addresses
340340

341-
Next, use the *AzureMonitorAddresses.csv* file to define Address objects in Palo Alto. The following example code shows you how to automate this task.
341+
Next, use the **AzureMonitorAddresses.csv** file to define Address objects in Palo Alto. The following example code shows you how to automate this task.
342342

343343
```powershell
344344
Get-Content ./AzureMonitorAddresses.csv | ConvertFrom-Csv | ForEach-Object {

articles/spring-apps/basic-standard/how-to-custom-domain.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ If your certificate authority gives you multiple certificates in the certificate
7272

7373
To do this task, open each certificate you received in a text editor.
7474

75-
Create a file for the merged certificate, called *mergedcertificate.crt*. In a text editor, copy the content of each certificate into this file. The order of your certificates should follow the order in the certificate chain, beginning with your certificate and ending with the root certificate. It looks like the following example:
75+
Create a file for the merged certificate, called **mergedcertificate.crt**. In a text editor, copy the content of each certificate into this file. The order of your certificates should follow the order in the certificate chain, beginning with your certificate and ending with the root certificate. It looks like the following example:
7676

7777
```crt
7878
-----BEGIN CERTIFICATE-----
@@ -96,15 +96,15 @@ Create a file for the merged certificate, called *mergedcertificate.crt*. In a t
9696

9797
Export your merged TLS/SSL certificate with the private key that your certificate request was generated with.
9898

99-
If you generated your certificate request using OpenSSL, then you have created a private key file. To export your certificate to PFX, run the following command. Replace the placeholders *<private-key-file>* and *<merged-certificate-file>* with the paths to your private key and your merged certificate file.
99+
If you generated your certificate request using OpenSSL, then you have created a private key file. To export your certificate to PFX, run the following command. Replace the placeholders <private-key-file> and <merged-certificate-file> with the paths to your private key and your merged certificate file.
100100

101101
```bash
102102
openssl pkcs12 -export -out myserver.pfx -inkey <private-key-file> -in <merged-certificate-file>
103103
```
104104

105105
When prompted, define an export password. Use this password when uploading your TLS/SSL certificate to Azure Key Vault later.
106106

107-
If you used IIS or *Certreq.exe* to generate your certificate request, install the certificate to your local machine, and then [export the certificate to PFX](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754329(v=ws.11)).
107+
If you used IIS or **Certreq.exe** to generate your certificate request, install the certificate to your local machine, and then [export the certificate to PFX](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754329(v=ws.11)).
108108

109109
### Save certificate in Key Vault
110110

articles/spring-apps/basic-standard/how-to-custom-persistent-storage.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -170,36 +170,36 @@ Use the following best practices when you add your own persistent storage to Azu
170170

171171
- In the Azure Storage Account, avoid regenerating the account key that you're using. The storage account contains two different keys. Use a step-by-step approach to ensure that the persistent storage remains available to applications during key regeneration.
172172

173-
For example, use the following steps to ensure that the persistent storage remains available if you used *key1* to bind a storage account to Azure Spring Apps.
173+
For example, use the following steps to ensure that the persistent storage remains available if you used `key1` to bind a storage account to Azure Spring Apps.
174174

175-
1. Regenerate *key2*.
176-
1. Update the account key of the storage resource to use the regenerated *key2*.
175+
1. Regenerate `key2`.
176+
1. Update the account key of the storage resource to use the regenerated `key2`.
177177
1. Restart the applications that mount the persistent storage from this storage resource. Use the `az spring storage list-persistent-storage` command to list all related applications.
178-
1. Regenerate *key1*.
178+
1. Regenerate `key1`.
179179

180180
- If you delete an Azure Storage account or Azure file share, avoid possible errors by removing the corresponding storage resource or persistent storage in the applications.
181181

182-
- If you'd like to write files to the same path for every individual application instance, but keep them in separate subdirectories from the perspective of the file share, you could use the *SubPath* option. Note that the *SubPath* option is incompatible with *Read only* because *SubPath* is used for writing new files and *Read only* is used for reading existing files.
182+
- If you'd like to write files to the same path for every individual application instance, but keep them in separate subdirectories from the perspective of the file share, you could use the `SubPath` option. Note that the `SubPath` option is incompatible with `Read only` because `SubPath` is used for writing new files and `Read only` is used for reading existing files.
183183

184184
## FAQ
185185

186186
This section addresses frequently asked questions about using your own persistent storage with Azure Spring Apps.
187187

188188
- If I have built-in persistent storage enabled, and then I enabled my own storage as extra persistent storage, is my data migrated into my Azure Storage account?
189189

190-
*No. But we're going to provide a document to help you do the migration yourself soon.*
190+
No. But we're going to provide a document to help you do the migration yourself soon.*
191191

192192
- What are the reserved mount paths?
193193

194-
*Azure Spring Apps reserves the following mount paths:*
194+
Azure Spring Apps reserves the following mount paths:
195195

196-
- */tmp*
197-
- */persistent*
198-
- */secrets*
199-
- */app-insights/agents*
200-
- */etc/azure-spring-cloud/certs*
201-
- */app-insights/agents/settings*
202-
- */app-lifecycle/settings*
196+
- **/tmp**
197+
- **/persistent**
198+
- **/secrets**
199+
- **/app-insights/agents**
200+
- **/etc/azure-spring-cloud/certs**
201+
- **/app-insights/agents/settings**
202+
- **/app-lifecycle/settings**
203203

204204
- What are the available mount options?
205205

articles/spring-apps/basic-standard/how-to-deploy-in-azure-virtual-network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The virtual network to which you deploy your Azure Spring Apps instance must mee
5353
* One for the service runtime.
5454
* One for your Spring applications.
5555
* There's a one-to-one relationship between these subnets and an Azure Spring Apps instance. Use a new subnet for each service instance you deploy. Each subnet can only include a single service instance.
56-
* Address space: CIDR blocks up to */28* for both the service runtime subnet and the Spring applications subnet.
56+
* Address space: CIDR blocks up to `/28` for both the service runtime subnet and the Spring applications subnet.
5757
* Route table: By default the subnets don't need existing route tables associated. You can [bring your own route table](#bring-your-own-route-table).
5858

5959
Use the following steps to set up the virtual network to contain the Azure Spring Apps instance.

0 commit comments

Comments
 (0)