You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/spring-apps/basic-standard/how-to-configure-palo-alto.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ The rest of this article assumes you have the following two pre-configured netwo
52
52
53
53
Next, create three CSV files.
54
54
55
-
Name the first file *AzureSpringAppsServices.csv*. This file should contain ingress ports for Azure Spring Apps. The values in the following example are for demonstration purposes only. For all of the required values, see the [Azure Global required network rules](./vnet-customer-responsibilities.md#azure-global-required-network-rules) section of [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md).
55
+
Name the first file **AzureSpringAppsServices.csv**. This file should contain ingress ports for Azure Spring Apps. The values in the following example are for demonstration purposes only. For all of the required values, see the [Azure Global required network rules](./vnet-customer-responsibilities.md#azure-global-required-network-rules) section of [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md).
56
56
57
57
```CSV
58
58
name,protocol,port,tag
@@ -63,7 +63,7 @@ ASC_445,tcp,445,AzureSpringApps
63
63
ASC_123,udp,123,AzureSpringApps
64
64
```
65
65
66
-
Name the second file *AzureSpringAppsUrlCategories.csv*. This file should contain the addresses (with wildcards) that should be available for egress from Azure Spring Apps. The values in the following example are for demonstration purposes only. For up-to-date values, see the [Azure Global required FQDN / application rules](./vnet-customer-responsibilities.md#azure-global-required-fqdn--application-rules) section of [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md).
66
+
Name the second file **AzureSpringAppsUrlCategories.csv**. This file should contain the addresses (with wildcards) that should be available for egress from Azure Spring Apps. The values in the following example are for demonstration purposes only. For up-to-date values, see the [Azure Global required FQDN / application rules](./vnet-customer-responsibilities.md#azure-global-required-fqdn--application-rules) section of [Customer responsibilities for running Azure Spring Apps in a virtual network](./vnet-customer-responsibilities.md).
67
67
68
68
```CSV
69
69
name,description
@@ -81,7 +81,7 @@ crl.microsoft.com,
81
81
crl3.digicert.com
82
82
```
83
83
84
-
Name the third file *AzureMonitorAddresses.csv*. This file should contain all addresses and IP ranges to be made available for metrics and monitoring via Azure Monitor, if you're using Azure monitor. The values in the following example are for demonstration purposes only. For up-to-date values, see [IP addresses used by Azure Monitor](/azure/azure-monitor/ip-addresses).
84
+
Name the third file **AzureMonitorAddresses.csv**. This file should contain all addresses and IP ranges to be made available for metrics and monitoring via Azure Monitor, if you're using Azure monitor. The values in the following example are for demonstration purposes only. For up-to-date values, see [IP addresses used by Azure Monitor](/azure/azure-monitor/ip-addresses).
Next, create a JSON file to contain a security rule. Name the file *SecurityRule.json* and add the following content. The names of the two zones `Trust` and `UnTrust` match the zone names described earlier in the [Configure Palo Alto](#configure-palo-alto) section. The `service/member` entry contains the name of the service group created in the previous steps.
261
+
Next, create a JSON file to contain a security rule. Name the file **SecurityRule.json** and add the following content. The names of the two zones `Trust` and `UnTrust` match the zone names described earlier in the [Configure Palo Alto](#configure-palo-alto) section. The `service/member` entry contains the name of the service group created in the previous steps.
Next, use the *AzureMonitorAddresses.csv* file to define Address objects in Palo Alto. The following example code shows you how to automate this task.
341
+
Next, use the **AzureMonitorAddresses.csv** file to define Address objects in Palo Alto. The following example code shows you how to automate this task.
Copy file name to clipboardExpand all lines: articles/spring-apps/basic-standard/how-to-custom-domain.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,7 @@ If your certificate authority gives you multiple certificates in the certificate
72
72
73
73
To do this task, open each certificate you received in a text editor.
74
74
75
-
Create a file for the merged certificate, called *mergedcertificate.crt*. In a text editor, copy the content of each certificate into this file. The order of your certificates should follow the order in the certificate chain, beginning with your certificate and ending with the root certificate. It looks like the following example:
75
+
Create a file for the merged certificate, called **mergedcertificate.crt**. In a text editor, copy the content of each certificate into this file. The order of your certificates should follow the order in the certificate chain, beginning with your certificate and ending with the root certificate. It looks like the following example:
76
76
77
77
```crt
78
78
-----BEGIN CERTIFICATE-----
@@ -96,15 +96,15 @@ Create a file for the merged certificate, called *mergedcertificate.crt*. In a t
96
96
97
97
Export your merged TLS/SSL certificate with the private key that your certificate request was generated with.
98
98
99
-
If you generated your certificate request using OpenSSL, then you have created a private key file. To export your certificate to PFX, run the following command. Replace the placeholders *<private-key-file>* and *<merged-certificate-file>* with the paths to your private key and your merged certificate file.
99
+
If you generated your certificate request using OpenSSL, then you have created a private key file. To export your certificate to PFX, run the following command. Replace the placeholders <private-key-file> and <merged-certificate-file> with the paths to your private key and your merged certificate file.
When prompted, define an export password. Use this password when uploading your TLS/SSL certificate to Azure Key Vault later.
106
106
107
-
If you used IIS or *Certreq.exe* to generate your certificate request, install the certificate to your local machine, and then [export the certificate to PFX](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754329(v=ws.11)).
107
+
If you used IIS or **Certreq.exe** to generate your certificate request, install the certificate to your local machine, and then [export the certificate to PFX](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754329(v=ws.11)).
Copy file name to clipboardExpand all lines: articles/spring-apps/basic-standard/how-to-custom-persistent-storage.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -170,36 +170,36 @@ Use the following best practices when you add your own persistent storage to Azu
170
170
171
171
- In the Azure Storage Account, avoid regenerating the account key that you're using. The storage account contains two different keys. Use a step-by-step approach to ensure that the persistent storage remains available to applications during key regeneration.
172
172
173
-
For example, use the following steps to ensure that the persistent storage remains available if you used *key1* to bind a storage account to Azure Spring Apps.
173
+
For example, use the following steps to ensure that the persistent storage remains available if you used `key1` to bind a storage account to Azure Spring Apps.
174
174
175
-
1. Regenerate *key2*.
176
-
1. Update the account key of the storage resource to use the regenerated *key2*.
175
+
1. Regenerate `key2`.
176
+
1. Update the account key of the storage resource to use the regenerated `key2`.
177
177
1. Restart the applications that mount the persistent storage from this storage resource. Use the `az spring storage list-persistent-storage` command to list all related applications.
178
-
1. Regenerate *key1*.
178
+
1. Regenerate `key1`.
179
179
180
180
- If you delete an Azure Storage account or Azure file share, avoid possible errors by removing the corresponding storage resource or persistent storage in the applications.
181
181
182
-
- If you'd like to write files to the same path for every individual application instance, but keep them in separate subdirectories from the perspective of the file share, you could use the *SubPath* option. Note that the *SubPath* option is incompatible with *Read only* because *SubPath* is used for writing new files and *Read only* is used for reading existing files.
182
+
- If you'd like to write files to the same path for every individual application instance, but keep them in separate subdirectories from the perspective of the file share, you could use the `SubPath` option. Note that the `SubPath` option is incompatible with `Read only` because `SubPath` is used for writing new files and `Read only` is used for reading existing files.
183
183
184
184
## FAQ
185
185
186
186
This section addresses frequently asked questions about using your own persistent storage with Azure Spring Apps.
187
187
188
188
- If I have built-in persistent storage enabled, and then I enabled my own storage as extra persistent storage, is my data migrated into my Azure Storage account?
189
189
190
-
*No. But we're going to provide a document to help you do the migration yourself soon.*
190
+
No. But we're going to provide a document to help you do the migration yourself soon.*
191
191
192
192
- What are the reserved mount paths?
193
193
194
-
*Azure Spring Apps reserves the following mount paths:*
194
+
Azure Spring Apps reserves the following mount paths:
Copy file name to clipboardExpand all lines: articles/spring-apps/basic-standard/how-to-deploy-in-azure-virtual-network.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ The virtual network to which you deploy your Azure Spring Apps instance must mee
53
53
* One for the service runtime.
54
54
* One for your Spring applications.
55
55
* There's a one-to-one relationship between these subnets and an Azure Spring Apps instance. Use a new subnet for each service instance you deploy. Each subnet can only include a single service instance.
56
-
* Address space: CIDR blocks up to */28* for both the service runtime subnet and the Spring applications subnet.
56
+
* Address space: CIDR blocks up to `/28` for both the service runtime subnet and the Spring applications subnet.
57
57
* Route table: By default the subnets don't need existing route tables associated. You can [bring your own route table](#bring-your-own-route-table).
58
58
59
59
Use the following steps to set up the virtual network to contain the Azure Spring Apps instance.
0 commit comments