You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> `--sku F0` creates a free tier Cognitive Services resource. Each subscription is limited to a quota of one free-tier `TextAnalytics` resource. If you're already over the quota, use `--sku S` instead.
63
+
61
64
1. Clone the sample repository locally and deploy the sample application to App Service. Replace *\<app-name>* with a unique name.
62
65
63
66
### [.NET 5](#tab/dotnet)
@@ -70,7 +73,7 @@ Prepare your environment for the Azure CLI.
1. Add the Cognitive Services resource name and subscription key as secrets to the vault, and save their IDs as environment variables.
138
+
1. Add the Cognitive Services resource name and subscription key as secrets to the vault, and save their IDs as environment variables for the next step.
136
139
137
140
```azurecli-interactive
138
141
csResourceKVUri=$(az keyvault secret set --vault-name $vaultName --name csresource --value $csResourceName --query id --output tsv)
@@ -149,6 +152,16 @@ At the moment, connection secrets are stored as app settings in your App Service
149
152
150
153
Congratulations, your app is now connecting to Cognitive Services using secrets kept in your key vault, and you've done this without any changes to your application code.
151
154
155
+
## Clean up resources
156
+
157
+
In the preceding steps, you created Azure resources in a resource group. If you don't expect to need these resources in the future, delete the resource group by running the following command in the Cloud Shell:
158
+
159
+
```azurecli-interactive
160
+
az group delete --name $groupName
161
+
```
162
+
163
+
This command may take a minute to run.
164
+
152
165
## Next steps
153
166
154
167
-[Tutorial: Isolate back-end communication with Virtual Network integration](tutorial-networking-isolate-vnet.md)
Copy file name to clipboardExpand all lines: articles/app-service/tutorial-networking-isolate-vnet.md
+18-2Lines changed: 18 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -130,7 +130,11 @@ Because your Key Vault and Cognitive Services resources will sit behind [private
130
130
> [!TIP]
131
131
> `$csResourceName` is set in the [prerequisite](#prerequisites) tutorial (in [Create app with connectivity to Cognitive Services](tutorial-connect-msi-keyvault.md#create-app-with-connectivity-to-Cognitive-Services)).
132
132
133
-
Now, all traffic to the key vault and the Cognitive Services resource is blocked. If you try out the language detection page now, you'll get an HTTP 500 error. These two endpoints are only accessible to clients inside the VNet you created. You can't even access Key Vault secrets through the Azure portal, because the portal accesses them through the public internet (see [Manage the locked down resources](#manage-the-locked-down-resources)).
133
+
It may take some time for the setting to take effect, but all traffic to the key vault and the Cognitive Services resource are now blocked. If you try out the language detection page now, you'll get an HTTP 500 error.
134
+
135
+
<!-- TODO - This seems to take a long time to take effect. -->
136
+
137
+
These two endpoints are only accessible to clients inside the VNet you created. You can't even access the secrets in the key vault through **Secrets** page in the Azure portal, because the portal accesses them through the public internet (see [Manage the locked down resources](#manage-the-locked-down-resources)).
134
138
135
139
## Configure VNet integration in your app
136
140
@@ -154,7 +158,9 @@ Now, all traffic to the key vault and the Cognitive Services resource is blocked
154
158
155
159
VNet integration allows outbound traffic to flow directly into the VNet. By default, only local IP traffic defined in [RFC-1918](https://tools.ietf.org/html/rfc1918#section-3) is routed to the VNet, which is what you need for the private endpoints. To route all your traffic to the VNet, set the [`WEBSITE_VNET_ROUTE_ALL` app setting](reference-app-settings.md#networking). Routing all traffic can also be used if you want to route internet traffic through your VNet e.g. through an [Azure VNet NAT](../virtual-network/nat-gateway/nat-overview.md) or an [Azure Firewall](../firewall/overview.md).
156
160
157
-
1. In the browser, navigate to `<app-name>.azurewebsites.net` again and wait for the app to restart. If you get detection results back, then you're connecting to the Cognitive Services endpoint with key vault references.
161
+
1. In the browser, navigate to `<app-name>.azurewebsites.net` again and wait for the integration to take effect. If you get detection results back, then you're connecting to the Cognitive Services endpoint with key vault references. If you get an HTTP 500 error, wait a few minutes and try again.
162
+
163
+
<!-- TODO - This seems to take a long time to take effect. -->
158
164
159
165
## Manage the locked down resources
160
166
@@ -165,6 +171,16 @@ Depending on your scenarios, you may not be able to manage the private endpoint
165
171
- Manage the private endpoint protected resources from a [jump server](https://wikipedia.org/wiki/Jump_server) in the VNet.
166
172
- [Deploy Cloud Shell into the VNet](../cloud-shell/private-vnet.md).
167
173
174
+
## Clean up resources
175
+
176
+
In the preceding steps, you created Azure resources in a resource group. If you don't expect to need these resources in the future, delete the resource group by running the following command in the Cloud Shell:
177
+
178
+
```azurecli-interactive
179
+
az group delete --name $groupName
180
+
```
181
+
182
+
This command may take a minute to run.
183
+
168
184
## Next steps
169
185
170
186
-[Integrate your app with an Azure virtual network](overview-vnet-integration.md)
0 commit comments