You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/tutorial-url-redirect-powershell.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,17 +4,17 @@ description: Learn how to create an application gateway with URL path-based redi
4
4
services: application-gateway
5
5
author: vhorne
6
6
ms.service: application-gateway
7
-
ms.date: 11/14/2019
7
+
ms.date: 03/19/2020
8
8
ms.author: victorh
9
-
ms.topic: tutorial
9
+
ms.topic: conceptual
10
10
#Customer intent: As an IT administrator, I want to use Azure PowerShell to set up URL path redirection of web traffic to specific pools of servers so I can ensure my customers have access to the information they need.
11
11
---
12
12
13
13
# Create an application gateway with URL path-based redirection using Azure PowerShell
14
14
15
-
You can use Azure PowerShell to configure [URL-based routing rules](application-gateway-url-route-overview.md) when you create an [application gateway](application-gateway-introduction.md). In this tutorial, you create backend pools using [virtual machine scale sets](../virtual-machine-scale-sets/virtual-machine-scale-sets-overview.md). You then create URL routing rules that make sure web traffic is redirected to the appropriate backend pool.
15
+
You can use Azure PowerShell to configure [URL-based routing rules](application-gateway-url-route-overview.md) when you create an [application gateway](application-gateway-introduction.md). In this article, you create backend pools using [virtual machine scale sets](../virtual-machine-scale-sets/virtual-machine-scale-sets-overview.md). You then create URL routing rules that make sure web traffic is redirected to the appropriate backend pool.
16
16
17
-
In this tutorial, you learn how to:
17
+
In this article, you learn how to:
18
18
19
19
> [!div class="checklist"]
20
20
> * Set up the network
@@ -26,15 +26,15 @@ The following example shows site traffic coming from both ports 8080 and 8081 an
If you choose to install and use the PowerShell locally, this tutorial requires the Azure PowerShell module version 1.0.0 or later. To find the version, run `Get-Module -ListAvailable Az` . If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-az-ps). If you are running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.
37
+
If you choose to install and use the PowerShell locally, this procedure requires the Azure PowerShell module version 1.0.0 or later. To find the version, run `Get-Module -ListAvailable Az` . If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-az-ps). If you are running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.
A listener is required to enable the application gateway to route traffic appropriately to a backend pool. In this tutorial, you create multiple listeners. The first basic listener expects traffic at the root URL. The other listeners expect traffic at specific URLs, such as `http://52.168.55.24:8080/images/` or `http://52.168.55.24:8081/video/`.
128
+
A listener is required to enable the application gateway to route traffic appropriately to a backend pool. In this article, you create multiple listeners. The first basic listener expects traffic at the root URL. The other listeners expect traffic at specific URLs, such as `http://52.168.55.24:8080/images/` or `http://52.168.55.24:8081/video/`.
129
129
130
130
Create a listener named *defaultListener* using [New-AzApplicationGatewayHttpListener](/powershell/module/az.network/new-azapplicationgatewayhttplistener) with the frontend configuration and frontend port that you previously created. A rule is required for the listener to know which backend pool to use for incoming traffic. Create a basic rule named *rule1* using [New-AzApplicationGatewayRequestRoutingRule](/powershell/module/az.network/new-azapplicationgatewayrequestroutingrule).
Copy file name to clipboardExpand all lines: articles/event-hubs/event-hubs-ip-filtering.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,10 +27,10 @@ The IP firewall rules are applied at the Event Hubs namespace level. Therefore,
27
27
This section shows you how to use the Azure portal to create IP firewall rules for an Event Hubs namespace.
28
28
29
29
1. Navigate to your **Event Hubs namespace** in the [Azure portal](https://portal.azure.com).
30
-
2. On the left menu, select **Networking** option. By default, the **All networks** option is selected. Your event hub accepts connections from any IP address. This default setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
30
+
2. On the left menu, select **Networking** option. If you select the **All networks** option, the event hub accepts connections from any IP address. This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
31
31
32
32

33
-
1.Select the **Selected networks** option at the top of the page. In the **Firewall** section, follow these steps:
33
+
1.To restrict access to specific networks and IP addresses, select the **Selected networks** option. In the **Firewall** section, follow these steps:
34
34
1. Select **Add your client IP address** option to give your current client IP the access to the namespace.
35
35
2. For **address range**, enter a specific IPv4 address or a range of IPv4 address in CIDR notation.
36
36
3. Specify whether you want to **allow trusted Microsoft services to bypass this firewall**.
Copy file name to clipboardExpand all lines: articles/event-hubs/event-hubs-service-endpoints.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,11 +46,11 @@ The virtual network rule is an association of the Event Hubs namespace with a vi
46
46
This section shows you how to use Azure portal to add a virtual network service endpoint. To limit access, you need to integrate the virtual network service endpoint for this Event Hubs namespace.
47
47
48
48
1. Navigate to your **Event Hubs namespace** in the [Azure portal](https://portal.azure.com).
49
-
2. On the left menu, select **Networking** option. By default, the **All networks** option is selected. Your event hub accepts connections from any IP address. This default setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
49
+
2. On the left menu, select **Networking** option. If you select the **All networks** option, the event hub accepts connections from any IP address. This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
50
50
51
51

52
-
1.Select the **Selected Networks** option at the top of the page.
53
-
2. In the **Virtual Network** section of the page, select **+Add existing virtual network***.
52
+
1.To restrct access to specific networks, select the **Selected Networks** option at the top of the page.
53
+
2. In the **Virtual Network** section of the page, select **+Add existing virtual network***. Select **+ Create new virtual network** if you want to create a new VNet.
3. Select the virtual network from the list of virtual networks, and then pick the **subnet**. You have to enable the service endpoint before adding the virtual network to the list. If the service endpoint isn't enabled, the portal will prompt you to enable it.
0 commit comments