Skip to content

Commit bb4c8a0

Browse files
committed
add screenshots, fix links
1 parent 299396e commit bb4c8a0

15 files changed

+73
-97
lines changed

articles/container-apps/TOC.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@
101101
- name: Ingress
102102
items:
103103
- name: Configure ingress
104-
href: ingress.md
104+
href: ingress-how-to.md
105105
- name: Configure IP restrictions
106106
href: ip-restrictions.md
107107
- name: Add client certificates
@@ -110,6 +110,7 @@
110110
href: traffic-splitting.md
111111
- name: Session affinity
112112
href: sticky-sessions.md
113+
displayName: Sticky sessions
113114
- name: Custom domains and certificates
114115
items:
115116
- name: Set up container app custom domain

articles/container-apps/client-certificate-authorization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Anthony mentioned that the customer will be able to obtain a client certificate
3030
3131
## Configure client certificate authorization
3232

33-
The client certificate mode property available as you enable [ingress](./ingress.md) on your container app. The property can be set to one of the following values:
33+
The client certificate mode property available as you enable [ingress](./ingress-how-to.md) on your container app. The property can be set to one of the following values:
3434

3535
- `require`: The client certificate is required for all requests to the container app.
3636
- `accept`: The client certificate is optional. If the client certificate isn't provided, the request is still accepted.
@@ -83,4 +83,4 @@ To configure client certificate authorization in the Azure portal, follow these
8383
## Next Steps
8484

8585
> [!div class="nextstepaction"]
86-
> [Configure ingress](ingress.md)
86+
> [Configure ingress](ingress-how-to.md)

articles/container-apps/communicate-between-microservices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ zone_pivot_groups: container-apps-image-build-type
1212

1313
# Tutorial: Communication between microservices in Azure Container Apps
1414

15-
Azure Container Apps exposes each container app through a domain name if [ingress](ingress.md) is enabled. Ingress endpoints for container apps within an external environment can be either publicly accessible or only available to other container apps in the same [environment](environment.md).
15+
Azure Container Apps exposes each container app through a domain name if [ingress](ingress-how-to.md) is enabled. Ingress endpoints for container apps within an external environment can be either publicly accessible or only available to other container apps in the same [environment](environment.md).
1616

1717
Once you know the fully qualified domain name for a given container app, you can make direct calls to the service from other container apps within the shared environment.
1818

articles/container-apps/connect-apps.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,12 +12,17 @@ ms.custom: ignite-fall-2021, event-tier1-build-2022
1212

1313
# Connect applications in Azure Container Apps
1414

15-
Azure Container Apps exposes each container app through a domain name if [ingress](ingress.md) is enabled. Ingress endpoints can be exposed either publicly to the world or internally and only available to other container apps in the same [environment](environment.md).
15+
Azure Container Apps exposes each container app through a domain name if [ingress](ingress-concept.md) is enabled. Ingress endpoints can be exposed either publicly to the world and to other container apps in the same environment, or ingress can be limited to only other container apps in the same [environment](environment.md).
1616

17-
Once you know a container app's domain name, then you can call the location within your application code to connect multiple container apps together.
17+
You can call other container apps in the same environment from your application code using one of the following methods:
18+
19+
- default fully qualified domain name (FQDN)
20+
- a custom domain name
21+
- the container app name
22+
- a Dapr URL
1823

1924
> [!NOTE]
20-
> When you call another container in the same environment using the FQDN, the network traffic never leaves the environment.
25+
> When you call another container in the same environment using the FQDN or app name, the network traffic never leaves the environment.
2126
2227
A sample solution showing how you can call between containers using both the FQDN Location or Dapr can be found on [Azure Samples](https://github.com/Azure-Samples/container-apps-connect-multiple-apps)
2328

@@ -37,7 +42,7 @@ The following diagram shows how these values are used to compose a container app
3742

3843
## Dapr location
3944

40-
Developing microservices often requires you to implement patterns common to distributed architecture. Dapr allows you to secure microservices with mutual TLS, trigger retries when errors occur, and take advantage of distributed tracing when Azure Application Insights is enabled.
45+
Developing microservices often requires you to implement patterns common to distributed architecture. Dapr allows you to secure microservices with mutual TLS (client certificates), trigger retries when errors occur, and take advantage of distributed tracing when Azure Application Insights is enabled.
4146

4247
A microservice that uses Dapr is available through the following URL pattern:
4348

articles/container-apps/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,8 +53,8 @@ landingContent:
5353
url: manage-secrets.md
5454
- text: Manage revisions
5555
url: revisions-manage.md
56-
- text: Set up HTTP ingress
57-
url: ingress.md
56+
- text: Set up ingress
57+
url: ingress-how-to.md
5858
- text: Connect multiple apps
5959
url: connect-apps.md
6060
- text: Use a custom VNET

articles/container-apps/ingress-overview.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,11 @@ ms.author: cshoe
1111

1212
# Ingress in Azure Container Apps
1313

14-
Azure Container Apps allows you to expose your container app to the public web, your virtual network (VNET), and other container apps within your environment by enabling ingress. Ingress settings are enforced through a set of rules that control the routing of external and internal traffic to your container app. When you enable ingress, you don't need to create an Azure Load Balancer, public IP address, or any other Azure resources to enable incoming HTTPS requests or TCP traffic.
14+
Azure Container Apps allows you to expose your container app to the public web, your virtual network (VNET), and other container apps within your environment by enabling ingress. Ingress settings are enforced through a set of rules that control the routing of external and internal traffic to your container app. When you enable ingress, you don't need to create an Azure Load Balancer, public IP address, or any other Azure resources to enable incoming HTTP requests or TCP traffic.
1515

1616
Ingress supports:
1717

18-
- [Public and private ingress](#public-and-private-ingress)
18+
- [External and internal ingress](#external-and-internal-ingress)
1919
- [HTTP and TCP ingress types](#protocol-types)
2020
- [Domain names](#domain-names)
2121
- [IP restrictions](#ip-restrictions)
@@ -26,16 +26,14 @@ Ingress supports:
2626
> [!NOTE]
2727
> Add diagram here, Talked with Anthony about this. He thought that we should consult Ahmed. I think that we should have a diagram that shows the ingress options and how they work together.
2828
29-
For configuration details, see [Configure ingress](ingress.md).
29+
For configuration details, see [Configure ingress](ingress-how-to.md).
3030

31-
## Public and private ingress
31+
## External and internal ingress
3232

3333
When you enable ingress, you can choose between two types of ingress:
3434

35-
- Public: Allows external access from the public internet and from apps within the same environment.
36-
- Private: Allows only internal access from with your container app's environment.
37-
38-
Ingress external to your environment uses a [fully qualified domain name](#domain-names) (FQDN) to route traffic to your container app. In addition to the FQDN, container apps can access another app in the same environment by using its name. The name of the container app is defined in `name` property in the container app's resource.
35+
- External: Accepts traffic from both the public internet and your container app's internal environment.
36+
- Internal: Allows only internal access from within your container app's environment.
3937

4038
Each container app within an environment can be configured with different ingress settings. For example, in a scenario with multiple microservice apps, to increase security you may have a single container app that receives public requests and passes the requests to a background service. In this scenario, you would configure the public-facing container app with external ingress and the internal-facing container app with internal ingress.
4139

@@ -80,11 +78,11 @@ With TCP ingress enabled, your container app:
8078

8179
## Domain names
8280

83-
Each app in a Container Apps environment is automatically assigned a fully qualified domain name (FQDN) based on the environment's DNS suffix. To customize an environment's DNS suffix, see [Custom environment DNS Suffix](environment-custom-dns-suffix.md).
84-
85-
You can configure a custom DNS domain for your Container Apps environment. For more information, see [Custom domain names and certificates](./custom-domains-certificates.md).
81+
You can access your app in the following ways:
8682

87-
VNET-scope ingress requires more DNS configuration. For more information, see [DNS configuration for VNET-scope ingress](./networking.md#dns).
83+
- The default fully qualified domain name (FQDN). Each app in a Container Apps environment is automatically assigned an FQDN based on the environment's DNS suffix. To customize an environment's DNS suffix, see [Custom environment DNS Suffix](environment-custom-dns-suffix.md).
84+
- A custom domain name: You can configure a custom DNS domain for your Container Apps environment. For more information, see [Custom domain names and certificates](./custom-domains-certificates.md).
85+
- The app name: You can use the app name for communication between apps in the same environment.
8886

8987
## IP restrictions
9088

@@ -105,9 +103,9 @@ Containers Apps allows you to split incoming traffic between active revisions.
105103

106104
## Session affinity
107105

108-
Session affinity, also known as sticky sessions, is a feature that allows you to route all HTTP requests from a client to the same replica. This feature is useful for stateful applications that require a consistent connection to the same replica. For more information, see [Session affinity](session-affinity.md).
106+
Session affinity, also known as sticky sessions, is a feature that allows you to route all HTTP requests from a client to the same replica. This feature is useful for stateful applications that require a consistent connection to the same replica. For more information, see [Session affinity](sticky-sessions.md).
109107

110108
## Next steps
111109

112110
> [!div class="nextstepaction"]
113-
> [Configure ingress](ingress.md)
111+
> [Configure ingress](ingress-how-to.md)
49 KB
Loading
50.2 KB
Loading
61 KB
Loading

articles/container-apps/networking.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ As you create a custom VNET, keep in mind the following situations:
2626

2727
- If you want your container app to restrict all outside access, create an [internal Container Apps environment](vnet-custom-internal.md).
2828

29-
- When you provide your own VNET, you need to provide a subnet that is dedicated to the Container App Environment you'll deploy. This subnet can't be used by other services.
29+
- When you provide your own VNET, you need to provide a subnet that is dedicated to the Container App environment you deploy. This subnet can't be used by other services.
3030

3131
- Network addresses are assigned from a subnet range you define as the environment is created.
3232

@@ -50,7 +50,7 @@ https://techcommunity.microsoft.com/t5/apps-on-azure-blog/azure-container-apps-v
5050

5151
## HTTP edge proxy behavior
5252

53-
Azure Container Apps uses [Envoy proxy](https://www.envoyproxy.io/) as an edge HTTP proxy. TLS is terminated on the edge and requests are routed based on their traffic split rules and routes traffic to the correct application.
53+
Azure Container Apps uses [Envoy proxy](https://www.envoyproxy.io/) as an edge HTTP proxy. TLS is terminated on the edge and requests are routed based on their traffic splitting rules and routes traffic to the correct application.
5454

5555
HTTP applications scale based on the number of HTTP requests and connections. Envoy routes internal traffic inside clusters. Downstream connections support HTTP1.1 and HTTP2 and Envoy automatically detects and upgrades the connection should the client connection be upgraded. Upstream connection is defined by setting the `transport` property on the [ingress](azure-resource-manager-api-spec.md#propertiesconfiguration) object.
5656

@@ -60,7 +60,9 @@ Under the [ingress](azure-resource-manager-api-spec.md#propertiesconfiguration)
6060

6161
- **Accessibility level**: You can set your container app as externally or internally accessible in the environment. An environment variable `CONTAINER_APP_ENV_DNS_SUFFIX` is used to automatically resolve the FQDN suffix for your environment.
6262

63-
- **Traffic split rules**: You can define traffic split rules between different revisions of your application.
63+
- **Traffic split rules**: You can define traffic splitting rules between different revisions of your application. For more information, see [Traffic splitting](traffic-splitting.md).
64+
65+
For more information about ingress configuration, see [Ingress in Azure Container Apps](ingress-overview.md).
6466

6567
### Scenarios
6668

@@ -70,7 +72,7 @@ For more information about scenarios, see [Ingress in Azure Container Apps](ingr
7072

7173
For every app in Azure Container Apps, there are two URLs.
7274

73-
The first URL is generated by Container Apps and is used to access your app. See the *Application Url* in the *Overview* window of your container app in the Azure portal for the fully qualified domain name (FQDN) of your container app.
75+
Container Apps generates the first URL, which is used to access your app. See the *Application Url* in the *Overview* window of your container app in the Azure portal for the fully qualified domain name (FQDN) of your container app.
7476

7577
The second URL grants access to the log streaming service and the console. If necessary, you may need to add `https://azurecontainerapps.dev/` to the allowlist of your firewall or proxy.
7678

@@ -119,7 +121,7 @@ There's no forced tunneling in Container Apps routes.
119121

120122
## DNS
121123

122-
- **Custom DNS**: If your VNET uses a custom DNS server instead of the default Azure-provided DNS server, configure your DNS server to forward unresolved DNS queries to `168.63.129.16`. [Azure recursive resolvers](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) uses this IP address to resolve requests. If you don't use the Azure recursive resolvers, the Container Apps environment won't function.
124+
- **Custom DNS**: If your VNET uses a custom DNS server instead of the default Azure-provided DNS server, configure your DNS server to forward unresolved DNS queries to `168.63.129.16`. [Azure recursive resolvers](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) uses this IP address to resolve requests. If you don't use the Azure recursive resolvers, the Container Apps environment can't function.
123125

124126
- **VNET-scope ingress**: If you plan to use VNET-scope [ingress](ingress-overview.md) in an internal Container Apps environment, configure your domains in one of the following ways:
125127

0 commit comments

Comments
 (0)