Skip to content

Commit be2f299

Browse files
Merge pull request #264406 from KarlErickson/karler-fix
small fixes
2 parents cd864ee + 851c149 commit be2f299

8 files changed

+14
-14
lines changed

articles/spring-apps/how-to-configure-health-probes-graceful-termination.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Azure Spring Apps offers default health probe rules for every application. This
2727

2828
- *Liveness probes* determine when to restart an application. For example, liveness probes can identify a deadlock, such as when an application is running but unable to make progress. Restarting the application in a deadlock state can make the application available despite errors.
2929

30-
- *Readiness probes* determine when an app instance is ready to start accepting traffic. For example, readiness probes can control which app instances are used as backends for the application. When an app instance isn't ready, it's removed from Kubernetes service discovery. For more information, see [Discover and register your Spring Boot applications](how-to-service-registration.md).
30+
- *Readiness probes* determine when an app instance is ready to start accepting traffic. For example, readiness probes can control which app instances are used as backends for the application. When an app instance isn't ready, it's removed from Kubernetes service discovery. For more information, see [Discover and register your Spring Boot applications](how-to-service-registration.md). For more information about service discovery with the Enterprise plan, see [Use Tanzu Service Registry](how-to-enterprise-service-registry.md).
3131

3232
- *Startup probes* determine when an application has started. A startup probe disables liveness and readiness checks until startup succeeds, ensuring that liveness and readiness probes don't interfere with application startup. You can use startup probes to perform liveness checks on slow starting applications, preventing the app from terminating before it's up and running.
3333

articles/spring-apps/how-to-enable-ingress-to-app-tls.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This article describes secure communications in Azure Spring Apps. The article a
2323

2424
The following picture shows the overall secure communication support in Azure Spring Apps.
2525

26-
:::image type="content" source="media/how-to-enable-ingress-to-app-tls/secured-tls.png" alt-text="Screenshot of secured TLS flow in Azure Spring Apps." border="false" lightbox="media/how-to-enable-ingress-to-app-tls/secured-tls.png":::
26+
:::image type="content" source="media/how-to-enable-ingress-to-app-tls/secured-tls.png" alt-text="Diagram that shows the secured TLS flow in Azure Spring Apps." border="false" lightbox="media/how-to-enable-ingress-to-app-tls/secured-tls.png":::
2727

2828
## Secure communication model within Azure Spring Apps
2929

@@ -78,7 +78,7 @@ To enable ingress-to-app TLS in the [Azure portal](https://portal.azure.com/), f
7878
3. Select **Ingress-to-app TLS**.
7979
4. Switch **Ingress-to-app TLS** to *Yes*.
8080

81-
:::image type="content" source="media/how-to-enable-ingress-to-app-tls/enable-i2a-tls.png" alt-text="Screenshot of the Azure portal that shows the Ingress-to-app TLS page and control." lightbox="media/how-to-enable-ingress-to-app-tls/enable-i2a-tls.png":::
81+
:::image type="content" source="media/how-to-enable-ingress-to-app-tls/enable-i2a-tls.png" alt-text="Screenshot of the Azure portal that shows the Ingress-to-app TLS page." lightbox="media/how-to-enable-ingress-to-app-tls/enable-i2a-tls.png":::
8282

8383
### Verify ingress-to-app TLS status
8484

articles/spring-apps/how-to-enable-system-assigned-managed-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ An app can use its managed identity to get tokens to access other resources prot
9393

9494
You may need to [configure the target resource to allow access from your application](/entra/identity/managed-identities-azure-resources/howto-assign-access-portal). For example, if you request a token to access Key Vault, make sure you have added an access policy that includes your application's identity. Otherwise, your calls to Key Vault are rejected, even if they include the token. To learn more about which resources support Microsoft Entra tokens, see [Azure services that can use managed identities to access other services](/entra/identity/managed-identities-azure-resources/managed-identities-status).
9595

96-
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machine. We recommend using Java SDK or spring boot starters to acquire a token. See [How to use VM token](/entra/identity/managed-identities-azure-resources/how-to-use-vm-token) for various code and script examples and guidance on important topics such as handling token expiration and HTTP errors.
96+
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machine. We recommend using Java SDK or spring boot starters to acquire a token. For various code and script examples and guidance on important topics such as handling token expiration and HTTP errors, see [How to use managed identities for Azure resources on an Azure VM to acquire an access token](/entra/identity/managed-identities-azure-resources/how-to-use-vm-token).
9797

9898
## Disable system-assigned identity from an app
9999

articles/spring-apps/how-to-integrate-azure-load-balancers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ To integrate with Azure Spring Apps service, complete the following configuratio
8484
1. **Override with new host name:** select **No**.
8585
1. **Use custom probe**: select **Yes** and pick the custom probe created above.
8686

87-
:::image type="content" source="media/how-to-integrate-azure-load-balancers/app-gateway-3.png" alt-text="Screenshot of the Azure portal that shows the Add Backend setting page." lightbox="media/how-to-integrate-azure-load-balancers/app-gateway-3.png":::
87+
:::image type="content" source="media/how-to-integrate-azure-load-balancers/app-gateway-3.png" alt-text="Screenshot of the Azure portal that shows the Add Backend setting page." lightbox="media/how-to-integrate-azure-load-balancers/app-gateway-3.png":::
8888

8989
## Integrate Azure Spring Apps with Azure Front Door
9090

@@ -93,13 +93,13 @@ To integrate with Azure Spring Apps service and configure an origin group, use t
9393
1. **Add origin group**.
9494
1. Specify the backend endpoints by adding origins for the different Azure Spring Apps instances.
9595

96-
:::image type="content" source="media/how-to-integrate-azure-load-balancers/front-door-1.png" alt-text="Screenshot of the Azure portal that shows the Add an origin group page with the Add an origin button highlighted." lightbox="media/how-to-integrate-azure-load-balancers/front-door-1.png":::
96+
:::image type="content" source="media/how-to-integrate-azure-load-balancers/front-door-1.png" alt-text="Screenshot of the Azure portal that shows the Add an origin group page with the Add an origin button highlighted." lightbox="media/how-to-integrate-azure-load-balancers/front-door-1.png":::
9797

9898
1. Specify **origin type** as *Azure Spring Apps*.
9999
1. Select your Azure Spring Apps instance for the **host name**.
100100
1. Keep the **origin host header** empty, so that the incoming host header will be used towards the backend. For more information, see [Azure Front Door configuration for host name preservation](/azure/architecture/best-practices/host-name-preservation#azure-front-door).
101101

102-
:::image type="content" source="media/how-to-integrate-azure-load-balancers/front-door-2.png" alt-text="Screenshot of the Azure portal that shows the Add an origin page." lightbox="media/how-to-integrate-azure-load-balancers/front-door-2.png":::
102+
:::image type="content" source="media/how-to-integrate-azure-load-balancers/front-door-2.png" alt-text="Screenshot of the Azure portal that shows the Add an origin page." lightbox="media/how-to-integrate-azure-load-balancers/front-door-2.png":::
103103

104104
## Next steps
105105

articles/spring-apps/how-to-set-up-sso-with-azure-ad.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ You can also add redirect URIs after app registration by following these steps:
6565
1. Select **Web**, then select **Add URI** under *Redirect URIs*.
6666
1. Add a new redirect URI, then select **Save**.
6767

68-
:::image type="content" source="media/how-to-set-up-sso-with-azure-ad/sso-redirect-uri.png" alt-text="Screenshot of adding a redirect U R I to the authentication screen." lightbox="media/how-to-set-up-sso-with-azure-ad/sso-redirect-uri.png":::
68+
:::image type="content" source="media/how-to-set-up-sso-with-azure-ad/sso-redirect-uri.png" alt-text="Screenshot of adding a redirect URI to the authentication screen." lightbox="media/how-to-set-up-sso-with-azure-ad/sso-redirect-uri.png":::
6969

7070
For more information on Application Registration, see [Quickstart: Register an application with the Microsoft identity platform](/entra/identity-platform/quickstart-register-app).
7171

@@ -83,7 +83,7 @@ The application uses a client secret to authenticate itself in SSO workflow. You
8383
8484
## Configure scope
8585

86-
The `scope` property of SSO is a list of scopes to be included in JWT identity tokens. They're often referred to permissions. Identity platform supports several OpenID Connect scopes, such as `openid`, `email` and `profile`. For more information, see the [OpenID Connect scopes](/entra/identity-platform/scopes-oidc#openid-connect-scopes) section of [Scopes and permissions in the Microsoft identity platform](/entra/identity-platform/scopes-oidc).
86+
The `scope` property of SSO is a list of scopes to be included in JWT identity tokens. They're often referred to as permissions. Identity platform supports several OpenID Connect scopes, such as `openid`, `email`, and `profile`. For more information, see the [OpenID Connect scopes](/entra/identity-platform/scopes-oidc#openid-connect-scopes) section of [Scopes and permissions in the Microsoft identity platform](/entra/identity-platform/scopes-oidc).
8787

8888
## Configure issuer URI
8989

articles/spring-apps/how-to-setup-autoscale.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ There are two options for Autoscale demand management:
4747

4848
In the Azure portal, choose how you want to scale. The following figure shows the **Custom autoscale** option and mode settings.
4949

50-
:::image type="content" source="media/how-to-setup-autoscale/custom-autoscale.png" alt-text="Screenshot of Azure portal showing the Autoscale setting page with the Custom autoscale option highlighted." lightbox="media/how-to-setup-autoscale/custom-autoscale.png":::
50+
:::image type="content" source="media/how-to-setup-autoscale/custom-autoscale.png" alt-text="Screenshot of the Azure portal that shows the Autoscale setting page with the Custom autoscale option highlighted." lightbox="media/how-to-setup-autoscale/custom-autoscale.png":::
5151

5252
## Set up Autoscale settings for your application in Azure CLI
5353

articles/spring-apps/how-to-use-tls-certificate.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,11 +39,11 @@ You need to grant Azure Spring Apps access to your key vault before you import y
3939
1. In the left navigation pane, select **Access policies**, then select **Create**.
4040
1. Select **Certificate permissions**, then select **Get** and **List**.
4141

42-
:::image type="content" source="media/how-to-use-tls-certificates/grant-key-vault-permission.png" alt-text="Screenshot of Azure portal 'Create an access policy' page with Permission pane showing and Get and List permissions highlighted." lightbox="media/how-to-use-tls-certificates/grant-key-vault-permission.png":::
42+
:::image type="content" source="media/how-to-use-tls-certificates/grant-key-vault-permission.png" alt-text="Screenshot of the Azure portal that shows the Create an access policy page with Permission pane showing and Get and List permissions highlighted." lightbox="media/how-to-use-tls-certificates/grant-key-vault-permission.png":::
4343

4444
1. Under **Principal**, select your **Azure Spring Cloud Resource Provider**.
4545

46-
:::image type="content" source="media/how-to-use-tls-certificates/select-service-principal.png" alt-text="Screenshot of Azure portal 'Create an access policy' page with Principal pane showing and Azure Spring Apps Resource Provider highlighted." lightbox="media/how-to-use-tls-certificates/select-service-principal.png":::
46+
:::image type="content" source="media/how-to-use-tls-certificates/select-service-principal.png" alt-text="Screenshot of the Azure portal that shows the Create an access policy page with Principal pane showing and Azure Spring Apps Resource Provider highlighted." lightbox="media/how-to-use-tls-certificates/select-service-principal.png":::
4747

4848
1. Select **Review + Create**, then select **Create**.
4949

@@ -82,7 +82,7 @@ To load a certificate into your application in Azure Spring Apps, start with the
8282
1. From the left navigation pane of your app, select **Certificate management**.
8383
1. Select **Add certificate** to choose certificates accessible for the app.
8484

85-
:::image type="content" source="media/how-to-use-tls-certificates/load-certificate.png" alt-text="Screenshot of Azure portal 'Certificate management' page with 'Add certificate' button highlighted." lightbox="media/how-to-use-tls-certificates/load-certificate.png":::
85+
:::image type="content" source="media/how-to-use-tls-certificates/load-certificate.png" alt-text="Screenshot of the Azure portal that shows the Certificate management page with the Add certificate button highlighted." lightbox="media/how-to-use-tls-certificates/load-certificate.png":::
8686

8787
### Load a certificate from code
8888

articles/spring-apps/quickstart-deploy-restful-api-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,7 @@ Use the following steps to access the RESTful APIs of the `ToDo` app in the Swag
240240
## 7. Next steps
241241

242242
> [!div class="nextstepaction"]
243-
> [Quickstart: Deploy an event-driven application to Azure Spring Apps](./quickstart-deploy-event-driven-app-standard-consumption.md)
243+
> [Quickstart: Deploy an event-driven application to Azure Spring Apps](./quickstart-deploy-event-driven-app.md)
244244
245245
> [!div class="nextstepaction"]
246246
> [Quickstart: Deploy microservice applications to Azure Spring Apps](./quickstart-deploy-microservice-apps.md)

0 commit comments

Comments
 (0)