Skip to content

Commit c1f4f05

Browse files
authored
Merge pull request #73496 from Incarnation-p-lee/patch-2
Add optional network requirements for third party apm
2 parents 703de87 + eb3de25 commit c1f4f05

File tree

1 file changed

+16
-7
lines changed

1 file changed

+16
-7
lines changed

articles/spring-cloud/vnet-customer-responsibilities.md

Lines changed: 16 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ The following is a list of resource requirements for Azure Spring Cloud services
2828
## Azure Spring Cloud network requirements
2929

3030
| Destination Endpoint | Port | Use | Note |
31-
|------|------|------|
31+
|------|------|------|------|
3232
| *:1194 *Or* [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - AzureCloud:1194 | UDP:1194 | Underlying Kubernetes Cluster management. | |
3333
| *:443 *Or* [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - AzureCloud:443 | TCP:443 | Azure Spring Cloud Service Management. | Information of service instance "requiredTraffics" could be known in resource payload, under "networkProfile" section. |
3434
| *:9000 *Or* [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - AzureCloud:9000 | TCP:9000 | Underlying Kubernetes Cluster management. |
@@ -38,25 +38,34 @@ The following is a list of resource requirements for Azure Spring Cloud services
3838
| *.servicebus.windows.net:443 *Or* [ServiceTag](../virtual-network/service-tags-overview.md#available-service-tags) - EventHub:443 | TCP:443 | Azure Event Hub. | Can be replaced by enabling *Azure Event Hubs* [service endpoint in virtual network](../virtual-network/virtual-network-service-endpoints-overview.md). |
3939

4040

41-
## Azure Spring Cloud FQDN requirements / application rules
41+
## Azure Spring Cloud FQDN requirements/application rules
4242

43-
Azure Firewall provides a fully qualified domain name (FQDN) tag **AzureKubernetesService** to simplify the following configurations.
43+
Azure Firewall provides the FQDN tag **AzureKubernetesService** to simplify the following configurations:
4444

4545
| Destination FQDN | Port | Use |
4646
|------|------|------|
4747
| *.azmk8s.io | HTTPS:443 | Underlying Kubernetes Cluster management. |
4848
| <i>mcr.microsoft.com</i> | HTTPS:443 | Microsoft Container Registry (MCR). |
4949
| *.cdn.mscr.io | HTTPS:443 | MCR storage backed by the Azure CDN. |
5050
| *.data.mcr.microsoft.com | HTTPS:443 | MCR storage backed by the Azure CDN. |
51-
| <i>management.azure.com</i> | HTTPS:443 | Underlying Kubernetes Cluster management. |
52-
| <i>*login.microsoftonline.com</i> | HTTPS:443 | Azure Active Directory authentication. |
53-
| <i>*login.microsoft.com</i> | HTTPS:443 | Azure Active Directory authentication. |
51+
| <i>management.azure.com</i> | HTTPS:443 | Underlying Kubernetes Cluster management. |
52+
| <i>*login.microsoftonline.com</i> | HTTPS:443 | Azure Active Directory authentication. |
53+
| <i>*login.microsoft.com</i> | HTTPS:443 | Azure Active Directory authentication. |
5454
|<i>packages.microsoft.com</i> | HTTPS:443 | Microsoft packages repository. |
5555
| <i>acs-mirror.azureedge.net</i> | HTTPS:443 | Repository required to install required binaries like kubenet and Azure CNI.​ |
5656
| *mscrl.microsoft.com* | HTTPS:80 | Required Microsoft Certificate Chain Paths. |
5757
| *crl.microsoft.com* | HTTPS:80 | Required Microsoft Certificate Chain Paths. |
5858
| *crl3.digicert.com* | HTTPS:80 | 3rd Party SSL Certificate Chain Paths. |
59+
60+
## Azure Spring Cloud optional FQDN for third-party application performance management
61+
62+
Azure Firewall provides the FQDN tag **AzureKubernetesService** to simplify the following configurations:
63+
64+
| Destination FQDN | Port | Use |
65+
| ---------------- | ---- | ------------------------------------------------------------ |
66+
| collector*.newrelic.com | TCP:443/80 | Required networks of New Relic APM agents from US region, also see [APM Agents Networks](https://docs.newrelic.com/docs/using-new-relic/cross-product-functions/install-configure/networks/#agents). |
67+
| collector*.eu01.nr-data.net | TCP:443/80 | Required networks of New Relic APM agents from EU region, also see [APM Agents Networks](https://docs.newrelic.com/docs/using-new-relic/cross-product-functions/install-configure/networks/#agents). |
5968

6069
## See also
6170
* [Access your application in a private network](access-app-virtual-network.md)
62-
* [Expose apps using Application Gateway and Azure Firewall](expose-apps-gateway-azure-firewall.md)
71+
* [Expose apps using Application Gateway and Azure Firewall](expose-apps-gateway-azure-firewall.md)

0 commit comments

Comments
 (0)