Skip to content

Commit c6dc160

Browse files
committed
PR review fixes
1 parent da9f60e commit c6dc160

File tree

6 files changed

+70
-70
lines changed

6 files changed

+70
-70
lines changed

articles/connectors/built-in.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -106,8 +106,8 @@ You can use the following built-in connectors to perform general tasks, for exam
106106
:::column:::
107107
[![Request trigger icon][http-request-icon]][http-request-doc]
108108
<br><br>[**Request**][http-request-doc]
109-
<br><br>[**When a HTTP request is received**][http-request-doc]: Wait for a request from another workflow, app, or service. This trigger makes your workflow callable without having to be checked or polled on a schedule.
110-
<br><br>[**Response**][http-request-doc]: Respond to a request received by the **When a HTTP request is received** trigger in the same workflow.
109+
<br><br>[**When an HTTP request is received**][http-request-doc]: Wait for a request from another workflow, app, or service. This trigger makes your workflow callable without having to be checked or polled on a schedule.
110+
<br><br>[**Response**][http-request-doc]: Respond to a request received by the **When an HTTP request is received** trigger in the same workflow.
111111
:::column-end:::
112112
:::column:::
113113
[![Batch icon][batch-icon]][batch-doc]
@@ -209,7 +209,7 @@ You can use the following built-in connectors to access specific services and sy
209209
:::column:::
210210
[![Azure Logic Apps icon][azure-logic-apps-icon]][nested-logic-app-doc]
211211
<br><br>[**Azure Logic Apps**][nested-logic-app-doc]<br>(*Consumption workflow*) <br><br>-or-<br><br>**Workflow Operations**<br>(*Standard workflow*)
212-
<br><br>Call other workflows that start with the Request trigger named **When a HTTP request is received**.
212+
<br><br>Call other workflows that start with the Request trigger named **When an HTTP request is received**.
213213
:::column-end:::
214214
:::column:::
215215
[![Azure OpenAI icon][azure-openai-icon]][azure-openai-doc]
@@ -478,7 +478,7 @@ For more information, review the following documentation:
478478
<br><br>[**XML Operations**][xml-operations-doc]
479479
<br><br>Perform operations with XML.
480480
<br><br>**Compose XML with schema**: Create XML from JSON using a schema for a Standard workflow.
481-
<br><br>**Parse XML with schema**: Parse XML using a schema for a Standard workflow..
481+
<br><br>**Parse XML with schema**: Parse XML using a schema for a Standard workflow.
482482
<br><br>**Transform XML**: Convert XML using a map.
483483
<br><br>**Validate XML**: Validate inbound or outbound XML using a schema.
484484
:::column-end:::

articles/container-apps/networking.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ Different environment types have different subnet requirements:
153153
| /26 | 52 | 26 | 260 |
154154
| /27 | 20 | 10 | 100 |
155155

156-
<sup>1</sup> The available IP addresses is the size of the subnet minus the 12 IP addresses required for Azure Container Apps infrastructure.
156+
<sup>1</sup> The available IP addresses are the size of the subnet minus the 12 IP addresses required for Azure Container Apps infrastructure.
157157
<sup>2</sup> This is accounting for apps in single revision mode.
158158

159159
# [Consumption only environment](#tab/consumption-only-env)
@@ -219,7 +219,7 @@ If you're using the Azure CLI with a Consumption only environment and the [platf
219219
User Defined Routes (UDR) and controlled egress through NAT Gateway are supported in the workload profiles environment. In the Consumption only environment, these features aren't supported.
220220

221221
> [!NOTE]
222-
> When using UDR with Azure Firewall in Azure Container Apps, you need to add certain FQDN's and service tags to the allowlist for the firewall. To learn more, see [configuring UDR with Azure Firewall](./networking.md#configuring-udr-with-azure-firewall).
222+
> When using UDR with Azure Firewall in Azure Container Apps, you need to add certain FQDNs and service tags to the allowlist for the firewall. To learn more, see [configuring UDR with Azure Firewall](./networking.md#configuring-udr-with-azure-firewall).
223223
224224
- You can use UDR with workload profiles environments to restrict outbound traffic from your container app through Azure Firewall or other network appliances.
225225

@@ -231,10 +231,10 @@ Azure creates a default route table for your virtual networks upon create. By im
231231

232232
#### Configuring UDR with Azure Firewall
233233

234-
User defined routes is only supported in a workload profiles environment. The following application and network rules must be added to the allowlist for your firewall depending on which resources you're using.
234+
User defined routes are only supported in a workload profiles environment. The following application and network rules must be added to the allowlist for your firewall depending on which resources you're using.
235235

236236
> [!NOTE]
237-
> For a guide on how to setup UDR with Container Apps to restrict outbound traffic with Azure Firewall, visit the [how to for Container Apps and Azure Firewall](./user-defined-routes.md).
237+
> For a guide on how to set up UDR with Container Apps to restrict outbound traffic with Azure Firewall, visit the [how to for Container Apps and Azure Firewall](./user-defined-routes.md).
238238
239239
##### Application rules
240240

@@ -298,15 +298,15 @@ This feature is supported for both Consumption and Dedicated plans in workload p
298298

299299
#### Considerations
300300
- Private endpoints on Azure Container Apps only support inbound HTTP traffic. TCP traffic is not supported.
301-
- To use a private endpoint with a custom domain and an *Apex domain* as the *Hostname record type*, you must configure a private DNS zone with the same name as your public DNS. In the record set, configure your private endpoint's private IP address instead of the container app environment's IP address. When configuring your custom domain with CNAME, the setup is unchanged. For more information, see [Set up custom domain with existing certificate](custom-domains-certificates.md).
301+
- To use a private endpoint with a custom domain and an *Apex domain* as the *Hostname record type*, you must configure a private DNS zone with the same name as your public DNS. In the record set, configure your private endpoint's private IP address instead of the container app environment's IP address. When you configure your custom domain with CNAME, the setup is unchanged. For more information, see [Set up custom domain with existing certificate](custom-domains-certificates.md).
302302
- Your private endpoint's VNet can be separate from the VNet integrated with your container app.
303303
- You can add a private endpoint to both new and existing workload profile environments.
304304

305305
In order to connect to your container apps through a private endpoint, you must configure a private DNS zone.
306306

307307
| Service | subresource | Private DNS zone name |
308308
|--|--|--|
309-
| Azure Container Apps (Microsoft.App/ManagedEnvironments) | managedEnvironment | privatelink.{regionName}.azurecontainerapps.io |
309+
| Azure Container Apps (Microsoft.App/ManagedEnvironments) | managedEnvironment | private link.{regionName}.azurecontainerapps.io |
310310

311311
### Environment security
312312

articles/data-factory/azure-ssis-integration-runtime-express-virtual-network-injection.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure a virtual network for express injection of Azure-SSIS integrati
33
description: Learn how to configure a virtual network for express injection of Azure-SSIS integration runtime.
44
ms.subservice: integration-services
55
ms.topic: conceptual
6-
ms.date: 10/20/2023
6+
ms.date: 01/08/2025
77
author: chugugrace
88
ms.author: chugu
99
---
@@ -12,31 +12,31 @@ ms.author: chugu
1212

1313
[!INCLUDE[appliesto-adf-asa-md](includes/appliesto-adf-asa-md.md)]
1414
> [!NOTE]
15-
> Express virtual network injection feature is not supported for SSIS integration runtime in below regions yet:
15+
> Express virtual network injection feature isn't supported for SSIS integration runtime in below regions yet:
1616
>
1717
>- Jio India West or Switzerland West
1818
>- US Gov Texas or US Gov Arizona
1919
>- China North 2 or China East 2
2020
21-
When using SQL Server Integration Services (SSIS) in Azure Data Factory (ADF) or Synapse Pipelines, there are two methods for you to join your Azure-SSIS integration runtime (IR) to a virtual network: standard and express. If you use the express method, you need to configure your virtual network to meet these requirements:
21+
When you use SQL Server Integration Services (SSIS) in Azure Data Factory (ADF) or Synapse Pipelines, there are two methods for you to join your Azure-SSIS integration runtime (IR) to a virtual network: standard and express. If you use the express method, you need to configure your virtual network to meet these requirements:
2222

2323
- Make sure that *Microsoft.Batch* is a registered resource provider in Azure subscription that has the virtual network for your Azure-SSIS IR to join. For detailed instructions, see the [Register Azure Batch as a resource provider](azure-ssis-integration-runtime-virtual-network-configuration.md#registerbatch) section.
2424

2525
- Make sure that there's no resource lock in your virtual network.
2626

27-
- Select a proper subnet in the virtual network for your Azure-SSIS IR to join. For more information, see the [Select a subnet](#subnet) section below.
27+
- Select a proper subnet in the virtual network for your Azure-SSIS IR to join. For more information, see the [Select a subnet](#subnet) section that follows.
2828

29-
- Make sure that the user creating Azure-SSIS IR is granted the necessary role-based access control (RBAC) permissions to join the virtual network/subnet. For more information, see the [Select virtual network permissions](#perms) section below.
29+
- Make sure that the user creating Azure-SSIS IR is granted the necessary role-based access control (RBAC) permissions to join the virtual network/subnet. For more information, see the [Select virtual network permissions](#perms) section that follows.
3030

31-
Depending on your specific scenario, you can optionally configure the following:
31+
Depending on your specific scenario, you can optionally configure the following settings:
3232

33-
- If you want to use a static public IP address for the outbound traffic of your Azure-SSIS IR, see the [Configure a static public IP address](#ip) section below.
33+
- If you want to use a static public IP address for the outbound traffic of your Azure-SSIS IR, see the [Configure a static public IP address](#ip) section that follows.
3434

35-
- If you want to use your own domain name system (DNS) server in the virtual network, see the [Configure a custom DNS server](#dns) section below.
35+
- If you want to use your own domain name system (DNS) server in the virtual network, see the [Configure a custom DNS server](#dns) section that follows.
3636

37-
- If you want to use a network security group (NSG) to limit outbound traffic on the subnet, see the [Configure an NSG](#nsg) section below.
37+
- If you want to use a network security group (NSG) to limit outbound traffic on the subnet, see the [Configure an NSG](#nsg) section that follows.
3838

39-
- If you want to use user-defined routes (UDRs) to audit/inspect outbound traffic, see the [Configure UDRs](#udr) section below.
39+
- If you want to use user-defined routes (UDRs) to audit/inspect outbound traffic, see the [Configure UDRs](#udr) section that follows.
4040

4141
This diagram shows the required connections for your Azure-SSIS IR:
4242

@@ -58,7 +58,7 @@ To enable express virtual network injection, you must select a proper subnet for
5858

5959
To enable express virtual network injection, the user creating Azure-SSIS IR must be granted the necessary RBAC permissions to join the virtual network/subnet. You have two options:
6060

61-
- Use the built-in *Network Contributor* role. This role comes with the _Microsoft.Network/\*_ permission, which has a much larger scope than necessary.
61+
- Use the built-in *Network Contributor* role. This role comes with the _Microsoft.Network/\*_ permission, which has a larger scope than necessary.
6262

6363
- Create a custom role that includes only the necessary *Microsoft.Network/virtualNetworks/subnets/join/action* permission.
6464

@@ -76,7 +76,7 @@ We recommend you configure your own DNS server to forward unresolved DNS request
7676

7777
For more information, see the [DNS server name resolution](../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server) section.
7878

79-
At present, for Azure-SSIS IR to use your own DNS server, you need to configure it with a standard custom setup following these steps:
79+
Now, for Azure-SSIS IR to use your own DNS server, you need to configure it with a standard custom setup following these steps:
8080

8181
1. Download a custom setup script main.cmd + its associated file setupdnsserver.ps1.
8282

@@ -85,7 +85,7 @@ At present, for Azure-SSIS IR to use your own DNS server, you need to configure
8585
1. Upload main.cmd + setupdnsserver.ps1 into your own Azure Storage blob container for standard custom setup and enter its SAS URI when provisioning Azure-SSIS IR, see the [Customizing Azure-SSIS IR](how-to-configure-azure-ssis-ir-custom-setup.md) article.
8686

8787
> [!NOTE]
88-
> Please use a Fully Qualified Domain Name (FQDN) for your private hostname (for example, use `<your_private_server>.contoso.com` instead of `<your_private_server>`). Alternatively, you can use a standard custom setup on your Azure-SSIS IR to automatically append your own DNS suffix (for example `contoso.com`) to any unqualified single label domain name and turn it into an FQDN before using it in DNS queries, see the [Standard custom setup samples](how-to-configure-azure-ssis-ir-custom-setup.md#standard-custom-setup-samples) section.
88+
> Use a Fully Qualified Domain Name (FQDN) for your private hostname (for example, use `<your_private_server>.contoso.com` instead of `<your_private_server>`). Alternatively, you can use a standard custom setup on your Azure-SSIS IR to automatically append your own DNS suffix (for example `contoso.com`) to any unqualified single label domain name and turn it into an FQDN before using it in DNS queries, see the [Standard custom setup samples](how-to-configure-azure-ssis-ir-custom-setup.md#standard-custom-setup-samples) section.
8989
9090
## <a name="nsg"></a>Configure an NSG
9191

0 commit comments

Comments
 (0)