Skip to content

Commit d03ff6b

Browse files
committed
acrolinx fix
1 parent cf00946 commit d03ff6b

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/spring-apps/troubleshooting-vnet.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ If your custom DNS server can't add Azure DNS IP `168.63.129.16` as the upstream
5252

5353
If your virtual network is configured with custom DNS settings, be sure to add Azure DNS IP `168.63.129.16` as the upstream DNS server in the custom DNS server, if you haven't already. Then, proceed with the following instructions.
5454

55-
If your virtual network is not configured with custom DNS settings, or if your virtual network is configured with custom DNS settings and you've already added Azure DNS IP `168.63.129.16` as the upstream DNS server in the custom DNS server, then complete the following steps:
55+
If your virtual network isn't configured with custom DNS settings, or if your virtual network is configured with custom DNS settings and you've already added Azure DNS IP `168.63.129.16` as the upstream DNS server in the custom DNS server, then complete the following steps:
5656

5757
1. Create a new private DNS zone `private.azuremicroservices.io`.
5858
1. Link the private DNS zone to the virtual network.
@@ -67,17 +67,17 @@ For more information, see [Access your application in a private network](./acces
6767

6868
Azure Spring Apps supports exposing applications to the internet by using public endpoints. For more information, see [Expose applications on Azure Spring Apps to the internet from a public network](how-to-access-app-from-internet-virtual-network.md).
6969

70-
If you are using a user defined route feature, the following features are not supported because of asymmetric routing:
70+
If you're using a user defined route feature, the following features aren't supported because of asymmetric routing:
7171

72-
- Use public network to access the appliaction through public endpoint.
72+
- Use public network to access the application through public endpoint.
7373
- Use public network to access the log stream.
7474
- Use public network to access the App console.
7575

7676
For more information, see [Control egress traffic for an Azure Spring Apps instance](how-to-create-user-defined-route-instance.md).
7777

78-
The same limitations also apply to Azure Spring Apps when egress traffics are routed to a firewall. Because both situations introduce asymmetric routing into the cluster, this is where the problem occurs. Packets arrive on the endpoint's public IP address but return to the firewall via the private IP address. So, the firewall must block such traffic. For more information, see [Bring Your Own Route Table](how-to-deploy-in-azure-virtual-network.md#bring-your-own-route-table).
78+
The same limitations also apply to Azure Spring Apps when egress traffics are routed to a firewall. The problem occurs because both situations introduce asymmetric routing into the cluster. Packets arrive on the endpoint's public IP address but return to the firewall via the private IP address. So, the firewall must block such traffic. For more information, see [Bring Your Own Route Table](how-to-deploy-in-azure-virtual-network.md#bring-your-own-route-table).
7979

80-
If you are routing egress traffics to a firewall but also need to expose the application to internet, use the expose applications to the internet with TLS Termination feature. For more information, see [Expose applications to the internet with TLS Termination at Application Gateway](expose-apps-gateway-tls-termination.md).
80+
If you're routing egress traffics to a firewall but also need to expose the application to internet, use the expose applications to the internet with TLS Termination feature. For more information, see [Expose applications to the internet with TLS Termination at Application Gateway](expose-apps-gateway-tls-termination.md).
8181

8282
## Other issues
8383

0 commit comments

Comments
 (0)