You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-apps/networking.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.author: cshoe
15
15
16
16
Azure Container Apps run in the context of an [environment](environment.md), with its own virtual network (VNet).
17
17
18
-
By default, your Container App environment is created with a VNet that is automatically generated for you. For fine-grained control over your network, you can provide an existing VNet when you create an environment. Once you create an environment with either a generated or existing VNet, the network type can't be changed.
18
+
By default, your Container App environment is created with a VNet that is automatically generated for you. For fine-grained control over your network, you can provide an [existing VNet](vnet-custom.md) when you create an environment. Once you create an environment with either a generated or existing VNet, the network type can't be changed.
19
19
20
20
Generated VNets take on the following characteristics.
21
21
@@ -50,22 +50,22 @@ Depending on your virtual IP configuration, you can control whether your contain
50
50
51
51
| Accessibility level | Description |
52
52
|---|---|
53
-
|[External](vnet-custom.md)| Allows your container app to accept public requests. External environments are deployed with a virtual IP on an external, internet-accessible IP address. |
54
-
|[Internal](vnet-custom-internal.md)| Internal environments have no public endpoints and are deployed with a virtual IP (VIP) mapped to an internal IP address. The internal endpoint is an Azure internal load balancer (ILB) and IP addresses are issued from the custom VNet's list of private IP addresses. |
53
+
| External | Allows your container app to accept public requests. External environments are deployed with a virtual IP on an external, internet-accessible IP address. |
54
+
| Internal | Internal environments have no public endpoints and are deployed with a virtual IP (VIP) mapped to an internal IP address. The internal endpoint is an Azure internal load balancer (ILB) and IP addresses are issued from the custom VNet's list of private IP addresses. |
55
55
56
56
## Custom VNet configuration
57
57
58
58
As you create a custom VNet, keep in mind the following situations:
59
59
60
-
- If you want your container app to restrict all outside access, create an [internal Container Apps environment](vnet-custom-internal.md).
60
+
- If you want your container app to restrict all outside access, create an internal Container Apps environment.
61
61
62
62
- If you use your own VNet, you need to provide a subnet that is dedicated exclusively to the Container App environment you deploy. This subnet isn't available to other services.
63
63
64
64
- Network addresses are assigned from a subnet range you define as the environment is created.
65
65
66
66
- You can define the subnet range used by the Container Apps environment.
67
67
68
-
- You can restrict inbound requests to the environment exclusively to the VNet by deploying the environment as [internal](vnet-custom-internal.md).
68
+
- You can restrict inbound requests to the environment exclusively to the VNet by deploying the environment as internal.
69
69
70
70
> [!NOTE]
71
71
> When you provide your own virtual network, additional [managed resources](networking.md#managed-resources) are created. These resources incur costs at their associated rates.
@@ -208,7 +208,7 @@ As a Container Apps environment is created, you provide resource IDs for a singl
208
208
209
209
If you're using the CLI, the parameter to define the subnet resource ID is `infrastructure-subnet-resource-id`. The subnet hosts infrastructure components and user app containers.
210
210
211
-
If you're using the Azure CLI with a Consumption only environment and the [platformReservedCidr](vnet-custom-internal.md?pivots=azure-cli&tabs=bash#networking-parameters) range is defined, the subnet must not overlap with the IP range defined in `platformReservedCidr`.
211
+
If you're using the Azure CLI with a Consumption only environment and the [platformReservedCidr](vnet-custom.md#networking-parameters) range is defined, the subnet must not overlap with the IP range defined in `platformReservedCidr`.
212
212
213
213
## Routes
214
214
@@ -429,5 +429,4 @@ In addition to the standard [Azure Container Apps billing](./billing.md), you're
429
429
430
430
## Next steps
431
431
432
-
- [Deploy with an external environment](vnet-custom.md)
433
-
- [Deploy with an internal environment](vnet-custom-internal.md)
The Azure Container Apps environment acts as a secure boundary around container apps and jobs so they can share the same network and communicate with each other.
126
126
127
127
> [!NOTE]
128
-
> To create a Container Apps environment that's integrated with an existing virtual network, see [Provide a virtual network to an internal Azure Container Apps environment](vnet-custom-internal.md?tabs=bash).
128
+
> To create a Container Apps environment that's integrated with an existing virtual network, see [Provide a virtual network to an Azure Container Apps environment](vnet-custom.md).
129
129
130
130
1. Create a resource group using the following command.
0 commit comments