Skip to content

Commit d7d708f

Browse files
authored
Merge pull request #292198 from craigshoemaker/aca/jason/combine-custom-vnet
[Container Apps] Combine custom Vnet articles (Jason)
2 parents 870e88d + 9c89216 commit d7d708f

9 files changed

+66
-479
lines changed

articles/container-apps/.openpublishing.redirection.container-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -109,6 +109,11 @@
109109
"source_path_from_root": "/articles/container-apps/tutorial-dev-services-postgresql.md",
110110
"redirect_url": "/azure/container-apps/services",
111111
"redirect_document_id": false
112+
},
113+
{
114+
"source_path_from_root": "/articles/container-apps/vnet-custom-internal.md",
115+
"redirect_url": "/azure/container-apps/vnet-custom",
116+
"redirect_document_id": false
112117
}
113118
]
114119
}

articles/container-apps/TOC.yml

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -294,12 +294,8 @@
294294
items:
295295
- name: Architecture overview
296296
href: networking.md
297-
- name: Environments
298-
items:
299-
- name: Deploy with an external environment
300-
href: vnet-custom.md
301-
- name: Deploy with an internal environment
302-
href: vnet-custom-internal.md
297+
- name: Use a custom virtual network
298+
href: vnet-custom.md
303299
- name: Ingress
304300
items:
305301
- name: Overview
@@ -333,8 +329,6 @@
333329
href: how-to-use-private-endpoint.md
334330
- name: Integrate with Azure Front Door
335331
href: how-to-integrate-with-azure-front-door.md
336-
- name: Use a custom VNET
337-
href: vnet-custom.md
338332
- name: Languages and runtimes
339333
items:
340334
- name: .NET

articles/container-apps/networking.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.author: cshoe
1515

1616
Azure Container Apps run in the context of an [environment](environment.md), with its own virtual network (VNet).
1717

18-
By default, your Container App environment is created with a VNet that is automatically generated for you. For fine-grained control over your network, you can provide an existing VNet when you create an environment. Once you create an environment with either a generated or existing VNet, the network type can't be changed.
18+
By default, your Container App environment is created with a VNet that is automatically generated for you. For fine-grained control over your network, you can provide an [existing VNet](vnet-custom.md) when you create an environment. Once you create an environment with either a generated or existing VNet, the network type can't be changed.
1919

2020
Generated VNets take on the following characteristics.
2121

@@ -50,22 +50,22 @@ Depending on your virtual IP configuration, you can control whether your contain
5050

5151
| Accessibility level | Description |
5252
|---|---|
53-
| [External](vnet-custom.md) | Allows your container app to accept public requests. External environments are deployed with a virtual IP on an external, internet-accessible IP address. |
54-
| [Internal](vnet-custom-internal.md) | Internal environments have no public endpoints and are deployed with a virtual IP (VIP) mapped to an internal IP address. The internal endpoint is an Azure internal load balancer (ILB) and IP addresses are issued from the custom VNet's list of private IP addresses. |
53+
| External | Allows your container app to accept public requests. External environments are deployed with a virtual IP on an external, internet-accessible IP address. |
54+
| Internal | Internal environments have no public endpoints and are deployed with a virtual IP (VIP) mapped to an internal IP address. The internal endpoint is an Azure internal load balancer (ILB) and IP addresses are issued from the custom VNet's list of private IP addresses. |
5555

5656
## Custom VNet configuration
5757

5858
As you create a custom VNet, keep in mind the following situations:
5959

60-
- If you want your container app to restrict all outside access, create an [internal Container Apps environment](vnet-custom-internal.md).
60+
- If you want your container app to restrict all outside access, create an internal Container Apps environment.
6161

6262
- If you use your own VNet, you need to provide a subnet that is dedicated exclusively to the Container App environment you deploy. This subnet isn't available to other services.
6363

6464
- Network addresses are assigned from a subnet range you define as the environment is created.
6565

6666
- You can define the subnet range used by the Container Apps environment.
6767

68-
- You can restrict inbound requests to the environment exclusively to the VNet by deploying the environment as [internal](vnet-custom-internal.md).
68+
- You can restrict inbound requests to the environment exclusively to the VNet by deploying the environment as internal.
6969

7070
> [!NOTE]
7171
> When you provide your own virtual network, additional [managed resources](networking.md#managed-resources) are created. These resources incur costs at their associated rates.
@@ -208,7 +208,7 @@ As a Container Apps environment is created, you provide resource IDs for a singl
208208

209209
If you're using the CLI, the parameter to define the subnet resource ID is `infrastructure-subnet-resource-id`. The subnet hosts infrastructure components and user app containers.
210210

211-
If you're using the Azure CLI with a Consumption only environment and the [platformReservedCidr](vnet-custom-internal.md?pivots=azure-cli&tabs=bash#networking-parameters) range is defined, the subnet must not overlap with the IP range defined in `platformReservedCidr`.
211+
If you're using the Azure CLI with a Consumption only environment and the [platformReservedCidr](vnet-custom.md#networking-parameters) range is defined, the subnet must not overlap with the IP range defined in `platformReservedCidr`.
212212

213213
## Routes
214214

@@ -429,5 +429,4 @@ In addition to the standard [Azure Container Apps billing](./billing.md), you're
429429

430430
## Next steps
431431

432-
- [Deploy with an external environment](vnet-custom.md)
433-
- [Deploy with an internal environment](vnet-custom-internal.md)
432+
- [Use a custom virtual network](vnet-custom.md)

articles/container-apps/tutorial-ci-cd-runners-jobs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ $PLACEHOLDER_JOB_NAME="placeholder-agent-job"
125125
The Azure Container Apps environment acts as a secure boundary around container apps and jobs so they can share the same network and communicate with each other.
126126

127127
> [!NOTE]
128-
> To create a Container Apps environment that's integrated with an existing virtual network, see [Provide a virtual network to an internal Azure Container Apps environment](vnet-custom-internal.md?tabs=bash).
128+
> To create a Container Apps environment that's integrated with an existing virtual network, see [Provide a virtual network to an Azure Container Apps environment](vnet-custom.md).
129129
130130
1. Create a resource group using the following command.
131131

0 commit comments

Comments
 (0)