You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: includes/app-service-web-vnet-regional.md
+18-17Lines changed: 18 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,25 +2,25 @@
2
2
author: ccompy
3
3
ms.service: app-service-web
4
4
ms.topic: include
5
-
ms.date: 02/27/2020
5
+
ms.date: 04/15/2020
6
6
ms.author: ccompy
7
7
---
8
8
Using regional VNet Integration enables your app to access:
9
9
10
-
* Resources in the virtual network in the same region that you integrate with.
11
-
* Resources in virtual networks peered to your virtual network that are in the same region.
10
+
* Resources in a VNet in the same region as your app.
11
+
* Resources in VNets peered to the VNet your app is integrated with.
12
12
* Service endpoint secured services.
13
13
* Resources across Azure ExpressRoute connections.
14
-
* Resources in the virtual network you're connected to.
14
+
* Resources in the VNet you're integrated with.
15
15
* Resources across peered connections, which includes Azure ExpressRoute connections.
16
-
* Private endpoints.
16
+
* Private endpoints - Note: DNS must be managed separately rather than using Azure DNS private zones.
17
17
18
-
When you use VNet Integration with virtual networks in the same region, you can use the following Azure networking features:
18
+
When you use VNet Integration with VNets in the same region, you can use the following Azure networking features:
19
19
20
20
***Network security groups (NSGs)**: You can block outbound traffic with an NSG that's placed on your integration subnet. The inbound rules don't apply because you can't use VNet Integration to provide inbound access to your app.
21
21
***Route tables (UDRs)**: You can place a route table on the integration subnet to send outbound traffic where you want.
22
22
23
-
By default, your app routes only RFC1918 traffic into your virtual network. If you want to route all of your outbound traffic into your virtual network, apply the app setting WEBSITE_VNET_ROUTE_ALL to your app. To configure the app setting:
23
+
By default, your app routes only RFC1918 traffic into your VNet. If you want to route all of your outbound traffic into your VNet, apply the app setting WEBSITE_VNET_ROUTE_ALL to your app. To configure the app setting:
24
24
25
25
1. Go to the **Configuration** UI in your app portal. Select **New application setting**.
26
26
1. Enter **WEBSITE_VNET_ROUTE_ALL** in the **Name** box, and enter **1** in the **Value** box.
@@ -30,24 +30,25 @@ By default, your app routes only RFC1918 traffic into your virtual network. If y
30
30
1. Select **OK**.
31
31
1. Select **Save**.
32
32
33
-
If you route all of your outbound traffic into your virtual network, it's subject to the NSGs and UDRs that are applied to your integration subnet. When you route all of your outbound traffic into your virtual network, your outbound addresses are still the outbound addresses that are listed in your app properties unless you provide routes to send the traffic elsewhere.
33
+
If you route all of your outbound traffic into your VNet, it's subject to the NSGs and UDRs that are applied to your integration subnet. When you route all of your outbound traffic into your VNet, your outbound addresses are still the outbound addresses that are listed in your app properties unless you provide routes to send the traffic elsewhere.
34
34
35
-
There are some limitations with using VNet Integration with virtual networks in the same region:
35
+
There are some limitations with using VNet Integration with VNets in the same region:
36
36
37
37
* You can't reach resources across global peering connections.
38
38
* The feature is available only from newer Azure App Service scale units that support PremiumV2 App Service plans.
39
39
* The integration subnet can be used by only one App Service plan.
40
40
* The feature can't be used by Isolated plan apps that are in an App Service Environment.
41
-
* The feature requires an unused subnet that's a /27 with 32 addresses or larger in an Azure Resource Manager virtual network.
42
-
* The app and the virtual network must be in the same region.
43
-
* You can't delete a virtual network with an integrated app. Remove the integration before you delete the virtual network.
44
-
* You can only integrate with virtual networks in the same subscription as the app.
45
-
* You can have only one regional VNet Integration per App Service plan. Multiple apps in the same App Service plan can use the same virtual network.
41
+
* The feature requires an unused subnet that's a /27 with 32 addresses or larger in an Azure Resource Manager VNet.
42
+
* The app and the VNet must be in the same region.
43
+
* You can't delete a VNet with an integrated app. Remove the integration before you delete the VNet.
44
+
* You can only integrate with VNets in the same subscription as the app.
45
+
* You can have only one regional VNet Integration per App Service plan. Multiple apps in the same App Service plan can use the same VNet.
46
46
* You can't change the subscription of an app or a plan while there's an app that's using regional VNet Integration.
47
+
* Your app cannot resolve addresses in Azure DNS Private Zones.
47
48
48
49
One address is used for each plan instance. If you scale your app to five instances, then five addresses are used. Since subnet size can't be changed after assignment, you must use a subnet that's large enough to accommodate whatever scale your app might reach. A /26 with 64 addresses is the recommended size. A /26 with 64 addresses accommodates a Premium plan with 30 instances. When you scale a plan up or down, you need twice as many addresses for a short period of time.
49
50
50
-
If you want your apps in another plan to reach a virtual network that's already connected to by apps in another plan, select a different subnet than the one being used by the preexisting VNet Integration.
51
+
If you want your apps in another plan to reach a VNet that's already connected to by apps in another plan, select a different subnet than the one being used by the preexisting VNet Integration.
51
52
52
53
The feature is in preview for Linux. The Linux form of the feature only supports making calls to RFC 1918 addresses (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16).
53
54
@@ -57,7 +58,7 @@ If you host your app on Linux with the built-in images, regional VNet Integratio
57
58
58
59
### Service endpoints
59
60
60
-
With regional VNet Integration, you can use service endpoints. To use service endpoints with your app, use regional VNet Integration to connect to a selected virtual network. Then configure service endpoints on the subnet you used for the integration.
61
+
With regional VNet Integration, you can use service endpoints. To use service endpoints with your app, use regional VNet Integration to connect to a selected VNet. Then configure service endpoints on the subnet you used for the integration.
61
62
62
63
### Network security groups
63
64
@@ -78,4 +79,4 @@ Border Gateway Protocol (BGP) routes also affect your app traffic. If you have B
0 commit comments