Skip to content

Commit e55578a

Browse files
author
Jill Grant
authored
Merge pull request #280033 from ecfan/networking
Clarify steps to find Networking page
2 parents f776f7a + 9e96d64 commit e55578a

6 files changed

+58
-39
lines changed

articles/connectors/enable-stateful-affinity-built-in-connectors.md

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -36,21 +36,21 @@ To run these connector operations in stateful mode, you must enable this capabil
3636

3737
1. In the [Azure portal](https://portal.azure.com), open the Standard logic app resource where you want to enable stateful mode for these connector operations.
3838

39-
1. Enable virtual network integration for your logic app and add your logic app to the previously created subnet:
39+
1. To enable virtual network integration for your logic app, and add your logic app to the previously created subnet, follow these steps:
4040

41-
1. On your logic app menu resource, under **Settings**, select **Networking**.
41+
1. On the logic app menu resource, under **Settings**, select **Networking**.
4242

43-
1. In the **Outbound Traffic** section, select **VNET integration** > **Add VNet**.
43+
1. In the **Outbound traffic configuration** section, next to **Virtual network integration**, select **Not configured** > **Add virtual network integration**.
4444

45-
1. On the **Add VNet Integration** pane that opens, select your Azure subscription and your virtual network.
45+
1. On the **Add virtual network integration** pane that opens, select your Azure subscription and your virtual network.
4646

47-
1. Under **Subnet**, select **Select existing**. From the **Subnet** list, select the subnet where you want to add your logic app.
47+
1. From the **Subnet** list, select the subnet where you want to add your logic app.
4848

49-
1. When you're done, select **OK**.
49+
1. When you're done, select **Connect**, and return to the **Networking** page.
5050

51-
On the **Networking** page, the **VNet integration** option now appears set to **On**, for example:
51+
The **Virtual network integration** property is now set to the selected virtual network and subnet, for example:
5252

53-
:::image type="content" source="media/enable-stateful-affinity-built-in-connectors/enable-virtual-network-integration.png" alt-text="Screenshot shows Azure portal, Standard logic app resource, Networking page, VNet integration set to On.":::
53+
:::image type="content" source="media/enable-stateful-affinity-built-in-connectors/enable-virtual-network-integration.png" alt-text="Screenshot shows Azure portal, Standard logic app resource, Networking page with selected virtual network and subnet.":::
5454

5555
For general information about enabling virtual network integration with your app, see [Enable virtual network integration in Azure App Service](../app-service/configure-vnet-integration-enable.md).
5656

@@ -93,8 +93,8 @@ Updates a resource by using the specified resource ID:
9393

9494
#### Parameter values
9595

96-
| Element | Value | Description |
97-
|---------|--------|-------------|
96+
| Element | Value |
97+
|---------|--------|
9898
| HTTP request method | **PATCH** |
9999
| <*resourceId*> | **subscriptions/{yourSubscriptionID}/resourcegroups/{yourResourceGroup}/providers/Microsoft.Web/sites/{websiteName}/config/web** |
100100
| <*yourSubscriptionId*> | The ID for your Azure subscription |
@@ -190,11 +190,13 @@ Resource scale-in events might cause the loss of context for built-in connectors
190190

191191
1. On your logic app resource menu, under **Settings**, select **Scale out**.
192192

193-
1. Under **App Scale Out**, set **Enforce Scale Out Limit** to **Yes**, which shows the **Maximum Scale Out Limit**.
193+
1. On the **Scale out** page, in the **App Scale out** section, follow these steps:
194+
195+
1. Set **Enforce Scale Out Limit** to **Yes**, which shows the **Maximum Scale Out Limit**.
194196

195-
1. On the **Scale out** page, under **App Scale out**, set the number for **Always Ready Instances** to the same number as **Maximum Scale Out Limit** and **Maximum Burst**, which appears under **Plan Scale Out**, for example:
197+
1. Set **Always Ready Instances** to the same number as **Maximum Scale Out Limit** and **Maximum Burst**, which appears in the **Plan Scale out** section, for example:
196198

197-
:::image type="content" source="media/enable-stateful-affinity-built-in-connectors/scale-in-settings.png" alt-text="Screenshot shows Azure portal, Standard logic app resource, Scale out page, and Always Ready Instances number set to match Maximum Scale Out Limit and Maximum Burst.":::
199+
:::image type="content" source="media/enable-stateful-affinity-built-in-connectors/scale-in-settings.png" alt-text="Screenshot shows Azure portal, Standard logic app resource, Scale out page, and Always Ready Instances number set to match Maximum Burst and Maximum Scale Out Limit.":::
198200

199201
1. When you're done, on the **Scale out** toolbar, select **Save**.
200202

22.3 KB
Loading
0 Bytes
Loading

articles/logic-apps/deploy-single-tenant-logic-apps-private-storage-account.md

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.suite: integration
66
ms.reviewer: estfan, azla
77
ms.topic: how-to
88
ms.custom: engagement-fy23, devx-track-arm-template
9-
ms.date: 10/09/2023
9+
ms.date: 07/04/2024
1010
# Customer intent: As a developer, I want to deploy Standard logic apps to Azure storage accounts that use private endpoints.
1111
---
1212

@@ -30,6 +30,7 @@ For more information, review the following documentation:
3030
This deployment method requires that temporary public access to your storage account. If you can't enable public access due to your organization's policies, you can still deploy your logic app to a private storage account. However, you have to [deploy with an Azure Resource Manager template (ARM template)](#deploy-arm-template), which is described in a later section.
3131

3232
> [!NOTE]
33+
>
3334
> An exception to the previous rule is that you can use the Azure portal to deploy your logic app to an App Service Environment,
3435
> even if the storage account is protected with a private endpoint. However, you'll need connectivity between the
3536
> subnet used by the App Service Environment and the subnet used by the storage account's private endpoint.
@@ -46,17 +47,25 @@ This deployment method requires that temporary public access to your storage acc
4647

4748
1. Deploy your logic app resource by using either the Azure portal or Visual Studio Code.
4849

49-
1. After deployment finishes, enable virtual network integration between your logic app and the private endpoints on the virtual network that connects to your storage account.
50+
1. After deployment finishes, enable virtual network integration between your logic app and the private endpoints on the virtual network connected to your storage account.
5051

5152
1. In the [Azure portal](https://portal.azure.com), open your logic app resource.
5253

5354
1. On the logic app resource menu, under **Settings**, select **Networking**.
5455

55-
1. Select **VNet integration** on **Outbound Traffic** card to enable integration with a virtual network connecting to your storage account.
56+
1. In the **Outbound traffic configuration** section, next to **Virtual network integration**, select **Not configured** > **Add virtual network integration** .
5657

57-
1. To access your logic app workflow data over the virtual network, in your logic app resource settings, set the `WEBSITE_CONTENTOVERVNET` setting to `1`.
58+
1. On the **Add virtual network integration** pane that opens, select your Azure subscription and your virtual network.
5859

59-
If you use your own domain name server (DNS) with your virtual network, set your logic app resource's `WEBSITE_DNS_SERVER` app setting to the IP address for your DNS. If you have a secondary DNS, add another app setting named `WEBSITE_DNS_ALT_SERVER`, and set the value also to the IP for your secondary DNS.
60+
1. From the **Subnet** list, select the subnet where you want to add your logic app. When you're done, select **Connect**.
61+
62+
1. To access your logic app workflow data over the virtual network, follow these steps:
63+
64+
1. On the logic app resource menu, under **Settings**, select **Environment variables**.
65+
66+
1. On the **App settings** tab, add the **WEBSITE_CONTENTOVERVNET** app setting, if none exist, and set the value to **1**.
67+
68+
1. If you use your own domain name server (DNS) with your virtual network, add the **WEBSITE_DNS_SERVER** app setting, if none exist, and set the value to the IP address for your DNS. If you have a secondary DNS, add another app setting named **WEBSITE_DNS_ALT_SERVER**, and set the value to the IP for your secondary DNS.
6069

6170
1. After you apply these app settings, you can remove public access from your storage account.
6271

@@ -67,6 +76,7 @@ This deployment method requires that temporary public access to your storage acc
6776
1. On the **Networking** pane, on the **Firewalls and virtual networks** tab, under **Allow access from**, clear **Selected networks**, and add virtual networks as necessary.
6877

6978
> [!NOTE]
79+
>
7080
> Your logic app might experience an interruption because the connectivity switch between public and private endpoints might take time.
7181
> This disruption might result in your workflows temporarily disappearing. If this behavior happens, you can try to reload your workflows
7282
> by restarting the logic app and waiting several minutes.
@@ -92,7 +102,6 @@ The following errors commonly happen with a private storage account that's behin
92102
|---------|-------|
93103
| Access to the `host.json` file is denied | `"System.Private.CoreLib: Access to the path 'C:\\home\\site\\wwwroot\\host.json' is denied."` |
94104
| Can't load workflows in the logic app resource | `"Encountered an error (ServiceUnavailable) from host runtime."` |
95-
|||
96105

97106
As the logic app isn't running when these errors occur, you can't use the Kudu console debugging service on the Azure platform to troubleshoot these errors. However, you can use the following methods instead:
98107

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -87,29 +87,31 @@ You can limit access to the inputs and outputs in the run history for your logic
8787

8888
For example, to block anyone from accessing inputs and outputs, specify an IP address range such as `0.0.0.0-0.0.0.0`. Only a person with administrator permissions can remove this restriction, which provides the possibility for "just-in-time" access to data in your logic app workflows. A valid IP range uses these formats: *x.x.x.x/x* or *x.x.x.x-x.x.x.x*
8989

90-
To specify the allowed IP ranges, follow these steps for either the Azure portal or your Azure Resource Manager template:
90+
To specify the allowed IP ranges, follow these steps for your Consumption or Standard logic app in the Azure portal or your Azure Resource Manager template:
9191

9292
#### [Portal](#tab/azure-portal)
9393

9494
##### Consumption workflows
9595

96-
1. In the [Azure portal](https://portal.azure.com), open your logic app workflow in the designer.
96+
1. In the [Azure portal](https://portal.azure.com), open your Consumption logic app workflow in the designer.
9797

9898
1. On your logic app's menu, under **Settings**, select **Workflow settings**.
9999

100-
1. Under **Access control configuration** > **Allowed inbound IP addresses**, select **Specific IP ranges**.
100+
1. In the **Access control configuration** section, under **Allowed inbound IP addresses**, from the **Trigger access option** list, select **Specific IP ranges**.
101101

102-
1. Under **IP ranges for contents**, specify the IP address ranges that can access content from inputs and outputs.
102+
1. In the **IP ranges for contents** box, specify the IP address ranges that can access content from inputs and outputs.
103103

104104
##### Standard workflows
105105

106-
1. In the [Azure portal](https://portal.azure.com), open your logic app resource.
106+
1. In the [Azure portal](https://portal.azure.com), open your Standard logic app resource.
107107

108108
1. On the logic app menu, under **Settings**, select **Networking**.
109109

110-
1. In the **Inbound Traffic** section, select **Access restriction**.
110+
1. In the **Inbound traffic configuration** section, next to **Public network access**, select **Enabled with no access restriction**.
111111

112-
1. Create one or more rules to either **Allow** or **Deny** requests from specific IP ranges. You can also use the HTTP header filter settings and forwarding settings.
112+
1. On the **Access restrictions** page, under **App access**, select **Enabled from select virtual networks and IP addresses**.
113+
114+
1. Under **Site access and rules**, on the **Main site** tab, add one or more rules to either **Allow** or **Deny** requests from specific IP ranges. You can also use the HTTP header filter settings and forwarding settings. A valid IP range uses these formats: *x.x.x.x/x* or *x.x.x.x-x.x.x.x*
113115

114116
For more information, see [Blocking inbound IP addresses in Azure Logic Apps (Standard)](https://www.serverlessnotes.com/docs/block-inbound-ip-addresses-in-azure-logic-apps-standard).
115117

@@ -979,13 +981,15 @@ In the Azure portal, IP address restriction affects both triggers *and* actions,
979981

980982
##### Standard workflows
981983

982-
1. In the [Azure portal](https://portal.azure.com), open your logic app resource.
984+
1. In the [Azure portal](https://portal.azure.com), open your Standard logic app resource.
983985

984986
1. On the logic app menu, under **Settings**, select **Networking**.
985987

986-
1. In the **Inbound Traffic** section, select **Access restriction**.
988+
1. In the **Inbound traffic configuration** section, next to **Public network access**, select **Enabled with no access restriction**.
989+
990+
1. On the **Access restrictions** page, under **App access**, select **Enabled from select virtual networks and IP addresses**.
987991

988-
1. Create one or more rules to either **Allow** or **Deny** requests from specific IP ranges. You can also use the HTTP header filter settings and forwarding settings. A valid IP range uses these formats: *x.x.x.x/x* or *x.x.x.x-x.x.x.x*
992+
1. Under **Site access and rules**, on the **Main site** tab, add one or more rules to either **Allow** or **Deny** requests from specific IP ranges. A valid IP range uses these formats: *x.x.x.x/x* or *x.x.x.x-x.x.x.x*
989993

990994
For more information, see [Blocking inbound IP addresses in Azure Logic Apps (Standard)](https://www.serverlessnotes.com/docs/block-inbound-ip-addresses-in-azure-logic-apps-standard).
991995

articles/logic-apps/secure-single-tenant-workflow-virtual-network-private-endpoint.md

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -95,13 +95,15 @@ For more information, review [Create single-tenant logic app workflows in Azure
9595

9696
### Set up private endpoint connection
9797

98-
1. On your logic app menu, under **Settings**, select **Networking**.
98+
1. On the logic app resource menu, under **Settings**, select **Networking**.
9999

100-
1. On the **Networking** page, on the **Inbound traffic** card, select **Private endpoints**.
100+
1. On the **Networking** page, in the **Inbound traffic configuration** section, select the link next to **Private endpoints**.
101101

102-
1. On the **Private Endpoint connections**, select **Add**.
102+
1. On the **Private Endpoint connections** page, select **Add** > **Express** or **Advanced**.
103103

104-
1. On the **Add Private Endpoint** pane that opens, provide the requested information about the endpoint.
104+
For more information about the **Advanced** option, see [Create a private endpoint](../private-link/create-private-endpoint-portal.md#create-a-private-endpoint).
105+
106+
1. On the **Add Private Endpoint** pane, provide the requested information about the endpoint.
105107

106108
For more information, review [Private Endpoint properties](../private-link/private-endpoint-overview.md#private-endpoint-properties).
107109

@@ -154,17 +156,19 @@ For more information, review the following documentation:
154156

155157
### Set up virtual network integration
156158

157-
1. In the Azure portal, on the logic app resource menu, under **Settings**, select **Networking**.
159+
1. In the [Azure portal](https://portal.azure.com), on the logic app resource menu, under **Settings**, select **Networking**.
160+
161+
1. On the **Networking** page, in the **Outbound traffic configuration** section, select the link next to **Virtual network integration**.
158162

159-
1. On the **Networking** pane, on the **Outbound traffic** card, select **VNet integration**.
163+
1. On the **Virtual network integration** page, select **Add virtual network integration**.
160164

161-
1. On the **VNet Integration** pane, select **Add Vnet**.
165+
1. On the **Add virtual network integration** pane, select the subscription, the virtual network that connects to your internal service, and the subnet where to add the logic app. When you finish, select **Connect**.
162166

163-
1. On the **Add VNet Integration** pane, select the subscription and the virtual network that connects to your internal service.
167+
On the **Virtual Network Integration** page, by default, the **Outbound internet traffic** setting is selected, which routes all outbound traffic through the virtual network. In this scenario, the app setting named **WEBSITE_VNET_ROUTE_ALL** is ignored.
164168

165-
After you add virtual network integration, on the **VNet Integration** pane, the **Route All** setting is enabled by default. This setting routes all outbound traffic through the virtual network. When this setting is enabled, the `WEBSITE_VNET_ROUTE_ALL` app setting is ignored.
169+
To find this app setting, on the logic app resource menu, under **Settings**, select **Environment variables**.
166170

167-
1. If you use your own domain name server (DNS) with your virtual network, set your logic app resource's `WEBSITE_DNS_SERVER` app setting to the IP address for your DNS. If you have a secondary DNS, add another app setting named `WEBSITE_DNS_ALT_SERVER`, and set the value also to the IP for your DNS.
171+
1. If you use your own domain name server (DNS) with your virtual network, add the **WEBSITE_DNS_SERVER** app setting, if none exist, and set the value to the IP address for your DNS. If you have a secondary DNS, add another app setting named **WEBSITE_DNS_ALT_SERVER**, and set the value to the IP for your secondary DNS.
168172

169173
1. After Azure successfully provisions the virtual network integration, try to run the workflow again.
170174

0 commit comments

Comments
 (0)