Skip to content

Commit e9dfa64

Browse files
committed
Updates per cachai.
1 parent 30172f9 commit e9dfa64

File tree

3 files changed

+18
-15
lines changed

3 files changed

+18
-15
lines changed

articles/container-apps/custom-virtual-networks.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -61,14 +61,14 @@ Different environment types have different subnet requirements:
6161

6262
| Subnet Size | Available IP Addresses<sup>1</sup> | Max nodes (Dedicated workload profile)<sup>2</sup>| Max replicas (Consumption workload profile)<sup>2</sup> |
6363
|--|--|--|--|
64-
| /23 | 500 | 250 | 2,500 |
65-
| /24 | 244 | 122 | 1,220 |
66-
| /25 | 116 | 58 | 580 |
67-
| /26 | 52 | 26 | 260 |
68-
| /27 | 20 | 10 | 100 |
69-
70-
<sup>1</sup> The available IP addresses are the size of the subnet minus the 12 IP addresses required for Azure Container Apps infrastructure.
71-
<sup>2</sup> This is accounting for apps in single revision mode.
64+
| /23 | 495 | 247 | 2,470 |
65+
| /24 | 239 | 119 | 1,190 |
66+
| /25 | 111 | 55 | 550 |
67+
| /26 | 47 | 23 | 230 |
68+
| /27 | 15 | 7 | 70 |
69+
70+
<sup>1</sup> The available IP addresses is the size of the subnet minus the 12 IP addresses required for Azure Container Apps infrastructure and 5 IP addresses reserved by the subnet.
71+
<sup>2</sup> This is accounting for apps in single revision mode.
7272

7373
# [Consumption-only environment](#tab/consumption-only-env)
7474

articles/container-apps/firewall-integration.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,12 @@ description: Firewall settings to secure a virtual network in Azure Container Ap
44
services: container-apps
55
author: craigshoemaker
66
ms.service: azure-container-apps
7-
ms.topic: reference
8-
ms.date: 01/09/2025
7+
ms.topic: reference
8+
ms.date: 04/08/2025
99
ms.author: cshoe
1010
---
1111

12-
# Securing a virtual network in Azure Container Apps with Network Security Groups
12+
# Securing a virtual network in Azure Container Apps with Network Security Groups
1313

1414
Network Security Groups (NSGs) needed to configure virtual networks closely resemble the settings required by Kubernetes.
1515

@@ -87,14 +87,16 @@ The following tables describe how to configure a collection of NSG allow rules.
8787
| TCP | Your container app's subnet | \* | `Storage.<Region>` | `443` | Only required when using `Azure Container Registry` to host your images. |
8888
| TCP | Your container app's subnet | \* | `AzureMonitor` | `443` | Only required when using Azure Monitor. Allows outbound calls to Azure Monitor. |
8989

90-
9190
---
9291

9392
<sup>1</sup> This address is passed as a parameter when you create an environment. For example, `10.0.0.0/21`.
9493
<sup>2</sup> If you're using Azure Container Registry (ACR) with NSGs configured on your virtual network, create a private endpoint on your ACR to allow Azure Container Apps to pull images through the virtual network. You don't need to add an NSG rule for ACR when configured with private endpoints.
9594

96-
9795
#### Considerations
9896

9997
- If you're running HTTP servers, you might need to add ports `80` and `443`.
10098
- Don't explicitly deny the Azure DNS address `168.63.129.16` in the outgoing NSG rules, or your Container Apps environment doesn't function.
99+
100+
## Next steps
101+
102+
- [Use a private endpoint](how-to-use-private-endpoint.md)

articles/container-apps/networking.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: container-apps
55
author: craigshoemaker
66
ms.service: azure-container-apps
77
ms.topic: conceptual
8-
ms.date: 04/03/2025
8+
ms.date: 04/08/2025
99
ms.author: cshoe
1010
---
1111

@@ -95,10 +95,11 @@ Azure networking policies are supported with the public network access flag.
9595

9696
## Outbound features
9797

98-
|Feature |Learn how to |
98+
|Feature |Learn how to |
9999
|---------|---------|
100100
|[Using Azure Firewall](using-azure-firewall.md) | Use Azure Firewall to control outbound traffic from your container app. |
101101
|[Securing a existing VNet with an NSG](firewall-integration.md) | Secure your container app environment's VNet with a Network Security Group (NSG). |
102+
|[NAT gateway integration](custom-virtual-networks.md#nat-gateway-integration)| Use NAT Gateway to simplify outbound internet connectivity in your virtual network in a workload profiles environment. |
102103

103104
## Environment security
104105

0 commit comments

Comments
 (0)