Skip to content

Commit ebcf159

Browse files
committed
fix links
1 parent a972a4a commit ebcf159

File tree

8 files changed

+12
-12
lines changed

8 files changed

+12
-12
lines changed

articles/container-apps/firewall-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Network Security Groups (NSGs) needed to configure virtual networks closely rese
1515

1616
You can lock down a network via NSGs with more restrictive rules than the default NSG rules to control all inbound and outbound traffic for the Container Apps environment at the subscription level.
1717

18-
In the workload profiles environment, user-defined routes (UDRs) and [securing outbound traffic with a firewall](./using-azure-firewall.md) are supported.
18+
In the workload profiles environment, user-defined routes (UDRs) and [securing outbound traffic with a firewall](./use-azure-firewall.md) are supported.
1919

2020
> [!NOTE]
2121
> For a guide on how to set up UDR with Container Apps to restrict outbound traffic with Azure Firewall, visit the how to for [Container Apps and Azure Firewall](user-defined-routes.md).

articles/container-apps/manage-secrets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -212,7 +212,7 @@ Secrets Key Vault references aren't supported in PowerShell.
212212
---
213213

214214
> [!NOTE]
215-
> If you're using [UDR With Azure Firewall](user-defined-routes.md), you will need to add the `AzureKeyVault` service tag and the *login.microsoft.com* FQDN to the allow list for your firewall. Refer to [configuring UDR with Azure Firewall](using-azure-firewall.md) to decide which additional service tags you need.
215+
> If you're using [UDR With Azure Firewall](user-defined-routes.md), you will need to add the `AzureKeyVault` service tag and the *login.microsoft.com* FQDN to the allow list for your firewall. Refer to [configuring UDR with Azure Firewall](use-azure-firewall.md) to decide which additional service tags you need.
216216
217217
#### Key Vault secret URI and secret rotation
218218

articles/container-apps/networking.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,15 +91,15 @@ For more information about different networking scenarios, see [Ingress in Azure
9191
|[Cross origin resource sharing (CORS)](cors.md) | Enable CORS for your container app, which allows requests made through the browser to a domain that doesn't match the page's origin. |
9292
|[Path-based routing](rule-based-routing.md) | Use rules to route requests to different container apps in your environment, depending on the path of each request. |
9393
|[Virtual networks](custom-virtual-networks.md) | Configure the VNet for your container app environment. |
94-
|[DNS](dns.md) | Configure DNS for your container app environment's VNet. |
94+
|[DNS](private-endpoints-with-dns.md#dns) | Configure DNS for your container app environment's VNet. |
9595
|[Private endpoint](how-to-use-private-endpoint.md) | Use a private endpoint to securely access your Azure Container App without exposing it to the public Internet. |
9696
|[Integrate with Azure Front Door](how-to-integrate-with-azure-front-door.md) | Connect directly from Azure Front Door to your Azure Container Apps using a private link instead of the public internet. |
9797

9898
## Outbound features
9999

100100
|Feature |Learn how to |
101101
|---------|---------|
102-
|[Using Azure Firewall](using-azure-firewall.md) | Use Azure Firewall to control outbound traffic from your container app. |
102+
|[Using Azure Firewall](use-azure-firewall.md) | Use Azure Firewall to control outbound traffic from your container app. |
103103
|[Virtual networks](custom-virtual-networks.md) | Configure the VNet for your container app environment. |
104104
|[Securing a existing VNet with an NSG](firewall-integration.md) | Secure your container app environment's VNet with a Network Security Group (NSG). |
105105
|[NAT gateway integration](custom-virtual-networks.md#nat-gateway-integration)| Use NAT Gateway to simplify outbound internet connectivity in your virtual network in a workload profiles environment. |
File renamed without changes.

articles/container-apps/troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ You can use the *diagnose and solve problems* tool to find issues with your cont
5858
If you receive an error message when you try to deploy a new revision, verify that Container Apps is able to pull your container image.
5959

6060
- Ensure your container environment firewall isn't blocking access to the container registry. For more information, see [Control outbound traffic with user defined routes](./user-defined-routes.md).
61-
- If your existing VNet uses a custom DNS server instead of the default Azure-provided DNS server, verify your DNS server is configured correctly and that DNS lookup of the container registry doesn't fail. For more information, see [DNS](./dns.md).
61+
- If your existing VNet uses a custom DNS server instead of the default Azure-provided DNS server, verify your DNS server is configured correctly and that DNS lookup of the container registry doesn't fail. For more information, see [DNS](./private-endpoint-with-dns.md).
6262
- If you used the Container Apps cloud build feature to generate a container image for you (see [Code-to-cloud path for Azure Container Apps](./code-to-cloud-options.md#new-to-containers), your image isn't publicly accessible, so this section doesn't apply.
6363

6464
For a Docker container that can run as a console application, verify that your image is publicly accessible by running the following command in an elevated command prompt. Before you run this command, replace placeholders surrounded by `<>` with your values.

articles/container-apps/user-defined-routes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Azure creates a default route table for your virtual networks on create. By impl
2020

2121
You can also use a NAT gateway or any other third party appliances instead of Azure Firewall.
2222

23-
See [configuring UDR with Azure Firewall](using-azure-firewall.md) for more information.
23+
See [configuring UDR with Azure Firewall](use-azure-firewall.md) for more information.
2424

2525
## Prerequisites
2626

@@ -122,7 +122,7 @@ Your virtual networks in Azure have default route tables in place when you creat
122122
## Configure firewall policies
123123

124124
> [!NOTE]
125-
> When using UDR with Azure Firewall in Azure Container Apps, you will need to add certain FQDNs and service tags to the allowlist for the firewall. Please refer to [configuring UDR with Azure Firewall](using-azure-firewall.md) to determine which service tags you need.
125+
> When using UDR with Azure Firewall in Azure Container Apps, you will need to add certain FQDNs and service tags to the allowlist for the firewall. Please refer to [configuring UDR with Azure Firewall](use-azure-firewall.md) to determine which service tags you need.
126126
127127
Now, all outbound traffic from your container app is routed to the firewall. Currently, the firewall still allows all outbound traffic through. In order to manage what outbound traffic is allowed or denied, you need to configure firewall policies.
128128

articles/container-apps/vnet-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -407,7 +407,7 @@ Remove-AzResourceGroup -Name $ResourceGroupName -Force
407407

408408
## Additional resources
409409

410-
- To use VNet-scope ingress, you must set up [DNS](./dns.md).
410+
- To use VNet-scope ingress, you must set up [DNS](./private-endpoint-with-dns.md).
411411

412412
## Next steps
413413

articles/private-link/inspect-traffic-with-azure-firewall.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Azure Firewall filters traffic using either:
4646
4747
## Scenario 1: Hub and spoke architecture - Dedicated virtual network for private endpoints
4848

49-
:::image type="content" source="./media/inspect-traffic-using-azure-firewall/hub-and-spoke.png" alt-text="Dedicated Virtual Network for Private Endpoints" border="true":::
49+
:::image type="content" source="./media/inspect-traffic-use-azure-firewall/hub-and-spoke.png" alt-text="Dedicated Virtual Network for Private Endpoints" border="true":::
5050

5151
This scenario is the most expandable architecture to connect privately to multiple Azure services using private endpoints. A route pointing to the network address space where the private endpoints are deployed is created. This configuration reduces administrative overhead and prevents running into the limit of 400 routes.
5252

@@ -56,7 +56,7 @@ For more information on charges related to connections with peered virtual netwo
5656

5757
## Scenario 2: Hub and spoke architecture - Shared virtual network for private endpoints and virtual machines
5858

59-
:::image type="content" source="./media/inspect-traffic-using-azure-firewall/shared-spoke.png" alt-text="Private Endpoints and Virtual Machines in same Virtual Network" border="true":::
59+
:::image type="content" source="./media/inspect-traffic-use-azure-firewall/shared-spoke.png" alt-text="Private Endpoints and Virtual Machines in same Virtual Network" border="true":::
6060

6161
This scenario is implemented when:
6262

@@ -76,13 +76,13 @@ For more information on charges related to connections with peered virtual netwo
7676

7777
## Scenario 3: Single virtual network
7878

79-
:::image type="content" source="./media/inspect-traffic-using-azure-firewall/single-vnet.png" alt-text="Single virtual network" border="true":::
79+
:::image type="content" source="./media/inspect-traffic-use-azure-firewall/single-vnet.png" alt-text="Single virtual network" border="true":::
8080

8181
Use this pattern when a migration to a hub and spoke architecture isn't possible. The same considerations as in scenario 2 apply. In this scenario, virtual network peering charges don't apply.
8282

8383
## Scenario 4: On-premises traffic to private endpoints
8484

85-
:::image type="content" source="./media/inspect-traffic-using-azure-firewall/on-premises.png" alt-text="On-premises traffic to private endpoints" border="true":::
85+
:::image type="content" source="./media/inspect-traffic-use-azure-firewall/on-premises.png" alt-text="On-premises traffic to private endpoints" border="true":::
8686

8787
This architecture can be implemented if you have configured connectivity with your on-premises network using either:
8888

0 commit comments

Comments
 (0)