Skip to content

Commit f456eea

Browse files
authored
Merge pull request #293855 from JoshTheTechWriter/italics-to-bold-2
Second PR for italics to bold bulk updates
2 parents b1ba209 + 718160e commit f456eea

19 files changed

+70
-70
lines changed

articles/spring-apps/basic-standard/how-to-deploy-in-azure-virtual-network.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -72,16 +72,16 @@ If you already have a virtual network to host an Azure Spring Apps instance, ski
7272
|-----------------|--------------------------------------------------|
7373
| Subscription | Select your subscription. |
7474
| Resource group | Select your resource group, or create a new one. |
75-
| Name | Enter *azure-spring-apps-vnet*. |
75+
| Name | Enter **azure-spring-apps-vnet**. |
7676
| Location | Select **East US**. |
7777

7878
1. Select **Next: IP Addresses**.
7979

80-
1. For the IPv4 address space, enter *10.1.0.0/16*.
80+
1. For the IPv4 address space, enter **10.1.0.0/16**.
8181

82-
1. Select **Add subnet**. Then enter *service-runtime-subnet* for **Subnet name** and enter *10.1.0.0/24* for **Subnet address range**. Then select **Add**.
82+
1. Select **Add subnet**. Then enter **service-runtime-subnet** for **Subnet name** and enter **10.1.0.0/24** for **Subnet address range**. Then select **Add**.
8383

84-
1. Select **Add subnet** again, and then enter the subnet name and subnet address range. For example, enter *apps-subnet* and *10.1.1.0/24*. Then select **Add**.
84+
1. Select **Add subnet** again, and then enter the subnet name and subnet address range. For example, enter **apps-subnet** and **10.1.1.0/24**. Then select **Add**.
8585

8686
1. Select **Review + create**. Leave the rest as defaults, and select **Create**.
8787

@@ -258,7 +258,7 @@ Those network resources are connected to your virtual network created in the pre
258258
:::image type="content" source="./media/how-to-deploy-in-azure-virtual-network/vnet-with-connected-device.png" alt-text="Screenshot of the Azure portal showing the Connected devices page for a virtual network." lightbox="./media/how-to-deploy-in-azure-virtual-network/vnet-with-connected-device.png":::
259259

260260
> [!IMPORTANT]
261-
> The resource groups are fully managed by the Azure Spring Apps service. Do *not* manually delete or modify any resource inside.
261+
> The resource groups are fully managed by the Azure Spring Apps service. Do not manually delete or modify any resource inside.
262262
263263
## Using smaller subnet ranges
264264

articles/spring-apps/basic-standard/how-to-deploy-with-custom-container-image.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ To disable listening on a port for images that aren't web applications, add the
8181

8282
:::image type="content" source="media/how-to-deploy-with-custom-container-image/create-app-custom-container.png" alt-text="Screenshot of Azure portal Create App page with Runtime platform dropdown showing and Custom Container selected." lightbox="media/how-to-deploy-with-custom-container-image/create-app-custom-container.png":::
8383

84-
1. Select **Edit** under *Image*, then fill in the fields as shown in the following image:
84+
1. Select **Edit** under **Image**, then fill in the fields as shown in the following image:
8585

8686
:::image type="content" source="media/how-to-deploy-with-custom-container-image/custom-image-settings.png" alt-text="Screenshot of Azure portal that shows the Custom Image Settings pane." lightbox="media/how-to-deploy-with-custom-container-image/custom-image-settings.png":::
8787

@@ -142,15 +142,15 @@ The following points will help you address common situations when deploying with
142142

143143
There are two options to trust a Certificate Authority:
144144

145-
**Option 1: Upload via Azure Spring Apps**
145+
Option 1: Upload via Azure Spring Apps
146146

147-
To load the CA certs into your apps, see [Use TLS/SSL certificates in your application in Azure Spring Apps](how-to-use-tls-certificate.md). Then the certs will be mounted into the location */etc/azure-spring-cloud/certs/public/*.
147+
To load the CA certs into your apps, see [Use TLS/SSL certificates in your application in Azure Spring Apps](how-to-use-tls-certificate.md). Then the certs will be mounted into the location **/etc/azure-spring-cloud/certs/public/**.
148148

149-
**Option 2: Manual installation in the image**
149+
Option 2: Manual installation in the image
150150

151151
To trust a CA in the image, set the following variables depending on your environment:
152152

153-
* You must import Java applications into the trust store by adding the following lines into your *Dockerfile*:
153+
* You must import Java applications into the trust store by adding the following lines into your **Dockerfile**:
154154

155155
```dockerfile
156156
ADD EnterpriseRootCA.crt /opt/
@@ -191,9 +191,9 @@ If you deployed the instance to a VNet, make sure you allow the network traffic
191191

192192
### Install an APM into the image manually
193193

194-
The installation steps vary on different application performance monitors (APMs) and languages. The following steps are for New Relic with Java applications. You must modify the *Dockerfile* using the following steps:
194+
The installation steps vary on different application performance monitors (APMs) and languages. The following steps are for New Relic with Java applications. You must modify the **Dockerfile** using the following steps:
195195

196-
1. Download and install the agent file into the image by adding the following to the *Dockerfile*:
196+
1. Download and install the agent file into the image by adding the following to the **Dockerfile**:
197197

198198
```dockerfile
199199
ADD newrelic-agent.jar /opt/agents/newrelic/java/newrelic-agent.jar

articles/spring-apps/basic-standard/how-to-dynatrace-one-agent-monitor.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The following sections describe how to activate Dynatrace OneAgent.
4343
### Prepare your Azure Spring Apps environment
4444

4545
1. Create an instance of Azure Spring Apps.
46-
1. Create an application that you want to report to Dynatrace by running the following command. Replace the placeholders *\<...>* with your own values.
46+
1. Create an application that you want to report to Dynatrace by running the following command. Replace the placeholders `<...>` with your own values.
4747
```azurecli
4848
az spring app create \
4949
--resource-group <your-resource-group-name> \
@@ -64,7 +64,7 @@ You can add the environment variable key/value pairs to your application using e
6464

6565
#### Option 1: Azure CLI
6666

67-
To add the key/value pairs using the Azure CLI, run the following command, replacing the placeholders *\<...>* with the values determined in the previous steps.
67+
To add the key/value pairs using the Azure CLI, run the following command, replacing the placeholders `<...>` with the values determined in the previous steps.
6868

6969
```azurecli
7070
az spring app deploy \
@@ -98,7 +98,7 @@ Using Terraform, Bicep, or Azure Resource Manager template (ARM template), you c
9898

9999
### Automate provisioning using Terraform
100100

101-
To configure the environment variables in a Terraform template, add the following code to the template, replacing the *\<...>* placeholders with your own values. For more information, see [Manages an Active Azure Spring Apps Deployment](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/spring_cloud_active_deployment).
101+
To configure the environment variables in a Terraform template, add the following code to the template, replacing the `<...>` placeholders with your own values. For more information, see [Manages an Active Azure Spring Apps Deployment](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/spring_cloud_active_deployment).
102102

103103
```terraform
104104
environment_variables = {
@@ -111,7 +111,7 @@ environment_variables = {
111111

112112
### Automate provisioning using a Bicep file
113113

114-
To configure the environment variables in a Bicep file, add the following code to the file, replacing the *\<...>* placeholders with your own values. For more information, see [Microsoft.AppPlatform Spring/apps/deployments](/azure/templates/microsoft.appplatform/spring/apps/deployments?tabs=bicep).
114+
To configure the environment variables in a Bicep file, add the following code to the file, replacing the `<...>` placeholders with your own values. For more information, see [Microsoft.AppPlatform Spring/apps/deployments](/azure/templates/microsoft.appplatform/spring/apps/deployments?tabs=bicep).
115115

116116
```bicep
117117
environmentVariables: {
@@ -124,7 +124,7 @@ environmentVariables: {
124124

125125
### Automate provisioning using an ARM template
126126

127-
To configure the environment variables in an ARM template, add the following code to the template, replacing the *\<...>* placeholders with your own values. For more information, see [Microsoft.AppPlatform Spring/apps/deployments](/azure/templates/microsoft.appplatform/spring/apps/deployments?tabs=json).
127+
To configure the environment variables in an ARM template, add the following code to the template, replacing the `<...>` placeholders with your own values. For more information, see [Microsoft.AppPlatform Spring/apps/deployments](/azure/templates/microsoft.appplatform/spring/apps/deployments?tabs=json).
128128

129129
```json
130130
"environmentVariables": {

articles/spring-apps/basic-standard/how-to-elastic-apm-java-agent-monitor.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ Before proceeding, you need your Elastic APM server connectivity information han
8989

9090
:::image type="content" source="media/how-to-elastic-apm-java-agent-monitor/upload-files-microsoft-azure.png" alt-text="Screenshot of the Azure portal that shows the Upload files pane of the File share page." lightbox="media/how-to-elastic-apm-java-agent-monitor/upload-files-microsoft-azure.png":::
9191

92-
1. After you have the Elastic APM endpoint and secret token, use the following command to activate Elastic APM Java agent when deploying applications. The placeholder *`<agent-location>`* refers to the mounted storage location of the Elastic APM Java Agent.
92+
1. After you have the Elastic APM endpoint and secret token, use the following command to activate Elastic APM Java agent when deploying applications. The placeholder `<agent-location>` refers to the mounted storage location of the Elastic APM Java Agent.
9393

9494
```azurecli
9595
az spring app deploy \
@@ -108,7 +108,7 @@ You can also run a provisioning automation pipeline using Terraform, Bicep, or a
108108

109109
### Automate provisioning using Terraform
110110

111-
To configure the environment variables in a Terraform template, add the following code to the template, replacing the *\<...>* placeholders with your own values. For more information, see [Manages an Active Azure Spring Apps Deployment](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/spring_cloud_active_deployment).
111+
To configure the environment variables in a Terraform template, add the following code to the template, replacing the `<...>` placeholders with your own values. For more information, see [Manages an Active Azure Spring Apps Deployment](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/spring_cloud_active_deployment).
112112

113113
```terraform
114114
resource "azurerm_spring_cloud_java_deployment" "example" {
@@ -126,7 +126,7 @@ resource "azurerm_spring_cloud_java_deployment" "example" {
126126

127127
### Automate provisioning using a Bicep file
128128

129-
To configure the environment variables in a Bicep file, add the following code to the file, replacing the *\<...>* placeholders with your own values. For more information, see [Microsoft.AppPlatform Spring/apps/deployments](/azure/templates/microsoft.appplatform/spring/apps/deployments?tabs=bicep).
129+
To configure the environment variables in a Bicep file, add the following code to the file, replacing the `<...>` placeholders with your own values. For more information, see [Microsoft.AppPlatform Spring/apps/deployments](/azure/templates/microsoft.appplatform/spring/apps/deployments?tabs=bicep).
130130

131131
```bicep
132132
deploymentSettings: {
@@ -143,7 +143,7 @@ deploymentSettings: {
143143

144144
### Automate provisioning using an ARM template
145145

146-
To configure the environment variables in an ARM template, add the following code to the template, replacing the *\<...>* placeholders with your own values. For more information, see [Microsoft.AppPlatform Spring/apps/deployments](/azure/templates/microsoft.appplatform/spring/apps/deployments?tabs=json).
146+
To configure the environment variables in an ARM template, add the following code to the template, replacing the `<...>` placeholders with your own values. For more information, see [Microsoft.AppPlatform Spring/apps/deployments](/azure/templates/microsoft.appplatform/spring/apps/deployments?tabs=json).
147147

148148
```json
149149
"deploymentSettings": {
@@ -170,7 +170,7 @@ Use the following steps to monitor applications and metrics:
170170

171171
:::image type="content" source="media/how-to-elastic-apm-java-agent-monitor/elastic-apm-get-kibana-link.png" alt-text="Screenshot of the Azure portal that shows the Elasticsearch page with the Deployment URL Kibana link highlighted." lightbox="media/how-to-elastic-apm-java-agent-monitor/elastic-apm-get-kibana-link.png":::
172172

173-
1. After Kibana is open, search for *APM* in the search bar, then select **APM**.
173+
1. After Kibana is open, search for **APM** in the search bar, then select **APM**.
174174

175175
:::image type="content" source="media/how-to-elastic-apm-java-agent-monitor/elastic-apm-kibana-search-apm.png" alt-text="Screenshot of Elastic / Kibana that shows the APM search results." lightbox="media/how-to-elastic-apm-java-agent-monitor/elastic-apm-kibana-search-apm.png":::
176176

articles/spring-apps/basic-standard/how-to-elastic-diagnostic-settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Use the following steps to analyze the logs:
6868

6969
Application logs provide critical information and verbose logs about your application's health, performance, and more. Use the following steps to analyze the logs:
7070

71-
1. In Kibana, in the **Search** bar at top, type *Discover*, then select the result.
71+
1. In Kibana, in the **Search** bar at top, type **Discover**, then select the result.
7272

7373
:::image type="content" source="media/how-to-elastic-diagnostic-settings/elastic-kibana-go-discover.png" alt-text="Screenshot of Elastic / Kibana that shows the search results for Discover." lightbox="media/how-to-elastic-diagnostic-settings/elastic-kibana-go-discover.png":::
7474

@@ -148,7 +148,7 @@ Kibana allows you to visualize data with Dashboards and a rich ecosystem of visu
148148

149149
Use the following steps to show the various log levels in your logs so you can assess the overall health of the services.
150150

151-
1. From the available fields list on left in **Discover**, search for *log.level* in the search box under the **logs-** index pattern.
151+
1. From the available fields list on left in **Discover**, search for **log.level** in the search box under the **logs-** index pattern.
152152

153153
1. Select the **log.level** field. From the floating informational panel about **log.level**, select **Visualize**.
154154

articles/spring-apps/basic-standard/how-to-enable-ingress-to-app-tls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ To enable ingress-to-app TLS in the [Azure portal](https://portal.azure.com/), f
7575
1. Create an app in the portal as you normally would. Navigate to it in the portal.
7676
2. Scroll down to the **Settings** group in the left navigation pane.
7777
3. Select **Ingress-to-app TLS**.
78-
4. Switch **Ingress-to-app TLS** to *Yes*.
78+
4. Switch **Ingress-to-app TLS** to **Yes**.
7979

8080
:::image type="content" source="media/how-to-enable-ingress-to-app-tls/enable-i2a-tls.png" alt-text="Screenshot of the Azure portal that shows the app Ingress-to-app TLS page." lightbox="media/how-to-enable-ingress-to-app-tls/enable-i2a-tls.png":::
8181

articles/spring-apps/basic-standard/how-to-enable-system-assigned-managed-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,15 +52,15 @@ To set up a managed identity in the portal, first create an app, and then enable
5252
1. Create an app in the portal as you normally would. Navigate to it in the portal.
5353
2. Scroll down to the **Settings** group in the left navigation pane.
5454
3. Select **Identity**.
55-
4. Within the **System assigned** tab, switch **Status** to *On*. Select **Save**.
55+
4. Within the **System assigned** tab, switch **Status** to **On**. Select **Save**.
5656

5757
### [Azure CLI](#tab/azure-cli)
5858

5959
You can enable system-assigned managed identity during app creation or on an existing app.
6060

6161
### Enable system-assigned managed identity during creation of an app
6262

63-
The following example creates an app named *app_name* with a system-assigned managed identity, as requested by the `--assign-identity` parameter.
63+
The following example creates an app named `app_name` with a system-assigned managed identity, as requested by the `--assign-identity` parameter.
6464

6565
```azurecli
6666
az spring app create \

articles/spring-apps/basic-standard/how-to-github-actions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ az spring app create --name solar-system-weather
107107

108108
### Deploy with Azure CLI directly
109109

110-
Create the *.github/workflows/main.yml* file in the repository with the following content. Replace *\<your resource group name>* and *\<your service name>* with the correct values.
110+
Create the **.github/workflows/main.yml** file in the repository with the following content. Replace `<your resource group name>` and `<your service name>` with the correct values.
111111

112112
```yaml
113113
name: Steeltoe-CD
@@ -238,7 +238,7 @@ Azure Spring Apps supports deploying to deployments with built artifacts (for ex
238238
The following example deploys to the default production deployment in Azure Spring Apps using JAR file built by Maven. This example is the only possible deployment scenario when using the Basic SKU:
239239

240240
> [!NOTE]
241-
> The package search pattern should only return exactly one package. If the build task produces multiple JAR packages such as *sources.jar* and *javadoc.jar*, you need to refine the search pattern so that it only matches the application binary artifact.
241+
> The package search pattern should only return exactly one package. If the build task produces multiple JAR packages such as **sources.jar** and **javadoc.jar**, you need to refine the search pattern so that it only matches the application binary artifact.
242242
243243
```yml
244244
name: AzureSpringApps
@@ -528,7 +528,7 @@ jobs:
528528

529529
## Run the workflow
530530

531-
GitHub **Actions** should be enabled automatically after you push *.github/workflow/main.yml* to GitHub. The action is triggered when you push a new commit. If you create this file in the browser, your action should have already run.
531+
GitHub **Actions** should be enabled automatically after you push **.github/workflow/main.yml** to GitHub. The action is triggered when you push a new commit. If you create this file in the browser, your action should have already run.
532532

533533
To verify that the action has been enabled, select the **Actions** tab on the GitHub repository page:
534534

articles/spring-apps/basic-standard/how-to-integrate-azure-load-balancers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ We recommend that the domain name, as seen by the browser, is the same as the ho
3939

4040
## Integrate Azure Spring Apps with Azure Traffic Manager
4141

42-
To integrate Azure Spring Apps with Traffic Manager, add its public endpoints as traffic managers endpoints and then configure custom domain for both traffic manager and Azure Spring Apps.
42+
To integrate Azure Spring Apps with Traffic Manager, add its public endpoints as traffic manager's endpoints and then configure custom domain for both traffic manager and Azure Spring Apps.
4343

4444
### Add Endpoint in Traffic Manager
4545

@@ -57,15 +57,15 @@ Add endpoints in traffic manager:
5757

5858
To finish the configuration:
5959

60-
1. Sign in to the website of your domain provider, and create a CNAME record mapping from your custom domain to traffic managers Azure default domain name.
60+
1. Sign in to the website of your domain provider, and create a CNAME record mapping from your custom domain to traffic manager's Azure default domain name.
6161

6262
## Integrate Azure Spring Apps with Azure App Gateway
6363

6464
To integrate with Azure Spring Apps service, complete the following configurations:
6565

6666
### Configure Backend Pool
6767

68-
1. Specify **Target type** as *IP address* or *FQDN*.
68+
1. Specify **Target type** as **IP address** or **FQDN**.
6969
1. Enter your Azure Spring Apps public endpoints.
7070

7171
:::image type="content" source="media/how-to-integrate-azure-load-balancers/app-gateway-1.png" alt-text="Screenshot of the Azure portal that shows the Add backend pool page with the Backend targets values highlighted." lightbox="media/how-to-integrate-azure-load-balancers/app-gateway-1.png":::

articles/spring-apps/basic-standard/how-to-intellij-deploy-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,9 @@ The following procedures deploy a Hello World application using IntelliJ IDEA.
5151
## Open gs-spring-boot project
5252

5353
1. Download and unzip the source repository for this tutorial, or clone it using the following Git command: `git clone https://github.com/spring-guides/gs-spring-boot.git`
54-
1. Navigate to the *gs-spring-boot\complete* folder.
54+
1. Navigate to the **gs-spring-boot\complete** folder.
5555
1. Open IntelliJ **Welcome** dialog, select **Import Project** to open the import wizard.
56-
1. Select the *gs-spring-boot\complete* folder.
56+
1. Select the **gs-spring-boot\complete** folder.
5757

5858
:::image type="content" source="media/how-to-intellij-deploy-apps/import-project.png" alt-text="Screenshot of IntelliJ IDEA Open File or Project dialog box with complete folder highlighted." lightbox="media/how-to-intellij-deploy-apps/import-project.png":::
5959

0 commit comments

Comments
 (0)