Skip to content

Commit f56f1a6

Browse files
committed
add diagram to ingres-overview
1 parent 28fddda commit f56f1a6

File tree

7 files changed

+20
-17
lines changed

7 files changed

+20
-17
lines changed

articles/container-apps/client-certificate-authorization.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,19 +12,18 @@ ms.author: cshoe
1212
# Configure client certificate authentication in Azure Container Apps
1313

1414
Azure Container Apps supports client certificate authentication (also known as mutual TLS or mTLS) that allows access to your container app through two-way authentication. This article shows you how to configure client certificate authorization in Azure Container Apps.
15-
15+
1616
When client certificates are used, the TLS certificates are exchanged between the client and your container app to authenticate identity and encrypt traffic. Client certificates are often used in "zero trust" security models to authorize client access within an organization.
1717

1818
For example, you may want to require a client certificate for a container app that manages sensitive data.
1919

2020
Container Apps accepts client certificates in the PKCS12 format are that issued by a trusted certificate authority (CA), or are self-signed.
2121

22-
>[!NOTE]
23-
> Client certificate authorization is only supported in Container Apps environments that use a [custom VNET](vnet-custom.md).
24-
2522
## Configure client certificate authorization
2623

27-
The client certificate mode property available as you enable [ingress](./ingress-how-to.md) on your container app. The property can be set to one of the following values:
24+
Set the `clientCertificateMode` property in your container app template to configure support of client certificates.
25+
26+
The property can be set to one of the following values:
2827

2928
- `require`: The client certificate is required for all requests to the container app.
3029
- `accept`: The client certificate is optional. If the client certificate isn't provided, the request is still accepted.

articles/container-apps/ingress-how-to.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,8 @@ Disable ingress for your container app by omitting the `ingress` configuration p
161161

162162
---
163163

164+
::: zone-end
165+
164166
## Next steps
165167

166168
> [!div class="nextstepaction"]

articles/container-apps/ingress-overview.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,10 @@ Ingress supports:
2323
- [Traffic splitting between revisions](#traffic-splitting)
2424
- [Session affinity](#session-affinity)
2525

26-
<!--
27-
> [!NOTE]
28-
> Add diagram here, Talked with Anthony about this. He thought that we should consult Ahmed. I think that we should have a diagram that shows the ingress options and how they work together.
29-
-->
26+
Example ingress configuration showing ingress split between two revisions:
27+
28+
:::image type="content" source="media/ingress/ingress-diagram.png" alt-text="Diagram showing an ingress configuration splitting traffic between two revisions.":::
29+
3030
For configuration details, see [Configure ingress](ingress-how-to.md).
3131

3232
## External and internal ingress
@@ -85,6 +85,8 @@ You can access your app in the following ways:
8585
- A custom domain name: You can configure a custom DNS domain for your Container Apps environment. For more information, see [Custom domain names and certificates](./custom-domains-certificates.md).
8686
- The app name: You can use the app name for communication between apps in the same environment.
8787

88+
To get the FQDN for your app, see [Location](connect-apps.md#location).
89+
8890
## IP restrictions
8991

9092
Container Apps supports IP restrictions for ingress. You can create rules to either configure IP addresses that are allowed or denied access to your container app. For more information, see [Configure IP restrictions](ip-restrictions.md).

articles/container-apps/ip-restrictions.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ There are two types of restrictions:
1919
* *Allow*: Allow inbound traffic only from address ranges you specify in allow rules.
2020
* *Deny*: Deny all inbound traffic only from address ranges you specify in deny rules.
2121

22-
If no IP restriction rules are defined, all inbound traffic is allowed.
22+
when no IP restriction rules are defined, all inbound traffic is allowed.
2323

24-
IP restrictions are defined by one or more rules with the following properties:
24+
IP restrictions rules contain the following properties:
2525

2626
| Property | Value | Description |
2727
|----------|-------|-------------|
@@ -30,7 +30,7 @@ IP restrictions are defined by one or more rules with the following properties:
3030
| ipAddressRange | IP address range in CIDR format | The IP address range in CIDR notation. |
3131
| action | Allow or Deny | The action to take for the rule. |
3232

33-
The ipAddressRange parameter accepts IPv4 addresses. Define each IPv4 address block in [Classless Inter-Domain Routing (CIDR)](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) notation.
33+
The `ipAddressRange` parameter accepts IPv4 addresses. Define each IPv4 address block in [Classless Inter-Domain Routing (CIDR)](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) notation.
3434

3535
> [!NOTE]
3636
> All rules must be the same type. You cannot combine allow rules and deny rules.
@@ -108,7 +108,7 @@ Add more rules by repeating the command with a different `--rule-name` and -`--i
108108

109109
#### Create allow rules
110110

111-
The following example `az containerapp access-restriction set` command creates a rule to restrict inbound access to a IP address range. Note that you must delete any existing deny rules before you can add allow rules.
111+
The following example `az containerapp access-restriction set` command creates a rule to restrict inbound access to an IP address range. You must delete any existing deny rules before you can add any allow rules.
112112

113113
Replace the values in the following example with your own values.
114114

@@ -126,7 +126,7 @@ You can add to the allow rules by repeating the command with a different `--ip-a
126126

127127
#### Create deny rules
128128

129-
The following example of the `az containerapp access-restriction set` command creates an access rule to deny inbound traffic from a specified IP range. Note that you must delete any existing allow rules before you can add deny rules.
129+
The following example of the `az containerapp access-restriction set` command creates an access rule to deny inbound traffic from a specified IP range. You must delete any existing allow rules before you can add deny rules.
130130

131131
Replace the placeholders in the following example with your own values.
132132

@@ -146,7 +146,7 @@ You can add to the deny rules by repeating the command with a different `--ip-ad
146146

147147
You can update a rule using the `az containerapp ingress access-restriction set` command. You can change the IP address range and the rule description, but not the rule name or action.
148148

149-
The `--action` parameter is required, but you cannot change the action from Allow to Deny or vice versa.
149+
The `--action` parameter is required, but you can't change the action from Allow to Deny or vice versa.
150150
If you omit the `---description` parameter, the description is deleted.
151151

152152
The following example updates the ip address range.
62.1 KB
Loading

articles/container-apps/sticky-sessions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Session affinity, also known as sticky sessions, is a feature that allows you to
1818

1919
Session stickiness is enforced using HTTP cookies. This feature is available in single revision mode when HTTP ingress is enabled. A client may be routed to a new replica if the previous replica is no longer available.
2020

21-
If your app doesn't require session affinity, we recommend that you don't enable it. This allows the ingress to distribute requests more evenly across replicas, which improves the performance of your app.
21+
If your app doesn't require session affinity, we recommend that you don't enable it. With session affinity disabled, ingress distributes requests more evenly across replicas improving the performance of your app.
2222

2323
Note session affinity is only supported when your app is in [single revision mode](revisions.md#single-revision-mode) and the ingress type is HTTP.
2424

articles/container-apps/traffic-splitting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ The following example shows traffic splitting between two revisions by name:
124124
},
125125
```
126126

127-
The following example shows traffic splitting between two revision by label:
127+
The following example shows traffic splitting between two revisions by label:
128128

129129
```json
130130
{

0 commit comments

Comments
 (0)