You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/create-url-route-portal.md
+15-17Lines changed: 15 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: application-gateway
5
5
author: greg-lindsay
6
6
ms.service: azure-application-gateway
7
7
ms.topic: tutorial
8
-
ms.date: 09/03/2024
8
+
ms.date: 02/05/2025
9
9
ms.author: greglin
10
10
#Customer intent: As an IT administrator, I want to use the Azure portal to set up an application gateway so I can route my app traffic based on path-based routing rules.
11
11
---
@@ -25,15 +25,12 @@ In this article, you learn how to:
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
31
29
32
30
## Prerequisites
33
31
34
32
- An Azure subscription
35
33
36
-
37
34
## Create virtual machines
38
35
39
36
In this example, you create three virtual machines to be used as backend servers for the application gateway. You also install IIS on the virtual machines to verify that the application gateway works as expected.
@@ -125,7 +122,7 @@ In this example, you create three virtual machines to be used as backend servers
125
122
126
123
### Backends tab
127
124
128
-
The backend pool is used to route requests to the backend servers that serve the request. Backend pools can be composed of NICs, virtual machine scale sets, public IPs, internal IPs, fully qualified domain names (FQDN), and multi-tenant backends like Azure App Service.
125
+
The backend pool is used to route requests to the backend servers that serve the request. Backend pools can be composed of NICs, virtual machine scale sets, public IPs, internal IPs, fully qualified domain names (FQDN), and multitenant backends like Azure App Service.
129
126
130
127
1. On the **Backends** tab, select **Add a backend pool**.
131
128
@@ -159,21 +156,22 @@ On the **Configuration** tab, you'll connect the frontend and backend pool you c
159
156
160
157
4. On the **Backend targets** tab, select **myBackendPool** for the **Backend target**.
161
158
162
-
5. For the **HTTP setting**, select **Add new** to create a new HTTP setting. The HTTP setting will determine the behavior of the routing rule.
159
+
5. For the **Backend settings**, select **Add new** to create a new HTTP setting. The HTTP setting will determine the behavior of the routing rule.
163
160
164
-
6. In the **Add an HTTP setting** window that opens, enter *myHTTPSetting* for the **HTTP setting name**. Accept the default values for the other settings in the **Add an HTTP setting** window, then select **Add** to return to the **Add a routing rule** window.
161
+
6. In the **Add Backend setting** window that opens, enter *myHTTPSetting* for the **Backend settings name**. Accept the default values for the other settings in the **Add Backend setting** window, then select **Add** to return to the **Add a routing rule** window.
165
162
7. Under **Path-based routing**, select **Add multiple targets to create a path-based rule**.
166
-
8. For **Path**, type */images/*\*.
167
-
9. For **Target name**, type *Images*.
168
-
10. For **HTTP setting**, select **myHTTPSetting**
169
-
11. For **Backend target**, select **Images**.
170
-
12. Select **Add** to save the path rule and return to the **Add a routing rule** tab.
171
-
13. Repeat to add another rule for Video.
172
-
14. Select **Add** to add the routing rule and return to the **Configuration** tab.
173
-
15. Select **Next: Tags** and then **Next: Review + create**.
163
+
1. Under **Path based rules**, select **Add multiple targets to create a path-based rule**.
164
+
1. For **Path**, type */images/*\*.
165
+
1. For **Target name**, type *Images*.
166
+
1. For **Backend settings**, select **myHTTPSetting**
167
+
1. For **Backend target**, select **myBackendPool**.
168
+
1. Select **Add** to save the path rule and return to the **Add a routing rule** tab.
169
+
1. Repeat to add another rule for Video.
170
+
1. Select **Add** to add the routing rule and return to the **Configuration** tab.
171
+
1. Select **Next: Tags** and then **Next: Review + create**.
174
172
175
173
> [!NOTE]
176
-
> You do not need to add a custom */** path rule to handle default cases. This is automatically handled by the default backend pool.
174
+
> You don't need to add a custom */** path rule to handle default cases. This is automatically handled by the default backend pool.
177
175
178
176
> [!NOTE]
179
177
> Wildcard delimiter **\*** is only honored at the end of the rule. For more information and supported path based rules examples, see [URL Path Based Routing overview](url-route-overview.md#pathpattern).
@@ -187,7 +185,7 @@ Review the settings on the **Review + create** tab, and then select **Create** t
187
185
188
186
1. Select **All resources**, and then select **myAppGateway**.
189
187
190
-

188
+
:::image type="content" source="./media/application-gateway-create-url-route-portal/application-gateway-record-ag-address.png" alt-text="Screenshot of record application gateway public IP address.":::
191
189
192
190
2. Copy the public IP address, and then paste it into the address bar of your browser. Such as, http:\//203.0.113.10:8080.
# Customer intent: As a developer, I want to understand how to use a secured storage account in a virtual network as the default storage account for my function app, so that my function app can be secure.
9
9
---
10
10
11
11
# How to use a secured storage account with Azure Functions
12
12
13
-
This article shows you how to connect your function appto a secured storage account. For an in-depth tutorial on how to create your function app with inbound and outbound access restrictions, see the [Integrate with a virtual network](functions-create-vnet.md) tutorial. To learn more about Azure Functions and networking, see [Azure Functions networking options](functions-networking-options.md).
13
+
Azure Functions requires an Azure Storage account when you create a function app instance. This default storage account is used by the Functions runtime to maintain the health of your function app. For more information, see [Storage considerations for Azure Functions](storage-considerations.md). This article shows you how to use a secured storage account as the default storage account. For an in-depth tutorial on how to create your function app with inbound and outbound access restrictions, see the [Integrate with a virtual network](functions-create-vnet.md) tutorial. To learn more about Azure Functions and networking, see [Azure Functions networking options](functions-networking-options.md).
14
14
15
15
## Restrict your storage account to a virtual network
16
16
17
-
When you create a function app, you either create a new storage account or link to an existing one. Currently, only the Azure portal, [ARM template deployments](functions-infrastructure-as-code.md?tabs=json&pivots=premium-plan#secured-deployments), and [Bicep deployments](functions-infrastructure-as-code.md?tabs=bicep&pivots=premium-plan#secured-deployments) support function app creation with an existing secured storage account.
17
+
When you create a function app, you either create a new storage account or link to an existing one. Keep these considerations in mind when working with secured storage account.
18
18
19
-
> [!NOTE]
20
-
> Secured storage accounts are supported for all tiers of the [Dedicated (App Service) plan](./dedicated-plan.md) and the [Elastic Premium plan](./functions-premium-plan.md). They're also supported by the [Flex Consumption plan](./flex-consumption-plan.md).
21
-
> The [Consumption plan](consumption-plan.md) doesn't support virtual networks.
22
-
23
-
For a list of all restrictions on storage accounts, see [Storage account requirements](storage-considerations.md#storage-account-requirements).
19
+
+ To create a function app that uses an existing secured storage account as the default storage account, you must create your app either in the [Azure portal](https://portal.azure.com) or by using [ARM template](functions-infrastructure-as-code.md?tabs=json&pivots=premium-plan#secured-deployments) or [Bicep](functions-infrastructure-as-code.md?tabs=bicep&pivots=premium-plan#secured-deployments) deployments.
20
+
+ When using a secured storage account with a dynamic scale plan, you should host your functions in the [Flex Consumption plan](./flex-consumption-plan.md). This plan supports both secured storage accounts and managed identity-based connections to storage, which is the most secure connection option.
21
+
+ All tiers of both the [Dedicated (App Service) plan](./dedicated-plan.md) and the [Elastic Premium plan](./functions-premium-plan.md) also support secure storage accounts. However, there are trade-offs when using managed identities to connect from a Premium plan app. For more information, see [Create an app without Azure Files](storage-considerations.md#create-an-app-without-azure-files).
22
+
+ The [Consumption plan](consumption-plan.md) doesn't support virtual networks, so you can't connect to a secured storage account when running in the Consumption plan. To take advantage of serverless function hosting, you should instead recreate your app to run in Flex Consumption plan.
23
+
+ This article currently shows you how to create a function app in a Premium plan that connects to a secured storage account using the storage account connection string. To provide the best protection of storage account credentials, you should instead use managed identities when connecting to a storage account. Instead follow the [Quickstart: Create and deploy functions to Azure Functions using the Azure Developer CLI](create-first-function-azure-developer-cli.md) to create a function app in the Flex Consumption plan that connects to a new secured storage account using managed identities.
24
+
+ For a list of all restrictions on storage accounts, see [Storage account requirements](storage-considerations.md#storage-account-requirements).
24
25
25
26
## Secure storage during function app creation
26
27
@@ -59,7 +60,7 @@ Set up a secured storage account for your function app:
59
60
60
61
1.[Create a second storage account](../storage/common/storage-account-create.md). This storage account is the secured storage account for your function app to use instead of its original unsecured storage account. You can also use an existing storage account not already being used by Functions.
61
62
62
-
1. Save the connection string for this storage account to use later.
63
+
1. Save the connection string for this storage account to use later.
63
64
64
65
1.[Create a file share](../storage/files/storage-how-to-create-file-share.md#create-a-file-share) in the new storage account. For your convenience, you can use the same file share name from your original storage account. Otherwise, if you use a new file share name, you must update your app setting.
0 commit comments