Skip to content

Commit f841328

Browse files
authored
Apply acrolinx suggestions
1 parent fdf5373 commit f841328

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/container-apps/ingress.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -100,15 +100,15 @@ You can get access to the environment's unique identifier by querying the enviro
100100

101101
## Inbound access restrictions by IP address ranges
102102

103-
By default, ingress does not filter traffic. You can add restrictions to limit access based on IP addresses. There are two ways to filter traffic:
103+
By default, ingress doesn't filter traffic. You can add restrictions to limit access based on IP addresses. There are two ways to filter traffic:
104104

105-
* Allow list - deny all inbound traffic, but allow access from a list of IP address ranges
106-
* Deny list - allow all inbound traffic, but deny access from a list of IP address ranges
105+
* Allowlist - deny all inbound traffic, but allow access from a list of IP address ranges
106+
* Denylist - allow all inbound traffic, but deny access from a list of IP address ranges
107107

108108
> [!NOTE]
109109
> If defined, all rules must be the same type. You cannot combine allow rules and deny rules.
110110
111-
### Configure an allow list
111+
### Configure an allowlist
112112

113113
To allow inbound traffic from a specified IP range, run the following Azure CLI command.
114114

@@ -118,9 +118,9 @@ az containerapp ingress access-restriction set -n MyContainerapp -g MyResourceGr
118118
--action Allow
119119
```
120120

121-
You can add more allow rules by repeating the command with different IP address ranges. When one or more allow rules are configured, any traffic from an IP address that doesn't match any of the rules is denied.
121+
Add more allow rules by repeating the command with different IP address ranges. When one or more allow rules are configured, any traffic from an IP address that doesn't match any of the rules is denied.
122122

123-
### Configure a deny list
123+
### Configure a denylist
124124

125125
To deny inbound traffic from a specified IP range, run the following Azure CLI command.
126126

@@ -130,7 +130,7 @@ az containerapp ingress access-restriction set -n MyContainerapp -g MyResourceGr
130130
--action Deny
131131
```
132132

133-
You can add more deny rules by repeating the command with different IP address ranges. When one or more allow rules are configured, any traffic from an IP address that doesn't match any of the rules is allowed.
133+
Add more deny rules by repeating the command with different IP address ranges. When one or more allow rules are configured, any traffic from an IP address that doesn't match any of the rules is allowed.
134134

135135
### Remove access restrictions
136136

0 commit comments

Comments
 (0)