You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-apps/ingress.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -100,15 +100,15 @@ You can get access to the environment's unique identifier by querying the enviro
100
100
101
101
## Inbound access restrictions by IP address ranges
102
102
103
-
By default, ingress does not filter traffic. You can add restrictions to limit access based on IP addresses. There are two ways to filter traffic:
103
+
By default, ingress doesn't filter traffic. You can add restrictions to limit access based on IP addresses. There are two ways to filter traffic:
104
104
105
-
*Allow list - deny all inbound traffic, but allow access from a list of IP address ranges
106
-
*Deny list - allow all inbound traffic, but deny access from a list of IP address ranges
105
+
*Allowlist - deny all inbound traffic, but allow access from a list of IP address ranges
106
+
*Denylist - allow all inbound traffic, but deny access from a list of IP address ranges
107
107
108
108
> [!NOTE]
109
109
> If defined, all rules must be the same type. You cannot combine allow rules and deny rules.
110
110
111
-
### Configure an allow list
111
+
### Configure an allowlist
112
112
113
113
To allow inbound traffic from a specified IP range, run the following Azure CLI command.
114
114
@@ -118,9 +118,9 @@ az containerapp ingress access-restriction set -n MyContainerapp -g MyResourceGr
118
118
--action Allow
119
119
```
120
120
121
-
You can add more allow rules by repeating the command with different IP address ranges. When one or more allow rules are configured, any traffic from an IP address that doesn't match any of the rules is denied.
121
+
Add more allow rules by repeating the command with different IP address ranges. When one or more allow rules are configured, any traffic from an IP address that doesn't match any of the rules is denied.
122
122
123
-
### Configure a deny list
123
+
### Configure a denylist
124
124
125
125
To deny inbound traffic from a specified IP range, run the following Azure CLI command.
126
126
@@ -130,7 +130,7 @@ az containerapp ingress access-restriction set -n MyContainerapp -g MyResourceGr
130
130
--action Deny
131
131
```
132
132
133
-
You can add more deny rules by repeating the command with different IP address ranges. When one or more allow rules are configured, any traffic from an IP address that doesn't match any of the rules is allowed.
133
+
Add more deny rules by repeating the command with different IP address ranges. When one or more allow rules are configured, any traffic from an IP address that doesn't match any of the rules is allowed.
0 commit comments