Skip to content

Commit 4884198

Browse files
Merge pull request #312389 from jlian/draft/production-checklist-improvements
Improve production checklist with concrete examples
2 parents 658d541 + 4766511 commit 4884198

1 file changed

Lines changed: 23 additions & 1 deletion

File tree

articles/iot-edge/production-checklist.md

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -337,7 +337,10 @@ This checklist is a starting point for firewall rules:
337337

338338
<sup>1</sup>Open port 8883 for secure MQTT or port 5671 for secure AMQP. If you can only make connections through port 443, then either of these protocols can run through a WebSocket tunnel.
339339

340-
Since the IP address of an IoT hub can change without notice, always use the FQDN in your allowlist configuration. For more information, see [Understanding the IP address of your IoT Hub](../iot-hub/iot-hub-understand-ip-address.md).
340+
> [!TIP]
341+
> For tighter security, replace wildcard FQDNs with specific endpoints where possible. For example, replace `*.azure-devices.net` with `<your-hub-name>.azure-devices.net`. Replace `*.azurecr.io` with `<your-registry-name>.azurecr.io`. Enterprise security teams often reject wildcard rules, so plan for specific FQDNs in production.
342+
343+
Since the IP address of an IoT hub can change without notice, always use the FQDN to allowlist configuration. To learn more, see [Understanding the IP address of your IoT Hub](../iot-hub/iot-hub-understand-ip-address.md).
341344

342345
Some of these firewall rules are inherited from Azure Container Registry. For more information, see [Configure rules to access an Azure container registry behind a firewall](/azure/container-registry/container-registry-firewall-access-rules).
343346

@@ -375,6 +378,14 @@ Specify the DNS server for your environment in the container engine settings. Th
375378
}
376379
```
377380

381+
For corporate or private networks that block external DNS, use your internal DNS server instead:
382+
383+
```json
384+
{
385+
"dns": ["10.0.0.53"]
386+
}
387+
```
388+
378389
## Solution management
379390

380391
* **Helpful**
@@ -518,6 +529,17 @@ Docker lets you limit resources like memory and CPU usage. For more information,
518529

519530
You can apply these constraints to individual modules by using create options in deployment manifests. For more information, see [How to configure container create options for IoT Edge modules](how-to-use-create-options.md).
520531

532+
For example, to limit a module to 256 MB of memory and 1 CPU core:
533+
534+
```json
535+
"createOptions": {
536+
"HostConfig": {
537+
"Memory": 268435456,
538+
"NanoCPUs": 1000000000
539+
}
540+
}
541+
```
542+
521543
## Next steps
522544

523545
* Learn more about [IoT Edge automatic deployment](module-deployment-monitoring.md).

0 commit comments

Comments
 (0)