Skip to content

Commit 649862e

Browse files
committed
Fix technical accuracy issues in tutorial-networking-isolate-vnet.md
- Fix az appservice plan update to use $planName instead of $appName - Add missing variables (planName, csResourceKVUri, csKeyKVUri) to Prerequisites - Replace deprecated --disable-private-endpoint-network-policies with --private-endpoint-network-policies - Update Cognitive Services API version from 2021-04-30 to 2024-10-01 - Update ms.date to current date AB#551229
1 parent e0f6e21 commit 649862e

1 file changed

Lines changed: 8 additions & 5 deletions

File tree

articles/app-service/tutorial-networking-isolate-vnet.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: 'Tutorial: Isolate back-end communication with Virtual Network integratio
33
description: Connections from App Service to back-end services are routed through shared network infrastructure with other apps and subscriptions. Learn how to isolate traffic by using Virtual Network integration.
44
ms.topic: tutorial
55
ms.custom: devx-track-azurecli
6-
ms.date: 10/26/2021
6+
ms.date: 02/05/2026
77

88
ms.reviewer: jordanselig
99
author: cephalin
@@ -45,6 +45,9 @@ The tutorial continues to use the following environment variables from the previ
4545
csResourceName=<cs-resource-name>
4646
appName=<app-name>
4747
vaultName=<vault-name>
48+
planName=<plan-name>
49+
csResourceKVUri=<cs-resource-kv-uri>
50+
csKeyKVUri=<cs-key-kv-uri>
4851
```
4952

5053
## Create virtual network and subnets
@@ -61,15 +64,15 @@ The tutorial continues to use the following environment variables from the previ
6164
1. Create a subnet for the App Service virtual network integration.
6265
6366
```azurecli-interactive
64-
az network vnet subnet create --resource-group $groupName --vnet-name $vnetName --name vnet-integration-subnet --address-prefixes 10.0.0.0/24 --delegations Microsoft.Web/serverfarms --disable-private-endpoint-network-policies false
67+
az network vnet subnet create --resource-group $groupName --vnet-name $vnetName --name vnet-integration-subnet --address-prefixes 10.0.0.0/24 --delegations Microsoft.Web/serverfarms --private-endpoint-network-policies Enabled
6568
```
6669
6770
For App Service, the virtual network integration subnet is recommended to have a CIDR block of `/26` at a minimum (see [Virtual network integration subnet requirements](overview-vnet-integration.md#subnet-requirements)). `/24` is more than sufficient. `--delegations Microsoft.Web/serverfarms` specifies that the subnet is [delegated for App Service virtual network integration](../virtual-network/subnet-delegation-overview.md).
6871
6972
1. Create another subnet for the private endpoints.
7073
7174
```azurecli-interactive
72-
az network vnet subnet create --resource-group $groupName --vnet-name $vnetName --name private-endpoint-subnet --address-prefixes 10.0.1.0/24 --disable-private-endpoint-network-policies true
75+
az network vnet subnet create --resource-group $groupName --vnet-name $vnetName --name private-endpoint-subnet --address-prefixes 10.0.1.0/24 --private-endpoint-network-policies Disabled
7376
```
7477
7578
For private endpoint subnets, you must [disable private endpoint network policies](../private-link/disable-private-endpoint-network-policy.md).
@@ -114,7 +117,7 @@ Because your Key Vault and Azure AI services resources will sit behind [private
114117
1. Block public traffic to the Azure AI services resource.
115118
116119
```azurecli-interactive
117-
az rest --uri $csResourceId?api-version=2021-04-30 --method PATCH --body '{"properties":{"publicNetworkAccess":"Disabled"}}' --headers 'Content-Type=application/json'
120+
az rest --uri $csResourceId?api-version=2024-10-01 --method PATCH --body '{"properties":{"publicNetworkAccess":"Disabled"}}' --headers 'Content-Type=application/json'
118121
119122
# Repeat following command until output is "Succeeded"
120123
az cognitiveservices account show --resource-group $groupName --name $csResourceName --query properties.provisioningState
@@ -153,7 +156,7 @@ The two private endpoints are only accessible to clients inside the virtual netw
153156
1. Scale the app up to a supported pricing tier (see [Integrate your app with an Azure virtual network](overview-vnet-integration.md)).
154157
155158
```azurecli-interactive
156-
az appservice plan update --name $appName --resource-group $groupName --sku S1
159+
az appservice plan update --name $planName --resource-group $groupName --sku S1
157160
```
158161
159162
1. Unrelated to our scenario but also important, enforce HTTPS for inbound requests.

0 commit comments

Comments
 (0)