Skip to content

Commit 6af1dbd

Browse files
Apply suggestions from code review
Co-authored-by: Craig Shoemaker <[email protected]>
1 parent 122427b commit 6af1dbd

1 file changed

Lines changed: 19 additions & 24 deletions

File tree

articles/container-apps/connect-apps.md

Lines changed: 19 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,10 @@ If [ingress](ingress-overview.md) is enabled, each container app gets a domain n
1919

2020
Container apps can reach each other through any of these methods:
2121

22-
- **Fully qualified domain name (FQDN)** the default generated domain
23-
- **App name** a short-form `http://<APP_NAME>` address for internal calls
24-
- **Dapr service invocation** a sidecar-based approach with built-in retries and observability
25-
- **Custom domain** your own domain name with a managed certificate
22+
- **Fully qualified domain name (FQDN)** : the default generated domain
23+
- **App name**: a short-form `http://<APP_NAME>` address for internal calls
24+
- **Dapr service invocation**: a sidecar-based approach with built-in retries and observability
25+
- **Custom domain**: your own domain name with a managed certificate
2626

2727
> [!NOTE]
2828
> When you call another container app in the same environment by using the FQDN or app name, network traffic never leaves the environment.
@@ -35,18 +35,18 @@ In a microservices architecture, services need to call each other reliably. Azur
3535

3636
Here's what the platform handles for you:
3737

38-
- **Automatic DNS registration** — every container app gets a resolvable hostname as soon as it's deployed.
39-
- **Proxy-managed routing** — all inter-app traffic flows through a built-in Envoy proxy layer that handles TLS termination, traffic splitting, and load balancing. <!-- Source: Q3, Q5 -->
40-
- **Environment-scoped isolation** — internal endpoints are only reachable from within the same environment, creating a natural security boundary. <!-- Source: Q1 -->
41-
- **Protocol flexibility** — communicate over HTTP/1.1, HTTP/2 (for gRPC), or raw TCP depending on your workload needs. <!-- Source: Q6 -->
38+
- **Automatic DNS registration**: Every container app gets a resolvable hostname as soon as it's deployed.
39+
- **Proxy-managed routing**: All inter-app traffic flows through a built-in Envoy proxy layer that handles TLS termination, traffic splitting, and load balancing. <!-- Source: Q3, Q5 -->
40+
- **Environment-scoped isolation**: Internal endpoints are only reachable from within the same environment, creating a natural security boundary. <!-- Source: Q1 -->
41+
- **Protocol flexibility**: Communication over HTTP/1.1, HTTP/2 (for gRPC), or raw TCP depending on your workload needs. <!-- Source: Q6 -->
4242

4343
These capabilities mean you can focus on your application logic rather than networking plumbing.
4444

4545
## Container app location (FQDN)
4646

4747
<!-- Source: Q2, Q4 -->
4848

49-
Each container app's fully qualified domain name is composed of the app name, a unique environment identifier, and the regionall under the `azurecontainerapps.io` top-level domain.
49+
Each container app's fully qualified domain name is composed of the app name, a unique environment identifier, and the region. These domain fragments all fall under the `azurecontainerapps.io` top-level domain.
5050

5151
:::image type="content" source="media/connect-apps/azure-container-apps-location.png" alt-text="Azure Container Apps container app fully qualified domain name.":::
5252

@@ -211,10 +211,10 @@ For more information on configuring Dapr with Azure Container Apps, see [Dapr in
211211

212212
Azure Container Apps includes several security features that affect how container apps communicate:
213213

214-
- **TLS by default** — all traffic between container apps routes through the Envoy proxy, which handles TLS termination. Set `allowInsecure` to `false` (the default) to enforce HTTPS redirects. <!-- Source: Q19 -->
215-
- **Client certificate mode (mTLS)** — configure mutual TLS by setting the client certificate mode to `require`, `accept`, or `ignore`. <!-- Source: Q19 -->
216-
- **IP restrictions** — define allow or deny rules to restrict which IP addresses can reach your app. <!-- Source: Q19 -->
217-
- **CORS policies** — configure cross-origin resource sharing rules for browser-based clients calling your container apps. <!-- Source: Q19 -->
214+
- **TLS by default**: All traffic between container apps routes through the Envoy proxy, which handles TLS termination. Set `allowInsecure` to `false` (the default) to enforce HTTPS redirects. <!-- Source: Q19 -->
215+
- **Client certificate mode (mTLS)**: Configure mutual TLS by setting the client certificate mode to `require`, `accept`, or `ignore`. <!-- Source: Q19 -->
216+
- **IP restrictions**: Define allow or deny rules to restrict which IP addresses can reach your app. <!-- Source: Q19 -->
217+
- **CORS policies**: Configure cross-origin resource sharing rules for browser-based clients calling your container apps. <!-- Source: Q19 -->
218218

219219
> [!NOTE]
220220
> When you use Dapr service invocation, the Dapr sidecars automatically secure communication with mutual TLS between services. You don't need to configure mTLS separately for Dapr-to-Dapr calls.
@@ -239,19 +239,14 @@ A sample showing how to call between containers using both the FQDN and Dapr is
239239

240240
Understanding inter-app communication in Azure Container Apps connects to several related topics:
241241

242-
- [Environments in Azure Container Apps](environment.md) — the shared boundary where container apps discover and communicate with each other
243-
- [Ingress in Azure Container Apps](ingress-overview.md) — how to configure external and internal endpoints, TLS, and routing rules
244-
- [Dapr integration with Azure Container Apps](dapr-overview.md) — deeper coverage of Dapr components, pub/sub, and state management alongside service invocation
245-
- [Networking in Azure Container Apps](networking.md) VNet integration, private endpoints, and network security for your environment
246-
- [Revisions in Azure Container Apps](revisions.md) — how revision modes and traffic splitting affect inter-app routing
242+
- [Environments in Azure Container Apps](environment.md): The shared boundary where container apps discover and communicate with each other
243+
- [Ingress in Azure Container Apps](ingress-overview.md): How to configure external and internal endpoints, TLS, and routing rules
244+
- [Dapr integration with Azure Container Apps](dapr-overview.md): Deeper coverage of Dapr components, pub/sub, and state management alongside service invocation
245+
- [Networking in Azure Container Apps](networking.md): VNet integration, private endpoints, and network security for your environment
246+
- [Revisions in Azure Container Apps](revisions.md) : How revision modes and traffic splitting affect inter-app routing
247247

248-
## Next steps
248+
## Next step
249249

250250
> [!div class="nextstepaction"]
251251
> [Configure ingress for your container app](ingress-how-to.md)
252252
253-
## Related content
254-
255-
- [Deploy your first container app](get-started.md)
256-
- [Tutorial: Communication between microservices](communicate-between-microservices.md)
257-
- [Connect to services with service connectors](service-connector.md)

0 commit comments

Comments
 (0)