You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-apps/connect-apps.md
+19-24Lines changed: 19 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,10 +19,10 @@ If [ingress](ingress-overview.md) is enabled, each container app gets a domain n
19
19
20
20
Container apps can reach each other through any of these methods:
21
21
22
-
-**Fully qualified domain name (FQDN)**— the default generated domain
23
-
-**App name** — a short-form `http://<APP_NAME>` address for internal calls
24
-
-**Dapr service invocation** — a sidecar-based approach with built-in retries and observability
25
-
-**Custom domain** — your own domain name with a managed certificate
22
+
-**Fully qualified domain name (FQDN)**: the default generated domain
23
+
-**App name**: a short-form `http://<APP_NAME>` address for internal calls
24
+
-**Dapr service invocation**: a sidecar-based approach with built-in retries and observability
25
+
-**Custom domain**: your own domain name with a managed certificate
26
26
27
27
> [!NOTE]
28
28
> When you call another container app in the same environment by using the FQDN or app name, network traffic never leaves the environment.
@@ -35,18 +35,18 @@ In a microservices architecture, services need to call each other reliably. Azur
35
35
36
36
Here's what the platform handles for you:
37
37
38
-
-**Automatic DNS registration** — every container app gets a resolvable hostname as soon as it's deployed.
39
-
-**Proxy-managed routing** — all inter-app traffic flows through a built-in Envoy proxy layer that handles TLS termination, traffic splitting, and load balancing. <!-- Source: Q3, Q5 -->
40
-
-**Environment-scoped isolation** — internal endpoints are only reachable from within the same environment, creating a natural security boundary. <!-- Source: Q1 -->
41
-
-**Protocol flexibility** — communicate over HTTP/1.1, HTTP/2 (for gRPC), or raw TCP depending on your workload needs. <!-- Source: Q6 -->
38
+
-**Automatic DNS registration**: Every container app gets a resolvable hostname as soon as it's deployed.
39
+
-**Proxy-managed routing**: All inter-app traffic flows through a built-in Envoy proxy layer that handles TLS termination, traffic splitting, and load balancing. <!-- Source: Q3, Q5 -->
40
+
-**Environment-scoped isolation**: Internal endpoints are only reachable from within the same environment, creating a natural security boundary. <!-- Source: Q1 -->
41
+
-**Protocol flexibility**: Communication over HTTP/1.1, HTTP/2 (for gRPC), or raw TCP depending on your workload needs. <!-- Source: Q6 -->
42
42
43
43
These capabilities mean you can focus on your application logic rather than networking plumbing.
44
44
45
45
## Container app location (FQDN)
46
46
47
47
<!-- Source: Q2, Q4 -->
48
48
49
-
Each container app's fully qualified domain name is composed of the app name, a unique environment identifier, and the region — all under the `azurecontainerapps.io` top-level domain.
49
+
Each container app's fully qualified domain name is composed of the app name, a unique environment identifier, and the region. These domain fragments all fall under the `azurecontainerapps.io` top-level domain.
@@ -211,10 +211,10 @@ For more information on configuring Dapr with Azure Container Apps, see [Dapr in
211
211
212
212
Azure Container Apps includes several security features that affect how container apps communicate:
213
213
214
-
-**TLS by default** — all traffic between container apps routes through the Envoy proxy, which handles TLS termination. Set `allowInsecure` to `false` (the default) to enforce HTTPS redirects. <!-- Source: Q19 -->
215
-
-**Client certificate mode (mTLS)** — configure mutual TLS by setting the client certificate mode to `require`, `accept`, or `ignore`. <!-- Source: Q19 -->
216
-
-**IP restrictions** — define allow or deny rules to restrict which IP addresses can reach your app. <!-- Source: Q19 -->
217
-
-**CORS policies** — configure cross-origin resource sharing rules for browser-based clients calling your container apps. <!-- Source: Q19 -->
214
+
-**TLS by default**: All traffic between container apps routes through the Envoy proxy, which handles TLS termination. Set `allowInsecure` to `false` (the default) to enforce HTTPS redirects. <!-- Source: Q19 -->
215
+
-**Client certificate mode (mTLS)**: Configure mutual TLS by setting the client certificate mode to `require`, `accept`, or `ignore`. <!-- Source: Q19 -->
216
+
-**IP restrictions**: Define allow or deny rules to restrict which IP addresses can reach your app. <!-- Source: Q19 -->
217
+
-**CORS policies**: Configure cross-origin resource sharing rules for browser-based clients calling your container apps. <!-- Source: Q19 -->
218
218
219
219
> [!NOTE]
220
220
> When you use Dapr service invocation, the Dapr sidecars automatically secure communication with mutual TLS between services. You don't need to configure mTLS separately for Dapr-to-Dapr calls.
@@ -239,19 +239,14 @@ A sample showing how to call between containers using both the FQDN and Dapr is
239
239
240
240
Understanding inter-app communication in Azure Container Apps connects to several related topics:
241
241
242
-
-[Environments in Azure Container Apps](environment.md) — the shared boundary where container apps discover and communicate with each other
243
-
-[Ingress in Azure Container Apps](ingress-overview.md) — how to configure external and internal endpoints, TLS, and routing rules
244
-
-[Dapr integration with Azure Container Apps](dapr-overview.md) — deeper coverage of Dapr components, pub/sub, and state management alongside service invocation
245
-
-[Networking in Azure Container Apps](networking.md) — VNet integration, private endpoints, and network security for your environment
246
-
-[Revisions in Azure Container Apps](revisions.md)— how revision modes and traffic splitting affect inter-app routing
242
+
-[Environments in Azure Container Apps](environment.md): The shared boundary where container apps discover and communicate with each other
243
+
-[Ingress in Azure Container Apps](ingress-overview.md): How to configure external and internal endpoints, TLS, and routing rules
244
+
-[Dapr integration with Azure Container Apps](dapr-overview.md): Deeper coverage of Dapr components, pub/sub, and state management alongside service invocation
245
+
-[Networking in Azure Container Apps](networking.md): VNet integration, private endpoints, and network security for your environment
246
+
-[Revisions in Azure Container Apps](revisions.md): How revision modes and traffic splitting affect inter-app routing
247
247
248
-
## Next steps
248
+
## Next step
249
249
250
250
> [!div class="nextstepaction"]
251
251
> [Configure ingress for your container app](ingress-how-to.md)
252
252
253
-
## Related content
254
-
255
-
-[Deploy your first container app](get-started.md)
256
-
-[Tutorial: Communication between microservices](communicate-between-microservices.md)
257
-
-[Connect to services with service connectors](service-connector.md)
0 commit comments