Skip to content

Commit 8252071

Browse files
Fix PR feedback: terminology, allowlist, and mask subscription ID
1 parent 1a6c4db commit 8252071

4 files changed

Lines changed: 5 additions & 5 deletions

File tree

articles/iot-operations/end-to-end-tutorials/tutorial-layered-network-private-connectivity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -520,7 +520,7 @@ The end-to-end telemetry flow follows this path:
520520
1. **Proxy forwarding (L3 to L4):** Envoy Proxy on L3 forwards MQTT traffic to Envoy Proxy on L4.
521521
1. **Egress (L4):** Envoy Proxy on L4 sends traffic to the Azure Firewall Explicit Proxy on port 8443 over ExpressRoute.
522522
1. **Private routing:** The proxy routes requests to Azure services through Private Endpoints.
523-
1. **Cloud integration:** Services such as Event Grid Topic Spaces, Azure Storage, and Azure Key Vault are accessed privately using Azure Private Link. Public network access is disabled for all Azure services in the deployment.
523+
1. **Cloud integration:** Services such as Event Grid topic spaces, Azure Storage, and Azure Key Vault are accessed privately using Azure Private Link. Public network access is disabled for all Azure services in the deployment.
524524

525525
### Event Grid topic spaces
526526

@@ -643,7 +643,7 @@ The following limitations are specific to the layered network tutorial:
643643

644644
- **Level 1:** The L1 device layer is unused in this deployment flow.
645645
- **Level 4 Arc:** Level 4 is not Arc-enabled; only Envoy Proxy is deployed at this layer.
646-
- **Sovereign clouds:** This scenario was validated in Azure public cloud only. Sovereign cloud environments (for example, Azure Government, Azure China 21Vianet) use different endpoints and Private DNS Zone names and haven't been validated.
646+
- **Sovereign clouds:** This scenario was validated in Azure public cloud only. Sovereign cloud environments (for example, Azure Government, Azure operated by 21Vianet) use different endpoints and Private DNS Zone names and haven't been validated.
647647
- **Out-of-scope configurations:** Scenarios involving Azure VNets with external firewalls, transparent proxies, or cloud-only VNet deployments haven't been validated and are outside the support scope.
648648

649649
## Appendix

articles/iot-operations/manage-layered-network/howto-private-connectivity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ These scenarios apply to environments with a single Arc-enabled Kubernetes clust
3939

4040
## Set up Arc Gateway
4141

42-
[Azure Arc Gateway](/azure/azure-arc/kubernetes/arc-gateway-simplify-networking) consolidates the ~200+ Azure endpoints that Arc agents and extensions require into a single gateway URL. This significantly simplifies your firewall allowlist, instead of allowing 200+ individual FQDNs, you allow approximately 9.
42+
[Azure Arc Gateway](/azure/azure-arc/kubernetes/arc-gateway-simplify-networking) consolidates the ~200+ Azure endpoints that Arc agents and extensions require into a single gateway URL. This significantly simplifies your firewall allow list, instead of allowing 200+ individual FQDNs, you allow approximately 9.
4343

4444
### Step 1: Create an Arc Gateway resource
4545

@@ -202,7 +202,7 @@ For the full list of private DNS zone names, see [Azure Private DNS Zone values]
202202

203203
With Private Endpoints and DNS in place, connect your cluster to Azure Arc. Choose the tab that matches your connectivity approach:
204204

205-
- **Arc Gateway only** — The cluster connects through Arc Gateway with a simplified firewall allowlist (~9 FQDNs), but outbound traffic still uses public internet paths.
205+
- **Arc Gateway only** — The cluster connects through Arc Gateway with a simplified firewall allow list (~9 FQDNs), but outbound traffic still uses public internet paths.
206206
- **Arc Gateway + Explicit Proxy** — All outbound traffic routes through [Azure Firewall Explicit Proxy](/azure/azure-arc/azure-firewall-explicit-proxy) over your private network with no public internet exposure.
207207

208208
Both tabs build on [Set up Arc Gateway](#set-up-arc-gateway). Complete that section first to create the Arc Gateway resource and retrieve the custom locations OID.
-57.3 KB
Loading

articles/iot-operations/manage-layered-network/overview-layered-network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The sample and guidance show how to:
5353

5454
- Use Kubernetes-based configuration and networking primitives for layered environments.
5555
- Connect devices in isolated networks at scale to [Azure Arc](/azure/azure-arc/) for application lifecycle management and remote configuration.
56-
- Enforce security and governance across network levels with URL/IP allowlists and connection auditing.
56+
- Enforce security and governance across network levels with URL/IP allow lists and connection auditing.
5757
- Ensure compatibility with all Azure IoT Operations services.
5858

5959
> [!NOTE]

0 commit comments

Comments
 (0)