Skip to content

Commit ca0d63e

Browse files
committed
edits
1 parent f19a3c7 commit ca0d63e

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

articles/service-connector/known-limitations.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,18 +15,18 @@ This article describes known Service Connector limitations and ways to mitigate
1515

1616
## Limitations
1717

18-
Service Connector is designed as an extension resource provider, so it can bring easy, secure, and consistent backing service connections to as many Azure services as possible. This infrastructure-as-code (IaC) support imposes some limitations, because Service Connector modifies existing infrastructure on the users' behalf.
18+
Service Connector is designed as an extension resource provider, so it can bring easy, secure, and consistent backing service connections to as many Azure services as possible. This infrastructure-as-code (IaC) support imposes some limitations, because Service Connector modifies existing infrastructure on the user's behalf.
1919

2020
If you use Bicep, Terraform, Azure Resource Manager (ARM), or other IaC templates to create resources, and afterwards use Service Connector to set up resource connections, Service Connector modifies the resource configurations on your behalf. If you later rerun your IaC templates, the modifications Service Connector made disappear, because they weren't included in the original IaC templates.
2121

22-
For example, Azure Container Apps resources deployed with ARM templates usually have managed identity authentication disabled by default. Service Connector enables managed identity when it sets up connections on a your behalf. If you trigger the same ARM templates without updating the managed identity settings, managed identity is disabled again in the redeployed Azure Container Apps resource.
22+
For example, Azure Container Apps resources deployed with ARM templates usually disable managed identity authentication by default. When Service Connector then sets up connections, it enables managed identity on your behalf. If you trigger the same ARM templates without updating the managed identity settings, managed identity is disabled again in the redeployed Azure Container Apps resources.
2323

2424
## Solutions
2525

2626
To mitigate the limitations, try the following solutions:
2727

2828
- See [Create connections with IaC tools](how-to-build-connections-with-iac-tools.md) to build your infrastructure or translate your existing infrastructure to IaC templates.
29-
- If your continuous integration/continuous delivery (CI/CD) pipeline source contains compute or backing service templates, add a sanity check or smoke tests when you reapply the templates. This flow adds a verification step to make sure the application is up and running before allowing live traffic to the application.
29+
- If your continuous integration/continuous delivery (CI/CD) pipeline source contains compute or backing service templates, add a liveness check or smoke tests when you reapply the templates. This flow adds a verification step to make sure the application is up and running before allowing live traffic to the application.
3030
- When you automate Azure Container App code deployments with Service Connector, use [multiple revision mode](/azure/container-apps/revisions#revision-modes). This mode avoids routing traffic to a temporarily nonfunctional app before Service Connector can reapply connections.
3131
- The order of automation operations matters. Ensure your connection endpoints exist before the connection itself is created. Ideally, create the backing service, then create the compute service, and then create the connection between the two services. Service Connector can then configure both the compute service and the backing service appropriately.
3232
- If you run into issues when using Service Connector, [file an issue](https://github.com/Azure/ServiceConnector/issues/new).

0 commit comments

Comments
 (0)