You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-instances/container-instances-egress-ip-address.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,44 +51,44 @@ In a typical case, you might already have an Azure virtual network in which to d
51
51
52
52
The container group runs a small web app from the `aci-helloworld` image. As shown in other articles in the documentation, this image packages a small web app written in Node.js that serves a static HTML page.
53
53
54
-
Create the container group with the [az container create](az-container-create) command:
54
+
Create the container group with the [az container create][az-container-create] command:
> Adjust the value of `--subnet address-prefix` for the IP address space that you need in your subnet. The smallest supported subnet is /29, which provides eight IP addresses. Some IP addresses are reserved for use by Azure.
60
60
61
-
For use in a later step, get the private IP address of the container group by running the [az container show](az-container-show) command:
61
+
For use in a later step, get the private IP address of the container group by running the [az container show][az-container-show] command:
In the following sections, use the Azure CLI to deploy an Azure firewall in the virtual network. For background, see [Tutorial: Deploy and configure Azure Firewall by using the Azure portal](/azure/firewall/deploy-cli).
68
68
69
-
First, use the [az network vnet subnet create](az-network-vnet-subnet-create) to add a subnet named `AzureFirewallSubnet` for the firewall. The name `AzureFirewallSubnet` is *required* for this subnet.
69
+
First, use the [az network vnet subnet create][az-network-vnet-subnet-create] to add a subnet named `AzureFirewallSubnet` for the firewall. The name `AzureFirewallSubnet` is *required* for this subnet.
Get the firewall's private IP address by using the [az network firewall ip-config list](az-network-firewall-ip-config-list) command. This private IP address is used in a later command.
87
+
Get the firewall's private IP address by using the [az network firewall ip-config list][az-network-firewall-ip-config-list] command. This private IP address is used in a later command.
Get the firewall's public IP address by using the [az network public-ip show](az-network-public-ip-show) command. This public IP address is used in a later command.
91
+
Get the firewall's public IP address by using the [az network public-ip show][az-network-public-ip-show] command. This public IP address is used in a later command.
@@ -98,19 +98,19 @@ To divert traffic to the Azure firewall, define a user-defined route on the Cont
98
98
99
99
### Create a route table
100
100
101
-
First, run the following [az network route-table create](az-network-route-table-create) command to create the route table. Create the route table in the same region as the virtual network.
101
+
First, run the following [az network route-table create][az-network-route-table-create] command to create the route table. Create the route table in the same region as the virtual network.
Run [az network-route-table route create](az-network-route-table-route-create) to create a route in the route table. To route traffic to the firewall, set the next hop type to `VirtualAppliance`. Pass the firewall's private IP address as the next hop address.
107
+
Run [az network-route-table route create][az-network-route-table-route-create] to create a route in the route table. To route traffic to the firewall, set the next hop type to `VirtualAppliance`. Pass the firewall's private IP address as the next hop address.
### Associate a route table to the Container Instances subnet
112
112
113
-
Run the [az network vnet subnet update](az-network-vnet-subnet-update) command to associate the route table with the subnet delegated to Container Instances.
113
+
Run the [az network vnet subnet update][az-network-vnet-subnet-update] command to associate the route table with the subnet delegated to Container Instances.
@@ -125,15 +125,15 @@ By default, Azure Firewall denies (blocks) inbound and outbound traffic.
125
125
126
126
Create a [NAT rule](/azure/firewall/rule-processing) on the firewall to translate and filter inbound internet traffic to the application container that you started previously in the network. For details, see [Filter inbound internet traffic with Azure Firewall DNAT](/azure/firewall/tutorial-firewall-dnat).
127
127
128
-
Create a NAT rule and collection by using the [az network firewall nat-rule create](az-network-firewall-nat-rule-create) command:
128
+
Create a NAT rule and collection by using the [az network firewall nat-rule create][az-network-firewall-nat-rule-create] command:
Add NAT rules as needed to filter traffic to other IP addresses in the subnet. For example, other container groups in the subnet could expose IP addresses for inbound traffic, or other internal IP addresses could be assigned to the container group after a restart.
133
133
134
134
### Create an outbound application rule on the firewall
135
135
136
-
Run the following [az network firewall application-rule create](az-network-firewall-application-rule-create) command to create an outbound rule on the firewall. This sample rule allows access from the subnet delegated to Container Instances to the fully qualified domain name `checkip.dyndns.org`. HTTP access to the site is used in a later step to confirm the egress IP address from Container Instances.
136
+
Run the following [az network firewall application-rule create][az-network-firewall-application-rule-create] command to create an outbound rule on the firewall. This sample rule allows access from the subnet delegated to Container Instances to the fully qualified domain name `checkip.dyndns.org`. HTTP access to the site is used in a later step to confirm the egress IP address from Container Instances.
# Customer intent: "As a cloud architect, I want to understand the maximum resource limits for GPU SKUs in container instances, so that I can optimize resource allocation for my applications."
8
+
# Customer intent: "As a cloud architect, I want to understand the maximum resource limits for GPU SKUs in container instances so that I can optimize resource allocation for my applications."
9
9
---
10
10
### Maximum resources per SKU
11
11
12
-
| OS | GPU SKU | GPU count | Max CPU | Max Memory (GB) | Storage (GB) |
12
+
| OS | GPU SKU | GPU count | Max CPU | Max memory (GB) | Storage (GB) |
0 commit comments