Skip to content

Commit 5aae516

Browse files
committed
fixing validation errors
1 parent 3d96040 commit 5aae516

File tree

2 files changed

+15
-15
lines changed

2 files changed

+15
-15
lines changed

articles/container-instances/container-instances-egress-ip-address.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -51,44 +51,44 @@ In a typical case, you might already have an Azure virtual network in which to d
5151

5252
The container group runs a small web app from the `aci-helloworld` image. As shown in other articles in the documentation, this image packages a small web app written in Node.js that serves a static HTML page.
5353

54-
Create the container group with the [az container create](az-container-create) command:
54+
Create the container group with the [az container create][az-container-create] command:
5555

5656
:::code language="azurecli" source="~/azure_cli_scripts/container-instances/egress-ip-address.sh" id="container":::
5757

5858
> [!TIP]
5959
> Adjust the value of `--subnet address-prefix` for the IP address space that you need in your subnet. The smallest supported subnet is /29, which provides eight IP addresses. Some IP addresses are reserved for use by Azure.
6060
61-
For use in a later step, get the private IP address of the container group by running the [az container show](az-container-show) command:
61+
For use in a later step, get the private IP address of the container group by running the [az container show][az-container-show] command:
6262

6363
:::code language="azurecli" source="~/azure_cli_scripts/container-instances/egress-ip-address.sh" id="privateip":::
6464

6565
## Deploy Azure Firewall in a network
6666

6767
In the following sections, use the Azure CLI to deploy an Azure firewall in the virtual network. For background, see [Tutorial: Deploy and configure Azure Firewall by using the Azure portal](/azure/firewall/deploy-cli).
6868

69-
First, use the [az network vnet subnet create](az-network-vnet-subnet-create) to add a subnet named `AzureFirewallSubnet` for the firewall. The name `AzureFirewallSubnet` is *required* for this subnet.
69+
First, use the [az network vnet subnet create][az-network-vnet-subnet-create] to add a subnet named `AzureFirewallSubnet` for the firewall. The name `AzureFirewallSubnet` is *required* for this subnet.
7070

7171
:::code language="azurecli" source="~/azure_cli_scripts/container-instances/egress-ip-address.sh" id="subnet":::
7272

7373
Use the following [Azure CLI commands](/azure/firewall/deploy-cli) to create a firewall in the subnet.
7474

75-
If not already installed, add the firewall extension to the Azure CLI by using the [az extension add](az-extension-add) command:
75+
If not already installed, add the firewall extension to the Azure CLI by using the [az extension add][az-extension-add] command:
7676

7777
:::code language="azurecli" source="~/azure_cli_scripts/container-instances/egress-ip-address.sh" id="firewallext":::
7878

79-
Create the firewall resources by using the [az network firewall create](az-network-firewall-create) command:
79+
Create the firewall resources by using the [az network firewall create][az-network-firewall-create] command:
8080

8181
:::code language="azurecli" source="~/azure_cli_scripts/container-instances/egress-ip-address.sh" id="firewall":::
8282

83-
Update the firewall configuration by using the [az network firewall update](az-network-firewall-update) command:
83+
Update the firewall configuration by using the [az network firewall update][az-network-firewall-update] command:
8484

8585
:::code language="azurecli" source="~/azure_cli_scripts/container-instances/egress-ip-address.sh" id="firewallupdate":::
8686

87-
Get the firewall's private IP address by using the [az network firewall ip-config list](az-network-firewall-ip-config-list) command. This private IP address is used in a later command.
87+
Get the firewall's private IP address by using the [az network firewall ip-config list][az-network-firewall-ip-config-list] command. This private IP address is used in a later command.
8888

8989
:::code language="azurecli" source="~/azure_cli_scripts/container-instances/egress-ip-address.sh" id="storeprivateip":::
9090

91-
Get the firewall's public IP address by using the [az network public-ip show](az-network-public-ip-show) command. This public IP address is used in a later command.
91+
Get the firewall's public IP address by using the [az network public-ip show][az-network-public-ip-show] command. This public IP address is used in a later command.
9292

9393
:::code language="azurecli" source="~/azure_cli_scripts/container-instances/egress-ip-address.sh" id="storepublicip":::
9494

@@ -98,19 +98,19 @@ To divert traffic to the Azure firewall, define a user-defined route on the Cont
9898

9999
### Create a route table
100100

101-
First, run the following [az network route-table create](az-network-route-table-create) command to create the route table. Create the route table in the same region as the virtual network.
101+
First, run the following [az network route-table create][az-network-route-table-create] command to create the route table. Create the route table in the same region as the virtual network.
102102

103103
:::code language="azurecli" source="~/azure_cli_scripts/container-instances/egress-ip-address.sh" id="routetable":::
104104

105105
### Create a route
106106

107-
Run [az network-route-table route create](az-network-route-table-route-create) to create a route in the route table. To route traffic to the firewall, set the next hop type to `VirtualAppliance`. Pass the firewall's private IP address as the next hop address.
107+
Run [az network-route-table route create][az-network-route-table-route-create] to create a route in the route table. To route traffic to the firewall, set the next hop type to `VirtualAppliance`. Pass the firewall's private IP address as the next hop address.
108108

109109
:::code language="azurecli" source="~/azure_cli_scripts/container-instances/egress-ip-address.sh" id="createroute":::
110110

111111
### Associate a route table to the Container Instances subnet
112112

113-
Run the [az network vnet subnet update](az-network-vnet-subnet-update) command to associate the route table with the subnet delegated to Container Instances.
113+
Run the [az network vnet subnet update][az-network-vnet-subnet-update] command to associate the route table with the subnet delegated to Container Instances.
114114

115115
:::code language="azurecli" source="~/azure_cli_scripts/container-instances/egress-ip-address.sh" id="associateroute":::
116116

@@ -125,15 +125,15 @@ By default, Azure Firewall denies (blocks) inbound and outbound traffic.
125125

126126
Create a [NAT rule](/azure/firewall/rule-processing) on the firewall to translate and filter inbound internet traffic to the application container that you started previously in the network. For details, see [Filter inbound internet traffic with Azure Firewall DNAT](/azure/firewall/tutorial-firewall-dnat).
127127

128-
Create a NAT rule and collection by using the [az network firewall nat-rule create](az-network-firewall-nat-rule-create) command:
128+
Create a NAT rule and collection by using the [az network firewall nat-rule create][az-network-firewall-nat-rule-create] command:
129129

130130
:::code language="azurecli" source="~/azure_cli_scripts/container-instances/egress-ip-address.sh" id="natrule":::
131131

132132
Add NAT rules as needed to filter traffic to other IP addresses in the subnet. For example, other container groups in the subnet could expose IP addresses for inbound traffic, or other internal IP addresses could be assigned to the container group after a restart.
133133

134134
### Create an outbound application rule on the firewall
135135

136-
Run the following [az network firewall application-rule create](az-network-firewall-application-rule-create) command to create an outbound rule on the firewall. This sample rule allows access from the subnet delegated to Container Instances to the fully qualified domain name `checkip.dyndns.org`. HTTP access to the site is used in a later step to confirm the egress IP address from Container Instances.
136+
Run the following [az network firewall application-rule create][az-network-firewall-application-rule-create] command to create an outbound rule on the firewall. This sample rule allows access from the subnet delegated to Container Instances to the fully qualified domain name `checkip.dyndns.org`. HTTP access to the site is used in a later step to confirm the egress IP address from Container Instances.
137137

138138
:::code language="azurecli" source="~/azure_cli_scripts/container-instances/egress-ip-address.sh" id="outboundrule":::
139139

articles/container-instances/includes/container-instances-gpu-limits.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ ms.service: azure-container-instances
55
ms.topic: include
66
ms.date: 11/17/2025
77
ms.author: tomcassidy
8-
# Customer intent: "As a cloud architect, I want to understand the maximum resource limits for GPU SKUs in container instances, so that I can optimize resource allocation for my applications."
8+
# Customer intent: "As a cloud architect, I want to understand the maximum resource limits for GPU SKUs in container instances so that I can optimize resource allocation for my applications."
99
---
1010
### Maximum resources per SKU
1111

12-
| OS | GPU SKU | GPU count | Max CPU | Max Memory (GB) | Storage (GB) |
12+
| OS | GPU SKU | GPU count | Max CPU | Max memory (GB) | Storage (GB) |
1313
| --- | --- | --- | --- | --- | --- |
1414
| Linux | V100 | 1 | 6 | 112 | 50 |
1515
| Linux | V100 | 2 | 12 | 224 | 50 |

0 commit comments

Comments
 (0)