-
Notifications
You must be signed in to change notification settings - Fork 29
Configuration Requirements for ACA Consumption only environments
This article only applies for ACA Consumption Only environments with custom VNET (Bring Your Own VNET). This doesn't apply for Workload Profile based environments.
Azure Container Apps Consumption Only environments require the following configuration to fully function and be managed by Azure. In the event any of these requirements are not met, environments will stop working. When it happens for a long time, it will be suspended.
- AAD application
Microsoft Azure Container Apps - Data Plane
requires Contributor access to theMC_
resource group corresponding to the ACA Environment. To find theMC_
resource group corresponding to the ACA environment, please search for resource groups withtag = ACA environment name.
. See image below for reference.
Confirm that the AAD application shows up as Contributor to the Resource Group as shown below.
-
The address range in the subnet used for ACA environment must not overlap with other subnets in the VNET.
-
The Subnet and User Defined Routes configuration must adhere to the conditions listed in this document. Securing a custom VNET
-
Azure Policies which block the creation of public IPs are not supported.
-
Azure Policies which enforce specific tags to be added to resource groups are supported, but those tags must be added to the ACA environment resource so they can be propagated to the
MC_
resource group. -
Azure Policies which enforce a specific naming scheme for resource groups are not supported for ACA Consumption-only environments.
-
Placing locks on the
MC_
resource group or any resources within the resource group is not supported.
Depending on which violation occurred, you can take the appropriate remediation. For example,
- If the
MC_
resource group was modified to remove theMicrosoft Azure Container Apps - Data Plane
, it can be added back by user with Subscription or Resource Group contributor access. - If the User Defined Routes are not compliant with the requirements, please take appropriate action to resolve those. User may also choose to recreate the environment with Workload Profiles which has more advanced networking capabilities and UDR support. Control outbound traffic with user defined routes
- If you have a NSG that is not compliant with the requirements, please take appropriate action to resolve those NSG Allow Rules
- Disable policies which block the creation of public IP addresses, or add an exemption for the
MC_
resource group for the policy. - Update the tags on your ACA environment to include the tags required by your Azure Policies so they can be propagated to the
MC_
resource group by the platform. Tags that are added directly to theMC_
resource group may not be persisted. - Disable policies which enforce naming conventions for resource groups, or add an exemption for the
MC_
resource group. User may also choose to recreate the environment with Workload Profiles and use theinfrastructureResourceGroup
property to specify a custom name for the platform-managed resource group. - Remove any locks that you have placed on the
MC_
resource group or any resources within the resource group.