Documentation Index
Fetch the complete documentation index at: https://arize-ax.mintlify.dev/docs/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Azure installs use one of four bundled patterns underexamples/endpoints/azure/:
| Pattern | Path | Notes |
|---|---|---|
| NLB — single endpoint | azure/nlb/single-endpoint/app-services.yaml | Layer 4 Service LoadBalancer; TCP to pods; TLS often terminated on pods (see file header). |
| NLB — multi endpoint | azure/nlb/multi-endpoint/app-services.yaml | Same NLB style with separate hostnames per role. |
| AGFC — single endpoint | azure/agfc/single-endpoint/app-services.yaml | Application Gateway for Containers; read file header for gRPC caveats. |
| AGFC — multi endpoint | azure/agfc/multi-endpoint/app-services.yaml | Preferred for AGFC when using OTLP gRPC and Arrow Flight (separate routes per hostname). |
Terraform and static IPs
Reviewterraform/README.md in your extracted distribution for parameters that reserve static IP names. Re-apply Terraform if you change those resources. For NLB, Service annotations such as service.beta.kubernetes.io/azure-load-balancer-ipv4 must match addresses Terraform created, when used. For AGFC, align resource IDs and frontend settings with Terraform outputs and the sample manifest comments.
NLB — single endpoint
From the extracted distribution root:internalEndpointsAppTlsCert / internalEndpointsAppTlsKey in values.yaml, or cert-manager secret internalendpoints-app-tls).
NLB — multi endpoint
AGFC — single endpoint
AGFC — multi endpoint (recommended for AGFC)
DNS, apply, and verify
Replace placeholder hostnames with your organization’s domain and ensure DNS points at the load balancer IP (NLB) or AGFC frontend. Verify resolution:my-app-services.yaml):
kubectl describe the Gateway/HTTPRoute/GRPCRoute objects the sample defines).
Browser check
Openhttps://arize-app.<my-organization-domain>. Pod-terminated or private CA certificates can take time to trust in the browser; if you see a temporary TLS error, confirm internalEndpointsAppTlsCert / internalEndpointsAppTlsKey or your cert-manager secret, then retry.
Configure app URLs in values.yaml
Set the URLs your deployment advertises (appBaseUrl, expBaseUrl):
Set ingressMode
SetingressMode in values.yaml to match your pattern (NLB with TLS on pods vs AGFC TLS termination). See the Ingress Controllers table in Configuring ingress endpoints for gRPC and OTLP considerations.