Skip to content

Commit 03b55b3

Browse files
committed
2 parents 1a7d785 + 9ddb144 commit 03b55b3

File tree

260 files changed

+3759
-1453
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

260 files changed

+3759
-1453
lines changed

articles/api-center/enable-managed-api-analysis-linting.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Managed API linting and analysis - Azure API Center
33
description: Enable managed linting of API definitions in your API center to analyze compliance of APIs with the organization's API style guide.
44
ms.service: azure-api-center
55
ms.topic: how-to
6-
ms.date: 08/23/2024
6+
ms.date: 11/01/2024
77
ms.author: danlep
88
author: dlepow
99
ms.custom:
@@ -30,9 +30,7 @@ In this scenario:
3030
* Currently, only OpenAPI specification documents in JSON or YAML format are analyzed.
3131
* By default, you enable analysis with the [`spectral:oas` ruleset](https://docs.stoplight.io/docs/spectral/4dec24461f3af-open-api-rules). To learn more about the built-in rules, see the [Spectral GitHub repo](https://github.com/stoplightio/spectral/blob/develop/docs/reference/openapi-rules.md).
3232
* Currently, you configure a single ruleset, and it's applied to all OpenAPI definitions in your API center.
33-
* The following are limits for maximum number of API definitions linted per 4 hours:
34-
* Free tier: 10
35-
* Standard tier: 100
33+
* There are [limits](../azure-resource-manager/management/azure-subscription-service-limits.md?toc=/azure/api-center/toc.json&bc=/azure/api-center/breadcrumb/toc.json#api-center-limits) for the maximum number of API definitions analyzed. Analysis can take a few minutes to up to 24 hours to complete.
3634

3735
## Prerequisites
3836

articles/api-center/includes/api-center-service-limits.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: azure-api-center
99
ms.topic: include
10-
ms.date: 10/18/2024
10+
ms.date: 11/07/2024
1111
ms.author: danlep
1212
ms.custom: Include file
1313
---
@@ -20,14 +20,16 @@ ms.custom: Include file
2020
| Maximum number of deployments per API | 10 | 10 |
2121
| Maximum number of environments | 20 | 20 |
2222
| Maximum number of workspaces | 1 (Default) | 1 (Default) |
23-
| Maximum number of custom metadata properties per entity<sup>4</sup> | 10 | 20 |
23+
| Maximum number of custom metadata properties per entity<sup>3</sup> | 10 | 20 |
2424
| Maximum number of child properties in custom metadata property of type "object" | 10 |10 |
2525
| Maximum requests per minute (data plane) | 3,000 | 6,000 |
26-
| Maximum number of API definitions [linted](../enable-managed-api-analysis-linting.md) per 4 hours | 10 | 100 |
26+
| Maximum number of APIs accessed through data plane API | 5 | 10,000 |
27+
| Maximum number of API definitions [analyzed](../enable-managed-api-analysis-linting.md) | 10 | 2,000<sup>4</sup> |
2728
| Maximum number of linked API sources<sup>5</sup> | 1 | 3 |
29+
| Maximum number of APIs synchronized from a linked API source | 200 | 2,000<sup>4</sup> |
2830

29-
<sup>1</sup> Free plan provided for 90 days, then service is soft-deleted.<br/>
31+
<sup>1</sup> Free plan provided for 90 days, then service is soft-deleted. Use of full service features including API analysis and access through the data plane API is limited.<br/>
3032
<sup>2</sup> To increase a limit in the Standard plan, contact [support](https://azure.microsoft.com/support/options/).<br/>
31-
<sup>3</sup> In the Free plan, use of full service features including API analysis and access through the data plane API is limited to 5 APIs.<br/>
32-
<sup>4</sup> Custom metadata properties assigned to APIs, deployments, and environments.<br/>
33-
<sup>5</sup> Sources such as linked API Management instances. In the Free plan, synchronization from a linked API source is limited to 200 APIs and 5 API definitions.
33+
<sup>3</sup> Custom metadata properties assigned to APIs, deployments, and environments.<br/>
34+
<sup>4</sup> Process can take a few minutes to up to 24 hours to complete.<br/>
35+
<sup>5</sup> Sources such as linked API Management instances.

articles/api-center/synchronize-api-management-apis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,8 @@ When you link an API Management instance as an API source, the following happens
2727
API Management APIs automatically synchronize to the API center whenever existing APIs' settings change (for example, new versions are added), new APIs are created, or APIs are deleted. This synchronization is one-way from API Management to your Azure API center, meaning API updates in the API center aren't synchronized back to the API Management instance.
2828

2929
> [!NOTE]
30-
> * API updates in API Management can take a few minutes to synchronize to your API center.
3130
> * There are [limits](../azure-resource-manager/management/azure-subscription-service-limits.md?toc=/azure/api-center/toc.json&bc=/azure/api-center/breadcrumb/toc.json#api-center-limits) for the number of linked API Management instances (API sources).
31+
> * API updates in API Management can take a few minutes to up to 24 hours to synchronize to your API center.
3232
3333
### Entities synchronized from API Management
3434

articles/app-service/environment/ase-multi-tenant-comparison.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ App Service Environment v3 tends to be more expensive than the public multitenan
7474
|Pricing |[Pay per instance](overview.md#pricing)|[Pay per instance](../../app-service/overview-hosting-plans.md)|
7575
|Reserved instances|[Available](overview.md#pricing)|[Available](../../app-service/overview-hosting-plans.md)|
7676
|Savings plans|[Available](overview.md#pricing)|[Available](../../app-service/overview-hosting-plans.md)|
77-
|Availability zone pricing|[There's a minimum charge of 18 cores.](overview.md#pricing) There's no added charge for availability zone support if you have 18 or more cores across your App Service plan instances. If you have fewer than 18 cores across your App Service plans in the zone redundant App Service Environment, the difference between 18 cores and the sum of the cores from the running instance count is charged as Windows I1v2 instances.|[Three instance minimum enforced per App Service plan](../../reliability/reliability-app-service.md#pricing).|
77+
|Availability zone pricing|[There's a minimum charge of 18 cores.](overview.md#pricing) There's no added charge for availability zone support if you have 18 or more cores across your App Service plan instances. If you have fewer than 18 cores across your App Service plans in the zone redundant App Service Environment, the difference between 18 cores and the sum of the cores from the running instance count is charged as Windows I1v2 instances.|[Three instance minimum enforced per App Service plan](../../reliability/reliability-app-service.md#cost).|
7878

7979
### Frequently asked questions
8080

articles/app-service/network-secure-outbound-traffic-azure-firewall.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Outbound traffic from your app is now routed through the integrated virtual netw
9999
1. Navigate to the firewall's overview page and select its firewall policy.
100100

101101
1. In the firewall policy page, from the left navigation, select **Application Rules** > **Add a rule collection**.
102-
1. In **Rules**, add a network rule with the App Service subnet as the source address, and specify an FQDN destination. In the screenshot below, the destination FQDN is set to `api.my-ip.io`.
102+
1. In **Rules**, add a network rule with the App Service subnet as the source address, and specify an FQDN destination. In the screenshot below, the destination FQDN is set to `contoso.com`.
103103

104104
:::image type="content" source="./media/network-secure-outbound-traffic-azure-firewall/config-azfw-policy-app-rule.png" alt-text="Screenshot of configure Azure Firewall policy rule.":::
105105

@@ -113,7 +113,7 @@ Outbound traffic from your app is now routed through the integrated virtual netw
113113
An easy way to verify your configuration is to use the `curl` command from your app's SCM debug console to verify the outbound connection.
114114

115115
1. In a browser, navigate to `https://<app-name>.scm.azurewebsites.net/DebugConsole`.
116-
1. In the console, run `curl -s <protocol>://<fqdn-address>` with a URL that matches the application rule you configured, To continue example in the previous screenshot, you can use **curl -s https://api.my-ip.io/ip**. The following screenshot shows a successful response from the API, showing the public IP address of your App Service app.
116+
1. In the console, run `curl -s <protocol>://<fqdn-address>` with a URL that matches an application rule you configured. The following screenshot is an example to a website that shows a successful response from a API, showing an IP address.
117117

118118
:::image type="content" source="./media/network-secure-outbound-traffic-azure-firewall/verify-outbound-traffic-fw-allow-rule.png" alt-text="Screenshot of verifying the success outbound traffic by using curl command in SCM debug console.":::
119119

articles/app-service/overview-vnet-integration.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,12 @@ Because subnet size can't be changed after assignment, use a subnet that's large
7676

7777
With multi plan subnet join (MPSJ), you can join multiple App Service plans in to the same subnet. All App Service plans must be in the same subscription but the virtual network/subnet can be in a different subscription. Each instance from each App Service plan requires an IP address from the subnet and to use MPSJ a minimum size of `/26` subnet is required. If you plan to join many and/or large scale plans, you should plan for larger subnet ranges.
7878

79+
> [!IMPORTANT]
80+
> Due to a known bug, MPSJ fails if multiple sites are created and attempt to integrate with the virtual network at the same time. A fix will be deployed soon. In the meantime, you can work around the issue with either of the following methods:
81+
> * If you create sites manually, create and integrate the sites one by one.
82+
> * If you create sites programmatically, for example using Terraform or ARM templates, add a [dependsOn](/azure/azure-resource-manager/templates/resource-dependency#dependson) element to each site in your templates to depend on the creation of the previous site for all but the first site in the template. This creates a delay between the site creation and the virtual network integration for each site and therefore isn't blocked by the known bug. For more information see, [Define the order for deploying resources in ARM templates](/azure/azure-resource-manager/templates/resource-dependency).
83+
>
84+
7985
### Windows Containers specific limits
8086

8187
Windows Containers uses an extra IP address per app for each App Service plan instance, and you need to size the subnet accordingly. If you have, for example, 10 Windows Container App Service plan instances with four apps running, you need 50 IP addresses and extra addresses to support horizontal (in/out) scale.

articles/application-gateway/for-containers/alb-controller-release-notes.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greglin
66
ms.service: azure-appgw-for-containers
77
ms.topic: release-notes
8-
ms.date: 5/9/2024
8+
ms.date: 11/7/2024
99
ms.author: greglin
1010
---
1111

@@ -26,12 +26,13 @@ Instructions for new or existing deployments of ALB Controller are found in the
2626

2727
| ALB Controller Version | Gateway API Version | Kubernetes Version | Release Notes |
2828
| ---------------------- | ------------------- | ------------------ | ------------- |
29-
| 1.2.3| v1.1 | v1.26, v1.27, v1.28, v1.29, v1.30 | Gateway API v1.1, gRPC support, frontend mutual authentication, readiness probe fixes, custom health probe port and TLS mode |
29+
| 1.3.7| v1.1 | v1.26, v1.27, v1.28, v1.29, v1.30 | Minor fixes and improvements |
3030

3131
## Release history
3232

3333
| ALB Controller Version | Gateway API Version | Kubernetes Version | Release Notes |
3434
| ---------------------- | ------------------- | ------------------ | ------------- |
35+
| 1.2.3| v1.1 | v1.26, v1.27, v1.28, v1.29, v1.30 | Gateway API v1.1, gRPC support, frontend mutual authentication, readiness probe fixes, custom health probe port and TLS mode |
3536
| 1.0.2| v1 | v1.26, v1.27, v1.28, v1.29 | ECDSA + RSA certificate support for both Ingress and Gateway API, Ingress fixes, Server-sent events support |
3637
| 1.0.0| v1 | v1.26, v1.27, v1.28 | General Availability! URL redirect for both Gateway and Ingress API, v1beta1 -> v1 of Gateway API, quality improvements<br/>Breaking Changes: TLS Policy for Gateway API [PolicyTargetReference](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io%2fv1alpha2.PolicyTargetReferenceWithSectionName)<br/>Listener is now referred to as [SectionName](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io/v1.SectionName)<br/>Fixes: Request timeout of 3 seconds, [HealthCheckPolicy interval](https://github.com/Azure/AKS/issues/4086), [pod crash for missing API fields](https://github.com/Azure/AKS/issues/4087) |
3738
| 0.6.3 | v1beta1 | v1.25 | Hotfix to address handling of Application Gateway for Containers frontends during controller restart in managed scenario |
Lines changed: 103 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,103 @@
1+
apiVersion: v1
2+
kind: Namespace
3+
metadata:
4+
name: test-infra
5+
---
6+
7+
apiVersion: v1
8+
kind: Service
9+
metadata:
10+
name: backend-v1
11+
namespace: test-infra
12+
spec:
13+
selector:
14+
app: backend-v1
15+
ports:
16+
- protocol: TCP
17+
port: 8080
18+
targetPort: 3000
19+
---
20+
21+
apiVersion: apps/v1
22+
kind: Deployment
23+
metadata:
24+
name: backend-v1
25+
namespace: test-infra
26+
labels:
27+
app: backend-v1
28+
spec:
29+
replicas: 2
30+
selector:
31+
matchLabels:
32+
app: backend-v1
33+
template:
34+
metadata:
35+
labels:
36+
app: backend-v1
37+
spec:
38+
containers:
39+
- name: backend-v1
40+
image: gcr.io/k8s-staging-ingressconformance/echoserver:v20221109-7ee2f3e
41+
lifecycle:
42+
preStop:
43+
exec:
44+
command: ["sleep", "10"]
45+
env:
46+
- name: POD_NAME
47+
valueFrom:
48+
fieldRef:
49+
fieldPath: metadata.name
50+
- name: NAMESPACE
51+
valueFrom:
52+
fieldRef:
53+
fieldPath: metadata.namespace
54+
resources:
55+
requests:
56+
cpu: 10m
57+
---
58+
59+
apiVersion: v1
60+
kind: Service
61+
metadata:
62+
name: backend-v2
63+
namespace: test-infra
64+
spec:
65+
selector:
66+
app: backend-v2
67+
ports:
68+
- protocol: TCP
69+
port: 8080
70+
targetPort: 3000
71+
---
72+
apiVersion: apps/v1
73+
kind: Deployment
74+
metadata:
75+
name: backend-v2
76+
namespace: test-infra
77+
labels:
78+
app: backend-v2
79+
spec:
80+
replicas: 2
81+
selector:
82+
matchLabels:
83+
app: backend-v2
84+
template:
85+
metadata:
86+
labels:
87+
app: backend-v2
88+
spec:
89+
containers:
90+
- name: backend-v2
91+
image: gcr.io/k8s-staging-ingressconformance/echoserver:v20221109-7ee2f3e
92+
env:
93+
- name: POD_NAME
94+
valueFrom:
95+
fieldRef:
96+
fieldPath: metadata.name
97+
- name: NAMESPACE
98+
valueFrom:
99+
fieldRef:
100+
fieldPath: metadata.namespace
101+
resources:
102+
requests:
103+
cpu: 10m

0 commit comments

Comments
 (0)