You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|`tenant`| Required | The directory tenant the application plans to operate against, in GUID or domain-name format. |
169
169
|`client_id`| Required | The application ID that's assigned to your app. You can find this information in the portal where you registered your app. |
170
-
|`scope`| Required | The value passed for the `scope` parameter in this request should be the resource identifier (application ID URI) of the resource you want, affixed with the `.default` suffix. For the Microsoft Graph example, the value is `https://graph.microsoft.com/.default`. <br/>This value tells the Microsoft identity platform that of all the direct application permissions you have configured for your app, the endpoint should issue a token for the ones associated with the resource you want to use. To learn more about the `/.default` scope, see the [consent documentation](v2-permissions-and-consent.md#the-default-scope). |
170
+
|`scope`| Required | The value passed for the `scope` parameter in this request should be the resource identifier (application ID URI) of the resource you want, affixed with the `.default` suffix. All scopes included must be for a single resource. Including scopes for multiple resources will result in an error. <br/>For the Microsoft Graph example, the value is `https://graph.microsoft.com/.default`. This value tells the Microsoft identity platform that of all the direct application permissions you have configured for your app, the endpoint should issue a token for the ones associated with the resource you want to use. To learn more about the `/.default` scope, see the [consent documentation](v2-permissions-and-consent.md#the-default-scope). |
171
171
|`client_secret`| Required | The client secret that you generated for your app in the app registration portal. The client secret must be URL-encoded before being sent. The Basic auth pattern of instead providing credentials in the Authorization header, per [RFC 6749](https://datatracker.ietf.org/doc/html/rfc6749#section-2.3.1) is also supported. |
172
172
|`grant_type`| Required | Must be set to `client_credentials`. |
|`tenant`| Required | The directory tenant the application plans to operate against, in GUID or domain-name format. |
191
191
|`client_id`| Required | The application (client) ID that's assigned to your app. |
192
-
|`scope`| Required | The value passed for the `scope` parameter in this request should be the resource identifier (application ID URI) of the resource you want, affixed with the `.default` suffix. For the Microsoft Graph example, the value is `https://graph.microsoft.com/.default`. <br/>This value informs the Microsoft identity platform that of all the direct application permissions you have configured for your app, it should issue a token for the ones associated with the resource you want to use. To learn more about the `/.default` scope, see the [consent documentation](v2-permissions-and-consent.md#the-default-scope). |
192
+
|`scope`| Required | The value passed for the `scope` parameter in this request should be the resource identifier (application ID URI) of the resource you want, affixed with the `.default` suffix. All scopes included must be for a single resource. Including scopes for multiple resources will result in an error. <br/>For the Microsoft Graph example, the value is `https://graph.microsoft.com/.default`. This value tells the Microsoft identity platform that of all the direct application permissions you have configured for your app, the endpoint should issue a token for the ones associated with the resource you want to use. To learn more about the `/.default` scope, see the [consent documentation](v2-permissions-and-consent.md#the-default-scope). |
193
193
|`client_assertion_type`| Required | The value must be set to `urn:ietf:params:oauth:client-assertion-type:jwt-bearer`. |
194
194
|`client_assertion`| Required | An assertion (a JSON web token) that you need to create and sign with the certificate you registered as credentials for your application. Read about [certificate credentials](active-directory-certificate-credentials.md) to learn how to register your certificate and the format of the assertion.|
195
195
|`grant_type`| Required | Must be set to `client_credentials`. |
Copy file name to clipboardExpand all lines: articles/aks/deploy-extensions-az-cli.md
+11-5Lines changed: 11 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Deploy and manage cluster extensions by using the Azure CLI
3
3
description: Learn how to use Azure CLI to deploy and manage extensions for Azure Kubernetes Service clusters.
4
-
ms.date: 05/12/2023
4
+
ms.date: 05/15/2023
5
5
ms.topic: article
6
6
author: JnHs
7
7
ms.author: jenhayes
@@ -101,7 +101,7 @@ To list all extensions installed on a cluster, use `k8s-extension list`, passing
101
101
az k8s-extension list --cluster-name <clusterName> --resource-group <resourceGroupName> --cluster-type managedClusters
102
102
```
103
103
104
-
###Update extension instance
104
+
## Update extension instance
105
105
106
106
> [!NOTE]
107
107
> Refer to documentation for the specific extension type to understand the specific settings in `--configuration-settings` and `--configuration-protected-settings` that are able to be updated. For `--configuration-protected-settings`, all settings are expected to be provided, even if only one setting is being updated. If any of these settings are omitted, those settings will be considered obsolete and deleted.
|`--resource-group`| The resource group containing the AKS cluster |
123
123
|`--cluster-type`| The cluster type on which the extension instance has to be created. Specify `managedClusters` as it maps to AKS clusters|
124
124
125
+
If updating a Kubernetes application procured through Marketplace, the following parameters are also required:
126
+
127
+
| Parameter name | Description |
128
+
|----------------|------------|
129
+
|`--plan-name`|**Plan ID** of the extension, found on the Marketplace page in the Azure portal under **Usage Information + Support**. |
130
+
|`--plan-product`|**Product ID** of the extension, found on the Marketplace page in the Azure portal under **Usage Information + Support**. An example of this is the name of the ISV offering used. |
131
+
|`--plan-publisher`|**Publisher ID** of the extension, found on the Marketplace page in the Azure portal under **Usage Information + Support**. |
|`--configuration-protected-settings-file`| Path to the JSON file having key value pairs to be used for passing in sensitive settings to the extension. If this parameter is used in the command, then `--configuration-protected-settings` can't be used in the same command. |
135
143
|`--scope`| Scope of installation for the extension - `cluster` or `namespace`|
136
144
|`--release-train`| Extension authors can publish versions in different release trains such as `Stable`, `Preview`, etc. If this parameter isn't set explicitly, `Stable` is used as default. This parameter can't be used when `autoUpgradeMinorVersion` parameter is set to `false`. |
137
-
|`--plan-name`|**Plan ID** of the extension, found on the Marketplace page in the Azure portal under **Usage Information + Support**. |
138
-
|`--plan-product`|**Product ID** of the extension, found on the Marketplace page in the Azure portal under **Usage Information + Support**. An example of this is the name of the ISV offering used. |
139
-
|`--plan-publisher`|**Publisher ID** of the extension, found on the Marketplace page in the Azure portal under **Usage Information + Support**. |
Use [Export-PfxCertificate](/powershell/module/pki/export-pfxcertificate) with the Thumbprint that was returned to export a pfx file from the certificate. Make sure your password is 4 - 12 characters long:
56
+
Use [Export-PfxCertificate](/powershell/module/pki/export-pfxcertificate) with the Thumbprint that was returned to export a pfx file from the certificate. The supported pfc algorithms are listed at [PFXImportCertStore function](/windows/win32/api/wincrypt/nf-wincrypt-pfximportcertstore#remarks). Make sure your password is 4 - 12 characters long:
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/azacsnap-introduction.md
+9-5Lines changed: 9 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,16 +42,20 @@ Azure Application Consistent Snapshot tool (AzAcSnap) is a command-line tool tha
42
42
43
43
AzAcSnap leverages the volume snapshot and replication functionalities in Azure NetApp Files and Azure Large Instance. It provides the following benefits:
44
44
45
+
-**Rapid backup snapshots independent of database size**
46
+
- AzAcSnap takes snapshot backups regardless of the size of the volumes or database by leveraging the snapshot technology of storage.
47
+
- It takes snapshots in parallel across all the volumes thereby allowing multiple volumes to be part of the database storage.
48
+
- Tests have shown a 100+TiB database stored across 16 volumes was able to be snapshot backup in less than 2 minutes.
45
49
-**Application-consistent data protection**
46
-
AzAcSnap is a centralized solution for backing up critical database files. It ensures database consistency before performing a storage volume snapshot. As a result, it ensures that the storage volume snapshot can be used for database recovery.
50
+
- AzAcSnap can be deployed as a centralized or distributed solution for backing up critical database files. It ensures database consistency before performing a storage volume snapshot. As a result, it ensures that the storage volume snapshot can be used for database recovery.
47
51
-**Database catalog management**
48
-
When you use AzAcSnap with SAP HANA, the records within the backup catalog are kept current with storage snapshots. This capability allows a database administrator to see the backup activity.
52
+
- When you use AzAcSnap with SAP HANA, the records within the backup catalog are kept current with storage snapshots. This capability allows a database administrator to see the backup activity.
49
53
-**Ad hoc volume protection**
50
-
This capability is helpful for non-database volumes that don't need application quiescing before taking a storage snapshot. Examples include SAP HANA log-backup volumes or SAPTRANS volumes.
54
+
- This capability is helpful for non-database volumes that don't need application quiescing before taking a storage snapshot. Examples include SAP HANA log-backup volumes or SAPTRANS volumes.
51
55
-**Cloning of storage volumes**
52
-
This capability provides space-efficient storage volume clones for development and test purposes.
56
+
- This capability provides space-efficient storage volume clones for development and test purposes.
53
57
-**Support for disaster recovery**
54
-
AzAcSnap leverages storage volume replication to provide options for recovering replicated application-consistent snapshots at a remote site.
58
+
-AzAcSnap leverages storage volume replication to provide options for recovering replicated application-consistent snapshots at a remote site.
55
59
56
60
AzAcSnap is a single binary. It does not need additional agents or plug-ins to interact with the database or the storage (Azure NetApp Files via Azure Resource Manager, and Azure Large Instance via SSH). AzAcSnap must be installed on a system that has connectivity to the database and the storage. However, the flexibility of installation and configuration allows for either a single centralized installation (Azure NetApp Files only) or a fully distributed installation (Azure NetApp Files and Azure Large Instance) with copies installed on each database installation.
Copy file name to clipboardExpand all lines: articles/connectors/connectors-native-webhook.md
+14-9Lines changed: 14 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,24 +11,29 @@ tags: connectors
11
11
12
12
# Create and run automated event-based workflows by using HTTP webhooks in Azure Logic Apps
13
13
14
-
With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in HTTP Webhook connector, you can create automated tasks and workflows that subscribe to a service endpoint, wait for specific events, and run based on those events, rather than regularly checking or *polling* that endpoint.
14
+
With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the HTTP Webhook built-in connector, you can create an automated workflow that subscribes to a service endpoint, waits for specific events, and runs specific actions, rather than regularly check or *poll* the service endpoint.
15
15
16
16
Here are some example webhook-based workflows:
17
17
18
-
* Wait for an item to arrive from an [Azure Event Hub](https://github.com/logicappsio/EventHubAPI) before triggering a logic app run.
18
+
* Wait for an event to arrive from [Azure Event Hubs](https://github.com/logicappsio/EventHubAPI) before triggering a workflow run.
19
19
* Wait for an approval before continuing a workflow.
20
20
21
-
This article shows how to use the Webhook trigger and Webhook action so that your logic app can receive and respond to events at a service endpoint.
21
+
This how-to guide shows how to use the HTTP Webhook trigger and Webhook action so that your logic app workflow can receive and respond to events at a service endpoint.
22
22
23
23
## How do webhooks work?
24
24
25
-
A webhook trigger is event-based, which doesn't depend on checking or polling regularly for new items. When you save a logic app that starts with a webhook trigger, or when you change your logic app from disabled to enabled, the webhook trigger *subscribes* to the specified service endpoint by registering a *callback URL* with that endpoint. The trigger then waits for that service endpoint to call the URL, which starts running the logic app. Similar to the [Request trigger](connectors-native-reqres.md), the logic app fires immediately when the specified event happens. The webhook trigger *unsubscribes* from the service endpoint if you remove the trigger and save your logic app, or when you change your logic app from enabled to disabled.
25
+
A webhook trigger is event-based, which doesn't depend on checking or polling regularly for new data or events. After you add a webhook trigger to an empty workflow and then save the workflow, or after you re-enable a disabled logic app resource, the webhook trigger *subscribes* to the specified service endpoint by registering a *callback URL* with that endpoint. The trigger then waits for that service endpoint to call the URL, which fires the trigger and starts the workflow. Similar to the [Request trigger](connectors-native-reqres.md), a webhook trigger fires immediately. The webhook trigger also remains subscribed to the service endpoint unless you manually take the following actions:
26
26
27
-
A webhook action is also event-based and *subscribes* to the specified service endpoint by registering a *callback URL* with that endpoint. The webhook action pauses the logic app's workflow and waits until the service endpoint calls the URL before the logic app resumes running. The webhook action *unsubscribes* from the service endpoint in these cases:
27
+
* Change the trigger's parameter values.
28
+
* Delete the trigger and then save your workflow.
29
+
* Disable your logic app resource.
28
30
29
-
* When the webhook action successfully finishes
30
-
* If the logic app run is canceled while waiting for a response
31
-
* Before the logic app times out
31
+
Similar to the webhook trigger, a webhook action works is also event-based. After you add a webhook action to an existing workflow and then save the workflow, or after you re-enable a disabled logic app resource, the webhook action *subscribes* to the specified service endpoint by registering a *callback URL* with that endpoint. When the workflow runs, the webhook action pauses the workflow and waits until the service endpoint calls the URL before the workflow resumes running. A webhook action *unsubscribes* from the service endpoint when the following conditions occur:
32
+
33
+
* The webhook action successfully finishes.
34
+
* The workflow run is canceled while waiting for a response.
35
+
* Before a workflow run times out.
36
+
* You change any webhook action parameter values that are used as inputs by a webhook trigger.
32
37
33
38
For example, the Office 365 Outlook connector's [**Send approval email**](connectors-create-api-office365-outlook.md) action is an example of webhook action that follows this pattern. You can extend this pattern into any service by using the webhook action.
34
39
@@ -51,7 +56,7 @@ For information about encryption, security, and authorization for inbound calls
51
56
52
57
This built-in trigger calls the subscribe endpoint on the target service and registers a callback URL with the target service. Your logic app then waits for the target service to send an `HTTP POST` request to the callback URL. When this event happens, the trigger fires and passes any data in the request along to the workflow.
53
58
54
-
1.Sign in to the [Azure portal](https://portal.azure.com). Open your blank logic app in Logic App Designer.
59
+
1.In the [Azure portal](https://portal.azure.com), pen your blank logic app workflow in the designer.
55
60
56
61
1. In the designer's search box, enter `http webhook` as your filter. From the **Triggers** list, select the **HTTP Webhook** trigger.
Copy file name to clipboardExpand all lines: articles/firewall-manager/overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,8 +83,8 @@ Azure Firewall Manager has the following known issues:
83
83
|---------|---------|---------|
84
84
|Traffic splitting|Microsoft 365 and Azure Public PaaS traffic splitting isn't currently supported. As such, selecting a third-party provider for V2I or B2I also sends all Azure Public PaaS and Microsoft 365 traffic via the partner service.|Investigating traffic splitting at the hub.
85
85
|Base policies must be in same region as local policy|Create all your local policies in the same region as the base policy. You can still apply a policy that was created in one region on a secured hub from another region.|Investigating|
86
-
|Filtering inter-hub traffic in secure virtual hub deployments|Secured Virtual Hub to Secured Virtual Hub communication filtering isn't yet supported. However, hub to hub communication still works if private traffic filtering via Azure Firewall isn't enabled.|Investigating|
87
-
|Branch to branch traffic with private traffic filtering enabled|Branch to branch traffic isn't supported when private traffic filtering is enabled. |Investigating.<br><br>Don't secure private traffic if branch to branch connectivity is critical.|
86
+
|Filtering inter-hub traffic in secure virtual hub deployments|Secured Virtual Hub to Secured Virtual Hub communication filtering is supported with the Routing Intent feature.|Enable Routing Intent on your Virtual WAN Hub by setting Inter-hub to **Enabled** in Azure Firewall Manager. See [Routing Intent documentation](../virtual-wan/how-to-routing-policies.md) for more information about this feature.|
87
+
|Branch to branch traffic with private traffic filtering enabled|Branch to branch traffic can be inspected by Azure Firewall in secured hub scenarios if Routing Intent is enabled. |Enable Routing Intent on your Virtual WAN Hub by setting Inter-hub to **Enabled** in Azure Firewall Manager. See [Routing Intent documentation](../virtual-wan/how-to-routing-policies.md) for more information about this feature.|
88
88
|All Secured Virtual Hubs sharing the same virtual WAN must be in the same resource group.|This behavior is aligned with Virtual WAN Hubs today.|Create multiple Virtual WANs to allow Secured Virtual Hubs to be created in different resource groups.|
89
89
|Bulk IP address addition fails|The secure hub firewall goes into a failed state if you add multiple public IP addresses.|Add smaller public IP address increments. For example, add 10 at a time.|
90
90
|DDoS Protection not supported with secured virtual hubs|DDoS Protection is not integrated with vWANs.|Investigating|
0 commit comments