Skip to content

Commit 07638d3

Browse files
authored
Merge pull request #50629 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 66448f0 + 5d7b748 commit 07638d3

File tree

5 files changed

+42
-23
lines changed

5 files changed

+42
-23
lines changed

articles/active-directory/connect/active-directory-aadconnect-azure-adfs.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -182,18 +182,21 @@ Select the newly created ILB in the Load Balancers panel. It will open the setti
182182

183183
**6.3. Configuring probe**
184184

185-
In the ILB settings panel, select Probes.
185+
In the ILB settings panel, select Health probes.
186186

187187
1. Click on add
188188
2. Provide details for probe
189189
a. **Name**: Probe name
190-
b. **Protocol**: TCP
191-
c. **Port**: 443 (HTTPS)
192-
d. **Interval**: 5 (default value) – this is the interval at which ILB will probe the machines in the backend pool
193-
e. **Unhealthy threshold limit**: 2 (default value) – this is the threshold of consecutive probe failures after which ILB will declare a machine in the backend pool non-responsive and stop sending traffic to it.
190+
b. **Protocol**: HTTP
191+
c. **Port**: 80 (HTTP)
192+
d. **Path**: /adfs/probe
193+
e. **Interval**: 5 (default value) – this is the interval at which ILB will probe the machines in the backend pool
194+
f. **Unhealthy threshold limit**: 2 (default value) – this is the threshold of consecutive probe failures after which ILB will declare a machine in the backend pool non-responsive and stop sending traffic to it.
194195

195196
![Configure ILB probe](./media/active-directory-aadconnect-azure-adfs/ilbdeployment4.png)
196197

198+
We are using the /adfs/probe endpoint that was created explictly for health checks in an AD FS environment where a full HTTPS path check cannot happen. This is substantially better than a basic port 443 check, which does not accurately reflect the status of a modern AD FS deployment. More information on this can be found at https://blogs.technet.microsoft.com/applicationproxyblog/2014/10/17/hardware-load-balancer-health-checks-and-web-application-proxy-ad-fs-2012-r2/.
199+
197200
**6.4. Create load balancing rules**
198201

199202
In order to effectively balance the traffic, the ILB should be configured with load balancing rules. In order to create a load balancing rule,

articles/ansible/ansible-manage-azure-dynamic-inventories.md

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -131,20 +131,21 @@ The purpose of tags is to enable the ability to quickly and easily work with sub
131131

132132
1. Insert the following code into the newly created `nginx.yml` file:
133133

134-
```yml
135-
- name: Install and start Nginx on an Azure virtual machine
136-
hosts: azure
137-
become: yes
138-
tasks:
139-
- name: install nginx
140-
apt: pkg=nginx state=installed
141-
notify:
142-
- start nginx
143-
144-
handlers:
145-
- name: start nginx
146-
service: name=nginx state=started
147-
```
134+
```yml
135+
---
136+
- name: Install and start Nginx on an Azure virtual machine
137+
hosts: azure
138+
become: yes
139+
tasks:
140+
- name: install nginx
141+
apt: pkg=nginx state=installed
142+
notify:
143+
- start nginx
144+
145+
handlers:
146+
- name: start nginx
147+
service: name=nginx state=started
148+
```
148149
149150
1. Run the `nginx.yml` playbook:
150151

articles/azure-stack/user/azure-stack-solution-pipeline.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,10 @@ The following steps describe what's required to configure authentication:
104104

105105
### Create a Service Principal
106106

107-
Refer to the [Service Principal Creation](https://docs.microsoft.com/azure/active-directory/develop/active-directory-integrating-applications) instructions to create a service principal, and then choose **Web App/API** for the Application Type.
107+
Refer to the [Service Principal Creation](https://docs.microsoft.com/azure/active-directory/develop/active-directory-integrating-applications) instructions to create a service principal, and then choose **Web App/API** for the Application Type or [use this PowerShell script](https://github.com/Microsoft/vsts-rm-extensions/blob/master/TaskModules/powershell/Azure/SPNCreation.ps1#L5) as explained [here](https://docs.microsoft.com/en-us/vsts/pipelines/library/connect-to-azure?view=vsts#create-an-azure-resource-manager-service-connection-with-an-existing-service-principal).
108+
109+
> [!Note]
110+
> If you will use the script to create an Azure Stack Azure Resource Manager endpoint, you need to pass in the `-azureStackManagementURL` and `-environmentName` parameters, that is https://management.local.azurestack.external/ and *AzureStack*.
108111
109112
### Create an access key
110113

@@ -257,7 +260,19 @@ By creating endpoints, a Visual Studio Online (VSTO) build can deploy Azure Serv
257260
9. In **Add users and groups**, enter a user name and select that user from the list of users.
258261
10. Select **Save changes**.
259262

260-
Now that the endpoint information exists, the VSTS to Azure Stack connection is ready to use. The build agent in Azure Stack gets instructions from VSTS, and then the agent conveys endpoint information for communication with Azure Stack.
263+
## Create Azure Stack endpoint
264+
265+
Check [this](https://docs.microsoft.com/en-us/vsts/pipelines/library/connect-to-azure?view=vsts#create-an-azure-resource-manager-service-connection-with-an-existing-service-principal) documentation to create a service connection with an existing service principal and use the following mapping:
266+
267+
- Environment: AzureStack
268+
- Environment URL: Something like `https://management.local.azurestack.external`
269+
- Subscription ID: User subscription ID from Azure Stack
270+
- Subscription name: User subscription name from Azure Stack
271+
- Service Principal client ID: The principal ID from [this](https://docs.microsoft.com/en-us/azure/azure-stack/user/azure-stack-solution-pipeline#create-a-service-principal) section in this article.
272+
- Service Principal key: The key from the same article (or the password if you used the script).
273+
- Tenant ID: The tenant ID you got [here](https://docs.microsoft.com/en-us/azure/azure-stack/user/azure-stack-solution-pipeline#get-the-tenant-id).
274+
275+
Now that the endpoint is created, the VSTS to Azure Stack connection is ready to use. The build agent in Azure Stack gets instructions from VSTS, and then the agent conveys endpoint information for communication with Azure Stack.
261276

262277
![Build agent](media\azure-stack-solution-hybrid-pipeline\016_save_changes.png)
263278

articles/monitoring/monitoring-container-health.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -222,7 +222,7 @@ If you choose to use the Azure CLI, you first need to install and use the CLI lo
222222
"contentVersion": "1.0.0.0",
223223
"parameters": {
224224
"aksResourceId": {
225-
"value": "/subscriptions/<SubscroptiopnId>/resourcegroups/<ResourceGroup>/providers/Microsoft.ContainerService/managedClusters/<ResourceName>"
225+
"value": "/subscriptions/<SubscriptionId>/resourcegroups/<ResourceGroup>/providers/Microsoft.ContainerService/managedClusters/<ResourceName>"
226226
},
227227
"aksResourceLocation": {
228228
"value": "East US"

articles/virtual-machines/windows/sql/virtual-machines-windows-portal-sql-availability-group-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ The diagram illustrates the parts of a complete SQL Server Availability Group in
3131

3232
The key difference for an Availability Group in Azure Virtual Machines is that the Azure virtual machines, require a [load balancer](../../../load-balancer/load-balancer-overview.md). The load balancer holds the IP addresses for the availability group listener. If you have more than one availability group each group requires a listener. One load balancer can support multiple listeners.
3333

34-
When you are ready to build a SQL Server availability aroup on Azure Virtual Machines, refer to these tutorials.
34+
When you are ready to build a SQL Server availability group on Azure Virtual Machines, refer to these tutorials.
3535

3636
## Automatically create an availability group from a template
3737

0 commit comments

Comments
 (0)