You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/connect/active-directory-aadconnect-azure-adfs.md
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -182,18 +182,21 @@ Select the newly created ILB in the Load Balancers panel. It will open the setti
182
182
183
183
**6.3. Configuring probe**
184
184
185
-
In the ILB settings panel, select Probes.
185
+
In the ILB settings panel, select Health probes.
186
186
187
187
1. Click on add
188
188
2. Provide details for probe
189
189
a. **Name**: Probe name
190
-
b. **Protocol**: TCP
191
-
c. **Port**: 443 (HTTPS)
192
-
d. **Interval**: 5 (default value) – this is the interval at which ILB will probe the machines in the backend pool
193
-
e. **Unhealthy threshold limit**: 2 (default value) – this is the threshold of consecutive probe failures after which ILB will declare a machine in the backend pool non-responsive and stop sending traffic to it.
190
+
b. **Protocol**: HTTP
191
+
c. **Port**: 80 (HTTP)
192
+
d. **Path**: /adfs/probe
193
+
e. **Interval**: 5 (default value) – this is the interval at which ILB will probe the machines in the backend pool
194
+
f. **Unhealthy threshold limit**: 2 (default value) – this is the threshold of consecutive probe failures after which ILB will declare a machine in the backend pool non-responsive and stop sending traffic to it.
We are using the /adfs/probe endpoint that was created explictly for health checks in an AD FS environment where a full HTTPS path check cannot happen. This is substantially better than a basic port 443 check, which does not accurately reflect the status of a modern AD FS deployment. More information on this can be found at https://blogs.technet.microsoft.com/applicationproxyblog/2014/10/17/hardware-load-balancer-health-checks-and-web-application-proxy-ad-fs-2012-r2/.
199
+
197
200
**6.4. Create load balancing rules**
198
201
199
202
In order to effectively balance the traffic, the ILB should be configured with load balancing rules. In order to create a load balancing rule,
Copy file name to clipboardExpand all lines: articles/azure-stack/user/azure-stack-solution-pipeline.md
+17-2Lines changed: 17 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -104,7 +104,10 @@ The following steps describe what's required to configure authentication:
104
104
105
105
### Create a Service Principal
106
106
107
-
Refer to the [Service Principal Creation](https://docs.microsoft.com/azure/active-directory/develop/active-directory-integrating-applications) instructions to create a service principal, and then choose **Web App/API** for the Application Type.
107
+
Refer to the [Service Principal Creation](https://docs.microsoft.com/azure/active-directory/develop/active-directory-integrating-applications) instructions to create a service principal, and then choose **Web App/API** for the Application Type or [use this PowerShell script](https://github.com/Microsoft/vsts-rm-extensions/blob/master/TaskModules/powershell/Azure/SPNCreation.ps1#L5) as explained [here](https://docs.microsoft.com/en-us/vsts/pipelines/library/connect-to-azure?view=vsts#create-an-azure-resource-manager-service-connection-with-an-existing-service-principal).
108
+
109
+
> [!Note]
110
+
> If you will use the script to create an Azure Stack Azure Resource Manager endpoint, you need to pass in the `-azureStackManagementURL` and `-environmentName` parameters, that is https://management.local.azurestack.external/ and *AzureStack*.
108
111
109
112
### Create an access key
110
113
@@ -257,7 +260,19 @@ By creating endpoints, a Visual Studio Online (VSTO) build can deploy Azure Serv
257
260
9. In **Add users and groups**, enter a user name and select that user from the list of users.
258
261
10. Select **Save changes**.
259
262
260
-
Now that the endpoint information exists, the VSTS to Azure Stack connection is ready to use. The build agent in Azure Stack gets instructions from VSTS, and then the agent conveys endpoint information for communication with Azure Stack.
263
+
## Create Azure Stack endpoint
264
+
265
+
Check [this](https://docs.microsoft.com/en-us/vsts/pipelines/library/connect-to-azure?view=vsts#create-an-azure-resource-manager-service-connection-with-an-existing-service-principal) documentation to create a service connection with an existing service principal and use the following mapping:
266
+
267
+
- Environment: AzureStack
268
+
- Environment URL: Something like `https://management.local.azurestack.external`
269
+
- Subscription ID: User subscription ID from Azure Stack
270
+
- Subscription name: User subscription name from Azure Stack
271
+
- Service Principal client ID: The principal ID from [this](https://docs.microsoft.com/en-us/azure/azure-stack/user/azure-stack-solution-pipeline#create-a-service-principal) section in this article.
272
+
- Service Principal key: The key from the same article (or the password if you used the script).
273
+
- Tenant ID: The tenant ID you got [here](https://docs.microsoft.com/en-us/azure/azure-stack/user/azure-stack-solution-pipeline#get-the-tenant-id).
274
+
275
+
Now that the endpoint is created, the VSTS to Azure Stack connection is ready to use. The build agent in Azure Stack gets instructions from VSTS, and then the agent conveys endpoint information for communication with Azure Stack.
Copy file name to clipboardExpand all lines: articles/virtual-machines/windows/sql/virtual-machines-windows-portal-sql-availability-group-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ The diagram illustrates the parts of a complete SQL Server Availability Group in
31
31
32
32
The key difference for an Availability Group in Azure Virtual Machines is that the Azure virtual machines, require a [load balancer](../../../load-balancer/load-balancer-overview.md). The load balancer holds the IP addresses for the availability group listener. If you have more than one availability group each group requires a listener. One load balancer can support multiple listeners.
33
33
34
-
When you are ready to build a SQL Server availability aroup on Azure Virtual Machines, refer to these tutorials.
34
+
When you are ready to build a SQL Server availability group on Azure Virtual Machines, refer to these tutorials.
35
35
36
36
## Automatically create an availability group from a template
0 commit comments