Skip to content

Commit 15bfce0

Browse files
authored
Merge pull request #46803 from MicrosoftDocs/master
7/17 AM Publish
2 parents e32ea47 + 3fd8800 commit 15bfce0

File tree

112 files changed

+1820
-1047
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

112 files changed

+1820
-1047
lines changed

articles/active-directory-b2c/active-directory-b2c-create-custom-attributes-profile-edit-custom.md

Lines changed: 80 additions & 80 deletions
Large diffs are not rendered by default.

articles/active-directory/managed-service-identity/qs-configure-template-windows-vm.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -170,6 +170,10 @@ In this section, you assign a user assigned identity to an Azure VM using Azure
170170
### Assign a user assigned identity to an Azure VM
171171

172172
1. Under the `resources` element, add the following entry to assign a user assigned identity to your VM. Be sure to replace `<USERASSIGNEDIDENTITY>` with the name of the user assigned identity you created.
173+
174+
> [!Important]
175+
> The `<USERASSIGNEDIDENTITYNAME>` value shown in the following example must be stored in a variable. Also, for the currently supported implementation of assigning user assigned identities to a virtual machine in a Resource Manager template, the api version must match the version in the following example.
176+
173177
```json
174178
{
175179
"apiVersion": "2017-12-01",

articles/active-directory/managed-service-identity/qs-configure-template-windows-vmss.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,6 +109,9 @@ In this section, you assign a user assigned identity to an Azure VMSS using Azur
109109

110110
1. Under the `resources` element, add the following entry to assign a user assigned identity to your VMSS. Be sure to replace `<USERASSIGNEDIDENTITY>` with the name of the user assigned identity you created.
111111

112+
> [!Important]
113+
> The `<USERASSIGNEDIDENTITYNAME>` value shown in the following example must be stored in a variable. Also, for the currently supported implementation of assigning user assigned identities to a virtual machine in a Resource Manager template, the api version must match the version in the following example.
114+
112115
```json
113116
{
114117
"name": "[variables('vmssName')]",
@@ -117,7 +120,7 @@ In this section, you assign a user assigned identity to an Azure VMSS using Azur
117120
"identity": {
118121
"type": "userAssigned",
119122
"identityIds": [
120-
"[resourceID('Micrososft.ManagedIdentity/userAssignedIdentities/<USERASSIGNEDIDENTITY>)']"
123+
"[resourceID('Micrososft.ManagedIdentity/userAssignedIdentities/',variables('<USERASSIGNEDIDENTITY>'))]"
121124
]
122125
}
123126

articles/active-directory/saas-apps/atlassian-cloud-tutorial.md

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 04/17/2018
16+
ms.date: 07/16/2018
1717
ms.author: jeedes
1818

1919
---
@@ -34,7 +34,7 @@ For more information about software as a service (SaaS) app integration with Azu
3434
To configure Azure AD integration with Atlassian Cloud, you need the following items:
3535

3636
- An Azure AD subscription.
37-
- To enable Security Assertion Markup Language (SAML) single sign-on for Atlassian Cloud products, you need to set up Identity Manager. Learn more about [Identity Manager]( https://www.atlassian.com/enterprise/cloud/identity-manager).
37+
- To enable Security Assertion Markup Language (SAML) single sign-on for Atlassian Cloud products, you need to set up Atlassian Access. Learn more about [Atlassian Access]( https://www.atlassian.com/enterprise/cloud/identity-manager).
3838

3939
> [!NOTE]
4040
> When you test the steps in this tutorial, we recommend that you not use a production environment.
@@ -94,22 +94,27 @@ To configure Azure AD single sign-on with Atlassian Cloud, do the following:
9494

9595
![Single sign-on window](./media/atlassian-cloud-tutorial/tutorial_atlassiancloud_samlbase.png)
9696

97-
3. To configure the application in IDP-initiated mode, under **Atlassian Cloud Domain and URLs**, do the following:
97+
3. To configure the application in **IDP-initiated** mode, under **Atlassian Cloud Domain and URLs**, do the following:
9898

9999
![Atlassian Cloud domain and URLs single sign-on information](./media/atlassian-cloud-tutorial/tutorial_atlassiancloud_url.png)
100100

101-
a. In the **Identifier** box, type **`https://auth.atlassian.com/saml/<unique ID>`**.
101+
a. In the **Identifier** box, type a URL with the following pattern: `https://auth.atlassian.com/saml/<unique ID>`.
102102

103-
b. In the **Reply URL** box, type **`https://auth.atlassian.com/login/callback?connection=saml-<unique ID>`**.
103+
b. In the **Reply URL** box, type a URL with the following pattern: `https://auth.atlassian.com/login/callback?connection=saml-<unique ID>`.
104104

105-
c. In the **Relay State** box, type a URL with the following syntax: **`https://<instancename>.atlassian.net`**.
105+
c. Check **Show advanced URL settings**.
106106

107-
4. To configure the application in SP-initiated mode, select the **Show advanced URL settings** and then, in the **Sign on URL** box, type a URL with the following syntax: **`https://<instancename>.atlassian.net`**.
107+
d. In the **Relay State** box, type a URL with the following pattern: `https://<instancename>.atlassian.net`.
108+
109+
> [!NOTE]
110+
> The preceding values are not real. Update these values with the actual identifier and reply URL. You will get these real values from the Atlassian Cloud SAML Configuration screen which is explained later in the tutorial.
111+
112+
4. To configure the application in SP-initiated mode, select the **Show advanced URL settings** and then, in the **Sign on URL** box, type a URL with the following pattern: `https://<instancename>.atlassian.net`.
108113

109114
![Atlassian Cloud domain and URLs single sign-on information](./media/atlassian-cloud-tutorial/tutorial_atlassiancloud_url1.png)
110115

111116
> [!NOTE]
112-
> The preceding values are not real. Update them with the actual identifier, reply URL, and sign-on URL values. You can get the real values from the Atlassian Cloud SAML Configuration screen. We explain the values later in the tutorial.
117+
> The preceding Sign on URL value is not real. Update the value with the actual Sign on URL. Contact [Atlassian Cloud Client support team](https://support.atlassian.com/) to get this value.
113118

114119
5. Under **SAML Signing Certificate**, select **Certificate(Base64)**, and then save the certificate file on your computer.
115120

articles/aks/http-application-routing.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: HTTP Application Routing add-on on Azure Container Service (AKS)
3-
description: Use HTTP Application Routing add-on on Azure Container Service (AKS)
2+
title: HTTP application routing add-on on Azure Kubernetes Service (AKS)
3+
description: Use the HTTP application routing add-on on Azure Kubernetes Service (AKS).
44
services: container-service
55
author: lachie83
66
manager: jeconnoc
@@ -13,26 +13,26 @@ ms.author: laevenso
1313

1414
# HTTP application routing
1515

16-
The HTTP Application Routing solution makes it easy to access applications deployed to your AKS cluster. When enabled, the solution configures an ingress controller in your AKS cluster. Additionally, as applications are deployed, the solution also creates publically accessible DNS names for application endpoints.
16+
The HTTP application routing solution makes it easy to access applications that are deployed to your Azure Kubernetes Service (AKS) cluster. When the solution's enabled, it configures an Ingress controller in your AKS cluster. As applications are deployed, the solution also creates publically accessible DNS names for application endpoints.
1717

18-
Enabling this add-on creates a DNS Zone in your subscription. For more information about DNS cost, see [DNS pricing][dns-pricing].
18+
When the add-on is enabled, it creates a DNS Zone in your subscription. For more information about DNS cost, see [DNS pricing][dns-pricing].
1919

2020
## HTTP routing solution overview
2121

22-
The add-on deploys two components a [Kubernetes Ingress Controller][ingress] and an [External-DNS][external-dns] controller.
22+
The add-on deploys two components: a [Kubernetes Ingress controller][ingress] and an [External-DNS][external-dns] controller.
2323

24-
- **Ingress controller** - the ingress controller is exposed to the internet using a Kubernetes service of type LoadBalancer. The ingress controller watches and implements [Kubernetes ingress resources][ingress-resource], which creates routes to application endpoints.
25-
- **External-DNS controller** - watches for Kubernetes ingress resources and creates DNS A records in the cluster-specific DNS Zone.
24+
- **Ingress controller**: The Ingress controller is exposed to the internet by using a Kubernetes service of type LoadBalancer. The Ingress controller watches and implements [Kubernetes Ingress resources][ingress-resource], which creates routes to application endpoints.
25+
- **External-DNS controller**: Watches for Kubernetes Ingress resources and creates DNS A records in the cluster-specific DNS zone.
2626

27-
## Deploy HTTP routing - CLI
27+
## Deploy HTTP routing: CLI
2828

29-
The HTTP Application Routing add-on can be enabled with the Azure CLI when deploying and AKS cluster. To do so, use the [az aks create][az-aks-create] command with the `--enable-addons` argument.
29+
The HTTP application routing add-on can be enabled with the Azure CLI when deploying an AKS cluster. To do so, use the [az aks create][az-aks-create] command with the `--enable-addons` argument.
3030

3131
```azurecli
3232
az aks create --resource-group myAKSCluster --name myAKSCluster --enable-addons http_application_routing
3333
```
3434

35-
Once the cluster has been deployed, used the [az aks show][az-aks-show] command to retrieve the DNS zone name. This name is needed when deploying applications to the AKS cluster.
35+
After the cluster is deployed, use the [az aks show][az-aks-show] command to retrieve the DNS zone name. This name is needed to deploy applications to the AKS cluster.
3636

3737
```azurecli
3838
$ az aks show --resource-group myAKSCluster --name myAKSCluster --query addonProfiles.httpApplicationRouting.config.HTTPApplicationRoutingZoneName -o table
@@ -42,26 +42,26 @@ Result
4242
9f9c1fe7-21a1-416d-99cd-3543bb92e4c3.eastus.aksapp.io
4343
```
4444

45-
## Deploy HTTP routing - portal
45+
## Deploy HTTP routing: Portal
4646

47-
The HTTP Application Routing add-on can be enabled through the Azure portal when deploying an AKS cluster.
47+
The HTTP application routing add-on can be enabled through the Azure portal when deploying an AKS cluster.
4848

4949
![Enable the HTTP routing feature](media/http-routing/create.png)
5050

51-
Once the cluster has been deployed, browse to the auto-created AKS resource group and select the DNS zone. Take note of the DNS zone name. This name is needed when deploying applications to the AKS cluster.
51+
After the cluster is deployed, browse to the auto-created AKS resource group and select the DNS zone. Take note of the DNS zone name. This name is needed to deploy applications to the AKS cluster.
5252

5353
![Get the DNS zone name](media/http-routing/dns.png)
5454

5555
## Use HTTP routing
5656

57-
The HTTP Application routing solution may only be triggered on Ingress resources that are annotated as follows:
57+
The HTTP application routing solution may only be triggered on Ingress resources that are annotated as follows:
5858

5959
```
6060
annotations:
6161
kubernetes.io/ingress.class: addon-http-application-routing
6262
```
6363

64-
Create a file named `samples-http-application-routing.yaml` and copy in the following YAML. On line 43, update `<CLUSTER_SPECIFIC_DNS_ZONE>` with the DNS zone name collected in the last step of this document.
64+
Create a file named **samples-http-application-routing.yaml** and copy in the following YAML. On line 43, update `<CLUSTER_SPECIFIC_DNS_ZONE>` with the DNS zone name collected in the last step of this article.
6565

6666

6767
```yaml
@@ -123,7 +123,7 @@ service "party-clippy" created
123123
ingress "party-clippy" created
124124
```
125125

126-
Use cURL or a browser to navigate to the hostname specified in the host section of the `samples-http-application-routing.yaml` file. The application may take up to one minute before it's available via the internet.
126+
Use cURL or a browser to navigate to the hostname specified in the host section of the samples-http-application-routing.yaml file. The application can take up to one minute before it's available via the internet.
127127

128128
```
129129
$ curl party-clippy.471756a6-e744-4aa0-aa01-89c4d162a7a7.canadaeast.aksapp.io
@@ -146,9 +146,9 @@ $ curl party-clippy.471756a6-e744-4aa0-aa01-89c4d162a7a7.canadaeast.aksapp.io
146146
147147
```
148148

149-
## Troubleshooting
149+
## Troubleshoot
150150

151-
Use the [kubectl logs][kubectl-logs] command to view the application logs for the External-DNS application. The logs should confirm that an A and TXT DNS record has been created successfully.
151+
Use the [kubectl logs][kubectl-logs] command to view the application logs for the External-DNS application. The logs should confirm that an A and TXT DNS record were created successfully.
152152

153153
```
154154
$ kubectl logs -f deploy/addon-http-application-routing-external-dns -n kube-system
@@ -161,7 +161,7 @@ These records can also be seen on the DNS zone resource in the Azure portal.
161161

162162
![Get the DNS records](media/http-routing/clippy.png)
163163

164-
Use the [kubectl logs][kubectl-logs] command to view the application logs for the Nginx Ingress Controller. The logs should confirm the CREATE of an Ingress resource and the reload of the controller. All HTTP activity will be logged.
164+
Use the [kubectl logs][kubectl-logs] command to view the application logs for the Nginx Ingress controller. The logs should confirm the `CREATE` of an Ingress resource and the reload of the controller. All HTTP activity is logged.
165165

166166
```
167167
$ kubectl logs -f deploy/addon-http-application-routing-nginx-ingress-controller -n kube-system
@@ -200,9 +200,9 @@ I0426 21:51:58.042932 9 controller.go:179] ingress backend successfully re
200200
167.220.24.46 - [167.220.24.46] - - [26/Apr/2018:21:53:20 +0000] "GET / HTTP/1.1" 200 234 "" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)" 197 0.001 [default-party-clippy-80] 10.244.0.13:8080 234 0.004 200
201201
```
202202

203-
## Cleanup
203+
## Clean up
204204

205-
Remove the associated Kubernetes objects created in this step.
205+
Remove the associated Kubernetes objects created in this article.
206206

207207
```
208208
$ kubectl delete -f samples-http-application-routing.yaml
@@ -214,7 +214,7 @@ ingress "party-clippy" deleted
214214

215215
## Next steps
216216

217-
For information on installing an HTTPS secured Ingress controller in AKS, see [HTTPS Ingress on Azure Container Service (AKS)][ingress-https]
217+
For information on how to install an HTTPS-secured Ingress controller in AKS, see [HTTPS Ingress on Azure Kubernetes Service (AKS)][ingress-https].
218218

219219
<!-- LINKS - internal -->
220220
[az-aks-create]: /cli/azure/aks?view=azure-cli-latest#az-aks-create
@@ -229,4 +229,4 @@ For information on installing an HTTPS secured Ingress controller in AKS, see [H
229229
[kubectl-get]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#get
230230
[kubectl-logs]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#logs
231231
[ingress]: https://kubernetes.io/docs/concepts/services-networking/ingress/
232-
[ingress-resource]: https://kubernetes.io/docs/concepts/services-networking/ingress/#the-ingress-resource
232+
[ingress-resource]: https://kubernetes.io/docs/concepts/services-networking/ingress/#the-ingress-resource

0 commit comments

Comments
 (0)