You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/managed-service-identity/qs-configure-template-windows-vm.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -170,6 +170,10 @@ In this section, you assign a user assigned identity to an Azure VM using Azure
170
170
### Assign a user assigned identity to an Azure VM
171
171
172
172
1. Under the `resources` element, add the following entry to assign a user assigned identity to your VM. Be sure to replace `<USERASSIGNEDIDENTITY>` with the name of the user assigned identity you created.
173
+
174
+
> [!Important]
175
+
> The `<USERASSIGNEDIDENTITYNAME>` value shown in the following example must be stored in a variable. Also, for the currently supported implementation of assigning user assigned identities to a virtual machine in a Resource Manager template, the api version must match the version in the following example.
Copy file name to clipboardExpand all lines: articles/active-directory/managed-service-identity/qs-configure-template-windows-vmss.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -109,6 +109,9 @@ In this section, you assign a user assigned identity to an Azure VMSS using Azur
109
109
110
110
1. Under the `resources` element, add the following entry to assign a user assigned identity to your VMSS. Be sure to replace `<USERASSIGNEDIDENTITY>` with the name of the user assigned identity you created.
111
111
112
+
> [!Important]
113
+
> The `<USERASSIGNEDIDENTITYNAME>` value shown in the following example must be stored in a variable. Also, for the currently supported implementation of assigning user assigned identities to a virtual machine in a Resource Manager template, the api version must match the version in the following example.
114
+
112
115
```json
113
116
{
114
117
"name": "[variables('vmssName')]",
@@ -117,7 +120,7 @@ In this section, you assign a user assigned identity to an Azure VMSS using Azur
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/atlassian-cloud-tutorial.md
+13-8Lines changed: 13 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.workload: identity
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: article
16
-
ms.date: 04/17/2018
16
+
ms.date: 07/16/2018
17
17
ms.author: jeedes
18
18
19
19
---
@@ -34,7 +34,7 @@ For more information about software as a service (SaaS) app integration with Azu
34
34
To configure Azure AD integration with Atlassian Cloud, you need the following items:
35
35
36
36
- An Azure AD subscription.
37
-
- To enable Security Assertion Markup Language (SAML) single sign-on for Atlassian Cloud products, you need to set up Identity Manager. Learn more about [Identity Manager](https://www.atlassian.com/enterprise/cloud/identity-manager).
37
+
- To enable Security Assertion Markup Language (SAML) single sign-on for Atlassian Cloud products, you need to set up Atlassian Access. Learn more about [Atlassian Access](https://www.atlassian.com/enterprise/cloud/identity-manager).
38
38
39
39
> [!NOTE]
40
40
> When you test the steps in this tutorial, we recommend that you not use a production environment.
@@ -94,22 +94,27 @@ To configure Azure AD single sign-on with Atlassian Cloud, do the following:
3. To configure the application in IDP-initiated mode, under **Atlassian Cloud Domain and URLs**, do the following:
97
+
3. To configure the application in **IDP-initiated** mode, under **Atlassian Cloud Domain and URLs**, do the following:
98
98
99
99

100
100
101
-
a. In the **Identifier** box, type **`https://auth.atlassian.com/saml/<unique ID>`**.
101
+
a. In the **Identifier** box, type a URL with the following pattern: `https://auth.atlassian.com/saml/<unique ID>`.
102
102
103
-
b. In the **Reply URL** box, type **`https://auth.atlassian.com/login/callback?connection=saml-<unique ID>`**.
103
+
b. In the **Reply URL** box, type a URL with the following pattern: `https://auth.atlassian.com/login/callback?connection=saml-<unique ID>`.
104
104
105
-
c. In the **Relay State** box, type a URL with the following syntax: **`https://<instancename>.atlassian.net`**.
105
+
c. Check **Show advanced URL settings**.
106
106
107
-
4. To configure the application in SP-initiated mode, select the **Show advanced URL settings** and then, in the **Sign on URL** box, type a URL with the following syntax: **`https://<instancename>.atlassian.net`**.
107
+
d. In the **Relay State** box, type a URL with the following pattern: `https://<instancename>.atlassian.net`.
108
+
109
+
> [!NOTE]
110
+
> The preceding values are not real. Update these values with the actual identifier and reply URL. You will get these real values from the Atlassian Cloud SAML Configuration screen which is explained later in the tutorial.
111
+
112
+
4. To configure the application in SP-initiated mode, select the **Show advanced URL settings** and then, in the **Sign on URL** box, type a URL with the following pattern: `https://<instancename>.atlassian.net`.
108
113
109
114

110
115
111
116
> [!NOTE]
112
-
> The preceding values are not real. Update them with the actual identifier, reply URL, and sign-on URL values. You can get the real values from the Atlassian Cloud SAML Configuration screen. We explain the values later in the tutorial.
117
+
> The preceding Sign on URL value is not real. Update the value with the actual Sign on URL. Contact [Atlassian Cloud Client support team](https://support.atlassian.com/) to get this value.
113
118
114
119
5. Under **SAML Signing Certificate**, select **Certificate(Base64)**, and then save the certificate file on your computer.
Copy file name to clipboardExpand all lines: articles/aks/http-application-routing.md
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: HTTP Application Routing add-on on Azure Container Service (AKS)
3
-
description: Use HTTP Application Routing add-on on Azure Container Service (AKS)
2
+
title: HTTP application routing add-on on Azure Kubernetes Service (AKS)
3
+
description: Use the HTTP application routing add-on on Azure Kubernetes Service (AKS).
4
4
services: container-service
5
5
author: lachie83
6
6
manager: jeconnoc
@@ -13,26 +13,26 @@ ms.author: laevenso
13
13
14
14
# HTTP application routing
15
15
16
-
The HTTP Application Routing solution makes it easy to access applications deployed to your AKS cluster. When enabled, the solutionconfigures an ingress controller in your AKS cluster. Additionally, as applications are deployed, the solution also creates publically accessible DNS names for application endpoints.
16
+
The HTTP application routing solution makes it easy to access applications that are deployed to your Azure Kubernetes Service (AKS) cluster. When the solution's enabled, it configures an Ingress controller in your AKS cluster. As applications are deployed, the solution also creates publically accessible DNS names for application endpoints.
17
17
18
-
Enabling this add-on creates a DNS Zone in your subscription. For more information about DNS cost, see [DNS pricing][dns-pricing].
18
+
When the add-on is enabled, it creates a DNS Zone in your subscription. For more information about DNS cost, see [DNS pricing][dns-pricing].
19
19
20
20
## HTTP routing solution overview
21
21
22
-
The add-on deploys two components a [Kubernetes Ingress Controller][ingress] and an [External-DNS][external-dns] controller.
22
+
The add-on deploys two components: a [Kubernetes Ingress controller][ingress] and an [External-DNS][external-dns] controller.
23
23
24
-
-**Ingress controller** - the ingress controller is exposed to the internet using a Kubernetes service of type LoadBalancer. The ingress controller watches and implements [Kubernetes ingress resources][ingress-resource], which creates routes to application endpoints.
25
-
-**External-DNS controller** - watches for Kubernetes ingress resources and creates DNS A records in the cluster-specific DNS Zone.
24
+
-**Ingress controller**: The Ingress controller is exposed to the internet by using a Kubernetes service of type LoadBalancer. The Ingress controller watches and implements [Kubernetes Ingress resources][ingress-resource], which creates routes to application endpoints.
25
+
-**External-DNS controller**: Watches for Kubernetes Ingress resources and creates DNS A records in the cluster-specific DNS zone.
26
26
27
-
## Deploy HTTP routing - CLI
27
+
## Deploy HTTP routing: CLI
28
28
29
-
The HTTP Application Routing add-on can be enabled with the Azure CLI when deploying and AKS cluster. To do so, use the [az aks create][az-aks-create] command with the `--enable-addons` argument.
29
+
The HTTP application routing add-on can be enabled with the Azure CLI when deploying an AKS cluster. To do so, use the [az aks create][az-aks-create] command with the `--enable-addons` argument.
30
30
31
31
```azurecli
32
32
az aks create --resource-group myAKSCluster --name myAKSCluster --enable-addons http_application_routing
33
33
```
34
34
35
-
Once the cluster has been deployed, used the [az aks show][az-aks-show] command to retrieve the DNS zone name. This name is needed when deploying applications to the AKS cluster.
35
+
After the cluster is deployed, use the [az aks show][az-aks-show] command to retrieve the DNS zone name. This name is needed to deploy applications to the AKS cluster.
36
36
37
37
```azurecli
38
38
$ az aks show --resource-group myAKSCluster --name myAKSCluster --query addonProfiles.httpApplicationRouting.config.HTTPApplicationRoutingZoneName -o table
The HTTP Application Routing add-on can be enabled through the Azure portal when deploying an AKS cluster.
47
+
The HTTP application routing add-on can be enabled through the Azure portal when deploying an AKS cluster.
48
48
49
49

50
50
51
-
Once the cluster has been deployed, browse to the auto-created AKS resource group and select the DNS zone. Take note of the DNS zone name. This name is needed when deploying applications to the AKS cluster.
51
+
After the cluster is deployed, browse to the auto-created AKS resource group and select the DNS zone. Take note of the DNS zone name. This name is needed to deploy applications to the AKS cluster.
52
52
53
53

54
54
55
55
## Use HTTP routing
56
56
57
-
The HTTP Application routing solution may only be triggered on Ingress resources that are annotated as follows:
57
+
The HTTP application routing solution may only be triggered on Ingress resources that are annotated as follows:
Create a file named `samples-http-application-routing.yaml` and copy in the following YAML. On line 43, update `<CLUSTER_SPECIFIC_DNS_ZONE>` with the DNS zone name collected in the last step of this document.
64
+
Create a file named **samples-http-application-routing.yaml** and copy in the following YAML. On line 43, update `<CLUSTER_SPECIFIC_DNS_ZONE>` with the DNS zone name collected in the last step of this article.
65
65
66
66
67
67
```yaml
@@ -123,7 +123,7 @@ service "party-clippy" created
123
123
ingress "party-clippy" created
124
124
```
125
125
126
-
Use cURL or a browser to navigate to the hostname specified in the host section of the `samples-http-application-routing.yaml` file. The application may take up to one minute before it's available via the internet.
126
+
Use cURL or a browser to navigate to the hostname specified in the host section of the samples-http-application-routing.yaml file. The application can take up to one minute before it's available via the internet.
Use the [kubectl logs][kubectl-logs] command to view the application logs for the External-DNS application. The logs should confirm that an A and TXT DNS record has been created successfully.
151
+
Use the [kubectl logs][kubectl-logs] command to view the application logs for the External-DNS application. The logs should confirm that an A and TXT DNS record were created successfully.
@@ -161,7 +161,7 @@ These records can also be seen on the DNS zone resource in the Azure portal.
161
161
162
162

163
163
164
-
Use the [kubectl logs][kubectl-logs] command to view the application logs for the Nginx Ingress Controller. The logs should confirm the CREATE of an Ingress resource and the reload of the controller. All HTTP activity will be logged.
164
+
Use the [kubectl logs][kubectl-logs] command to view the application logs for the Nginx Ingress controller. The logs should confirm the `CREATE` of an Ingress resource and the reload of the controller. All HTTP activity is logged.
0 commit comments