You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/configure-ssl-app-service-certificate.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -139,6 +139,13 @@ By default, App Service certificates have a one-year validity period. Before the
139
139
140
140
If you think your certificate's private key is compromised, you can rekey your certificate. This action rotates the certificate with a new certificate issued from the certificate authority.
141
141
142
+
> [!NOTE]
143
+
> Starting September 23 2021, if you haven't verified the domain in the last 395 days, App Service certificates require domain verification during a renew, auto-renew, or rekey process. The new certificate order remains in "pending issuance" mode during the renew, auto-renew, or rekey process until you complete the domain verification.
144
+
>
145
+
> Unlike the free App Service managed certificate, purchased App Service certificates don't have automated domain re-verification. Failure to verify domain ownership results in failed renewals. For more information about how to verify your App Service certificate, review [Confirm domain ownership](#confirm-domain-ownership).
146
+
>
147
+
> The rekey process requires that the service principal for App Service has the required permissions on your key vault. These permissions are set up for you when you import an App Service certificate through the Azure portal. Make sure that you don't remove these permissions from your key vault.
148
+
142
149
1. On the [App Service Certificates page](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.CertificateRegistration%2FcertificateOrders), select the certificate. From the left menu, select **Rekey and Sync**.
143
150
144
151
1. To start the process, select **Rekey**. This process can take 1-10 minutes to complete.
title: Tag resources, resource groups, and subscriptions for logical organization
3
-
description: Describes the conditions and limitations for using tags with Azure resources.
2
+
title: Use tags to organize your Azure resources and management hierarchy
3
+
description: Understand how to tag Azure resources, resource groups, and subscriptions for logical organization. Learn about the conditions and limitations of using tags with Azure resources.
4
4
ms.topic: conceptual
5
-
ms.date: 01/22/2025
5
+
ms.date: 02/06/2025
6
6
---
7
7
8
8
# Use tags to organize your Azure resources and management hierarchy
9
9
10
-
Tags are metadata elements that you apply to your Azure resources. They're key-value pairs that help you identify resources based on settings that are relevant to your organization. If you want to track the deployment environment for your resources, add a key named `Environment`. To identify the resources deployed to production, give them a value of `Production`. The full key-value pair is `Environment = Production`.
10
+
Tags are metadata elements that you apply to your Azure resources. They are key-value pairs that help you identify resources based on settings that are relevant to your organization. If you want to track the deployment environment for your resources, add a key named `Environment`. To identify the resources deployed to production, give them a value of `Production`. The full key-value pair is `Environment = Production`.
11
11
12
-
This article describes the conditions and limitations for using tags. For steps on how to work with tags, see:
13
-
14
-
*[Portal](tag-resources-portal.md)
15
-
*[Azure CLI](tag-resources-cli.md)
16
-
*[Azure PowerShell](tag-resources-powershell.md)
17
-
*[Python](tag-resources-python.md)
18
-
*[ARM templates](tag-resources-templates.md)
19
-
*[Bicep](tag-resources-bicep.md)
12
+
This article describes the conditions and limitations for using tags.
20
13
21
14
## Tag usage and recommendations
22
15
23
-
You can apply tags to your Azure resources, resource groups, and subscriptions, but not to management groups.
16
+
You can apply tags to your Azure resources, resource groups, and subscriptions but not to management groups.
24
17
25
18
For recommendations on how to implement a tagging strategy, see [Resource naming and tagging decision guide](/azure/cloud-adoption-framework/decision-guides/resource-tagging/?toc=/azure/azure-resource-manager/management/toc.json).
26
19
27
20
Resource tags support all cost-accruing services. To ensure that cost-accruing services are provisioned with a tag, use one of the [tag policies](tag-policies.md).
28
21
29
22
> [!WARNING]
30
-
> Tags are stored as plain text. Never add sensitive values to tags. Sensitive values could be exposed through many methods, including cost reports, commands that return existing tag definitions, deployment histories, exported templates, and monitoring logs.
23
+
> Tags are stored as plain text. Do not add sensitive values to tags. Sensitive values could be exposed through many methods, including cost reports, commands that return existing tag definitions, deployment histories, exported templates, and monitoring logs.
31
24
32
25
> [!WARNING]
33
-
> Be careful when using non-English language in your tags. It can cause decoding progress failure while loading your VM's metadata from IMDS (Instance Metadata Service).
26
+
> Be careful when using non-English language in your tags. It can cause decoding progress failure while loading your virtual machine's metadata from IMDS (Instance Metadata Service).
34
27
35
28
> [!IMPORTANT]
36
29
> Tag names are case-insensitive for operations. An operation updates or retrieves a tag with a tag name, regardless of the casing. However, the resource provider might keep the casing you provide for the tag name. You see that casing in cost reports.
@@ -41,66 +34,70 @@ Resource tags support all cost-accruing services. To ensure that cost-accruing s
41
34
42
35
## Required access
43
36
44
-
There are two ways to get the required access to tag resources.
37
+
There are two ways to get the required access to tag resources:
45
38
46
-
* You can have write access to the `Microsoft.Resources/tags` resource type. This access lets you tag any resource, even if you don't have access to the resource itself. The [Tag Contributor](../../role-based-access-control/built-in-roles.md#tag-contributor) role grants this access. The tag contributor role, for example, can't apply tags to resources or resource groups through the portal. It can, however, apply tags to subscriptions through the portal. It supports all tag operations through Azure PowerShell and REST API.
39
+
- You can have write access to the `Microsoft.Resources/tags` resource type. This access lets you tag any resource, even if you don't have access to the resource itself. The [Tag Contributor](../../role-based-access-control/built-in-roles.md#tag-contributor) role grants this access. For example, this rolecan't apply tags to resources or resource groups through the Azure portal. However, it can apply tags to subscriptions through the Azure portal. It supports all tag operations through Azure PowerShell and REST API.
47
40
48
-
* You can have write access to the resource itself. The [Contributor](../../role-based-access-control/built-in-roles.md#contributor) role grants the required access to apply tags to any entity. To apply tags to only one resource type, use the contributor role for that resource. To apply tags to virtual machines, for example, use the [Virtual Machine Contributor](../../role-based-access-control/built-in-roles.md#virtual-machine-contributor).
41
+
- You can have write access to the resource itself. The [Contributor](../../role-based-access-control/built-in-roles.md#contributor) role grants the required access to apply tags to any entity. To apply tags to only one resource type, use the Contributor role for that resource. To apply tags to virtual machines, use the [Virtual Machine Contributor](../../role-based-access-control/built-in-roles.md#virtual-machine-contributor) role.
49
42
50
43
## Inherit tags
51
44
52
-
Resources don't inherit the tags you apply to a resource group or a subscription. To apply tags from a subscription or resource group to the resources, see [Azure Policies - tags](tag-policies.md).
45
+
Resources don't inherit the tags you apply to a resource group or a subscription. To apply tags from a subscription or resource group to the resources, see [Assign policy definitions for tag compliance](tag-policies.md).
53
46
54
-
You can group costs for an Azure resource by using the **cm-resource-parent** tag. This tag lets you review tagged costs in Microsoft Cost Management without having to use filters. The key for this tag is `cm-resource-parent` and its value is the resource ID of the Azure resource you want to group costs by. For example, to group costs by an Azure Virtual Desktop host pool, provide the resource ID of the host pool. For more information, see [Group related resources in the cost analysis](../../cost-management-billing/costs/group-filter.md#group-related-resources-in-the-resources-view).
47
+
You can group costs for an Azure resource by using the **cm-resource-parent** tag. This tag lets you review tagged costs in Microsoft Cost Management without having to use filters. The key for this tag is `cm-resource-parent` and its value is the resource ID of the Azure resource you want to group costs by. For example, to group costs by an Azure Virtual Desktop host pool, provide the resource ID of the host pool. For more information, see [Group related resources in the Resources view](../../cost-management-billing/costs/group-filter.md#group-related-resources-in-the-resources-view).
55
48
56
49
## Tags and billing
57
50
58
-
Use tags to group your billing data. For example, if you're running multiple VMs for different organizations, use the tags to group usage by cost center. You can also use tags to categorize costs by runtime environment, such as the billing usage for VMs running in the production environment.
51
+
Use tags to group your billing data. For example, if you're running multiple virtual machines for different organizations, use the tags to group usage by cost center. You can also use tags to categorize costs by runtime environment, including the billing usage for virtual machines running in the production environment.
59
52
60
-
To retrieve information about tags, download the usage file from the Azure portal. For more information, see [Download or view your Azure billing invoice and daily usage data](../../cost-management-billing/manage/download-azure-invoice-daily-usage-date.md). For services that support tags with billing, the tags appear in the **Tags** column.
53
+
To retrieve information about tags, download the usage file from the Azure portal. For more information, see [Download or view your Azure billing invoice](../../cost-management-billing/manage/download-azure-invoice-daily-usage-date.md). For services that support tags with billing, the tags appear in the **Tags** column.
61
54
62
-
For REST API operations, see [Azure Billing REST API Reference](/rest/api/billing/).
55
+
For REST API operations, see the [Azure Billing REST API](/rest/api/billing/) overview.
63
56
64
57
## Unique tags pagination
65
58
66
-
When you call the [Unique Tags API](/rest/api/resources/tags/list), there's a limit to the size of each API response page. A tag that has a large set of unique values requires the API to fetch the next page to retrieve the remaining set of values. When the results are divided over multiple pages, the API response shows the tag key again to indicate that the values are still under this key.
59
+
When you call the [Unique tags API](/rest/api/resources/tags/list), there's a limit to the size of each API response page. A tag that has a large set of unique values requires the API to fetch the next page to retrieve the remaining set of values. When the results are divided over multiple pages, the API response shows the tag key again to indicate that the values are still under this key.
67
60
68
-
This behavior can result in some tools, like the Azure portal, showing the tag key twice.
61
+
This behavior can cause some tools like the Azure portal to show the tag key twice.
69
62
70
63
## Limitations
71
64
72
65
The following limitations apply to tags:
73
66
74
67
* Not all resource types support tags. To determine if you can apply a tag to a resource type, see [Tag support for Azure resources](tag-support.md).
75
-
* Each resource type might have specific requirements when working with tags. For example, you can only update tags on virtual machine (VM) extensions when the VM is running. If you receive an error message while trying to update a tag, follow the instructions in the message.
68
+
69
+
* Each resource type might have specific requirements when working with tags. For example, you can only update tags on virtual machine extensions when the virtual machine is running. If you receive an error message while trying to update a tag, follow the instructions in the message.
70
+
76
71
* Each resource, resource group, and subscription can have a maximum of 50 tag name-value pairs. If you need to apply more tags than the maximum allowed number, use a JSON string for the tag value. The JSON string can contain many of the values that you apply to a single tag name. A resource group or subscription can contain many resources that each have 50 tag name-value pairs.
72
+
77
73
* The tag name has a limit of 512 characters and the tag value has a limit of 256 characters. For storage accounts, the tag name has a limit of 128 characters and the tag value has a limit of 256 characters.
74
+
78
75
* Classic resources such as Cloud Services don't support tags.
79
-
* Azure IP Groups and Azure Firewall Policies don't support PATCH operations. PATCH API method operations, therefore, can't update tags through the portal. Instead, use the update commands for those resources. For example, you can update tags for an IP group with the [az network ip-group update](/cli/azure/network/ip-group#az-network-ip-group-update) command.
76
+
77
+
* Azure IP Groups and Azure Firewall policies don't support PATCH operations. Therefore, PATCH API method operations can't update tags through the Azure portal. Instead, use the update commands for those resources. For example, you can update tags for an IP group with the [`az network ip-group update`](/cli/azure/network/ip-group?view=azure-cli-latest) command.
78
+
80
79
* Tag names can't contain these characters: `<`, `>`, `%`, `&`, `\`, `?`, `/`
81
80
82
81
> [!NOTE]
83
-
> * Azure Domain Name System (DNS) zones don't support the use of spaces or parentheses in the tag or a tag that starts with a number. Azure DNS tag names don't support special and Unicode characters. The value can contain all characters.
82
+
> * Azure DNS zones don't support the use of spaces or parentheses in the tag or a tag that starts with a number. Azure DNS tag names don't support special and Unicode characters. The value can contain all characters.
84
83
>
85
84
> * Traffic Manager doesn't support the use of spaces, `#`, or `:` in the tag name. The tag name can't start with a number.
86
85
>
87
86
> * Azure Front Door doesn't support the use of `#` or `:` in the tag name.
88
87
>
89
88
> * The following Azure resources only support 15 tags:
90
89
> * Azure Automation
91
-
> * Azure Content Delivery Network (CDN)
90
+
> * Azure Content Delivery Network
92
91
> * Azure DNS (Zone and A records)
93
-
> * Azure Log Analytics Saved Search
92
+
> * Azure Log Analytics saved search
94
93
95
94
## Next steps
96
95
97
-
* Not all resource types support tags. To determine if you can apply a tag to a resource type, see [Tag support for Azure resources](tag-support.md).
98
-
* For recommendations on how to implement a tagging strategy, see [Resource naming and tagging decision guide](/azure/cloud-adoption-framework/decision-guides/resource-tagging/?toc=/azure/azure-resource-manager/management/toc.json).
99
-
* For steps on how to work with tags, see:
100
-
101
-
*[Portal](tag-resources-portal.md)
102
-
*[Azure CLI](tag-resources-cli.md)
103
-
*[Azure PowerShell](tag-resources-powershell.md)
104
-
*[Python](tag-resources-python.md)
105
-
*[ARM templates](tag-resources-templates.md)
106
-
*[Bicep](tag-resources-bicep.md)
96
+
For more information on how to work with tags, see:
Copy file name to clipboardExpand all lines: articles/batch/batch-pool-compute-intensive-sizes.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use compute-intensive Azure VMs with Batch
3
3
description: How to take advantage of HPC and GPU virtual machine sizes in Azure Batch pools. Learn about OS dependencies and see several scenario examples.
4
4
ms.topic: how-to
5
5
ms.custom: linux-related-content
6
-
ms.date: 06/07/2024
6
+
ms.date: 02/04/2025
7
7
---
8
8
# Use RDMA or GPU instances in Batch pools
9
9
@@ -33,7 +33,7 @@ The RDMA or GPU capabilities of compute-intensive sizes in Batch are supported o
<sup>*</sup>RDMA-capable N-series sizes also include NVIDIA Tesla GPUs
39
39
@@ -69,14 +69,16 @@ To configure a specialized VM size for your Batch pool, you have several options
69
69
70
70
* For pools in the virtual machine configuration, choose a preconfigured [Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/) VM image that has drivers and software preinstalled. Examples:
71
71
72
-
*[Data Science Virtual Machine](/azure/machine-learning/data-science-virtual-machine/overview) for Linux or Windows - includes NVIDIA CUDA drivers
72
+
*[Data Science Virtual Machine](/azure/machine-learning/data-science-virtual-machine/overview) for Linux or Windows - includes NVIDIA CUDA drivers
73
73
74
-
* Linux images for Batch container workloads that also include GPU and RDMA drivers:
74
+
* Linux images for Batch container workloads that also include GPU and RDMA drivers:
75
75
76
-
*[Ubuntu Server (with GPU and RDMA drivers) for Azure Batch container pools](https://azuremarketplace.microsoft.com/marketplace/apps/microsoft-azure-batch.ubuntu-server-container-rdma?tab=Overview)
76
+
*[Ubuntu Server (with GPU and RDMA drivers) for Azure Batch container pools](https://azuremarketplace.microsoft.com/marketplace/apps/microsoft-azure-batch.ubuntu-server-container-rdma?tab=Overview)
77
77
78
78
* Create a [custom Windows or Linux VM image](batch-sig-images.md) with installed drivers, software, or other settings required for the VM size.
79
79
80
+
*[Install GPU and RDMA drivers by VM extension](create-pool-extensions.md).
81
+
80
82
* Create a Batch [application package](batch-application-packages.md) from a zipped driver or application installer. Then, configure Batch to deploy this package to pool nodes and install once when each node is created. For example, if the application package is an installer, create a [start task](jobs-and-tasks.md#start-task) command line to silently install the app on all pool nodes. Consider using an application package and a pool start task if your workload depends on a particular driver version.
0 commit comments