Skip to content

Commit 251a99a

Browse files
authored
Merge pull request #214924 from cmcclister/cm-linkfix-20221018-1
LinkFix: azure-docs-pr (2022-10) - 1
2 parents 0266ba2 + 90921b3 commit 251a99a

File tree

50 files changed

+167
-171
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+167
-171
lines changed

articles/automation/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,4 +143,4 @@ You can review the prices associated with Azure Automation on the [pricing](http
143143
## Next steps
144144

145145
> [!div class="nextstepaction"]
146-
> [Create an Automation account](/azure/automation/quickstarts/create-azure-automation-account-portal)
146+
> [Create an Automation account](./quickstarts/create-azure-automation-account-portal.md)

articles/automation/quickstarts/enable-managed-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This Quickstart shows you how to enable managed identities for an Azure Automati
1717

1818
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
1919

20-
- An Azure Automation account. For instructions, see [Create an Automation account](/azure/automation/quickstarts/create-azure-automation-account-portal).
20+
- An Azure Automation account. For instructions, see [Create an Automation account](./create-azure-automation-account-portal.md).
2121

2222
- A user-assigned managed identity. For instructions, see [Create a user-assigned managed identity](../../active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-portal.md#create-a-user-assigned-managed-identity). The user-assigned managed identity and the target Azure resources that your runbook manages using that identity must be in the same Azure subscription.
2323

@@ -70,4 +70,4 @@ If you no longer need the system-assigned managed identity enabled for your Auto
7070
In this Quickstart, you enabled managed identities for an Azure Automation account. To use your Automation account with managed identities to execute a runbook, see.
7171

7272
> [!div class="nextstepaction"]
73-
> [Tutorial: Create Automation PowerShell runbook using managed identity](../learn/powershell-runbook-managed-identity.md)
73+
> [Tutorial: Create Automation PowerShell runbook using managed identity](../learn/powershell-runbook-managed-identity.md)

articles/azure-app-configuration/concept-geo-replication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ This team would benefit from geo-replication. They can create a replica of their
3535
- Geo-replication isn't available in the free tier.
3636
- Each replica has limits, as outlined in the [App Configuration pricing page](https://azure.microsoft.com/pricing/details/app-configuration/). These limits are isolated per replica.
3737
- Azure App Configuration also supports Azure availability zones to create a resilient and highly available store within an Azure Region. Availability zone support is automatically included for a replica if the replica's region has availability zone support. The combination of availability zones for redundancy within a region, and geo-replication across multiple regions, enhances both the availability and performance of a configuration store.
38-
- Currently, you can only authenticate with replica endpoints with [Azure Active Directory (Azure AD)](/azure/app-service/overview-managed-identity).
38+
- Currently, you can only authenticate with replica endpoints with [Azure Active Directory (Azure AD)](../app-service/overview-managed-identity.md).
3939
<!--
4040
To add once these links become available:
4141
- Request handling for replicas will vary by configuration provider, for further information reference [.NET Geo-replication Reference](https://azure.microsoft.com/pricing/details/app-configuration/) and [Java Geo-replication Reference](https://azure.microsoft.com/pricing/details/app-configuration/).
@@ -50,4 +50,4 @@ Each replica created will add extra charges. Reference the [App Configuration pr
5050
> [!div class="nextstepaction"]
5151
> [How to enable Geo replication](./howto-geo-replication.md)
5252
53-
> [Resiliency and Disaster Recovery](./concept-disaster-recovery.md)
53+
> [Resiliency and Disaster Recovery](./concept-disaster-recovery.md)

articles/azure-app-configuration/quickstart-aspnet-core-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ dotnet new webapp --output TestAppConfig --framework netcoreapp3.1
7373
> [!TIP]
7474
> Some shells will truncate the connection string unless it's enclosed in quotes. Ensure that the output of the `dotnet user-secrets list` command shows the entire connection string. If it doesn't, rerun the command, enclosing the connection string in quotes.
7575
76-
Secret Manager stores the secret outside of your project tree, which helps prevent the accidental sharing of secrets within source code. It's used only to test the web app locally. When the app is deployed to Azure like [App Service](/azure/app-service/overview), use the *Connection strings*, *Application settings* or environment variables to store the connection string. Alternatively, to avoid connection strings all together, you can [connect to App Configuration using managed identities](./howto-integrate-azure-managed-service-identity.md) or your other [Azure AD identities](./concept-enable-rbac.md).
76+
Secret Manager stores the secret outside of your project tree, which helps prevent the accidental sharing of secrets within source code. It's used only to test the web app locally. When the app is deployed to Azure like [App Service](../app-service/overview.md), use the *Connection strings*, *Application settings* or environment variables to store the connection string. Alternatively, to avoid connection strings all together, you can [connect to App Configuration using managed identities](./howto-integrate-azure-managed-service-identity.md) or your other [Azure AD identities](./concept-enable-rbac.md).
7777
7878
1. Open *Program.cs*, and add Azure App Configuration as an extra configuration source by calling the `AddAzureAppConfiguration` method.
7979
@@ -248,4 +248,4 @@ In this quickstart, you:
248248
To learn how to configure your ASP.NET Core web app to dynamically refresh configuration settings, continue to the next tutorial.
249249
250250
> [!div class="nextstepaction"]
251-
> [Enable dynamic configuration](./enable-dynamic-configuration-aspnet-core.md)
251+
> [Enable dynamic configuration](./enable-dynamic-configuration-aspnet-core.md)

articles/azure-arc/kubernetes/private-link.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.custom: references_regions
88

99
# Private connectivity for Arc-enabled Kubernetes clusters using private link (preview)
1010

11-
[Azure Private Link](/azure/private-link/private-link-overview) allows you to securely link Azure services to your virtual network using private endpoints. This means you can connect your on-premises Kubernetes clusters with Azure Arc and send all traffic over an Azure ExpressRoute or site-to-site VPN connection instead of using public networks. In Azure Arc, you can use a Private Link Scope model to allow multiple Kubernetes clusters to communicate with their Azure Arc resources using a single private endpoint.
11+
[Azure Private Link](../../private-link/private-link-overview.md) allows you to securely link Azure services to your virtual network using private endpoints. This means you can connect your on-premises Kubernetes clusters with Azure Arc and send all traffic over an Azure ExpressRoute or site-to-site VPN connection instead of using public networks. In Azure Arc, you can use a Private Link Scope model to allow multiple Kubernetes clusters to communicate with their Azure Arc resources using a single private endpoint.
1212

1313
This document covers when to use and how to set up Azure Arc Private Link (preview).
1414

@@ -26,21 +26,21 @@ With Private Link you can:
2626
* Securely connect your private on-premises network to Azure Arc using ExpressRoute and Private Link.
2727
* Keep all traffic inside the Microsoft Azure backbone network.
2828

29-
For more information, see [Key benefits of Azure Private Link](/azure/private-link/private-link-overview#key-benefits).
29+
For more information, see [Key benefits of Azure Private Link](../../private-link/private-link-overview.md#key-benefits).
3030

3131
## How it works
3232

3333
Azure Arc Private Link Scope connects private endpoints (and the virtual networks they're contained in) to an Azure resource, in this case Azure Arc-enabled Kubernetes clusters. When you enable any one of the Arc-enabled Kubernetes cluster supported extensions, such as Azure Monitor, then connection to other Azure resources may be required for these scenarios. For example, in the case of Azure Monitor, the logs collected from the cluster are sent to Log Analytics workspace.
3434

35-
Connectivity to the other Azure resources from an Arc-enabled Kubernetes cluster listed earlier requires configuring Private Link for each service. For an example, see [Private Link for Azure Monitor](/azure/azure-monitor/logs/private-link-security).
35+
Connectivity to the other Azure resources from an Arc-enabled Kubernetes cluster listed earlier requires configuring Private Link for each service. For an example, see [Private Link for Azure Monitor](../../azure-monitor/logs/private-link-security.md).
3636

3737
## Current limitations
3838

3939
Consider these current limitations when planning your Private Link setup.
4040

4141
* You can associate at most one Azure Arc Private Link Scope with a virtual network.
4242
* An Azure Arc-enabled Kubernetes cluster can only connect to one Azure Arc Private Link Scope.
43-
* All on-premises Kubernetes clusters need to use the same private endpoint by resolving the correct private endpoint information (FQDN record name and private IP address) using the same DNS forwarder. For more information, see [Azure Private Endpoint DNS configuration](/azure/private-link/private-endpoint-dns). The Azure Arc-enabled Kubernetes cluster, Azure Arc Private Link Scope, and virtual network must be in the same Azure region. The Private Endpoint and the virtual network must also be in the same Azure region, but this region can be different from that of your Azure Arc Private Link Scope and Arc-enabled Kubernetes cluster.
43+
* All on-premises Kubernetes clusters need to use the same private endpoint by resolving the correct private endpoint information (FQDN record name and private IP address) using the same DNS forwarder. For more information, see [Azure Private Endpoint DNS configuration](../../private-link/private-endpoint-dns.md). The Azure Arc-enabled Kubernetes cluster, Azure Arc Private Link Scope, and virtual network must be in the same Azure region. The Private Endpoint and the virtual network must also be in the same Azure region, but this region can be different from that of your Azure Arc Private Link Scope and Arc-enabled Kubernetes cluster.
4444
* Traffic to Azure Active Directory, Azure Resource Manager and Microsoft Container Registry service tags must be allowed through your on-premises network firewall during the preview.
4545
* Other Azure services that you will use, for example Azure Monitor, requires their own private endpoints in your virtual network.
4646

@@ -52,13 +52,13 @@ Consider these current limitations when planning your Private Link setup.
5252
On Azure Arc-enabled Kubernetes clusters configured with private links, the following extensions support end-to-end connectivity through private links. Refer to the guidance linked to each cluster extension for additional configuration steps and details on support for private links.
5353

5454
* [Azure GitOps](conceptual-gitops-flux2.md)
55-
* [Azure Monitor](/azure/azure-monitor/logs/private-link-security)
55+
* [Azure Monitor](../../azure-monitor/logs/private-link-security.md)
5656

5757
## Planning your Private Link setup
5858

5959
To connect your Kubernetes cluster to Azure Arc over a private link, you need to configure your network to accomplish the following:
6060

61-
1. Establish a connection between your on-premises network and an Azure virtual network using a [site-to-site VPN](/azure/vpn-gateway/tutorial-site-to-site-portal) or [ExpressRoute](/azure/expressroute/expressroute-howto-linkvnet-arm) circuit.
61+
1. Establish a connection between your on-premises network and an Azure virtual network using a [site-to-site VPN](../../vpn-gateway/tutorial-site-to-site-portal.md) or [ExpressRoute](../../expressroute/expressroute-howto-linkvnet-arm.md) circuit.
6262
1. Deploy an Azure Arc Private Link Scope, which controls which Kubernetes clusters can communicate with Azure Arc over private endpoints and associate it with your Azure virtual network using a private endpoint.
6363
1. Update the DNS configuration on your local network to resolve the private endpoint addresses.
6464
1. Configure your local firewall to allow access to Azure Active Directory, Azure Resource Manager and Microsoft Container Registry.
@@ -72,7 +72,7 @@ Azure Arc-enabled Kubernetes integrates with several Azure services to bring clo
7272

7373
There are two ways you can achieve this:
7474

75-
* If your network is configured to route all internet-bound traffic through the Azure VPN or ExpressRoute circuit, you can configure the network security group (NSG) associated with your subnet in Azure to allow outbound TCP 443 (HTTPS) access to Azure AD, Azure Resource Manager, Azure Front Door and Microsoft Container Registry using [service tags](/azure/virtual-network/service-tags-overview). The NSG rules should look like the following:
75+
* If your network is configured to route all internet-bound traffic through the Azure VPN or ExpressRoute circuit, you can configure the network security group (NSG) associated with your subnet in Azure to allow outbound TCP 443 (HTTPS) access to Azure AD, Azure Resource Manager, Azure Front Door and Microsoft Container Registry using [service tags](../../virtual-network/service-tags-overview.md). The NSG rules should look like the following:
7676

7777
| Setting | Azure AD rule | Azure Resource Manager rule | AzureFrontDoorFirstParty rule | Microsoft Container Registry rule |
7878
|-------------------------|---------------------------------------------------------------|---------------------------------------------------------------|---------------------------------------------------------------|---------------------------------------------------------------
@@ -127,7 +127,7 @@ The Private Endpoint on your virtual network allows it to reach Azure Arc-enable
127127
:::image type="content" source="media/private-link/create-private-endpoint-2.png" alt-text="Screenshot of the Configuration step to create a private endpoint in the Azure portal.":::
128128

129129
> [!NOTE]
130-
> If you choose **No** and prefer to manage DNS records manually, first complete setting up your Private Link, including this private endpoint and the Private Scope configuration. Next, configure your DNS according to the instructions in [Azure Private Endpoint DNS configuration](/azure/private-link/private-endpoint-dns). Make sure not to create empty records as preparation for your Private Link setup. The DNS records you create can override existing settings and impact your connectivity with Arc-enabled Kubernetes clusters.
130+
> If you choose **No** and prefer to manage DNS records manually, first complete setting up your Private Link, including this private endpoint and the Private Scope configuration. Next, configure your DNS according to the instructions in [Azure Private Endpoint DNS configuration](../../private-link/private-endpoint-dns.md). Make sure not to create empty records as preparation for your Private Link setup. The DNS records you create can override existing settings and impact your connectivity with Arc-enabled Kubernetes clusters.
131131
1. Select **Review + create**.
132132
1. Let validation pass.
133133
1. Select **Create**.
@@ -140,7 +140,7 @@ Your on-premises Kubernetes clusters need to be able to resolve the private link
140140

141141
If you set up private DNS zones for Azure Arc-enabled Kubernetes clusters when creating the private endpoint, your on-premises Kubernetes clusters must be able to forward DNS queries to the built-in Azure DNS servers to resolve the private endpoint addresses correctly. You need a DNS forwarder in Azure (either a purpose-built VM or an Azure Firewall instance with DNS proxy enabled), after which you can configure your on-premises DNS server to forward queries to Azure to resolve private endpoint IP addresses.
142142

143-
The private endpoint documentation provides guidance for configuring [on-premises workloads using a DNS forwarder](/azure/private-link/private-endpoint-dns#on-premises-workloads-using-a-dns-forwarder).
143+
The private endpoint documentation provides guidance for configuring [on-premises workloads using a DNS forwarder](../../private-link/private-endpoint-dns.md#on-premises-workloads-using-a-dns-forwarder).
144144

145145
### Manual DNS server configuration
146146

@@ -197,6 +197,6 @@ If you run into problems, the following suggestions may help:
197197

198198
## Next steps
199199

200-
* Learn more about [Azure Private Endpoint](/azure/private-link/private-link-overview).
201-
* Learn how to [troubleshoot Azure Private Endpoint connectivity problems](/azure/private-link/troubleshoot-private-endpoint-connectivity).
202-
* Learn how to [configure Private Link for Azure Monitor](/azure/azure-monitor/logs/private-link-security).
200+
* Learn more about [Azure Private Endpoint](../../private-link/private-link-overview.md).
201+
* Learn how to [troubleshoot Azure Private Endpoint connectivity problems](../../private-link/troubleshoot-private-endpoint-connectivity.md).
202+
* Learn how to [configure Private Link for Azure Monitor](../../azure-monitor/logs/private-link-security.md).

articles/azure-arc/servers/migrate-azure-monitor-agent-ansible.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ This workflow performs the following tasks:
9393

9494
### Create template to install Azure Connected Machine agent
9595

96-
This template is responsible for installing the Azure Arc [Connected Machine agent](/azure/azure-arc/servers/agent-overview) on hosts within the provided inventory. A successful run will have installed the agent on all machines.
96+
This template is responsible for installing the Azure Arc [Connected Machine agent](./agent-overview.md) on hosts within the provided inventory. A successful run will have installed the agent on all machines.
9797

9898
Follow the steps below to create the template:
9999

@@ -286,5 +286,4 @@ After following the steps in this article, you have created an automation workfl
286286

287287
## Next steps
288288

289-
Learn more about [connecting machines using Ansible playbooks](onboard-ansible-playbooks.md).
290-
289+
Learn more about [connecting machines using Ansible playbooks](onboard-ansible-playbooks.md).

0 commit comments

Comments
 (0)