Skip to content

Commit 274b550

Browse files
committed
Merge branch 'main' into release-preview-azure-operator-distributed-services
2 parents fdd1b46 + 8221212 commit 274b550

File tree

126 files changed

+2145
-756
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

126 files changed

+2145
-756
lines changed

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ These differences make workload identities harder to manage and put them at high
2929

3030
> [!IMPORTANT]
3131
> Workload Identities Premium licenses are required to create or modify Conditional Access policies scoped to service principals.
32-
> In directories without appropriate licenses, Conditional Access policies created prior to the release of Workload Identities Premium will be available for deletion only.
32+
> In directories without appropriate licenses, existing Conditional Access policies for workload identities will continue to function, but can't be modified. For more information see [Microsoft Entra Workload Identities](https://www.microsoft.com/security/business/identity-access/microsoft-entra-workload-identities#office-StandaloneSKU-k3hubfz).  
3333
3434
> [!NOTE]
3535
> Policy can be applied to single tenant service principals that have been registered in your tenant. Third party SaaS and multi-tenanted apps are out of scope. Managed identities are not covered by policy.

articles/active-directory/manage-apps/application-properties.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The homepage URL can't be edited within enterprise applications. The homepage UR
4040

4141
This is the application logo that users see on the My Apps portal and the Office 365 application launcher. Administrators also see the logo in the Azure AD gallery.
4242

43-
Custom logos must be exactly 215x215 pixels in size and be in the PNG format. You should use a solid color background with no transparency in your application logo. The central image dimensions should be 94x94 pixels and the logo file size can't be over 100 KB.
43+
Custom logos must be exactly 215x215 pixels in size and be in the PNG format. You should use a solid color background with no transparency in your application logo. The logo file size can't be over 100 KB.
4444

4545
## Application ID
4646

articles/active-directory/manage-apps/configure-admin-consent-workflow.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,7 @@ To enable the admin consent workflow and choose reviewers:
3939
1. Search for and select **Azure Active Directory**.
4040
1. Select **Enterprise applications**.
4141
1. Under **Security**, select **Consent and permissions**.
42-
1. Under **Manage**, select **Admin consent settings**.
43-
Under **Admin consent requests**, select **Yes** for **Users can request admin consent to apps they are unable to consent to** .
42+
1. Under **Manage**, select **Admin consent settings**. Under **Admin consent requests**, select **Yes** for **Users can request admin consent to apps they are unable to consent to** .
4443

4544
![Screenshot of configure admin consent workflow settings.](./media/configure-admin-consent-workflow/enable-admin-consent-workflow.png)
4645

articles/aks/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -187,6 +187,8 @@
187187
href: manage-abort-operations.md
188188
- name: Automatically upgrade an AKS cluster
189189
href: auto-upgrade-cluster.md
190+
- name: Automatically upgrade AKS cluster node operating system images (preview)
191+
href: auto-upgrade-node-image.md
190192
- name: Configure an AKS cluster
191193
href: cluster-configuration.md
192194
- name: Custom node configuration

articles/aks/auto-upgrade-node-image.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,14 @@ author: nickomang
77
ms.date: 02/03/2023
88
---
99

10-
# Automatically upgrade Azure Kubernetes Service cluster node operating system images
10+
# Automatically upgrade Azure Kubernetes Service cluster node operating system images (preview)
1111

1212
AKS supports upgrading the images on a node so your cluster is up to date with the newest operating system (OS) and runtime updates. AKS regularly provides new node OS images with the latest updates, so it's beneficial to upgrade your node's images regularly for the latest AKS features and to maintain security. Before learning about auto-upgrade, make sure you understand upgrade fundamentals by reading [Upgrade an AKS cluster][upgrade-aks-cluster].
1313

1414
The latest AKS node image information can be found by visiting the [AKS release tracker][release-tracker].
1515

16+
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
17+
1618
## Why use node OS auto-upgrade
1719

1820
Node OS auto-upgrade provides a set once and forget mechanism that yields tangible time and operational cost benefits. By enabling auto-upgrade, you can ensure your clusters are up to date and don't miss the latest AKS features or patches from AKS.
@@ -63,7 +65,7 @@ The following upgrade channels are available:
6365
| `None`| Your nodes won't have security updates applied automatically. This means you're solely responsible for your security updates|N/A|
6466
| `Unmanaged`|OS updates will be applied automatically through the OS built-in patching infrastructure. Newly allocated machines will be unpatched initially and will be patched at some point by the OS's infrastructure|Ubuntu applies security patches through unattended upgrade roughly once a day around 06:00 UTC. Windows and Mariner don't apply security patches automatically, so this option behaves equivalently to `None`|
6567
| `SecurityPatch`|AKS will update the node's virtual hard disk (VHD) with patches from the image maintainer labeled "security only" on a regular basis. Where possible, patches will also be applied without disruption to existing nodes. Some patches, such as kernel patches, can't be applied to existing nodes without disruption. For such patches, the VHD will be updated and existing machines will be upgraded to that VHD following maintenance windows and surge settings. This option incurs the extra cost of hosting the VHDs in your node resource group.|N/A|
66-
| `NodeImage`|AKS will update the nodes with a newly patched VHD containing security fixes and bug fixes on a weekly cadence. The update to the new VHD is disruptive, following maintenance windows and surge settings. No extra VHD cost is incurred when choosing this option. If you use this channel, Linux [unattended upgrades] will be disabled by default.|
68+
| `NodeImage`|AKS will update the nodes with a newly patched VHD containing security fixes and bug fixes on a weekly cadence. The update to the new VHD is disruptive, following maintenance windows and surge settings. No extra VHD cost is incurred when choosing this option. If you use this channel, Linux [unattended upgrades][unattended-upgrades] will be disabled by default.|
6769

6870
To set the node OS auto-upgrade channel when creating a cluster, use the *node-os-upgrade-channel* parameter, similar to the following example.
6971

articles/app-service/deploy-ftp.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -138,6 +138,9 @@ Check that you've entered the correct [hostname](#get-ftps-endpoint) and [creden
138138
#### How can I connect to FTP in Azure App Service via passive mode?
139139
Azure App Service supports connecting via both Active and Passive mode. Passive mode is preferred because your deployment machines are usually behind a firewall (in the operating system or as part of a home or business network). See an [example from the WinSCP documentation](https://winscp.net/docs/ui_login_connection).
140140

141+
### How can I determine the method that was used to deploy my Azure App Service?
142+
Let us say you take over owning an app and you wish to find out how the Azure App Service was deployed so you can make changes and deploy them. You can determine how an Azure App Service was deployed by checking the application settings. If the app was deployed using an external package URL, you will see the WEBSITE_RUN_FROM_PACKAGE setting in the application settings with a URL value. Or if it was deployed using zip deploy, you will see the WEBSITE_RUN_FROM_PACKAGE setting with a value of 1. If the app was deployed using Azure DevOps, you will see the deployment history in the Azure DevOps portal. If Azure Functions Core Tools was used, you will see the deployment history in the Azure portal.
143+
141144
## More resources
142145

143146
* [Local Git deployment to Azure App Service](deploy-local-git.md)
79.1 KB
Loading
213 KB
Loading
54.1 KB
Loading
53.7 KB
Loading

0 commit comments

Comments
 (0)