You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/overview-tls.md
+1-14Lines changed: 1 addition & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,13 +55,6 @@ To ensure backward compatibility for TLS 1.0 and TLS 1.1, App Service will conti
55
55
56
56
The minimum TLS cipher suite includes a fixed list of cipher suites with an optimal priority order that you cannot change. Reordering or reprioritizing the cipher suites is not recommended as it could expose your web apps to weaker encryption. You also cannot add new or different cipher suites to this list. When you select a minimum cipher suite, the system automatically disables all less secure cipher suites for your web app, without allowing you to selectively disable only some weaker cipher suites.
57
57
58
-
Follow these steps to change the Minimum TLS cipher suite:
59
-
1. Browse to your app in the [Azure portal](https://portal.azure.com/)
60
-
1. In the left menu, select **configuration** and then select the **General settings** tab.
61
-
1. Under __Minimum Inbound TLS Cipher Suite__, select **change**, and then select the **Minimum TLS Cipher Suite**.
62
-
1. Select **Ok**.
63
-
1. Select **Save** to save the changes.
64
-
65
58
### What are cipher suites and how do they work on App Service?
66
59
67
60
A cipher suite is a set of instructions that contains algorithms and protocols to help secure network connections between clients and servers. By default, the front-end's OS would pick the most secure cipher suite that is supported by both App Service and the client. However, if the client only supports weak cipher suites, then the front-end's OS would end up picking a weak cipher suite that is supported by them both. If your organization has restrictions on what cipher suites should not be allowed, you may update your web app’s minimum TLS cipher suite property to ensure that the weak cipher suites would be disabled for your web app.
@@ -72,13 +65,7 @@ For App Service Environments with `FrontEndSSLCipherSuiteOrder` cluster setting,
72
65
73
66
## End-to-end TLS Encryption (preview)
74
67
75
-
End-to-end (E2E) TLS encryption is available in Standard App Service plans and higher. Front-end intra-cluster traffic between App Service front-ends and the workers running application workloads can now be encrypted. Below is a simple diagram to help you understand how it works.
76
-
77
-
Follow these steps to enable end-to-end TLS encryption:
78
-
1. Browse to your app in the [Azure portal](https://portal.azure.com/)
79
-
1. In the left menu, select **configuration** and then select the **General settings** tab.
80
-
1. Under __End-to-end TLS encryption__, select **on**.
81
-
1. Save the changes.
68
+
End-to-end (E2E) TLS encryption is available in Standard App Service plans and higher. Front-end intra-cluster traffic between App Service front-ends and the workers running application workloads can now be encrypted.
82
69
83
70
## Next steps
84
71
*[Secure a custom DNS name with a TLS/SSL binding](configure-ssl-bindings.md)
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/agent-release-notes.md
+16-2Lines changed: 16 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: What's new with Azure Connected Machine agent
3
3
description: This article has release notes for Azure Connected Machine agent. For many of the summarized issues, there are links to more details.
4
4
ms.topic: overview
5
-
ms.date: 07/16/2024
5
+
ms.date: 08/12/2024
6
6
ms.custom: references_regions
7
7
---
8
8
@@ -20,12 +20,26 @@ This page is updated monthly, so revisit it regularly. If you're looking for ite
20
20
> Only Connected Machine agent versions within the last 1 year are officially supported by the product group. Customers should update to an agent version within this window.
21
21
>
22
22
23
-
## Version 1.44 - July 2024
23
+
## Version 1.45 - August 2024
24
24
25
25
Download for [Windows](https://aka.ms/AzureConnectedMachineAgent) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
26
26
27
27
### Fixed
28
28
29
+
- Fixed an issue where EnableEnd telemetry would sometimes be sent too soon.
30
+
- Added sending a failed timed-out EnableEnd telemetry log if extension takes longer than the allowed time to complete.
31
+
32
+
### New features
33
+
34
+
- Azure Arc proxy now supports HTTP traffic.
35
+
- Mew proxy.bypass value 'AMA' added to support AMA VM extension proxy bypass.
36
+
37
+
## Version 1.44 - July 2024
38
+
39
+
Download for [Windows](https://download.microsoft.com/download/d/a/f/daf3cc3e-043a-430a-abae-97142323d4d7/AzureConnectedMachineAgent.msi) or [Linux](manage-agent.md#installing-a-specific-version-of-the-agent)
40
+
41
+
### Fixed
42
+
29
43
- Fixed a bug where the service would sometimes reject reports from an upgraded extension if the previous extension was in a failed state.
30
44
- Setting OPENSSL_CNF environment at process level to override build openssl.cnf path on Windows.
31
45
- Fixed access denied errors in writing configuration files.
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-app-settings.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,8 +56,6 @@ The instrumentation key for Application Insights. Don't use both `APPINSIGHTS_IN
56
56
57
57
Don't use both `APPINSIGHTS_INSTRUMENTATIONKEY` and `APPLICATIONINSIGHTS_CONNECTION_STRING`. Use of `APPLICATIONINSIGHTS_CONNECTION_STRING` is recommended.
Enables access to Application Insights by using Microsoft Entra authentication. Use this setting when you must connect to your Application Insights workspace by using Microsoft Entra authentication. For more information, see [Microsoft Entra authentication for Application Insights](../azure-monitor/app/azure-ad-authentication.md).
Copy file name to clipboardExpand all lines: articles/azure-functions/monitor-functions.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.service: azure-functions
19
19
Azure Functions offers built-in integration with Application Insights to monitor functions executions. For detailed information about how to integrate, configure, and use Application Insights to monitor Azure Functions, see the following articles:
20
20
21
21
-[Monitor executions in Azure Functions](functions-monitoring.md)
22
-
-[How to configure monitoring for Azure Functions](configure-monitoring.md)
22
+
-[Configure monitoring for Azure Functions](configure-monitoring.md)
23
23
-[Analyze Azure Functions telemetry in Application Insights](analyze-telemetry-data.md).
24
24
-[Monitor Azure Functions with Application Insights](/azure/azure-monitor/app/monitor-functions)
Copy file name to clipboardExpand all lines: articles/azure-monitor/essentials/metrics-custom-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ In general, there's no cost to ingest standard metrics (platform metrics) into a
31
31
Custom metrics are retained for the [same amount of time as platform metrics](../essentials/data-platform-metrics.md#retention-of-metrics).
32
32
33
33
> [!NOTE]
34
-
> Metrics sent to Azure Monitor via the Application Insights SDK are billed as ingested log data. They incur additional metrics charges only if the Application Insights feature [Enable alerting on custom metric dimensions](../app/pre-aggregated-metrics-log-metrics.md#custom-metrics-dimensions-and-preaggregation) has been selected. This checkbox sends data to the Azure Monitor metrics database by using the custom metrics API to allow the more complex alerting. Learn more about the [Application Insights pricing model](../cost-usage.md) and [prices in your region](https://azure.microsoft.com/pricing/details/monitor/).
34
+
> Metrics sent to Azure Monitor via the Application Insights SDK are billed as ingested log data.
Copy file name to clipboardExpand all lines: articles/container-instances/container-instances-tutorial-deploy-confidential-containers-cce-arm.md
+7-13Lines changed: 7 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,15 +30,15 @@ In this tutorial, you learn how to:
30
30
31
31
In this tutorial, you deploy a Hello World application that generates a hardware attestation report. You start by creating an ARM template with a container group resource to define the properties of this application. You then use this ARM template with the Azure CLI confcom tooling to generate a CCE policy for attestation.
32
32
33
-
This tutorial uses [this ARM template](https://raw.githubusercontent.com/Azure-Samples/aci-confidential-hello-world/main/template.json?token=GHSAT0AAAAAAB5B6SJ7VUYU3G6MMQUL7KKKY7QBZBA) as an example. To view the source code for this application, see [Azure Container Instances Confidential Hello World](https://aka.ms/ccacihelloworld).
33
+
This tutorial uses [this ARM template](https://raw.githubusercontent.com/microsoft/confidential-container-demos/main/hello-world/ACI/arm-template.json) as an example. To view the source code for this application, see [Azure Confidential Container Instances Hello World](https://github.com/microsoft/confidential-container-demos/tree/main/hello-world/ACI).
34
34
35
35
The example template adds two properties to the Container Instances resource definition to make the container group confidential:
36
36
37
37
*`sku`: Enables you to select between confidential and standard container group deployments. If you don't add this property to the resource, the container group will be a standard deployment.
38
38
*`confidentialComputeProperties`: Enables you to pass in a custom CCE policy for attestation of your container group. If you don't add this object to the resource, the software components that run within the container group won't be validated.
39
39
40
40
> [!NOTE]
41
-
> The `ccePolicy` parameter under `confidentialComputeProperties` is blank. You'll fill it in after you generate the policy later in the tutorial.
41
+
> The `ccePolicy` parameter under `confidentialComputeProperties` is blank. You'll fill it in when you generate the policy later in the tutorial.
42
42
43
43
Use your preferred text editor to save this ARM template on your local machine as *template.json*.
44
44
@@ -63,7 +63,7 @@ Use your preferred text editor to save this ARM template on your local machine a
"description": "Container image to deploy. Should be of the form repoName/imagename:tag for images stored in public Docker Hub, or a fully qualified URI for other registries. Images from private registries require additional registry credentials."
69
69
}
@@ -163,16 +163,10 @@ With the ARM template that you crafted and the Azure CLI confcom extension, you
163
163
1. To generate the CCE policy, run the following command by using the ARM template as input:
164
164
165
165
```azurecli-interactive
166
-
az confcom acipolicygen -a .\template.json --print-policy
166
+
az confcom acipolicygen -a .\template.json
167
167
```
168
168
169
-
When this command finishes, a Base64 string generated as output should appear in the following format. This string is the CCE policy that you copy and paste into your ARM template as the value of the `ccePolicy` property.
2. Save the changes to your local copy of the ARM template.
169
+
When this command finishes, a Base64 string generated as output will automatically appear in the `ccePolicy` property of the ARM template.
176
170
177
171
## Deploy the template
178
172
@@ -228,12 +222,12 @@ In the following steps, you use the Azure portal to review the properties of the
228
222
229
223
The presence of the attestation report below the Azure Container Instances logo confirms that the container is running on hardware that supports a TEE.
230
224
231
-
If you deploy to hardware that doesn't support a TEE (for example, by choosing a region where Container Instances Confidential isn't available), no attestation report appears.
225
+
If you deploy to hardware that doesn't support a TEE (for example, by choosing a region where Confidential Container Instances isn't available), no attestation report appears.
232
226
233
227
## Related content
234
228
235
229
Now that you've deployed a confidential container group on Container Instances, you can learn more about how policies are enforced:
236
230
237
231
*[Confidential containers on Azure Container Instances](./container-instances-confidential-overview.md)
0 commit comments