Skip to content

Commit 2eb15eb

Browse files
author
Kamil Sykora
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into MaintenanceDowntime
Changing capitaliation in maintenance doc
2 parents 99625b6 + a67ca0c commit 2eb15eb

File tree

232 files changed

+1081
-7106
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

232 files changed

+1081
-7106
lines changed

.openpublishing.redirection.json

Lines changed: 7 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/vpn-gateway/vpn-gateway-about-forced-tunneling.md",
5+
"redirect_url": "/previous-versions/azure/vpn-gateway/vpn-gateway-about-forced-tunneling",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/azure-app-configuration/rest-api-postman.md",
510
"redirect_url": "/previous-versions/azure/azure-app-configuration/rest-api-postman",
@@ -2535,21 +2540,6 @@
25352540
"redirect_url": "/azure/developer/jenkins/pipeline-with-github-and-docker",
25362541
"redirect_document_id": false
25372542
},
2538-
{
2539-
"source_path_from_root": "/articles/kubernetes-fleet/access-fleet-kubernetes-api.md",
2540-
"redirect_url": "/azure/kubernetes-fleet/quickstart-access-fleet-kubernetes-api",
2541-
"redirect_document_id": false
2542-
},
2543-
{
2544-
"source_path_from_root": "/articles/kubernetes-fleet/configuration-propagation.md",
2545-
"redirect_url": "/azure/kubernetes-fleet/resource-propagation",
2546-
"redirect_document_id": false
2547-
},
2548-
{
2549-
"source_path_from_root": "/articles/kubernetes-fleet/resource-propagation.md",
2550-
"redirect_url": "/azure/kubernetes-fleet/concepts-resource-propagation",
2551-
"redirect_document_id": false
2552-
},
25532543
{
25542544
"source_path_from_root": "/articles/labs/anomaly-finder/apiref.md",
25552545
"redirect_url": "/azure/ai-services/anomaly-detector/",
@@ -4771,7 +4761,7 @@
47714761
"redirect_document_id": false
47724762
},
47734763
{
4774-
"source_path_from_root": "/articles/load-balancer/load-balancer-ipv6-internet-ps.md",
4764+
"source_path_from_root": "/articles/load-balancer/load-balancer-ipv6-internet-ps.md",
47754765
"redirect_url": "/azure/load-balancer/virtual-network-ipv4-ipv6-dual-stack-standard-load-balancer-powershell",
47764766
"redirect_document_id": false
47774767
},
@@ -4786,4 +4776,4 @@
47864776
"redirect_document_id": false
47874777
}
47884778
]
4789-
}
4779+
}
310 KB
Loading
327 KB
Loading
34.2 KB
Loading
73 Bytes
Loading

articles/api-management/migrate-stv1-to-stv2-vnet.md

Lines changed: 62 additions & 45 deletions
Large diffs are not rendered by default.

articles/app-service/environment/overview.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -205,10 +205,6 @@ App Service Environment v3 is available in the following regions:
205205

206206
An App Service Environment will only store customer data including app content, settings and secrets within the region where it's deployed. All data is guaranteed to remain in the region. For more information, see [Data residency in Azure](https://azure.microsoft.com/explore/global-infrastructure/data-residency/#overview).
207207

208-
## App Service Environment v2
209-
210-
App Service Environment has three versions: App Service Environment v1, App Service Environment v2, and App Service Environment v3. The information in this article is based on App Service Environment v3. To learn more about App Service Environment v2, see [App Service Environment v2 introduction](./intro.md).
211-
212208
## Next steps
213209

214210
> [!div class="nextstepaction"]

articles/application-gateway/for-containers/how-to-frontend-mtls-gateway-api.md

Lines changed: 29 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: greglin
66
ms.service: azure-application-gateway
77
ms.subservice: appgw-for-containers
88
ms.topic: how-to
9-
ms.date: 9/16/2024
9+
ms.date: 9/18/2024
1010
ms.author: greglin
1111
---
1212

@@ -28,7 +28,7 @@ See the following figure:
2828

2929
The valid client certificate flow shows a client presenting a certificate to the frontend of Application Gateway for Containers. Application Gateway for Containers determines the certificate is valid and proxies the request to the backend target. The response is ultimately returned to the client.
3030

31-
The revoked client certificate flow shows a client presenting a revoked certificate to the frontend of Application Gateway for Containers. Application Gateway for Containers determines the certificate is not valid and prevents the request from being proxied to the client. The client will receive an HTTP 400 bad request and corresponding reason.
31+
The revoked client certificate flow shows a client presenting a revoked certificate to the frontend of Application Gateway for Containers. Application Gateway for Containers determines the certificate isn't valid and prevents the request from being proxied to the client. The client will receive an HTTP 400 bad request and corresponding reason.
3232

3333
## Prerequisites
3434

@@ -51,7 +51,7 @@ The revoked client certificate flow shows a client presenting a revoked certific
5151

5252
### Generate certificate(s)
5353

54-
For this example, we will create a root certificate and issue a client certificate from the root. If you already have a root certificate and client certificate, you may skip these steps.
54+
For this example, we'll create a root certificate and issue a client certificate from the root. If you already have a root certificate and client certificate, you may skip these steps.
5555

5656
#### Generate a private key for the root certificate
5757

@@ -103,7 +103,7 @@ spec:
103103
certificateRefs:
104104
- kind : Secret
105105
group: ""
106-
name: contoso.com
106+
name: listener-tls-secret
107107
EOF
108108
```
109109

@@ -147,7 +147,7 @@ EOF
147147
certificateRefs:
148148
- kind : Secret
149149
group: ""
150-
name: contoso.com
150+
name: listener-tls-secret
151151
addresses:
152152
- type: alb.networking.azure.io/alb-frontend
153153
value: $FRONTEND_NAME
@@ -223,8 +223,8 @@ spec:
223223
- name: gateway-01
224224
rules:
225225
- backendRefs:
226-
- name: mtls-app
227-
port: 443
226+
- name: echo
227+
port: 80
228228
EOF
229229
```
230230

@@ -266,6 +266,12 @@ status:
266266
namespace: test-infra
267267
```
268268

269+
Create a Kubernetes secret using kubectl that contains the certificate chain to the client certificate.
270+
271+
```bash
272+
kubectl create secret generic ca.bundle -n test-infra --from-file=ca.crt=root.crt
273+
```
274+
269275
Create a FrontendTLSPolicy
270276

271277
```bash
@@ -290,7 +296,6 @@ spec:
290296
group: ""
291297
kind: Secret
292298
namespace: test-infra
293-
subjectAltName: "contoso-client"
294299
EOF
295300
```
296301

@@ -321,10 +326,24 @@ Now we're ready to send some traffic to our sample application, via the FQDN ass
321326
fqdn=$(kubectl get gateway gateway-01 -n test-infra -o jsonpath='{.status.addresses[0].value}')
322327
```
323328
324-
Curling this FQDN should return responses from the backend as configured on the HTTPRoute.
329+
Curling the FQDN of your frontend without the client certificate.
330+
331+
```bash
332+
curl --insecure https://$fqdn/
333+
```
334+
335+
Note the response alerts a certificate is required.
336+
337+
```
338+
curl: (56) OpenSSL SSL_read: OpenSSL/1.1.1k: error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required, errno 0
339+
```
340+
341+
Curl the FQDN presenting the client certificate generated.
325342
326343
```bash
327344
curl --cert client.crt --key client.key --insecure https://$fqdn/
328345
```
329346
330-
Congratulations, you have installed ALB Controller, deployed a backend application, authenticated via client certificate, and routed traffic to the application via the gateway on Application Gateway for Containers.
347+
Note the response is from the backend service behind Application Gateway for Containers.
348+
349+
Congratulations, you installed ALB Controller, deployed a backend application, authenticated via client certificate, and returned traffic from your backend service via Application Gateway for Containers.

articles/application-gateway/ingress-controller-add-health-probes.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,17 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: azure-application-gateway
77
ms.topic: how-to
8-
ms.date: 06/10/2022
8+
ms.date: 9/17/2024
99
ms.author: greglin
1010
---
1111

1212
# Add Health Probes to your service
13-
By default, Ingress controller will provision an HTTP GET probe for the exposed pods.
13+
By default, Ingress controller provisions an HTTP GET probe for the exposed pods.
1414
The probe properties can be customized by adding a [Readiness or Liveness Probe](https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-probes/) to your `deployment`/`pod` spec.
1515

16+
> [!TIP]
17+
> Also see [What is Application Gateway for Containers](for-containers/overview.md).
18+
1619
## With `readinessProbe` or `livenessProbe`
1720
```yaml
1821
apiVersion: networking.k8s.io/v1

articles/application-gateway/ingress-controller-annotations.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,17 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: azure-application-gateway
77
ms.topic: conceptual
8-
ms.date: 5/13/2024
8+
ms.date: 9/17/2024
99
ms.author: greglin
1010
---
1111

1212
# Annotations for Application Gateway Ingress Controller
1313

1414
You can annotate the Kubernetes ingress resource with arbitrary key/value pairs. Application Gateway Ingress Controller (AGIC) relies on annotations to program Azure Application Gateway features that aren't configurable via the ingress YAML. Ingress annotations are applied to all HTTP settings, backend pools, and listeners derived from an ingress resource.
1515

16+
> [!TIP]
17+
> Also see [What is Application Gateway for Containers](for-containers/overview.md).
18+
1619
## List of supported annotations
1720

1821
For AGIC to observe an ingress resource, the resource *must be annotated* with `kubernetes.io/ingress.class: azure/application-gateway`.
@@ -284,7 +287,7 @@ spec:
284287

285288
## Request Timeout
286289

287-
Use the following annotation to specify the request timeout in seconds. After the timeout, Application Gateway fails a request if the response is not received.
290+
Use the following annotation to specify the request timeout in seconds. After the timeout, Application Gateway fails a request if the response isn't received.
288291

289292
### Usage
290293

0 commit comments

Comments
 (0)