You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-services/openai/concepts/models.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -254,13 +254,18 @@ The following Embeddings models are available with [Azure Government](/azure/azu
254
254
255
255
### Assistants (Preview)
256
256
257
-
For Assistants you need a combination of a supported model and a supported region. Certain tools and capabilities require the latest models. For example, [parallel function calling](../how-to/assistant-functions.md) requires the latest 1106 models.
257
+
For Assistants you need a combination of a supported model, and a supported region. Certain tools and capabilities require the latest models. The following models are available in the Assistants API, SDK, Azure AI Studio and Azure OpenAI Studio..
258
258
259
259
| Region |`gpt-35-turbo (0613)`|`gpt-35-turbo (1106)`|`gpt-4 (0613)`|`gpt-4 (1106)`|`gpt-4 (0125)`|
260
260
|-----|---|---|---|---|---|
261
261
| Australia East | ✅ | ✅ | ✅ |✅ ||
262
-
| East US 2 | ✅ || ✅ |✅ ||
263
-
| Sweden Central | ✅ |✅ |✅ |✅||
262
+
| East US | ✅ |||| ✅ |
263
+
| East US 2 | ✅ || ✅ |✅ ||
264
+
| France Central | ✅ | ✅ |✅ |✅ ||
265
+
| Norway East |||| ✅ ||
266
+
| Sweden Central | ✅ |✅ |✅ |✅||
267
+
| UK South | ✅ | ✅ | ✅ |✅ ||
268
+
264
269
265
270
For information on Provisioned Throughput Unit (PTU) availability, see [provisioned throughput](./provisioned-throughput.md).
Copy file name to clipboardExpand all lines: articles/application-gateway/for-containers/application-gateway-for-containers-components.md
+26-22Lines changed: 26 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,13 +6,13 @@ author: greglin
6
6
ms.service: application-gateway
7
7
ms.subservice: appgw-for-containers
8
8
ms.topic: conceptual
9
-
ms.date: 02/27/2024
9
+
ms.date: 03/26/2024
10
10
ms.author: greglin
11
11
---
12
12
13
13
# Application Gateway for Containers components
14
14
15
-
This article provides detailed descriptions and requirements for components of Application Gateway for Containers. Information about how Application Gateway for Containers accepts incoming requests and routes them to a backend target is provided. For a general overview of Application Gateway for Containers, see [What is Application Gateway for Containers](overview.md).
15
+
This article provides detailed descriptions and requirements for components of Application Gateway for Containers. Information about how Application Gateway for Containers accepts incoming requests and routes them to a backend target is provided. For a general overview of Application Gateway for Containers, see [What is Application Gateway for Containers](overview.md).
16
16
17
17
### Core components
18
18
@@ -25,55 +25,55 @@ This article provides detailed descriptions and requirements for components of A
25
25
26
26
- An Application Gateway for Containers frontend resource is an Azure child resource of the Application Gateway for Containers parent resource.
27
27
- An Application Gateway for Containers frontend defines the entry point client traffic should be received by a given Application Gateway for Containers.
28
-
- A frontend can't be associated to multiple Application Gateway for Containers
29
-
- Each frontend provides a unique FQDN that can be referenced by a customer's CNAME record
30
-
- Private IP addresses are currently unsupported
31
-
- A single Application Gateway for Containers can support multiple frontends
28
+
- A frontend can't be associated to multiple Application Gateway for Containers.
29
+
- Each frontend provides a unique FQDN that can be referenced by a customer's CNAME record.
30
+
- Private IP addresses are currently unsupported.
31
+
- A single Application Gateway for Containers can support multiple frontends.
32
32
33
33
### Application Gateway for Containers associations
34
34
35
35
- An Application Gateway for Containers association resource is an Azure child resource of the Application Gateway for Containers parent resource.
36
-
- An Application Gateway for Containers association defines a connection point into a virtual network. An association is a 1:1 mapping of an association resource to an Azure Subnet that has been delegated.
37
-
- Application Gateway for Containers is designed to allow for multiple associations
38
-
- At this time, the current number of associations is currently limited to 1
39
-
- During creation of an association, the underlying data plane is provisioned and connected to a subnet within the defined virtual network's subnet
36
+
- An Application Gateway for Containers association defines a connection point into a virtual network. An association is a 1:1 mapping of an association resource to an Azure Subnet that has been delegated.
37
+
- Application Gateway for Containers is designed to allow for multiple associations.
38
+
- At this time, the current number of associations is currently limited to 1.
39
+
- During creation of an association, the underlying data plane is provisioned and connected to a subnet within the defined virtual network's subnet.
40
40
- Each association should assume at least 256 addresses are available in the subnet at time of provisioning.
41
41
- A minimum /24 subnet mask for each deployment (assuming no resources have previously been provisioned in the subnet).
42
42
- If n number of Application Gateway for Containers are provisioned, with the assumption each Application Gateway for Containers contains one association, and the intent is to share the same subnet, the available required addresses should be n*256.
43
-
- All Application Gateway for Containers association resources should match the same region as the Application Gateway for Containers parent resource
43
+
- All Application Gateway for Containers association resources should match the same region as the Application Gateway for Containers parent resource.
44
44
45
45
### Application Gateway for Containers ALB Controller
46
46
47
-
- An Application Gateway for Containers ALB Controller is a Kubernetes deployment that orchestrates configuration and deployment of Application Gateway for Containers by watching Kubernetes both Custom Resources and Resource configurations, such as, but not limited to, Ingress, Gateway, and ApplicationLoadBalancer. It uses both ARM / Application Gateway for Containers configuration APIs to propagate configuration to the Application Gateway for Containers Azure deployment.
48
-
- ALB Controller is deployed / installed via Helm
49
-
- ALB Controller consists of two running pods
50
-
- alb-controller pod is responsible for orchestrating customer intent to Application Gateway for Containers load balancing configuration
51
-
- alb-controller-bootstrap pod is responsible for management of CRDs
47
+
- An Application Gateway for Containers ALB Controller is a Kubernetes deployment that orchestrates configuration and deployment of Application Gateway for Containers by watching Kubernetes both Custom Resources and Resource configurations, such as, but not limited to, Ingress, Gateway, and ApplicationLoadBalancer. It uses both ARM / Application Gateway for Containers configuration APIs to propagate configuration to the Application Gateway for Containers Azure deployment.
48
+
- ALB Controller is deployed / installed via Helm.
49
+
- ALB Controller consists of two running pods.
50
+
- alb-controller pod is responsible for orchestrating customer intent to Application Gateway for Containers load balancing configuration.
51
+
- alb-controller-bootstrap pod is responsible for management of CRDs.
52
52
53
53
## Azure / general concepts
54
54
55
55
### Private IP address
56
56
57
-
- A private IP address isn't explicitly defined as an Azure Resource Manager resource. A private IP address would refer to a specific host address within a given virtual network's subnet.
57
+
- A private IP address isn't explicitly defined as an Azure Resource Manager resource. A private IP address would refer to a specific host address within a given virtual network's subnet.
58
58
59
59
### Subnet delegation
60
60
61
61
- Microsoft.ServiceNetworking/trafficControllers is the namespace adopted by Application Gateway for Containers and may be delegated to a virtual network's subnet.
62
62
- When delegation occurs, provisioning of Application Gateway for Containers resources doesn't happen, nor is there an exclusive mapping to an Application Gateway for Containers association resource.
63
-
- Any number of subnets can have a subnet delegation that is the same or different to Application Gateway for Containers. Once defined, no other resources, other than the defined service, can be provisioned into the subnet unless explicitly defined by the service's implementation.
63
+
- Any number of subnets can have a subnet delegation that is the same or different to Application Gateway for Containers. Once defined, no other resources, other than the defined service, can be provisioned into the subnet unless explicitly defined by the service's implementation.
64
64
65
65
### User-assigned managed identity
66
66
67
67
- Managed identities for Azure resources eliminate the need to manage credentials in code.
68
-
- A User Managed Identity is required for each Azure Load Balancer Controller to make changes to Application Gateway for Containers
68
+
- A User Managed Identity is required for each Azure Load Balancer Controller to make changes to Application Gateway for Containers.
69
69
-_AppGw for Containers Configuration Manager_ is a built-in RBAC role that allows ALB Controller to access and configure the Application Gateway for Containers resource.
70
70
71
71
> [!Note]
72
72
> The _AppGw for Containers Configuration Manager_ role has [data action permissions](../../role-based-access-control/role-definitions.md#control-and-data-actions) that the Owner and Contributor roles do not have. It is critical proper permissions are delegated to prevent issues with ALB Controller making changes to the Application Gateway for Containers service.
73
73
74
74
## How Application Gateway for Containers accepts a request
75
75
76
-
Each Application Gateway for Containers frontend provides a generated Fully Qualified Domain Name managed by Azure. The FQDN may be used as-is or customers may opt to mask the FQDN with a CNAME record.
76
+
Each Application Gateway for Containers frontend provides a generated Fully Qualified Domain Name managed by Azure. The FQDN may be used as-is or customers may opt to mask the FQDN with a CNAME record.
77
77
78
78
Before a client sends a request to Application Gateway for Containers, the client resolves a CNAME that points to the frontend's FQDN; or the client may directly resolve the FQDN provided by Application Gateway for Containers by using a DNS server.
79
79
@@ -85,6 +85,10 @@ A set of routing rules evaluates how the request for that hostname should be ini
85
85
86
86
## How Application Gateway for Containers routes a request
87
87
88
+
### HTTP/2 Requests
89
+
90
+
Application Gateway for Containers fully supports HTTP/2 protocol for communication from the client to the frontend. Communication from Application Gateway for Containers to the backend target uses the HTTP/1.1 protocol. The HTTP/2 setting is always enabled and can't be changed. If clients prefer to use HTTP/1.1 for their communication to the frontend of Application Gateway for Containers, they may continue to negotiate accordingly.
91
+
88
92
### Modifications to the request
89
93
90
94
Application Gateway for Containers inserts three extra headers to all requests before requests are initiated from Application Gateway for Containers to a backend target:
@@ -93,9 +97,9 @@ Application Gateway for Containers inserts three extra headers to all requests b
93
97
- x-forwarded-proto
94
98
- x-request-id
95
99
96
-
**x-forwarded-for** is the original requestor's client IP address. If the request is coming through a proxy, the header value appends the address received, comma delimited. In example: 1.2.3.4,5.6.7.8; where 1.2.3.4 is the client IP address to the proxy in front of Application Gateway for Containers, and 5.6.7.8 is the address of the proxy forwarding traffic to Application Gateway for Containers.
100
+
**x-forwarded-for** is the original requestor's client IP address. If the request is coming through a proxy, the header value appends the address received, comma delimited. In example: 1.2.3.4,5.6.7.8; where 1.2.3.4 is the client IP address to the proxy in front of Application Gateway for Containers, and 5.6.7.8 is the address of the proxy forwarding traffic to Application Gateway for Containers.
97
101
98
-
**x-forwarded-proto** returns the protocol received by Application Gateway for Containers from the client. The value is either http or https.
102
+
**x-forwarded-proto** returns the protocol received by Application Gateway for Containers from the client. The value is either http or https.
99
103
100
104
**x-request-id** is a unique guid generated by Application Gateway for Containers for each client request and presented in the forwarded request to the backend target. The guid consists of 32 alphanumeric characters, separated by dashes (for example: d23387ab-e629-458a-9c93-6108d374bc75). This guid can be used to correlate a request received by Application Gateway for Containers and initiated to a backend target as defined in access logs.
Copy file name to clipboardExpand all lines: articles/application-gateway/for-containers/overview.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.custom: references_regions
7
7
ms.service: application-gateway
8
8
ms.subservice: appgw-for-containers
9
9
ms.topic: overview
10
-
ms.date: 03/07/2024
10
+
ms.date: 03/26/2024
11
11
ms.author: greglin
12
12
---
13
13
@@ -58,6 +58,7 @@ Application Gateway for Containers supports the following features for traffic m
58
58
- Availability zone resiliency
59
59
- Default and custom health probes
60
60
- Header rewrite
61
+
- HTTP/2
61
62
- HTTPS traffic management:
62
63
- SSL termination
63
64
- End to End SSL
@@ -79,7 +80,7 @@ Application Gateway for Containers supports the following features for traffic m
79
80
80
81
There are two deployment strategies for management of Application Gateway for Containers:
81
82
82
-
-**Bring your own (BYO) deployment:** In this deployment strategy, deployment and lifecycle of the Application Gateway for Containers resource, Association and Frontend resource is assumed via Azure portal, CLI, PowerShell, Terraform, etc. and referenced in configuration within Kubernetes.
83
+
-**Bring your own (BYO) deployment:** In this deployment strategy, deployment and lifecycle of the Application Gateway for Containers resource, Association, and Frontend resource is assumed via Azure portal, CLI, PowerShell, Terraform, etc. and referenced in configuration within Kubernetes.
83
84
-**In Gateway API:** Every time you wish to create a new Gateway resource in Kubernetes, a Frontend resource should be provisioned in Azure prior and referenced by the Gateway resource. Deletion of the Frontend resource is responsible by the Azure administrator and isn't deleted when the Gateway resource in Kubernetes is deleted.
84
85
-**Managed by ALB Controller:** In this deployment strategy ALB Controller deployed in Kubernetes is responsible for the lifecycle of the Application Gateway for Containers resource and its sub resources. ALB Controller creates Application Gateway for Containers resource when an ApplicationLoadBalancer custom resource is defined on the cluster and its lifecycle is based on the lifecycle of the custom resource.
85
86
-**In Gateway API:** Every time a Gateway resource is created referencing the ApplicationLoadBalancer resource, ALB Controller provisions a new Frontend resource and manage its lifecycle based on the lifecycle of the Gateway resource.
@@ -111,7 +112,7 @@ Application Gateway for Containers is currently offered in the following regions
111
112
112
113
### Implementation of Gateway API
113
114
114
-
ALB Controller implements version [v1](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io%2fv1) of the [Gateway API](https://gateway-api.sigs.k8s.io/)
115
+
ALB Controller implements version [v1](https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io%2fv1) of the [Gateway API](https://gateway-api.sigs.k8s.io/).
Copy file name to clipboardExpand all lines: articles/azure-arc/resource-bridge/overview.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.custom: references_regions
10
10
11
11
Azure Arc resource bridge is a Microsoft managed product that is part of the core Azure Arc platform. It is designed to host other Azure Arc services. In this release, the resource bridge supports VM self-servicing and management from Azure, for virtualized Windows and Linux virtual machines hosted in an on-premises environment on Azure Stack HCI ([Azure Arc VM management](/azure-stack/hci/manage/azure-arc-vm-management-overview)), VMware ([Arc-enabled VMware vSphere](../vmware-vsphere/overview.md)), and System Center Virtual Machine Manager ([Arc-enabled SCVMM](../system-center-virtual-machine-manager/overview.md)).
12
12
13
-
Azure Arc resource bridge is a Kubernetes management cluster installed on the customer’s on-premises infrastructure. The resource bridge is provided credentials to the infrastructure control plane that allows it to apply guest management services on the on-premises resources. Arc resource bridge enables projection of on-premises resources as ARM resources and management from ARM as "Arc-enabled" Azure resources.
13
+
Azure Arc resource bridge is a Kubernetes management cluster installed on the customer’s on-premises infrastructure as an appliance VM (aka Arc appliance). The resource bridge is provided credentials to the infrastructure control plane that allows it to apply guest management services on the on-premises resources. Arc resource bridge enables projection of on-premises resources as ARM resources and management from ARM as "Arc-enabled" Azure resources.
14
14
15
15
Arc resource bridge delivers the following benefits:
16
16
@@ -144,6 +144,11 @@ There could be instances where supported versions are not sequential. For exampl
144
144
145
145
Arc resource bridge typically releases a new version on a monthly cadence, at the end of the month. Delays might occur that could push the release date further out. Regardless of when a new release comes out, if you are within n-3 supported versions (starting with 1.0.15), then your Arc resource bridge version is supported. To stay updated on releases, visit the [Arc resource bridge release notes](https://github.com/Azure/ArcResourceBridge/releases) on GitHub. To learn more about upgrade options, visit [Upgrade Arc resource bridge](upgrade.md).
146
146
147
+
### Private Link Support
148
+
149
+
Arc resource bridge does not currently support private link.
150
+
151
+
147
152
## Next steps
148
153
149
154
* Learn how [Azure Arc-enabled VMware vSphere extends Azure's governance and management capabilities to VMware vSphere infrastructure](../vmware-vsphere/overview.md).
0 commit comments