You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/environment/create-from-template.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: madsd
5
5
6
6
ms.assetid: 6eb7d43d-e820-4a47-818c-80ff7d3b6f8e
7
7
ms.topic: article
8
-
ms.date: 01/20/2023
8
+
ms.date: 03/27/2023
9
9
ms.author: madsd
10
10
ms.custom: seodec18
11
11
---
@@ -49,7 +49,7 @@ If you want to make an ASE, use this Resource Manager template [ASEv2][quickstar
49
49
**existingVirtualNetworkResourceGroup*: his parameter defines the resource group name of the existing virtual network and subnet where ASE will reside.
50
50
**subnetName*: This parameter defines the subnet name of the existing virtual network and subnet where ASE will reside.
51
51
**internalLoadBalancingMode*: In most cases, set this to 3, which means both HTTP/HTTPS traffic on ports 80/443, and the control/data channel ports listened to by the FTP service on the ASE, will be bound to an ILB-allocated virtual network internal address. If this property is set to 2, only the FTP service-related ports (both control and data channels) are bound to an ILB address. If this property is set to 0, the HTTP/HTTPS traffic remains on the public VIP.
52
-
**dnsSuffix*: This parameter defines the default root domain that's assigned to the ASE. In the public variation of Azure App Service, the default root domain for all web apps is *azurewebsites.net*. Because an ILB ASE is internal to a customer's virtual network, it doesn't make sense to use the public service's default root domain. Instead, an ILB ASE should have a default root domain that makes sense for use within a company's internal virtual network. For example, Contoso Corporation might use a default root domain of *internal-contoso.com* for apps that are intended to be resolvable and accessible only within Contoso's virtual network.
52
+
**dnsSuffix*: This parameter defines the default root domain that's assigned to the ASE. In the public variation of Azure App Service, the default root domain for all web apps is *azurewebsites.net*. Because an ILB ASE is internal to a customer's virtual network, it doesn't make sense to use the public service's default root domain. Instead, an ILB ASE should have a default root domain that makes sense for use within a company's internal virtual network. For example, Contoso Corporation might use a default root domain of *internal-contoso.com* for apps that are intended to be resolvable and accessible only within Contoso's virtual network. To specify custom root domain you need to use api version `2018-11-01` or earlier versions.
53
53
**ipSslAddressCount*: This parameter automatically defaults to a value of 0 in the *azuredeploy.json* file because ILB ASEs only have a single ILB address. There are no explicit IP-SSL addresses for an ILB ASE. Hence, the IP-SSL address pool for an ILB ASE must be set to zero. Otherwise, a provisioning error occurs.
54
54
55
55
After the *azuredeploy.parameters.json* file is filled in, create the ASE by using the PowerShell code snippet. Change the file paths to match the Resource Manager template-file locations on your machine. Remember to supply your own values for the Resource Manager deployment name and the resource group name:
Copy file name to clipboardExpand all lines: articles/app-service/environment/create-ilb-ase.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to create an App Service environment with an internal loa
4
4
author: madsd
5
5
ms.assetid: 0f4c1fa4-e344-46e7-8d24-a25e247ae138
6
6
ms.topic: quickstart
7
-
ms.date: 02/28/2023
7
+
ms.date: 03/27/2023
8
8
ms.author: madsd
9
9
ms.custom: mvc, seodec18, mode-other
10
10
---
@@ -139,7 +139,7 @@ To learn more about how to configure your ILB ASE with a WAF device, see [Confi
139
139
140
140
## ILB ASEs made before May 2019
141
141
142
-
ILB ASEs that were made before May 2019 required you to set the domain suffix during ASE creation. They also required you to upload a default certificate that was based on that domain suffix. Also, with an older ILB ASE you can't perform single sign-on to the Kudu console with apps in that ILB ASE. When configuring DNS for an older ILB ASE, you need to set the wildcard A record in a zone that matches to your domain suffix.
142
+
ILB ASEs that were made before May 2019 required you to set the domain suffix during ASE creation. They also required you to upload a default certificate that was based on that domain suffix. Also, with an older ILB ASE you can't perform single sign-on to the Kudu console with apps in that ILB ASE. When configuring DNS for an older ILB ASE, you need to set the wildcard A record in a zone that matches to your domain suffix. Creating or changing ILB ASE with custom domain suffix requires you to use Azure Resource Manager templates and an api version prior to 2019. Last support api version is `2018-11-01`.
Copy file name to clipboardExpand all lines: articles/app-service/environment/using.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use an App Service Environment
3
3
description: Learn how to use your App Service Environment to host isolated applications.
4
4
author: madsd
5
5
ms.topic: article
6
-
ms.date: 02/14/2022
6
+
ms.date: 03/27/2023
7
7
ms.author: madsd
8
8
---
9
9
@@ -92,7 +92,7 @@ To configure DNS in Azure DNS private zones:
92
92
1. Create an A record in that zone that points @ to the inbound IP address.
93
93
1. Create an A record in that zone that points *.scm to the inbound IP address.
94
94
95
-
The DNS settings for the default domain suffix of your App Service Environment don't restrict your apps to only being accessible by those names. You can set a custom domain name without any validation on your apps in an App Service Environment. If you then want to create a zone named `contoso.net`, you can do so and point it to the inbound IP address. The custom domain name works for app requests, but doesn't work for the `scm` site. The `scm` site is only available at *<appname>.scm.<asename>.appserviceenvironment.net*.
95
+
The DNS settings for the default domain suffix of your App Service Environment don't restrict your apps to only being accessible by those names. You can set a custom domain name without any validation on your apps in an App Service Environment. If you then want to create a zone named `contoso.net`, you can do so and point it to the inbound IP address. The custom domain name works for app requests, and if the custom domain suffix certificate includes a wildcard SAN for scm, custom domain name also work for `scm` site and you can create a `*.scm` record and point it to the inbound IP address.
96
96
97
97
## Publishing
98
98
@@ -173,6 +173,7 @@ If you have multiple App Service Environments, you might want some of them to be
173
173
-**None**: Azure upgrades in no particular batch. This value is the default.
174
174
-**Early**: Upgrade in the first half of the App Service upgrades.
175
175
-**Late**: Upgrade in the second half of the App Service upgrades.
176
+
-**Manual**: Get [15 days window](./how-to-upgrade-preference.md) to deploy the upgrade manually.
176
177
177
178
Select the value you want, and then select **Save**.
Copy file name to clipboardExpand all lines: articles/confidential-computing/quick-create-confidential-vm-azure-cli-amd.md
+18-7Lines changed: 18 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,31 +84,42 @@ Make a note of the `publicIpAddress` to use later.
84
84
85
85
Create a confidential [disk encryption set](../virtual-machines/linux/disks-enable-customer-managed-keys-cli.md) using [Azure Key Vault](../key-vault/general/quick-create-cli.md) or [Azure Key Vault managed Hardware Security Module (HSM)](../key-vault/managed-hsm/quick-create-cli.md). Based on your security and compliance needs you can choose either option. The following example uses Azure Key Vault Premium.
86
86
87
-
1. Create an Azure Key Vault using the [az keyvault create](/cli/azure/keyvault) command. For the pricing tier, select Premium (includes support for HSM backed keys). Make sure that you have an owner role in this key vault.
87
+
1. Grant confidential VM Service Principal `Confidential VM Orchestrator` to tenant
88
+
For this step you need to be a Global Admin or you need to have the User Access Administrator RBAC role.
89
+
```azurecli
90
+
Connect-AzureAD -Tenant "your tenant ID"
91
+
New-AzureADServicePrincipal -AppId bf7b6499-ff71-4aa2-97a4-f372087be7f0 -DisplayName "Confidential VM Orchestrator"
92
+
```
93
+
2. Create an Azure Key Vault using the [az keyvault create](/cli/azure/keyvault) command. For the pricing tier, select Premium (includes support for HSM backed keys). Make sure that you have an owner role in this key vault.
3. Create the disk encryption set using [az disk-encryption-set create](/cli/azure/disk-encryption-set). Set the encryption type to `ConfidentialVmEncryptedWithCustomerKey`.
106
+
5. Create the disk encryption set using [az disk-encryption-set create](/cli/azure/disk-encryption-set). Set the encryption type to `ConfidentialVmEncryptedWithCustomerKey`.
6. Create a VM with the [az vm create](/cli/azure/vm) command. Choose `DiskWithVMGuestState` for OS disk confidential encryption with a customer-managed key. Enabling secure boot is optional, but recommended. For more information, see [secure boot and vTPM](../virtual-machines/trusted-launch.md). For more information on disk encryption, see [confidential OS disk encryption](confidential-vm-overview.md).
122
+
8. Create a VM with the [az vm create](/cli/azure/vm) command. Choose `DiskWithVMGuestState` for OS disk confidential encryption with a customer-managed key. Enabling secure boot is optional, but recommended. For more information, see [secure boot and vTPM](../virtual-machines/trusted-launch.md). For more information on disk encryption, see [confidential OS disk encryption](confidential-vm-overview.md).
Copy file name to clipboardExpand all lines: articles/virtual-machines/delete.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,13 +53,13 @@ To specify what happens to the attached resources when you delete a VM, use the
53
53
-`--data-disk-delete-option` - data disk.
54
54
-`--nic-delete-option` - NIC.
55
55
56
-
In this example, we create a VM and set the OS disk and NIC to be deleted when we delete the VM.
56
+
In this example, we create a VM named *myVM* in the resource group named *myResourceGroup* using an image named *myImage*, and set the OS disk and NIC to be deleted when we delete the VM.
57
57
58
58
```azurecli-interactive
59
59
az vm create \
60
60
--resource-group myResourceGroup \
61
61
--name myVM \
62
-
--image UbuntuLTS \
62
+
--image myImage \
63
63
--public-ip-sku Standard \
64
64
--nic-delete-option delete \
65
65
--os-disk-delete-option delete \
@@ -363,14 +363,14 @@ You can use the Azure REST API to apply force delete to your scale set. Use the
363
363
364
364
## FAQ
365
365
366
-
### Q: Doesthis feature work with shared disks?
366
+
### Q: Doesthis feature work with shared disks?
367
367
368
-
A: For shared disks, you can't set the ‘deleteOption’property to‘Delete’. You can leave it blank or set it to ‘Detach’
368
+
A: For shared disks, you can't set the ‘deleteOption’property to‘Delete’. You can leave it blank or set it to ‘Detach’
369
369
370
370
371
371
### Q: Which Azure resources support this feature?
372
372
373
-
A: This feature is supported on all managed disk types used as OS disks and Data disks,NICs, and Public IPs
373
+
A: This feature is supported on all managed disk types used as OS disks and Data disks,NICs, and Public IPs
374
374
375
375
376
376
### Q: Can I use this feature on disks and NICs that aren't associated with a VM?
0 commit comments