Skip to content

Commit 51760f1

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into liveResizeLimits
2 parents 69f4199 + db4b6d7 commit 51760f1

File tree

6 files changed

+32
-20
lines changed

6 files changed

+32
-20
lines changed

articles/app-service/environment/create-from-template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: madsd
55

66
ms.assetid: 6eb7d43d-e820-4a47-818c-80ff7d3b6f8e
77
ms.topic: article
8-
ms.date: 01/20/2023
8+
ms.date: 03/27/2023
99
ms.author: madsd
1010
ms.custom: seodec18
1111
---
@@ -49,7 +49,7 @@ If you want to make an ASE, use this Resource Manager template [ASEv2][quickstar
4949
* *existingVirtualNetworkResourceGroup*: his parameter defines the resource group name of the existing virtual network and subnet where ASE will reside.
5050
* *subnetName*: This parameter defines the subnet name of the existing virtual network and subnet where ASE will reside.
5151
* *internalLoadBalancingMode*: In most cases, set this to 3, which means both HTTP/HTTPS traffic on ports 80/443, and the control/data channel ports listened to by the FTP service on the ASE, will be bound to an ILB-allocated virtual network internal address. If this property is set to 2, only the FTP service-related ports (both control and data channels) are bound to an ILB address. If this property is set to 0, the HTTP/HTTPS traffic remains on the public VIP.
52-
* *dnsSuffix*: This parameter defines the default root domain that's assigned to the ASE. In the public variation of Azure App Service, the default root domain for all web apps is *azurewebsites.net*. Because an ILB ASE is internal to a customer's virtual network, it doesn't make sense to use the public service's default root domain. Instead, an ILB ASE should have a default root domain that makes sense for use within a company's internal virtual network. For example, Contoso Corporation might use a default root domain of *internal-contoso.com* for apps that are intended to be resolvable and accessible only within Contoso's virtual network.
52+
* *dnsSuffix*: This parameter defines the default root domain that's assigned to the ASE. In the public variation of Azure App Service, the default root domain for all web apps is *azurewebsites.net*. Because an ILB ASE is internal to a customer's virtual network, it doesn't make sense to use the public service's default root domain. Instead, an ILB ASE should have a default root domain that makes sense for use within a company's internal virtual network. For example, Contoso Corporation might use a default root domain of *internal-contoso.com* for apps that are intended to be resolvable and accessible only within Contoso's virtual network. To specify custom root domain you need to use api version `2018-11-01` or earlier versions.
5353
* *ipSslAddressCount*: This parameter automatically defaults to a value of 0 in the *azuredeploy.json* file because ILB ASEs only have a single ILB address. There are no explicit IP-SSL addresses for an ILB ASE. Hence, the IP-SSL address pool for an ILB ASE must be set to zero. Otherwise, a provisioning error occurs.
5454

5555
After the *azuredeploy.parameters.json* file is filled in, create the ASE by using the PowerShell code snippet. Change the file paths to match the Resource Manager template-file locations on your machine. Remember to supply your own values for the Resource Manager deployment name and the resource group name:

articles/app-service/environment/create-ilb-ase.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to create an App Service environment with an internal loa
44
author: madsd
55
ms.assetid: 0f4c1fa4-e344-46e7-8d24-a25e247ae138
66
ms.topic: quickstart
7-
ms.date: 02/28/2023
7+
ms.date: 03/27/2023
88
ms.author: madsd
99
ms.custom: mvc, seodec18, mode-other
1010
---
@@ -139,7 +139,7 @@ To learn more about how to configure your ILB ASE with a WAF device, see [Confi
139139

140140
## ILB ASEs made before May 2019
141141

142-
ILB ASEs that were made before May 2019 required you to set the domain suffix during ASE creation. They also required you to upload a default certificate that was based on that domain suffix. Also, with an older ILB ASE you can't perform single sign-on to the Kudu console with apps in that ILB ASE. When configuring DNS for an older ILB ASE, you need to set the wildcard A record in a zone that matches to your domain suffix.
142+
ILB ASEs that were made before May 2019 required you to set the domain suffix during ASE creation. They also required you to upload a default certificate that was based on that domain suffix. Also, with an older ILB ASE you can't perform single sign-on to the Kudu console with apps in that ILB ASE. When configuring DNS for an older ILB ASE, you need to set the wildcard A record in a zone that matches to your domain suffix. Creating or changing ILB ASE with custom domain suffix requires you to use Azure Resource Manager templates and an api version prior to 2019. Last support api version is `2018-11-01`.
143143

144144
## Get started ##
145145

articles/app-service/environment/using.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use an App Service Environment
33
description: Learn how to use your App Service Environment to host isolated applications.
44
author: madsd
55
ms.topic: article
6-
ms.date: 02/14/2022
6+
ms.date: 03/27/2023
77
ms.author: madsd
88
---
99

@@ -92,7 +92,7 @@ To configure DNS in Azure DNS private zones:
9292
1. Create an A record in that zone that points @ to the inbound IP address.
9393
1. Create an A record in that zone that points *.scm to the inbound IP address.
9494

95-
The DNS settings for the default domain suffix of your App Service Environment don't restrict your apps to only being accessible by those names. You can set a custom domain name without any validation on your apps in an App Service Environment. If you then want to create a zone named `contoso.net`, you can do so and point it to the inbound IP address. The custom domain name works for app requests, but doesn't work for the `scm` site. The `scm` site is only available at *<appname>.scm.<asename>.appserviceenvironment.net*.
95+
The DNS settings for the default domain suffix of your App Service Environment don't restrict your apps to only being accessible by those names. You can set a custom domain name without any validation on your apps in an App Service Environment. If you then want to create a zone named `contoso.net`, you can do so and point it to the inbound IP address. The custom domain name works for app requests, and if the custom domain suffix certificate includes a wildcard SAN for scm, custom domain name also work for `scm` site and you can create a `*.scm` record and point it to the inbound IP address.
9696

9797
## Publishing
9898

@@ -173,6 +173,7 @@ If you have multiple App Service Environments, you might want some of them to be
173173
- **None**: Azure upgrades in no particular batch. This value is the default.
174174
- **Early**: Upgrade in the first half of the App Service upgrades.
175175
- **Late**: Upgrade in the second half of the App Service upgrades.
176+
- **Manual**: Get [15 days window](./how-to-upgrade-preference.md) to deploy the upgrade manually.
176177

177178
Select the value you want, and then select **Save**.
178179

articles/confidential-computing/quick-create-confidential-vm-azure-cli-amd.md

Lines changed: 18 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -84,31 +84,42 @@ Make a note of the `publicIpAddress` to use later.
8484

8585
Create a confidential [disk encryption set](../virtual-machines/linux/disks-enable-customer-managed-keys-cli.md) using [Azure Key Vault](../key-vault/general/quick-create-cli.md) or [Azure Key Vault managed Hardware Security Module (HSM)](../key-vault/managed-hsm/quick-create-cli.md). Based on your security and compliance needs you can choose either option. The following example uses Azure Key Vault Premium.
8686

87-
1. Create an Azure Key Vault using the [az keyvault create](/cli/azure/keyvault) command. For the pricing tier, select Premium (includes support for HSM backed keys). Make sure that you have an owner role in this key vault.
87+
1. Grant confidential VM Service Principal `Confidential VM Orchestrator` to tenant
88+
For this step you need to be a Global Admin or you need to have the User Access Administrator RBAC role.
89+
```azurecli
90+
Connect-AzureAD -Tenant "your tenant ID"
91+
New-AzureADServicePrincipal -AppId bf7b6499-ff71-4aa2-97a4-f372087be7f0 -DisplayName "Confidential VM Orchestrator"
92+
```
93+
2. Create an Azure Key Vault using the [az keyvault create](/cli/azure/keyvault) command. For the pricing tier, select Premium (includes support for HSM backed keys). Make sure that you have an owner role in this key vault.
8894
```azurecli-interactive
8995
az keyvault create -n keyVaultName -g myResourceGroup --enabled-for-disk-encryption true --sku premium --enable-purge-protection true
9096
```
91-
2. Create a key in the key vault using [az keyvault key create](/cli/azure/keyvault). For the key type, use RSA-HSM.
97+
3. Give `Confidential VM Orchestrator` permissions to `get` and `release` the key vault.
98+
```azurecli
99+
$cvmAgent = az ad sp show --id "bf7b6499-ff71-4aa2-97a4-f372087be7f0" | Out-String | ConvertFrom-Json
100+
az keyvault set-policy --name $KeyVault --object-id $cvmAgent.objectId --key-permissions get release
101+
```
102+
4. Create a key in the key vault using [az keyvault key create](/cli/azure/keyvault). For the key type, use RSA-HSM.
92103
```azurecli-interactive
93104
az keyvault key create --name mykey --vault-name keyVaultName --default-cvm-policy --exportable --kty RSA-HSM
94105
```
95-
3. Create the disk encryption set using [az disk-encryption-set create](/cli/azure/disk-encryption-set). Set the encryption type to `ConfidentialVmEncryptedWithCustomerKey`.
106+
5. Create the disk encryption set using [az disk-encryption-set create](/cli/azure/disk-encryption-set). Set the encryption type to `ConfidentialVmEncryptedWithCustomerKey`.
96107
```azurecli-interactive
97108
$keyVaultKeyUrl=(az keyvault key show --vault-name keyVaultName --name mykey--query [key.kid] -o tsv)
98109
99110
az disk-encryption-set create --resource-group myResourceGroup --name diskEncryptionSetName --key-url $keyVaultKeyUrl --encryption-type ConfidentialVmEncryptedWithCustomerKey
100111
```
101-
4. Grant the disk encryption set resource access to the key vault using [az key vault set-policy](/cli/azure/keyvault).
112+
6. Grant the disk encryption set resource access to the key vault using [az key vault set-policy](/cli/azure/keyvault).
102113
```azurecli-interactive
103114
$desIdentity=(az disk-encryption-set show -n diskEncryptionSetName -g myResourceGroup --query [identity.principalId] -o tsv)
104115
105116
az keyvault set-policy -n keyVaultName -g myResourceGroup --object-id $desIdentity --key-permissions wrapkey unwrapkey get
106117
```
107-
5. Use the disk encryption set ID to create the VM.
118+
7. Use the disk encryption set ID to create the VM.
108119
```azurecli-interactive
109120
$diskEncryptionSetID=(az disk-encryption-set show -n diskEncryptionSetName -g myResourceGroup --query [id] -o tsv)
110121
```
111-
6. Create a VM with the [az vm create](/cli/azure/vm) command. Choose `DiskWithVMGuestState` for OS disk confidential encryption with a customer-managed key. Enabling secure boot is optional, but recommended. For more information, see [secure boot and vTPM](../virtual-machines/trusted-launch.md). For more information on disk encryption, see [confidential OS disk encryption](confidential-vm-overview.md).
122+
8. Create a VM with the [az vm create](/cli/azure/vm) command. Choose `DiskWithVMGuestState` for OS disk confidential encryption with a customer-managed key. Enabling secure boot is optional, but recommended. For more information, see [secure boot and vTPM](../virtual-machines/trusted-launch.md). For more information on disk encryption, see [confidential OS disk encryption](confidential-vm-overview.md).
112123

113124
```azurecli-interactive
114125
az vm create \
@@ -186,4 +197,4 @@ echo -n $JWT | cut -d "." -f 2 | base64 -d 2>/dev/null | jq .
186197
## Next steps
187198

188199
> [!div class="nextstepaction"]
189-
> [Create a confidential VM on AMD with an ARM template](quick-create-confidential-vm-arm-amd.md)
200+
> [Create a confidential VM on AMD with an ARM template](quick-create-confidential-vm-arm-amd.md)

articles/spring-apps/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ items:
1616
items:
1717
- name: Launch your first app
1818
href: quickstart.md
19+
- name: Launch your first event-driven app
20+
href: quickstart-deploy-event-driven-app-standard-consumption.md
1921
- name: Run apps on Standard consumption plan
2022
expanded: true
2123
items:
@@ -25,8 +27,6 @@ items:
2527
href: quickstart-provision-standard-consumption-app-environment-with-virtual-network.md
2628
- name: Access apps in a VNet
2729
href: quickstart-access-standard-consumption-within-virtual-network.md
28-
- name: Launch your first event-driven app
29-
href: quickstart-deploy-event-driven-app-standard-consumption.md
3030
- name: Set up autoscale
3131
href: quickstart-apps-autoscale-standard-consumption.md
3232
- name: Map a custom domain to Azure Spring Apps

articles/virtual-machines/delete.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -53,13 +53,13 @@ To specify what happens to the attached resources when you delete a VM, use the
5353
- `--data-disk-delete-option` - data disk.
5454
- `--nic-delete-option` - NIC.
5555

56-
In this example, we create a VM and set the OS disk and NIC to be deleted when we delete the VM.
56+
In this example, we create a VM named *myVM* in the resource group named *myResourceGroup* using an image named *myImage*, and set the OS disk and NIC to be deleted when we delete the VM.
5757

5858
```azurecli-interactive
5959
az vm create \
6060
--resource-group myResourceGroup \
6161
--name myVM \
62-
--image UbuntuLTS \
62+
--image myImage \
6363
--public-ip-sku Standard \
6464
--nic-delete-option delete \
6565
--os-disk-delete-option delete \
@@ -363,14 +363,14 @@ You can use the Azure REST API to apply force delete to your scale set. Use the
363363

364364
## FAQ
365365

366-
### Q: Does this feature work with shared disks?
366+
### Q: Does this feature work with shared disks?
367367

368-
A: For shared disks, you can't set the ‘deleteOption’ property to ‘Delete’. You can leave it blank or set it to ‘Detach’
368+
A: For shared disks, you can't set the ‘deleteOption’ property to ‘Delete’. You can leave it blank or set it to ‘Detach’
369369

370370

371371
### Q: Which Azure resources support this feature?
372372

373-
A: This feature is supported on all managed disk types used as OS disks and Data disks, NICs, and Public IPs
373+
A: This feature is supported on all managed disk types used as OS disks and Data disks, NICs, and Public IPs
374374

375375

376376
### Q: Can I use this feature on disks and NICs that aren't associated with a VM?

0 commit comments

Comments
 (0)