Skip to content

Commit 6018775

Browse files
committed
Merge branch 'main' into alt-test-engine-location
2 parents 2e043e0 + 89b5086 commit 6018775

File tree

51 files changed

+90
-48
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+90
-48
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -899,6 +899,7 @@
899899
"articles/virtual-machine-scale-sets/.openpublishing.redirection.virtual-machine-scale-sets.json",
900900
"articles/mysql/.openpublishing.redirection.mysql.json",
901901
"articles/container-apps/.openpublishing.redirection.container-apps.json",
902-
"articles/spring-cloud/.openpublishing.redirection.spring-cloud.json"
902+
"articles/spring-cloud/.openpublishing.redirection.spring-cloud.json",
903+
"articles/load-testing/.openpublishing.redirection.azure-load-testing.json"
903904
]
904905
}

articles/app-service/deploy-container-github-action.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,10 +99,11 @@ OpenID Connect is an authentication method that uses short-lived tokens. Setting
9999
az ad sp create --id $appId
100100
```
101101
102-
1. Create a new role assignment by subscription and object. By default, the role assignment will be tied to your default subscription. Replace `$subscriptionId` with your subscription ID and `$assigneeObjectId` with the generated `assignee-object-id`. Learn [how to manage Azure subscriptions with the Azure CLI](/cli/azure/manage-azure-subscriptions-azure-cli).
102+
1. Create a new role assignment by subscription and object. By default, the role assignment will be tied to your default subscription. Replace `$subscriptionId` with your subscription ID, `$resourceGroupName` with your resource group name, and `$assigneeObjectId` with the generated `assignee-object-id`. Learn [how to manage Azure subscriptions with the Azure CLI](/cli/azure/manage-azure-subscriptions-azure-cli).
103103
104104
```azurecli-interactive
105-
az role assignment create --role contributor --subscription $subscriptionId --assignee-object-id $assigneeObjectId --assignee-principal-type ServicePrincipal
105+
az role assignment create --role contributor --subscription $subscriptionId --assignee-object-id $assigneeObjectId --assignee-principal-type ServicePrincipal --scopes /subscriptions/$subscriptionId/resourceGroups/$resourceGroupName
106+
/providers/Microsoft.Web/sites/
106107
```
107108
108109
1. Run the following command to [create a new federated identity credential](/graph/api/application-post-federatedidentitycredentials?view=graph-rest-beta&preserve-view=true) for your active directory application.

articles/app-service/deploy-github-actions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -122,10 +122,10 @@ OpenID Connect is an authentication method that uses short-lived tokens. Setting
122122
az ad sp create --id $appId
123123
```
124124
125-
1. Create a new role assignment by subscription and object. By default, the role assignment will be tied to your default subscription. Replace `$subscriptionId` with your subscription ID and `$assigneeObjectId` with the generated `assignee-object-id`. Learn [how to manage Azure subscriptions with the Azure CLI](/cli/azure/manage-azure-subscriptions-azure-cli).
125+
1. Create a new role assignment by subscription and object. By default, the role assignment will be tied to your default subscription. Replace `$subscriptionId` with your subscription ID, `$resourceGroupName` with your resource group name, and `$assigneeObjectId` with the generated `assignee-object-id`. Learn [how to manage Azure subscriptions with the Azure CLI](/cli/azure/manage-azure-subscriptions-azure-cli).
126126
127127
```azurecli-interactive
128-
az role assignment create --role contributor --subscription $subscriptionId --assignee-object-id $assigneeObjectId --assignee-principal-type ServicePrincipal
128+
az role assignment create --role contributor --subscription $subscriptionId --assignee-object-id $assigneeObjectId --scopes /subscriptions/$subscriptionId/resourceGroups/$resourceGroupName/providers/Microsoft.Web/sites/--assignee-principal-type ServicePrincipal
129129
```
130130
131131
1. Run the following command to [create a new federated identity credential](/graph/api/application-post-federatedidentitycredentials?view=graph-rest-beta&preserve-view=true) for your active directory application.

articles/app-service/environment/app-service-app-service-environment-control-inbound-traffic.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,9 @@ The following list contains the ports used by an App Service Environment. All po
3737
* 4016: Used for remote debugging with Visual Studio 2012. This port can be safely blocked if the feature isn't being used. On an ILB-enabled ASE, this port is bound to the ILB address of the ASE.
3838
* 4018: Used for remote debugging with Visual Studio 2013. This port can be safely blocked if the feature isn't being used. On an ILB-enabled ASE, this port is bound to the ILB address of the ASE.
3939
* 4020: Used for remote debugging with Visual Studio 2015. This port can be safely blocked if the feature isn't being used. On an ILB-enabled ASE, this port is bound to the ILB address of the ASE.
40+
* 4022: Used for remote debugging with Visual Studio 2017. This port can be safely blocked if the feature isn't being used. On an ILB-enabled ASE, this port is bound to the ILB address of the ASE.
41+
* 4024 Used for remote debugging with Visual Studio 2019. This port can be safely blocked if the feature isn't being used. On an ILB-enabled ASE, this port is bound to the ILB address of the ASE.
42+
* 4026: Used for remote debugging with Visual Studio 2022. This port can be safely blocked if the feature isn't being used. On an ILB-enabled ASE, this port is bound to the ILB address of the ASE.
4043

4144
## Outbound Connectivity and DNS Requirements
4245
For an App Service Environment to function properly, it also requires outbound access to various endpoints. A full list of the external endpoints used by an ASE is in the "Required Network Connectivity" section of the [Network Configuration for ExpressRoute](app-service-app-service-environment-network-configuration-expressroute.md#required-network-connectivity) article.

articles/app-service/environment/network-info.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -189,10 +189,13 @@ If you put a *deny everything else* rule before the default rules, you prevent t
189189

190190
If you assigned an IP address to your app, make sure you keep the ports open. To see the ports, select **App Service Environment** > **IP addresses**.  
191191

192-
All the items shown in the following outbound rules are needed, except for the last item. They enable network access to the App Service Environment dependencies that were noted earlier in this article. If you block any of them, your App Service Environment stops working. The last item in the list enables your App Service Environment to communicate with other resources in your virtual network.
192+
All the items shown in the following outbound rules are needed, except for the rule named **ASE-internal-outbound**. They enable network access to the App Service Environment dependencies that were noted earlier in this article. If you block any of them, your App Service Environment stops working. The rule named **ASE-internal-outbound** in the list enables your App Service Environment to communicate with other resources in your virtual network.
193193

194194
![Screenshot that shows outbound security rules.][5]
195195

196+
> [!NOTE]
197+
> The IP range in the ASE-internal-outbound rule is only an example and should be changed to match the subnet range for the App Service Environment subnet.
198+
196199
After your NSGs are defined, assign them to the subnet. If you don't remember the virtual network or subnet, you can see it from the App Service Environment portal. To assign the NSG to your subnet, go to the subnet UI and select the NSG.
197200

198201
## Routes

articles/azure-app-configuration/use-key-vault-references-spring-boot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ To add a secret to the vault, you need to take just a few additional steps. In t
122122
123123
```azurecli
124124
az ad sp show --id <clientId-of-your-service-principal>
125-
az role assignment create --role "App Configuration Data Reader" --assignee-object-id <objectId-of-your-service-principal> --resource-group <your-resource-group>
125+
az role assignment create --role "App Configuration Data Reader" --scope /subscriptions/<subscriptionId>/resourceGroups/<group-name> --assignee-principal-type --assignee-object-id <objectId-of-your-service-principal> --resource-group <your-resource-group>
126126
```
127127
128128
1. Create the environment variables **AZURE_CLIENT_ID**, **AZURE_CLIENT_SECRET**, and **AZURE_TENANT_ID**. Use the values for the service principal that were displayed in the previous steps. At the command line, run the following commands and restart the command prompt to allow the change to take effect:

articles/azure-resource-manager/bicep/key-vault-parameter.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -132,6 +132,7 @@ The following procedure shows how to create a role with the minimum permission,
132132
az role definition create --role-definition "<path-to-role-file>"
133133
az role assignment create \
134134
--role "Key Vault resource manager template deployment operator" \
135+
--scope /subscriptions/<Subscription-id>/resourceGroups/<resource-group-name> \
135136
--assignee <user-principal-name> \
136137
--resource-group ExampleGroup
137138
```

articles/azure-resource-manager/templates/key-vault-parameter.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,7 @@ For other users, grant the `Microsoft.KeyVault/vaults/deploy/action` permission.
136136
az role definition create --role-definition "<path-to-role-file>"
137137
az role assignment create \
138138
--role "Key Vault resource manager template deployment operator" \
139+
--scope /subscriptions/<Subscription-id>/resourceGroups/<resource-group-name> \
139140
--assignee <user-principal-name> \
140141
--resource-group ExampleGroup
141142
```

articles/azure-sql/database/application-authentication-get-client-id-keys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ $svcprincipal = az ad sp create --id $azureAdApplication.ApplicationId
8080
Start-Sleep -s 15 # to avoid a PrincipalNotFound error, pause for 15 seconds
8181
8282
# if you still get a PrincipalNotFound error, then rerun the following until successful.
83-
$roleassignment = az role assignment create --role "Contributor" --assignee $azureAdApplication.ApplicationId.Guid
83+
$roleassignment = az role assignment create --role "Contributor" --scope /subscriptions/{Subscription-id}/resourceGroups/{resource-group-name} --assignee $azureAdApplication.ApplicationId.Guid
8484
8585
# output the values we need for our C# application to successfully authenticate
8686
Write-Output "Copy these values into the C# sample app"

articles/backup/backup-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: What is Azure Backup?
33
description: Provides an overview of the Azure Backup service, and how it contributes to your business continuity and disaster recovery (BCDR) strategy.
44
ms.topic: overview
5-
ms.date: 01/04/2022
5+
ms.date: 03/11/2022
66
ms.custom: mvc
77
---
88
# What is the Azure Backup service?
@@ -19,7 +19,7 @@ The Azure Backup service provides simple, secure, and cost-effective solutions t
1919
- **Azure Files shares** - [Back up Azure File shares to a storage account](backup-afs.md)
2020
- **SQL Server in Azure VMs** - [Back up SQL Server databases running on Azure VMs](backup-azure-sql-database.md)
2121
- **SAP HANA databases in Azure VMs** - [Backup SAP HANA databases running on Azure VMs](backup-azure-sap-hana-database.md)
22-
- **Azure Database for PostgreSQL servers (preview)** - [Back up Azure PostgreSQL databases and retain the backups for up to 10 years](backup-azure-database-postgresql.md)
22+
- **Azure Database for PostgreSQL servers** - [Back up Azure PostgreSQL databases and retain the backups for up to 10 years](backup-azure-database-postgresql.md)
2323
- **Azure Blobs** - [Overview of operational backup for Azure Blobs](blob-backup-overview.md)
2424

2525
![Azure Backup Overview](./media/backup-overview/azure-backup-overview.png)

0 commit comments

Comments
 (0)