Skip to content

Commit 6bd5876

Browse files
committed
... and another
2 parents 808ba44 + 325545b commit 6bd5876

File tree

6 files changed

+36
-20
lines changed

6 files changed

+36
-20
lines changed

articles/dev-spaces/faq.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,10 @@ keywords: "Docker, Kubernetes, Azure, AKS, Azure Kubernetes Service, containers,
1111

1212
This addresses frequently asked questions about Azure Dev Spaces.
1313

14+
## What versions of Kubernetes are supported for Azure Dev Spaces?
15+
16+
Azure Dev Spaces supports all [currently supported general availability (GA) versions of Kubernetes in AKS][aks-supported-k8s].
17+
1418
## Which Azure regions currently provide Azure Dev Spaces?
1519

1620
See [supported regions][supported-regions] for a complete list of available regions.
@@ -84,6 +88,10 @@ In Visual Studio Code, it is possible to [open separate projects in a single wor
8488

8589
In Visual Studio, it is possible to configure .NET Core solutions for debugging through Azure Dev Spaces.
8690

91+
## Can I use Azure Dev Spaces with a service mesh?
92+
93+
At this time, you can't use Azure Dev Spaces with service meshes such as [Istio][istio] or [Linkerd][linkerd]. You can run Azure Dev Spaces and a service mesh on the same AKS cluster, but you can't have both Azure Dev Spaces and a service mesh enabled in the same namespace.
94+
8795
[aks-auth-range]: ../aks/api-server-authorized-ip-ranges.md
8896
[aks-auth-range-create]: ../aks/api-server-authorized-ip-ranges.md#create-an-aks-cluster-with-api-server-authorized-ip-ranges-enabled
8997
[aks-auth-range-ranges]: https://github.com/Azure/dev-spaces/tree/master/public-ips
@@ -92,6 +100,7 @@ In Visual Studio, it is possible to configure .NET Core solutions for debugging
92100
[aks-pod-managed-id]: ../aks/developer-best-practices-pod-security.md#use-pod-managed-identities
93101
[aks-pod-managed-id-uninstall]: https://github.com/Azure/aad-pod-identity#uninstall-notes
94102
[aks-restrict-egress-traffic]: ../aks/limit-egress-traffic.md
103+
[aks-supported-k8s]: ../aks/supported-kubernetes-versions.md#list-currently-supported-versions
95104
[bike-sharing]: https://github.com/Azure/dev-spaces/tree/master/samples/BikeSharingApp
96105
[dev-spaces-pod-managed-id-steps]: troubleshooting.md#error-no-azureassignedidentity-found-for-podazdsazds-webhook-deployment-id-in-assigned-state
97106
[dev-spaces-prep]: how-dev-spaces-works-prep.md
@@ -100,6 +109,8 @@ In Visual Studio, it is possible to configure .NET Core solutions for debugging
100109
[ingress-traefik]: how-to/ingress-https-traefik.md#configure-a-custom-traefik-ingress-controller
101110
[ingress-https-nginx]: how-to/ingress-https-nginx.md#configure-the-nginx-ingress-controller-to-use-https
102111
[ingress-https-traefik]: how-to/ingress-https-traefik.md#configure-the-traefik-ingress-controller-to-use-https
112+
[istio]: https://istio.io/
113+
[linkerd]: https://linkerd.io/
103114
[quickstart-cli]: quickstart-cli.md
104115
[supported-regions]: https://azure.microsoft.com/global-infrastructure/services/?products=kubernetes-service
105116
[vs-code-multi-root-workspaces]: https://code.visualstudio.com/docs/editor/multi-root-workspaces

articles/hdinsight/hdinsight-managed-identities.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,20 +7,20 @@ ms.reviewer: jasonh
77
ms.service: hdinsight
88
ms.topic: conceptual
99
ms.custom: hdinsightactive
10-
ms.date: 11/20/2019
10+
ms.date: 04/15/2020
1111
---
1212

1313
# Managed identities in Azure HDInsight
1414

15-
A managed identity is an identity registered in Azure Active Directory (Azure AD) whose credentials are managed by Azure. With managed identities, you don't need to register service principals in Azure AD, or maintain credentials such as certificates.
15+
A managed identity is an identity registered in Azure Active Directory (Azure AD) whose credentials are managed by Azure. With managed identities, you don't need to register service principals in Azure AD. Or maintain credentials such as certificates.
1616

1717
Managed identities are used in Azure HDInsight to access Azure AD domain services or access files in Azure Data Lake Storage Gen2 when needed.
1818

19-
There are two types of managed identities: user-assigned and system-assigned. Azure HDInsight supports only user-assigned managed identities. HDInsight does not support system-assigned managed identities. A user-assigned managed identity is created as a standalone Azure resource, which you can then assign to one or more Azure service instances. In contrast, a system-assigned managed identity is created in Azure AD and then enabled directly on a particular Azure service instance automatically. The life of that system-assigned managed identity is then tied to the life of the service instance that it's enabled on.
19+
There are two types of managed identities: user-assigned and system-assigned. Azure HDInsight supports only user-assigned managed identities. HDInsight doesn't support system-assigned managed identities. A user-assigned managed identity is created as a standalone Azure resource, which you can then assign to one or more Azure service instances. In contrast, a system-assigned managed identity is created in Azure AD and then enabled directly on a particular Azure service instance automatically. The life of that system-assigned managed identity is then tied to the life of the service instance that it's enabled on.
2020

2121
## HDInsight managed identity implementation
2222

23-
In Azure HDInsight, managed identities are provisioned on each node of the cluster. These identity components, however, are only usable by the HDInsight service. There's currently no supported method for you to generate access tokens using the managed identities installed on HDInsight cluster nodes. For some Azure services, managed identities are implemented with an endpoint that you can use to acquire access tokens for interacting with other Azure services on your own.
23+
In Azure HDInsight, managed identities are provisioned on each node of the cluster. These identity components, however, are only usable by the HDInsight service. There's currently no supported method to generate access tokens using the managed identities installed on HDInsight cluster nodes. For some Azure services, managed identities are implemented with an endpoint that you can use to acquire access tokens. Use the tokens for interacting with other Azure services on your own.
2424

2525
## Create a managed identity
2626

@@ -42,8 +42,10 @@ Managed identities are used in Azure HDInsight in multiple scenarios. See the re
4242
* [Customer-managed key disk encryption](disk-encryption.md)
4343

4444
## FAQ
45+
4546
### What happens if I delete the managed identity after the cluster creation?
46-
Your cluster will run into issues when the managed identity is needed. There is currently no way to update or change manage identity after the cluster is created. So our recommendation is to make sure that the managed identity is not deleted during the cluster runtime. Alternatively you can re-create the cluster and assign a new managed identity.
47+
48+
Your cluster will run into issues when the managed identity is needed. There's currently no way to update or change a managed identity after the cluster is created. So our recommendation is to make sure that the managed identity isn't deleted during the cluster runtime. Or you can re-create the cluster and assign a new managed identity.
4749

4850
## Next steps
4951

articles/security/benchmarks/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,9 @@
3939
- name: Container Registry security baseline
4040
href: ../../container-registry/security-baseline.md
4141
- name: Cosmos DB security baseline
42-
href: ../../cosmos-db/security-baseline.md
42+
href: ../../cosmos-db/security-baseline.md
43+
- name: Data Explorer security baseline
44+
href: /azure/data-explorer/security-baseline
4345
- name: Event Hubs security baseline
4446
href: ../../event-hubs/security-baseline.md
4547
- name: HDInsight security baseline

articles/sql-database/sql-database-connectivity-architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ The following steps describe how a connection is established to an Azure SQL dat
3939
Azure SQL Database supports the following three options for the connection policy setting of a SQL Database server:
4040

4141
- **Redirect (recommended):** Clients establish connections directly to the node hosting the database, leading to reduced latency and improved throughput. For connections to use this mode, clients need to:
42-
- Allow outbound communication from the client to all Azure IP addresses in the region on ports in the range of 11000 11999. Use the Service Tags for SQL to make this easier to manage.
42+
- Allow outbound communication from the client to all Azure SQL IP addresses in the region on ports in the range of 11000 11999. Use the Service Tags for SQL to make this easier to manage.
4343
- Allow outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
4444

4545
- **Proxy:** In this mode, all connections are proxied via the Azure SQL Database gateways,leading to increased latency and reduced throughput. For connections to use this mode, clients need to allow outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.

articles/virtual-machines/windows/disk-encryption-overview-aad.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -22,17 +22,18 @@ This article supplements [Azure Disk Encryption for Windows VMs](disk-encryption
2222
- To get a token to connect to your key vault, the IaaS VM must be able to connect to an Azure Active Directory endpoint, \[login.microsoftonline.com\].
2323
- To write the encryption keys to your key vault, the IaaS VM must be able to connect to the key vault endpoint.
2424
- The IaaS VM must be able to connect to an Azure storage endpoint that hosts the Azure extension repository and an Azure storage account that hosts the VHD files.
25-
- If your security policy limits access from Azure VMs to the Internet, you can resolve the preceding URI and configure a specific rule to allow outbound connectivity to the IPs. For more information, see [Azure Key Vault behind a firewall](../../key-vault/general/access-behind-firewall.md).
26-
- On Windows, if TLS 1.0 has been explicitly disabled and the .NET version has not been updated to 4.6 or higher, the following registry change will enable ADE to select the more recent TLS version:
27-
28-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319]
29-
"SystemDefaultTlsVersions"=dword:00000001
30-
"SchUseStrongCrypto"=dword:00000001
31-
32-
[HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319]
33-
"SystemDefaultTlsVersions"=dword:00000001
34-
"SchUseStrongCrypto"=dword:00000001`
35-
25+
- If your security policy limits access from Azure VMs to the Internet, you can resolve the preceding URI and configure a specific rule to allow outbound connectivity to the IPs. For more information, see [Azure Key Vault behind a firewall](../../key-vault/key-vault-access-behind-firewall.md).
26+
- The VM to be encrypted must be configured to use TLS 1.2 as the default protocol. If TLS 1.0 has been explicitly disabled and the .NET version has not been updated to 4.6 or higher, the following registry change will enable ADE to select the more recent TLS version:
27+
28+
```console
29+
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319]
30+
"SystemDefaultTlsVersions"=dword:00000001
31+
"SchUseStrongCrypto"=dword:00000001
32+
33+
[HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319]
34+
"SystemDefaultTlsVersions"=dword:00000001
35+
"SchUseStrongCrypto"=dword:00000001`
36+
```
3637

3738
**Group Policy:**
3839
- The Azure Disk Encryption solution uses the BitLocker external key protector for Windows IaaS VMs. For domain joined VMs, don't push any group policies that enforce TPM protectors. For information about the group policy for “Allow BitLocker without a compatible TPM,” see [BitLocker Group Policy Reference](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings#bkmk-unlockpol1).
@@ -50,4 +51,4 @@ For details, see [Creating and configuring a key vault for Azure Disk Encryption
5051
- [Creating and configuring a key vault for Azure Disk Encryption with Azure AD (previous release)](disk-encryption-key-vault-aad.md)
5152
- [Enable Azure Disk Encryption with Azure AD on Windows VMs (previous release)](disk-encryption-windows-aad.md)
5253
- [Azure Disk Encryption prerequisites CLI script](https://github.com/ejarvi/ade-cli-getting-started)
53-
- [Azure Disk Encryption prerequisites PowerShell script](https://github.com/Azure/azure-powershell/tree/master/src/Compute/Compute/Extension/AzureDiskEncryption/Scripts)
54+
- [Azure Disk Encryption prerequisites PowerShell script](https://github.com/Azure/azure-powershell/tree/master/src/Compute/Compute/Extension/AzureDiskEncryption/Scripts)

includes/azure-storage-limits-azure-resource-manager.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,5 +15,5 @@ The following limits apply only when you perform management operations by using
1515
| Resource | Limit |
1616
| --- | --- |
1717
| Storage account management operations (read) |800 per 5 minutes |
18-
| Storage account management operations (write) |1200 per hour |
18+
| Storage account management operations (write) |10 per second |
1919
| Storage account management operations (list) |100 per 5 minutes |

0 commit comments

Comments
 (0)