You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/command-invoke.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.date: 1/14/2022
7
7
8
8
# Use `command invoke` to access a private Azure Kubernetes Service (AKS) cluster
9
9
10
-
Accessing a private AKS cluster requires that you connect to that cluster either from the cluster virtual network, from a peered network, or via a configured private endpoint. These approaches require configuring a VPN, Express Route, deploying a *jumpbox* within the cluster virtual network, or creating a private endpoint inside of another virtual network. Alternatively, you can use `command invoke` to access private clusters without having to configure a VPN or Express Route. Using `command invoke` allows you to remotely invoke commands like `kubectl` and `helm` on your private cluster through the Azure API without directly connecting to the cluster. Permissions for using `command invoke` are controlled through the `Microsoft.ContainerService/managedClusters/runcommand/action` and `Microsoft.ContainerService/managedclusters/commandResults/read`roles.
10
+
Accessing a private AKS cluster requires that you connect to that cluster either from the cluster virtual network, from a peered network, or via a configured private endpoint. These approaches require configuring a VPN, Express Route, deploying a *jumpbox* within the cluster virtual network, or creating a private endpoint inside of another virtual network. Alternatively, you can use `command invoke` to access private clusters without having to configure a VPN or Express Route. Using `command invoke` allows you to remotely invoke commands like `kubectl` and `helm` on your private cluster through the Azure API without directly connecting to the cluster. Permissions for using `command invoke` are controlled through the `Microsoft.ContainerService/managedClusters/runcommand/action` and `Microsoft.ContainerService/managedclusters/commandResults/read`actions.
Copy file name to clipboardExpand all lines: articles/aks/workload-identity-migrate-from-pod-identity.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -120,7 +120,7 @@ If your application is using managed identity and still relies on IMDS to get an
120
120
To update or deploy the workload, add these pod annotations only if you want to use the migration sidecar. You inject the following [annotation][pod-annotations] values to use the sidecar in your pod specification:
121
121
122
122
*`azure.workload.identity/inject-proxy-sidecar` - value is `true` or `false`
123
-
*`azure.workload.identity/proxy-sidecar-port` - value is the desired port for the proxy sidecar. The default value is `8080`.
123
+
*`azure.workload.identity/proxy-sidecar-port` - value is the desired port for the proxy sidecar. The default value is `8000`.
124
124
125
125
When a pod with the above annotations is created, the Azure Workload Identity mutating webhook automatically injects the init-container and proxy sidecar to the pod spec.
This configuration applies to any configuration where a pod is being created. After updating or deploying your application, you can verify the pod is in a running state using the [kubectl describe pod][kubectl-describe] command. Replace the value `podName` with the image name of your deployed pod.
@@ -210,4 +210,4 @@ This article showed you how to set up your pod to authenticate using a workload
Copy file name to clipboardExpand all lines: articles/container-registry/monitor-service.md
+11-13Lines changed: 11 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,9 +15,9 @@ When you have critical applications and business processes relying on Azure reso
15
15
16
16
## Monitor overview
17
17
18
-
The **Overview** page in the Azure portal for each registry includes a brief view of recent resource usage and activity, such as push and pull operations. This high-level information is useful, but only a small amount of data is shown there.
18
+
The **Overview** page in the Azure portal for each registry includes a brief view of recent resource usage and activity, such as push and pull operations. This high-level information is useful, but only a small amount of data is shown there.
@@ -33,9 +33,9 @@ Start with the article [Monitoring Azure resources with Azure Monitor](../azure-
33
33
34
34
The following sections build on this article by describing the specific data gathered for Azure Container Registry and providing examples for configuring data collection and analyzing this data with Azure tools.
35
35
36
-
## Monitoring data
36
+
## Monitoring data
37
37
38
-
Azure Container Registry collects the same kinds of monitoring data as other Azure resources that are described in [Monitoring data from Azure resources](../azure-monitor/essentials/monitor-azure-resource.md#monitoring-data).
38
+
Azure Container Registry collects the same kinds of monitoring data as other Azure resources that are described in [Monitoring data from Azure resources](../azure-monitor/essentials/monitor-azure-resource.md#monitoring-data).
39
39
40
40
See [Monitoring Azure Container Registry data reference](monitor-service-reference.md) for detailed information on the metrics and logs created by Azure Container Registry.
41
41
@@ -56,12 +56,12 @@ The following image shows the options when you enable diagnostic settings for a
56
56
57
57
The metrics and logs you can collect are discussed in the following sections.
58
58
59
-
## Analyzing metrics (preview)
59
+
## Analyzing metrics
60
60
61
-
You can analyze metrics for an Azure container registry with metrics from other Azure services using metrics explorer by opening **Metrics** from the **Azure Monitor** menu. See [Getting started with Azure Metrics Explorer](../azure-monitor/essentials/metrics-getting-started.md) for details on using this tool.
61
+
You can analyze metrics for an Azure container registry with metrics from other Azure services using metrics explorer by opening **Metrics** from the **Azure Monitor** menu. See [Getting started with Azure Metrics Explorer](../azure-monitor/essentials/metrics-getting-started.md) for details on using this tool.
62
62
63
63
> [!TIP]
64
-
> You can also go to the metrics explorer by navigating to your registry in the portal. In the menu, select **Metrics (preview)** under **Monitoring**.
64
+
> You can also go to the metrics explorer by navigating to your registry in the portal. In the menu, select **Metrics** under **Monitoring**.
65
65
66
66
For a list of the platform metrics collected for Azure Container Registry, see [Monitoring Azure Container Registry data reference metrics](monitor-service-reference.md#metrics)
67
67
@@ -74,7 +74,7 @@ The following Azure CLI commands can be used to get information about the Azure
74
74
*[az monitor metrics list-definitions](/cli/azure/monitor/metrics#az-monitor-metrics-list-definitions) - List metric definitions and dimensions
Azure Monitor alerts proactively notify you when important conditions are found in your monitoring data. They allow you to identify and address issues in your system before your customers notice them. You can set alerts on [metrics](../azure-monitor/alerts/alerts-metric-overview.md), [logs](../azure-monitor/alerts/alerts-unified-log.md), and the [activity log](../azure-monitor/alerts/activity-log-alerts.md). Different types of alerts have benefits and drawbacks.
168
167
169
-
170
168
<!-- only include next line if applications run on your service and work with App Insights.
171
169
172
170
If you are creating or running an application which run on <*service*> [Azure Monitor Application Insights](../azure-monitor/overview.md#application-insights) may offer additional types of alerts.
@@ -183,7 +181,7 @@ The following table lists common and recommended alert rules for Azure Container
183
181
### Example: Send email alert when registry storage used exceeds a value
184
182
185
183
1. In the Azure portal, navigate to your registry.
186
-
1. Select **Metrics (preview)** under **Monitoring**.
184
+
1. Select **Metrics** under **Monitoring**.
187
185
1. In the metrics explorer, in **Metric**, select **Storage used**.
188
186
1. Select **New alert rule**.
189
187
1. In **Scope**, confirm the registry resource for which you want to create an alert rule.
@@ -202,4 +200,4 @@ The following table lists common and recommended alert rules for Azure Container
202
200
203
201
- See [Monitoring Azure Container Registry data reference](monitor-service-reference.md) for a reference of the metrics, logs, and other important values created by Azure Container Registry.
204
202
- See [Monitoring Azure resources with Azure Monitor](../azure-monitor/essentials/monitor-azure-resource.md) for details on monitoring Azure resources.
205
-
- See [Show registry usage](container-registry-skus.md#show-registry-usage) for information about how to get a snapshot of storage usage and other resource consumption in your registry.
203
+
- See [Show registry usage](container-registry-skus.md#show-registry-usage) for information about how to get a snapshot of storage usage and other resource consumption in your registry.
- Outbound flow from a backend VM to a frontend of an internal Load Balancer will fail.
121
121
- A load balancer rule cannot span two virtual networks. All load balancer frontends and their backend instances must be in a single virtual network.
122
122
- Forwarding IP fragments isn't supported on load-balancing rules. IP fragmentation of UDP and TCP packets isn't supported on load-balancing rules.
123
-
- You can only have 1 Public Load Balancer and 1 internal Load Balancer per availability set
123
+
- You can only have 1 Public Load Balancer (NIC based) and 1 internal Load Balancer (NIC based) per availability set. However, this constraint doesn't apply to IP-based load balancers.
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-gateway-install.md
+1-16Lines changed: 1 addition & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,22 +44,7 @@ For information about how to use the gateway with these services, see these arti
44
44
45
45
* Later in the Azure portal, you need to use the same Azure account to create an Azure gateway resource that's associated with your gateway installation. You can link only one gateway installation and one Azure gateway resource to each other. However, you can use your Azure account to set up different gateway installations that are each associated with an Azure gateway resource. Your logic app workflows can then use these gateway resources in triggers and actions that can access on-premises data sources.
46
46
47
-
* Local computer requirements:
48
-
49
-
**Minimum requirements**
50
-
51
-
* .NET Framework 4.8
52
-
* 64-bit version of Windows 7 or Windows Server 2008 R2 (or later)
53
-
54
-
**Recommended requirements**
55
-
56
-
* An eight-core CPU
57
-
* 8 GB of memory
58
-
* 64-bit version of Windows Server 2012 R2 or later
59
-
* Solid-state drive (SSD) storage for spooling
60
-
61
-
> [!NOTE]
62
-
> The gateway doesn't support Windows Server Core.
47
+
* For local computer operating system and hardware requirements, see the [main guide for how to install the on-premises data gateway](/data-integration/gateway/service-gateway-install).
0 commit comments