Skip to content

Commit 72752f9

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into fxt-edge-filer
2 parents 582d4b8 + eecadf9 commit 72752f9

File tree

137 files changed

+2338
-1783
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

137 files changed

+2338
-1783
lines changed

articles/application-gateway/application-gateway-backend-health-troubleshooting.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,14 +48,14 @@ BackendAddressPools :
4848
BackendAddressPoolsText : [
4949
{
5050
"BackendAddressPool": {
51-
"Id": "/subscriptions/aaaa0000-bb11-2222-33cc-444444dddddd/resourceGroups/rgOne/providers/Microsoft.Network/applicationGateways/appgw1/b
51+
"Id": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/rgOne/providers/Microsoft.Network/applicationGateways/appgw1/b
5252
ackendAddressPools/appGatewayBackendPool"
5353
},
5454
"BackendHttpSettingsCollection": [
5555
{
5656
"BackendHttpSettings": {
5757
"TrustedRootCertificates": [],
58-
"Id": "/subscriptions/aaaa0000-bb11-2222-33cc-444444dddddd/resourceGroups/rgOne/providers/Microsoft.Network/applicationGateways/appg
58+
"Id": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/rgOne/providers/Microsoft.Network/applicationGateways/appg
5959
w1/backendHttpSettingsCollection/appGatewayBackendHttpSettings"
6060
},
6161
"Servers": [

articles/application-gateway/for-containers/troubleshooting-guide.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -117,11 +117,11 @@ The following logs are repeated by the primary alb-controller pod.
117117
```text
118118
{"level":"info","version":"x.x.x","Timestamp":"2024-02-26T20:31:53.760150719Z","message":"Stream opened for config updates"}
119119
{"level":"info","version":"x.x.x","operationID":"aaaa0000-bb11-2222-33cc-444444dddddd","Timestamp":"2024-02-26T20:31:53.760313623Z","message":"Successfully sent config update request"}
120-
{"level":"error","version":"x.x.x","error":"rpc error: code = PermissionDenied desc = ALB Controller with object id 'aaaa0000-bb11-2222-33cc-444444dddddd' does not have authorization to perform action on Application Gateway for Containers resource.Please check RBAC delegations to the Application Gateway for Containers resource.","Timestamp":"2024-02-26T20:31:53.769444995Z","message":"Unable to capture config update response"}
120+
{"level":"error","version":"x.x.x","error":"rpc error: code = PermissionDenied desc = ALB Controller with object id 'aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb' does not have authorization to perform action on Application Gateway for Containers resource.Please check RBAC delegations to the Application Gateway for Containers resource.","Timestamp":"2024-02-26T20:31:53.769444995Z","message":"Unable to capture config update response"}
121121
{"level":"info","version":"x.x.x","Timestamp":"2024-02-26T20:31:53.769504489Z","message":"Retrying to open config update stream"}
122122
{"level":"info","version":"x.x.x","Timestamp":"2024-02-26T20:31:54.461487406Z","message":"Stream opened up for endpoint updates"}
123123
{"level":"info","version":"x.x.x","operationID":"808825c2-b0a8-476b-b83a-8e7357c55750","Timestamp":"2024-02-26T20:31:54.462070039Z","message":"Successfully sent endpoint update request"}
124-
{"level":"error","version":"x.x.x","error":"rpc error: code = PermissionDenied desc = ALB Controller with object id 'aaaa0000-bb11-2222-33cc-444444dddddd' does not have authorization to perform action on Application Gateway for Containers resource.Please check RBAC delegations to the Application Gateway for Containers resource.","Timestamp":"2024-02-26T20:31:54.470728646Z","message":"Unable to capture endpoint update response"}
124+
{"level":"error","version":"x.x.x","error":"rpc error: code = PermissionDenied desc = ALB Controller with object id 'aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb' does not have authorization to perform action on Application Gateway for Containers resource.Please check RBAC delegations to the Application Gateway for Containers resource.","Timestamp":"2024-02-26T20:31:54.470728646Z","message":"Unable to capture endpoint update response"}
125125
{"level":"info","version":"x.x.x","Timestamp":"2024-02-26T20:31:54.47077373Z","message":"Retrying to open up endpoint update stream"}
126126
```
127127

@@ -151,7 +151,7 @@ status:
151151
Assertion Subject: 'system:serviceaccount:azure-application-lb-system:gateway-controller-sa'.
152152
Assertion Audience: 'api://AzureADTokenExchange'. https://docs.microsoft.com/en-us/azure/active-directory/develop/workload-identity-federation\\r\\nTrace
153153
ID: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\\r\\nCorrelation ID: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx\\r\\nTimestamp:
154-
2023-04-28 22:08:46Z\",\"error_codes\":[70021],\"timestamp\":\"2023-04-28 22:08:46Z\",\"trace_id\":\"aaaa0000-bb11-2222-33cc-444444dddddd\",\"correlation_id\":\"aaaa0000-bb11-2222-33cc-444444dddddd\",\"error_uri\":\"https://login.microsoftonline.com/error?code=70021\"}
154+
2023-04-28 22:08:46Z\",\"error_codes\":[70021],\"timestamp\":\"2023-04-28 22:08:46Z\",\"trace_id\":\"0000aaaa-11bb-cccc-dd22-eeeeee333333\",\"correlation_id\":\"aaaa0000-bb11-2222-33cc-444444dddddd\",\"error_uri\":\"https://login.microsoftonline.com/error?code=70021\"}
155155
DefaultAzureCredential: failed to acquire a token.\nAttempted credentials:\n\tEnvironmentCredential:
156156
incomplete environment variable configuration. Only AZURE_TENANT_ID and AZURE_CLIENT_ID
157157
are set\n\tManagedIdentityCredential: IMDS token request timed out\n\tAzureCLICredential:

articles/application-gateway/ingress-controller-annotations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -477,7 +477,7 @@ Use the following annotation to attach an existing web application firewall (WAF
477477
### Usage
478478

479479
```yaml
480-
appgw.ingress.kubernetes.io/waf-policy-for-path: "/subscriptions/aaaa0000-bb11-2222-33cc-444444dddddd/resourceGroups/SampleRG/providers/Microsoft.Network/applicationGatewayWebApplicationFirewallPolicies/AGICWAFPolcy"
480+
appgw.ingress.kubernetes.io/waf-policy-for-path: "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/SampleRG/providers/Microsoft.Network/applicationGatewayWebApplicationFirewallPolicies/AGICWAFPolcy"
481481
482482
```
483483

articles/application-gateway/ingress-controller-install-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -267,7 +267,7 @@ If you use [Cloud Shell](https://shell.azure.com/), you don't need to install He
267267
268268
- `verbosityLevel`: Sets the verbosity level of the AGIC logging infrastructure. For possible values, see [Logging levels](https://github.com/Azure/application-gateway-kubernetes-ingress/blob/463a87213bbc3106af6fce0f4023477216d2ad78/docs/troubleshooting.md#logging-levels).
269269
- `appgw.environment`: Sets the cloud environment. Possible values: `AZURECHINACLOUD`, `AZUREGERMANCLOUD`, `AZUREPUBLICCLOUD`, `AZUREUSGOVERNMENTCLOUD`.
270-
- `appgw.subscriptionId`: The Azure subscription ID in which Application Gateway resides. Example: `aaaa0000-bb11-2222-33cc-444444dddddd`.
270+
- `appgw.subscriptionId`: The Azure subscription ID in which Application Gateway resides. Example: `aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e`.
271271
- `appgw.resourceGroup`: Name of the Azure resource group in which you created the Application Gateway deployment. Example: `app-gw-resource-group`.
272272
- `appgw.name`: Name of the Application Gateway deployment. Example: `applicationgatewayd0f0`.
273273
- `appgw.shared`: Boolean flag that defaults to `false`. Set it to `true` if you need a [shared Application Gateway deployment](https://github.com/Azure/application-gateway-kubernetes-ingress/blob/072626cb4e37f7b7a1b0c4578c38d1eadc3e8701/docs/setup/install-existing.md#multi-cluster--shared-app-gateway).

articles/application-gateway/migrate-v1-v2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -204,14 +204,14 @@ To run the script:
204204
205205
```azurepowershell
206206
AzureAppGWMigration.ps1 `
207-
-resourceId /subscriptions/aaaa0000-bb11-2222-33cc-444444dddddd/resourceGroups/MyResourceGroup/providers/Microsoft.Network/applicationGateways/myv1appgateway `
207+
-resourceId /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/MyResourceGroup/providers/Microsoft.Network/applicationGateways/myv1appgateway `
208208
-subnetAddressRange 10.0.0.0/24 `
209209
-appgwname "MynewV2gw" `
210210
-AppGWResourceGroupName "MyResourceGroup" `
211211
-sslCertificates $mySslCert1,$mySslCert2 `
212212
-trustedRootCertificates $trustedCert `
213213
-privateIpAddress "10.0.0.1" `
214-
-publicIpResourceId "/subscriptions/aaaa0000-bb11-2222-33cc-444444dddddd/resourceGroups/MyResourceGroup/providers/Microsoft.Network/publicIPAddresses/MyPublicIP" `
214+
-publicIpResourceId "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/MyResourceGroup/providers/Microsoft.Network/publicIPAddresses/MyPublicIP" `
215215
-validateMigration -enableAutoScale
216216
```
217217

articles/azure-cache-for-redis/cache-private-link.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,8 @@ title: Azure Cache for Redis with Azure Private Link
33
description: Learn how to create an Azure Cache, an Azure Virtual Network, and a Private Endpoint using the Azure portal.
44
ms.custom: devx-track-azurecli, devx-track-azurepowershell, ignite-2024
55
ms.topic: conceptual
6-
ms.date: 01/12/2024
6+
ms.date: 11/12/2024
7+
78
---
89

910
# What is Azure Cache for Redis with Azure Private Link?
@@ -346,17 +347,17 @@ az network private-endpoint delete --name MyPrivateEndpoint --resource-group MyR
346347

347348
For **Basic, Standard, and Premium tier** caches, your application should connect to `<cachename>.redis.cache.windows.net` on port `6380`. A private DNS zone, named `*.privatelink.redis.cache.windows.net`, is automatically created in your subscription. The private DNS zone is vital for establishing the TLS connection with the private endpoint. We recommend avoiding the use of `<cachename>.privatelink.redis.cache.windows.net` in configuration or connection string.
348349

349-
For **Enterprise and Enterprise Flash** tier caches, your application should connect to `<cachename>.<region>.redisenterprise.cache.azure.net` on port `10000`.
350+
For **Enterprise and Enterprise Flash** tier caches, your application should connect to `<cachename>.<region>.redisenterprise.cache.azure.net` on port `10000`. If you're using OSS clustering, then your client library also creates connections to your Redis Enterprise instance on ports 8500 - 8599 as your application needs to connect to each shard individually in OSS clustering configuration.
350351

351352
For more information, see [Azure services DNS zone configuration](../private-link/private-endpoint-dns.md).
352353

353354
### Why can't I connect to a private endpoint?
354355

355356
- Private endpoints can't be used with your cache instance if your cache is already a VNet injected cache.
356357

357-
- For Basic, Standard, and Premium tier caches, you are limited to 100 private links.
358+
- For Basic, Standard, and Premium tier caches, you're limited to 100 private links.
358359

359-
- On Premium tier caches using clustering, you are limited to one private link.
360+
- On Premium tier caches using clustering, you're limited to one private link.
360361

361362
- Enterprise and Enterprise Flash tier caches are limited to 84 private links.
362363

@@ -368,7 +369,7 @@ For more information, see [Azure services DNS zone configuration](../private-lin
368369

369370
- Trying to connect from the Azure portal console is an unsupported scenario where you see a connection failure.
370371

371-
- Private links can't be added to caches that are already using [passive geo-replication](cache-how-to-geo-replication.md) in the Premium tier. To add a private link to a geo-replicated cache: 1. Unlink the geo-replication. 2. Add a Private Link. 3. Last, relink the geo-replication. (Enterprise tier caches using [active geo-replication](cache-how-to-active-geo-replication.md) do not have this restriction.)
372+
- Private links can't be added to caches that are already using [passive geo-replication](cache-how-to-geo-replication.md) in the Premium tier. To add a private link to a geo-replicated cache: 1. Unlink the geo-replication. 2. Add a Private Link. 3. Last, relink the geo-replication. (Enterprise tier caches using [active geo-replication](cache-how-to-active-geo-replication.md) don't have this restriction.)
372373

373374
### How do I verify if my private endpoint is configured correctly?
374375

@@ -383,7 +384,7 @@ When set to `Enabled`, this flag is allows both public and private endpoint acce
383384

384385
To change the value in the Azure portal, follow these steps:
385386

386-
1. In the Azure portal, search for **Azure Cache for Redis**. Then, press enter or select it from the search suggestions.
387+
1. In the Azure portal, search for **Azure Cache for Redis**. Then, press enter or select it from the search suggestions.
387388

388389
1. Select the cache instance you want to change the public network access value.
389390

@@ -418,7 +419,7 @@ Once you delete the private endpoints on your cache, your cache instance can bec
418419

419420
### Are network security groups (NSG) enabled for private endpoints?
420421

421-
No, they're disabled for private endpoints. While subnets containing the private endpoint can have NSG associated with it, the rules aren't effective on traffic processed by the private endpoint. You must have [network policies enforcement disabled](../private-link/disable-private-endpoint-network-policy.md) to deploy private endpoints in a subnet. NSG is still enforced on other workloads hosted on the same subnet. Routes on any client subnet will be using an /32 prefix, changing the default routing behavior requires a similar UDR.
422+
No, they're disabled for private endpoints. While subnets containing the private endpoint can have NSG associated with it, the rules aren't effective on traffic processed by the private endpoint. You must have [network policies enforcement disabled](../private-link/disable-private-endpoint-network-policy.md) to deploy private endpoints in a subnet. NSG is still enforced on other workloads hosted on the same subnet. Routes on any client subnet use an /32 prefix, changing the default routing behavior requires a similar UDR.
422423

423424
Control the traffic by using NSG rules for outbound traffic on source clients. Deploy individual routes with /32 prefix to override private endpoint routes. NSG Flow logs and monitoring information for outbound connections are still supported and can be used.
424425

articles/azure-cache-for-redis/includes/redis-access-policy.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,4 @@
11
---
2-
3-
4-
ms.service: cache
52
ms.custom:
63
- ignite-2024
74
ms.date: 08/16/2024

articles/azure-cache-for-redis/includes/redis-cache-passwordless.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,4 @@
11
---
2-
3-
4-
ms.service: cache
52
ms.custom:
63
- ignite-2024
74
ms.date: 08/16/2024

articles/azure-cache-for-redis/includes/redis-cache-service-limits.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,9 @@
11
---
2-
3-
4-
52
ms.topic: include
63
ms.date: 08/16/2024
74

8-
95
---
6+
107
| Resource | Limit |
118
| --- | --- |
129
| Cache size |1.2 TB |

articles/azure-cache-for-redis/managed-redis/managed-redis-administration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: How to administer Azure Managed Redis (preview)
33
description: Learn how to perform administration tasks such as reboot and schedule updates for Azure Managed Redis
44

5-
ms.service: azure
5+
ms.service: azure-managed-redis
66
ms.custom:
77
- ignite-2024
88
ms.topic: conceptual

0 commit comments

Comments
 (0)