Skip to content

Commit 83426d4

Browse files
committed
pre-review fixes
1 parent 3b01cbe commit 83426d4

File tree

3 files changed

+20
-20
lines changed

3 files changed

+20
-20
lines changed

articles/application-gateway/how-to-tcp-tls-proxy.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -34,38 +34,38 @@ To try out the layer 4 features of Azure Application Gateway, this article shows
3434
> [!NOTE]
3535
> When you join the preview, all new Application Gateways provision with the ability to use layer 4 proxy features. If you wish to opt out from the new functionality and return to the current generally available functionality of Application Gateway, you can [unregister from the preview](#unregister-from-the-preview).
3636
37-
For more information about preview features, see [Set up preview features in Azure subscription](../azure-resource-manager/management/preview-features.md)
37+
For more information about preview features, see [Set up preview features in Azure subscription](../azure-resource-manager/management/preview-features.md).
3838

3939
Use the following steps to enroll into the public preview for Application Gateway TCP/TLS proxy using the Azure portal:
4040

4141
1. Sign in to the [Azure portal](https://portal.azure.com/).
4242
2. In the search box, enter _subscriptions_ and select **Subscriptions**.
4343

44-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/search.png" alt-text="A screenshot of Azure portal search.":::
44+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/search.png" alt-text="Screenshot of Azure portal search.":::
4545

4646
3. Select the link for your subscription's name.
4747

48-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/subscriptions.png" alt-text="A screenshot selecting the Azure subscription.":::
48+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/subscriptions.png" alt-text="Screenshot selecting the Azure subscription.":::
4949

5050
4. From the left menu, under **Settings** select **Preview features**.
5151

52-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="A screenshot of the Azure preview features menu.":::
52+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="Screenshot of the Azure preview features menu.":::
5353

5454
5. You see a list of available preview features and your current registration status.
5555

56-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="A screenshot of Azure portal list of preview features listed.":::
56+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="Screenshot of Azure portal list of preview features listed.":::
5757

5858
6. From **Preview features** type into the filter box **AllowApplicationGatewayTlsProxy**, select the feature, and then select **Register**.
5959

60-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/filter.png" alt-text="A screenshot of Azure portal filter preview features.":::
60+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/filter.png" alt-text="Screenshot of Azure portal filter preview features.":::
6161

6262
## Create a SQL server
6363

6464
First, create a SQL Server virtual machine (VM) using the Azure portal.
6565

6666
1. From the Azure portal Home page, search for **SQL Virtual Machines** and then select **SQL virtual machines** under **Services**.
6767

68-
![A screenshot of selecting SQL virtual machines in the Azure portal.](./media/how-to-tcp-tls-proxy/select-sql-virtual-machines.png)
68+
![Screenshot of selecting SQL virtual machines in the Azure portal.](./media/how-to-tcp-tls-proxy/select-sql-virtual-machines.png)
6969

7070
2. Select **Create** and then on the Select SQL deployment option page, choose a **Free SQL Server License** option from the drop-down menu. For example: **SQL Server 2022 Developer on Windows Server 2022**. You can also select a different Free license version to test.
7171

@@ -84,12 +84,12 @@ First, create a SQL Server virtual machine (VM) using the Azure portal.
8484
- **Administrator details**: Enter a username and password.
8585
- **Inbound port rules**: Accept the default settings.
8686

87-
![A screenshot displaying virtual machine settings.](./media/how-to-tcp-tls-proxy/create-a-virtual-machine.png)
87+
![Screenshot displaying virtual machine settings.](./media/how-to-tcp-tls-proxy/create-a-virtual-machine.png)
8888

8989
5. Select **Review + create**, and then select **Create**. Deployment of the virtual machine takes a few minutes.
9090
6. When deployment is complete, select the SQL server resource's overview page and write down the public IP address of the virtual machine.
9191

92-
![A screenshot displaying the public IP address.](./media/how-to-tcp-tls-proxy/public-ip-address.png)
92+
![Screenshot displaying the public IP address.](./media/how-to-tcp-tls-proxy/public-ip-address.png)
9393

9494
## Create an Application Gateway
9595

@@ -109,7 +109,7 @@ First, create a SQL Server virtual machine (VM) using the Azure portal.
109109
> [!NOTE]
110110
> Default address space and subnet settings are adjusted to avoid conflicting with other VNets that you have deployed.
111111
112-
![A screenshot displaying basic Application Gateway settings.](./media/how-to-tcp-tls-proxy/create-an-application-gateway-basics.png)
112+
![Screenshot displaying basic Application Gateway settings.](./media/how-to-tcp-tls-proxy/create-an-application-gateway-basics.png)
113113

114114
The following table provides more information about the settings used in this procedure.
115115

@@ -129,15 +129,15 @@ First, create a SQL Server virtual machine (VM) using the Azure portal.
129129
4. Select **Next: Frontends**.
130130
5. Select a **Frontend IP address type** of **Public** and either use an existing IP address or create a new one.
131131

132-
<br><img src="./media/how-to-tcp-tls-proxy/create-a-public-ip-address.png" alt="A screenshot displaying creation of a new public IP address." width="70%">
132+
<br><img src="./media/how-to-tcp-tls-proxy/create-a-public-ip-address.png" alt="Screenshot displaying creation of a new public IP address." width="70%">
133133

134134
6. Select **Next: Backends**.
135135
7. On the **Backends** tab, select **Add a backend pool**.
136136
8. Enter details under Add a backend pool:
137137
- **Name**: Enter a name for the backend pool, for example **sql-vm**.
138138
- **Target type**: Select **IP address or FQDN** and enter the public IP address of the SQL server virtual machine that you wrote down previously.
139139

140-
<img src="./media/how-to-tcp-tls-proxy/add-backend-pool.png" alt="A screenshot displaying backend pool creation." width="60%">
140+
<img src="./media/how-to-tcp-tls-proxy/add-backend-pool.png" alt="Screenshot displaying backend pool creation." width="60%">
141141

142142
9. Select **Add** and then select **Next: Configuration**.
143143

@@ -149,7 +149,7 @@ First, create a SQL Server virtual machine (VM) using the Azure portal.
149149
- **Protocol**: TCP
150150
- **Port**: 1433
151151

152-
<br><img src="./media/how-to-tcp-tls-proxy/create-routing-rule.png" alt="A screenshot displaying routing rule creation." width="70%">
152+
<br><img src="./media/how-to-tcp-tls-proxy/create-routing-rule.png" alt="Screenshot displaying routing rule creation." width="70%">
153153

154154
11. Select the **Backend targets** tab and enter the following settings:
155155

@@ -161,11 +161,11 @@ First, create a SQL Server virtual machine (VM) using the Azure portal.
161161
- **Backend port**: 1433
162162
- **Time-out (seconds)**: 20
163163

164-
<br><img src="./media/how-to-tcp-tls-proxy/create-backend-settings.png" alt="A screenshot displaying backend settings creation." width="70%">
164+
<br><img src="./media/how-to-tcp-tls-proxy/create-backend-settings.png" alt="Screenshot displaying backend settings creation." width="70%">
165165

166166
12. Select **Add** to add the backend settings, and then select **Add** to add the routing rule.
167167

168-
<br><img src="./media/how-to-tcp-tls-proxy/add-routing-rule.png" alt="A screenshot adding a routing rule." width="70%">
168+
<br><img src="./media/how-to-tcp-tls-proxy/add-routing-rule.png" alt="Screenshot adding a routing rule." width="70%">
169169

170170
13. Select **Next: Tags** and add tags if desired. No tags are required for this demonstration.
171171
14. Select Next: **Review + Create** and then select **Create**. The deployment process takes a few minutes.
@@ -179,7 +179,7 @@ First, create a SQL Server virtual machine (VM) using the Azure portal.
179179

180180
2. On a client device with [SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms) installed, connect to the public IP address of the Azure virtual machine.
181181

182-
<br><img src="./media/how-to-tcp-tls-proxy/sql-connect.png" alt="A screenshot displaying the connection to a SQL server." width="60%">
182+
<br><img src="./media/how-to-tcp-tls-proxy/sql-connect.png" alt="Screenshot displaying the connection to a SQL server." width="60%">
183183

184184
## Clean up resources
185185

articles/application-gateway/monitor-application-gateway-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ Application Gateway’s Layer 4 proxy provides log data through access logs. The
126126

127127
Application Gateway’s layer 4 proxy provides the capability to monitor the health of individual members of the backend pools through the portal and REST API.
128128

129-
![View of backend health](./media/monitor-application-gateway-reference/backend-health.png)
129+
![Screenshot of backend health](./media/monitor-application-gateway-reference/backend-health.png)
130130

131131
### REST API
132132

@@ -194,7 +194,7 @@ For reference, see a list of [all resource logs category types supported in Azur
194194
> [!NOTE]
195195
> The Performance log is available only for the v1 SKU. For the v2 SKU, use [Application Gateway v2 metrics](#application-gateway-v2-metrics) for performance data.
196196
197-
For more information, see [Backend health and diagnostic logs for Application Gateway](application-gateway-diagnostics.md#access-log)
197+
For more information, see [Backend health and diagnostic logs for Application Gateway](application-gateway-diagnostics.md#access-log).
198198

199199
<!-- OPTION 2 - Link to the resource logs as above, but work in extra information not found in the automated metric-supported reference article. NOTE: YOU MUST MANUALLY MAINTAIN THIS SECTION to make sure it stays in sync with the resource-log-categories link. You can group these sections however you want provided you include the proper links back to resource-log-categories article.
200200
-->

articles/application-gateway/multiple-site-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,9 +50,9 @@ Using a wildcard character in the host name, you can match multiple host names i
5050
>[!NOTE]
5151
> This feature is available only for Standard_v2 and WAF_v2 SKU of Application Gateway.
5252
53-
In [Azure PowerShell](tutorial-multiple-sites-powershell.md), you must use `-HostNames` instead of `-HostName`. With HostNames, you can mention up to 5 host names as comma-separated values and use wildcard characters. For example, `-HostNames "*.contoso.com","*.fabrikam.com"`
53+
In [Azure PowerShell](tutorial-multiple-sites-powershell.md), you must use `-HostNames` instead of `-HostName`. With HostNames, you can mention up to 5 host names as comma-separated values and use wildcard characters. For example, `-HostNames "*.contoso.com","*.fabrikam.com"`.
5454

55-
In [Azure CLI](tutorial-multiple-sites-cli.md), you must use `--host-names` instead of `--host-name`. With host-names, you can mention up to 5 host names as comma-separated values and use wildcard characters. For example, `--host-names "*.contoso.com,*.fabrikam.com"`
55+
In [Azure CLI](tutorial-multiple-sites-cli.md), you must use `--host-names` instead of `--host-name`. With host-names, you can mention up to 5 host names as comma-separated values and use wildcard characters. For example, `--host-names "*.contoso.com,*.fabrikam.com"`.
5656

5757
In the Azure portal, under the multi-site listener, you must choose the **Multiple/Wildcard** host type to mention up to five host names with allowed wildcard characters.
5858

0 commit comments

Comments
 (0)