Skip to content

Commit 96cc441

Browse files
authored
Revert "Adding Extension host"
1 parent 87a97a2 commit 96cc441

13 files changed

+6
-442
lines changed

articles/azure-stack/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,8 +53,6 @@
5353
items:
5454
- name: Publish endpoints
5555
href: azure-stack-integrate-endpoints.md
56-
- name: Extension host
57-
href: azure-stack-extension-host-prepare.md
5856
- name: Identity integration
5957
items:
6058
- name: Choose an identity provider

articles/azure-stack/azure-stack-extension-host-prepare.md

Lines changed: 0 additions & 163 deletions
This file was deleted.

articles/azure-stack/azure-stack-get-pki-certs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: na
1313
pms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 08/29/2018
16+
ms.date: 05/18/2018
1717
ms.author: mabrigg
1818
ms.reviewer: ppacent
1919
---
@@ -116,7 +116,7 @@ Use these steps to prepare and validate the Azure Stack PKI certificates:
116116
117117
CSR generating for following SAN(s): dns=*.east.azurestack.contoso.com&dns=*.blob.east.azurestack.contoso.com&dns=*.queue.east.azurestack.contoso.com&dns=*.table.east.azurestack.cont
118118
oso.com&dns=*.vault.east.azurestack.contoso.com&dns=*.adminvault.east.azurestack.contoso.com&dns=portal.east.azurestack.contoso.com&dns=adminportal.east.azurestack.contoso.com&dns=ma
119-
nagement.east.azurestack.contoso.com&dns=adminmanagement.east.azurestack.contoso.com*dn2=*.adminhosting.east.azurestack.contoso.com@dns=*.hosting.east.azurestack.contoso.com
119+
nagement.east.azurestack.contoso.com&dns=adminmanagement.east.azurestack.contoso.com
120120
Present this CSR to your Certificate Authority for Certificate Generation: C:\Users\username\Documents\AzureStackCSR\wildcard_east_azurestack_contoso_com_CertRequest_20180405233530.req
121121
Certreq.exe output: CertReq: Request Created
122122

articles/azure-stack/azure-stack-integrate-endpoints.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,14 @@ author: jeffgilb
66
manager: femila
77
ms.service: azure-stack
88
ms.topic: article
9-
ms.date: 08/29/2018
9+
ms.date: 08/02/2018
1010

1111
ms.author: jeffgilb
1212
ms.reviewer: wamota
1313
keywords:
1414
---
1515

1616
# Azure Stack datacenter integration - Publish endpoints
17-
1817
Azure Stack sets up virtual IP addresses (VIPs) for its infrastructure roles. These VIPs are allocated from the public IP address pool. Each VIP is secured with an access control list (ACL) in the software-defined network layer. ACLs are also used across the physical switches (TORs and BMC) to further harden the solution. A DNS entry is created for each endpoint in the external DNS zone that specified at deployment time.
1918

2019

@@ -36,14 +35,12 @@ Internal infrastructure VIPs aren't listed because they’re not required for pu
3635
|---------|---------|---------|---------|
3736
|AD FS|Adfs.*<region>.<fqdn>*|HTTPS|443|
3837
|Portal (administrator)|Adminportal.*&lt;region>.&lt;fqdn>*|HTTPS|443<br>12495<br>12499<br>12646<br>12647<br>12648<br>12649<br>12650<br>13001<br>13003<br>13010<br>13011<br>13012<br>13020<br>13021<br>13026<br>30015|
39-
|Adminhosting | *.adminhosting.\<region>.\<fqdn> | HTTPS | 443 |
4038
|Azure Resource Manager (administrator)|Adminmanagement.*&lt;region>.&lt;fqdn>*|HTTPS|443<br>30024|
4139
|Portal (user)|Portal.*&lt;region>.&lt;fqdn>*|HTTPS|443<br>12495<br>12649<br>13001<br>13010<br>13011<br>13012<br>13020<br>13021<br>30015<br>13003|
4240
|Azure Resource Manager (user)|Management.*&lt;region>.&lt;fqdn>*|HTTPS|443<br>30024|
4341
|Graph|Graph.*&lt;region>.&lt;fqdn>*|HTTPS|443|
4442
|Certificate revocation list|Crl.*&lt;region>.&lt;fqdn>*|HTTP|80|
4543
|DNS|&#42;.*&lt;region>.&lt;fqdn>*|TCP & UDP|53|
46-
|Hosting | *.hosting.\<region>.\<fqdn> | HTTPS | 443 |
4744
|Key Vault (user)|&#42;.vault.*&lt;region>.&lt;fqdn>*|HTTPS|443|
4845
|Key Vault (administrator)|&#42;.adminvault.*&lt;region>.&lt;fqdn>*|HTTPS|443|
4946
|Storage Queue|&#42;.queue.*&lt;region>.&lt;fqdn>*|HTTP<br>HTTPS|80<br>443|

articles/azure-stack/azure-stack-pki-certs.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: na
1313
pms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 08/29/2018
16+
ms.date: 06/07/2018
1717
ms.author: mabrigg
1818
ms.reviewer: ppacent
1919

@@ -73,8 +73,6 @@ For your deployment, the [region] and [externalfqdn] values must match the regio
7373
| ACSQueue | *.queue.&lt;region>.&lt;fqdn><br>(Wildcard SSL Certificate) | Queue Storage | queue.&lt;region>.&lt;fqdn> |
7474
| KeyVault | *.vault.&lt;region>.&lt;fqdn><br>(Wildcard SSL Certificate) | Key Vault | vault.&lt;region>.&lt;fqdn> |
7575
| KeyVaultInternal | *.adminvault.&lt;region>.&lt;fqdn><br>(Wildcard SSL Certificate) | Internal Keyvault | adminvault.&lt;region>.&lt;fqdn> |
76-
| Admin Extension Host | *.adminhosting.\<region>.\<fqdn> (Wildcard SSL Certificates) | Admin Extension Host | adminhosting.\<region>.\<fqdn> |
77-
| Public Extension Host | *.hosting.\<region>.\<fqdn> (Wildcard SSL Certificates) | Public Extension Host | hosting.\<region>.\<fqdn> |
7876

7977
If you deploy Azure Stack using the Azure AD deployment mode, you only need to request the certificates listed in previous table. However, if you deploy Azure Stack using the AD FS deployment mode, you must also request the certificates described in the following table:
8078

articles/azure-stack/azure-stack-validate-pki-certs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: na
1212
pms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 08/29/2018
15+
ms.date: 05/24/2018
1616
ms.author: mabrigg
1717
ms.reviewer: ppacent
1818
---
@@ -71,7 +71,7 @@ Use these steps to prepare and to validate the Azure Stack PKI certificates for
7171
````PowerShell
7272
New-Item C:\Certificates -ItemType Directory
7373
74-
$directories = 'ACSBlob','ACSQueue','ACSTable','ADFS','Admin Portal','ARM Admin','ARM Public','Graph','KeyVault','KeyVaultInternal','Public Portal','Admin Extension Host','Public Extension Host'
74+
$directories = 'ACSBlob','ACSQueue','ACSTable','ADFS','Admin Portal','ARM Admin','ARM Public','Graph','KeyVault','KeyVaultInternal','Public Portal'
7575
7676
$destination = 'c:\certificates'
7777

articles/azure-stack/user/TOC.yml

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -97,13 +97,6 @@
9797
href: azure-stack-kv-push-secret-into-vm.md
9898
- name: KeyVault sample app
9999
href: azure-stack-kv-sample-app.md
100-
- name: Azure Stack Monitor
101-
href: azure-stack-metrics-azure-data.md
102-
items:
103-
- name: Supported metrics
104-
href: azure-stack-metrics-supported.md
105-
- name: Consume Azure monitoring data
106-
href: azure-stack-metrics-monitor.md
107100
- name: Solution templates
108101
items:
109102
- name: Deploy a Service Fabric cluster

0 commit comments

Comments
 (0)