Skip to content

Commit 98e89eb

Browse files
authored
Merge pull request #197349 from MicrosoftDocs/main
Merge Main to Live, 4 AM
2 parents 86ef3e3 + 4955a44 commit 98e89eb

File tree

101 files changed

+1052
-737
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

101 files changed

+1052
-737
lines changed

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 80 additions & 44 deletions
Large diffs are not rendered by default.
332 KB
Loading
Loading
Loading

articles/app-service/app-service-key-vault-references.md

Lines changed: 25 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,21 @@ If your vault is configured with [network restrictions](../key-vault/general/ove
3232

3333
1. Make sure the application has outbound networking capabilities configured, as described in [App Service networking features](./networking-features.md) and [Azure Functions networking options](../azure-functions/functions-networking-options.md).
3434

35-
Linux applications attempting to use private endpoints additionally require that the app be explicitly configured to have all traffic route through the virtual network. This requirement will be removed in a forthcoming update. To set this, use the following CLI command:
35+
Linux applications attempting to use private endpoints additionally require that the app be explicitly configured to have all traffic route through the virtual network. This requirement will be removed in a forthcoming update. To set this, use the following Azure CLI or Azure PowerShell command:
36+
37+
# [Azure CLI](#tab/azure-cli)
3638

3739
```azurecli
38-
az webapp config set --subscription <sub> -g <rg> -n <appname> --generic-configurations '{"vnetRouteAllEnabled": true}'
40+
az webapp config set --subscription <sub> -g MyResourceGroupName -n MyAppName --generic-configurations '{"vnetRouteAllEnabled": true}'
41+
```
42+
43+
# [Azure PowerShell](#tab/azure-powershell)
44+
45+
```azurepowershell
46+
Update-AzFunctionAppSetting -Name MyAppName -ResourceGroupName MyResourceGroupName -AppSetting @{vnetRouteAllEnabled = $true}
3947
```
48+
49+
---
4050
4151
2. Make sure that the vault's configuration accounts for the network or subnet through which your app will access it.
4252
@@ -53,11 +63,24 @@ Once you have granted permissions to the user-assigned identity, follow these st
5363
5464
1. Configure the app to use this identity for Key Vault reference operations by setting the `keyVaultReferenceIdentity` property to the resource ID of the user-assigned identity.
5565
66+
# [Azure CLI](#tab/azure-cli)
67+
5668
```azurecli-interactive
5769
userAssignedIdentityResourceId=$(az identity show -g MyResourceGroupName -n MyUserAssignedIdentityName --query id -o tsv)
5870
appResourceId=$(az webapp show -g MyResourceGroupName -n MyAppName --query id -o tsv)
5971
az rest --method PATCH --uri "${appResourceId}?api-version=2021-01-01" --body "{'properties':{'keyVaultReferenceIdentity':'${userAssignedIdentityResourceId}'}}"
6072
```
73+
# [Azure PowerShell](#tab/azure-powershell)
74+
75+
```azurepowershell-interactive
76+
$userAssignedIdentityResourceId = Get-AzUserAssignedIdentity -ResourceGroupName MyResourceGroupName -Name MyUserAssignedIdentityName | Select-Object -ExpandProperty Id
77+
$appResourceId = Get-AzFunctionApp -ResourceGroupName MyResourceGroupName -Name MyAppName | Select-Object -ExpandProperty Id
78+
79+
$Path = "{0}?api-version=2021-01-01" -f $appResourceId
80+
Invoke-AzRestMethod -Method PATCH -Path $Path -Payload "{'properties':{'keyVaultReferenceIdentity':'$userAssignedIdentityResourceId'}}"
81+
```
82+
83+
---
6184
6285
This configuration will apply to all references for the app.
6386

articles/app-service/configure-connect-to-azure-storage.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -157,6 +157,16 @@ The following features are supported for Linux containers:
157157
1. From the left navigation, click **Configuration** > **Path Mappings** > **New Azure Storage Mount**.
158158
1. Configure the storage mount according to the following table. When finished, click **OK**.
159159

160+
::: zone pivot="code-windows"
161+
| Setting | Description |
162+
|-|-|
163+
| **Name** | Name of the mount configuration. Spaces are not allowed. |
164+
| **Configuration options** | Select **Basic** if the storage account is not using [private endpoints](../storage/common/storage-private-endpoints.md). Otherwise, select **Advanced**. |
165+
| **Storage accounts** | Azure Storage account. It must contain an Azure Files share. |
166+
| **Share name** | Files share to mount. |
167+
| **Access key** (Advanced only) | [Access key](../storage/common/storage-account-keys-manage.md) for your storage account. |
168+
| **Mount path** | Directory inside your file/blob storage that you want to mount. Only `/mounts/pathname` is supported.|
169+
::: zone-end
160170
::: zone pivot="container-windows"
161171
| Setting | Description |
162172
|-|-|

articles/automation/update-management/query-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ A record with a type of `UpdateRunProgress` is created that provides update depl
107107
| CorrelationId | Unique identifier of the runbook job run for the update. |
108108
| EndTime | The time when the synchronization process ended. *This property is currently not used. See TimeGenerated.* |
109109
| ErrorResult | Windows Update error code generated if an update fails to install. |
110-
| InstallationStatus | The possible installation states of an update on the client computer,<br> `NotStarted` - job not triggered yet.<br> `Failed` - job started but failed with an exception.<br> `InProgress` - job in progress.<br> `MaintenanceWindowExceeded` - if execution was remaining but maintenance window interval reached.<br> `Succeeded` - job succeeded.<br> `InstallFailed` - update failed to install successfully.<br> `NotIncluded`<br> `Excluded` |
110+
| InstallationStatus | The possible installation states of an update on the client computer,<br> `NotStarted` - job not triggered yet.<br> `Failed` - job started but failed with an exception.<br> `InProgress` - job in progress.<br> `MaintenanceWindowExceeded` - if execution was remaining but maintenance window interval reached.<br> `Succeeded` - job succeeded.<br> `InstallFailed` - update failed to install successfully.<br> `NotIncluded` - the corresponding update's classification doesn't match with customer's entries in input classification list.<br> `Excluded` - user enters a KBID in excluded list. While patching, if KBID in excluded list matches with the system detected update KB ID, it is marked as excluded. |
111111
| KBID | Knowledge base article ID for the Windows update. |
112112
| ManagementGroupName | Name of the Operations Manager management group or Log Analytics workspace. |
113113
| OSType | Type of operating system. Values are Windows or Linux. |

articles/azure-arc/data/release-notes.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,8 @@ Add support for specifying labels and annotations on the secondary service endpo
5656
- If three replicas, then `REQUIRED_SECONDARIES_TO_COMMIT = 1`.
5757
- If one or two replicas, then `REQUIRED_SECONDARIES_TO_COMMIT = 0`.
5858

59+
In this release, the default value of the readable secondary service is `Cluster IP`. The secondary service type can be set in the Kubernetes yaml/json at `spec.services.readableSecondaries.type`. In the next release, the default value will be the same as the primary service type.
60+
5961
### User experience improvements
6062

6163
Notifications added in Azure Portal if billing data has not been uploaded to Azure recently.

articles/azure-arc/kubernetes/quickstart-connect-cluster.md

Lines changed: 16 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -255,24 +255,6 @@ eastus AzureArcTest1 microsoft.kubernetes/connectedclusters
255255

256256
---
257257

258-
## Connect a cluster with custom certificate
259-
260-
If you need the outbound communication from Arc agents to authenticate via a certificate, pass the certificate during onboarding. In case you need to pass multiple certificates, combine them into a single certificate chain and pass it through.
261-
262-
### [Azure CLI](#tab/azure-cli)
263-
264-
Run the connect command with parameters specified:
265-
266-
```azurecli
267-
az connectedk8s connect --name <cluster-name> --resource-group <resource-group> --proxy-cert <path-to-cert-file>
268-
```
269-
270-
### [Azure PowerShell](#tab/azure-powershell)
271-
272-
This scenario is not supported via the powershell cmdlet.
273-
274-
---
275-
276258
## Connect using an outbound proxy server
277259

278260
If your cluster is behind an outbound proxy server, requests must be routed via the outbound proxy server.
@@ -317,6 +299,22 @@ If your cluster is behind an outbound proxy server, requests must be routed via
317299

318300
---
319301

302+
For outbound proxy servers where only a trusted certificate needs to be provided without the proxy server endpoint inputs, `az connectedk8s connect` can be run with just the `--proxy-cert` input specified. In case multiple trusted certificates are expected, the combined certificate chain can be provided in a single file using the `--proxy-cert` parameter.
303+
304+
### [Azure CLI](#tab/azure-cli)
305+
306+
Run the connect command with the `--proxy-cert` parameter specified:
307+
308+
```azurecli
309+
az connectedk8s connect --name <cluster-name> --resource-group <resource-group> --proxy-cert <path-to-cert-file>
310+
```
311+
312+
### [Azure PowerShell](#tab/azure-powershell)
313+
314+
The ability to pass in the proxy certificate only without the proxy server endpoint details is not yet supported via PowerShell.
315+
316+
---
317+
320318
## Verify cluster connection
321319

322320
Run the following command:

articles/azure-functions/functions-networking-options.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -211,12 +211,26 @@ When you run a Premium plan, you can connect non-HTTP trigger functions to servi
211211

212212
:::image type="content" source="media/functions-networking-options/virtual-network-trigger-toggle.png" alt-text="VNETToggle":::
213213

214+
### [Azure CLI](#tab/azure-cli)
215+
214216
You can also enable virtual network triggers by using the following Azure CLI command:
215217

216218
```azurecli-interactive
217219
az resource update -g <resource_group> -n <function_app_name>/config/web --set properties.functionsRuntimeScaleMonitoringEnabled=1 --resource-type Microsoft.Web/sites
218220
```
219221

222+
### [Azure PowerShell](#tab/azure-powershell)
223+
224+
You can also enable virtual network triggers by using the following Azure PowerShell command:
225+
226+
```azurepowershell-interactive
227+
$Resource = Get-AzResource -ResourceGroupName <resource_group> -ResourceName <function_app_name>/config/web -ResourceType Microsoft.Web/sites
228+
$Resource.Properties.functionsRuntimeScaleMonitoringEnabled = $true
229+
$Resource | Set-AzResource -Force
230+
```
231+
232+
---
233+
220234
> [!TIP]
221235
> Enabling virtual network triggers may have an impact on the performance of your application since your App Service plan instances will need to monitor your triggers to determine when to scale. This impact is likely to be very small.
222236

0 commit comments

Comments
 (0)