Skip to content

Commit 9bd3416

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 7b23eeb + 6ed3928 commit 9bd3416

File tree

77 files changed

+1816
-617
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

77 files changed

+1816
-617
lines changed

CODEOWNERS

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,10 @@ articles/governance/ @DCtheGeek
5454
articles/**/*security-baseline.md @msmbaldwin @mgblythe
5555
articles/security/benchmarks/ @msmbaldwin @mgblythe
5656

57+
# Azure Security Center
58+
articles/security-center/ @memildin
59+
includes/*security-controls*.md @memildin
60+
5761
# DDOS Protection
5862

5963
articles/ddos-protection @aletheatoh @anupamvi

articles/active-directory/fundamentals/service-accounts-introduction-azure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ There are three types of service accounts native to Azure Active Directory: Mana
2121

2222
## Types of Azure Active Directory service accounts
2323

24-
For services hosted in Azure, we recommend using a managed identity if possible, and a service principal if not. Managed identities can’t be used for services hosted outside of Azure. In that case, we recommend a service principal. If you can use a managed identity or a service principal, do so. We recommend that you not use an Azure Active Directory user account as a service principal. See the following table for a summary.
24+
For services hosted in Azure, we recommend using a managed identity if possible, and a service principal if not. Managed identities can’t be used for services hosted outside of Azure. In that case, we recommend a service principal. If you can use a managed identity or a service principal, do so. We recommend that you not use an Azure Active Directory user account as a service account. See the following table for a summary.
2525

2626

2727
| Service hosting| Managed identity| Service principal| Azure user account |
@@ -49,7 +49,7 @@ A service principal is the local representation of an application object in a si
4949

5050
There are two mechanisms for authentication using service principals—client certificates and client secrets. Certificates are more secure: use client certificates if possible. Unlike client secrets, client certificates cannot accidentally be embedded in code.
5151

52-
For information on securing service principals, see Securing service principals.
52+
For information on securing service principals, see [Securing service principals](service-accounts-principal.md).
5353

5454

5555
## Next steps
@@ -61,4 +61,4 @@ For more information on securing Azure service accounts, see:
6161

6262
[Securing service principals](service-accounts-principal.md)
6363

64-
[Governing Azure service accounts](service-accounts-governing-azure.md)
64+
[Governing Azure service accounts](service-accounts-governing-azure.md)

articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-nonaad.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: tutorial
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 12/10/2020
16+
ms.date: 12/16/2020
1717
ms.author: barclayn
1818
ms.collection: M365-identity-device-management
1919
#Customer intent: As a developer or administrator I want to configure a Linux virtual machine to retrieve a secret from key vault using a managed identity and have a simple way to validate my configuration before using it for development
@@ -91,7 +91,15 @@ The managed identity used by the virtual machine needs to be granted access to r
9191
## Access data
9292

9393
To complete these steps, you need an SSH client.  If you are using Windows, you can use the SSH client in the [Windows Subsystem for Linux](/windows/wsl/about). If you need assistance configuring your SSH client's keys, see [How to Use SSH keys with Windows on Azure](../../virtual-machines/linux/ssh-from-windows.md), or [How to create and use an SSH public and private key pair for Linux VMs in Azure](../../virtual-machines/linux/mac-create-ssh-keys.md).
94-
 
94+
95+
>[!IMPORTANT]
96+
> All Azure SDKs support the Azure.Identity library that makes it easy to acquire Azure AD tokens to access target services. Learn more about [Azure SDKs](https://azure.microsoft.com/downloads/) and leverage the Azure.Identity library.
97+
> - [.NET](https://docs.microsoft.com/dotnet/api/overview/azure/identity-readme?view=azure-dotnet)
98+
> - [JAVA](https://docs.microsoft.com/java/api/overview/azure/identity-readme?view=azure-java-stable)
99+
> - [Javascript](https://docs.microsoft.com/javascript/api/overview/azure/identity-readme?view=azure-node-latest)
100+
> - [Python](https://docs.microsoft.com/python/api/overview/azure/identity-readme?view=azure-python)
101+
102+
95103
1. In the portal, navigate to your Linux VM and in the **Overview**, click **Connect**
96104
2. **Connect** to the VM with the SSH client of your choice. 
97105
3. In the terminal window, using CURL, make a request to the local managed identities for Azure resources endpoint to get an access token for Azure Key Vault.  

articles/aks/aks-migration.md

Lines changed: 61 additions & 47 deletions
Large diffs are not rendered by default.

articles/aks/concepts-diagnostics.md

Lines changed: 26 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -4,29 +4,41 @@ description: Learn about self-diagnosing clusters in Azure Kubernetes Service.
44
services: container-service
55
author: yunjchoi
66
ms.topic: conceptual
7-
ms.date: 11/04/2019
7+
ms.date: 03/29/2021
88
ms.author: yunjchoi
99
---
1010

1111
# Azure Kubernetes Service Diagnostics (preview) overview
1212

13-
Troubleshooting Azure Kubernetes Service (AKS) cluster issues is an important part of maintaining your cluster, especially if your cluster is running mission-critical workloads. AKS Diagnostics is an intelligent, self-diagnostic experience that helps you identify and resolve problems in your cluster. AKS Diagnostics is cloud-native, and you can use it with no extra configuration or billing cost.
13+
Troubleshooting Azure Kubernetes Service (AKS) cluster issues plays an important role in maintaining your cluster, especially if your cluster is running mission-critical workloads. AKS Diagnostics is an intelligent, self-diagnostic experience that:
14+
* Helps you identify and resolve problems in your cluster.
15+
* Is cloud-native.
16+
* Requires no extra configuration or billing cost.
1417

15-
This feature is now in public preview.
18+
This feature is now in public preview.
1619

1720
## Open AKS Diagnostics
1821

1922
To access AKS Diagnostics:
2023

21-
- Navigate to your Kubernetes cluster in the [Azure portal](https://portal.azure.com).
22-
- Click on **Diagnose and solve problems** in the left navigation, which opens AKS Diagnostics.
23-
- Choose a category that best describes the issue of your cluster by using the keywords in the homepage tile, or type a keyword that best describes your issue in the search bar, for example _Cluster Node Issues_.
24+
1. Navigate to your Kubernetes cluster in the [Azure portal](https://portal.azure.com).
25+
1. Click on **Diagnose and solve problems** in the left navigation, which opens AKS Diagnostics.
26+
1. Choose a category that best describes the issue of your cluster, like _Cluster Node Issues_, by:
27+
* Using the keywords in the homepage tile.
28+
* Typing a keyword that best describes your issue in the search bar.
2429

2530
![Homepage](./media/concepts-diagnostics/aks-diagnostics-homepage.png)
2631

2732
## View a diagnostic report
2833

29-
After you click on a category, you can view a diagnostic report specific to your cluster. Diagnostic report intelligently calls out if there is any issue in your cluster with status icons. You can drill down on each topic by clicking on **More Info** to see detailed description of the issue, recommended actions, links to helpful docs, related-metrics, and logging data. Diagnostic reports are intelligently generated based on the current state of your cluster after running a variety of checks. Diagnostic reports can be a useful tool for pinpointing the problem of your cluster and finding the next steps to resolve the issue.
34+
After you click on a category, you can view a diagnostic report specific to your cluster. Diagnostic reports intelligently call out any issues in your cluster with status icons. You can drill down on each topic by clicking **More Info** to see a detailed description of:
35+
* Issues
36+
* Recommended actions
37+
* Links to helpful docs
38+
* Related-metrics
39+
* Logging data
40+
41+
Diagnostic reports generate based on the current state of your cluster after running various checks. They can be useful for pinpointing the problem of your cluster and understanding next steps to resolve the issue.
3042

3143
![Diagnostic Report](./media/concepts-diagnostics/diagnostic-report.png)
3244

@@ -38,7 +50,7 @@ The following diagnostic checks are available in **Cluster Insights**.
3850

3951
### Cluster Node Issues
4052

41-
Cluster Node Issues checks for node-related issues that may cause your cluster to behave unexpectedly.
53+
Cluster Node Issues checks for node-related issues that cause your cluster to behave unexpectedly.
4254

4355
- Node readiness issues
4456
- Node failures
@@ -50,9 +62,9 @@ Cluster Node Issues checks for node-related issues that may cause your cluster t
5062
- Node authentication failure
5163
- Node kube-proxy stale
5264

53-
### Create, read, update & delete operations
65+
### Create, read, update & delete (CRUD) operations
5466

55-
CRUD Operations checks for any CRUD operations that may cause issues in your cluster.
67+
CRUD Operations checks for any CRUD operations that cause issues in your cluster.
5668

5769
- In-use subnet delete operation error
5870
- Network security group delete operation error
@@ -68,16 +80,16 @@ CRUD Operations checks for any CRUD operations that may cause issues in your clu
6880

6981
### Identity and security management
7082

71-
Identity and Security Management detects authentication and authorization errors that may prevent communication to your cluster.
83+
Identity and Security Management detects authentication and authorization errors that prevent communication to your cluster.
7284

7385
- Node authorization failures
7486
- 401 errors
7587
- 403 errors
7688

7789
## Next steps
7890

79-
Collect logs to help you further troubleshoot your cluster issues by using [AKS Periscope](https://aka.ms/aksperiscope).
91+
* Collect logs to help you further troubleshoot your cluster issues by using [AKS Periscope](https://aka.ms/aksperiscope).
8092

81-
Read the [triage practices section](/azure/architecture/operator-guides/aks/aks-triage-practices) of the AKS day-2 operations guide.
93+
* Read the [triage practices section](/azure/architecture/operator-guides/aks/aks-triage-practices) of the AKS day-2 operations guide.
8294

83-
Post your questions or feedback at [UserVoice](https://feedback.azure.com/forums/914020-azure-kubernetes-service-aks) by adding "[Diag]" in the title.
95+
* Post your questions or feedback at [UserVoice](https://feedback.azure.com/forums/914020-azure-kubernetes-service-aks) by adding "[Diag]" in the title.

0 commit comments

Comments
 (0)