You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/service-accounts-introduction-azure.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ There are three types of service accounts native to Azure Active Directory: Mana
21
21
22
22
## Types of Azure Active Directory service accounts
23
23
24
-
For services hosted in Azure, we recommend using a managed identity if possible, and a service principal if not. Managed identities can’t be used for services hosted outside of Azure. In that case, we recommend a service principal. If you can use a managed identity or a service principal, do so. We recommend that you not use an Azure Active Directory user account as a service principal. See the following table for a summary.
24
+
For services hosted in Azure, we recommend using a managed identity if possible, and a service principal if not. Managed identities can’t be used for services hosted outside of Azure. In that case, we recommend a service principal. If you can use a managed identity or a service principal, do so. We recommend that you not use an Azure Active Directory user account as a service account. See the following table for a summary.
25
25
26
26
27
27
| Service hosting| Managed identity| Service principal| Azure user account |
@@ -49,7 +49,7 @@ A service principal is the local representation of an application object in a si
49
49
50
50
There are two mechanisms for authentication using service principals—client certificates and client secrets. Certificates are more secure: use client certificates if possible. Unlike client secrets, client certificates cannot accidentally be embedded in code.
51
51
52
-
For information on securing service principals, see Securing service principals.
52
+
For information on securing service principals, see [Securing service principals](service-accounts-principal.md).
53
53
54
54
55
55
## Next steps
@@ -61,4 +61,4 @@ For more information on securing Azure service accounts, see:
61
61
62
62
[Securing service principals](service-accounts-principal.md)
63
63
64
-
[Governing Azure service accounts](service-accounts-governing-azure.md)
64
+
[Governing Azure service accounts](service-accounts-governing-azure.md)
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-nonaad.md
+10-2Lines changed: 10 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.devlang: na
13
13
ms.topic: tutorial
14
14
ms.tgt_pltfrm: na
15
15
ms.workload: identity
16
-
ms.date: 12/10/2020
16
+
ms.date: 12/16/2020
17
17
ms.author: barclayn
18
18
ms.collection: M365-identity-device-management
19
19
#Customer intent: As a developer or administrator I want to configure a Linux virtual machine to retrieve a secret from key vault using a managed identity and have a simple way to validate my configuration before using it for development
@@ -91,7 +91,15 @@ The managed identity used by the virtual machine needs to be granted access to r
91
91
## Access data
92
92
93
93
To complete these steps, you need an SSH client. If you are using Windows, you can use the SSH client in the [Windows Subsystem for Linux](/windows/wsl/about). If you need assistance configuring your SSH client's keys, see [How to Use SSH keys with Windows on Azure](../../virtual-machines/linux/ssh-from-windows.md), or [How to create and use an SSH public and private key pair for Linux VMs in Azure](../../virtual-machines/linux/mac-create-ssh-keys.md).
94
-
94
+
95
+
>[!IMPORTANT]
96
+
> All Azure SDKs support the Azure.Identity library that makes it easy to acquire Azure AD tokens to access target services. Learn more about [Azure SDKs](https://azure.microsoft.com/downloads/) and leverage the Azure.Identity library.
1. In the portal, navigate to your Linux VM and in the **Overview**, click **Connect**.
96
104
2.**Connect** to the VM with the SSH client of your choice.
97
105
3. In the terminal window, using CURL, make a request to the local managed identities for Azure resources endpoint to get an access token for Azure Key Vault.
Copy file name to clipboardExpand all lines: articles/aks/concepts-diagnostics.md
+26-14Lines changed: 26 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,29 +4,41 @@ description: Learn about self-diagnosing clusters in Azure Kubernetes Service.
4
4
services: container-service
5
5
author: yunjchoi
6
6
ms.topic: conceptual
7
-
ms.date: 11/04/2019
7
+
ms.date: 03/29/2021
8
8
ms.author: yunjchoi
9
9
---
10
10
11
11
# Azure Kubernetes Service Diagnostics (preview) overview
12
12
13
-
Troubleshooting Azure Kubernetes Service (AKS) cluster issues is an important part of maintaining your cluster, especially if your cluster is running mission-critical workloads. AKS Diagnostics is an intelligent, self-diagnostic experience that helps you identify and resolve problems in your cluster. AKS Diagnostics is cloud-native, and you can use it with no extra configuration or billing cost.
13
+
Troubleshooting Azure Kubernetes Service (AKS) cluster issues plays an important role in maintaining your cluster, especially if your cluster is running mission-critical workloads. AKS Diagnostics is an intelligent, self-diagnostic experience that:
14
+
* Helps you identify and resolve problems in your cluster.
15
+
* Is cloud-native.
16
+
* Requires no extra configuration or billing cost.
14
17
15
-
This feature is now in public preview.
18
+
This feature is now in public preview.
16
19
17
20
## Open AKS Diagnostics
18
21
19
22
To access AKS Diagnostics:
20
23
21
-
- Navigate to your Kubernetes cluster in the [Azure portal](https://portal.azure.com).
22
-
- Click on **Diagnose and solve problems** in the left navigation, which opens AKS Diagnostics.
23
-
- Choose a category that best describes the issue of your cluster by using the keywords in the homepage tile, or type a keyword that best describes your issue in the search bar, for example _Cluster Node Issues_.
24
+
1. Navigate to your Kubernetes cluster in the [Azure portal](https://portal.azure.com).
25
+
1. Click on **Diagnose and solve problems** in the left navigation, which opens AKS Diagnostics.
26
+
1. Choose a category that best describes the issue of your cluster, like _Cluster Node Issues_, by:
27
+
* Using the keywords in the homepage tile.
28
+
* Typing a keyword that best describes your issue in the search bar.
After you click on a category, you can view a diagnostic report specific to your cluster. Diagnostic report intelligently calls out if there is any issue in your cluster with status icons. You can drill down on each topic by clicking on **More Info** to see detailed description of the issue, recommended actions, links to helpful docs, related-metrics, and logging data. Diagnostic reports are intelligently generated based on the current state of your cluster after running a variety of checks. Diagnostic reports can be a useful tool for pinpointing the problem of your cluster and finding the next steps to resolve the issue.
34
+
After you click on a category, you can view a diagnostic report specific to your cluster. Diagnostic reports intelligently call out any issues in your cluster with status icons. You can drill down on each topic by clicking **More Info** to see a detailed description of:
35
+
* Issues
36
+
* Recommended actions
37
+
* Links to helpful docs
38
+
* Related-metrics
39
+
* Logging data
40
+
41
+
Diagnostic reports generate based on the current state of your cluster after running various checks. They can be useful for pinpointing the problem of your cluster and understanding next steps to resolve the issue.
CRUD Operations checks for any CRUD operations that may cause issues in your cluster.
67
+
CRUD Operations checks for any CRUD operations that cause issues in your cluster.
56
68
57
69
- In-use subnet delete operation error
58
70
- Network security group delete operation error
@@ -68,16 +80,16 @@ CRUD Operations checks for any CRUD operations that may cause issues in your clu
68
80
69
81
### Identity and security management
70
82
71
-
Identity and Security Management detects authentication and authorization errors that may prevent communication to your cluster.
83
+
Identity and Security Management detects authentication and authorization errors that prevent communication to your cluster.
72
84
73
85
- Node authorization failures
74
86
- 401 errors
75
87
- 403 errors
76
88
77
89
## Next steps
78
90
79
-
Collect logs to help you further troubleshoot your cluster issues by using [AKS Periscope](https://aka.ms/aksperiscope).
91
+
*Collect logs to help you further troubleshoot your cluster issues by using [AKS Periscope](https://aka.ms/aksperiscope).
80
92
81
-
Read the [triage practices section](/azure/architecture/operator-guides/aks/aks-triage-practices) of the AKS day-2 operations guide.
93
+
*Read the [triage practices section](/azure/architecture/operator-guides/aks/aks-triage-practices) of the AKS day-2 operations guide.
82
94
83
-
Post your questions or feedback at [UserVoice](https://feedback.azure.com/forums/914020-azure-kubernetes-service-aks) by adding "[Diag]" in the title.
95
+
*Post your questions or feedback at [UserVoice](https://feedback.azure.com/forums/914020-azure-kubernetes-service-aks) by adding "[Diag]" in the title.
0 commit comments