Skip to content

Commit 9ecddf2

Browse files
authored
Merge pull request #231477 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 9ad5883 + 998fe15 commit 9ecddf2

11 files changed

+49
-63
lines changed

articles/aks/ingress-tls.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -444,11 +444,11 @@ In the following example, traffic is routed as such:
444444
spec:
445445
ingressClassName: nginx
446446
tls:
447-
- hosts:
447+
- hosts:
448448
- hello-world-ingress.MY_CUSTOM_DOMAIN
449449
secretName: tls-secret
450450
rules:
451-
- host: hello-world-ingress.MY_CUSTOM_DOMAIN
451+
- host: hello-world-ingress.MY_CUSTOM_DOMAIN
452452
http:
453453
paths:
454454
- path: /hello-world-one(/|$)(.*)
@@ -483,11 +483,11 @@ In the following example, traffic is routed as such:
483483
spec:
484484
ingressClassName: nginx
485485
tls:
486-
- hosts:
486+
- hosts:
487487
- hello-world-ingress.MY_CUSTOM_DOMAIN
488488
secretName: tls-secret
489489
rules:
490-
- host: hello-world-ingress.MY_CUSTOM_DOMAIN
490+
- host: hello-world-ingress.MY_CUSTOM_DOMAIN
491491
http:
492492
paths:
493493
- path: /static(/|$)(.*)

articles/aks/operator-best-practices-network.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -116,11 +116,12 @@ The *ingress resource* is a YAML manifest of `kind: Ingress`. It defines the hos
116116
The following example YAML manifest would distribute traffic for *myapp.com* to one of two services, *blogservice* or *storeservice*. The customer is directed to one service or the other based on the URL they access.
117117

118118
```yaml
119+
apiVersion: networking.k8s.io/v1
119120
kind: Ingress
120121
metadata:
121122
name: myapp-ingress
122-
annotations: kubernetes.io/ingress.class: "PublicIngress"
123123
spec:
124+
ingressClassName: PublicIngress
124125
tls:
125126
- hosts:
126127
- myapp.com
@@ -131,12 +132,14 @@ spec:
131132
paths:
132133
- path: /blog
133134
backend:
134-
serviceName: blogservice
135-
servicePort: 80
135+
service
136+
name: blogservice
137+
port: 80
136138
- path: /store
137139
backend:
138-
serviceName: storeservice
139-
servicePort: 80
140+
service
141+
name: storeservice
142+
port: 80
140143
```
141144
142145
### Ingress controller

articles/aks/virtual-nodes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Virtual nodes functionality is heavily dependent on ACI's feature set. In additi
4040
* Virtual nodes support scheduling Linux pods. You can manually install the open source [Virtual Kubelet ACI](https://github.com/virtual-kubelet/azure-aci) provider to schedule Windows Server containers to ACI.
4141
* Virtual nodes require AKS clusters with Azure CNI networking.
4242
* Using api server authorized ip ranges for AKS.
43-
* Volume mounting Azure Files share support [General-purpose V2](../storage/common/storage-account-overview.md#types-of-storage-accounts) and [General-purpose V1](../storage/common/storage-account-overview.md#types-of-storage-accounts). Follow the instructions for mounting [a volume with Azure Files share](azure-files-csi.md).
43+
* Volume mounting Azure Files share support [General-purpose V2](../storage/common/storage-account-overview.md#types-of-storage-accounts) and [General-purpose V1](../storage/common/storage-account-overview.md#types-of-storage-accounts). However, virtual nodes currently don't support [Persistent Volumes](concepts-storage.md#persistent-volumes) and [Persistent Volume Claims](concepts-storage.md#persistent-volume-claims). Follow the instructions for mounting [a volume with Azure Files share as an inline volume](azure-csi-files-storage-provision.md#mount-file-share-as-an-inline-volume).
4444
* Using IPv6 isn't supported.
4545
* Virtual nodes don't support the [Container hooks](https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/) feature.
4646

articles/aks/workload-identity-migrate-from-pod-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ Serviceaccount/workload-identity-sa created
108108
Use the [az identity federated-credential create][az-identity-federated-credential-create] command to create the federated identity credential between the managed identity, the service account issuer, and the subject. Replace the values `resourceGroupName`, `userAssignedIdentityName`, `federatedIdentityName`, `serviceAccountNamespace`, and `serviceAccountName`.
109109

110110
```azurecli
111-
az identity federated-credential create --name federatedIdentityName --identity-name userAssignedIdentityName --resource-group resourceGroupName --issuer ${AKS_OIDC_ISSUER} --subject system:serviceaccount:${SERVICE_ACCOUNT_NAMESPACE}:${SERVICE_ACCOUNT_NAME}
111+
az identity federated-credential create --name federatedIdentityName --identity-name userAssignedIdentityName --resource-group resourceGroupName --issuer ${AKS_OIDC_ISSUER} --subject system:serviceaccount:${SERVICE_ACCOUNT_NAMESPACE}:${SERVICE_ACCOUNT_NAME} --audience api://AzureADTokenExchange
112112
```
113113

114114
> [!NOTE]

articles/application-gateway/application-gateway-create-probe-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Probes are configured in a two-step process through the portal. The first step i
5050
|**Path**|/ or any valid path|The remainder of the full url for the custom probe. A valid path starts with '/'. For the default path of http:\//contoso.com, just use '/'. You can also input a server path to a file for a static health check instead of web based. File paths should be used while using public / private ip, or public ip dns entry as the hostname entry.|
5151
|**Interval (secs)**|30|How often the probe is run to check for health. It isn't recommended to set the lower than 30 seconds.|
5252
|**Timeout (secs)**|30|The amount of time the probe waits before timing out. If a valid response isn't received within this time-out period, the probe is marked as failed. The timeout interval needs to be high enough that an http call can be made to ensure the backend health page is available. The time-out value shouldn't be more than the ‘Interval’ value used in this probe setting or the ‘Request timeout’ value in the HTTP setting, which will be associated with this probe.|
53-
|**Unhealthy threshold**|3|Number of consecutive failed attempts to be considered unhealthy. The threshold can be set to 1 or more.|
53+
|**Unhealthy threshold**|3|Number of consecutive failed attempts to be considered unhealthy. The threshold can be set to 0 or more.|
5454
|**Use probe matching conditions**|Yes or No|By default, an HTTP(S) response with status code between 200 and 399 is considered healthy. You can change the acceptable range of backend response code or backend response body. [Learn more](./application-gateway-probe-overview.md#probe-matching)|
5555
|**HTTP Settings**|selection from dropdown|Probe will get associated with the HTTP settings selected here and therefore, will monitor the health of that backend pool, which is associated with the selected HTTP setting. It will use the same port for the probe request as the one being used in the selected HTTP setting. You can only choose those HTTP settings, which aren't associated with any other custom probe. <br>The only HTTP settings that are available for association are those that have the same protocol as the protocol chosen in this probe configuration, and have the same state for the *Pick Host Name From Backend HTTP setting* switch.|
5656

articles/application-gateway/application-gateway-troubleshooting-502.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Similarly, the presence of a custom DNS in the VNet could also cause issues. An
4141

4242
Validate NSG, UDR, and DNS configuration by going through the following steps:
4343

44-
1. Check NSGs associated with the application gateway subnet. Ensure that communication to backend isn't blocked.
44+
1. Check NSGs associated with the application gateway subnet. Ensure that communication to backend isn't blocked. For more information, see [Network security groups](/azure/application-gateway/configuration-infrastructure#network-security-groups).
4545
2. Check UDR associated with the application gateway subnet. Ensure that the UDR isn't directing traffic away from the backend subnet. For example, check for routing to network virtual appliances or default routes being advertised to the application gateway subnet via ExpressRoute/VPN.
4646

4747
```azurepowershell

articles/application-gateway/ingress-controller-letsencrypt-certificate-application-gateway.md

Lines changed: 14 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,13 @@ Follow the steps below to install [cert-manager](https://docs.cert-manager.io) o
2727
#!/bin/bash
2828

2929
# Install the CustomResourceDefinition resources separately
30-
kubectl apply -f https://raw.githubusercontent.com/jetstack/cert-manager/release-0.8/deploy/manifests/00-crds.yaml
30+
kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.10.1/cert-manager.crds.yaml
3131

3232
# Create the namespace for cert-manager
3333
kubectl create namespace cert-manager
3434

3535
# Label the cert-manager namespace to disable resource validation
36-
kubectl label namespace cert-manager certmanager.k8s.io/disable-validation=true
36+
kubectl label namespace cert-manager cert-manager.io/disable-validation=true
3737

3838
# Add the Jetstack Helm repository
3939
helm repo add jetstack https://charts.jetstack.io
@@ -46,17 +46,9 @@ Follow the steps below to install [cert-manager](https://docs.cert-manager.io) o
4646
helm install \
4747
cert-manager jetstack/cert-manager \
4848
--namespace cert-manager \
49-
--version v1.0.4 \
49+
--version v1.10.1 \
5050
# --set installCRDs=true
51-
52-
# Helm v2
53-
helm install \
54-
--name cert-manager \
55-
--namespace cert-manager \
56-
--version v1.0.4 \
57-
jetstack/cert-manager \
58-
# --set installCRDs=true
59-
51+
6052
#To automatically install and manage the CRDs as part of your Helm release,
6153
# you must add the --set installCRDs=true flag to your Helm installation command.
6254
```
@@ -81,12 +73,12 @@ Follow the steps below to install [cert-manager](https://docs.cert-manager.io) o
8173
```bash
8274
#!/bin/bash
8375
kubectl apply -f - <<EOF
84-
apiVersion: certmanager.k8s.io/v1alpha1
76+
apiVersion: cert-manager.io/v1
8577
kind: ClusterIssuer
8678
metadata:
87-
name: letsencrypt-staging
79+
name: letsencrypt-staging
8880
spec:
89-
acme:
81+
acme:
9082
# You must replace this email address with your own.
9183
# Let's Encrypt will use this to contact you about expiring
9284
# certificates, and issues related to your account.
@@ -97,12 +89,15 @@ Follow the steps below to install [cert-manager](https://docs.cert-manager.io) o
9789
# before moving to production
9890
server: https://acme-staging-v02.api.letsencrypt.org/directory
9991
privateKeySecretRef:
100-
# Secret resource used to store the account's private key.
101-
name: example-issuer-account-key
92+
# Secret resource used to store the account's private key.
93+
name: example-issuer-account-key
10294
# Enable the HTTP-01 challenge provider
10395
# you prove ownership of a domain by ensuring that a particular
10496
# file is present at the domain
105-
http01: {}
97+
solvers:
98+
- http01:
99+
ingress:
100+
class: azure/application-gateway
106101
EOF
107102
```
108103

@@ -127,7 +122,7 @@ Follow the steps below to install [cert-manager](https://docs.cert-manager.io) o
127122
name: guestbook-letsencrypt-staging
128123
annotations:
129124
kubernetes.io/ingress.class: azure/application-gateway
130-
certmanager.k8s.io/cluster-issuer: letsencrypt-staging
125+
cert-manager.io/cluster-issuer: letsencrypt-staging
131126
spec:
132127
tls:
133128
- hosts:

articles/application-gateway/tutorial-multiple-sites-cli.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,8 @@ az network application-gateway create \
8888
--frontend-port 80 \
8989
--http-settings-port 80 \
9090
--http-settings-protocol Http \
91-
--public-ip-address myAGPublicIPAddress
91+
--public-ip-address myAGPublicIPAddress \
92+
--priority 10
9293
```
9394

9495
It may take several minutes for the application gateway to be created. After the application gateway is created, you can see these new features of it:
@@ -153,15 +154,17 @@ az network application-gateway rule create \
153154
--resource-group myResourceGroupAG \
154155
--http-listener contosoListener \
155156
--rule-type Basic \
156-
--address-pool contosoPool
157+
--address-pool contosoPool \
158+
--priority 200
157159
158160
az network application-gateway rule create \
159161
--gateway-name myAppGateway \
160162
--name fabrikamRule \
161163
--resource-group myResourceGroupAG \
162164
--http-listener fabrikamListener \
163165
--rule-type Basic \
164-
--address-pool fabrikamPool
166+
--address-pool fabrikamPool \
167+
--priority 100
165168
166169
az network application-gateway rule delete \
167170
--gateway-name myAppGateway \

articles/azure-vmware/configure-identity-source-vcenter.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,8 @@ In this article, you learn how to:
1717

1818
> [!div class="checklist"]
1919
>
20-
> * Export the certificate for LDAPS authentication
21-
> * Upload the LDAPS certificate to blob storage and generate a SAS URL
20+
> * (Optional) Export the certificate for LDAPS authentication
21+
> * (Optional) Upload the LDAPS certificate to blob storage and generate a SAS URL
2222
> * Configure NSX-T DNS for resolution to your Active Directory Domain
2323
> * Add Active Directory over (Secure) LDAPS (LDAP over SSL) or (unsecure) LDAP
2424
> * Add existing AD group to cloudadmin group
@@ -27,6 +27,9 @@ In this article, you learn how to:
2727
> * Remove AD group from the cloudadmin role
2828
> * Remove existing external identity sources
2929
30+
>[!NOTE]
31+
>[Export the certificate for LDAPS authentication](#optional-export-the-certificate-for-ldaps-authentication) and [Upload the LDAPS certificate to blob storage and generate a SAS URL](#optional-upload-the-ldaps-certificate-to-blob-storage-and-generate-a-sas-url) are optional steps as now the certificate(s) will be downloaded from the domain controller(s) automatically through the parameter(s) **PrimaryUrl** and/or **SecondaryUrl** if the parameter **SSLCertificatesSasUrl** is not provided. You can still provide **SSLCertificatesSasUrl** and follow the optional steps to manually export and upload the certificate(s).
32+
3033
## Prerequisites
3134

3235
- Connectivity from your Active Directory network to your Azure VMware Solution private cloud must be operational.
@@ -38,14 +41,14 @@ In this article, you learn how to:
3841
- You need to have a valid certificate. To create a certificate, follow the steps shown in [create a certificate for secure LDAP](../active-directory-domain-services/tutorial-configure-ldaps.md#create-a-certificate-for-secure-ldap). Make sure the certificate meets the requirements that are listed after the steps you used to create a certificate for secure LDAP.
3942
>[!NOTE]
4043
>Self-sign certificates are not recommended for production environments.
41-
- [Export the certificate for LDAPS authentication](#export-the-certificate-for-ldaps-authentication) and upload it to an Azure Storage account as blob storage. Then, you'll need to [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
44+
- Optional: The certificate(s) will be downloaded from the domain controller(s) automatically through the parameter(s) **PrimaryUrl** and/or **SecondaryUrl** if the parameter **SSLCertificatesSasUrl** is not provided. If you prefer to manually export and upload the certificate(s), please [export the certificate for LDAPS authentication](#optional-export-the-certificate-for-ldaps-authentication) and upload it to an Azure Storage account as blob storage. Then, you'll need to [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
4245

4346
- Ensure Azure VMware Solution has DNS resolution configured to your on-premises AD. Enable DNS Forwarder from Azure portal. See [Configure DNS forwarder for Azure VMware Solution](configure-dns-azure-vmware-solution.md) for further information.
4447

4548
>[!NOTE]
4649
>For more information about LDAPS and certificate issuance, see with your security or identity management team.
4750
48-
## Export the certificate for LDAPS authentication
51+
## (Optional) Export the certificate for LDAPS authentication
4952

5053
First, verify that the certificate used for LDAPS is valid. If you don't already have a certificate, follow the steps to [create a certificate for secure LDAP](../active-directory-domain-services/tutorial-configure-ldaps.md#create-a-certificate-for-secure-ldap) before you continue.
5154

@@ -81,7 +84,7 @@ Now proceed to export the certificate
8184
>[!NOTE]
8285
>If more than one domain controller is LDAPS enabled, repeat the export procedure in the additional domain controller(s) to also export the corresponding certificate(s). Be aware that you can only reference two LDAPS server in the `New-LDAPSIdentitySource` Run Command. If the certificate is a wildcard certificate, for example ***.avsdemo.net** you only need to export the certificate from one of the domain controllers.
8386
84-
## Upload the LDAPS certificate to blob storage and generate a SAS URL
87+
## (Optional) Upload the LDAPS certificate to blob storage and generate a SAS URL
8588

8689
- Upload the certificate file (.cer format) you just exported to an Azure Storage account as blob storage. Then [grant access to Azure Storage resources using shared access signature (SAS)](../storage/common/storage-sas-overview.md).
8790

@@ -113,7 +116,7 @@ In your Azure VMware Solution private cloud, you'll run the `New-LDAPSIdentitySo
113116
| **Field** | **Value** |
114117
| --- | --- |
115118
| **GroupName** | The group in the external identity source that gives the cloudadmin access. For example, **avs-admins**. |
116-
| **CertificateSAS** | Path to SAS strings with the certificates for authentication to the AD source. If you're using multiple certificates, separate each SAS string with a comma. For example, **pathtocert1,pathtocert2**. |
119+
| **SSLCertificatesSasUrl** | Path to SAS strings with the certificates for authentication to the AD source. If you're using multiple certificates, separate each SAS string with a comma. For example, **pathtocert1,pathtocert2**. |
117120
| **Credential** | The domain username and password used for authentication with the AD source (not cloudadmin). The user must be in the **[email protected]** format. |
118121
| **BaseDNGroups** | Where to look for groups, for example, **CN=group1, DC=avsldap,DC=local**. Base DN is needed to use LDAP Authentication. |
119122
| **BaseDNUsers** | Where to look for valid users, for example, **CN=users,DC=avsldap,DC=local**. Base DN is needed to use LDAP Authentication. |

0 commit comments

Comments
 (0)