You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-provisioning/reference-cloud-provisioning-faq.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ Yes, cloud provisioning creates a service principal for the provisioning configu
52
52
53
53
**Q: What happens when a synced user is required to change password on next logon?**
54
54
55
-
If password hash sync is enabled in cloud provisioning and the synced user is required to change password on next logon in on-premises AD, cloud provisioning does not provisioned the to be changed password hash to Azure AD. Once the user changes the password, the user password hash is provisioned from AD to Azure AD.
55
+
If password hash sync is enabled in cloud provisioning and the synced user is required to change password on next logon in on-premises AD, cloud provisioning does not provision the to be changed password hash to Azure AD. Once the user changes the password, the user password hash is provisioned from AD to Azure AD.
56
56
57
57
**Q: Does cloud provisioning support writeback of ms-ds-consistencyGUID for any object?**
Copy file name to clipboardExpand all lines: articles/aks/kubernetes-walkthrough-portal.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: mlearned
6
6
7
7
ms.service: container-service
8
8
ms.topic: quickstart
9
-
ms.date: 5/31/2019
9
+
ms.date: 01/21/2020
10
10
ms.author: mlearned
11
11
ms.custom: mvc, seo-javascript-october2019
12
12
@@ -93,7 +93,7 @@ A Kubernetes manifest file defines a desired state for the cluster, such as what
93
93
> [!TIP]
94
94
> In this quickstart, you manually create and deploy your application manifests to the AKS cluster. In more real-world scenarios, you can use [Azure Dev Spaces][azure-dev-spaces] to rapidly iterate and debug your code directly in the AKS cluster. You can use Dev Spaces across OS platforms and development environments, and work together with others on your team.
95
95
96
-
In the cloud shell, use `nano` or `vi`to create a file named `azure-vote.yaml` and copy in the following YAML definition:
96
+
In the cloud shell, use either the `nano azure-vote.yaml` or `vi azure-vote.yaml` command to create a file named `azure-vote.yaml`. Then copy in the following YAML definition:
Copy file name to clipboardExpand all lines: articles/aks/limit-egress-traffic.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: mlearned
6
6
7
7
ms.service: container-service
8
8
ms.topic: article
9
-
ms.date: 08/29/2019
9
+
ms.date: 01/21/2020
10
10
ms.author: mlearned
11
11
12
12
#Customer intent: As an cluster operator, I want to restrict egress traffic for nodes to only access defined ports and addresses and improve cluster security.
@@ -53,6 +53,7 @@ The following outbound ports / network rules are required for an AKS cluster:
53
53
* TCP [IPAddrOfYourAPIServer]:443 is required if you have an app that needs to talk to the API server. This change can be set after the cluster is created.
54
54
* TCP port *9000* and TCP port *22* for the tunnel front pod to communicate with the tunnel end on the API server.
55
55
* To get more specific, see the **.hcp.\<location\>.azmk8s.io* and **.tun.\<location\>.azmk8s.io* addresses in the following table.
56
+
* UDP port *123* for Network Time Protocol (NTP) time synchronization (Linux nodes).
56
57
* UDP port *53* for DNS is also required if you have pods directly accessing the API server.
57
58
58
59
The following FQDN / application rules are required:
@@ -71,15 +72,15 @@ The following FQDN / application rules are required:
71
72
| ntp.ubuntu.com | UDP:123 | This address is required for NTP time synchronization on Linux nodes. |
72
73
| packages.microsoft.com | HTTPS:443 | This address is the Microsoft packages repository used for cached *apt-get* operations. Example packages include Moby, PowerShell, and Azure CLI. |
73
74
| acs-mirror.azureedge.net | HTTPS:443 | This address is for the repository required to install required binaries like kubenet and Azure CNI. |
|*.hcp.\<location\>.cx.prod.service.azk8s.cn | HTTPS:443, TCP:22, TCP:9000 | This address is the API server endpoint. Replace *\<location\>* with the region where your AKS cluster is deployed. |
79
80
|*.tun.\<location\>.cx.prod.service.azk8s.cn | HTTPS:443, TCP:22, TCP:9000 | This address is the API server endpoint. Replace *\<location\>* with the region where your AKS cluster is deployed. |
80
81
|*.azk8s.cn | HTTPS:443 | This address is required to download required binaries and images|
81
82
| mcr.microsoft.com | HTTPS:443 | This address is required to access images in Microsoft Container Registry (MCR). This registry contains first-party images/charts(for example, moby, etc.) required for the functioning of the cluster during upgrade and scale of the cluster |
82
-
|*.cdn.mscr.io | HTTPS:443 | This address is required for MCR storage backed by the Azure content delivery network (CDN). |
83
+
|*.cdn.mscr.io | HTTPS:443 | This address is required for MCR storage backed by the Azure Content Delivery Network (CDN). |
83
84
| management.chinacloudapi.cn | HTTPS:443 | This address is required for Kubernetes GET/PUT operations. |
84
85
| login.chinacloudapi.cn | HTTPS:443 | This address is required for Azure Active Directory authentication. |
85
86
| ntp.ubuntu.com | UDP:123 | This address is required for NTP time synchronization on Linux nodes. |
@@ -93,7 +94,7 @@ The following FQDN / application rules are required:
93
94
| aksrepos.azurecr.io | HTTPS:443 | This address is required to access images in Azure Container Registry (ACR). This registry contains third-party images/charts (for example, metrics server, core dns, etc.) required for the functioning of the cluster during upgrade and scale of the cluster|
94
95
|*.blob.core.windows.net | HTTPS:443 | This address is the backend store for images stored in ACR. |
95
96
| mcr.microsoft.com | HTTPS:443 | This address is required to access images in Microsoft Container Registry (MCR). This registry contains first-party images/charts(for example, moby, etc.) required for the functioning of the cluster during upgrade and scale of the cluster |
96
-
|*.cdn.mscr.io | HTTPS:443 | This address is required for MCR storage backed by the Azure content delivery network (CDN). |
97
+
|*.cdn.mscr.io | HTTPS:443 | This address is required for MCR storage backed by the Azure Content Delivery Network (CDN). |
97
98
| management.usgovcloudapi.net | HTTPS:443 | This address is required for Kubernetes GET/PUT operations. |
98
99
| login.microsoftonline.us | HTTPS:443 | This address is required for Azure Active Directory authentication. |
99
100
| ntp.ubuntu.com | UDP:123 | This address is required for NTP time synchronization on Linux nodes. |
@@ -153,15 +154,15 @@ The following FQDN / application rules are required for AKS clusters that have t
| gov-prod-policy-data.trafficmanager.net | HTTPS:443 | This address is used for correct operation of Azure Policy. (currently in preview in AKS) |
155
156
| raw.githubusercontent.com | HTTPS:443 | This address is used to pull the built-in policies from GitHub to ensure correct operation of Azure Policy. (currently in preview in AKS) |
156
-
|*.gk.<location>.azmk8s.io | HTTPS:443 | Azure policy add-on talks to Gatekeeper audit endpoint running in master server to get the audit results. |
157
-
| dc.services.visualstudio.com | HTTPS:443 | Azure policy add-on sends telemetry data to applications insights endpoint. |
157
+
|*.gk.<location>.azmk8s.io | HTTPS:443 | Azure policy add-on that talks to Gatekeeper audit endpoint running in master server to get the audit results. |
158
+
| dc.services.visualstudio.com | HTTPS:443 | Azure policy add-on that sends telemetry data to applications insights endpoint. |
158
159
159
160
## Required by Windows Server based nodes (in public preview) enabled
160
161
161
162
> [!CAUTION]
162
163
> Some of the features below are in preview. The suggestions in this article are subject to change as the feature moves to public preview and future release stages.
163
164
164
-
The following FQDN / application rules are required for Windows server based AKS clusters:
165
+
The following FQDN / application rules are required for Windows Server based AKS clusters:
Copy file name to clipboardExpand all lines: articles/analysis-services/analysis-services-gateway.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: An On-premises gateway is necessary if your Analysis Services serve
4
4
author: minewiskan
5
5
ms.service: azure-analysis-services
6
6
ms.topic: conceptual
7
-
ms.date: 01/17/2020
7
+
ms.date: 01/21/2020
8
8
ms.author: owend
9
9
ms.reviewer: minewiskan
10
10
---
@@ -18,11 +18,11 @@ For Azure Analysis Services, getting setup with the gateway the first time is a
18
18
19
19
-**Download and run setup** - This step installs a gateway service on a computer in your organization. You also sign in to Azure using an account in your [tenant's](/previous-versions/azure/azure-services/jj573650(v=azure.100)#what-is-an-azure-ad-tenant) Azure AD. Azure B2B (guest) accounts are not supported.
20
20
21
-
-**Register your gateway** - In this step, you specify a name and recovery key for your gateway and select a region, registering your gateway with the Gateway Cloud Service. Your gateway resource can be registered in any region, but we recommend it be in the same region as your Analysis Services servers.
21
+
-**Register your gateway** - In this step, you specify a name and recovery key for your gateway and select a region, registering your gateway with the Gateway Cloud Service. Your gateway resource can be registered in any region, but it's recommended it be in the same region as your Analysis Services servers.
22
22
23
-
-**Create a gateway resource in Azure** - In this step, you create a gateway resource in an Azure.
23
+
-**Create a gateway resource in Azure** - In this step, you create a gateway resource in Azure.
24
24
25
-
-**Connect your servers to your gateway resource** - Once you have a gateway resource, you can begin connecting your servers to it. You can connect multiple servers and other resources, provided they are in the same region.
25
+
-**Connect your servers to your gateway resource** - Once you have a gateway resource, you can begin connecting servers to it. You can connect multiple servers and other resources provided they are in the same region.
26
26
27
27
28
28
@@ -48,7 +48,7 @@ When installing for an Azure Analysis Services environment, it's important you f
48
48
49
49
The gateway creates an outbound connection to Azure Service Bus. It communicates on outbound ports: TCP 443 (default), 5671, 5672, 9350 through 9354. The gateway does not require inbound ports.
50
50
51
-
You may need to include IP addresses for your data region in your firewall. You can download the [Microsoft Azure Datacenter IP list](https://www.microsoft.com/download/details.aspx?id=41653). This list is updated weekly. The IP Addresses listed in the Azure Datacenter IP list are in CIDR notation. To learn more, see [Classless Inter-Domain Routing](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing).
51
+
You may need to include IP addresses for your data region in your firewall. You can download the [Microsoft Azure Datacenter IP list](https://www.microsoft.com/download/details.aspx?id=56519). This list is updated weekly. The IP Addresses listed in the Azure Datacenter IP list are in CIDR notation. To learn more, see [Classless Inter-Domain Routing](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing).
52
52
53
53
The following are fully qualified domain names used by the gateway.
Copy file name to clipboardExpand all lines: articles/analysis-services/analysis-services-scale-out.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ When performing a subsequent scale-out operation, for example, increasing the nu
45
45
46
46
### Synchronization mode
47
47
48
-
By default, query replicas are rehydrated in full, not incrementally. Rehydration happens in stages. They are detached and attached two at a time (assuming there are at least three replicas) to ensure at least one replica is kept online for queries at any given time. In some cases, clients may need to reconnect to one of the online replicas while this process is taking place. By using the **ReplicaSyncMode** setting, you can now specify query replica synchronization occurs in parallel. Parallel synchronization provides the following benefits:
48
+
By default, query replicas are rehydrated in full, not incrementally. Rehydration happens in stages. They are detached and attached two at a time (assuming there are at least three replicas) to ensure at least one replica is kept online for queries at any given time. In some cases, clients may need to reconnect to one of the online replicas while this process is taking place. By using the (in Preview) **ReplicaSyncMode** setting, you can now specify query replica synchronization occurs in parallel. Parallel synchronization provides the following benefits:
49
49
50
50
- Significant reduction in synchronization time.
51
51
- Data across replicas are more likely to be consistent during the synchronization process.
Copy file name to clipboardExpand all lines: articles/automation/automation-tutorial-update-management.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article provides an overview of how to use Azure Automation Up
4
4
services: automation
5
5
ms.subservice: update-management
6
6
ms.topic: tutorial
7
-
ms.date: 12/03/2019
7
+
ms.date: 01/21/2020
8
8
ms.custom: mvc
9
9
---
10
10
# Manage updates and patches for your Azure VMs
@@ -135,7 +135,7 @@ Under **New update deployment**, specify the following information:
135
135
136
136
***Machines to update**: Select a Saved search, Imported group, or pick Machine from the drop-down and select individual machines. If you choose **Machines**, the readiness of the machine is shown in the **UPDATE AGENT READINESS** column. To learn about the different methods of creating computer groups in Azure Monitor logs, see [Computer groups in Azure Monitor logs](../azure-monitor/platform/computer-groups.md)
137
137
138
-
***Update classification**: Select the types of software that the update deployment included in the deployment. For this tutorial, leave all types selected.
138
+
***Update classification**: Select the supported update classifications available for each product that can be included in the update deployment. For this tutorial, leave all types selected.
0 commit comments