Skip to content

Commit abd4757

Browse files
committed
2 parents 5110504 + 2b23fdf commit abd4757

File tree

80 files changed

+550
-552
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

80 files changed

+550
-552
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/vpn-gateway/vpn-gateway-about-forced-tunneling.md",
5+
"redirect_url": "/previous-versions/azure/vpn-gateway/vpn-gateway-about-forced-tunneling",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/azure-app-configuration/rest-api-postman.md",
510
"redirect_url": "/previous-versions/azure/azure-app-configuration/rest-api-postman",

articles/app-service/environment/overview.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -205,10 +205,6 @@ App Service Environment v3 is available in the following regions:
205205

206206
An App Service Environment will only store customer data including app content, settings and secrets within the region where it's deployed. All data is guaranteed to remain in the region. For more information, see [Data residency in Azure](https://azure.microsoft.com/explore/global-infrastructure/data-residency/#overview).
207207

208-
## App Service Environment v2
209-
210-
App Service Environment has three versions: App Service Environment v1, App Service Environment v2, and App Service Environment v3. The information in this article is based on App Service Environment v3. To learn more about App Service Environment v2, see [App Service Environment v2 introduction](./intro.md).
211-
212208
## Next steps
213209

214210
> [!div class="nextstepaction"]

articles/application-gateway/for-containers/how-to-frontend-mtls-gateway-api.md

Lines changed: 29 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: greglin
66
ms.service: azure-application-gateway
77
ms.subservice: appgw-for-containers
88
ms.topic: how-to
9-
ms.date: 9/16/2024
9+
ms.date: 9/18/2024
1010
ms.author: greglin
1111
---
1212

@@ -28,7 +28,7 @@ See the following figure:
2828

2929
The valid client certificate flow shows a client presenting a certificate to the frontend of Application Gateway for Containers. Application Gateway for Containers determines the certificate is valid and proxies the request to the backend target. The response is ultimately returned to the client.
3030

31-
The revoked client certificate flow shows a client presenting a revoked certificate to the frontend of Application Gateway for Containers. Application Gateway for Containers determines the certificate is not valid and prevents the request from being proxied to the client. The client will receive an HTTP 400 bad request and corresponding reason.
31+
The revoked client certificate flow shows a client presenting a revoked certificate to the frontend of Application Gateway for Containers. Application Gateway for Containers determines the certificate isn't valid and prevents the request from being proxied to the client. The client will receive an HTTP 400 bad request and corresponding reason.
3232

3333
## Prerequisites
3434

@@ -51,7 +51,7 @@ The revoked client certificate flow shows a client presenting a revoked certific
5151

5252
### Generate certificate(s)
5353

54-
For this example, we will create a root certificate and issue a client certificate from the root. If you already have a root certificate and client certificate, you may skip these steps.
54+
For this example, we'll create a root certificate and issue a client certificate from the root. If you already have a root certificate and client certificate, you may skip these steps.
5555

5656
#### Generate a private key for the root certificate
5757

@@ -103,7 +103,7 @@ spec:
103103
certificateRefs:
104104
- kind : Secret
105105
group: ""
106-
name: contoso.com
106+
name: listener-tls-secret
107107
EOF
108108
```
109109

@@ -147,7 +147,7 @@ EOF
147147
certificateRefs:
148148
- kind : Secret
149149
group: ""
150-
name: contoso.com
150+
name: listener-tls-secret
151151
addresses:
152152
- type: alb.networking.azure.io/alb-frontend
153153
value: $FRONTEND_NAME
@@ -223,8 +223,8 @@ spec:
223223
- name: gateway-01
224224
rules:
225225
- backendRefs:
226-
- name: mtls-app
227-
port: 443
226+
- name: echo
227+
port: 80
228228
EOF
229229
```
230230

@@ -266,6 +266,12 @@ status:
266266
namespace: test-infra
267267
```
268268

269+
Create a Kubernetes secret using kubectl that contains the certificate chain to the client certificate.
270+
271+
```bash
272+
kubectl create secret generic ca.bundle -n test-infra --from-file=ca.crt=root.crt
273+
```
274+
269275
Create a FrontendTLSPolicy
270276

271277
```bash
@@ -290,7 +296,6 @@ spec:
290296
group: ""
291297
kind: Secret
292298
namespace: test-infra
293-
subjectAltName: "contoso-client"
294299
EOF
295300
```
296301

@@ -321,10 +326,24 @@ Now we're ready to send some traffic to our sample application, via the FQDN ass
321326
fqdn=$(kubectl get gateway gateway-01 -n test-infra -o jsonpath='{.status.addresses[0].value}')
322327
```
323328
324-
Curling this FQDN should return responses from the backend as configured on the HTTPRoute.
329+
Curling the FQDN of your frontend without the client certificate.
330+
331+
```bash
332+
curl --insecure https://$fqdn/
333+
```
334+
335+
Note the response alerts a certificate is required.
336+
337+
```
338+
curl: (56) OpenSSL SSL_read: OpenSSL/1.1.1k: error:1409445C:SSL routines:ssl3_read_bytes:tlsv13 alert certificate required, errno 0
339+
```
340+
341+
Curl the FQDN presenting the client certificate generated.
325342
326343
```bash
327344
curl --cert client.crt --key client.key --insecure https://$fqdn/
328345
```
329346
330-
Congratulations, you have installed ALB Controller, deployed a backend application, authenticated via client certificate, and routed traffic to the application via the gateway on Application Gateway for Containers.
347+
Note the response is from the backend service behind Application Gateway for Containers.
348+
349+
Congratulations, you installed ALB Controller, deployed a backend application, authenticated via client certificate, and returned traffic from your backend service via Application Gateway for Containers.

articles/automation/.openpublishing.redirection.automation.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -254,7 +254,17 @@
254254
"source_path_from_root": "/articles/automation/troubleshoot/start-stop-vm.md",
255255
"redirect_url": "/azure/azure-functions/start-stop-vms/troubleshoot",
256256
"redirect_document_id": false
257-
},
257+
},
258+
{
259+
"source_path_from_root": "/articles/automation/troubleshoot/automation-account.md",
260+
"redirect_url": "/azure/automation/enable-managed-identity-for-automation",
261+
"redirect_document_id": false
262+
},
263+
{
264+
"source_path_from_root": "/articles/automation/automation-managed-identity-faq.md",
265+
"redirect_url": "/azure/automation/enable-managed-identity-for-automation",
266+
"redirect_document_id": false
267+
},
258268
{
259269
"source_path_from_root": "/articles/automation/dsc-linux-powershell.md",
260270
"redirect_url": "/azure/automation/automation-dsc-overview",

articles/automation/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,8 @@
136136
href: delete-account.md
137137
- name: Migrate from Orchestrator to Azure Automation (Beta)
138138
href: automation-orchestrator-migration.md
139+
- name: Context switching in Azure Automation
140+
href: context-switching.md
139141
- name: Shared resources
140142
items:
141143
- name: Manage certificates
@@ -278,6 +280,8 @@
278280
href: change-tracking/overview.md
279281
- name: Support regions for linked Log Analytics workspace
280282
href: how-to/region-mappings.md
283+
- name: Discover the software installed on your VMs
284+
href: automation-tutorial-installed-software.md
281285
- name: Enable
282286
items:
283287
- name: Enable from the Azure portal

articles/automation/automation-managed-identity-faq.md

Lines changed: 0 additions & 70 deletions
This file was deleted.

articles/automation/troubleshoot/automation-account.md

Lines changed: 0 additions & 73 deletions
This file was deleted.

articles/azure-app-configuration/feature-management-dotnet-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1228,7 +1228,7 @@ Allocation logic is similar to the [Microsoft.Targeting](#microsofttargeting) fe
12281228
12291229
### Overriding Enabled State with a Variant
12301230
1231-
You can use variants to override the enabled state of a feature flag. This gives variants an opportunity to extend the evaluation of a feature flag. If a caller is checking whether a flag that has variants is enabled, the feature manager will check if the variant assigned to the current user is set up to override the result. This is done using the optional variant property `status_override`. By default, this property is set to `None`, which means the variant doesn't affect whether the flag is considered enabled or disabled. Setting `status_override` to `Enabled` allows the variant, when chosen, to override a flag to be enabled. Setting `status_override` to `Disabled` provides the opposite functionality, therefore disabling the flag when the variant is chosen. A feature with an `enabled` state of `false` can't be overridden.
1231+
You can use variants to override the enabled state of a feature flag. This gives variants an opportunity to extend the evaluation of a feature flag. When calling `IsEnabled` on a flag with variants, the feature manager will check if the variant assigned to the current user is configured to override the result. This is done using the optional variant property `status_override`. By default, this property is set to `None`, which means the variant doesn't affect whether the flag is considered enabled or disabled. Setting `status_override` to `Enabled` allows the variant, when chosen, to override a flag to be enabled. Setting `status_override` to `Disabled` provides the opposite functionality, therefore disabling the flag when the variant is chosen. A feature with an `enabled` state of `false` can't be overridden.
12321232
12331233
If you're using a feature flag with binary variants, the `status_override` property can be very helpful. It allows you to continue using APIs like `IsEnabledAsync` and `FeatureGateAttribute` in your application, all while benefiting from the new features that come with variants, such as percentile allocation and seed.
12341234

@@ -1481,4 +1481,4 @@ To learn how to use feature filters, continue to the following tutorials.
14811481
To learn how to run experiments with variant feature flags, continue to the following tutorial.
14821482
14831483
> [!div class="nextstepaction"]
1484-
> [Run experiments with variant feature flags](./howto-feature-filters.md)
1484+
> [Run experiments with variant feature flags](./howto-feature-filters.md)

articles/azure-functions/dotnet-isolated-process-guide.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -860,10 +860,12 @@ Azure Functions currently can be used with the following "Preview" or "Go-live"
860860

861861
| Operating system | .NET preview version |
862862
| - | - |
863-
| Linux | .NET 9 Preview 7<sup>1</sup> |
863+
| Linux | .NET 9 Preview 7<sup>1, 2</sup> |
864864

865865
<sup>1</sup> To successfully target .NET 9, your project needs to reference the [2.x versions of the core packages](#version-2x-preview). If using Visual Studio, .NET 9 requires version 17.12 or later.
866866

867+
<sup>2</sup> .NET 9 is not yet supported on the Flex Consumption SKU.
868+
867869
See [Supported versions][supported-versions] for a list of generally available releases that you can use.
868870

869871
### Using a preview .NET SDK

0 commit comments

Comments
 (0)