Skip to content

Commit ae255e9

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-rest-filters
2 parents 3126e7e + 467305a commit ae255e9

File tree

3 files changed

+12
-12
lines changed

3 files changed

+12
-12
lines changed

articles/application-gateway/tutorial-url-redirect-powershell.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,17 +4,17 @@ description: Learn how to create an application gateway with URL path-based redi
44
services: application-gateway
55
author: vhorne
66
ms.service: application-gateway
7-
ms.date: 11/14/2019
7+
ms.date: 03/19/2020
88
ms.author: victorh
9-
ms.topic: tutorial
9+
ms.topic: conceptual
1010
#Customer intent: As an IT administrator, I want to use Azure PowerShell to set up URL path redirection of web traffic to specific pools of servers so I can ensure my customers have access to the information they need.
1111
---
1212

1313
# Create an application gateway with URL path-based redirection using Azure PowerShell
1414

15-
You can use Azure PowerShell to configure [URL-based routing rules](application-gateway-url-route-overview.md) when you create an [application gateway](application-gateway-introduction.md). In this tutorial, you create backend pools using [virtual machine scale sets](../virtual-machine-scale-sets/virtual-machine-scale-sets-overview.md). You then create URL routing rules that make sure web traffic is redirected to the appropriate backend pool.
15+
You can use Azure PowerShell to configure [URL-based routing rules](application-gateway-url-route-overview.md) when you create an [application gateway](application-gateway-introduction.md). In this article, you create backend pools using [virtual machine scale sets](../virtual-machine-scale-sets/virtual-machine-scale-sets-overview.md). You then create URL routing rules that make sure web traffic is redirected to the appropriate backend pool.
1616

17-
In this tutorial, you learn how to:
17+
In this article, you learn how to:
1818

1919
> [!div class="checklist"]
2020
> * Set up the network
@@ -26,15 +26,15 @@ The following example shows site traffic coming from both ports 8080 and 8081 an
2626

2727
![URL routing example](./media/tutorial-url-redirect-powershell/scenario.png)
2828

29-
If you prefer, you can complete this tutorial using [Azure CLI](tutorial-url-redirect-cli.md).
29+
If you prefer, you can complete this procedure using [Azure CLI](tutorial-url-redirect-cli.md).
3030

3131
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
3232

3333
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
3434

3535
[!INCLUDE [cloud-shell-try-it.md](../../includes/cloud-shell-try-it.md)]
3636

37-
If you choose to install and use the PowerShell locally, this tutorial requires the Azure PowerShell module version 1.0.0 or later. To find the version, run `Get-Module -ListAvailable Az` . If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-az-ps). If you are running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.
37+
If you choose to install and use the PowerShell locally, this procedure requires the Azure PowerShell module version 1.0.0 or later. To find the version, run `Get-Module -ListAvailable Az` . If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-az-ps). If you are running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.
3838

3939
## Create a resource group
4040

@@ -125,7 +125,7 @@ $poolSettings = New-AzApplicationGatewayBackendHttpSettings `
125125

126126
### Create the default listener and rule
127127

128-
A listener is required to enable the application gateway to route traffic appropriately to a backend pool. In this tutorial, you create multiple listeners. The first basic listener expects traffic at the root URL. The other listeners expect traffic at specific URLs, such as `http://52.168.55.24:8080/images/` or `http://52.168.55.24:8081/video/`.
128+
A listener is required to enable the application gateway to route traffic appropriately to a backend pool. In this article, you create multiple listeners. The first basic listener expects traffic at the root URL. The other listeners expect traffic at specific URLs, such as `http://52.168.55.24:8080/images/` or `http://52.168.55.24:8081/video/`.
129129

130130
Create a listener named *defaultListener* using [New-AzApplicationGatewayHttpListener](/powershell/module/az.network/new-azapplicationgatewayhttplistener) with the frontend configuration and frontend port that you previously created. A rule is required for the listener to know which backend pool to use for incoming traffic. Create a basic rule named *rule1* using [New-AzApplicationGatewayRequestRoutingRule](/powershell/module/az.network/new-azapplicationgatewayrequestroutingrule).
131131

articles/event-hubs/event-hubs-ip-filtering.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,10 @@ The IP firewall rules are applied at the Event Hubs namespace level. Therefore,
2727
This section shows you how to use the Azure portal to create IP firewall rules for an Event Hubs namespace.
2828

2929
1. Navigate to your **Event Hubs namespace** in the [Azure portal](https://portal.azure.com).
30-
2. On the left menu, select **Networking** option. By default, the **All networks** option is selected. Your event hub accepts connections from any IP address. This default setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
30+
2. On the left menu, select **Networking** option. If you select the **All networks** option, the event hub accepts connections from any IP address. This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
3131

3232
![Firewall - All networks option selected](./media/event-hubs-firewall/firewall-all-networks-selected.png)
33-
1. Select the **Selected networks** option at the top of the page. In the **Firewall** section, follow these steps:
33+
1. To restrict access to specific networks and IP addresses, select the **Selected networks** option. In the **Firewall** section, follow these steps:
3434
1. Select **Add your client IP address** option to give your current client IP the access to the namespace.
3535
2. For **address range**, enter a specific IPv4 address or a range of IPv4 address in CIDR notation.
3636
3. Specify whether you want to **allow trusted Microsoft services to bypass this firewall**.

articles/event-hubs/event-hubs-service-endpoints.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,11 +46,11 @@ The virtual network rule is an association of the Event Hubs namespace with a vi
4646
This section shows you how to use Azure portal to add a virtual network service endpoint. To limit access, you need to integrate the virtual network service endpoint for this Event Hubs namespace.
4747

4848
1. Navigate to your **Event Hubs namespace** in the [Azure portal](https://portal.azure.com).
49-
2. On the left menu, select **Networking** option. By default, the **All networks** option is selected. Your event hub accepts connections from any IP address. This default setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
49+
2. On the left menu, select **Networking** option. If you select the **All networks** option, the event hub accepts connections from any IP address. This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
5050

5151
![Firewall - All networks option selected](./media/event-hubs-firewall/firewall-all-networks-selected.png)
52-
1. Select the **Selected Networks** option at the top of the page.
53-
2. In the **Virtual Network** section of the page, select **+Add existing virtual network***.
52+
1. To restrct access to specific networks, select the **Selected Networks** option at the top of the page.
53+
2. In the **Virtual Network** section of the page, select **+Add existing virtual network***. Select **+ Create new virtual network** if you want to create a new VNet.
5454

5555
![add existing virtual network](./media/event-hubs-tutorial-vnet-and-firewalls/add-vnet-menu.png)
5656
3. Select the virtual network from the list of virtual networks, and then pick the **subnet**. You have to enable the service endpoint before adding the virtual network to the list. If the service endpoint isn't enabled, the portal will prompt you to enable it.

0 commit comments

Comments
 (0)