Skip to content

Commit bf83789

Browse files
authored
Merge pull request #252293 from MicrosoftDocs/main
9/20/2023 AM Publish
2 parents 2fe911a + 104bd53 commit bf83789

File tree

104 files changed

+2174
-250
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

104 files changed

+2174
-250
lines changed

articles/active-directory/app-provisioning/provision-on-demand.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -173,6 +173,7 @@ There are currently a few known limitations to on-demand provisioning. Post your
173173
* On-demand provisioning of roles isn't supported.
174174
* On-demand provisioning supports disabling users that have been unassigned from the application. However, it doesn't support disabling or deleting users that have been disabled or deleted from Azure AD. Those users don't appear when you search for a user.
175175
* On-demand provisioning doesn't support nested groups that aren't directly assigned to the application.
176+
* The on-demand provisioning request API can only accept a single group with up to 5 members at a time.
176177

177178
## Next steps
178179

articles/aks/private-clusters.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,17 @@ You can configure private DNS zones using the following parameters:
110110
* If your AKS cluster is configured with an Active Directory service principal, AKS doesn't support using a system-assigned managed identity with custom private DNS zone.
111111
* If you are specifying a `<subzone>` there is a 32 character limit for the `<subzone>` name.
112112

113+
>[!NOTE]
114+
>**CUSTOM_PRIVATE_DNS_ZONE_RESOURCE_ID** can be configured using an ARM Template in addition to the Azure CLI. `privateDNSZone` accepts the private DNZ zone resourceID as shown in the following example:
115+
>
116+
>```json
117+
>properties.apiServerAccessProfile.privateDNSZone.
118+
>"apiServerAccessProfile": {
119+
>"enablePrivateCluster": true,
120+
>"privateDNSZone": "system|none|[resourceId(..., 'Microsoft.Network/privateDnsZones', 'privatelink.<region>.azmk8s.io']"
121+
>}
122+
>```
123+
113124
> [!IMPORTANT]
114125
> The **CUSTOM_PRIVATE_DNS_ZONE_RESOURCE_ID** cannot be changed after the cluster has been created and it can't be deleted. Otherwise, the cluster will have issues performing upgrade operations.
115126

articles/app-service/manage-backup.md

Lines changed: 24 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,10 @@ In [Azure App Service](overview.md), you can easily restore app backups. You can
1515
Back up and restore are supported in **Basic**, **Standard**, **Premium**, and **Isolated** tiers. For **Basic** tier, only the production slot can be backed up and restored. For more information about scaling your App Service plan to use a higher tier, see [Scale up an app in Azure](manage-scale-up.md).
1616

1717
> [!NOTE]
18-
> For App Service environments:
18+
> For App Service Environments:
1919
>
20-
> - Automatic backups can be restored to a target app within the ASE itself, not in another ASE.
21-
> - Custom backups can be restored to a target app in another ASE, such as from a V2 ASE to a V3 ASE.
20+
> - Automatic backups can be restored to a target app within the App Service environment itself, not in another App Service environment.
21+
> - Custom backups can be restored to a target app in another App Service environment, such as from App Service Environment v2 to App Service Environment v3.
2222
> - Backups can be restored to target app of the same OS platform as the source app.
2323
2424
[!INCLUDE [backup-restore-vs-disaster-recovery](./includes/backup-restore-disaster-recovery.md)]
@@ -38,6 +38,7 @@ There are two types of backups in App Service. Automatic backups made for your a
3838
| Retention | 30 days, not configurable. <br>- Days 1-3: hourly backups retained.<br>- Days 4-14: every 3 hourly backup retained.<br>- Days 15-30: every 6 hourly backup retained. | 0-30 days or indefinite. |
3939
| Downloadable | No. | Yes, as Azure Storage blobs. |
4040
| Partial backups | Not supported. | Supported. |
41+
| Back up over VNet | Not supported. | Supported. |
4142

4243
<!-- - No file copy errors due to file locks. -->
4344

@@ -155,7 +156,7 @@ There are two types of backups in App Service. Automatic backups made for your a
155156
156157
#### Back up and restore a linked database
157158
158-
Custom backups can include linked databases. To make sure your backup includes a linked database, do the following:
159+
Custom backups can include linked databases (except when the backup is configured over an Azure Virtual Network). To make sure your backup includes a linked database, do the following:
159160
160161
1. Make sure the linked database is [supported](#automatic-vs-custom-backups).
161162
1. Create a connection string that points to your database. A database is considered "linked" to your app when there's a valid connection string for it in your app's configuration.
@@ -168,6 +169,22 @@ To restore a database that's included in a custom backup:
168169
169170
For troubleshooting information, see [Why is my linked database not backed up](#why-is-my-linked-database-not-backed-up).
170171
172+
## Back up and restore over Azure Virtual Network (preview)
173+
174+
With [custom backups](#create-a-custom-backup), you can back up your app's files and configuration data to a firewall-protected storage account if the following requirements are fulfilled:
175+
176+
- The app is [integrated with a virtual network](overview-vnet-integration.md), or the app is in a v3 [App Service environment](environment/app-service-app-service-environment-intro.md).
177+
- The storage account has [granted access from the virtual network](../storage/common/storage-network-security.md#grant-access-from-a-virtual-network) that the app is integrated with, or that the v3 App Service environment is created with.
178+
179+
To back up and restore over Azure Virtual Network:
180+
181+
1. When configuring [custom backups](#create-a-custom-backup), select **Backup/restore over virtual network integration**.
182+
1. Save your settings by selecting **Configure**.
183+
184+
If you don't see the checkbox, or if the checkbox is disabled, verify that you have fulfilled the aforementioned requirements.
185+
186+
Once the configuration is saved, any manual, scheduled backup, or restore is made through the virtual network. If you make changes to the app, the virtual network, or the storage account that prevent the app from accessing the storage account through the virtual network, the backup or restore operations will fail.
187+
171188
<a name="partialbackups"></a>
172189
173190
## Configure partial backups
@@ -300,6 +317,8 @@ The following table shows which app configuration is restored when you choose to
300317
301318
A custom backup (on-demand backup or scheduled backup) includes all content and configuration that's included in an [automatic backup](#whats-included-in-an-automatic-backup), plus any linked database, up to the allowable maximum size.
302319
320+
When [backing up over an Azure Virtual Network](#back-up-and-restore-over-azure-virtual-network-preview), you can't [back up the linked database](#back-up-and-restore-a-linked-database).
321+
303322
#### Why is my linked database not backed up?
304323
305324
Linked databases are backed up only for custom backups, up to the allowable maximum size. If the maximum backup size (10 GB) or the maximum database size (4 GB) is exceeded, your backup fails. Here are a few common reasons why your linked database isn't backed up:
@@ -314,10 +333,7 @@ Automatic backups can't be restored if the backup size exceeds the maximum size.
314333
315334
#### Can I use a storage account that has security features enabled?
316335
317-
The following security features in Azure storage aren't supported for custom backups:
318-
319-
* Using a [firewall enabled storage account](../storage/common/storage-network-security.md) as the destination for your backups isn't supported. If a backup is configured, you will encounter backup failures.
320-
* Using a [private endpoint enabled storage account](../storage/common/storage-private-endpoints.md) for backup and restore isn't supported.
336+
You can back up to a firewall-protected storage account if it's part of the same virtual network topology as your app. See [Back up and restore over Azure Virtual Network (preview)](#back-up-and-restore-over-azure-virtual-network-preview).
321337
322338
#### How do I restore to an app in a different subscription?
323339

articles/application-gateway/application-gateway-ssl-policy-overview.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,7 @@ Application Gateway supports the following cipher suites from which you can choo
131131

132132
- The connections to backend servers are always with minimum protocol TLS v1.0 and up to TLS v1.2. Therefore, only TLS versions 1.0, 1.1 and 1.2 are supported to establish a secured connection with backend servers.
133133
- As of now, the TLS 1.3 implementation is not enabled with &#34;Zero Round Trip Time (0-RTT)&#34; feature.
134+
- TLS session (ID or Tickets) resumption is not supported.
134135
- Application Gateway v2 doesn't support the following DHE ciphers. These won't be used for the TLS connections with clients even though they are mentioned in the predefined policies. Instead of DHE ciphers, secure and faster ECDHE ciphers are recommended.
135136
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
136137
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA
44.7 KB
Loading

articles/application-gateway/tutorial-protect-application-gateway-ddos.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to set up an application gateway and protect it with Azur
55
services: application-gateway
66
author: duongau
77
ms.author: duau
8-
ms.date: 04/06/2023
8+
ms.date: 09/20/2023
99
ms.topic: quickstart
1010
ms.service: application-gateway
1111
ms.custom: template tutorial
@@ -15,6 +15,8 @@ ms.custom: template tutorial
1515

1616
This article helps you create an Azure Application Gateway with a DDoS protected virtual network. Azure DDoS Network Protection enables enhanced DDoS mitigation capabilities such as adaptive tuning, attack alert notifications, and monitoring to protect your application gateways from large scale DDoS attacks.
1717

18+
:::image type="content" source="./media/tutorial-protect-application-gateway/ddos-protection-app-gateway.png" alt-text="Diagram of DDoS Protection connecting to an Application Gateway.":::
19+
1820
> [!IMPORTANT]
1921
> Azure DDoS Protection incurs a cost when you use the Network Protection SKU. Overages charges only apply if more than 100 public IPs are protected in the tenant. Ensure you delete the resources in this tutorial if you aren't using the resources in the future. For information about pricing, see [Azure DDoS Protection Pricing]( https://azure.microsoft.com/pricing/details/ddos-protection/). For more information about Azure DDoS protection, see [What is Azure DDoS Protection?](../ddos-protection/ddos-protection-overview.md).
2022
@@ -27,6 +29,8 @@ In this tutorial, you learn how to:
2729
> * Add VMs to the backend of the application gateway
2830
> * Test the application gateway
2931
32+
33+
3034
## Prerequisites
3135

3236
An Azure account with an active subscription is required. If you don't already have an account, you can [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).

articles/azure-arc/overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,6 @@ The following Azure Arc control plane functionality is offered at no extra cost:
6464
* Searching and indexing through Azure Resource Graph
6565
* Access and security through Azure Role-based access control (RBAC)
6666
* Environments and automation through templates and extensions
67-
* Update management
6867

6968
Any Azure service that is used on Azure Arc-enabled servers, such as Microsoft Defender for Cloud or Azure Monitor, will be charged as per the pricing for that service. For more information, see the [Azure pricing page](https://azure.microsoft.com/pricing/).
7069

Lines changed: 85 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,85 @@
1+
---
2+
title: Programmatically deploy and manage Azure Arc Extended Security Updates licenses
3+
description: Learn how to programmatically deploy and manage Azure Arc Extended Security Updates licenses for Windows Server 2012.
4+
ms.date: 09/20/2023
5+
ms.topic: conceptual
6+
---
7+
8+
# Programmatically deploy and manage Azure Arc Extended Security Updates licenses
9+
10+
This article provides instructions to programmatically provision and manage Windows Server 2012 and Windows Server 2012 R2 Extended Security Updates lifecycle operations through the Azure Arc WS2012 ESU ARM APIs.
11+
12+
> [!NOTE]
13+
> For each of the API commands, be sure to enter accurate parameter information for location, state, edition, type, and processors depending on your particular scenario
14+
>
15+
## Provision a license
16+
17+
To provision a license, execute the following commands:
18+
19+
```
20+
PUT
21+
https://management.azure.com/subscriptions/SUBSCRIPTION_ID/resourceGroups/RESOURCE_GROUP_NAME/providers/Microsoft.HybridCompute/licenses/LICENSE_NAME?api-version=2023-06-20-preview
22+
{ 
23+
    "location": "ENTER-REGION", 
24+
    "properties": { 
25+
        "licenseDetails": { 
26+
            "state": "Activated", 
27+
            "target": "Windows Server 2012", 
28+
            "Edition": "Datacenter", 
29+
            "Type": "pCore", 
30+
            "Processors": 12 
31+
        } 
32+
    } 
33+
}
34+
```
35+
36+
## Link a license
37+
38+
To link a license, execute the following commands:
39+
40+
```
41+
PUT
42+
https://management.azure.com/subscriptions/SUBSCRIPTION_ID/resourceGroups/RESOURCE_GROUP_NAME/providers/Microsoft.HybridCompute/machines/MACHINE_NAME/licenseProfiles/default?api-version=2023-06-20-preview
43+
{
44+
“location”: “SAME_REGION_AS_MACHINE”,
45+
“properties”: {
46+
“esuProfile”: {
47+
“assignedLicense”: “RESOURCE_ID_OF_LICENSE”
48+
}
49+
}
50+
}
51+
```
52+
53+
## Modify a license
54+
55+
To modify a license, execute the following commands:
56+
57+
```
58+
PUT/PATCH
59+
https://management.azure.com/subscriptions/SUBSCRIPTION_ID/resourceGroups/RESOURCE_GROUP_NAME/providers/Microsoft.HybridCompute/licenses/LICENSE_NAME?api-version=2023-06-20-preview
60+
{ 
61+
    "location": "ENTER-REGION", 
62+
    "properties": { 
63+
        "licenseDetails": { 
64+
            "state": "Activated", 
65+
            "target": "Windows Server 2012", 
66+
            "Edition": "Datacenter", 
67+
            "Type": "pCore", 
68+
            "Processors": 12 
69+
        } 
70+
    } 
71+
}
72+
```
73+
74+
> [!NOTE]
75+
> For PUT, all of the properties must be provided. For PATCH, a subset may be provided.
76+
>
77+
78+
## Delete a license
79+
80+
To delete a license, execute the following commands:
81+
82+
```
83+
DELETE
84+
https://management.azure.com/subscriptions/SUBSCRIPTION_ID/resourceGroups/RESOURCE_GROUP_NAME/providers/Microsoft.HybridCompute/licenses/LICENSE_NAME?api-version=2023-06-20-preview
85+
```

articles/azure-arc/servers/prepare-extended-security-updates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,12 +43,12 @@ To prepare for this new offer, you need to plan and prepare to onboard your mach
4343
We recommend you deploy your machines to Azure Arc in preparation for when the related Azure services deliver supported functionality to manage ESU. Once these machines are onboarded to Azure Arc-enabled servers, you'll have visibility into their ESU coverage and enroll through the Azure portal or using Azure Policy one month before Windows Server 2012 end of support. Billing for this service starts from October 2023, after Windows Server 2012 end of support.
4444

4545
> [!NOTE]
46-
> In order to purchase ESUs, you must have Software Assurance through Volume Licensing Programs such as an Enterprise Agreement (EA), Enterprise Agreement Subscription (EAS), Enrollment for Education Solutions (EES), or Server and Cloud Enrollment (SCE).
46+
> In order to purchase ESUs, you must have Software Assurance through Volume Licensing Programs such as an Enterprise Agreement (EA), Enterprise Agreement Subscription (EAS), Enrollment for Education Solutions (EES), or Server and Cloud Enrollment (SCE). Alternatively, if your Windows Server 2012/2012 R2 machines are licensed through SPLA or with a Server Subscription, Software Assurance is not required to purchase ESUs.
4747
>
4848
## Next steps
4949

5050
* Find out more about [planning for Windows Server and SQL Server end of support](https://www.microsoft.com/en-us/windows-server/extended-security-updates) and [getting Extended Security Updates](/windows-server/get-started/extended-security-updates-deploy).
5151

5252
* Learn about best practices and design patterns through the [Azure Arc landing zone accelerator for hybrid and multicloud](/azure/cloud-adoption-framework/scenarios/hybrid/arc-enabled-servers/eslz-identity-and-access-management).
5353
* Learn more about [Arc-enabled servers](overview.md) and how they work with Azure through the Azure Connected Machine agent.
54-
* Explore options for [onboarding your machines](plan-at-scale-deployment.md) to Azure Arc-enabled servers.
54+
* Explore options for [onboarding your machines](plan-at-scale-deployment.md) to Azure Arc-enabled servers.

articles/azure-arc/servers/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -135,6 +135,8 @@
135135
href: license-extended-security-updates.md
136136
- name: Deliver Extended Security Updates
137137
href: deliver-extended-security-updates.md
138+
- name: Programmatically manage Extended Security Updates licenses
139+
href: api-extended-security-updates.md
138140
- name: Troubleshoot Extended Security Updates
139141
href: troubleshoot-extended-security-updates.md
140142
- name: Troubleshooting

0 commit comments

Comments
 (0)