Skip to content

Commit cb2eca5

Browse files
committed
Merge branch 'main' of https://github.com/seesharprun/azure-docs-pr into cosmos-rename-how-to-model-partition-example
2 parents 45f6a41 + 29f9cbc commit cb2eca5

22 files changed

+559
-196
lines changed

articles/aks/command-invoke.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.date: 1/14/2022
77

88
# Use `command invoke` to access a private Azure Kubernetes Service (AKS) cluster
99

10-
Accessing a private AKS cluster requires that you connect to that cluster either from the cluster virtual network, from a peered network, or via a configured private endpoint. These approaches require configuring a VPN, Express Route, deploying a *jumpbox* within the cluster virtual network, or creating a private endpoint inside of another virtual network. Alternatively, you can use `command invoke` to access private clusters without having to configure a VPN or Express Route. Using `command invoke` allows you to remotely invoke commands like `kubectl` and `helm` on your private cluster through the Azure API without directly connecting to the cluster. Permissions for using `command invoke` are controlled through the `Microsoft.ContainerService/managedClusters/runcommand/action` and `Microsoft.ContainerService/managedclusters/commandResults/read` roles.
10+
Accessing a private AKS cluster requires that you connect to that cluster either from the cluster virtual network, from a peered network, or via a configured private endpoint. These approaches require configuring a VPN, Express Route, deploying a *jumpbox* within the cluster virtual network, or creating a private endpoint inside of another virtual network. Alternatively, you can use `command invoke` to access private clusters without having to configure a VPN or Express Route. Using `command invoke` allows you to remotely invoke commands like `kubectl` and `helm` on your private cluster through the Azure API without directly connecting to the cluster. Permissions for using `command invoke` are controlled through the `Microsoft.ContainerService/managedClusters/runcommand/action` and `Microsoft.ContainerService/managedclusters/commandResults/read` actions.
1111

1212
## Prerequisites
1313

articles/aks/workload-identity-migrate-from-pod-identity.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ If your application is using managed identity and still relies on IMDS to get an
120120
To update or deploy the workload, add these pod annotations only if you want to use the migration sidecar. You inject the following [annotation][pod-annotations] values to use the sidecar in your pod specification:
121121

122122
* `azure.workload.identity/inject-proxy-sidecar` - value is `true` or `false`
123-
* `azure.workload.identity/proxy-sidecar-port` - value is the desired port for the proxy sidecar. The default value is `8080`.
123+
* `azure.workload.identity/proxy-sidecar-port` - value is the desired port for the proxy sidecar. The default value is `8000`.
124124

125125
When a pod with the above annotations is created, the Azure Workload Identity mutating webhook automatically injects the init-container and proxy sidecar to the pod spec.
126126

@@ -148,7 +148,7 @@ spec:
148148
runAsUser: 0
149149
env:
150150
- name: PROXY_PORT
151-
value: "8080"
151+
value: "8000"
152152
containers:
153153
- name: nginx
154154
image: nginx:alpine
@@ -157,7 +157,7 @@ spec:
157157
- name: proxy
158158
image: mcr.microsoft.com/oss/azure/workload-identity/proxy:v0.13.0
159159
ports:
160-
- containerPort: 8080
160+
- containerPort: 8000
161161
```
162162
163163
This configuration applies to any configuration where a pod is being created. After updating or deploying your application, you can verify the pod is in a running state using the [kubectl describe pod][kubectl-describe] command. Replace the value `podName` with the image name of your deployed pod.
@@ -210,4 +210,4 @@ This article showed you how to set up your pod to authenticate using a workload
210210

211211
<!-- EXTERNAL LINKS -->
212212
[kubectl-describe]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#describe
213-
[kubelet-logs]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#logs
213+
[kubelet-logs]: https://kubernetes.io/docs/reference/generated/kubectl/kubectl-commands#logs

articles/azure-monitor/app/statsbeat.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,8 @@ Statsbeat supports EU Data Boundary for Application Insights resources in the fo
4646
| Sweden | Sweden Central |
4747
| Switzerland | Switzerland North |
4848
| Switzerland | Switzerland West |
49-
49+
| United Kingdom | United Kingdom South |
50+
| United Kingdom | United Kingdom West |
5051

5152
#### [Node](#tab/eu-node)
5253

@@ -63,7 +64,9 @@ Statsbeat supports EU Data Boundary for Application Insights resources in the fo
6364
| Norway | Norway West |
6465
| Sweden | Sweden Central |
6566
| Switzerland | Switzerland North |
66-
| Switzerland | Switzerland West |
67+
| Switzerland | Switzerland West |
68+
| United Kingdom | United Kingdom South |
69+
| United Kingdom | United Kingdom West |
6770

6871
#### [Python](#tab/eu-python)
6972

@@ -80,7 +83,9 @@ Statsbeat supports EU Data Boundary for Application Insights resources in the fo
8083
| Norway | Norway West |
8184
| Sweden | Sweden Central |
8285
| Switzerland | Switzerland North |
83-
| Switzerland | Switzerland West |
86+
| Switzerland | Switzerland West |
87+
| United Kingdom | United Kingdom South |
88+
| United Kingdom | United Kingdom West |
8489

8590

8691
---

0 commit comments

Comments
 (0)