Skip to content

Commit cf83dcc

Browse files
committed
Merge remote-tracking branch 'upstream/main' into prot
2 parents ed0f850 + 388fdd7 commit cf83dcc

30 files changed

+852
-439
lines changed

articles/defender-for-iot/organizations/cli-ot-sensor.md

Lines changed: 267 additions & 1 deletion
Large diffs are not rendered by default.

articles/defender-for-iot/organizations/references-work-with-defender-for-iot-cli-commands.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ The following tables list the activities available by CLI and the privileged use
3939
|Service area |Users |Actions |
4040
|---------|---------|---------|
4141
|Sensor health | *admin*, *cyberx* | [Check OT monitoring services health](cli-ot-sensor.md#check-ot-monitoring-services-health) |
42-
|Reboot and shutdown | *admin*, *cyberx*, *cyberx_host* | [Restart an appliance](cli-ot-sensor.md#restart-an-appliance)<br>[Shut down an appliance](cli-ot-sensor.md#shutdown-an-appliance) |
42+
|Reboot and shutdown | *admin*, *cyberx*, *cyberx_host* | [Restart an appliance](cli-ot-sensor.md#restart-an-appliance)<br>[Shut down an appliance](cli-ot-sensor.md#shut-down-an-appliance) |
4343
|Software versions | *admin*, *cyberx* | [Show installed software version](cli-ot-sensor.md#show-installed-software-version) <br>[Update software version](update-ot-software.md) |
4444
|Date and time | *admin*, *cyberx*, *cyberx_host* | [Show current system date/time](cli-ot-sensor.md#show-current-system-datetime) |
4545
|NTP | *admin*, *cyberx* | [Turn on NTP time sync](cli-ot-sensor.md#turn-on-ntp-time-sync)<br>[Turn off NTP time sync](cli-ot-sensor.md#turn-off-ntp-time-sync) |
@@ -69,6 +69,12 @@ The following tables list the activities available by CLI and the privileged use
6969
|Physical interfaces management | *admin* | [Locate a physical port by blinking interface lights](cli-ot-sensor.md#locate-a-physical-port-by-blinking-interface-lights) |
7070
|Physical interfaces management | *admin*, *cyberx* | [List connected physical interfaces](cli-ot-sensor.md#list-connected-physical-interfaces) |
7171

72+
### Traffic capture filter commands
73+
74+
|Service area |Users |Actions |
75+
|---------|---------|---------|
76+
| Capture filter management | *admin*, *cyberx* | [Create a basic filter for all components](cli-ot-sensor.md#create-a-basic-filter-for-all-components)<br>[Create an advanced filter for specific components](cli-ot-sensor.md#create-an-advanced-filter-for-specific-components) <br>[List current capture filters for specific components](cli-ot-sensor.md#list-current-capture-filters-for-specific-components) <br> [Reset all capture filters](cli-ot-sensor.md#reset-all-capture-filters) |
77+
7278
## Defender for IoT CLI access
7379

7480
To access the Defender for IoT CLI, sign in to your OT or Enterprise IoT sensor or your on-premises management console using a terminal emulator and SSH.

articles/hdinsight-aks/release-notes/hdinsight-aks-release-notes-archive.md

Lines changed: 71 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Archived release notes for Azure HDInsight on AKS
33
description: Archived release notes for Azure HDInsight on AKS. Get development tips and details for Trino, Flink, and Spark.
44
ms.service: azure-hdinsight-on-aks
55
ms.topic: conceptual
6-
ms.date: 08/05/2024
6+
ms.date: 09/05/2024
77
---
88

99
# Azure HDInsight on AKS archived release notes
@@ -14,6 +14,76 @@ ms.date: 08/05/2024
1414

1515
Azure HDInsight on AKS is one of the most popular services among enterprise customers for open-source analytics on Azure. If you would like to subscribe on release notes, watch releases on this [GitHub repository](https://github.com/Azure/HDInsight-on-aks/releases).
1616

17+
### Release date: Aug 05, 2024
18+
19+
**This release applies to the following**
20+
21+
- Cluster Pool Version: 1.2
22+
- Cluster Version: 1.2.1
23+
- AKS version: 1.27
24+
25+
### New Features
26+
27+
**MSI based SQL authentication**
28+
Users can now authenticate external Azure SQL DB Metastore with MSI instead of User ID password authentication. This feature helps to further secure the cluster connection with Metastore.
29+
30+
**Configurable VM SKUs for Head node, SSH node**
31+
This functionality allows users to choose specific SKUs for head nodes, worker nodes, and SSH nodes, offering the flexibility to select according to the use case and the potential to lower total cost of ownership (TCO).
32+
33+
**Multiple MSI in cluster**
34+
Users can configure multiple MSI for cluster admins operations and for job related resource access. This feature allows users to demarcate and control the access to the cluster and data lying in the storage account.
35+
For example, one MSI for access to data in storage account and dedicated MSI for cluster operations.
36+
37+
### Updated
38+
39+
**Script action**
40+
Script Action now can be added with Sudo user permission. Users can now install multiple dependencies including custom jars to customize the clusters as required.
41+
42+
**Library Management**
43+
Maven repository shortcut feature added to the Library Management in this release. User can now install Maven dependencies directly from the open-source repositories.
44+
45+
**Spark 3.4**
46+
Spark 3.4 update brings a range of new features includes
47+
* API enhancements
48+
* Structured streaming improvements
49+
* Improved usability and developer experience
50+
51+
> [!IMPORTANT]
52+
> To take benefit of all these **latest features**, you are required to create a new cluster pool with 1.2 and cluster version 1.2.1
53+
54+
### Known issues
55+
56+
- **Workload identity limitation:**
57+
- There's a known [limitation](/azure/aks/workload-identity-overview#limitations) when transitioning to workload identity. This limitation is due to the permission-sensitive nature of FIC operations. Users can't perform deletion of a cluster by deleting the resource group. Cluster deletion requests must be triggered by the application/user/principal with FIC/delete permissions. In case, the FIC deletion fails, the high-level cluster deletion also fails.
58+
- **User Assigned Managed Identities (UAMI)** support – There's a limit of 20 FICs per UAMI. You can only create 20 Federated Credentials on an identity. In HDInsight on AKS cluster, FIC (Federated Identity Credential) and SA have one-to-one mapping and only 20 SAs can be created against an MSI. If you want to create more clusters, then you are required to provide different MSIs to overcome the limitation.
59+
- Creation of federated identity credentials is currently not supported on user-assigned managed identities created in [these regions](/entra/workload-id/workload-identity-federation-considerations#unsupported-regions-user-assigned-managed-identities)
60+
61+
62+
### Operating System version
63+
64+
- Mariner OS 2.0
65+
66+
**Workload versions**
67+
68+
|Workload|Version|
69+
| -------- | -------- |
70+
|Trino | 440 |
71+
|Flink | 1.17.0 |
72+
|Apache Spark | 3.4 |
73+
74+
**Supported Java and Scala versions**
75+
76+
|Workload |Java|Scala|
77+
| ----------- | -------- | -------- |
78+
|Trino |Open JDK 21.0.2  ||
79+
|Flink |Open JDK 11.0.21 |2.12.7 |
80+
|Spark |Open JDK 1.8.0_345  |2.12.15 |
81+
82+
The preview is available in the following [regions](../overview.md#region-availability-public-preview).
83+
84+
If you have any more questions, contact [Azure Support](https://ms.portal.azure.com/#view/Microsoft_Azure_Support/HelpAndSupportBlade/~/overview) or refer to the [Support options](../hdinsight-aks-support-help.md) page. If you have product specific feedback, write us on [aka.ms/askhdinsight](https://forms.office.com/pages/responsepage.aspx?id=v4j5cvGGr0GRqy180BHbR6HHTBN7UDpEhLm8BJmDhGJURDhLWEhBVE5QN0FQRUpHWDg4ODlZSDA4RCQlQCN0PWcu).
85+
86+
1787
### Release date: March 20, 2024
1888

1989
**This release applies to the following**

articles/hdinsight-aks/release-notes/hdinsight-aks-release-notes.md

Lines changed: 4 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,14 @@ title: Release notes for Azure HDInsight on AKS
33
description: Latest release notes for Azure HDInsight on AKS. Get development tips and details for Trino, Flink, Spark, and more.
44
ms.service: azure-hdinsight-on-aks
55
ms.topic: conceptual
6-
ms.date: 08/05/2024
6+
ms.date: 09/16/2024
77
---
88

99
# Azure HDInsight on AKS release notes
1010

1111
[!INCLUDE [retirement-notice](../includes/retirement-notice.md)]
1212
[!INCLUDE [feature-in-preview](../includes/feature-in-preview.md)]
1313

14-
15-
1614
This article provides information about the **most recent** Azure HDInsight on AKS release updates. For information on earlier releases, see [Azure HDInsight on AKS archived release notes](./hdinsight-aks-release-notes-archive.md). If you would like to subscribe on release notes, watch releases on this [GitHub repository](https://github.com/Azure/HDInsight-on-aks/releases).
1715

1816
## Summary
@@ -34,39 +32,21 @@ You can refer to [What's new](../whats-new.md) page for all the details of the f
3432
3533
## Release Information
3634

37-
### Release date: Aug 05, 2024
35+
### Release date: Sep 05, 2024
3836

3937
**This release applies to the following**
4038

4139
- Cluster Pool Version: 1.2
4240
- Cluster Version: 1.2.1
4341
- AKS version: 1.27
4442

45-
### New Features
46-
47-
**MSI based SQL authentication**
48-
Users can now authenticate external Azure SQL DB Metastore with MSI instead of User ID password authentication. This feature helps to further secure the cluster connection with Metastore.
4943

50-
**Configurable VM SKUs for Head node, SSH node**
51-
This functionality allows users to choose specific SKUs for head nodes, worker nodes, and SSH nodes, offering the flexibility to select according to the use case and the potential to lower total cost of ownership (TCO).
52-
53-
**Multiple MSI in cluster**
54-
Users can configure multiple MSI for cluster admins operations and for job related resource access. This feature allows users to demarcate and control the access to the cluster and data lying in the storage account.
55-
For example, one MSI for access to data in storage account and dedicated MSI for cluster operations.
5644

5745
### Updated
5846

59-
**Script action**
60-
Script Action now can be added with Sudo user permission. Users can now install multiple dependencies including custom jars to customize the clusters as required.
61-
62-
**Library Management**
63-
Maven repository shortcut feature added to the Library Management in this release. User can now install Maven dependencies directly from the open-source repositories.
47+
The latest API version release is as follows.
6448

65-
**Spark 3.4**
66-
Spark 3.4 update brings a range of new features includes
67-
* API enhancements
68-
* Structured streaming improvements
69-
* Improved usability and developer experience
49+
https://github.com/Azure/azure-rest-api-specs/blob/main/specification/hdinsight/resource-manager/Microsoft.HDInsight/HDInsightOnAks/preview/2024-05-01-preview/hdinsight.json.
7050

7151
> [!IMPORTANT]
7252
> To take benefit of all these **latest features**, you are required to create a new cluster pool with 1.2 and cluster version 1.2.1

articles/playwright-testing/how-to-configure-visual-comparisons.md

Lines changed: 21 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -44,40 +44,29 @@ Example service config that runs visual comparisons and configures the path for
4444

4545
```typeScript
4646
import { defineConfig } from '@playwright/test';
47+
import { getServiceConfig, ServiceOS } from '@azure/microsoft-playwright-testing';
4748
import config from './playwright.config';
48-
import dotenv from 'dotenv';
49-
50-
dotenv.config();
51-
52-
// Name the test run if it's not named yet.
53-
process.env.PLAYWRIGHT_SERVICE_RUN_ID = process.env.PLAYWRIGHT_SERVICE_RUN_ID || new Date().toISOString();
54-
55-
// Can be 'linux' or 'windows'.
56-
const os = process.env.PLAYWRIGHT_SERVICE_OS || 'linux';
57-
58-
export default defineConfig(config, {
59-
workers: 20,
60-
61-
// Enable screenshot testing and configure directory with expectations.
62-
ignoreSnapshots: false,
63-
snapshotPathTemplate: `{testDir}/__screenshots__/{testFilePath}/${os}/{arg}{ext}`,
64-
65-
use: {
66-
// Specify the service endpoint.
67-
connectOptions: {
68-
wsEndpoint: `${process.env.PLAYWRIGHT_SERVICE_URL}?cap=${JSON.stringify({
69-
os,
70-
runId: process.env.PLAYWRIGHT_SERVICE_RUN_ID
71-
})}`,
72-
timeout: 30000,
73-
headers: {
74-
'x-mpt-access-key': process.env.PLAYWRIGHT_SERVICE_ACCESS_TOKEN!
75-
},
76-
// Allow service to access the localhost.
77-
exposeNetwork: '<loopback>'
78-
}
49+
50+
/* Learn more about service configuration at https://aka.ms/mpt/config */
51+
export default defineConfig(
52+
config,
53+
getServiceConfig(config, {
54+
exposeNetwork: '<loopback>',
55+
timeout: 30000,
56+
os: ServiceOS.LINUX
57+
}),
58+
{
59+
/*
60+
Playwright Testing service reporter is added by default.
61+
This will override any reporter options specified in the base playwright config.
62+
If you are using more reporters, please update your configuration accordingly.
63+
*/
64+
reporter: [["list"], ['@azure/microsoft-playwright-testing/reporter']],
65+
ignoreSnapshots: false,
66+
// Enable screenshot testing and configure directory with expectations. 
67+
snapshotPathTemplate: `{testDir}/__screenshots__/{testFilePath}/${ServiceOS.LINUX}/{arg}{ext}`,
7968
}
80-
});
69+
);
8170
```
8271

8372
## Related content

articles/playwright-testing/how-to-manage-access-tokens.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,3 +105,4 @@ You can only delete access tokens that you created in a workspace. To create an
105105
## Related content
106106

107107
- Learn more about [managing access to a workspace](./how-to-manage-workspace-access.md).
108+
- Learn more about [managing authentication to the workspace](./how-to-manage-authentication.md)
Lines changed: 96 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,96 @@
1+
---
2+
title: Microsoft Playwright Testing authentication
3+
description: Learn how to manage authentication and authorization for Microsoft Playwright Testing preview
4+
ms.topic: how-to
5+
ms.date: 09/07/2024
6+
ms.custom: playwright-testing-preview
7+
---
8+
9+
# Manage authentication and authorization for Microsoft Playwright Testing preview
10+
11+
In this article, you learn how to manage authentication and authorization for Microsoft Playwright Testing preview. Authentication is required to run Playwright tests on cloud-hosted browsers and to publish test results and artifacts to the service.
12+
13+
By default, [Microsoft Entra ID](/entra/identity/) is used for authentication. This method is more secure and is the recommended authentication method. You can't disable authentication using Microsoft Entra ID. However, you can also use access tokens to authenticate and authorize.
14+
15+
16+
> [!IMPORTANT]
17+
> Microsoft Playwright Testing is currently in preview. For legal terms that apply to Azure features that are in beta, in preview, or otherwise not yet released into general availability, see the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
18+
19+
## Background
20+
21+
Microsoft Playwright Testing Preview is built on the Playwright open-source framework. It runs Playwright tests on cloud-hosted browsers and publishes reports and artifacts back to the service.
22+
23+
To use the service, the client must authenticate with the service to access the browsers. Similarly, publishing results and artifacts requires authenticated API interactions. The service offers two authentication methods: Microsoft Entra ID and access tokens.
24+
25+
Microsoft Entra ID uses your Azure credentials, requiring a sign-in to your Azure account for secure access. Alternatively, you can generate an access token from your Playwright workspace and use it in your setup. However, we strongly recommend Microsoft Entra ID for authentication due to its enhanced security. Access tokens, while convenient, function like long-lived passwords and are more susceptible to being compromised.
26+
27+
## Enable authentication using access-tokens
28+
29+
Microsoft Playwright Testing service also supports authentication using access tokens. This authentication method is less secure. We recommend using Microsoft Entra ID to authenticate to the service.
30+
31+
> [!CAUTION]
32+
> Your workspace access tokens are similar to a password for your Microsoft Playwright Testing workspace. Always be careful to protect your access tokens. Avoid distributing access tokens to other users, hard-coding them, or saving them anywhere in plain text that is accessible to others.
33+
34+
Revoke and recreate your tokens if you believe they are compromised.
35+
36+
To enable authentication using access tokens:
37+
38+
1. Sign in to the [Playwright portal](https://aka.ms/mpt/portal) with your Azure account and select your workspace.
39+
40+
1. Select the settings icon on the home page to go to the workspace settings.
41+
42+
1. Select the **Authentication** page and turn on **Enable authentication using Access tokens**
43+
44+
45+
:::image type="content" source="./media/how-to-manage-authentication/playwright-testing-enable-access-token.png" alt-text="Screenshot that shows the access tokens settings page in the Playwright portal." lightbox="./media/how-to-manage-authentication/playwright-testing-enable-access-token.png":::
46+
47+
> [!CAUTION]
48+
> Authentication using access tokens is less secure. [Learn how to manage access tokens](./how-to-manage-access-tokens.md)
49+
50+
## Set up authentication using access-tokens
51+
52+
1. While running the tests, enable access token auth in the `playwright.service.config.ts` file in your setup.
53+
54+
```typescript
55+
/* Learn more about service configuration at https://aka.ms/mpt/config */
56+
export default defineConfig(config, getServiceConfig( config {
57+
serviceAuthType:'ACCESS_TOKEN'
58+
}));
59+
```
60+
61+
1. Create access token
62+
63+
Follow the steps to [create an access token](./how-to-manage-access-tokens.md#generate-a-workspace-access-token)
64+
65+
1. Set up your environment
66+
67+
To set up your environment, you have to configure the `PLAYWRIGHT_SERVICE_ACCESS_TOKEN` environment variable with the value you obtained in the previous steps.
68+
69+
We recommend that you use the `dotenv` module to manage your environment. With `dotenv`, you define your environment variables in the `.env` file.
70+
71+
1. Add the `dotenv` module to your project:
72+
73+
```shell
74+
npm i --save-dev dotenv
75+
```
76+
77+
1. Create a `.env` file alongside the `playwright.config.ts` file in your Playwright project:
78+
79+
```
80+
PLAYWRIGHT_SERVICE_ACCESS_TOKEN={MY-ACCESS-TOKEN}
81+
```
82+
83+
Make sure to replace the `{MY-ACCESS-TOKEN}` text placeholder with the value you copied earlier.
84+
85+
86+
## Run tests on the service and publish results
87+
88+
Run Playwright tests against cloud-hosted browsers and publish the results to the service using the configuration you created above.
89+
90+
```typescript
91+
npx playwright test --config=playwright.service.config.ts --workers=20
92+
```
93+
94+
## Related content
95+
96+
- Learn more about [managing access tokens](./how-to-manage-access-tokens.md).

articles/playwright-testing/how-to-test-local-applications.md

Lines changed: 12 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -24,25 +24,18 @@ You can specify one or multiple networks by using a list of rules. For example,
2424
You can configure the `exposeNetwork` option in `playwright.service.config.ts`. The following example shows how to expose the `localhost` network by using the [`<loopback>`](https://en.wikipedia.org/wiki/Loopback) rule:
2525

2626
```typescript
27-
export default defineConfig(config, {
28-
workers: 20,
29-
use: {
30-
// Specify the service endpoint.
31-
connectOptions: {
32-
wsEndpoint: `${process.env.PLAYWRIGHT_SERVICE_URL}?cap=${JSON.stringify({
33-
// Can be 'linux' or 'windows'.
34-
os: process.env.PLAYWRIGHT_SERVICE_OS || 'linux',
35-
runId: process.env.PLAYWRIGHT_SERVICE_RUN_ID
36-
})}`,
37-
timeout: 30000,
38-
headers: {
39-
'x-mpt-access-key': process.env.PLAYWRIGHT_SERVICE_ACCESS_TOKEN!
40-
},
41-
// Allow service to access the localhost.
42-
exposeNetwork: '<loopback>'
43-
}
44-
}
45-
});
27+
import { getServiceConfig, ServiceOS } from "@azure/microsoft-playwright-testing";
28+
import { defineConfig } from "@playwright/test";
29+
import { AzureCliCredential } from "@azure/identity";
30+
import config from "./playwright.config";
31+
32+
export default defineConfig(
33+
config,
34+
getServiceConfig(config, {
35+
exposeNetwork: '<loopback>', // Allow service to access the localhost.
36+
}),
37+
);
38+
4639
```
4740

4841
You can now reference `localhost` in the Playwright test code, and run the tests on cloud-hosted browsers with Microsoft Playwright Testing:

0 commit comments

Comments
 (0)