Skip to content

Commit cf8ef6d

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into 1678688-adding-zone-pivots-bing-news-search
2 parents be91231 + 3e9be5c commit cf8ef6d

File tree

71 files changed

+1968
-473
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

71 files changed

+1968
-473
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -277,6 +277,11 @@
277277
"url": "https://github.com/Azure/pcs-remote-monitoring-webui.git",
278278
"branch": "master"
279279
},
280+
{
281+
"path_to_root": "MachineLearningNotebooks",
282+
"url": "https://github.com/Azure/MachineLearningNotebooks",
283+
"branch": "master"
284+
},
280285
{
281286
"path_to_root": "aml-sdk-samples",
282287
"url": "https://github.com/Azure/MachineLearningNotebooks",

articles/api-management/api-management-using-with-vnet.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,10 +175,12 @@ When an API Management service instance is hosted in a VNET, the ports in the fo
175175
## <a name="subnet-size"> </a> Subnet Size Requirement
176176
Azure reserves some IP addresses within each subnet, and these addresses can't be used. The first and last IP addresses of the subnets are reserved for protocol conformance, along with three more addresses used for Azure services. For more information, see [Are there any restrictions on using IP addresses within these subnets?](../virtual-network/virtual-networks-faq.md#are-there-any-restrictions-on-using-ip-addresses-within-these-subnets)
177177

178-
In addition to the IP addresses used by the Azure VNET infrastructure, each Api Management instance in the subnet uses two IP addresses per unit of Premium SKU or one IP address for the Developer SKU. Each instance reserves an additional IP address for the external load balancer. When deploying into Internal vnet, it requires an additional IP address for the internal load balancer.
178+
In addition to the IP addresses used by the Azure VNET infrastructure, each Api Management instance in the subnet uses two IP addresses per unit of Premium SKU or one IP address for the Developer SKU. Each instance reserves an additional IP address for the external load balancer. When deploying into Internal virtual network, it requires an additional IP address for the internal load balancer.
179179

180180
Given the calculation above the minimum size of the subnet, in which API Management can be deployed is /29 that gives three usable IP addresses.
181181

182+
Each additional scale unit of API Management requires two more IP addresses.
183+
182184
## <a name="routing"> </a> Routing
183185
+ A load balanced public IP address (VIP) will be reserved to provide access to all service endpoints.
184186
+ An IP address from a subnet IP range (DIP) will be used to access resources within the vnet and a public IP address (VIP) will be used to access resources outside the vnet.

articles/avere-vfxt/index.yml

Lines changed: 66 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,70 @@
1-
### YamlMime:YamlDocument
2-
documentType: LandingData
3-
title: Avere vFXT for Azure Documentation
1+
### YamlMime:Landing
2+
3+
title: Avere vFXT for Azure documentation
4+
summary: Avere vFXT for Azure provides a cloud-based cache layer for data-intensive high-performance computing (HPC) tasks.
5+
46
metadata:
5-
title: Avere vFXT for Azure Documentation
6-
description: Use Avere vFXT as a caching layer for read-intensive high-performance computing (HPC) tasks
7-
services: avere-vfxt
8-
author: ekpgh
7+
title: Avere vFXT for Azure documentation
8+
description: Use Avere vFXT as a caching layer for read-intensive high-performance computing (HPC) tasks.
99
ms.service: avere-vfxt
1010
ms.topic: landing-page
11-
ms.date: 12/19/2019
11+
author: ronhogue
1212
ms.author: rohogue
13-
abstract:
14-
description: Avere vFXT for Azure provides a cloud-based cache layer for data-intensive high-performance computing (HPC) tasks. By caching files close to your compute nodes, Avere vFXT speeds read times and lets you work more smoothly, even at peak load. Avere vFXT works best with systems that have between 1,000 and 40,000 client cores. <p>Avere vFXT works with your existing data storage to bring files close to Azure-based computing resources. Active files are still stored for the long term in your data center.
15-
sections:
16-
- title: Get started with Avere vFXT for Azure
17-
items:
18-
- type: list
19-
style: unordered
20-
items:
21-
- html: <a href="avere-vfxt-deploy-plan">Plan your Avere vFXT for Azure system</a>
22-
- html: <a href="avere-vfxt-deploy-overview">Learn about Avere vFXT deployment</a>
23-
- html: <a href="avere-vfxt-prereqs">Fulfill prerequisites</a>
24-
- html: <a href="avere-vfxt-deploy">Deploy the Avere vFXT cluster</a>
25-
13+
ms.date: 03/11/2020
14+
15+
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | sample | tutorial | video | whats-new
16+
17+
landingContent:
18+
# Card
19+
- title: About Avere vFXT for Azure
20+
linkLists:
21+
- linkListType: overview
22+
links:
23+
- text: What is Avere vFXT for Azure?
24+
url: avere-vfxt-overview.md
25+
- linkListType: concept
26+
links:
27+
- text: FAQ
28+
url: avere-vfxt-faq.md
29+
30+
# Card
31+
- title: Plan and prepare
32+
linkLists:
33+
- linkListType: concept
34+
links:
35+
- text: Plan your Avere vFXT system
36+
url: avere-vfxt-deploy-plan.md
37+
- linkListType: how-to-guide
38+
links:
39+
- text: Prepare to create the Avere vFXT
40+
url: avere-vfxt-prereqs.md
41+
42+
# Card
43+
- title: Create and deploy
44+
linkLists:
45+
- linkListType: concept
46+
links:
47+
- text: Deployment overview
48+
url: avere-vfxt-deploy-overview.md
49+
- linkListType: how-to-guide
50+
links:
51+
- text: Deploy the vFXT cluster
52+
url: avere-vfxt-deploy.md
53+
54+
# Card
55+
- title: Connect and manage
56+
linkLists:
57+
- linkListType: how-to-guide
58+
links:
59+
- text: Access the vFXT cluster
60+
url: avere-vfxt-cluster-gui.md
61+
- text: Enable support uploads
62+
url: avere-vfxt-enable-support.md
63+
- text: Configure storage
64+
url: avere-vfxt-add-storage.md
65+
- text: Mount the Avere vFXT cluster
66+
url: avere-vfxt-mount-clients.md
67+
- text: Move data to the vFXT cluster
68+
url: avere-vfxt-data-ingest.md
69+
- text: Manage the Avere vFXT cluster
70+
url: avere-vfxt-manage-cluster.md

articles/azure-app-configuration/TOC.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -64,8 +64,6 @@
6464
items:
6565
- name: Key-value store
6666
href: concept-key-value.md
67-
- name: Encrypt using customer-managed keys
68-
href: concept-customer-managed-keys.md
6967
- name: Point-in-time snapshot
7068
href: concept-point-time-snapshot.md
7169
- name: Feature management
@@ -74,8 +72,12 @@
7472
href: concept-github-action.md
7573
- name: Event handling
7674
href: concept-app-configuration-event.md
77-
- name: Authentication
75+
- name: Security
7876
items:
77+
- name: Encrypt using customer-managed keys
78+
href: concept-customer-managed-keys.md
79+
- name: Secure your config store using Private Endpoints
80+
href: concept-private-endpoint.md
7981
- name: Integrate with Azure Managed Identity
8082
href: howto-integrate-azure-managed-service-identity.md
8183
- name: Enable access using Azure Active Directory
Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
---
2+
title: Using private endpoints for Azure App Configuration
3+
description: Secure your App Configuration store using private endpoints
4+
services: azure-app-configuration
5+
author: lisaguthrie
6+
ms.service: azure-app-configuration
7+
ms.topic: conceptual
8+
ms.date: 3/12/2020
9+
ms.author: lcozzens
10+
11+
#Customer intent: As a developer using Azure App Configuration, I want to understand how to use private endpoints to enable secure communication with my App Configuration instance.
12+
---
13+
# Using private endpoints for Azure App Configuration
14+
15+
You can use [private endpoints](../private-link/private-endpoint-overview.md) for Azure App Configuration to allow clients on a virtual network (VNet) to securely access data over a [private link](../private-link/private-link-overview.md). The private endpoint uses an IP address from the VNet address space for your App Configuration store. Network traffic between the clients on the VNet and the App Configuration store traverses over the VNet using a private link on the Microsoft backbone network, eliminating exposure to the public internet.
16+
17+
Using private endpoints for your App Configuration store enables you to:
18+
- Secure your application configuration details by configuring the firewall to block all connections to App Configuration on the public endpoint.
19+
- Increase security for the virtual network (VNet) ensuring data doesn't escape from the VNet.
20+
- Securely connect to the App Configuration store from on-premises networks that connect to the VNet using [VPN](../vpn-gateway/vpn-gateway-about-vpngateways.md) or [ExpressRoutes](../expressroute/expressroute-locations.md) with private-peering.
21+
22+
> [!NOTE]
23+
> Azure App Configuration offers the use of private endpoints as a public preview. Public preview offerings allow customers to experiment with new features prior to their official release. Public preview features and services are not meant for production use.
24+
25+
## Conceptual Overview
26+
27+
A private endpoint is a special network interface for an Azure service in your [Virtual Network](../virtual-network/virtual-networks-overview.md) (VNet). When you create a private endpoint for your App Config store, it provides secure connectivity between clients on your VNet and your configuration store. The private endpoint is assigned an IP address from the IP address range of your VNet. The connection between the private endpoint and the configuration store uses a secure private link.
28+
29+
Applications in the VNet can connect to the configuration store over the private endpoint **using the same connection strings and authorization mechanisms that they would use otherwise**. Private endpoints can be used with all protocols supported by the App Configuration store.
30+
31+
While App Configuration doesn't support service endpoints, private endpoints can be created in subnets that use [Service Endpoints](../virtual-network/virtual-network-service-endpoints-overview.md). Clients in a subnet can connect securely to an App Configuration store using the private endpoint while using service endpoints to access others.
32+
33+
When you create a private endpoint for a service in your VNet, a consent request is sent for approval to the service account owner. If the user requesting the creation of the private endpoint is also an owner of the account, this consent request is automatically approved.
34+
35+
Service account owners can manage consent requests and private endpoints through the `Private Endpoints` tab of the config store in the [Azure portal](https://portal.azure.com).
36+
37+
### Private Endpoints for App Configuration
38+
39+
When creating a private endpoint, you must specify the App Configuration store to which it connects. If you have multiple App Configuration instances within an account, you need a separate private endpoint for each store.
40+
41+
#### Resources for creating private endpoints
42+
43+
For more detailed information on creating a private endpoint for your App Configuration store, refer to the following articles:
44+
45+
- [Create a private endpoint using the Private Link Center in the Azure portal](../private-link/create-private-endpoint-portal.md)
46+
- [Create a private endpoint using Azure CLI](../private-link/create-private-endpoint-cli.md)
47+
- [Create a private endpoint using Azure PowerShell](../private-link/create-private-endpoint-powershell.md)
48+
49+
### Connecting to Private Endpoints
50+
51+
Azure relies upon DNS resolution to route connections from the VNet to the configuration store over a private link. You can quickly find connections strings in the Azure portal by selecting your App Configuration store, then selecting **Settings** > **Access Keys**.
52+
53+
> [!IMPORTANT]
54+
> Use the same connection string to connect to your App Configuration store using private endpoints as you would use for a public endpoint. Don't connect to the storage account using its `privatelink` subdomain URL.
55+
56+
## DNS changes for Private Endpoints
57+
58+
When you create a private endpoint, the DNS CNAME resource record for the configuration store is updated to an alias in a subdomain with the prefix `privatelink`. Azure also creates a [private DNS zone](../dns/private-dns-overview.md) corresponding to the `privatelink` subdomain, with the DNS A resource records for the private endpoints.
59+
60+
When you resolve the endpoint URL from outside the VNet, it resolves to the public endpoint of the store. When resolved from within the VNet hosting the private endpoint, the endpoint URL resolves to the private endpoint.
61+
62+
You can control access for clients outside the VNet through the public endpoint using the Azure Firewall service.
63+
64+
This approach enables access to the store **using the same connection string** for clients on the VNet hosting the private endpoints as well as clients outside the VNet.
65+
66+
If you are using a custom DNS server on your network, clients must be able to resolve the fully qualified domain name (FQDN) for the service endpoint to the private endpoint IP address. Configure your DNS server to delegate your private link subdomain to the private DNS zone for the VNet, or configure the A records for `AppConfigInstanceA.privatelink.azconfig.io` with the private endpoint IP address.
67+
68+
> [!TIP]
69+
> When using a custom or on-premises DNS server, you should configure your DNS server to resolve the store name in the `privatelink` subdomain to the private endpoint IP address. You can do this by delegating the `privatelink` subdomain to the private DNS zone of the VNet, or configuring the DNS zone on your DNS server and adding the DNS A records.
70+
71+
#### Resources for configuring your DNS server with private endpoints
72+
73+
For more information, see:
74+
75+
- [Name resolution for resources in Azure virtual networks](/azure/virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances#name-resolution-that-uses-your-own-dns-server)
76+
- [DNS configuration for Private Endpoints](/azure/private-link/private-endpoint-overview#dns-configuration)
77+
78+
## Pricing
79+
80+
Enabling private endpoints requires a [Standard tier](https://azure.microsoft.com/pricing/details/app-configuration/) App Configuration store. To learn about private link pricing details, see [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link).

articles/azure-app-configuration/enable-dynamic-configuration-java-spring-app.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,4 +49,7 @@ Save the file, then build and run your application as usual.
4949

5050
## Next steps
5151

52-
In this tutorial, you enabled your Spring Boot app to dynamically refresh configuration settings from App Configuration. For more information, see [Spring on Azure](https://docs.microsoft.com/java/azure/spring-framework/).
52+
In this tutorial, you enabled your Spring Boot app to dynamically refresh configuration settings from App Configuration. To learn how to use an Azure managed identity to streamline the access to App Configuration, continue to the next tutorial.
53+
54+
> [!div class="nextstepaction"]
55+
> [Managed identity integration](./howto-integrate-azure-managed-service-identity.md)

articles/azure-app-configuration/quickstart-java-spring-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ Use the [Spring Initializr](https://start.spring.io/) to create a new Spring Boo
181181

182182
## Next steps
183183

184-
In this quickstart, you created a new App Configuration store and used it with a Java Spring app. For more information, see [Spring on Azure](https://docs.microsoft.com/java/azure/spring-framework/). To learn how to use an Azure managed identity to streamline access to App Configuration, continue to the next tutorial.
184+
In this quickstart, you created a new App Configuration store and used it with a Java Spring app. For more information, see [Spring on Azure](https://docs.microsoft.com/java/azure/spring-framework/). To learn how to enable your Java Spring app to dynamically refresh configuration settings, continue to the next tutorial.
185185

186186
> [!div class="nextstepaction"]
187-
> [Managed identity integration](./howto-integrate-azure-managed-service-identity.md)
187+
> [Enable dynamic configuration](./enable-dynamic-configuration-java-spring-app.md)
9.54 KB
Loading
68.2 KB
Loading
10.2 KB
Loading

0 commit comments

Comments
 (0)