You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-sync/concept-attributes.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.topic: conceptual
11
11
ms.tgt_pltfrm: na
12
12
ms.workload: identity
13
-
ms.date: 02/18/2019
13
+
ms.date: 02/25/2021
14
14
ms.subservice: hybrid
15
15
ms.author: billmath
16
16
@@ -71,7 +71,7 @@ To view the schema and verify it, follow these steps.
71
71
1. Go to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
72
72
1. Sign in with your global administrator account.
73
73
1. On the left, select **modify permissions** and ensure that **Directory.ReadWrite.All** is *Consented*.
74
-
1. Run the query `https://graph.microsoft.com/beta/serviceprincipals/?$filter=startswith(Displayname,'Active')`. This query returns a filtered list of service principals.
74
+
1. Run the query `https://graph.microsoft.com/beta/serviceprincipals/?$filter=startswith(DisplayName, ‘{sync config name}’)`. This query returns a filtered list of service principals. This can also be acquire via the App Registration node under Azure Active Directory.
75
75
1. Locate `"appDisplayName": "Active Directory to Azure Active Directory Provisioning"` and note the value for `"id"`.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/supported-accounts-validation.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ See the following table for the validation differences of various properties for
42
42
| appRoles | Supported <br> No limit\*| Supported <br> No limit\*| Not supported |
43
43
| Front-channel logout URL |https://localhost is allowed <br><br> `http` scheme isn't allowed <br><br> Maximum length of 255 characters |https://localhost is allowed <br><br> `http` scheme isn't allowed <br><br> Maximum length of 255 characters |https://localhost is allowed, http://localhost fails <br><br> `http` scheme isn't allowed <br><br> Maximum length of 255 characters <br><br> Wildcards aren't supported |
44
44
| Display name | Maximum length of 120 characters | Maximum length of 120 characters | Maximum length of 90 characters |
45
-
| Tags | Individual tag size must be between 1 and 256 characters (inclusive). No whitespaces or duplicate tags allowed. | Individual tag size must be between 1 and 256 characters (inclusive). No whitespaces or duplicate tags allowed. | Individual tag size must be between 1 and 256 characters (inclusive). No whitespaces or duplicate tags allowed. |
45
+
| Tags | Individual tag size must be between 1 and 256 characters (inclusive) <br><br> No whitespaces or duplicate tags allowed <br><br> No limit\* on number of tags | Individual tag size must be between 1 and 256 characters (inclusive) <br><br> No whitespaces or duplicate tags allowed <br><br> No limit\* on number of tags | Individual tag size must be between 1 and 256 characters (inclusive) <br><br> No whitespaces or duplicate tags allowed <br><br> No limit\* on number of tags |
46
46
47
47
\* There's a global limit of about 1000 items across all the collection properties on the app object.
Copy file name to clipboardExpand all lines: articles/app-service/faq-app-service-linux.yml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -127,7 +127,7 @@ sections:
127
127
- question: |
128
128
What is the format for the private registry server URL?
129
129
answer: |
130
-
Provide the full registry URL, including `http://` or `https://`.
130
+
Provide the full registry URL, including `http://` or `https://`. For Azure Container Registry with private endpoints and pulling images over virtual network, explicitly remove the `http://` or `https://` when using Admin credentials (for example, myacr.azurecr.io).
131
131
132
132
- question: |
133
133
What is the format for the image name in the private registry option?
- DOCKER_REGISTRY_SERVER_URL (full URL, ex: `https://<server-name>.azurecr.io`). With private endpoints and virtual networks, remove the `http://` or `https://` when using Admin credentials.
175
175
- DOCKER_REGISTRY_SERVER_PASSWORD (enable admin access in ACR settings)
176
176
177
177
Within the configuration file, reference your ACR image like the following example:
Copy file name to clipboardExpand all lines: articles/azure-arc/data/create-sql-managed-instance-azure-data-studio.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,6 +33,11 @@ This document walks you through the steps for installing Azure SQL Managed Insta
33
33
- Enter and confirm a password for the SQL Server instance
34
34
- Select the storage class as appropriate for data
35
35
- Select the storage class as appropriate for logs
36
+
- Select the storage class as appropriate for backups
37
+
38
+
> [!NOTE]
39
+
>Note: Starting with the February release, a ReadWriteMany (RWX) capable storage class needs to be specified for backups. Learn more about [access modes](https://kubernetes.io/docs/concepts/storage/persistent-volumes/#access-modes)
40
+
If no storage class is specified for backups, the default storage class in kubernetes is used and if this is not RWX capable, the Arc SQL Managed Instance installation may not succeed.
Copy file name to clipboardExpand all lines: articles/azure-arc/data/create-sql-managed-instance.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,28 +25,34 @@ az sql mi-arc create --help
25
25
26
26
To create a SQL Managed Instance, use `az sql mi-arc create`. See the following examples for different connectivity modes:
27
27
28
+
> [!NOTE]
29
+
> Starting with the February release, a ReadWriteMany (RWX) capable storage class needs to be specified for backups. Learn more about [access modes](https://kubernetes.io/docs/concepts/storage/persistent-volumes/#access-modes)
30
+
If no storage class is specified for backups, the default storage class in kubernetes is used and if this is not RWX capable, the Arc SQL Managed Instance installation may not succeed.
31
+
32
+
33
+
28
34
### [Indirectly connected mode](#tab/indirectly)
29
35
30
36
```azurecli
31
-
az sql mi-arc create -n <instanceName> --k8s-namespace <namespace> --use-k8s
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/tutorial-arc-enabled-open-service-mesh.md
+44-7Lines changed: 44 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ OSM runs an Envoy-based control plane on Kubernetes, can be configured with [SMI
37
37
- Ensure you have met all the common prerequisites for cluster extensions listed [here](extensions.md#prerequisites).
38
38
- Use az k8s-extension CLI version >= v0.4.0
39
39
40
-
## Basic Installation of Azure Arc-enabled OSM on an Azure Arc-enabled Kubernetes Cluster
40
+
## Basic installation of Azure Arc-enabled OSM
41
41
42
42
The following steps assume that you already have a cluster with a supported Kubernetes distribution connected to Azure Arc.
43
43
Ensure that your KUBECONFIG environment variable points to the kubeconfig of the Arc-enabled Kubernetes cluster.
@@ -89,7 +89,7 @@ You should see output similar to the output shown below. It may take 3-5 minutes
89
89
}
90
90
```
91
91
92
-
## Custom Installations of Azure Arc-enabled OSM
92
+
## Custom installations of Azure Arc-enabled OSM
93
93
The following sections describe certain custom installations of Azure Arc-enabled OSM. Custom installations require setting
94
94
values of OSM by in a JSON file and passing them into `k8s-extension create` CLI command as described below.
95
95
@@ -113,15 +113,52 @@ It may take 3-5 minutes for the actual OSM helm chart to get deployed to the clu
113
113
114
114
To ensure that the privileged init container setting is not reverted to the default, pass in the "osm.osm.enablePrivilegedInitContainer" : "true" configuration setting to all subsequent az k8s-extension create commands.
115
115
116
+
### Enable High Availability features on installation
117
+
OSM's control plane components are built with High Availability and Fault Tolerance in mind. This section describes how to
118
+
enable Horizontal Pod Autoscaling (HPA) and Pod Disruption Budget (PDB) during installation. Read more on the design
119
+
considerations of High Availability on OSM [here](https://openservicemesh.io/docs/guides/ha_scale/high_availability/).
120
+
121
+
#### Horizontal Pod Autoscaling (HPA)
122
+
HPA automatically scales up or down control plane pods based on the average target CPU utilization (%) and average target
123
+
memory utilization (%) defined by the user. To enable HPA and set applicable values on OSM control plane pods during installation, create or
124
+
append to your existing JSON settings file as below, repeating the key/value pairs for each control plane pod
125
+
(`osmController`, `injector`) that you want to enable HPA on.
Now, [install OSM with custom values](#setting-values-during-osm-installation).
152
+
116
153
### Install OSM with cert-manager for Certificate Management
117
154
[cert-manager](https://cert-manager.io/) is a provider that can be used for issuing signed certificates to OSM without
118
155
the need for storing private keys in Kubernetes. Refer to OSM's [cert-manager documentation](https://release-v0-11.docs.openservicemesh.io/docs/guides/certificates/)
119
156
and [demo](https://docs.openservicemesh.io/docs/demos/cert-manager_integration/) to learn more.
120
157
> [!NOTE]
121
158
> Use the commands provided in the OSM GitHub documentation with caution. Ensure that you use the correct namespace name `arc-osm-system`.
122
159
123
-
To install OSM with cert-manager as the certificate provider, create a JSON file with the `certificateProvider.kind`value set to
124
-
cert-manager as shown below. If you would like to change from default cert-manager values specified in OSM documentation,
160
+
To install OSM with cert-manager as the certificate provider, create or append to your existing JSON settings file the `certificateProvider.kind`
161
+
value set to cert-manager as shown below. If you would like to change from default cert-manager values specified in OSM documentation,
125
162
also include and update the subsequent `certmanager.issuer` lines.
126
163
127
164
```json
@@ -144,7 +181,7 @@ and [demo](https://docs.openservicemesh.io/docs/demos/ingress_contour/) to learn
144
181
> [!NOTE]
145
182
> Use the commands provided in the OSM GitHub documentation with caution. Ensure that you use the correct namespace name `arc-osm-system`.
146
183
147
-
To set required values for configuring Contour during OSM installation, create the following JSON file:
184
+
To set required values for configuring Contour during OSM installation, append the following to your JSON settings file:
148
185
```json
149
186
{
150
187
"osm.osm.osmNamespace" : "arc-osm-system",
@@ -157,7 +194,7 @@ To set required values for configuring Contour during OSM installation, create t
157
194
Now, [install OSM with custom values](#setting-values-during-osm-installation).
158
195
159
196
### Setting values during OSM installation
160
-
Values that need to be set during OSM installation need to be saved to a JSON file and passed in through the Azure CLI
197
+
Any values that need to be set during OSM installation need to be saved to a single JSON file and passed in through the Azure CLI
161
198
install command.
162
199
163
200
Once you have created a JSON file with applicable values as described in above custom installation sections, set the
@@ -174,7 +211,7 @@ Run the `az k8s-extension create` command to create the OSM extension, passing i
174
211
175
212
## Install Azure Arc-enabled OSM using ARM template
176
213
177
-
After connecting your cluster to Azure Arc, create a json file with the following format, making sure to update the \<cluster-name\> and \<osm-arc-version\> values:
214
+
After connecting your cluster to Azure Arc, create a JSON file with the following format, making sure to update the \<cluster-name\> and \<osm-arc-version\> values:
Automatically deploy to Azure Functions with [Azure Pipelines](/azure/devops/pipelines/). Azure Pipelines lets you automate your software development and continuously test, build, and deploy your code.
14
+
Use [Azure Pipelines](/azure/devops/pipelines/) to automatically deploy to Azure Functions. Azure Pipelines lets you build, test, and deploy with continuous integration (CI) and continuous delivery (CD) using [Azure DevOps](/azure/devops/).
15
15
16
-
YAML pipelines aren't available for Azure DevOps 2019 and earlier.
16
+
YAML pipelines are defined using a YAML file in your repository. A step is the smallest building block of a pipeline and can be a script or task (pre-packaged script). [Learn about the key concepts and components that make up a pipeline](/azure/devops/pipelines/get-started/key-pipelines-concepts).
17
17
18
+
YAML pipelines aren't available for Azure DevOps 2019 and earlier.
18
19
## Prerequisites
19
20
20
21
* A GitHub account, where you can create a repository. If you don't have one, you can [create one for free](https://github.com).
21
22
22
-
* An Azure DevOps organization. If you don't have one, you can [create one for free](/azure/devops/pipelines/get-started/pipelines-sign-up). (An Azure DevOps organization is different from your GitHub organization. You can give your DevOps organization and your GitHub organization the same name if you want alignment between them.)
23
-
24
-
If your team already has one, then make sure you're an administrator of the Azure DevOps project that you want to use.
23
+
* An Azure DevOps organization. If you don't have one, you can [create one for free](/azure/devops/pipelines/get-started/pipelines-sign-up). If your team already has one, then make sure you're an administrator of the Azure DevOps project that you want to use.
25
24
26
-
* An ability to run pipelines on Microsoft-hosted agents. You can either purchase a [parallel job](/azure/devops/pipelines/licensing/concurrent-jobs) or you can request a free tier. To request a free tier, follow the instructions in [this article](/azure/devops/pipelines/licensing/concurrent-jobs). Note that it may take us 2-3 business days to grant access to the free tier.
25
+
* An ability to run pipelines on Microsoft-hosted agents. You can either purchase a [parallel job](/azure/devops/pipelines/licensing/concurrent-jobs) or you can request a free tier.
0 commit comments