Skip to content

Commit dc6c882

Browse files
committed
Merge branch 'main' into release-scommi
2 parents ca57a5e + 8838fa4 commit dc6c882

File tree

283 files changed

+4729
-1336
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

283 files changed

+4729
-1336
lines changed

.openpublishing.redirection.azure-resource-manager.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1920,6 +1920,11 @@
19201920
"redirect_url": "/azure/azure-resource-manager/managed-applications/overview",
19211921
"redirect_document_id": false
19221922
},
1923+
{
1924+
"source_path_from_root": "/articles/azure-resource-manager/managed-applications/deploy-marketplace-app-quickstart.md",
1925+
"redirect_url": "/azure/azure-resource-manager/managed-applications/deploy-service-catalog-quickstart",
1926+
"redirect_document_id": false
1927+
},
19231928
{
19241929
"source_path_from_root": "/articles/resource-manager-policy.md",
19251930
"redirect_url": "/azure/governance/policy/overview",

articles/aks/howto-deploy-java-liberty-app.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ description: Deploy a Java application with Open Liberty or WebSphere Liberty on
55
author: KarlErickson
66
ms.author: edburns
77
ms.topic: how-to
8-
ms.date: 04/02/2024
8+
ms.date: 05/29/2024
99
ms.subservice: aks-developer
1010
keywords: java, jakartaee, javaee, microprofile, open-liberty, websphere-liberty, aks, kubernetes
1111
ms.custom: devx-track-java, devx-track-javaee, devx-track-javaee-liberty, devx-track-javaee-liberty-aks, devx-track-javaee-websphere, build-2023, devx-track-extended-java, devx-track-azurecli
1212
---
1313

14-
# Deploy a Java application with Open Liberty or WebSphere Liberty on an Azure Kubernetes Service cluster
14+
# Deploy a Java application with Open Liberty or WebSphere Liberty on an Azure Kubernetes Service (AKS) cluster
1515

1616
This article demonstrates how to:
1717

@@ -41,7 +41,7 @@ This article is intended to help you quickly get to deployment. Before you go to
4141
* Sign in to the Azure CLI by using the [az login](/cli/azure/reference-index#az-login) command. To finish the authentication process, follow the steps displayed in your terminal. For other sign-in options, see [Sign in with the Azure CLI](/cli/azure/authenticate-azure-cli).
4242
* When you're prompted, install the Azure CLI extension on first use. For more information about extensions, see [Use extensions with the Azure CLI](/cli/azure/azure-cli-extensions-overview).
4343
* Run [az version](/cli/azure/reference-index?#az-version) to find the version and dependent libraries that are installed. To upgrade to the latest version, run [az upgrade](/cli/azure/reference-index?#az-upgrade). This article requires at least version 2.31.0 of Azure CLI.
44-
* Install a Java SE implementation, version 17 or later. (for example, [Eclipse Open J9](https://www.eclipse.org/openj9/)).
44+
* Install a Java Standard Edition (SE) implementation, version 17 or later (for example, [Eclipse Open J9](https://www.eclipse.org/openj9/)).
4545
* Install [Maven](https://maven.apache.org/download.cgi) 3.5.0 or higher.
4646
* Install [Docker](https://docs.docker.com/get-docker/) for your OS.
4747
* Ensure [Git](https://git-scm.com) is installed.
@@ -145,7 +145,7 @@ If you moved away from the **Deployment is in progress** pane, the following ste
145145
146146
---
147147
148-
You'll use these values later in this article. Note that the outputs list several other useful commands.
148+
You use these values later in this article. The outputs list several other useful commands.
149149
150150
## Create an Azure SQL Database instance
151151
@@ -167,7 +167,7 @@ $Env:DB_RESOURCE_GROUP_NAME="<db-resource-group>"
167167
168168
---
169169
170-
Now that you've created the database and AKS cluster, you can proceed to preparing AKS to host your Open Liberty application.
170+
Now that you created the database and AKS cluster, you can proceed to preparing AKS to host your Open Liberty application.
171171
172172
## Configure and deploy the sample application
173173

articles/aks/workload-identity-deploy-cluster.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ az account set --subscription <subscription-id>
4444

4545
To help simplify steps to configure the identities required, the steps below define environment variables that are referenced in the examples in this article. Remember to replace the values shown with your own values:
4646

47-
```bash
47+
```azurecli-interactive
4848
export RESOURCE_GROUP="myResourceGroup"
4949
export LOCATION="eastus"
5050
export CLUSTER_NAME="myAKSCluster"
@@ -117,7 +117,7 @@ az aks update \
117117

118118
To get the OIDC issuer URL and save it to an environmental variable, run the following command:
119119

120-
```bash
120+
```azurecli-interactive
121121
export AKS_OIDC_ISSUER="$(az aks show --name "${CLUSTER_NAME}" \
122122
--resource-group "${RESOURCE_GROUP}" \
123123
--query "oidcIssuerProfile.issuerUrl" \
@@ -146,7 +146,7 @@ az identity create \
146146

147147
Next, create a variable for the managed identity's client ID.
148148

149-
```bash
149+
```azurecli-interactive
150150
export USER_ASSIGNED_CLIENT_ID="$(az identity show \
151151
--resource-group "${RESOURCE_GROUP}" \
152152
--name "${USER_ASSIGNED_IDENTITY_NAME}" \
@@ -164,7 +164,7 @@ az aks get-credentials --name "${CLUSTER_NAME}" --resource-group "${RESOURCE_GRO
164164

165165
Copy and paste the following multi-line input in the Azure CLI.
166166

167-
```bash
167+
```azurecli-interactive
168168
cat <<EOF | kubectl apply -f -
169169
apiVersion: v1
170170
kind: ServiceAccount
@@ -321,8 +321,8 @@ The following example shows how to use the Azure role-based access control (Azur
321321
322322
To check whether all properties are injected properly by the webhook, use the [kubectl describe][kubectl-describe] command:
323323
324-
```bash
325-
kubectl describe pod quick-start | grep "SECRET_NAME:"
324+
```azurecli-interactive
325+
kubectl describe pod sample-workload-identity-key-vault | grep "SECRET_NAME:"
326326
```
327327

328328
If successful, the output should be similar to the following:
@@ -333,8 +333,8 @@ If successful, the output should be similar to the following:
333333

334334
To verify that pod is able to get a token and access the resource, use the kubectl logs command:
335335

336-
```bash
337-
kubectl logs quick-start
336+
```azurecli-interactive
337+
kubectl logs sample-workload-identity-key-vault
338338
```
339339

340340
If successful, the output should be similar to the following:

articles/api-management/api-management-howto-deploy-multi-region.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ This section provides considerations for multi-region deployments when the API M
164164
* Configure each regional network independently. The [connectivity requirements](virtual-network-reference.md) such as required network security group rules for a virtual network in an added region are generally the same as those for a network in the primary region.
165165
* Virtual networks in the different regions don't need to be peered.
166166
> [!IMPORTANT]
167-
> When configured in internal VNet mode, each regional gateway must also have outbound connectivity on port 1443 to the Azure SQL database configured for your API Management instance, which is only in the *primary* region. Ensure that you allow connectivity to the FQDN or IP address of this Azure SQL database in any routes or firewall rules you configure for networks in your secondary regions; the Azure SQL service tag can't be used in this scenario. To find the Azure SQL database name in the primary region, go to the **Network** > **Network status** page of your API Management instance in the portal.
167+
> When configured in internal VNet mode, each regional gateway must also have outbound connectivity on port 1433 to the Azure SQL database configured for your API Management instance, which is only in the *primary* region. Ensure that you allow connectivity to the FQDN or IP address of this Azure SQL database in any routes or firewall rules you configure for networks in your secondary regions; the Azure SQL service tag can't be used in this scenario. To find the Azure SQL database name in the primary region, go to the **Network** > **Network status** page of your API Management instance in the portal.
168168

169169
### IP addresses
170170

articles/api-management/azure-openai-emit-token-metric-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ The `azure-openai-emit-token-metric` policy sends metrics to Application Insight
6666
* Product ID
6767
* User ID
6868
* Subscription ID
69-
* Location ID
69+
* Location
7070
* Gateway ID
7171

7272
## Usage

articles/api-management/emit-metric-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ The `emit-metric` policy sends custom metrics in the specified format to Applica
6060
* Product ID
6161
* User ID
6262
* Subscription ID
63-
* Location ID
63+
* Location
6464
* Gateway ID
6565

6666
## Usage

articles/azure-app-configuration/concept-config-file.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Tooling support for using configuration files with Azure App Config
44
author: zhenlan
55
ms.author: zhenlwa
66
ms.service: azure-app-configuration
7-
ms.topic: conceptual
8-
ms.date: 10/28/2022
7+
ms.topic: concept
8+
ms.date: 05/30/2024
99
---
1010

1111
# Azure App Configuration support for configuration files
@@ -102,9 +102,11 @@ The following example is a file based upon the KVSet file content profile, named
102102

103103
> [!TIP]
104104
> If you followed the example in the previous section and have the data in your App Configuration store, you can export it to a file using the CLI command:
105+
105106
> ```azurecli-interactive
106107
> az appconfig kv export --profile appconfig/kvset --label * --name <your store name> --destination file --path appconfigdata.json --format json
107108
> ```
109+
108110
> After the file is exported, update the `Beta` feature flag `enabled` property to `true` and change the `Logging:LogLevel:Default` to `Debug`.
109111
110112
Run the following CLI command with the parameter "**--profile appconfig/kvset**" to import the file to your App Configuration store. You don't need to specify any data transformation rules such as separator, label, or content type like you did in the default file content profile section because all information is already in the file.

articles/azure-app-configuration/quickstart-bicep.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure App Configuration
44
description: Learn how to create an Azure App Configuration store using Bicep.
55
author: maud-lv
66
ms.author: malev
7-
ms.date: 05/06/2022
7+
ms.date: 05/30/2024
88
ms.service: azure-app-configuration
99
ms.topic: quickstart
1010
ms.custom: subject-armqs, mode-arm, devx-track-bicep

articles/azure-cache-for-redis/cache-remove-tls-10-11.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: csharp
1313

1414
# Remove TLS 1.0 and 1.1 from use with Azure Cache for Redis
1515

16-
To meet the industry-wide push toward the exclusive use of Transport Layer Security (TLS) version 1.2 or later, Azure Cache for Redis is moving toward requiring the use of the TLS 1.2 in November, 2024. TLS versions 1.0 and 1.1 are known to be susceptible to attacks such as BEAST and POODLE, and to have other Common Vulnerabilities and Exposures (CVE) weaknesses.
16+
To meet the industry-wide push toward the exclusive use of Transport Layer Security (TLS) version 1.2 or later, Azure Cache for Redis is moving toward requiring the use of the TLS 1.2 in November 2024. TLS versions 1.0 and 1.1 are known to be susceptible to attacks such as BEAST and POODLE, and to have other Common Vulnerabilities and Exposures (CVE) weaknesses.
1717

1818
TLS versions 1.0 and 1.1 also don't support the modern encryption methods and cipher suites recommended by Payment Card Industry (PCI) compliance standards. This [TLS security blog](https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-part/) explains some of these vulnerabilities in more detail.
1919

@@ -28,15 +28,15 @@ TLS versions 1.0 and 1.1 also don't support the modern encryption methods and ci
2828
2929
As a part of this effort, you can expect the following changes to Azure Cache for Redis:
3030

31-
- _Phase 1_: Azure Cache for Redis stops offering TLS 1.0/1.1 as an option for MinimumTLSVersion setting for new cache creates. Existing cache instances won't be updated at this point. You can still use the Azure portal or other management APIs to [change the minimum TLS version](cache-configure.md#access-ports) to 1.0 or 1.1 for backward compatibility.
32-
- _Phase 2_: Azure Cache for Redis stops supporting TLS 1.1 and TLS 1.0 starting November 1, 2024. After this change, your application must use TLS 1.2 or later to communicate with your cache. The Azure Cache for Redis service will be available while we update the MinimumTLSVerion for all caches to 1.2.
31+
- _Phase 1_: Azure Cache for Redis stops offering TLS 1.0/1.1 as an option for _MinimumTLSVersion_ setting for new cache creates. Existing cache instances won't be updated at this point. You can't set the _MinimiumTLSVersion_ to 1.0 or 1.1 for your existing cache.
32+
- _Phase 2_: Azure Cache for Redis stops supporting TLS 1.1 and TLS 1.0 starting November 1, 2024. After this change, your application must use TLS 1.2 or later to communicate with your cache. The Azure Cache for Redis service remains available while we update the _MinimumTLSVerion_ for all caches to 1.2.
3333

34-
| Date | Description |
35-
|-------- |-------------|
36-
| September 2023 | TLS 1.0/1.1 retirement announcement |
37-
| March 1, 2024 | Beginning March 1, 2024, you will not be able to create new caches with the Minimum TLS version set to 1.0 or 1.1 and you will not be able to set the Minimium TLS version to 1.0 or 1.1 for your existing cache. The Minimum TLS version won't be updated automatically for existing caches at this point.
38-
| October 31, 2024 | Ensure that all your applications are connecting to Azure Cache for Redis using TLS 1.2 and Minimum TLS version on your cache settings is set to 1.2
39-
| November 1, 2024 | Minimum TLS version for all cache instances is updated to 1.2. This means Azure Cache for Redis instances will reject connections using TLS 1.0 or 1.1.
34+
| Date | Description |
35+
| ---------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
36+
| September 2023 | TLS 1.0/1.1 retirement announcement |
37+
| March 1, 2024 | Beginning March 1, 2024, you can't create new caches with the Minimum TLS version set to 1.0 or 1.1 and you can't set the _MinimumTLSVersion_ to 1.0 or 1.1 for your existing cache. The minimum TLS version won't be updated automatically for existing caches at this point. |
38+
| October 31, 2024 | Ensure that all your applications are connecting to Azure Cache for Redis using TLS 1.2 and Minimum TLS version on your cache settings is set to 1.2. |
39+
| November 1, 2024 | Minimum TLS version for all cache instances is updated to 1.2. This means Azure Cache for Redis instances reject connections using TLS 1.0 or 1.1 at this point. |
4040

4141
> [!IMPORTANT]
4242
> The content in this article does not apply to Azure Cache for Redis Enterprise/Enterprise Flash because the Enterprise tiers only support TLS 1.2.
@@ -72,7 +72,7 @@ Redis .NET clients use the earliest TLS version by default on .NET Framework 4.5
7272

7373
Redis .NET Core clients default to the OS default TLS version, which depends on the OS itself.
7474

75-
Depending on the OS version and any patches that have been applied, the effective default TLS version can vary. For more information, see [Transport Layer Security (TLS) best practices with the .NET Framework](/dotnet/framework/network-programming/tls).
75+
Depending on the OS version and any patches that were applied, the effective default TLS version can vary. For more information, see [Transport Layer Security (TLS) best practices with the .NET Framework](/dotnet/framework/network-programming/tls).
7676

7777
However, if you're using an old OS or just want to be sure, we recommend configuring the preferred TLS version manually through the client.
7878

0 commit comments

Comments
 (0)