Skip to content

Commit e0a1a9e

Browse files
authored
Merge pull request #91431 from MicrosoftDocs/master
10/11 AM Publish
2 parents f272ba8 + bda1b2e commit e0a1a9e

File tree

77 files changed

+664
-586
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

77 files changed

+664
-586
lines changed

articles/active-directory/manage-apps/application-proxy-integrate-with-sharepoint-server.md

Lines changed: 122 additions & 107 deletions
Large diffs are not rendered by default.
Loading
14.7 KB
Loading
2.9 KB
Loading
Loading

articles/active-directory/users-groups-roles/directory-assign-admin-roles.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1600,6 +1600,7 @@ Graph displayName | Azure portal display name | directoryRoleTemplateId
16001600
Application Administrator | Application administrator | 9B895D92-2CD3-44C7-9D02-A6AC2D5EA5C3
16011601
Application Developer | Application developer | CF1C38E5-3621-4004-A7CB-879624DCED7C
16021602
Authentication Administrator | Authentication administrator | c4e39bd9-1100-46d3-8c65-fb160da0071f
1603+
Azure DevOps Administrator | Azure DevOps administrator | e3973bdf-4987-49ae-837a-ba8e231c7286
16031604
Azure Information Protection Administrator | Azure Information Protection administrator | 7495fdc4-34c4-4d15-a289-98788ce399fd
16041605
B2C User flow Administrator | B2C User flow Administrator | 6e591065-9bad-43ed-90f3-e9424366d2f0
16051606
B2C User Flow Attribute Administrator | B2C User Flow Attribute Administrator | 0f971eea-41eb-4569-a71e-57bb8a3eff1e

articles/aks/cluster-container-registry-integration.md

Lines changed: 42 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -13,30 +13,39 @@ ms.author: mlearned
1313

1414
# Authenticate with Azure Container Registry from Azure Kubernetes Service
1515

16-
When you're using Azure Container Registry (ACR) with Azure Kubernetes Service (AKS), an authentication mechanism needs to be established. This article details the recommended configurations for authentication between these two Azure services.
16+
When you're using Azure Container Registry (ACR) with Azure Kubernetes Service (AKS), an authentication mechanism needs to be established. This article provides examples for configuring authentication between these two Azure services.
1717

1818
You can set up the AKS to ACR integration in a few simple commands with the Azure CLI.
1919

2020
## Before you begin
2121

22-
You must have the following:
22+
These examples require:
2323

2424
* **Owner** or **Azure account administrator** role on the **Azure subscription**
25-
* You also need the Azure CLI version 2.0.73 or later
26-
* You need [Docker installed](https://docs.docker.com/install/) on your client, and you need access to [docker hub](https://hub.docker.com/)
25+
* Azure CLI version 2.0.73 or later
2726

2827
## Create a new AKS cluster with ACR integration
2928

3029
You can set up AKS and ACR integration during the initial creation of your AKS cluster. To allow an AKS cluster to interact with ACR, an Azure Active Directory **service principal** is used. The following CLI command allows you to authorize an existing ACR in your subscription and configures the appropriate **ACRPull** role for the service principal. Supply valid values for your parameters below. The parameters in brackets are optional.
3130
```azurecli
32-
az login
33-
az acr create -n myContainerRegistry -g myContainerRegistryResourceGroup --sku basic [in case you do not have an existing ACR]
34-
az aks create -n myAKSCluster -g myResourceGroup --attach-acr <acr-name-or-resource-id>
31+
# set this to the name of your Azure Container Registry. It must be globally unique
32+
MYACR=myContainerRegistry
33+
34+
# Run the following line to create an Azure Container Registry if you do not already have one
35+
az acr create -n $MYACR -g myContainerRegistryResourceGroup --sku basic
36+
37+
# Create an AKS cluster with ACR integration
38+
az aks create -n myAKSCluster -g myResourceGroup --attach-acr $MYACR
39+
3540
```
36-
**An ACR resource ID has the following format:**
41+
Alternatively, you can specify the ACR name using an ACR resource ID, which has has the following format:
3742

3843
/subscriptions/\<subscription-id\>/resourceGroups/\<resource-group-name\>/providers/Microsoft.ContainerRegistry/registries/\<name\>
39-
44+
45+
```azurecli
46+
az aks create -n myAKSCluster -g myResourceGroup --attach-acr /subscriptions/<subscription-id>/resourceGroups/myContainerRegistryResourceGroup/providers/Microsoft.ContainerRegistry/registries/myContainerRegistry
47+
```
48+
4049
This step may take several minutes to complete.
4150

4251
## Configure ACR integration for existing AKS clusters
@@ -45,57 +54,43 @@ Integrate an existing ACR with existing AKS clusters by supplying valid values f
4554

4655
```azurecli
4756
az aks update -n myAKSCluster -g myResourceGroup --attach-acr <acrName>
57+
```
58+
or,
59+
```
4860
az aks update -n myAKSCluster -g myResourceGroup --attach-acr <acr-resource-id>
4961
```
5062

5163
You can also remove the integration between an ACR and an AKS cluster with the following
5264
```azurecli
5365
az aks update -n myAKSCluster -g myResourceGroup --detach-acr <acrName>
54-
az aks update -n myAKSCluster -g myResourceGroup --detach-acr <acr-resource-id>
5566
```
56-
57-
58-
## Log in to your ACR
59-
60-
Use the following command to Log in to your ACR. Replace the <acrname> parameter with your ACR name. For example, the default is **aks<your-resource-group>acr**.
61-
62-
```azurecli
63-
az acr login -n <acrName>
67+
or
68+
```
69+
az aks update -n myAKSCluster -g myResourceGroup --detach-acr <acr-resource-id>
6470
```
6571

66-
## Pull an image from docker hub and push to your ACR
72+
## Working with ACR & AKS
6773

68-
Pull an image from docker hub, tag the image, and push to your ACR.
74+
### Import an image into your ACR
6975

70-
```console
71-
acrloginservername=$(az acr show -n <acrname> -g <myResourceGroup> --query loginServer -o tsv)
72-
docker pull nginx
73-
```
76+
Import an image from docker hub into your ACR by running the following:
7477

75-
```
76-
$ docker tag nginx $acrloginservername/nginx:v1
77-
$ docker push $acrloginservername/nginx:v1
7878

79-
The push refers to repository [someacr1.azurecr.io/nginx]
80-
fe6a7a3b3f27: Pushed
81-
d0673244f7d4: Pushed
82-
d8a33133e477: Pushed
83-
v1: digest: sha256:dc85890ba9763fe38b178b337d4ccc802874afe3c02e6c98c304f65b08af958f size: 948
79+
```azurecli
80+
az acr import -n <myContainerRegistry> --source docker.io/library/nginx:latest --image nginx:v1
8481
```
8582

86-
## Update the state and verify pods
83+
### Deploy the sample image from ACR to AKS
8784

88-
Perform the following steps to verify your deployment.
85+
Ensure you have the proper AKS credentials
8986

9087
```azurecli
9188
az aks get-credentials -g myResourceGroup -n myAKSCluster
9289
```
9390

94-
View the yaml file, and edit the image property by replacing the value with your ACR login server, image, and tag.
91+
Create a file called **acr-nginx.yaml** that contains the following:
9592

9693
```
97-
$ cat acr-nginx.yaml
98-
9994
apiVersion: apps/v1
10095
kind: Deployment
10196
metadata:
@@ -117,12 +112,19 @@ spec:
117112
image: <replace this image property with you acr login server, image and tag>
118113
ports:
119114
- containerPort: 80
115+
```
120116

121-
$ kubectl apply -f acr-nginx.yaml
122-
$ kubectl get pods
117+
Next, run this deployment in your AKS cluster:
118+
```
119+
kubectl apply -f acr-nginx.yaml
120+
```
123121

122+
You can monitor the deployment by running:
123+
```
124+
kubectl get pods
125+
```
124126
You should have two running pods.
125-
127+
```
126128
NAME READY STATUS RESTARTS AGE
127129
nginx0-deployment-669dfc4d4b-x74kr 1/1 Running 0 20s
128130
nginx0-deployment-669dfc4d4b-xdpd6 1/1 Running 0 20s

articles/application-gateway/application-gateway-end-to-end-ssl-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -224,7 +224,7 @@ Using all the preceding steps, create the application gateway. The creation of t
224224
225225
For V1 SKU use the below command
226226
```powershell
227-
$appgw = New-AzApplicationGateway -Name appgateway -SSLCertificates $cert -ResourceGroupName "appgw-rg" -Location "West US" -BackendAddressPools $pool -BackendHttpSettingsCollection $poolSetting01 -FrontendIpConfigurations $fipconfig -GatewayIpConfigurations $gipconfig -FrontendPorts $fp -HttpListeners $listener -RequestRoutingRules $rule -Sku $sku -SSLPolicy $SSLPolicy -AuthenticationCertificates $authcert -Verbose
227+
$appgw = New-AzApplicationGateway -Name appgateway -SSLCertificates $cert -ResourceGroupName "appgw-rg" -Location "West US" -BackendAddressPools $pool -BackendHttpSettingsCollection $poolSetting -FrontendIpConfigurations $fipconfig -GatewayIpConfigurations $gipconfig -FrontendPorts $fp -HttpListeners $listener -RequestRoutingRules $rule -Sku $sku -SSLPolicy $SSLPolicy -AuthenticationCertificates $authcert -Verbose
228228
```
229229

230230
For V2 SKU use the below command

0 commit comments

Comments
 (0)