Skip to content

Commit e270749

Browse files
authored
Merge pull request #185875 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents 82a74a8 + 689e34c commit e270749

File tree

80 files changed

+485
-518
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

80 files changed

+485
-518
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25258,6 +25258,11 @@
2525825258
"redirect_url": "/azure/spring-cloud/expose-apps-gateway",
2525925259
"redirect_document_id": false
2526025260
},
25261+
{
25262+
"source_path_from_root": "/articles/spring-cloud/tutorial-dump-jvm-options.md",
25263+
"redirect_url": "/azure/spring-cloud/how-to-dump-jvm-options",
25264+
"redirect_document_id": false
25265+
},
2526125266
{
2526225267
"source_path_from_root": "/articles/spring-cloud/how-to-provision-azure-spring-cloud-instance-terraform.md",
2526325268
"redirect_url": "/azure/spring-cloud/quickstart-deploy-infrastructure-vnet-terraform",

articles/active-directory/roles/delegate-by-task.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ You can further restrict permissions by assigning roles at smaller scopes or by
152152
> | Manage user settings | [Global Administrator](../roles/permissions-reference.md#global-administrator) | |
153153
> | Read access review of a group or of an app | [Security Reader](../roles/permissions-reference.md#security-reader) | [Security Administrator](../roles/permissions-reference.md#security-administrator)<br/>[User Administrator](../roles/permissions-reference.md#user-administrator) |
154154
> | Read all configuration | [Default user role](../fundamentals/users-default-permissions.md) | |
155-
> | Update enterprise application assignments | [Enterprise application owner](../fundamentals/users-default-permissions.md#object-ownership) | [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator)<br/>[Application Administrator](../roles/permissions-reference.md#application-administrator) |
155+
> | Update enterprise application assignments | [Enterprise application owner](../fundamentals/users-default-permissions.md#object-ownership) | [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator)<br/>[Application Administrator](../roles/permissions-reference.md#application-administrator)<br/>[User Administrator](../roles/permissions-reference.md#user-administrator) |
156156
> | Update enterprise application owners | [Enterprise application owner](../fundamentals/users-default-permissions.md#object-ownership) | [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator)<br/>[Application Administrator](../roles/permissions-reference.md#application-administrator) |
157157
> | Update enterprise application properties | [Enterprise application owner](../fundamentals/users-default-permissions.md#object-ownership) | [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator)<br/>[Application Administrator](../roles/permissions-reference.md#application-administrator) |
158158
> | Update enterprise application provisioning | [Enterprise application owner](../fundamentals/users-default-permissions.md#object-ownership) | [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator)<br/>[Application Administrator](../roles/permissions-reference.md#application-administrator) |

articles/aks/use-group-managed-service-accounts.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Enable Group Managed Service Accounts (GMSA) for you Windows Server nodes on your Azure Kubernetes Service (AKS) cluster (Preview)
3-
description: Learn how to enable Group Managed Service Accounts (GMSA) for you Windows Server nodes on your Azure Kubernetes Service (AKS) cluster for securing your pods.
2+
title: Enable Group Managed Service Accounts (GMSA) for your Windows Server nodes on your Azure Kubernetes Service (AKS) cluster (Preview)
3+
description: Learn how to enable Group Managed Service Accounts (GMSA) for your Windows Server nodes on your Azure Kubernetes Service (AKS) cluster for securing your pods.
44
services: container-service
55
ms.topic: article
66
ms.date: 11/01/2021
77
---
88

9-
# Enable Group Managed Service Accounts (GMSA) for you Windows Server nodes on your Azure Kubernetes Service (AKS) cluster (Preview)
9+
# Enable Group Managed Service Accounts (GMSA) for your Windows Server nodes on your Azure Kubernetes Service (AKS) cluster (Preview)
1010

1111
[Group Managed Service Accounts (GMSA)][gmsa-overview] is a managed domain account for multiple servers that provides automatic password management, simplified service principal name (SPN) management and the ability to delegate the management to other administrators. AKS provides the ability to enable GMSA on your Windows Server nodes, which allows containers running on Windows Server nodes to integrate with and be managed by GMSA.
1212

@@ -389,4 +389,4 @@ After running `kubectl get pods --watch` and waiting several minutes, if your po
389389
[az-provider-register]: /cli/azure/provider#az_provider_register
390390
[gmsa-getting-started]: /windows-server/security/group-managed-service-accounts/getting-started-with-group-managed-service-accounts
391391
[gmsa-overview]: /windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview
392-
[rdp]: rdp.md
392+
[rdp]: rdp.md

articles/app-service/configure-language-nodejs.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure a Node.js app in the native Windows instance
44
ms.custom: devx-track-js, devx-track-azurecli
55
ms.devlang: javascript
66
ms.topic: article
7-
ms.date: 04/23/2021
7+
ms.date: 01/21/2022
88
zone_pivot_groups: app-service-platform-windows-linux
99

1010
---
@@ -56,10 +56,13 @@ az webapp list-runtimes --linux | grep NODE
5656
To set your app to a [supported Node.js version](#show-nodejs-version), run the following command in the [Cloud Shell](https://shell.azure.com) to set `WEBSITE_NODE_DEFAULT_VERSION` to a supported version:
5757

5858
```azurecli-interactive
59-
az webapp config appsettings set --name <app-name> --resource-group <resource-group-name> --settings WEBSITE_NODE_DEFAULT_VERSION="10.15"
59+
az webapp config appsettings set --name <app-name> --resource-group <resource-group-name> --settings WEBSITE_NODE_DEFAULT_VERSION="~16"
6060
```
6161

62-
This setting specifies the Node.js version to use, both at runtime and during automated package restore during App Service build automation. This setting only recognizes major minor versions, the _LTS_ moniker is not supported.
62+
> [!NOTE]
63+
> This example uses the recommended "tilde syntax" to target the latest available version of Node.js 16 runtime on App Service.
64+
>
65+
>Since the runtime is regularly patched and updated by the platform it's not recommended to target a specific minor version/patch as these are not guaranteed to be available due to potential security risks.
6366
6467
> [!NOTE]
6568
> You should set the Node.js version in your project's `package.json`. The deployment engine runs in a separate process that contains all the supported Node.js versions.
@@ -71,7 +74,7 @@ This setting specifies the Node.js version to use, both at runtime and during au
7174
To set your app to a [supported Node.js version](#show-nodejs-version), run the following command in the [Cloud Shell](https://shell.azure.com):
7275

7376
```azurecli-interactive
74-
az webapp config set --resource-group <resource-group-name> --name <app-name> --linux-fx-version "NODE|10.14"
77+
az webapp config set --resource-group <resource-group-name> --name <app-name> --linux-fx-version "NODE|14-lts"
7578
```
7679

7780
This setting specifies the Node.js version to use, both at runtime and during automated package restore in Kudu.
6.41 KB
Loading

articles/app-service/operating-system-functionality.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the OS functionality in Azure App Service on Windows. F
44

55
ms.assetid: 39d5514f-0139-453a-b52e-4a1c06d8d914
66
ms.topic: article
7-
ms.date: 09/09/2021
7+
ms.date: 01/21/2022
88
ms.custom: seodec18
99

1010
---
@@ -29,7 +29,8 @@ Because App Service supports a seamless scaling experience between different tie
2929
## Development frameworks
3030
App Service pricing tiers control the amount of compute resources (CPU, disk storage, memory, and network egress) available to apps. However, the breadth of framework functionality available to apps remains the same regardless of the scaling tiers.
3131

32-
App Service supports a variety of development frameworks, including ASP.NET, classic ASP, Node.js, PHP, and Python - all of which run as extensions within IIS. In order to simplify and normalize security configuration, App Service apps typically run the various development frameworks with their default settings. One approach to configuring apps could have been to customize the API surface area and functionality for each individual development framework. App Service instead takes a more generic approach by enabling a common baseline of operating system functionality regardless of an app's development framework.
32+
App Service supports a variety of development frameworks, including ASP.NET, classic ASP, Node.js, PHP, and Python.
33+
In order to simplify and normalize security configuration, App Service apps typically run the various development frameworks with their default settings. The frameworks and runtime components provided by the platform are updated regularly to satisfy security and compliance requirements, for this reason we do not guarantee specific minor/patch versions and recommend customers target major version as needed.
3334

3435
The following sections summarize the general kinds of operating system functionality available to App Service apps.
3536

articles/app-service/overview-patch-os-runtime.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: OS and runtime patching cadence
33
description: Learn how Azure App Service updates the OS and runtimes, what runtimes and patch level your apps has, and how you can get update announcements.
44
ms.topic: article
5-
ms.date: 02/02/2018
5+
ms.date: 01/21/2021
66
ms.custom: seodec18, devx-track-azurecli
77

88
---
@@ -52,10 +52,13 @@ When a new major or minor version is added, it is installed side by side with th
5252
```azurecli-interactive
5353
az webapp config set --net-framework-version v4.7 --resource-group <groupname> --name <appname>
5454
az webapp config set --php-version 7.0 --resource-group <groupname> --name <appname>
55-
az webapp config appsettings set --settings WEBSITE_NODE_DEFAULT_VERSION=8.9.3 --resource-group <groupname> --name <appname>
55+
az webapp config appsettings set --settings WEBSITE_NODE_DEFAULT_VERSION=~14 --resource-group <groupname> --name <appname>
5656
az webapp config set --python-version 3.8 --resource-group <groupname> --name <appname>
5757
az webapp config set --java-version 1.8 --java-container Tomcat --java-container-version 9.0 --resource-group <groupname> --name <appname>
5858
```
59+
> [!NOTE]
60+
> This example uses the recommended "tilde syntax" to target the latest available version of Node.js 16 runtime on Windows App Service.
61+
>
5962
6063
## How can I query OS and runtime update status on my instances?
6164

articles/app-service/scenario-secure-app-access-microsoft-graph-as-app.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: app-service-web
99
ms.topic: tutorial
1010
ms.workload: identity
11-
ms.date: 11/02/2021
11+
ms.date: 01/21/2022
1212
ms.author: ryanwi
1313
ms.reviewer: stsoneff
1414
ms.devlang: csharp, javascript
@@ -105,9 +105,9 @@ az rest --method post --uri $uri --body $body --headers "Content-Type=applicatio
105105

106106
After executing the script, you can verify in the [Azure portal](https://portal.azure.com) that the requested API permissions are assigned to the managed identity.
107107

108-
Go to **Azure Active Directory**, and then select **Enterprise applications**. This pane displays all the service principals in your tenant. In **All Applications**, select the service principal for the managed identity.
108+
Go to **Azure Active Directory**, and then select **Enterprise applications**. This pane displays all the service principals in your tenant. In **Managed Identities**, select the service principal for the managed identity.
109109

110-
If you're following this tutorial, there are two service principals with the same display name (SecureWebApp2020094113531, for example). The service principal that has a **Homepage URL** represents the web app in your tenant. The service principal without the **Homepage URL** represents the system-assigned managed identity for your web app. The **Object ID** value for the managed identity matches the object ID of the managed identity that you previously created.
110+
If you're following this tutorial, there are two service principals with the same display name (SecureWebApp2020094113531, for example). The service principal that has a **Homepage URL** represents the web app in your tenant. The service principal that appears in **Managed Identities** should *not* have a **Homepage URL** listed and the **Object ID** should match the object ID value of the managed identity in the [previous step](#enable-managed-identity-on-app).
111111

112112
Select the service principal for the managed identity.
113113

@@ -121,7 +121,7 @@ In **Overview**, select **Permissions**, and you'll see the added permissions fo
121121

122122
# [C#](#tab/programming-language-csharp)
123123

124-
The [DefaultAzureCredential](/dotnet/api/azure.identity.defaultazurecredential) class is used to get a token credential for your code to authorize requests to Microsoft Graph. Create an instance of the [DefaultAzureCredential](/dotnet/api/azure.identity.defaultazurecredential) class, which uses the managed identity to fetch tokens and attach them to the service client. The following code example gets the authenticated token credential and uses it to create a service client object, which gets the users in the group.
124+
The [ChainedTokenCredential](/dotnet/api/azure.identity.chainedtokencredential), [ManagedIdentityCredential](/dotnet/api/azure.identity.managedidentitycredential), and [EnvironmentCredential](/dotnet/api/azure.identity.environmentcredential) classes are used to get a token credential for your code to authorize requests to Microsoft Graph. Create an instance of the [ChainedTokenCredential](/dotnet/api/azure.identity.chainedtokencredential) class, which uses the managed identity in the App Service environment or the development environment variables to fetch tokens and attach them to the service client. The following code example gets the authenticated token credential and uses it to create a service client object, which gets the users in the group.
125125

126126
To see this code as part of a sample application, see the [sample on GitHub](https://github.com/Azure-Samples/ms-identity-easyauth-dotnet-storage-graphapi/tree/main/3-WebApp-graphapi-managed-identity).
127127

@@ -165,8 +165,12 @@ public IList<MSGraphUser> Users { get; set; }
165165

166166
public async Task OnGetAsync()
167167
{
168-
// Create the Microsoft Graph service client with a DefaultAzureCredential class, which gets an access token by using the available Managed Identity.
169-
var credential = new DefaultAzureCredential();
168+
// Create the Graph service client with a ChainedTokenCredential which gets an access
169+
// token using the available Managed Identity or environment variables if running
170+
// in development.
171+
var credential = new ChainedTokenCredential(
172+
new ManagedIdentityCredential(),
173+
new EnvironmentCredential());
170174
var token = credential.GetToken(
171175
new Azure.Core.TokenRequestContext(
172176
new[] { "https://graph.microsoft.com/.default" }));

articles/app-service/web-sites-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ You can increase or remove quotas from your app by upgrading your App Service pl
5757
## Understand metrics
5858

5959
> [!NOTE]
60-
> **File System Usage** is a new metric being rolled out globally, no data is expected unless your app is hosted in an App Service Environment.
60+
> **File System Usage** is now available globally for apps hosted in multi-tenants and App Service Environment.
6161
>
6262
6363
> [!IMPORTANT]

0 commit comments

Comments
 (0)