Skip to content

Commit e96c44a

Browse files
authored
Merge pull request #276675 from MicrosoftDocs/main
5/30 11:00 AM IST Publish
2 parents 5eb0f13 + 61381d0 commit e96c44a

File tree

79 files changed

+988
-456
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

79 files changed

+988
-456
lines changed

.openpublishing.redirection.azure-resource-manager.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1920,6 +1920,11 @@
19201920
"redirect_url": "/azure/azure-resource-manager/managed-applications/overview",
19211921
"redirect_document_id": false
19221922
},
1923+
{
1924+
"source_path_from_root": "/articles/azure-resource-manager/managed-applications/deploy-marketplace-app-quickstart.md",
1925+
"redirect_url": "/azure/azure-resource-manager/managed-applications/deploy-service-catalog-quickstart",
1926+
"redirect_document_id": false
1927+
},
19231928
{
19241929
"source_path_from_root": "/articles/resource-manager-policy.md",
19251930
"redirect_url": "/azure/governance/policy/overview",

articles/aks/howto-deploy-java-liberty-app.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ description: Deploy a Java application with Open Liberty or WebSphere Liberty on
55
author: KarlErickson
66
ms.author: edburns
77
ms.topic: how-to
8-
ms.date: 04/02/2024
8+
ms.date: 05/29/2024
99
ms.subservice: aks-developer
1010
keywords: java, jakartaee, javaee, microprofile, open-liberty, websphere-liberty, aks, kubernetes
1111
ms.custom: devx-track-java, devx-track-javaee, devx-track-javaee-liberty, devx-track-javaee-liberty-aks, devx-track-javaee-websphere, build-2023, devx-track-extended-java, devx-track-azurecli
1212
---
1313

14-
# Deploy a Java application with Open Liberty or WebSphere Liberty on an Azure Kubernetes Service cluster
14+
# Deploy a Java application with Open Liberty or WebSphere Liberty on an Azure Kubernetes Service (AKS) cluster
1515

1616
This article demonstrates how to:
1717

@@ -41,7 +41,7 @@ This article is intended to help you quickly get to deployment. Before you go to
4141
* Sign in to the Azure CLI by using the [az login](/cli/azure/reference-index#az-login) command. To finish the authentication process, follow the steps displayed in your terminal. For other sign-in options, see [Sign in with the Azure CLI](/cli/azure/authenticate-azure-cli).
4242
* When you're prompted, install the Azure CLI extension on first use. For more information about extensions, see [Use extensions with the Azure CLI](/cli/azure/azure-cli-extensions-overview).
4343
* Run [az version](/cli/azure/reference-index?#az-version) to find the version and dependent libraries that are installed. To upgrade to the latest version, run [az upgrade](/cli/azure/reference-index?#az-upgrade). This article requires at least version 2.31.0 of Azure CLI.
44-
* Install a Java SE implementation, version 17 or later. (for example, [Eclipse Open J9](https://www.eclipse.org/openj9/)).
44+
* Install a Java Standard Edition (SE) implementation, version 17 or later (for example, [Eclipse Open J9](https://www.eclipse.org/openj9/)).
4545
* Install [Maven](https://maven.apache.org/download.cgi) 3.5.0 or higher.
4646
* Install [Docker](https://docs.docker.com/get-docker/) for your OS.
4747
* Ensure [Git](https://git-scm.com) is installed.
@@ -145,7 +145,7 @@ If you moved away from the **Deployment is in progress** pane, the following ste
145145
146146
---
147147
148-
You'll use these values later in this article. Note that the outputs list several other useful commands.
148+
You use these values later in this article. The outputs list several other useful commands.
149149
150150
## Create an Azure SQL Database instance
151151
@@ -167,7 +167,7 @@ $Env:DB_RESOURCE_GROUP_NAME="<db-resource-group>"
167167
168168
---
169169
170-
Now that you've created the database and AKS cluster, you can proceed to preparing AKS to host your Open Liberty application.
170+
Now that you created the database and AKS cluster, you can proceed to preparing AKS to host your Open Liberty application.
171171
172172
## Configure and deploy the sample application
173173

articles/aks/workload-identity-deploy-cluster.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ az account set --subscription <subscription-id>
4444

4545
To help simplify steps to configure the identities required, the steps below define environment variables that are referenced in the examples in this article. Remember to replace the values shown with your own values:
4646

47-
```bash
47+
```azurecli-interactive
4848
export RESOURCE_GROUP="myResourceGroup"
4949
export LOCATION="eastus"
5050
export CLUSTER_NAME="myAKSCluster"
@@ -117,7 +117,7 @@ az aks update \
117117

118118
To get the OIDC issuer URL and save it to an environmental variable, run the following command:
119119

120-
```bash
120+
```azurecli-interactive
121121
export AKS_OIDC_ISSUER="$(az aks show --name "${CLUSTER_NAME}" \
122122
--resource-group "${RESOURCE_GROUP}" \
123123
--query "oidcIssuerProfile.issuerUrl" \
@@ -146,7 +146,7 @@ az identity create \
146146

147147
Next, create a variable for the managed identity's client ID.
148148

149-
```bash
149+
```azurecli-interactive
150150
export USER_ASSIGNED_CLIENT_ID="$(az identity show \
151151
--resource-group "${RESOURCE_GROUP}" \
152152
--name "${USER_ASSIGNED_IDENTITY_NAME}" \
@@ -164,7 +164,7 @@ az aks get-credentials --name "${CLUSTER_NAME}" --resource-group "${RESOURCE_GRO
164164

165165
Copy and paste the following multi-line input in the Azure CLI.
166166

167-
```bash
167+
```azurecli-interactive
168168
cat <<EOF | kubectl apply -f -
169169
apiVersion: v1
170170
kind: ServiceAccount
@@ -321,8 +321,8 @@ The following example shows how to use the Azure role-based access control (Azur
321321
322322
To check whether all properties are injected properly by the webhook, use the [kubectl describe][kubectl-describe] command:
323323
324-
```bash
325-
kubectl describe pod quick-start | grep "SECRET_NAME:"
324+
```azurecli-interactive
325+
kubectl describe pod sample-workload-identity-key-vault | grep "SECRET_NAME:"
326326
```
327327

328328
If successful, the output should be similar to the following:
@@ -333,8 +333,8 @@ If successful, the output should be similar to the following:
333333

334334
To verify that pod is able to get a token and access the resource, use the kubectl logs command:
335335

336-
```bash
337-
kubectl logs quick-start
336+
```azurecli-interactive
337+
kubectl logs sample-workload-identity-key-vault
338338
```
339339

340340
If successful, the output should be similar to the following:

articles/azure-cache-for-redis/cache-remove-tls-10-11.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: csharp
1313

1414
# Remove TLS 1.0 and 1.1 from use with Azure Cache for Redis
1515

16-
To meet the industry-wide push toward the exclusive use of Transport Layer Security (TLS) version 1.2 or later, Azure Cache for Redis is moving toward requiring the use of the TLS 1.2 in November, 2024. TLS versions 1.0 and 1.1 are known to be susceptible to attacks such as BEAST and POODLE, and to have other Common Vulnerabilities and Exposures (CVE) weaknesses.
16+
To meet the industry-wide push toward the exclusive use of Transport Layer Security (TLS) version 1.2 or later, Azure Cache for Redis is moving toward requiring the use of the TLS 1.2 in November 2024. TLS versions 1.0 and 1.1 are known to be susceptible to attacks such as BEAST and POODLE, and to have other Common Vulnerabilities and Exposures (CVE) weaknesses.
1717

1818
TLS versions 1.0 and 1.1 also don't support the modern encryption methods and cipher suites recommended by Payment Card Industry (PCI) compliance standards. This [TLS security blog](https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-part/) explains some of these vulnerabilities in more detail.
1919

@@ -28,15 +28,15 @@ TLS versions 1.0 and 1.1 also don't support the modern encryption methods and ci
2828
2929
As a part of this effort, you can expect the following changes to Azure Cache for Redis:
3030

31-
- _Phase 1_: Azure Cache for Redis stops offering TLS 1.0/1.1 as an option for MinimumTLSVersion setting for new cache creates. Existing cache instances won't be updated at this point. You can still use the Azure portal or other management APIs to [change the minimum TLS version](cache-configure.md#access-ports) to 1.0 or 1.1 for backward compatibility.
32-
- _Phase 2_: Azure Cache for Redis stops supporting TLS 1.1 and TLS 1.0 starting November 1, 2024. After this change, your application must use TLS 1.2 or later to communicate with your cache. The Azure Cache for Redis service will be available while we update the MinimumTLSVerion for all caches to 1.2.
31+
- _Phase 1_: Azure Cache for Redis stops offering TLS 1.0/1.1 as an option for _MinimumTLSVersion_ setting for new cache creates. Existing cache instances won't be updated at this point. You can't set the _MinimiumTLSVersion_ to 1.0 or 1.1 for your existing cache.
32+
- _Phase 2_: Azure Cache for Redis stops supporting TLS 1.1 and TLS 1.0 starting November 1, 2024. After this change, your application must use TLS 1.2 or later to communicate with your cache. The Azure Cache for Redis service remains available while we update the _MinimumTLSVerion_ for all caches to 1.2.
3333

34-
| Date | Description |
35-
|-------- |-------------|
36-
| September 2023 | TLS 1.0/1.1 retirement announcement |
37-
| March 1, 2024 | Beginning March 1, 2024, you will not be able to create new caches with the Minimum TLS version set to 1.0 or 1.1 and you will not be able to set the Minimium TLS version to 1.0 or 1.1 for your existing cache. The Minimum TLS version won't be updated automatically for existing caches at this point.
38-
| October 31, 2024 | Ensure that all your applications are connecting to Azure Cache for Redis using TLS 1.2 and Minimum TLS version on your cache settings is set to 1.2
39-
| November 1, 2024 | Minimum TLS version for all cache instances is updated to 1.2. This means Azure Cache for Redis instances will reject connections using TLS 1.0 or 1.1.
34+
| Date | Description |
35+
| ---------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
36+
| September 2023 | TLS 1.0/1.1 retirement announcement |
37+
| March 1, 2024 | Beginning March 1, 2024, you can't create new caches with the Minimum TLS version set to 1.0 or 1.1 and you can't set the _MinimumTLSVersion_ to 1.0 or 1.1 for your existing cache. The minimum TLS version won't be updated automatically for existing caches at this point. |
38+
| October 31, 2024 | Ensure that all your applications are connecting to Azure Cache for Redis using TLS 1.2 and Minimum TLS version on your cache settings is set to 1.2. |
39+
| November 1, 2024 | Minimum TLS version for all cache instances is updated to 1.2. This means Azure Cache for Redis instances reject connections using TLS 1.0 or 1.1 at this point. |
4040

4141
> [!IMPORTANT]
4242
> The content in this article does not apply to Azure Cache for Redis Enterprise/Enterprise Flash because the Enterprise tiers only support TLS 1.2.
@@ -72,7 +72,7 @@ Redis .NET clients use the earliest TLS version by default on .NET Framework 4.5
7272

7373
Redis .NET Core clients default to the OS default TLS version, which depends on the OS itself.
7474

75-
Depending on the OS version and any patches that have been applied, the effective default TLS version can vary. For more information, see [Transport Layer Security (TLS) best practices with the .NET Framework](/dotnet/framework/network-programming/tls).
75+
Depending on the OS version and any patches that were applied, the effective default TLS version can vary. For more information, see [Transport Layer Security (TLS) best practices with the .NET Framework](/dotnet/framework/network-programming/tls).
7676

7777
However, if you're using an old OS or just want to be sure, we recommend configuring the preferred TLS version manually through the client.
7878

0 commit comments

Comments
 (0)