You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Deploy a Java application with Open Liberty or WebSphere Liberty on an Azure Kubernetes Service cluster
14
+
# Deploy a Java application with Open Liberty or WebSphere Liberty on an Azure Kubernetes Service (AKS) cluster
15
15
16
16
This article demonstrates how to:
17
17
@@ -41,7 +41,7 @@ This article is intended to help you quickly get to deployment. Before you go to
41
41
* Sign in to the Azure CLI by using the [az login](/cli/azure/reference-index#az-login) command. To finish the authentication process, follow the steps displayed in your terminal. For other sign-in options, see [Sign in with the Azure CLI](/cli/azure/authenticate-azure-cli).
42
42
* When you're prompted, install the Azure CLI extension on first use. For more information about extensions, see [Use extensions with the Azure CLI](/cli/azure/azure-cli-extensions-overview).
43
43
* Run [az version](/cli/azure/reference-index?#az-version) to find the version and dependent libraries that are installed. To upgrade to the latest version, run [az upgrade](/cli/azure/reference-index?#az-upgrade). This article requires at least version 2.31.0 of Azure CLI.
44
-
* Install a Java SE implementation, version 17 or later. (for example, [Eclipse Open J9](https://www.eclipse.org/openj9/)).
44
+
* Install a Java Standard Edition (SE) implementation, version 17 or later (for example, [Eclipse Open J9](https://www.eclipse.org/openj9/)).
45
45
* Install [Maven](https://maven.apache.org/download.cgi) 3.5.0 or higher.
46
46
* Install [Docker](https://docs.docker.com/get-docker/) for your OS.
47
47
* Ensure [Git](https://git-scm.com) is installed.
@@ -145,7 +145,7 @@ If you moved away from the **Deployment is in progress** pane, the following ste
145
145
146
146
---
147
147
148
-
You'll use these values later in this article. Note that the outputs list several other useful commands.
148
+
You use these values later in this article. The outputs list several other useful commands.
Copy file name to clipboardExpand all lines: articles/aks/workload-identity-deploy-cluster.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,7 @@ az account set --subscription <subscription-id>
44
44
45
45
To help simplify steps to configure the identities required, the steps below define environment variables that are referenced in the examples in this article. Remember to replace the values shown with your own values:
46
46
47
-
```bash
47
+
```azurecli-interactive
48
48
export RESOURCE_GROUP="myResourceGroup"
49
49
export LOCATION="eastus"
50
50
export CLUSTER_NAME="myAKSCluster"
@@ -117,7 +117,7 @@ az aks update \
117
117
118
118
To get the OIDC issuer URL and save it to an environmental variable, run the following command:
119
119
120
-
```bash
120
+
```azurecli-interactive
121
121
export AKS_OIDC_ISSUER="$(az aks show --name "${CLUSTER_NAME}" \
122
122
--resource-group "${RESOURCE_GROUP}" \
123
123
--query "oidcIssuerProfile.issuerUrl" \
@@ -146,7 +146,7 @@ az identity create \
146
146
147
147
Next, create a variable for the managed identity's client ID.
148
148
149
-
```bash
149
+
```azurecli-interactive
150
150
export USER_ASSIGNED_CLIENT_ID="$(az identity show \
151
151
--resource-group "${RESOURCE_GROUP}" \
152
152
--name "${USER_ASSIGNED_IDENTITY_NAME}" \
@@ -164,7 +164,7 @@ az aks get-credentials --name "${CLUSTER_NAME}" --resource-group "${RESOURCE_GRO
164
164
165
165
Copy and paste the following multi-line input in the Azure CLI.
166
166
167
-
```bash
167
+
```azurecli-interactive
168
168
cat <<EOF | kubectl apply -f -
169
169
apiVersion: v1
170
170
kind: ServiceAccount
@@ -321,8 +321,8 @@ The following example shows how to use the Azure role-based access control (Azur
321
321
322
322
To check whether all properties are injected properly by the webhook, use the [kubectl describe][kubectl-describe] command:
323
323
324
-
```bash
325
-
kubectl describe pod quick-start | grep "SECRET_NAME:"
324
+
```azurecli-interactive
325
+
kubectl describe pod sample-workload-identity-key-vault | grep "SECRET_NAME:"
326
326
```
327
327
328
328
If successful, the output should be similar to the following:
@@ -333,8 +333,8 @@ If successful, the output should be similar to the following:
333
333
334
334
To verify that pod is able to get a token and access the resource, use the kubectl logs command:
335
335
336
-
```bash
337
-
kubectl logs quick-start
336
+
```azurecli-interactive
337
+
kubectl logs sample-workload-identity-key-vault
338
338
```
339
339
340
340
If successful, the output should be similar to the following:
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-remove-tls-10-11.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.devlang: csharp
13
13
14
14
# Remove TLS 1.0 and 1.1 from use with Azure Cache for Redis
15
15
16
-
To meet the industry-wide push toward the exclusive use of Transport Layer Security (TLS) version 1.2 or later, Azure Cache for Redis is moving toward requiring the use of the TLS 1.2 in November, 2024. TLS versions 1.0 and 1.1 are known to be susceptible to attacks such as BEAST and POODLE, and to have other Common Vulnerabilities and Exposures (CVE) weaknesses.
16
+
To meet the industry-wide push toward the exclusive use of Transport Layer Security (TLS) version 1.2 or later, Azure Cache for Redis is moving toward requiring the use of the TLS 1.2 in November 2024. TLS versions 1.0 and 1.1 are known to be susceptible to attacks such as BEAST and POODLE, and to have other Common Vulnerabilities and Exposures (CVE) weaknesses.
17
17
18
18
TLS versions 1.0 and 1.1 also don't support the modern encryption methods and cipher suites recommended by Payment Card Industry (PCI) compliance standards. This [TLS security blog](https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-part/) explains some of these vulnerabilities in more detail.
19
19
@@ -28,15 +28,15 @@ TLS versions 1.0 and 1.1 also don't support the modern encryption methods and ci
28
28
29
29
As a part of this effort, you can expect the following changes to Azure Cache for Redis:
30
30
31
-
-_Phase 1_: Azure Cache for Redis stops offering TLS 1.0/1.1 as an option for MinimumTLSVersion setting for new cache creates. Existing cache instances won't be updated at this point. You can still use the Azure portal or other management APIs to [change the minimum TLS version](cache-configure.md#access-ports) to 1.0 or 1.1 for backward compatibility.
32
-
-_Phase 2_: Azure Cache for Redis stops supporting TLS 1.1 and TLS 1.0 starting November 1, 2024. After this change, your application must use TLS 1.2 or later to communicate with your cache. The Azure Cache for Redis service will be available while we update the MinimumTLSVerion for all caches to 1.2.
31
+
-_Phase 1_: Azure Cache for Redis stops offering TLS 1.0/1.1 as an option for _MinimumTLSVersion_ setting for new cache creates. Existing cache instances won't be updated at this point. You can't set the _MinimiumTLSVersion_to 1.0 or 1.1 for your existing cache.
32
+
-_Phase 2_: Azure Cache for Redis stops supporting TLS 1.1 and TLS 1.0 starting November 1, 2024. After this change, your application must use TLS 1.2 or later to communicate with your cache. The Azure Cache for Redis service remains available while we update the _MinimumTLSVerion_ for all caches to 1.2.
33
33
34
-
| Date | Description |
35
-
|--------|-------------|
36
-
| September 2023 | TLS 1.0/1.1 retirement announcement |
37
-
| March 1, 2024 | Beginning March 1, 2024, you will not be able to create new caches with the Minimum TLS version set to 1.0 or 1.1 and you will not be able to set the Minimium TLS version to 1.0 or 1.1 for your existing cache. The Minimum TLS version won't be updated automatically for existing caches at this point.
38
-
| October 31, 2024 | Ensure that all your applications are connecting to Azure Cache for Redis using TLS 1.2 and Minimum TLS version on your cache settings is set to 1.2
39
-
| November 1, 2024 | Minimum TLS version for all cache instances is updated to 1.2. This means Azure Cache for Redis instances will reject connections using TLS 1.0 or 1.1.
| September 2023 | TLS 1.0/1.1 retirement announcement|
37
+
| March 1, 2024 | Beginning March 1, 2024, you can't create new caches with the Minimum TLS version set to 1.0 or 1.1 and you can't set the _MinimumTLSVersion_to 1.0 or 1.1 for your existing cache. The minimum TLS version won't be updated automatically for existing caches at this point.|
38
+
| October 31, 2024 | Ensure that all your applications are connecting to Azure Cache for Redis using TLS 1.2 and Minimum TLS version on your cache settings is set to 1.2. |
39
+
| November 1, 2024 | Minimum TLS version for all cache instances is updated to 1.2. This means Azure Cache for Redis instances reject connections using TLS 1.0 or 1.1 at this point. |
40
40
41
41
> [!IMPORTANT]
42
42
> The content in this article does not apply to Azure Cache for Redis Enterprise/Enterprise Flash because the Enterprise tiers only support TLS 1.2.
@@ -72,7 +72,7 @@ Redis .NET clients use the earliest TLS version by default on .NET Framework 4.5
72
72
73
73
Redis .NET Core clients default to the OS default TLS version, which depends on the OS itself.
74
74
75
-
Depending on the OS version and any patches that have been applied, the effective default TLS version can vary. For more information, see [Transport Layer Security (TLS) best practices with the .NET Framework](/dotnet/framework/network-programming/tls).
75
+
Depending on the OS version and any patches that were applied, the effective default TLS version can vary. For more information, see [Transport Layer Security (TLS) best practices with the .NET Framework](/dotnet/framework/network-programming/tls).
76
76
77
77
However, if you're using an old OS or just want to be sure, we recommend configuring the preferred TLS version manually through the client.
0 commit comments