Skip to content

Commit e99c75f

Browse files
authored
Merge pull request #183450 from MicrosoftDocs/master
12/21 AM Publishing
2 parents b503c4e + 7a24a15 commit e99c75f

File tree

51 files changed

+861
-421
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+861
-421
lines changed

articles/active-directory/app-provisioning/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ landingContent:
2222
links:
2323
- text: What is application provisioning?
2424
url: user-provisioning.md
25+
- text: What is HR-driven provisioning?
26+
url: what-is-hr-driven-provisioning.md
2527
- text: How provisioning works
2628
url: how-provisioning-works.md
2729
- linkListType: tutorial

articles/active-directory/governance/entitlement-management-process.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,9 @@ If you're an approver, you're sent email notifications when you need to approve
4949

5050
The following diagrams show when these email notifications are sent to either the approvers or the requestor. Reference the [email notifications table](entitlement-management-process.md#email-notifications-table) to find the corresponding number to the email notifications displayed in the diagrams.
5151

52+
> [!NOTE]
53+
> If the admin directly assigns a user to an access package, you won't receive an email notification when an access request has been completed or denied. Email notifications are sent only when a user makes a request for access.
54+
5255
### First approvers and alternate approvers
5356
The following diagram shows the experience of first approvers and alternate approvers, and the email notifications they receive during the request process:
5457

articles/active-directory/hybrid/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,8 @@ landingContent:
2727
links:
2828
- text: What is hybrid identity?
2929
url: whatis-hybrid-identity.md
30+
- text: What is inter-directory provisioning?
31+
url: whatis-hybrid-identity.md
3032

3133
# Card
3234
- title: Determine the best solution to manage the lifecycle of your users and groups

articles/active-directory/manage-apps/f5-big-ip-kerberos-easy-button.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -315,7 +315,7 @@ Enable **Kerberos** and **Show Advanced Setting** to enter the following:
315315

316316
* **User Realm Source:** Required if the user domain is different to the BIG-IP’s kerberos realm. In that case, the APM session variable would contain the logged in user domain. For example,*session.saml.last.attr.name.domain*
317317

318-
![Screenshot for SSO and HTTP headers](./media/f5-big-ip-kerberos-easy-button/sso-headers.png)
318+
![Screenshot for SSO and HTTP headers](./media/f5-big-ip-kerberos-easy-button/sso-headers.png)
319319

320320
* **KDC:** IP of a Domain Controller (Or FQDN if DNS is configured & efficient)
321321

@@ -325,7 +325,7 @@ Enable **Kerberos** and **Show Advanced Setting** to enter the following:
325325

326326
* **Send Authorization:** Disable for applications that prefer negotiating authentication instead of receiving the kerberos token in the first request. For example, *Tomcat.*
327327

328-
![Screenshot for SSO method configuration](./media/f5-big-ip-kerberos-easy-button/sso-method-config.png)
328+
![Screenshot for SSO method configuration](./media/f5-big-ip-kerberos-easy-button/sso-method-config.png)
329329

330330

331331
### Session Management

articles/active-directory/reports-monitoring/howto-use-azure-monitor-workbooks.md

Lines changed: 22 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.topic: how-to
1212
ms.tgt_pltfrm:
1313
ms.workload: identity
1414
ms.subservice: report-monitor
15-
ms.date: 5/19/2021
15+
ms.date: 12/21/2021
1616
ms.author: markvi
1717
ms.reviewer: dhanyahk
1818
---
@@ -71,12 +71,27 @@ To use Monitor workbooks, you need:
7171
- Global administrator
7272

7373
## Roles
74-
You must be in one of the following roles as well as have [access to underlying Log Analytics](../../azure-monitor/logs/manage-access.md#manage-access-using-azure-permissions) workspace to manage the workbooks:
75-
- Global administrator
76-
- Security administrator
77-
- Security reader
78-
- Report reader
79-
- Application administrator
74+
75+
To access workbooks in Azure Active Directory, you must have access to the underlying [Log Analytics](../../azure-monitor/logs/manage-access.md#manage-access-using-azure-permissions) workspace and be assigned to one of the following roles:
76+
77+
78+
- Global Reader
79+
80+
- Reports Reader
81+
82+
- Security Reader
83+
84+
- Application Administrator
85+
86+
- Cloud Application Administrator
87+
88+
- Company Administrator
89+
90+
- Security Administrator
91+
92+
93+
94+
8095

8196
## Workbook access
8297

articles/aks/command-invoke.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The pod created by the `run` command provides the following binaries:
2525

2626
In addition, `command invoke` runs the commands from your cluster so any commands run in this manner are subject to networking and other restrictions you have configured on your cluster.
2727

28-
## Use `invoke commnad` to run a single command
28+
## Use `command invoke` to run a single command
2929

3030
Use `az aks command invoke --command` to run a command on your cluster. For example:
3131

@@ -75,4 +75,4 @@ az aks command invoke \
7575
--file .
7676
```
7777

78-
The above runs `kubectl apply -f deployment.yaml configmap.yaml -n default` on the *myAKSCluster* cluster in *myResourceGroup*. The `deployment.yaml` and `configmap.yaml` files used by that command are part of the current directory on the development computer where `az aks command invoke` was run.
78+
The above runs `kubectl apply -f deployment.yaml configmap.yaml -n default` on the *myAKSCluster* cluster in *myResourceGroup*. The `deployment.yaml` and `configmap.yaml` files used by that command are part of the current directory on the development computer where `az aks command invoke` was run.

articles/aks/support-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Microsoft provides technical support for the following examples:
5151

5252
* Connectivity to all Kubernetes components that the Kubernetes service provides and supports, such as the API server.
5353
* Management, uptime, QoS, and operations of Kubernetes control plane services (Kubernetes control plane, API server, etcd, and coreDNS, for example).
54-
* Etcd data store. Support includes automated, transparent backups of all etcd data every 30 minutes for disaster planning and cluster state restoration. These backups aren't directly available to you or any users. They ensure data reliability and consistency. Etcd. on-demand rollback or restore is not supported as a feature.
54+
* Etcd data store. Support includes automated, transparent backups of all etcd data every 30 minutes for disaster planning and cluster state restoration. These backups aren't directly available to you or any users. They ensure data reliability and consistency. On-demand rollback or restore is not supported as a feature.
5555
* Any integration points in the Azure cloud provider driver for Kubernetes. These include integrations into other Azure services such as load balancers, persistent volumes, or networking (Kubernetes and Azure CNI).
5656
* Questions or issues about customization of control plane components such as the Kubernetes API server, etcd, and coreDNS.
5757
* Issues about networking, such as Azure CNI, kubenet, or other network access and functionality issues. Issues could include DNS resolution, packet loss, routing, and so on. Microsoft supports various networking scenarios:

articles/app-service/configure-connect-to-azure-storage.md

Lines changed: 38 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -4,37 +4,25 @@ description: Learn how to attach custom network share in a containerized app in
44
author: msangapu-msft
55

66
ms.topic: article
7-
ms.date: 09/02/2021
7+
ms.date: 12/03/2021
88
ms.author: msangapu
99
zone_pivot_groups: app-service-containers-windows-linux
1010
---
1111
# Mount Azure Storage as a local share in a custom container in App Service
1212

1313
::: zone pivot="container-windows"
1414

15-
> [!NOTE]
16-
>Azure Storage in App Service Windows container is **in preview** and **not supported** for **production scenarios**.
17-
1815
This guide shows how to mount Azure Storage Files as a network share in a Windows container in App Service. Only [Azure Files Shares](../storage/files/storage-how-to-use-files-portal.md) and [Premium Files Shares](../storage/files/storage-how-to-create-file-share.md) are supported. The benefits of custom-mounted storage include:
1916

20-
::: zone-end
21-
22-
::: zone pivot="container-linux"
23-
24-
This guide shows how to mount Azure Storage as a network share in a built-in Linux container or a custom Linux container in App Service. See the video [how to mount Azure Storage as a local share](https://www.youtube.com/watch?v=OJkvpWYr57Y). The benefits of custom-mounted storage include:
25-
26-
::: zone-end
27-
2817
- Configure persistent storage for your App Service app and manage the storage separately.
2918
- Make static content like video and images readily available for your App Service app.
3019
- Write application log files or archive older application log to Azure File shares.
3120
- Share content across multiple apps or with other Azure services.
32-
33-
::: zone pivot="container-windows"
21+
- Mount Azure Storage in a Windows container in a Standard tier or higher plan, including Isolated ([App Service environment v3](environment/overview.md)).
3422

3523
The following features are supported for Windows containers:
3624

37-
- Secured access to storage accounts with [private links](../storage/common/storage-private-endpoints.md) (when [VNET integration](./overview-vnet-integration.md) is used). [Service endpoint](../storage/common/storage-network-security.md#grant-access-from-a-virtual-network) support is currently unavailable.
25+
- Secured access to storage accounts with [private endpoints](../storage/common/storage-private-endpoints.md) and [service endpoints](../storage/common/storage-network-security.md#grant-access-from-a-virtual-network) (when [VNET integration](./overview-vnet-integration.md) is used).
3826
- Azure Files (read/write).
3927
- Up to five mount points per app.
4028
- Drive letter assignments (`C:` to `Z:`).
@@ -43,6 +31,13 @@ The following features are supported for Windows containers:
4331

4432
::: zone pivot="container-linux"
4533

34+
This guide shows how to mount Azure Storage as a network share in a built-in Linux container or a custom Linux container in App Service. See the video [how to mount Azure Storage as a local share](https://www.youtube.com/watch?v=OJkvpWYr57Y). The benefits of custom-mounted storage include:
35+
36+
- Configure persistent storage for your App Service app and manage the storage separately.
37+
- Make static content like video and images readily available for your App Service app.
38+
- Write application log files or archive older application log to Azure File shares.
39+
- Share content across multiple apps or with other Azure services.
40+
4641
The following features are supported for Linux containers:
4742

4843
- Secured access to storage accounts with [service endpoints](../storage/common/storage-network-security.md#grant-access-from-a-virtual-network) and [private links](../storage/common/storage-private-endpoints.md) (when [VNET integration](./overview-vnet-integration.md) is used).
@@ -52,11 +47,19 @@ The following features are supported for Linux containers:
5247

5348
::: zone-end
5449

50+
<!-- ::: zone pivot="container-windows"
51+
52+
::: zone-end
53+
54+
::: zone pivot="container-linux"
55+
56+
::: zone-end -->
57+
5558
## Prerequisites
5659

5760
::: zone pivot="container-windows"
5861

59-
- [An existing Windows custom container in Azure App Service](quickstart-custom-container.md)
62+
- [An existing Windows container app in App Service](quickstart-custom-container.md)
6063
- [Create Azure file share](../storage/files/storage-how-to-use-files-portal.md)
6164
- [Upload files to Azure File share](../storage/files/storage-how-to-create-file-share.md)
6265

@@ -80,7 +83,7 @@ The following features are supported for Linux containers:
8083

8184
- Storage mounts are not supported for native Windows (non-containerized) apps.
8285
- Azure blobs are not supported.
83-
- [Storage firewall](../storage/common/storage-network-security.md) is supported only through [private endpoints](../storage/common/storage-private-endpoints.md) (when [VNET integration](./overview-vnet-integration.md) is used). Custom DNS support is currently unavailable when the mounted Azure Storage account uses a private endpoint.
86+
- [Storage firewall](../storage/common/storage-network-security.md) is supported only through [private endpoints](../storage/common/storage-private-endpoints.md) and [service endpoints](../storage/common/storage-network-security.md#grant-access-from-a-virtual-network) (when [VNET integration](./overview-vnet-integration.md) is used).
8487
- FTP/FTPS access to mounted storage not supported (use [Azure Storage Explorer](https://azure.microsoft.com/features/storage-explorer/)).
8588
- Mapping `[C-Z]:\`, `[C-Z]:\home`, `/`, and `/home` to custom-mounted storage is not supported.
8689
- Storage mounts cannot be used together with clone settings option during [deployment slot](deploy-staging-slots.md) creation.
@@ -135,21 +138,17 @@ The following features are supported for Linux containers:
135138
| **Mount path** | Directory inside the Linux container to mount to Azure Storage. Do not use `/` or `/home`.|
136139
::: zone-end
137140

138-
> [!CAUTION]
139-
> The directory specified in **Mount path** in the container should be empty. Any content stored in this directory is deleted when the Azure Storage is mounted (if you specify a directory under `/home`, for example). If you are migrating files for an existing app, make a backup of the app and its content before you begin.
140-
>
141-
142141
# [Azure CLI](#tab/cli)
143142

144143
Use the [`az webapp config storage-account add`](/cli/azure/webapp/config/storage-account#az_webapp_config_storage_account_add) command. For example:
145144

146-
```azurecli
145+
```azurecli-interactive
147146
az webapp config storage-account add --resource-group <group-name> --name <app-name> --custom-id <custom-id> --storage-type AzureFiles --share-name <share-name> --account-name <storage-account-name> --access-key "<access-key>" --mount-path <mount-path-directory>
148147
```
149148

150149
::: zone pivot="container-windows"
151150
- `--storage-type` must be `AzureFiles` for Windows containers.
152-
- `mount-path-directory` must be in the form `/path/to/dir` or `[C-Z]:\path\to\dir` with no drive letter. Do not use a root directory (`[C-Z]:\` or `/`) or the `home` directory (`[C-Z]:\home`, or `/home`).
151+
- `mount-path-directory` must be in the form `/path/to/dir` or `[C-Z]:\path\to\dir`.
153152
::: zone-end
154153
::: zone pivot="container-linux"
155154
- `--storage-type` can be `AzureBlob` or `AzureFiles`. `AzureBlob` is read-only.
@@ -158,14 +157,10 @@ az webapp config storage-account add --resource-group <group-name> --name <app-n
158157

159158
Verify your storage is mounted by running the following command:
160159

161-
```azurecli
160+
```azurecli-interactive
162161
az webapp config storage-account list --resource-group <resource-group> --name <app-name>
163162
```
164163

165-
> [!CAUTION]
166-
> The directory specified in `--mount-path` in the container should be empty. Any content stored in this directory is deleted when the Azure Storage is mounted (if you specify a directory under `/home`, for example). If you are migrating files for an existing app, make a backup of the app and its content before you begin.
167-
>
168-
169164
Verify your configuration by running the following command:
170165

171166
```azurecli
@@ -201,9 +196,6 @@ To validate that the Azure Storage is mounted successfully for the app:
201196
## Best practices
202197

203198
- To avoid potential issues related to latency, place the app and the Azure Storage account in the same Azure region. Note, however, if the app and Azure Storage account are in same Azure region, and if you grant access from App Service IP addresses in the [Azure Storage firewall configuration](../storage/common/storage-network-security.md), then these IP restrictions are not honored.
204-
::: zone pivot="container-windows"
205-
- The mount directory in the custom container should be empty. Any content stored at this path is deleted when the Azure Storage is mounted. If you are migrating files for an existing app, make a backup of the app and its content before you begin.
206-
::: zone-end
207199
::: zone pivot="container-linux"
208200
- The mount directory in the custom container should be empty. Any content stored at this path is deleted when the Azure Storage is mounted (if you specify a directory under `/home`, for example). If you are migrating files for an existing app, make a backup of the app and its content before you begin.
209201

@@ -217,19 +209,29 @@ To validate that the Azure Storage is mounted successfully for the app:
217209
218210
- If you delete an Azure Storage account, container, or share, remove the corresponding storage mount configuration in the app to avoid possible error scenarios.
219211
212+
::: zone pivot="container-windows"
213+
- The mounted Azure Storage account can be either Standard or Premium performance tier. Based on the app capacity and throughput requirements, choose the appropriate performance tier for the storage account. See [the scalability and performance targets for Files](../storage/files/storage-files-scale-targets.md)
214+
::: zone-end
215+
::: zone pivot="container-linux"
220216
- The mounted Azure Storage account can be either Standard or Premium performance tier. Based on the app capacity and throughput requirements, choose the appropriate performance tier for the storage account. See the scalability and performance targets that correspond to the storage type:
221217
222-
- [For Files](../storage/files/storage-files-scale-targets.md) (Windows and Linux containers)
223-
- [For Blobs](../storage/blobs/scalability-targets.md) (Linux containers only)
218+
- [For Files](../storage/files/storage-files-scale-targets.md)
219+
- [For Blobs](../storage/blobs/scalability-targets.md)
220+
::: zone-end
224221
225222
- If your app [scales to multiple instances](../azure-monitor/autoscale/autoscale-get-started.md), all the instances connect to the same mounted Azure Storage account. To avoid performance bottlenecks and throughput issues, choose the appropriate performance tier for the storage account.
226223
227224
- It's not recommended to use storage mounts for local databases (such as SQLite) or for any other applications and components that rely on file handles and locks.
228225

229-
- When using Azure Storage [private endpoints](../storage/common/storage-private-endpoints.md) with the app, you need to set the following two app settings:
226+
::: zone pivot="container-windows"
227+
- When using Azure Storage [private endpoints](../storage/common/storage-private-endpoints.md) with the app, you need to [enable the **Route All** setting](configure-vnet-integration-routing.md).
230228

231-
- `WEBSITE_DNS_SERVER` = `168.63.129.16`
232-
- `WEBSITE_VNET_ROUTE_ALL` = `1`
229+
> [!NOTE]
230+
> In App Service environment V3, the **Route All** setting is disabled by default and must be explicitly enabled.
231+
::: zone-end
232+
::: zone pivot="container-linux"
233+
- When using Azure Storage [private endpoints](../storage/common/storage-private-endpoints.md) with the app, you need to [enable the **Route All** setting](configure-vnet-integration-routing.md).
234+
::: zone-end
233235

234236
- If you [initiate a storage failover](../storage/common/storage-initiate-account-failover.md) and the storage account is mounted to the app, the mount will fail to connect until you either restart the app or remove and add the Azure Storage mount.
235237

articles/automation/automation-hrw-run-runbooks.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -375,7 +375,6 @@ When starting a runbook using PowerShell, use the `RunOn` parameter with the [St
375375
```azurepowershell-interactive
376376
Start-AzAutomationRunbook -AutomationAccountName "MyAutomationAccount" -Name "Test-Runbook" -RunOn "MyHybridGroup"
377377
```
378-
379378
## Logging
380379
381380
To help troubleshoot issues with your runbooks running on a hybrid runbook worker, logs are stored locally in the following location:

articles/automation/automation-linux-hrw-install.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,10 @@ The Linux Hybrid Runbook Worker executes runbooks as a special user that can be
1616

1717
After you successfully deploy a runbook worker, review [Run runbooks on a Hybrid Runbook Worker](automation-hrw-run-runbooks.md) to learn how to configure your runbooks to automate processes in your on-premises datacenter or other cloud environment.
1818

19+
> [!NOTE]
20+
> A hybrid worker can co-exist with both platforms: **Agent based (V1)** and **Extension based (V2)**. If you install Extension based (V2) on a hybrid worker already running Agent based (V1), then you would see two entries of the Hybrid Runbook Worker in the group. One with Platform Extension based (V2) and the other Agent based (V1). [**Learn more**](/azure/automation/extension-based-hybrid-runbook-worker-install#install-extension-based-v2-on-existing-agent-based-v1-hybrid-worker).
21+
22+
1923
## Prerequisites
2024

2125
Before you start, make sure that you have the following.

0 commit comments

Comments
 (0)