You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-process.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,6 +49,9 @@ If you're an approver, you're sent email notifications when you need to approve
49
49
50
50
The following diagrams show when these email notifications are sent to either the approvers or the requestor. Reference the [email notifications table](entitlement-management-process.md#email-notifications-table) to find the corresponding number to the email notifications displayed in the diagrams.
51
51
52
+
> [!NOTE]
53
+
> If the admin directly assigns a user to an access package, you won't receive an email notification when an access request has been completed or denied. Email notifications are sent only when a user makes a request for access.
54
+
52
55
### First approvers and alternate approvers
53
56
The following diagram shows the experience of first approvers and alternate approvers, and the email notifications they receive during the request process:
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/f5-big-ip-kerberos-easy-button.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -315,7 +315,7 @@ Enable **Kerberos** and **Show Advanced Setting** to enter the following:
315
315
316
316
***User Realm Source:** Required if the user domain is different to the BIG-IP’s kerberos realm. In that case, the APM session variable would contain the logged in user domain. For example,*session.saml.last.attr.name.domain*
317
317
318
-

318
+

319
319
320
320
***KDC:** IP of a Domain Controller (Or FQDN if DNS is configured & efficient)
321
321
@@ -325,7 +325,7 @@ Enable **Kerberos** and **Show Advanced Setting** to enter the following:
325
325
326
326
***Send Authorization:** Disable for applications that prefer negotiating authentication instead of receiving the kerberos token in the first request. For example, *Tomcat.*
327
327
328
-

328
+

Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/howto-use-azure-monitor-workbooks.md
+22-7Lines changed: 22 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.topic: how-to
12
12
ms.tgt_pltfrm:
13
13
ms.workload: identity
14
14
ms.subservice: report-monitor
15
-
ms.date: 5/19/2021
15
+
ms.date: 12/21/2021
16
16
ms.author: markvi
17
17
ms.reviewer: dhanyahk
18
18
---
@@ -71,12 +71,27 @@ To use Monitor workbooks, you need:
71
71
- Global administrator
72
72
73
73
## Roles
74
-
You must be in one of the following roles as well as have [access to underlying Log Analytics](../../azure-monitor/logs/manage-access.md#manage-access-using-azure-permissions) workspace to manage the workbooks:
75
-
-Global administrator
76
-
-Security administrator
77
-
-Security reader
78
-
-Report reader
79
-
-Application administrator
74
+
75
+
To access workbooks in Azure Active Directory, you must have access to the underlying [Log Analytics](../../azure-monitor/logs/manage-access.md#manage-access-using-azure-permissions) workspace and be assigned to one of the following roles:
Copy file name to clipboardExpand all lines: articles/aks/command-invoke.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ The pod created by the `run` command provides the following binaries:
25
25
26
26
In addition, `command invoke` runs the commands from your cluster so any commands run in this manner are subject to networking and other restrictions you have configured on your cluster.
27
27
28
-
## Use `invoke commnad` to run a single command
28
+
## Use `command invoke` to run a single command
29
29
30
30
Use `az aks command invoke --command` to run a command on your cluster. For example:
31
31
@@ -75,4 +75,4 @@ az aks command invoke \
75
75
--file .
76
76
```
77
77
78
-
The above runs `kubectl apply -f deployment.yaml configmap.yaml -n default` on the *myAKSCluster* cluster in *myResourceGroup*. The `deployment.yaml` and `configmap.yaml` files used by that command are part of the current directory on the development computer where `az aks command invoke` was run.
78
+
The above runs `kubectl apply -f deployment.yaml configmap.yaml -n default` on the *myAKSCluster* cluster in *myResourceGroup*. The `deployment.yaml` and `configmap.yaml` files used by that command are part of the current directory on the development computer where `az aks command invoke` was run.
Copy file name to clipboardExpand all lines: articles/aks/support-policies.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ Microsoft provides technical support for the following examples:
51
51
52
52
* Connectivity to all Kubernetes components that the Kubernetes service provides and supports, such as the API server.
53
53
* Management, uptime, QoS, and operations of Kubernetes control plane services (Kubernetes control plane, API server, etcd, and coreDNS, for example).
54
-
* Etcd data store. Support includes automated, transparent backups of all etcd data every 30 minutes for disaster planning and cluster state restoration. These backups aren't directly available to you or any users. They ensure data reliability and consistency. Etcd. on-demand rollback or restore is not supported as a feature.
54
+
* Etcd data store. Support includes automated, transparent backups of all etcd data every 30 minutes for disaster planning and cluster state restoration. These backups aren't directly available to you or any users. They ensure data reliability and consistency. On-demand rollback or restore is not supported as a feature.
55
55
* Any integration points in the Azure cloud provider driver for Kubernetes. These include integrations into other Azure services such as load balancers, persistent volumes, or networking (Kubernetes and Azure CNI).
56
56
* Questions or issues about customization of control plane components such as the Kubernetes API server, etcd, and coreDNS.
57
57
* Issues about networking, such as Azure CNI, kubenet, or other network access and functionality issues. Issues could include DNS resolution, packet loss, routing, and so on. Microsoft supports various networking scenarios:
# Mount Azure Storage as a local share in a custom container in App Service
12
12
13
13
::: zone pivot="container-windows"
14
14
15
-
> [!NOTE]
16
-
>Azure Storage in App Service Windows container is **in preview** and **not supported** for **production scenarios**.
17
-
18
15
This guide shows how to mount Azure Storage Files as a network share in a Windows container in App Service. Only [Azure Files Shares](../storage/files/storage-how-to-use-files-portal.md) and [Premium Files Shares](../storage/files/storage-how-to-create-file-share.md) are supported. The benefits of custom-mounted storage include:
19
16
20
-
::: zone-end
21
-
22
-
::: zone pivot="container-linux"
23
-
24
-
This guide shows how to mount Azure Storage as a network share in a built-in Linux container or a custom Linux container in App Service. See the video [how to mount Azure Storage as a local share](https://www.youtube.com/watch?v=OJkvpWYr57Y). The benefits of custom-mounted storage include:
25
-
26
-
::: zone-end
27
-
28
17
- Configure persistent storage for your App Service app and manage the storage separately.
29
18
- Make static content like video and images readily available for your App Service app.
30
19
- Write application log files or archive older application log to Azure File shares.
31
20
- Share content across multiple apps or with other Azure services.
32
-
33
-
::: zone pivot="container-windows"
21
+
- Mount Azure Storage in a Windows container in a Standard tier or higher plan, including Isolated ([App Service environment v3](environment/overview.md)).
34
22
35
23
The following features are supported for Windows containers:
36
24
37
-
- Secured access to storage accounts with [private links](../storage/common/storage-private-endpoints.md)(when [VNET integration](./overview-vnet-integration.md) is used). [Service endpoint](../storage/common/storage-network-security.md#grant-access-from-a-virtual-network)support is currently unavailable.
25
+
- Secured access to storage accounts with [private endpoints](../storage/common/storage-private-endpoints.md)and [service endpoints](../storage/common/storage-network-security.md#grant-access-from-a-virtual-network)(when [VNET integration](./overview-vnet-integration.md) is used).
38
26
- Azure Files (read/write).
39
27
- Up to five mount points per app.
40
28
- Drive letter assignments (`C:` to `Z:`).
@@ -43,6 +31,13 @@ The following features are supported for Windows containers:
43
31
44
32
::: zone pivot="container-linux"
45
33
34
+
This guide shows how to mount Azure Storage as a network share in a built-in Linux container or a custom Linux container in App Service. See the video [how to mount Azure Storage as a local share](https://www.youtube.com/watch?v=OJkvpWYr57Y). The benefits of custom-mounted storage include:
35
+
36
+
- Configure persistent storage for your App Service app and manage the storage separately.
37
+
- Make static content like video and images readily available for your App Service app.
38
+
- Write application log files or archive older application log to Azure File shares.
39
+
- Share content across multiple apps or with other Azure services.
40
+
46
41
The following features are supported for Linux containers:
47
42
48
43
- Secured access to storage accounts with [service endpoints](../storage/common/storage-network-security.md#grant-access-from-a-virtual-network) and [private links](../storage/common/storage-private-endpoints.md) (when [VNET integration](./overview-vnet-integration.md) is used).
@@ -52,11 +47,19 @@ The following features are supported for Linux containers:
52
47
53
48
::: zone-end
54
49
50
+
<!-- ::: zone pivot="container-windows"
51
+
52
+
::: zone-end
53
+
54
+
::: zone pivot="container-linux"
55
+
56
+
::: zone-end -->
57
+
55
58
## Prerequisites
56
59
57
60
::: zone pivot="container-windows"
58
61
59
-
-[An existing Windows custom container in Azure App Service](quickstart-custom-container.md)
62
+
-[An existing Windows container app in App Service](quickstart-custom-container.md)
-[Upload files to Azure File share](../storage/files/storage-how-to-create-file-share.md)
62
65
@@ -80,7 +83,7 @@ The following features are supported for Linux containers:
80
83
81
84
- Storage mounts are not supported for native Windows (non-containerized) apps.
82
85
- Azure blobs are not supported.
83
-
-[Storage firewall](../storage/common/storage-network-security.md) is supported only through [private endpoints](../storage/common/storage-private-endpoints.md)(when [VNET integration](./overview-vnet-integration.md) is used). Custom DNS support is currently unavailable when the mounted Azure Storage account uses a private endpoint.
86
+
-[Storage firewall](../storage/common/storage-network-security.md) is supported only through [private endpoints](../storage/common/storage-private-endpoints.md)and [service endpoints](../storage/common/storage-network-security.md#grant-access-from-a-virtual-network) (when [VNET integration](./overview-vnet-integration.md) is used).
84
87
- FTP/FTPS access to mounted storage not supported (use [Azure Storage Explorer](https://azure.microsoft.com/features/storage-explorer/)).
85
88
- Mapping `[C-Z]:\`, `[C-Z]:\home`, `/`, and `/home` to custom-mounted storage is not supported.
86
89
- Storage mounts cannot be used together with clone settings option during [deployment slot](deploy-staging-slots.md) creation.
@@ -135,21 +138,17 @@ The following features are supported for Linux containers:
135
138
|**Mount path**| Directory inside the Linux container to mount to Azure Storage. Do not use `/` or `/home`.|
136
139
::: zone-end
137
140
138
-
> [!CAUTION]
139
-
> The directory specified in **Mount path** in the container should be empty. Any content stored in this directory is deleted when the Azure Storage is mounted (if you specify a directory under `/home`, for example). If you are migrating files for an existing app, make a backup of the app and its content before you begin.
140
-
>
141
-
142
141
# [Azure CLI](#tab/cli)
143
142
144
143
Use the [`az webapp config storage-account add`](/cli/azure/webapp/config/storage-account#az_webapp_config_storage_account_add) command. For example:
-`--storage-type` must be `AzureFiles` for Windows containers.
152
-
-`mount-path-directory` must be in the form `/path/to/dir` or `[C-Z]:\path\to\dir` with no drive letter. Do not use a root directory (`[C-Z]:\` or `/`) or the `home` directory (`[C-Z]:\home`, or `/home`).
151
+
-`mount-path-directory` must be in the form `/path/to/dir` or `[C-Z]:\path\to\dir`.
153
152
::: zone-end
154
153
::: zone pivot="container-linux"
155
154
-`--storage-type` can be `AzureBlob` or `AzureFiles`. `AzureBlob` is read-only.
Verify your storage is mounted by running the following command:
160
159
161
-
```azurecli
160
+
```azurecli-interactive
162
161
az webapp config storage-account list --resource-group <resource-group> --name <app-name>
163
162
```
164
163
165
-
> [!CAUTION]
166
-
> The directory specified in `--mount-path` in the container should be empty. Any content stored in this directory is deleted when the Azure Storage is mounted (if you specify a directory under `/home`, for example). If you are migrating files for an existing app, make a backup of the app and its content before you begin.
167
-
>
168
-
169
164
Verify your configuration by running the following command:
170
165
171
166
```azurecli
@@ -201,9 +196,6 @@ To validate that the Azure Storage is mounted successfully for the app:
201
196
## Best practices
202
197
203
198
- To avoid potential issues related to latency, place the app and the Azure Storage account in the same Azure region. Note, however, if the app and Azure Storage account are in same Azure region, and if you grant access from App Service IP addresses in the [Azure Storage firewall configuration](../storage/common/storage-network-security.md), then these IP restrictions are not honored.
204
-
::: zone pivot="container-windows"
205
-
- The mount directory in the custom container should be empty. Any content stored at this path is deleted when the Azure Storage is mounted. If you are migrating files for an existing app, make a backup of the app and its content before you begin.
206
-
::: zone-end
207
199
::: zone pivot="container-linux"
208
200
- The mount directory in the custom container should be empty. Any content stored at this path is deleted when the Azure Storage is mounted (if you specify a directory under `/home`, for example). If you are migrating files for an existing app, make a backup of the app and its content before you begin.
209
201
@@ -217,19 +209,29 @@ To validate that the Azure Storage is mounted successfully for the app:
217
209
218
210
- If you delete an Azure Storage account, container, or share, remove the corresponding storage mount configuration in the app to avoid possible error scenarios.
219
211
212
+
::: zone pivot="container-windows"
213
+
- The mounted Azure Storage account can be either Standard or Premium performance tier. Based on the app capacity and throughput requirements, choose the appropriate performance tier for the storage account. See [the scalability and performance targets for Files](../storage/files/storage-files-scale-targets.md)
214
+
::: zone-end
215
+
::: zone pivot="container-linux"
220
216
- The mounted Azure Storage account can be either Standard or Premium performance tier. Based on the app capacity and throughput requirements, choose the appropriate performance tier for the storage account. See the scalability and performance targets that correspond to the storage type:
221
217
222
-
- [For Files](../storage/files/storage-files-scale-targets.md) (Windows and Linux containers)
- If your app [scales to multiple instances](../azure-monitor/autoscale/autoscale-get-started.md), all the instances connect to the same mounted Azure Storage account. To avoid performance bottlenecks and throughput issues, choose the appropriate performance tier for the storage account.
226
223
227
224
- It's not recommended to use storage mounts forlocal databases (such as SQLite) or for any other applications and components that rely on file handles and locks.
228
225
229
-
- When using Azure Storage [private endpoints](../storage/common/storage-private-endpoints.md) with the app, you need to set the following two app settings:
226
+
::: zone pivot="container-windows"
227
+
- When using Azure Storage [private endpoints](../storage/common/storage-private-endpoints.md) with the app, you need to [enable the **Route All** setting](configure-vnet-integration-routing.md).
230
228
231
-
- `WEBSITE_DNS_SERVER` = `168.63.129.16`
232
-
- `WEBSITE_VNET_ROUTE_ALL` = `1`
229
+
> [!NOTE]
230
+
> In App Service environment V3, the **Route All** setting is disabled by default and must be explicitly enabled.
231
+
::: zone-end
232
+
::: zone pivot="container-linux"
233
+
- When using Azure Storage [private endpoints](../storage/common/storage-private-endpoints.md) with the app, you need to [enable the **Route All** setting](configure-vnet-integration-routing.md).
234
+
::: zone-end
233
235
234
236
- If you [initiate a storage failover](../storage/common/storage-initiate-account-failover.md) and the storage account is mounted to the app, the mount will fail to connect until you either restart the app or remove and add the Azure Storage mount.
Copy file name to clipboardExpand all lines: articles/automation/automation-linux-hrw-install.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,10 @@ The Linux Hybrid Runbook Worker executes runbooks as a special user that can be
16
16
17
17
After you successfully deploy a runbook worker, review [Run runbooks on a Hybrid Runbook Worker](automation-hrw-run-runbooks.md) to learn how to configure your runbooks to automate processes in your on-premises datacenter or other cloud environment.
18
18
19
+
> [!NOTE]
20
+
> A hybrid worker can co-exist with both platforms: **Agent based (V1)** and **Extension based (V2)**. If you install Extension based (V2) on a hybrid worker already running Agent based (V1), then you would see two entries of the Hybrid Runbook Worker in the group. One with Platform Extension based (V2) and the other Agent based (V1). [**Learn more**](/azure/automation/extension-based-hybrid-runbook-worker-install#install-extension-based-v2-on-existing-agent-based-v1-hybrid-worker).
21
+
22
+
19
23
## Prerequisites
20
24
21
25
Before you start, make sure that you have the following.
0 commit comments