You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/enable-host-encryption.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ If you want to create clusters without host-based encryption, you can do so by o
47
47
You can enable host-based encryption on existing clusters by adding a new node pool to your cluster. Configure a new node pool to use host-based encryption by using the `--enable-encryption-at-host` parameter.
48
48
49
49
```azurecli
50
-
az aks nodepool add --name hostencrypt --cluster-name myAKSCluster --resource-group myResourceGroup -s Standard_DS2_v2 -l westus2 --enable-encryption-at-host
50
+
az aks nodepool add --name hostencrypt --cluster-name myAKSCluster --resource-group myResourceGroup -s Standard_DS2_v2 --enable-encryption-at-host
51
51
```
52
52
53
53
If you want to create new node pools without the host-based encryption feature, you can do so by omitting the `--enable-encryption-at-host` parameter.
Copy file name to clipboardExpand all lines: articles/aks/use-pod-sandboxing.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -234,7 +234,7 @@ To demonstrate the deployment of an untrusted application into the pod sandbox o
234
234
235
235
```output
236
236
root@untrusted:/# uname -r
237
-
5.15.80.mshv2-hvl1.m2
237
+
5.15.48.1-8.cm2
238
238
```
239
239
240
240
3. Start a shell session to the container of the *trusted* pod to verify the kernel output:
@@ -252,7 +252,8 @@ To demonstrate the deployment of an untrusted application into the pod sandbox o
252
252
The following example resembles output from the VM that is running the *trusted* pod, which is a different kernel than the *untrusted* pod running within the pod sandbox:
Copy file name to clipboardExpand all lines: articles/app-service/includes/quickstart-java/quickstart-java-linux-maven-pivot.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,6 +41,9 @@ If Maven isn't your preferred development tool, check out our similar tutorials
41
41
42
42
Clone the [sample project](https://github.com/Azure-Samples/app-service-java-quickstart) and check out the source code that runs with this version of the article.
43
43
44
+
> [!TIP]
45
+
> Though App Service supports older versions of Java, the sample project uses Java records and requires **Java 17**. For more information about Java records, see [JEP 395](https://openjdk.org/jeps/395).
> The Maven plugin supports **Java 17** and **Tomcat 10.0**. For more information about latest support, see [Java 17 and Tomcat 10.0 are available on Azure App Service](https://devblogs.microsoft.com/java/java-17-and-tomcat-10-0-available-on-azure-app-service/).
96
99
97
-
98
100
The deployment process to Azure App Service uses your Azure credentials from the Azure CLI automatically. If the Azure CLI isn't installed locally, then the Maven plugin authenticates with Oauth or device login. For more information, see [authentication with Maven plugins](https://github.com/microsoft/azure-maven-plugins/wiki/Authentication).
99
101
100
102
Run the Maven command shown next to configure the deployment. This command helps you to set up the App Service operating system, Java version, and Tomcat version.
Copy file name to clipboardExpand all lines: articles/app-service/overview-disaster-recovery.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ For IT, business continuity plans are largely driven by two metrics:
19
19
- Recovery Time Objective (RTO) – the time duration in which your application must come back online after an outage.
20
20
- Recovery Point Objective (RPO) – the acceptable amount of data loss in a disaster, expressed as a unit of time (for example, 1 minute of transactional database records).
21
21
22
-
Normally, maintaining an SLA around RTO is impractical for regional disasters, and you would typically design your disaster recovery strategy around RPO alone (i.e. focus on recovering data and not on minimizing interruption). With Azure, however, it's not only practical but could even be straightforward to deploy App Service for automatic geo-failovers. This lets you disaster-proof your applications further by take care of both RTO and RPO.
22
+
Normally, maintaining an SLA around RTO is impractical for regional disasters, and you would typically design your disaster recovery strategy around RPO alone (i.e. focus on recovering data and not on minimizing interruption). With Azure, however, it's not only practical but could even be straightforward to deploy App Service for automatic geo-failovers. This lets you disaster-proof your applications further by taking care of both RTO and RPO.
23
23
24
24
Depending on your desired RTO and RPO metrics, three disaster recovery architectures are commonly used, as shown in the following table:
25
25
@@ -155,4 +155,4 @@ Steps to create a passive-cold region without GRS and GZRS are summarized as fol
155
155
156
156
## Next steps
157
157
158
-
[Tutorial: Create a highly available multi-region app in Azure App Service](tutorial-multi-region-app.md)
158
+
[Tutorial: Create a highly available multi-region app in Azure App Service](tutorial-multi-region-app.md)
Copy file name to clipboardExpand all lines: articles/container-apps/user-defined-routes.md
+14-13Lines changed: 14 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,32 +16,33 @@ ms.date: 03/29/2023
16
16
17
17
This article shows you how to use user defined routes (UDR) with [Azure Firewall](../firewall/overview.md) to lock down outbound traffic from your Container Apps to back-end Azure resources or other network resources.
18
18
19
-
Azure creates a default route table for your virtual networks on create. By implementing a user-defined route table, you can control how traffic is routed within your virtual network. In this guide, you'll setup UDR on the Container Apps virtual network to restrict outbound traffic with Azure Firewall.
19
+
Azure creates a default route table for your virtual networks on create. By implementing a user-defined route table, you can control how traffic is routed within your virtual network. In this guide, your setup UDR on the Container Apps virtual network to restrict outbound traffic with Azure Firewall.
20
20
21
-
You can also use a NAT gateway or any other 3rd party appliances instead of Azure Firewall.
21
+
You can also use a NAT gateway or any other third party appliances instead of Azure Firewall.
22
22
23
23
For more information on networking concepts in Container Apps, see [Networking Architecture in Azure Container Apps](./networking.md).
24
24
25
25
## Prerequisites
26
26
27
-
*An **internal**container app environment on the workload profiles architecture that's integrated with a custom virtual network. When you create an internal container app environment, your container app environment has no public IP addresses, and all traffic is routed through the virtual network. For more information, see the [guide for how to create a container app environment on the workload profiles architecture](./workload-profiles-manage-cli.md). Ensure that you're creating an **internal** environment.
27
+
***Internal environment**: An internal container app environment on the workload profiles architecture that's integrated with a custom virtual network. When you create an internal container app environment, your container app environment has no public IP addresses, and all traffic is routed through the virtual network. For more information, see the [guide for how to create a container app environment on the workload profiles architecture](./workload-profiles-manage-cli.md).
28
28
29
-
*In your container app, have a container that supports `curl` commands. You can use `curl` to verify the container app is deployed correctly. The *helloworld* container from the sample container image already supports `curl` commands.
29
+
***`curl` support**: Your container app must have a container that supports `curl` commands. You use `curl` to verify the container app is deployed correctly. The *helloworld* container from the sample container image already supports `curl` commands.
30
30
31
31
## Create the firewall subnet
32
32
33
33
A subnet called **AzureFirewallSubnet** is required in order to deploy a firewall into the integrated virtual network.
34
34
35
-
1.In the [Azure portal](https://portal.azure.com), navigate to the virtual network that's integrated with your app.
35
+
1.Open the virtual network that's integrated with your app in the [Azure portal](https://portal.azure.com).
36
36
37
37
1. From the menu on the left, select **Subnets**, then select **+ Subnet**.
38
38
39
39
1. Enter the following values:
40
40
41
41
| Setting | Action |
42
42
| ------------ | ---------------- |
43
-
|**Name**| Enter **AzureFirewallSubnet**. |
43
+
|**Name**| Enter **AzureFirewallSubnet**. |
44
44
| **Subnet address range** | Use the default or specify a [subnet range /26 or larger](../firewall/firewall-faq.yml#why-does-azure-firewall-need-a--26-subnet-size).
45
+
45
46
1. Select **Save**
46
47
47
48
## Deploy the firewall
@@ -73,7 +74,7 @@ A subnet called **AzureFirewallSubnet** is required in order to deploy a firewal
73
74
74
75
## Route all traffic to the firewall
75
76
76
-
Your virtual networks in Azure have default route tables in place upon create. By implementing a user-defined route table, you can control how traffic is routed within your virtual network. In the following steps, you create a UDR to route all traffic to your Azure Firewall.
77
+
Your virtual networks in Azure have default route tables in place when you create the network. By implementing a user-defined route table, you can control how traffic is routed within your virtual network. In the following steps, you create a UDR to route all traffic to your Azure Firewall.
77
78
78
79
1. On the Azure portal menu or the *Home* page, select **Create a resource**.
79
80
@@ -107,14 +108,14 @@ Your virtual networks in Azure have default route tables in place upon create. B
107
108
108
109
1. Select **Add** to create the route.
109
110
110
-
1. From the menu on the left, select **Subnets**, then select **Associate** to associate your route table with the subnet your Container App is integrated with.
111
+
1. From the menu on the left, select **Subnets**, then select **Associate** to associate your route table with the container app's subnet.
111
112
112
113
1. Configure the *Associate subnet* with the following values:
113
114
114
115
| Setting | Action |
115
116
|--|--|
116
-
|**Address prefix**| Select the virtual network your container app is integrated with|
117
-
|**Next hop type**| Select the subnet your container app is integrated with|
117
+
|**Address prefix**| Select the virtual network for your container app.|
118
+
|**Next hop type**| Select the subnet your for container app.|
118
119
119
120
1. Select **OK**.
120
121
@@ -151,7 +152,7 @@ Now, all outbound traffic from your container app is routed to the firewall. Cur
151
152
|**Action**| Select *Allow*|
152
153
153
154
>[!Note]
154
-
> If you are using [Docker Hub registry](https://docs.docker.com/desktop/allow-list/) and want to access it through your firewall, you will need to add the following FQDNs to your rules destination list above: *hub.docker.com*, *registry-1.docker.io*, and *production.cloudflare.docker.com*.
155
+
> If you are using [Docker Hub registry](https://docs.docker.com/desktop/allow-list/) and want to access it through your firewall, you will need to add the following FQDNs to your rules destination list: *hub.docker.com*, *registry-1.docker.io*, and *production.cloudflare.docker.com*.
155
156
156
157
1. Select **Add**.
157
158
@@ -161,13 +162,13 @@ To verify your firewall configuration is set up correctly, you can use the `curl
161
162
162
163
1. Navigate to your Container App that is configured with Azure Firewall.
163
164
164
-
1. From the menu on the left, select **Console**, then select your container that supports the `curl` command. If you're using the helloworld container from the sample container image quickstart, you can run the `curl` command.
165
+
1. From the menu on the left, select **Console**, then select your container that supports the `curl` command. If you're using the *helloworld* container from the sample container image quickstart, you can run the `curl` command.
165
166
166
167
1. In the **Choose start up command** menu, select **/bin/sh**, and select **Connect**.
167
168
168
169
1. In the console, run `curl -s https://mcr.microsoft.com`. You should see a successful response as you added `mcr.microsoft.com` to the allowlist for your firewall policies.
169
170
170
-
1. Run `curl -s https://<fqdn-address>` for a URL that doesn't match any of your destination rules such as `example.com`. The example command would be `curl -s https://example.com`. You should get no response, which indicates that your firewall has blocked the request.
171
+
1. Run `curl -s https://<FQDN_ADDRESS>` for a URL that doesn't match any of your destination rules such as `example.com`. The example command would be `curl -s https://example.com`. You should get no response, which indicates that your firewall has blocked the request.
0 commit comments