Skip to content

Commit ea36ca2

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into mrb_03_29_2023_prompt_engineering
2 parents e30cf61 + 5fe4b36 commit ea36ca2

36 files changed

+287
-1384
lines changed

articles/aks/enable-host-encryption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ If you want to create clusters without host-based encryption, you can do so by o
4747
You can enable host-based encryption on existing clusters by adding a new node pool to your cluster. Configure a new node pool to use host-based encryption by using the `--enable-encryption-at-host` parameter.
4848

4949
```azurecli
50-
az aks nodepool add --name hostencrypt --cluster-name myAKSCluster --resource-group myResourceGroup -s Standard_DS2_v2 -l westus2 --enable-encryption-at-host
50+
az aks nodepool add --name hostencrypt --cluster-name myAKSCluster --resource-group myResourceGroup -s Standard_DS2_v2 --enable-encryption-at-host
5151
```
5252

5353
If you want to create new node pools without the host-based encryption feature, you can do so by omitting the `--enable-encryption-at-host` parameter.

articles/aks/use-pod-sandboxing.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -234,7 +234,7 @@ To demonstrate the deployment of an untrusted application into the pod sandbox o
234234
235235
```output
236236
root@untrusted:/# uname -r
237-
5.15.80.mshv2-hvl1.m2
237+
5.15.48.1-8.cm2
238238
```
239239
240240
3. Start a shell session to the container of the *trusted* pod to verify the kernel output:
@@ -252,7 +252,8 @@ To demonstrate the deployment of an untrusted application into the pod sandbox o
252252
The following example resembles output from the VM that is running the *trusted* pod, which is a different kernel than the *untrusted* pod running within the pod sandbox:
253253
254254
```output
255-
5.15.48.1-8.cm2
255+
5.15.80.mshv2-hvl1.m2
256+
```
256257
257258
## Cleanup
258259

articles/api-management/how-to-event-grid.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,5 +86,4 @@ API Management event data includes the `resourceUri`, which identifies the API M
8686

8787
## Next steps
8888

89-
* [Choose between Azure messaging services - Event Grid, Event Hubs, and Service Bus](../event-grid/compare-messaging-services.md)
9089
* Learn more about [subscribing to events](../event-grid/subscribe-through-portal.md).

articles/app-service/includes/quickstart-java/quickstart-java-linux-maven-pivot.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,9 @@ If Maven isn't your preferred development tool, check out our similar tutorials
4141

4242
Clone the [sample project](https://github.com/Azure-Samples/app-service-java-quickstart) and check out the source code that runs with this version of the article.
4343

44+
> [!TIP]
45+
> Though App Service supports older versions of Java, the sample project uses Java records and requires **Java 17**. For more information about Java records, see [JEP 395](https://openjdk.org/jeps/395).
46+
4447
```azurecli-interactive
4548
git clone https://github.com/Azure-Samples/app-service-java-quickstart
4649
```
@@ -94,7 +97,6 @@ cd petstore-ee7
9497
> [!TIP]
9598
> The Maven plugin supports **Java 17** and **Tomcat 10.0**. For more information about latest support, see [Java 17 and Tomcat 10.0 are available on Azure App Service](https://devblogs.microsoft.com/java/java-17-and-tomcat-10-0-available-on-azure-app-service/).
9699
97-
98100
The deployment process to Azure App Service uses your Azure credentials from the Azure CLI automatically. If the Azure CLI isn't installed locally, then the Maven plugin authenticates with Oauth or device login. For more information, see [authentication with Maven plugins](https://github.com/microsoft/azure-maven-plugins/wiki/Authentication).
99101

100102
Run the Maven command shown next to configure the deployment. This command helps you to set up the App Service operating system, Java version, and Tomcat version.

articles/app-service/overview-disaster-recovery.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ For IT, business continuity plans are largely driven by two metrics:
1919
- Recovery Time Objective (RTO) – the time duration in which your application must come back online after an outage.
2020
- Recovery Point Objective (RPO) – the acceptable amount of data loss in a disaster, expressed as a unit of time (for example, 1 minute of transactional database records).
2121

22-
Normally, maintaining an SLA around RTO is impractical for regional disasters, and you would typically design your disaster recovery strategy around RPO alone (i.e. focus on recovering data and not on minimizing interruption). With Azure, however, it's not only practical but could even be straightforward to deploy App Service for automatic geo-failovers. This lets you disaster-proof your applications further by take care of both RTO and RPO.
22+
Normally, maintaining an SLA around RTO is impractical for regional disasters, and you would typically design your disaster recovery strategy around RPO alone (i.e. focus on recovering data and not on minimizing interruption). With Azure, however, it's not only practical but could even be straightforward to deploy App Service for automatic geo-failovers. This lets you disaster-proof your applications further by taking care of both RTO and RPO.
2323

2424
Depending on your desired RTO and RPO metrics, three disaster recovery architectures are commonly used, as shown in the following table:
2525

@@ -155,4 +155,4 @@ Steps to create a passive-cold region without GRS and GZRS are summarized as fol
155155
156156
## Next steps
157157
158-
[Tutorial: Create a highly available multi-region app in Azure App Service](tutorial-multi-region-app.md)
158+
[Tutorial: Create a highly available multi-region app in Azure App Service](tutorial-multi-region-app.md)

articles/azure-functions/monitor-functions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -100,10 +100,10 @@ The following table lists common and recommended alert rules for Functions.
100100
| Metric | Average connections| When number of connections exceed a set value|
101101
| Metric | HTTP 404| When HTTP 404 responses exceed a set value|
102102
| Metric | HTTP Server Errors| When HTTP 5xx errors exceed a set value|
103-
| Activity Log | Create or Update Web App | When app is created or updated|
104-
| Activity Log | Delete Web App | When app is deleted|
105-
| Activity Log | Restart Web App| When app is restarted|
106-
| Activity Log | Stop Web App| When app is stopped|
103+
| Activity Log | Create or update function app | When app is created or updated|
104+
| Activity Log | Delete function app | When app is deleted|
105+
| Activity Log | Restart function app| When app is restarted|
106+
| Activity Log | Stop function app| When app is stopped|
107107

108108
## Next steps
109109

articles/azure-netapp-files/whats-new.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,6 @@ Azure NetApp Files is updated regularly. This article provides a summary about t
152152
* Azure Managed Disk as an alternate storage back end
153153

154154
* [Active Directory connection enhancement: Reset Active Directory computer account password](create-active-directory-connections.md#reset-active-directory) (Preview)
155-
>>>>>>> 15252d24ac8fc6f9c2853c1a0deeb10d3393f104
156155

157156
## June 2022
158157

articles/container-apps/user-defined-routes.md

Lines changed: 14 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -16,32 +16,33 @@ ms.date: 03/29/2023
1616
1717
This article shows you how to use user defined routes (UDR) with [Azure Firewall](../firewall/overview.md) to lock down outbound traffic from your Container Apps to back-end Azure resources or other network resources.
1818

19-
Azure creates a default route table for your virtual networks on create. By implementing a user-defined route table, you can control how traffic is routed within your virtual network. In this guide, you'll setup UDR on the Container Apps virtual network to restrict outbound traffic with Azure Firewall.
19+
Azure creates a default route table for your virtual networks on create. By implementing a user-defined route table, you can control how traffic is routed within your virtual network. In this guide, your setup UDR on the Container Apps virtual network to restrict outbound traffic with Azure Firewall.
2020

21-
You can also use a NAT gateway or any other 3rd party appliances instead of Azure Firewall.
21+
You can also use a NAT gateway or any other third party appliances instead of Azure Firewall.
2222

2323
For more information on networking concepts in Container Apps, see [Networking Architecture in Azure Container Apps](./networking.md).
2424

2525
## Prerequisites
2626

27-
* An **internal** container app environment on the workload profiles architecture that's integrated with a custom virtual network. When you create an internal container app environment, your container app environment has no public IP addresses, and all traffic is routed through the virtual network. For more information, see the [guide for how to create a container app environment on the workload profiles architecture](./workload-profiles-manage-cli.md). Ensure that you're creating an **internal** environment.
27+
* **Internal environment**: An internal container app environment on the workload profiles architecture that's integrated with a custom virtual network. When you create an internal container app environment, your container app environment has no public IP addresses, and all traffic is routed through the virtual network. For more information, see the [guide for how to create a container app environment on the workload profiles architecture](./workload-profiles-manage-cli.md).
2828

29-
* In your container app, have a container that supports `curl` commands. You can use `curl` to verify the container app is deployed correctly. The *helloworld* container from the sample container image already supports `curl` commands.
29+
* **`curl` support**: Your container app must have a container that supports `curl` commands. You use `curl` to verify the container app is deployed correctly. The *helloworld* container from the sample container image already supports `curl` commands.
3030

3131
## Create the firewall subnet
3232

3333
A subnet called **AzureFirewallSubnet** is required in order to deploy a firewall into the integrated virtual network.
3434

35-
1. In the [Azure portal](https://portal.azure.com), navigate to the virtual network that's integrated with your app.
35+
1. Open the virtual network that's integrated with your app in the [Azure portal](https://portal.azure.com).
3636

3737
1. From the menu on the left, select **Subnets**, then select **+ Subnet**.
3838

3939
1. Enter the following values:
4040

4141
| Setting | Action |
4242
| ------------ | ---------------- |
43-
| **Name** | Enter **AzureFirewallSubnet**. |
43+
| **Name** | Enter **AzureFirewallSubnet**. |
4444
| **Subnet address range** | Use the default or specify a [subnet range /26 or larger](../firewall/firewall-faq.yml#why-does-azure-firewall-need-a--26-subnet-size).
45+
4546
1. Select **Save**
4647

4748
## Deploy the firewall
@@ -73,7 +74,7 @@ A subnet called **AzureFirewallSubnet** is required in order to deploy a firewal
7374

7475
## Route all traffic to the firewall
7576

76-
Your virtual networks in Azure have default route tables in place upon create. By implementing a user-defined route table, you can control how traffic is routed within your virtual network. In the following steps, you create a UDR to route all traffic to your Azure Firewall.
77+
Your virtual networks in Azure have default route tables in place when you create the network. By implementing a user-defined route table, you can control how traffic is routed within your virtual network. In the following steps, you create a UDR to route all traffic to your Azure Firewall.
7778

7879
1. On the Azure portal menu or the *Home* page, select **Create a resource**.
7980

@@ -107,14 +108,14 @@ Your virtual networks in Azure have default route tables in place upon create. B
107108

108109
1. Select **Add** to create the route.
109110

110-
1. From the menu on the left, select **Subnets**, then select **Associate** to associate your route table with the subnet your Container App is integrated with.
111+
1. From the menu on the left, select **Subnets**, then select **Associate** to associate your route table with the container app's subnet.
111112

112113
1. Configure the *Associate subnet* with the following values:
113114

114115
| Setting | Action |
115116
|--|--|
116-
| **Address prefix** | Select the virtual network your container app is integrated with |
117-
| **Next hop type** | Select the subnet your container app is integrated with |
117+
| **Address prefix** | Select the virtual network for your container app. |
118+
| **Next hop type** | Select the subnet your for container app. |
118119

119120
1. Select **OK**.
120121

@@ -151,7 +152,7 @@ Now, all outbound traffic from your container app is routed to the firewall. Cur
151152
| **Action** | Select *Allow* |
152153

153154
>[!Note]
154-
> If you are using [Docker Hub registry](https://docs.docker.com/desktop/allow-list/) and want to access it through your firewall, you will need to add the following FQDNs to your rules destination list above: *hub.docker.com*, *registry-1.docker.io*, and *production.cloudflare.docker.com*.
155+
> If you are using [Docker Hub registry](https://docs.docker.com/desktop/allow-list/) and want to access it through your firewall, you will need to add the following FQDNs to your rules destination list: *hub.docker.com*, *registry-1.docker.io*, and *production.cloudflare.docker.com*.
155156
156157
1. Select **Add**.
157158

@@ -161,13 +162,13 @@ To verify your firewall configuration is set up correctly, you can use the `curl
161162

162163
1. Navigate to your Container App that is configured with Azure Firewall.
163164

164-
1. From the menu on the left, select **Console**, then select your container that supports the `curl` command. If you're using the helloworld container from the sample container image quickstart, you can run the `curl` command.
165+
1. From the menu on the left, select **Console**, then select your container that supports the `curl` command. If you're using the *helloworld* container from the sample container image quickstart, you can run the `curl` command.
165166

166167
1. In the **Choose start up command** menu, select **/bin/sh**, and select **Connect**.
167168

168169
1. In the console, run `curl -s https://mcr.microsoft.com`. You should see a successful response as you added `mcr.microsoft.com` to the allowlist for your firewall policies.
169170

170-
1. Run `curl -s https://<fqdn-address>` for a URL that doesn't match any of your destination rules such as `example.com`. The example command would be `curl -s https://example.com`. You should get no response, which indicates that your firewall has blocked the request.
171+
1. Run `curl -s https://<FQDN_ADDRESS>` for a URL that doesn't match any of your destination rules such as `example.com`. The example command would be `curl -s https://example.com`. You should get no response, which indicates that your firewall has blocked the request.
171172

172173
## Next steps
173174

0 commit comments

Comments
 (0)