You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As a concrete example, you might rename a Service Bus connection in an **OrderQueue** logic app or workflow with **CN-ServiceBus-OrderQueue** as the new name. For more information, see the Serverless360 blog post [Logic app best practices, tips, and tricks: #11 connectors naming convention](https://www.serverless360.com/blog/logic-app-best-practices-tips-and-tricks-11-connectors-naming-convention).
392
+
As a concrete example, you might rename a Service Bus connection in an **OrderQueue** logic app or workflow with **CN-ServiceBus-OrderQueue** as the new name. For more information, see the Turbo360 (Formerly Serverless360) blog post [Logic app best practices, tips, and tricks: #11 connectors naming convention](https://www.turbo360.com/blog/logic-app-best-practices-tips-and-tricks-11-connectors-naming-convention).
393
393
394
394
### Handle exceptions with scopes and "Run after" options
395
395
@@ -430,4 +430,4 @@ You've now learned more about available migration approaches, planning considera
430
430
431
431
> [!div class="nextstepaction"]
432
432
>
433
-
> [Give feedback about migration guidance for BizTalk Server to Azure Integration Services](https://aka.ms/BizTalkMigrationGuidance)
433
+
> [Give feedback about migration guidance for BizTalk Server to Azure Integration Services](https://aka.ms/BizTalkMigrationGuidance)
Copy file name to clipboardExpand all lines: articles/openshift/howto-restrict-egress.md
-302Lines changed: 0 additions & 302 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,9 +10,6 @@ ms.date: 10/10/2023
10
10
---
11
11
# Control egress traffic for your Azure Red Hat OpenShift (ARO) cluster
12
12
13
-
> [!CAUTION]
14
-
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly.
15
-
16
13
This article provides the necessary details that allow you to secure outbound traffic from your Azure Red Hat OpenShift cluster (ARO). With the release of the [Egress Lockdown Feature](./concepts-egress-lockdown.md), all of the required connections for an ARO cluster are proxied through the service. There are additional destinations that you may want to allow to use features such as Operator Hub or Red Hat telemetry.
17
14
18
15
> [!IMPORTANT]
@@ -80,302 +77,3 @@ For additional information on remote health monitoring and telemetry, see the [R
80
77
### Azure Monitor container insights
81
78
82
79
ARO clusters can be monitored using the Azure Monitor container insights extension. Review the pre-requisites and instructions for [enabling the extension](../azure-monitor/containers/container-insights-enable-arc-enabled-clusters.md).
83
-
84
-
---
85
-
<!-- @todo Migrate this to a secondary article if we find customer demand.
86
-
## Private ARO cluster setup
87
-
The goal is to secure ARO cluster by routing Egress traffic through an Azure Firewall
CLUSTER=aro-cluster # Name of your created cluster
99
-
RESOURCEGROUP=aro-rg # The name of your resource group where you created the ARO cluster
100
-
AROVNET=aro-vnet # The name of your vnet from your created ARO cluster
101
-
JUMPSUBNET=jump-subnet
102
-
LOCATION=eastus # The location where ARO cluster is deployed
103
-
104
-
```
105
-
106
-
### Create a resource group
107
-
```azurecli
108
-
az group create -g "$RESOURCEGROUP" -l $LOCATION
109
-
```
110
-
111
-
### Create the virtual network
112
-
```azurecli
113
-
az network vnet create \
114
-
-g $RESOURCEGROUP \
115
-
-n $AROVNET \
116
-
--address-prefixes 10.0.0.0/8
117
-
```
118
-
119
-
### Add two empty subnets to your virtual network
120
-
```azurecli
121
-
az network vnet subnet create \
122
-
-g "$RESOURCEGROUP" \
123
-
--vnet-name $AROVNET \
124
-
-n "$CLUSTER-master" \
125
-
--address-prefixes 10.10.1.0/24 \
126
-
--service-endpoints Microsoft.ContainerRegistry
127
-
128
-
az network vnet subnet create \
129
-
-g $RESOURCEGROUP \
130
-
--vnet-name $AROVNET \
131
-
-n "$CLUSTER-worker" \
132
-
--address-prefixes 10.20.1.0/24 \
133
-
--service-endpoints Microsoft.ContainerRegistry
134
-
```
135
-
136
-
### Disable network policies for Private Link Service on your virtual network and subnets. This is a requirement for the ARO service to access and manage the cluster.
A Red Hat pull secret enables your cluster to access Red Hat container registries along with other content. This step is optional but recommended.
181
-
182
-
1. **[Go to your Red Hat OpenShift cluster manager portal](https://cloud.redhat.com/openshift/install/azure/aro-provisioned) and log in.**
183
-
184
-
You will need to log in to your Red Hat account or create a new Red Hat account with your business email and accept the terms and conditions.
185
-
186
-
2. **Click Download pull secret.**
187
-
188
-
Keep the saved `pull-secret.txt` file somewhere safe - it will be used in each cluster creation.
189
-
190
-
When running the `az aro create` command, you can reference your pull secret using the `--pull-secret @pull-secret.txt` parameter. Execute `az aro create` from the directory where you stored your `pull-secret.txt` file. Otherwise, replace `@pull-secret.txt` with `@<path-to-my-pull-secret-file`.
191
-
192
-
If you're copying your pull secret or referencing it in other scripts, format your pull secret as a valid JSON string.
Example rule for telemetry to work. Additional possibilities are listed [here](https://docs.openshift.com/container-platform/4.3/installing/install_config/configuring-firewall.html#configuring-firewall_configuring-firewall):
243
-
```azurecli
244
-
az network firewall application-rule create -g $RESOURCEGROUP -f aro-private \
Copy file name to clipboardExpand all lines: articles/web-application-firewall/ag/create-waf-policy-ag.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ First, create a basic WAF policy with a managed Default Rule Set (DRS) using the
51
51
52
52
## Configure WAF rules (optional)
53
53
54
-
When you create a WAF policy, by default it is in *Detection* mode. In Detection mode, WAF doesn't block any requests. Instead, the matching WAF rules are logged in the WAF logs. To see WAF in action, you can change the mode settings to *Prevention*. In Prevention mode, matching rules defined in the CRS Ruleset you selected are blocked and/or logged in the WAF logs.
54
+
When you create a WAF policy, by default it is in *Detection* mode. In Detection mode, WAF doesn't block any requests. Instead, the matching WAF rules are logged in the WAF logs. To see WAF in action, you can change the mode settings to *Prevention*. In Prevention mode, matching rules defined in the Microsoft Managed Rulesets you selected are blocked and/or logged in the WAF logs.
0 commit comments