You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/manage-agent.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -336,7 +336,7 @@ Actions of the [zypper](https://en.opensuse.org/Portal:Zypper) command, such as
336
336
337
337
### Facilitating auto-upgrade of the agent
338
338
339
-
The Azure Connected Machine agent will be supporting an automatic upgrade feature to reduce the agent management overhead associated with Azure Arc-enabled servers. To facilitate this new functionality, a scheduler job is configured on the connected machine. This scheduler job is a scheduled task for Windows and a Cron job for Linux. This scheduler job will appear in the Azure Connected Machine Agent version 1.29 or higher.
339
+
The Azure Connected Machine agent will be supporting an automatic upgrade feature to reduce the agent management overhead associated with Azure Arc-enabled servers. To facilitate this new functionality, a scheduler job is configured on the connected machine. This scheduler job is a scheduled task for Windows and a Cron job for Linux. This scheduler job will appear in the Azure Connected Machine Agent version 1.30 or higher.
340
340
341
341
To view these scheduler jobs in Windows through PowerShell:
Copy file name to clipboardExpand all lines: articles/bastion/troubleshoot.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: bastion
5
5
author: charwen
6
6
ms.service: bastion
7
7
ms.topic: troubleshooting
8
-
ms.date: 10/16/2019
8
+
ms.date: 05/08/2023
9
9
ms.author: charwen
10
10
---
11
11
@@ -24,9 +24,9 @@ For more information, see [NSG guidance for Azure Bastion](bastion-nsg.md).
24
24
25
25
## <aname="sshkey"></a>Unable to use my SSH key with Azure Bastion
26
26
27
-
**Q:** When I try to browse my SSH key file, I get the following error: *'SSH Private key must start with -----BEGIN RSA PRIVATE KEY----- and ends with -----END RSA PRIVATE KEY-----'*.
27
+
**Q:** When I try to browse my SSH key file, I get the following error: *'SSH Private key must start with -----BEGIN RSA/DSA/OPENSSH PRIVATE KEY----- and ends with -----END RSA/DSA/OPENSSH PRIVATE KEY-----'*.
28
28
29
-
**A:** Azure Bastion supports only RSA SSH keys, at this point in time. Make sure that you browse a key file that is RSA private key for SSH, with public key provisioned on the target VM.
29
+
**A:** Azure Bastion supports RSA, DSA, and OPENSSH private keys, at this point in time. Make sure that you browse a key file that is RSA, DSA, or OPENSSH private key for SSH, with public key provisioned on the target VM.
30
30
31
31
As an example, you can use the following command to create a new RSA SSH key:
32
32
@@ -85,4 +85,4 @@ The key's randomart image is:
85
85
86
86
## Next steps
87
87
88
-
For more information, see the [Bastion FAQ](bastion-faq.md).
88
+
For more information, see the [Bastion FAQ](bastion-faq.md).
Copy file name to clipboardExpand all lines: articles/iot-hub-device-update/network-security.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,8 +28,9 @@ You can use service tags to define network access controls on [network security
28
28
29
29
### Regional IP ranges
30
30
Because IoT Hub IP rules do not support Service Tags, you have to use AzureDeviceUpdate Service Tag IP prefixes instead. Because this tag is currently global, we are providing the following table for convenience. Please note that location is that of Device Update resources.
31
+
31
32
| Location | IP ranges |
32
-
| --- | --- |
33
+
| --- | --- |
33
34
| Australia East | 20.211.71.192/26,20.53.47.16/28,20.70.223.192/26,104.46.179.224/28,20.92.5.128/25,20.92.5.128/26 |
34
35
| East US | 20.119.27.192/26,20.119.28.128/26,20.62.132.240/28,20.62.135.128/27,20.62.135.160/28,20.59.77.64/26,20.59.81.64/26,20.66.3.208/28 |
35
36
| East US 2 | 20.119.155.192/26,20.62.59.16/28,20.98.195.192/26,20.40.229.32/28,20.98.148.192/26,20.98.148.64/26 |
Copy file name to clipboardExpand all lines: articles/spring-apps/how-to-staging-environment.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -163,12 +163,12 @@ Use the following steps to view deployed apps.
163
163
:::image type="content" source="media/how-to-staging-environment/running-staging-app.png" lightbox="media/how-to-staging-environment/running-staging-app.png" alt-text="Screenshot that shows the URL of the staging app.":::
164
164
165
165
>[!TIP]
166
-
> Confirm that your test endpoint ends with a slash (/) to ensure that the CSS file is loaded correctly. If your browser requires you to enter login credentials to view the page, use [URL decode](https://www.urldecoder.org/) to decode your test endpoint. URL decode returns a URL in the format `https://\<username>:\<password>@\<cluster-name>.test.azureapps.io/gateway/green`. Use this format to access your endpoint.
166
+
> Confirm that your test endpoint ends with a slash (/) to ensure that the CSS file is loaded correctly. If your browser requires you to enter login credentials to view the page, use [URL decode](https://www.urldecoder.org/) to decode your test endpoint. URL decode returns a URL in the format `https://\<username>:\<password>@\<cluster-name>.test.azureapps.io/demo/green`. Use this format to access your endpoint.
167
167
168
168
>[!NOTE]
169
-
> Configuration server settings apply to both your staging environment and your production environment. For example, if you set the context path (*server.servlet.context-path*) for your app gateway in the configuration server as *somepath*, the path to your green deployment changes to `https://\<username>:\<password>@\<cluster-name>.test.azureapps.io/gateway/green/somepath/...`.
169
+
> Configuration server settings apply to both your staging environment and your production environment. For example, if you set the context path (*server.servlet.context-path*) for your app demo in the configuration server as *somepath*, the path to your green deployment changes to `https://\<username>:\<password>@\<cluster-name>.test.azureapps.io/demo/green/somepath/...`.
170
170
171
-
If you visit your public-facing app gateway at this point, you should see the old page without your new change.
171
+
If you visit your public-facing app demo at this point, you should see the old page without your new change.
172
172
173
173
## Set the green deployment as the production environment
174
174
@@ -193,9 +193,9 @@ If you're not satisfied with your change, you can modify your application code,
193
193
az spring app deploy \
194
194
--resource-group <resource-group-name> \
195
195
--service <service-instance-name> \
196
-
--name gateway \
196
+
--name demo \
197
197
--deployment green \
198
-
--artifact-path gateway.jar
198
+
--artifact-path demo.jar
199
199
```
200
200
201
201
## Delete the staging deployment
@@ -209,7 +209,7 @@ az spring app deployment delete \
0 commit comments