Skip to content

Commit fbb5c9a

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 31d96de + 7161e36 commit fbb5c9a

File tree

98 files changed

+1104
-1241
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

98 files changed

+1104
-1241
lines changed

articles/active-directory/hybrid/how-to-connect-group-writeback-v2.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,18 @@ It's recommended that you follow the [swing migration](how-to-upgrade-previous-v
5252
>[!NOTE]
5353
> If you are using an older build of group writeback in Azure AD Connect, the M365 groups being written back as universal distribution groups, will continue to be written back. The new version of group writeback is backwards compatible.
5454
55-
## Enable group writeback using Azure AD Connect
55+
## Enable group writeback
56+
Enabling group writeback's new features is a two step process. One step is done via Azure AD Connect. This step enables the original group writeback features. The second one is done using PowerShell and enables the new writeback features once the original features are enabled. To enable group writeback complete the steps in the table below
57+
58+
Steps|Description|
59+
|-----|-----|
60+
|[Enable group writeback using Azure AD Connect](#enable-group-writeback-using-azure-ad-connect)|Enables group writeback with the original features included in Azure AD Connect. That is, it will writeback M365 groups as distribution groups. This option is **only** available if you have Exchange present in your on-premises Active Directory.|
61+
|[Enabling group writeback using PowerShell](#enable-group-writeback-using-powershell)|Enables the new group writeback features outlined in this article.
62+
63+
>[!NOTE]
64+
>You must enable group writeback via Azure AD Connect before enabling group writeback via PowerShell to receive the new features outlined in this article. You must do both and in the correct order.
65+
66+
### Enable group writeback using Azure AD Connect
5667

5768
To enable group writeback, use the following steps:
5869

@@ -86,7 +97,7 @@ To enable group writeback, use the following steps:
8697
8798
For more information on configuring the Microsoft 365 groups, see [Configure Microsoft 365 Groups with on-premises Exchange hybrid](/exchange/hybrid-deployment/set-up-microsoft-365-groups#enable-group-writeback-in-azure-ad-connect).
8899
89-
## Enabling group writeback using PowerShell
100+
### Enable group writeback using PowerShell
90101
91102
To enable group writeback via PowerShell:
92103

articles/app-service/configure-authentication-oauth-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ When your provider's access token (not the [session token](#extend-session-token
3838
- **Twitter**: Access tokens don't expire (see [Twitter OAuth FAQ](https://developer.twitter.com/en/docs/authentication/faq)).
3939
- **Microsoft**: In [https://resources.azure.com](https://resources.azure.com), do the following steps:
4040
1. At the top of the page, select **Read/Write**.
41-
2. In the left browser, navigate to **subscriptions** > **_\<subscription\_name_** > **resourceGroups** > **_\<resource\_group\_name>_** > **providers** > **Microsoft.Web** > **sites** > **_\<app\_name>_** > **config** > **authsettingsV2**.
41+
2. In the left browser, navigate to **subscriptions** > **_\<subscription\_name>_** > **resourceGroups** > **_\<resource\_group\_name>_** > **providers** > **Microsoft.Web** > **sites** > **_\<app\_name>_** > **config** > **authsettingsV2**.
4242
3. Click **Edit**.
4343
4. Modify the following property.
4444

-8.84 KB
Loading

articles/application-gateway/tutorial-ingress-controller-add-on-existing.md

Lines changed: 27 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,37 +1,38 @@
11
---
2-
title: 'Tutorial: Enable Ingress Controller Add-On for existing AKS cluster with existing Azure Application Gateway'
2+
title: 'Tutorial: Enable ingress controller add-on for existing AKS cluster with existing Azure application gateway'
33
description: Use this tutorial to enable the Ingress Controller Add-On for your existing AKS cluster with an existing Application Gateway
44
services: application-gateway
55
author: caya
66
ms.service: application-gateway
77
ms.topic: tutorial
8-
ms.date: 03/02/2021
8+
ms.date: 07/09/2022
99
ms.author: caya
10+
ms.custom: template-tutorial #Required; leave this attribute/value as-is.
1011
---
1112

12-
# Tutorial: Enable Application Gateway Ingress Controller add-on for an existing AKS cluster with an existing Application Gateway
13+
# Tutorial: Enable application gateway ingress controller add-on for an existing AKS cluster with an existing application gateway
1314

14-
You can use Azure CLI or Portal to enable the [Application Gateway Ingress Controller (AGIC)](ingress-controller-overview.md) add-on for an existing [Azure Kubernetes Services (AKS)](https://azure.microsoft.com/services/kubernetes-service/) cluster. In this tutorial, you'll learn how to use AGIC add-on to expose your Kubernetes application in an existing AKS cluster through an existing Application Gateway deployed in separate virtual networks. You'll start by creating an AKS cluster in one virtual network and an Application Gateway in a separate virtual network to simulate existing resources. You'll then enable the AGIC add-on, peer the two virtual networks together, and deploy a sample application that will be exposed through the Application Gateway using the AGIC add-on. If you're enabling the AGIC add-on for an existing Application Gateway and existing AKS cluster in the same virtual network, then you can skip the peering step below. The add-on provides a much faster way of deploying AGIC for your AKS cluster than [previously through Helm](ingress-controller-overview.md#difference-between-helm-deployment-and-aks-add-on) and also offers a fully managed experience.
15+
You can use Azure CLI or portal to enable the [application gateway ingress controller (AGIC)](ingress-controller-overview.md) add-on for an existing [Azure Kubernetes Services (AKS)](https://azure.microsoft.com/services/kubernetes-service/) cluster. In this tutorial, you'll learn how to use AGIC add-on to expose your Kubernetes application in an existing AKS cluster through an existing application gateway deployed in separate virtual networks. You'll start by creating an AKS cluster in one virtual network and an application gateway in a separate virtual network to simulate existing resources. You'll then enable the AGIC add-on, peer the two virtual networks together, and deploy a sample application that will be exposed through the application gateway using the AGIC add-on. If you're enabling the AGIC add-on for an existing application gateway and existing AKS cluster in the same virtual network, then you can skip the peering step below. The add-on provides a much faster way of deploying AGIC for your AKS cluster than [through Helm](ingress-controller-overview.md#difference-between-helm-deployment-and-aks-add-on) and also offers a fully managed experience.
1516

1617
In this tutorial, you learn how to:
1718

1819
> [!div class="checklist"]
1920
> * Create a resource group
2021
> * Create a new AKS cluster
21-
> * Create a new Application Gateway
22+
> * Create a new application gateway
2223
> * Enable the AGIC add-on in the existing AKS cluster through Azure CLI
23-
> * Enable the AGIC add-on in the existing AKS cluster through Portal
24-
> * Peer the Application Gateway virtual network with the AKS cluster virtual network
25-
> * Deploy a sample application using AGIC for Ingress on the AKS cluster
26-
> * Check that the application is reachable through Application Gateway
24+
> * Enable the AGIC add-on in the existing AKS cluster through Azure portal
25+
> * Peer the application gateway virtual network with the AKS cluster virtual network
26+
> * Deploy a sample application using AGIC for ingress on the AKS cluster
27+
> * Check that the application is reachable through application gateway
2728
2829
[!INCLUDE [quickstarts-free-trial-note](../../includes/quickstarts-free-trial-note.md)]
2930

3031
[!INCLUDE [azure-cli-prepare-your-environment.md](../../includes/azure-cli-prepare-your-environment.md)]
3132

3233
## Create a resource group
3334

34-
In Azure, you allocate related resources to a resource group. Create a resource group by using [az group create](/cli/azure/group#az-group-create). The following example creates a resource group named *myResourceGroup* in the *canadacentral* location (region).
35+
In Azure, you allocate related resources to a resource group. Create a resource group by using [az group create](/cli/azure/group#az-group-create). The following example creates a resource group named **myResourceGroup** in the **canadacentral** location (region).
3536

3637
```azurecli-interactive
3738
az group create --name myResourceGroup --location canadacentral
@@ -41,19 +42,19 @@ az group create --name myResourceGroup --location canadacentral
4142

4243
You'll now deploy a new AKS cluster, to simulate having an existing AKS cluster that you want to enable the AGIC add-on for.
4344

44-
In the following example, you'll be deploying a new AKS cluster named *myCluster* using [Azure CNI](../aks/concepts-network.md#azure-cni-advanced-networking) and [Managed Identities](../aks/use-managed-identity.md) in the resource group you created, *myResourceGroup*.
45+
In the following example, you'll be deploying a new AKS cluster named **myCluster** using [Azure CNI](../aks/concepts-network.md#azure-cni-advanced-networking) and [Managed Identities](../aks/use-managed-identity.md) in the resource group you created, **myResourceGroup**.
4546

4647
```azurecli-interactive
4748
az aks create -n myCluster -g myResourceGroup --network-plugin azure --enable-managed-identity
4849
```
4950

50-
To configure additional parameters for the `az aks create` command, visit references [here](/cli/azure/aks#az-aks-create).
51+
To configure other parameters for the `az aks create` command, visit references [here](/cli/azure/aks#az-aks-create).
5152

52-
## Deploy a new Application Gateway
53+
## Deploy a new application gateway
5354

54-
You'll now deploy a new Application Gateway, to simulate having an existing Application Gateway that you want to use to load balance traffic to your AKS cluster, *myCluster*. The name of the Application Gateway will be *myApplicationGateway*, but you will need to first create a public IP resource, named *myPublicIp*, and a new virtual network called *myVnet* with address space 11.0.0.0/8, and a subnet with address space 11.1.0.0/16 called *mySubnet*, and deploy your Application Gateway in *mySubnet* using *myPublicIp*.
55+
You'll now deploy a new application gateway, to simulate having an existing application gateway that you want to use to load balance traffic to your AKS cluster, **myCluster**. The name of the application gateway will be **myApplicationGateway**, but you'll need to first create a public IP resource, named **myPublicIp**, and a new virtual network called **myVnet** with address space 11.0.0.0/8, and a subnet with address space 11.1.0.0/16 called **mySubnet**, and deploy your application gateway in **mySubnet** using **myPublicIp**.
5556

56-
When using an AKS cluster and Application Gateway in separate virtual networks, the address spaces of the two virtual networks must not overlap. The default address space that an AKS cluster deploys in is 10.0.0.0/8, so we set the Application Gateway virtual network address prefix to 11.0.0.0/8.
57+
When you use an AKS cluster and application gateway in separate virtual networks, the address spaces of the two virtual networks must not overlap. The default address space that an AKS cluster deploys in is 10.0.0.0/8, so we set the application gateway virtual network address prefix to 11.0.0.0/8.
5758

5859
```azurecli-interactive
5960
az network public-ip create -n myPublicIp -g myResourceGroup --allocation-method Static --sku Standard
@@ -62,26 +63,26 @@ az network application-gateway create -n myApplicationGateway -l canadacentral -
6263
```
6364

6465
> [!NOTE]
65-
> Application Gateway Ingress Controller (AGIC) add-on **only** supports Application Gateway v2 SKUs (Standard and WAF), and **not** the Application Gateway v1 SKUs.
66+
> application gateway ingress controller (AGIC) add-on **only** supports application gateway v2 SKUs (Standard and WAF), and **not** the application gateway v1 SKUs.
6667
6768
## Enable the AGIC add-on in existing AKS cluster through Azure CLI
6869

69-
If you'd like to continue using Azure CLI, you can continue to enable the AGIC add-on in the AKS cluster you created, *myCluster*, and specify the AGIC add-on to use the existing Application Gateway you created, *myApplicationGateway*.
70+
If you'd like to continue using Azure CLI, you can continue to enable the AGIC add-on in the AKS cluster you created, **myCluster**, and specify the AGIC add-on to use the existing application gateway you created, **myApplicationGateway**.
7071

7172
```azurecli-interactive
7273
appgwId=$(az network application-gateway show -n myApplicationGateway -g myResourceGroup -o tsv --query "id")
7374
az aks enable-addons -n myCluster -g myResourceGroup -a ingress-appgw --appgw-id $appgwId
7475
```
7576

76-
## Enable the AGIC add-on in existing AKS cluster through Portal
77+
## Enable the AGIC add-on in existing AKS cluster through Azure portal
7778

78-
If you'd like to use Azure portal to enable AGIC add-on, go to [(https://aka.ms/azure/portal/aks/agic)](https://aka.ms/azure/portal/aks/agic) and navigate to your AKS cluster through the Portal link. From there, go to the Networking tab within your AKS cluster. You'll see an Application Gateway ingress controller section, which allows you to enable/disable the ingress controller add-on using the Portal UI. Check the box next to "Enable ingress controller", and select the Application Gateway you created, *myApplicationGateway* from the dropdown menu.
79+
If you'd like to use Azure portal to enable AGIC add-on, go to [(https://aka.ms/azure/portal/aks/agic)](https://aka.ms/azure/portal/aks/agic) and navigate to your AKS cluster through the portal link. From there, go to the Networking tab within your AKS cluster. You'll see an application gateway ingress controller section, which allows you to enable/disable the ingress controller add-on using the Azure portal. Select the box next to **Enable ingress controller**, and then select the application gateway you created, **myApplicationGateway** from the dropdown menu. Select **Save**.
7980

80-
![Application Gateway Ingress Controller Portal](./media/tutorial-ingress-controller-add-on-existing/portal-ingress-controller-add-on.png)
81+
:::image type="content" source="./media/tutorial-ingress-controller-add-on-existing/portal-ingress-controller-add-on.png" alt-text="Screenshot showing how to enable application gateway ingress controller from the networking page of the Azure Kubernetes Service.":::
8182

8283
## Peer the two virtual networks together
8384

84-
Since we deployed the AKS cluster in its own virtual network and the Application Gateway in another virtual network, you'll need to peer the two virtual networks together in order for traffic to flow from the Application Gateway to the pods in the cluster. Peering the two virtual networks requires running the Azure CLI command two separate times, to ensure that the connection is bi-directional. The first command will create a peering connection from the Application Gateway virtual network to the AKS virtual network; the second command will create a peering connection in the other direction.
85+
Since you deployed the AKS cluster in its own virtual network and the Application gateway in another virtual network, you'll need to peer the two virtual networks together in order for traffic to flow from the Application gateway to the pods in the cluster. Peering the two virtual networks requires running the Azure CLI command two separate times, to ensure that the connection is bi-directional. The first command will create a peering connection from the Application gateway virtual network to the AKS virtual network; the second command will create a peering connection in the other direction.
8586

8687
```azurecli-interactive
8788
nodeResourceGroup=$(az aks show -n myCluster -g myResourceGroup -o tsv --query "nodeResourceGroup")
@@ -96,31 +97,31 @@ az network vnet peering create -n AKStoAppGWVnetPeering -g $nodeResourceGroup --
9697

9798
## Deploy a sample application using AGIC
9899

99-
You'll now deploy a sample application to the AKS cluster you created that will use the AGIC add-on for Ingress and connect the Application Gateway to the AKS cluster. First, you'll get credentials to the AKS cluster you deployed by running the `az aks get-credentials` command.
100+
You'll now deploy a sample application to the AKS cluster you created that will use the AGIC add-on for Ingress and connect the application gateway to the AKS cluster. First, you'll get credentials to the AKS cluster you deployed by running the `az aks get-credentials` command.
100101

101102
```azurecli-interactive
102103
az aks get-credentials -n myCluster -g myResourceGroup
103104
```
104105

105-
Once you have the credentials to the cluster you created, run the following command to set up a sample application that uses AGIC for Ingress to the cluster. AGIC will update the Application Gateway you set up earlier with corresponding routing rules to the new sample application you deployed.
106+
Once you have the credentials to the cluster you created, run the following command to set up a sample application that uses AGIC for Ingress to the cluster. AGIC will update the application gateway you set up earlier with corresponding routing rules to the new sample application you deployed.
106107

107108
```azurecli-interactive
108109
kubectl apply -f https://raw.githubusercontent.com/Azure/application-gateway-kubernetes-ingress/master/docs/examples/aspnetapp.yaml
109110
```
110111

111112
## Check that the application is reachable
112113

113-
Now that the Application Gateway is set up to serve traffic to the AKS cluster, let's verify that your application is reachable. You'll first get the IP address of the Ingress.
114+
Now that the application gateway is set up to serve traffic to the AKS cluster, let's verify that your application is reachable. You'll first get the IP address of the Ingress.
114115

115116
```azurecli-interactive
116117
kubectl get ingress
117118
```
118119

119-
Check that the sample application you created is up and running by either visiting the IP address of the Application Gateway that you got from running the above command or check with `curl`. It may take Application Gateway a minute to get the update, so if the Application Gateway is still in an "Updating" state on Portal, then let it finish before trying to reach the IP address.
120+
Check that the sample application you created is up and running by either visiting the IP address of the application gateway that you got from running the above command or check with `curl`. It may take application gateway a minute to get the update, so if the application gateway is still in an "Updating" state on Azure portal, then let it finish before trying to reach the IP address.
120121

121122
## Clean up resources
122123

123-
When no longer needed, remove the resource group, application gateway, and all related resources.
124+
When no longer needed, delete the resource group and all related resources.
124125

125126
```azurecli-interactive
126127
az group delete --name myResourceGroup

articles/attestation/quickstart-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Follow this quickstart to get started with Azure Attestation. Learn how to manag
1616

1717
## Prerequisites
1818

19-
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
19+
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin. The user creating an attestation provider should have sufficient access levels on the subscription to create a resource (e.g: owner/contributor). Please refer [Azure built-in roles](../role-based-access-control/built-in-roles.md) for more information.
2020

2121
## Attestation provider
2222

-3.37 KB
Loading

0 commit comments

Comments
 (0)