Skip to content

Commit 7909281

Browse files
authored
Merge pull request #311935 from MicrosoftDocs/main
[Out of Band Publish] 02/18 - 4:30 PM IST
2 parents 7511314 + 540cfd2 commit 7909281

34 files changed

Lines changed: 328 additions & 249 deletions

articles/application-gateway/for-containers/how-to-ssl-offloading-gateway-api.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@ Application Gateway for Containers enables SSL [offloading](/azure/architecture/
2525

2626
## Prerequisites
2727

28+
> [!NOTE]
29+
> Certificates for Application Gateway for Containers must be stored as Kubernetes secrets. Azure Key Vault integration via the [Secrets Store CSI driver](/azure/aks/csi-secrets-store-driver) is not supported because Application Gateway for Containers requires certificates to be local to the cluster and cannot mount them from external volumes. For automated certificate management, consider using [cert-manager with Let's Encrypt](how-to-cert-manager-lets-encrypt-gateway-api.md).
30+
2831
1. If following the BYO deployment strategy, ensure that you set up your Application Gateway for Containers resources and ALB Controller ([Add-on](quickstart-deploy-application-gateway-for-containers-alb-controller-addon.md) or [Helm](quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md))
2932
2. If following the ALB managed deployment strategy, ensure that you provision your ALB Controller ([Add-on](quickstart-deploy-application-gateway-for-containers-alb-controller-addon.md) or [Helm](quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md)) and the Application Gateway for Containers resources via the [ApplicationLoadBalancer custom resource](quickstart-create-application-gateway-for-containers-managed-by-alb-controller.md).
3033
3. Deploy sample HTTPS application

articles/application-gateway/for-containers/how-to-ssl-offloading-ingress-api.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,9 @@ Application Gateway for Containers enables SSL [offloading](/azure/architecture/
2222

2323
## Prerequisites
2424

25+
> [!NOTE]
26+
> Certificates for Application Gateway for Containers must be stored as Kubernetes secrets. Azure Key Vault integration via the [Secrets Store CSI driver](/azure/aks/csi-secrets-store-driver) is not supported because Application Gateway for Containers requires certificates to be local to the cluster and cannot mount them from external volumes. For automated certificate management, consider using [cert-manager with Let's Encrypt](how-to-cert-manager-lets-encrypt-ingress-api.md).
27+
2528
1. If you follow the BYO deployment strategy, ensure that you set up your Application Gateway for Containers resources and ALB Controller ([Add-on](quickstart-deploy-application-gateway-for-containers-alb-controller-addon.md) or [Helm](quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md))
2629
2. If you follow the ALB managed deployment strategy, ensure that you provision your ALB Controller ([Add-on](quickstart-deploy-application-gateway-for-containers-alb-controller-addon.md) or [Helm](quickstart-deploy-application-gateway-for-containers-alb-controller-helm.md)) and the Application Gateway for Containers resources via the [ApplicationLoadBalancer custom resource](quickstart-create-application-gateway-for-containers-managed-by-alb-controller.md).
2730
3. Deploy a sample HTTPS application:

articles/application-gateway/for-containers/migrate-from-agic-to-agc.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Here's a summarized list of AGIC annotations and whether Application Gateway for
6565
| [Private frontend](migrate-from-agic-to-agc.md#private-frontend) | appgw.ingress.kubernetes.io/use-private-ip | Not supported | Not supported |
6666
| [Web Application Firewall (WAF)](migrate-from-agic-to-agc.md#waf) | appgw.ingress.kubernetes.io/waf-policy-for-path | [Web Application Firewall (WAF)](web-application-firewall.md) | Not supported |
6767
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-hostname | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |
68-
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-port | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |
68+
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-port | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |
6969
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-path | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |
7070
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-status-codes | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |
7171
| [Custom health probe](migrate-from-agic-to-agc.md#custom-health-probes) | appgw.ingress.kubernetes.io/health-probe-interval | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) | [HealthCheckPolicy](migrate-from-agic-to-agc.md#healthcheckpolicy) |
@@ -227,6 +227,11 @@ Direct certificate upload and reference to a certificate in Azure Key Vault isn'
227227
228228
Secrets should be stored in [AKS Secret Store](/azure/aks/concepts-security#kubernetes-secrets) and referenced by name.
229229
230+
> [!IMPORTANT]
231+
> Application Gateway for Containers requires certificates to be local to the AKS cluster and cannot mount them from external volumes. As a result, using [Azure Key Vault with the Secrets Store CSI driver](/azure/aks/csi-secrets-store-driver) is not supported for Application Gateway for Containers certificates.
232+
>
233+
> To use certificates from Azure Key Vault, you must first sync them to Kubernetes secrets. Consider using [cert-manager](how-to-cert-manager-lets-encrypt-gateway-api.md) with Let's Encrypt for automated certificate management, or manually import certificates from Key Vault into Kubernetes secrets.
234+
230235
### Establishing backend certificate chain trust
231236
232237
AGIC annotation
@@ -249,7 +254,7 @@ Application Gateway for Containers allows customers to reference prebuild TLS po
249254

250255
#### Frontend TLS Policy in Gateway API
251256

252-
To use this feature, you must use Gateway API. More details on TLS Policy are found [here](tls-policy.md).
257+
To use this feature, you must use Gateway API. More details on TLS Policy are found in the [TLS Policy documentation](tls-policy.md).
253258

254259
>[!Note]
255260
>The Predefined policy names and cipher suites are different from Application Gateway Ingress Controller. Please refer to the [predefined TLS policy table](tls-policy.md#predefined-tls-policy).
@@ -361,7 +366,7 @@ AGIC annotation
361366

362367
Application Gateway for Containers implementation
363368

364-
Request timeouts are nonconfigurable in Application Gateway for Containers. A list of default timeout values are documented [here](application-gateway-for-containers-components.md#request-timeouts).
369+
Request timeouts are nonconfigurable in Application Gateway for Containers. A list of default timeout values are documented in [default timeout values](application-gateway-for-containers-components.md#request-timeouts).
365370

366371
### Frontend port override
367372

articles/application-gateway/for-containers/tls-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,8 @@ Application Gateway for Containers offers two predefined security policies. You
2828

2929
The following table shows the list of cipher suites and minimum protocol version support for each predefined policy. The ordering of the cipher suites determines the priority order during TLS negotiation. To know the exact ordering of the cipher suites for these predefined policies.
3030

31-
| Predefined policy names | 2023-06 | 2023-06-S |
32-
| ---------- | ---------- | ---------- |
31+
| Predefined policy names | 2023-06 | 2023-06-S |
32+
| --- | --- | --- |
3333
| **Minimum protocol version** | TLS 1.2 | TLS 1.2 |
3434
| **Enabled protocol versions** | TLS 1.2, TLS 1.3 | TLS 1.2, TLS 1.3 |
3535
| TLS_AES_256_GCM_SHA384 | ✓ | ✓ |

articles/application-gateway/ssl-overview.md

Lines changed: 7 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -120,11 +120,10 @@ The following tables outline the differences in SNI between the v1 and v2 SKU in
120120

121121
### Frontend TLS connection (client to application gateway)
122122

123-
124-
|Scenario | v1 | v2 |
123+
| Scenario | v1 | v2 |
125124
| --- | --- | --- |
126-
| If the client specifies SNI header and all the multi-site listeners are enabled with "Require SNI" flag | Returns the appropriate certificate and if the site doesn't exist (according to the server_name), then the connection is reset. | Returns appropriate certificate if available, otherwise, returns the certificate of the first HTTPS listener according to the order specified by the request routing rules associated with the HTTPS listeners|
127-
| If the client doesn't specify a SNI header and if all the multi-site headers are enabled with "Require SNI" | Resets the connection | Returns the certificate of the first HTTPS listener according to the order specified by the request routing rules associated with the HTTPS listeners
125+
| If the client specifies SNI header and all the multi-site listeners are enabled with "Require SNI" flag | Returns the appropriate certificate and if the site doesn't exist (according to the server_name), then the connection is reset. | Returns appropriate certificate if available, otherwise, returns the certificate of the first HTTPS listener according to the order specified by the request routing rules associated with the HTTPS listeners |
126+
| If the client doesn't specify a SNI header and if all the multi-site headers are enabled with "Require SNI" | Resets the connection | Returns the certificate of the first HTTPS listener according to the order specified by the request routing rules associated with the HTTPS listeners |
128127
| If the client doesn't specify SNI header and if there's a basic listener configured with a certificate | Returns the certificate configured in the basic listener to the client (default or fallback certificate) | Returns the certificate of the HTTPS listener with the highest priority routing rule. The basic listener certificate is **not** used as a fallback. |
129128

130129
> [!IMPORTANT]
@@ -139,26 +138,20 @@ The following tables outline the differences in SNI between the v1 and v2 SKU in
139138
>
140139
> With this configuration, any connection without a matching SNI header receives the self-signed certificate instead of a valid site certificate. This prevents IP-only connections from obtaining information about your hosted sites.
141140
142-
> [!NOTE]
143-
> For the V1 SKU, when the client doesn't specify an SNI header, it's recommended that the user add a basic listener and rule to present a default SSL/TLS certificate.
144-
145-
> [!TIP]
146-
> The SNI flag can be configured with PowerShell or by using an ARM template. For more information, see [RequireServerNameIndication](/powershell/module/az.network/set-azapplicationgatewayhttplistener#-requireservernameindication) and [Quickstart: Direct web traffic with Azure Application Gateway - ARM template](quick-create-template.md#review-the-template).
147-
148141
### Backend TLS connection (application gateway to the backend server)
149142

150143
#### For probe traffic
151144

152145

153-
|Scenario | v1 | v2 |
146+
| Scenario | v1 | v2 |
154147
| --- | --- | --- |
155-
| When an FQDN or SNI is configured | Set as FQDN from the backend pool. As per [RFC 6066](https://tools.ietf.org/html/rfc6066), literal IPv4 and IPv6 addresses aren't permitted in SNI hostname. | The SNI value is set based on the [TLS validation type](configuration-http-settings.md?tabs=backendhttpsettings#backend-https-validation-settings) in the Backend Settings.<br><br> 1. **Complete validation** – The probe uses the SNI in the following order of precedence:<br> a) Custom Health Probe's hostname <br> b) Backend Setting's hostname (as per Overridden value or Pick from backend server) <br><br> 2. **Configurable** <br> Use specific SNI: The probes use this fixed hostname for validation.<br> Skip SNI: No Subject Name validation.
156-
| When an FQDN or SNI is NOT configured (only IP address is available) | SNI (server_name) won’t be set. <br> **Note:** In this case, the backend server should be able to return a default/fallback certificate and this should be allow-listed in HTTP settings under authentication certificate. If there’s no default/fallback certificate configured in the backend server and SNI is expected, the server might reset the connection and will lead to probe failures | If the Custom Probe or Backend Settings use an IP address in the hostname field, the SNI is not set, in accordance with [RFC 6066](https://tools.ietf.org/html/rfc6066). This includes cases where the default probe uses 127.0.0.1. |
148+
| When an FQDN or SNI is configured | Set as FQDN from the backend pool. As per [RFC 6066](https://tools.ietf.org/html/rfc6066), literal IPv4 and IPv6 addresses aren't permitted in SNI hostname. | The SNI value is set based on the [TLS validation type](configuration-http-settings.md?tabs=backendhttpsettings#backend-https-validation-settings) in the Backend Settings.<br><br> 1. **Complete validation** – The probes uses the SNI in the following order of precedence:<br> a) Custom Health Probe's hostname <br> b) Backend Setting's hostname (as per Overridden value or Pick from backend server) <br><br> 2. **Configurable** <br> Use specific SNI: The probes use this fixed hostname for validation.<br> Skip SNI: No Subject Name validation. |
149+
| When an FQDN or SNI is NOT configured (only IP address is available) | SNI (server_name) won’t be set. <br> **Note:** In this case, the backend server should be able to return a default/fallback certificate and this should be allow-listed in HTTP settings under authentication certificate. If there’s no default/fallback certificate configured in the backend server and SNI is expected, the server might reset the connection and will lead to probe failures | If the Custom Probe or Backend Settings use an IP address in the hostname field, the SNI is not set, in accordance with [RFC 6066](https://tools.ietf.org/html/rfc6066). This includes cases where the default probe uses 127.0.0.1. |
157150

158151
#### For live traffic
159152

160153

161-
|Scenario | v1 | v2 |
154+
| Scenario | v1 | v2 |
162155
| --- | --- | --- |
163156
| When an FQDN or SNI is available | The SNI is set using the backend server's FQDN. | The SNI value is set based on the [TLS validation type](configuration-http-settings.md?tabs=backendhttpsettings#backend-https-validation-settings) in the Backend Settings.<br><br> 1. **Complete validation** – SNI is set according to the following order of precedence: <br> a) Backend Setting’s hostname (as per Overridden value or Pick from backend server) <br> b) Host header of the incoming client request <br><br> 2. **Configurable** <br> Use specific SNI: Uses this fixed hostname for validation. <br> Skip SNI: No Subject Name validation. |
164157
| When an FQDN or SNI is NOT available (only IP address is available) | SNI won't be set as per [RFC 6066](https://tools.ietf.org/html/rfc6066) if the backend pool entry isn't an FQDN | SNI won't be set as per [RFC 6066](https://tools.ietf.org/html/rfc6066). |

articles/automation/TOC.yml

Lines changed: 18 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -109,8 +109,6 @@
109109
href: disable-managed-identity-for-automation.md
110110
- name: Remove user-assigned managed identity
111111
href: remove-user-assigned-identity.md
112-
- name: Troubleshoot managed identity
113-
href: troubleshoot/managed-identity.md
114112
- name: Run As account
115113
items:
116114
- name: Delete Run As account
@@ -163,8 +161,6 @@
163161
href: python-packages.md
164162
- name: Manage Python 3 packages
165163
href: python-3-packages.md
166-
- name: Troubleshoot shared resources
167-
href: troubleshoot/shared-resources.md
168164
- name: Process automation
169165
items:
170166
- name: Use existing runbooks and modules
@@ -203,12 +199,6 @@
203199
href: automation-runbook-graphical-error-handling.md
204200
- name: Forward Azure Automation diagnostic logs to Azure Monitor
205201
href: automation-manage-send-joblogs-log-analytics.md
206-
- name: Troubleshoot runbooks
207-
items:
208-
- name: Troubleshoot runbook issues
209-
href: troubleshoot/runbooks.md
210-
- name: Data to collect when opening a case for Microsoft Azure Automation
211-
href: troubleshoot/collect-data-microsoft-azure-automation-case.md
212202
- name: Work with Hybrid Runbook Worker
213203
items:
214204
- name: Deploy extension-based worker
@@ -223,10 +213,6 @@
223213
href: automation-hrw-run-runbooks.md
224214
- name: Use Azure Policy to enforce job execution
225215
href: enforce-job-execution-hybrid-worker.md
226-
- name: Troubleshoot extension-based worker issues
227-
href: troubleshoot/extension-based-hybrid-runbook-worker.md
228-
- name: Troubleshoot agent-based worker issues
229-
href: troubleshoot/hybrid-runbook-worker.md
230216
- name: Use source control integration
231217
href: source-control-integration.md
232218
- name: Configuration Management
@@ -255,8 +241,6 @@
255241
href: automation-dsc-diagnostics.md
256242
- name: Work with State Configuration extension version history
257243
href: automation-dsc-extension-history.md
258-
- name: Troubleshoot State Configuration issues
259-
href: troubleshoot/desired-state-configuration.md
260244
- name: Change Tracking and Inventory using AMA
261245
items:
262246
- name: About Change tracking and inventory
@@ -297,6 +281,24 @@
297281
href: ../event-grid/ensure-tags-exists-on-new-virtual-machines.md
298282
- name: Automate start/stop of Azure-SSIS IR
299283
href: ../data-factory/how-to-schedule-azure-ssis-integration-runtime.md#create-and-schedule-an-azure-automation-runbook-that-starts-and-stops-an-azure-ssis-ir
284+
- name: Troubleshoot
285+
items:
286+
- name: Troubleshoot Managed Identity Issues
287+
href: troubleshoot/managed-identity.md
288+
- name: Troubleshoot Shared Resources Issues
289+
href: troubleshoot/shared-resources.md
290+
- name: Troubleshoot Runbook Issues
291+
href: troubleshoot/runbooks.md
292+
- name: Troubleshoot Hybrid Runbook Worker Issues
293+
items:
294+
- name: Troubleshoot Extension-based Hybrid Runbook Worker Issues
295+
href: troubleshoot/extension-based-hybrid-runbook-worker.md
296+
- name: Troubleshoot Agent-based Hybrid Runbook Worker Issues
297+
href: troubleshoot/hybrid-runbook-worker.md
298+
- name: Troubleshoot State Configuration Issues
299+
href: troubleshoot/desired-state-configuration.md
300+
- name: Data to Collect when Opening a Case for Microsoft Azure Automation
301+
href: troubleshoot/collect-data-microsoft-azure-automation-case.md
300302
- name: Reference
301303
items:
302304
- name: Azure CLI

articles/sentinel/data-connectors-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.collection: usx-security
2121
This article lists all supported, out-of-the-box data connectors and links to each connector's deployment steps.
2222

2323
> [!IMPORTANT]
24-
> - Noted Microsoft Sentinel data connectors are currently in **Preview**. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
24+
> - Note that Microsoft Sentinel data connectors are currently in **Preview**. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
2525
> - [!INCLUDE [unified-soc-preview-without-alert](includes/unified-soc-preview-without-alert.md)]
2626
2727
Data connectors are available as part of the following offerings:

0 commit comments

Comments
 (0)