We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Suggest expose form both update and create
update
create
//cc: @tjprescott
The text was updated successfully, but these errors were encountered:
FYI workaround
a. az network application-gateway http-settings create --gateway-name yugangw-ag-1 -g yugangw-ag --port 443 -n yugangw-ag-1-be-http-settings --protocol https b. az network application-gateway auth-cert create --cert-file d:\temp\TestCert.cer --gateway-name yugangw-ag-1 -n yugangw-ag-1-auth-cert -g yugangw-ag c. az network application-gateway http-settings update --gateway-name yugangw-ag-1 -g yugangw-ag -n yugangw-ag-1-be-http-settings --add authenticationCertificates id="/subscriptions/0b1f6471-1bf0-4dda-aec3-cb9272f09590/resourceGroups/yugangw-ag/providers/Microsoft.Network/applicationGateways/yugangw-ag-1/authenticationCertificates/yugangw-ag-1-auth-cert"
Sorry, something went wrong.
This is a good solution, can we use az network application-gateway http-settings create to do this?
az network application-gateway http-settings create
I have scheduled it for an upcoming Sprint. It should be released in February.
[Network] DDoS Protection Plans and AppGateway updates (#5988)
dad6954
* Initial work. * Re-record tests * Close #4910. * Update history. * Re-record tests and update network SDK. * Disable flaky tests. * Code review feedback.
tjprescott
Successfully merging a pull request may close this issue.
Suggest expose form both
update
andcreate
//cc: @tjprescott
The text was updated successfully, but these errors were encountered: