You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/howto-targetingfilter-aspnet-core.md
+77-12Lines changed: 77 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,12 +7,12 @@ ms.devlang: csharp
7
7
author: zhiyuanliang-ms
8
8
ms.author: zhiyuanliang
9
9
ms.topic: how-to
10
-
ms.date: 03/26/2024
10
+
ms.date: 12/02/2024
11
11
---
12
12
13
13
# Roll out features to targeted audiences in an ASP.NET Core application
14
14
15
-
In this guide, you'll use the targeting filter to roll out a feature to targeted audience for your ASP.NET Core application. For more information about the targeting filter, see [Roll out features to targeted audiences](./howto-targetingfilter.md).
15
+
In this guide, you'll use the targeting filter to roll out a feature to targeted audiences for your ASP.NET Core application. For more information about the targeting filter, see [Roll out features to targeted audiences](./howto-targetingfilter.md).
16
16
17
17
## Prerequisites
18
18
@@ -23,30 +23,92 @@ In this guide, you'll use the targeting filter to roll out a feature to targeted
23
23
24
24
## Create a web application with a feature flag
25
25
26
-
In this section, you will create a web application that allows users to sign in and use the *Beta* feature flag you created before.
26
+
In this section, you create a web application that allows users to sign in and use the *Beta* feature flag you created before.
27
27
28
28
1. Create a web application that authenticates against a local database using the following command.
29
29
30
30
```dotnetcli
31
31
dotnet new webapp --auth Individual -o TestFeatureFlags
32
32
```
33
33
34
-
1. Add references to the following NuGet packages.
34
+
1. Navigate to the newly created *TestFeatureFlags* directory and add references to the following NuGet packages.
35
+
36
+
### [Microsoft Entra ID (recommended)](#tab/entra-id)
1. Create a user secret for the application by running the following commands.
53
+
54
+
### [Microsoft Entra ID (recommended)](#tab/entra-id)
55
+
56
+
The command uses [Secret Manager](/aspnet/core/security/app-secrets) to store a secret named `Endpoints:AppConfiguration`, which stores the endpoint for your App Configuration store. Replace the `<your-App-Configuration-endpoint>` placeholder with your App Configuration store's endpoint. You can find the endpoint in your App Configuration store's **Overview** blade in the Azure portal.
57
+
58
+
```dotnetcli
59
+
dotnet user-secrets init
60
+
dotnet user-secrets set Endpoints:AppConfiguration "<your-App-Configuration-endpoint>"
61
+
```
40
62
41
-
1. Store the connection string for your App Configuration store.
63
+
### [Connection string](#tab/connection-string)
64
+
65
+
The command uses [Secret Manager](/aspnet/core/security/app-secrets) to store a secret named `ConnectionStrings:AppConfiguration`, which stores the connection string for your App Configuration store. Replace the `<your-App-Configuration-connection-string>` placeholder with your App Configuration store's read-only connection string. You can find the connection string in your App Configuration store's **Access settings** in the Azure portal.
42
66
43
67
```dotnetcli
44
68
dotnet user-secrets init
45
-
dotnet user-secrets set ConnectionStrings:AppConfig "<your_connection_string>"
69
+
dotnet user-secrets set ConnectionStrings:AppConfiguration "<your-App-Configuration-connection-string>"
46
70
```
71
+
---
47
72
48
73
1. Add Azure App Configuration and feature management to your application.
49
74
75
+
### [Microsoft Entra ID (recommended)](#tab/entra-id)
76
+
77
+
1. You use the `DefaultAzureCredential` to authenticate to your App Configuration store. Follow the [instructions](./concept-enable-rbac.md#authentication-with-token-credentials) to assign your credential the **App Configuration Data Reader** role. Be sure to allow sufficient time for the permission to propagate before running your application.
78
+
79
+
1. Update the *Program.cs* file with the following code.
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/quickstart-aspnet-core-app.md
+8-12Lines changed: 8 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,12 +64,6 @@ Connect to your App Configuration store using Microsoft Entra ID (recommended),
64
64
```
65
65
---
66
66
67
-
1. Run the following command to restore packages for your project:
68
-
69
-
```dotnetcli
70
-
dotnet restore
71
-
```
72
-
73
67
1. Create a user secret for the application by navigating into the *TestAppConfig* folder and running the following command.
74
68
75
69
### [Microsoft Entra ID (recommended)](#tab/entra-id)
@@ -83,11 +77,11 @@ Connect to your App Configuration store using Microsoft Entra ID (recommended),
83
77
84
78
### [Connection string](#tab/connection-string)
85
79
86
-
The command uses [Secret Manager](/aspnet/core/security/app-secrets) to store a secret named `ConnectionStrings:AppConfig`, which stores the connection string for your App Configuration store. Replace the `<your_connection_string>` placeholder with your App Configuration store's connection string. You can find the connection string in your App Configuration store's **Access settings** in the Azure portal.
80
+
The command uses [Secret Manager](/aspnet/core/security/app-secrets) to store a secret named `ConnectionStrings:AppConfiguration`, which stores the connection string for your App Configuration store. Replace the `<your-App-Configuration-connection-string>` placeholder with your App Configuration store's read-only connection string. You can find the connection string in your App Configuration store's **Access settings** in the Azure portal.
87
81
88
82
```dotnetcli
89
83
dotnet user-secrets init
90
-
dotnet user-secrets set ConnectionStrings:AppConfig "<your_connection_string>"
84
+
dotnet user-secrets set ConnectionStrings:AppConfiguration "<your-App-Configuration-connection-string>"
91
85
```
92
86
93
87
> [!TIP]
@@ -124,15 +118,16 @@ Connect to your App Configuration store using Microsoft Entra ID (recommended),
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/use-variant-feature-flags-aspnet-core.md
+18-12Lines changed: 18 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,17 +1,17 @@
1
1
---
2
-
title: 'Tutorial: Use variant feature flags from Azure App Configuration in an ASP.NET application'
2
+
title: 'Tutorial: Use variant feature flags from Azure App Configuration in an ASP.NET Core application'
3
3
titleSuffix: Azure App configuration
4
-
description: In this tutorial, you learn how to use variant feature flags in an ASP.NET application
4
+
description: In this tutorial, you learn how to use variant feature flags in an ASP.NET Core application
5
5
#customerintent: As a user of Azure App Configuration, I want to learn how I can use variants and variant feature flags in my ASP.NET application.
6
6
author: rossgrambo
7
7
ms.author: rossgrambo
8
8
ms.service: azure-app-configuration
9
9
ms.devlang: csharp
10
10
ms.topic: tutorial
11
-
ms.date: 10/18/2024
11
+
ms.date: 12/18/2024
12
12
---
13
13
14
-
# Tutorial: Use variant feature flags from Azure App Configuration in an ASP.NET application
14
+
# Tutorial: Use variant feature flags in an ASP.NET Core application
15
15
16
16
In this tutorial, you use a variant feature flag to manage experiences for different user segments in an example application, *Quote of the Day*. You utilize the variant feature flag created in [Use variant feature flags](./use-variant-feature-flags.md). Before proceeding, ensure you create the variant feature flag named *Greeting* in your App Configuration store.
17
17
@@ -28,10 +28,11 @@ In this tutorial, you use a variant feature flag to manage experiences for diffe
28
28
dotnet new razor --auth Individual -o QuoteOfTheDay
29
29
```
30
30
31
-
1. Create a [user secret](/aspnet/core/security/app-secrets) for the application by navigating into the *QuoteOfTheDay* folder and run the following command. This secret holds the endpoint for your App Configuration.
31
+
1. Navigate to the *QuoteOfTheDay* directory and create a [user secret](/aspnet/core/security/app-secrets) for the application by running the following commands. Replace the `<your-App-Configuration-endpoint>` placeholder with your App Configuration store's endpoint. You can find the endpoint in your App Configuration store's **Overview** blade in the Azure portal.
32
32
33
33
```dotnetcli
34
-
dotnet user-secrets set Endpoints:AppConfiguration "<App Configuration Endpoint>"
34
+
dotnet user-secrets init
35
+
dotnet user-secrets set Endpoints:AppConfiguration "<your-App-Configuration-endpoint>"
35
36
```
36
37
37
38
1. Add the latest versions of the required packages.
@@ -44,26 +45,31 @@ In this tutorial, you use a variant feature flag to manage experiences for diffe
44
45
45
46
## Connect to App Configuration for feature management
46
47
47
-
1. In *Program.cs*, add the following using statements.
48
+
1. Open *Program.cs* and add the following using statements.
48
49
49
50
```csharp
50
51
using Azure.Identity;
51
52
using Microsoft.Extensions.Configuration.AzureAppConfiguration;
52
53
using Microsoft.FeatureManagement;
53
54
```
54
55
55
-
1. In *Program.cs*, under the line `var builder = WebApplication.CreateBuilder(args);`, add the App Configuration provider, which pulls down the configuration from Azure App Configuration when the application starts. By default, the `UseFeatureFlags` method pulls down all feature flags with no label.
56
+
1. Add the following code to connect to your App Configuration store and call `UseFeatureFlags` to pull down all feature flags with no label.
56
57
57
58
You use the `DefaultAzureCredential` to authenticate to your App Configuration store. Follow the [instructions](./concept-enable-rbac.md#authentication-with-token-credentials) to assign your credential the **App Configuration Data Reader** role. Be sure to allow sufficient time for the permission to propagate before running your application.
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-network-isolation.md
+17-6Lines changed: 17 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,14 +52,25 @@ Virtual Network (VNet) enables many Azure resources to securely communicate with
52
52
53
53
### Limitations of VNet injection
54
54
55
-
- Creating and maintaining virtual network configurations is error prone. Troubleshooting network configuration issues is challenging. Incorrect virtual network configurations can lead to various issues:
56
-
- loss of metrics for your cache instances
57
-
- unplanned loss of availability, which can cause data loss (loss of availability caused by customer network configuration might not be covered by SLA)
58
-
- failure to replicate data, which can cause data loss
55
+
- Creating and maintaining virtual network configurations are often error prone. Troubleshooting is challenging, too. Incorrect virtual network configurations can lead to issues:
56
+
57
+
- obstructed metrics transmission from your cache instances
58
+
59
+
- failure of replica node to replicate data from primary node
60
+
61
+
- potential data loss
62
+
59
63
- failure of management operations like scaling
64
+
65
+
- intermittent or complete SSL/TLS failures
66
+
67
+
- failure to apply updates, including important security and reliability improvements
68
+
69
+
- in the most severe scenarios, loss of availability
70
+
60
71
- When using a VNet injected cache, you must keep your VNet updated to allow access to cache dependencies, such as Certificate Revocation Lists, Public Key Infrastructure, Azure Key Vault, Azure Storage, Azure Monitor, and more.
61
-
- VNet injected caches are only available for Premium-tier Azure Cache for Redis instances.
62
-
- You can't inject an existing Azure Cache for Redis instance into a Virtual Network. You can only select this option when you create the cache.
72
+
- VNet injected caches are only available for Premium-tier Azure Cache for Redis instances, not other tiers.
73
+
- You can't inject an existing Azure Cache for Redis instance into a Virtual Network. You must select this option when you *create* the cache.
0 commit comments