Skip to content

Commit 3d93315

Browse files
authored
Merge pull request #295696 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents ca1b599 + 7e84584 commit 3d93315

File tree

7 files changed

+32
-14
lines changed

7 files changed

+32
-14
lines changed

articles/app-service/app-service-undelete.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,25 @@ ms.date: 10/4/2023
77
ms.topic: article
88
ms.custom: devx-track-azurepowershell
99
---
10+
# Restore deleted App Service app
1011

11-
# Restore Deleted App Service App Using PowerShell
12+
If you happened to accidentally delete your app in Azure App Service, you can now restore it by using the Azure portal or PowerShell.
1213

13-
If you happened to accidentally delete your app in Azure App Service, you can restore it using the commands from the [Az PowerShell module](/powershell/azure/).
14+
## Restore deleted App Service app by using the portal
15+
16+
If you deleted your app in Azure App Service, you can now restore it from the portal by using following steps:
17+
18+
1. Navigate to App Services in the portal.
19+
1. Click on **Manage Deleted Apps**.
20+
1. Select **Subscription**.
21+
1. From the dropdown, select the deleted app. Apps deleted in last 30 days will show up in the drop down list.
22+
1. Select destination app from the dropdown where you want to restore your app.
23+
1. If you would like to restore the deleted app to a slot of destination app, check the slot checkbox and select available slots from the dropdown.
24+
1. By default only app content is restored. If you want app configuration also to be restored, check **Restore App configuration**.
25+
26+
## Restore deleted App Service app by using PowerShell
27+
28+
If you deleted your app in Azure App Service, you can restore it using the commands from the [Az PowerShell module](/powershell/azure/).
1429

1530
> [!NOTE]
1631
> - Deleted apps are purged from the system 30 days after the initial deletion. After an app is purged, it can't be recovered.

articles/azure-signalr/signalr-howto-troubleshoot-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ Check if your client request has multiple `hub` query strings. The `hub` is pres
119119

120120
### Root cause
121121

122-
Currently the default value of JWT token's lifetime is one (1) hour.
122+
Currently the default value of JWT's lifetime is one (1) hour.
123123

124124
For ASP.NET Core SignalR, when it's using WebSocket transport type, it's OK.
125125

@@ -129,7 +129,7 @@ For ASP.NET SignalR, the client sends a `/ping` "keep alive" request to the serv
129129

130130
### Solution
131131

132-
For security concerns, extend TTL isn't encouraged. We suggest adding reconnect logic from the client to restart the connection when such 401 occurs. When the client restarts the connection, it negotiates with app server to get the JWT token again and get a renewed token.
132+
For security concerns, extend TTL isn't encouraged. We suggest adding reconnect logic from the client to restart the connection when such 401 occurs. When the client restarts the connection, it negotiates with app server to get the JWT again and get a renewed token.
133133

134134
Check [here](#restart_connection) for how to restart client connections.
135135

articles/azure-web-pubsub/concept-client-protocols.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,10 @@ Here's a general authorization workflow:
2727

2828
1. The client negotiates with your application server. The application server contains the authorization middleware, which handles the client request and signs a JWT for the client to connect to the service.
2929
1. The application server returns the JWT and the service URL to the client.
30-
1. The client tries to connect to the Web PubSub service by using the URL and the JWT token returned from the application server.
30+
1. The client tries to connect to the Web PubSub service by using the URL and the JWT returned from the application server.
3131

3232
### Supported claims
33-
You could also configure properties for the client connection when generating the access token by specifying special claims inside the JWT token:
33+
You could also configure properties for the client connection when generating the access token by specifying special claims inside the JWT:
3434

3535
| Description | Claim type | Claim value | Notes |
3636
| --- | --- | --- | --- |
@@ -196,9 +196,9 @@ The permission of a client can be granted in several ways:
196196

197197
#### 1. Assign the role to the client when generating the access token
198198

199-
Client can connect to the service using a JWT token. The token payload can carry information such as the `role` of the client. When signing the JWT token to the client, you can grant permissions to the client by giving the client specific roles.
199+
Client can connect to the service using a JWT. The token payload can carry information such as the `role` of the client. When signing the JWT to the client, you can grant permissions to the client by giving the client specific roles.
200200

201-
For example, let's sign a JWT token that has the permission to send messages to `group1` and `group2`:
201+
For example, let's sign a JWT that has the permission to send messages to `group1` and `group2`:
202202

203203
```js
204204
let token = await serviceClient.getClientAccessToken({

articles/azure-web-pubsub/reference-rest-api-data-plane.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,11 @@ In each HTTP request, an authorization header with a [JSON Web Token (JWT)](http
2828

2929
`HS256`, namely HMAC-SHA256, is used as the signing algorithm.
3030

31-
You should use the `AccessKey` in Azure Web PubSub Service instance's connection string to sign the generated JWT token.
31+
You should use the `AccessKey` in Azure Web PubSub Service instance's connection string to sign the generated JWT.
3232

3333
#### Claims
3434

35-
Below claims are required to be included in the JWT token.
35+
Below claims are required to be included in the JWT.
3636

3737
| Claim Type | Is Required | Description |
3838
| ---------- | ----------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
@@ -55,7 +55,7 @@ const bearerToken = jwt.sign({}, connectionString.accessKey, {
5555

5656
Like using `AccessKey`, a [JSON Web Token (JWT)](https://en.wikipedia.org/wiki/JSON_Web_Token) is also required to authenticate the HTTP request.
5757

58-
**The difference is**, in this scenario, JWT Token is generated by Microsoft Entra ID.
58+
**The difference is**, in this scenario, JWT is generated by Microsoft Entra ID.
5959

6060
[Learn how to generate Microsoft Entra tokens](../active-directory/develop/reference-v2-libraries.md)
6161

articles/azure-web-pubsub/tutorial-pub-sub-messages.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ Clients connect to the Azure Web PubSub service through the standard WebSocket p
101101
1. First, create a project directory named `subscriber` for this project and install required dependencies:
102102

103103
* The package [Websocket.Client](https://github.com/Marfusios/websocket-client) is a third-party package supporting WebSocket connections. You can use any API/library that supports WebSocket.
104-
* The SDK package `Azure.Messaging.WebPubSub` helps to generate the JWT token.
104+
* The SDK package `Azure.Messaging.WebPubSub` helps to generate the JWT.
105105

106106
```bash
107107
mkdir subscriber

articles/event-hubs/event-hubs-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ An Event Hubs namespace is a management container for event hubs (or topics, in
2222

2323
## Event publishers
2424

25-
Any entity that sends data to an event hub is an *event publisher* (synonymously used with *event producer*). Event publishers can publish events using HTTPS or AMQP 1.0 or the Kafka protocol. Event publishers use Microsoft Entra ID based authorization with OAuth2-issued JWT tokens or an Event Hub-specific Shared Access Signature (SAS) token to gain publishing access.
25+
Any entity that sends data to an event hub is an *event publisher* (synonymously used with *event producer*). Event publishers can publish events using HTTPS or AMQP 1.0 or the Kafka protocol. Event publishers use Microsoft Entra ID based authorization with OAuth2-issued JWTs or an Event Hub-specific Shared Access Signature (SAS) token to gain publishing access.
2626

2727
You can publish an event via AMQP 1.0, the Kafka protocol, or HTTPS. The Event Hubs service provides [REST API](/rest/api/eventhub/) and [.NET](event-hubs-dotnet-standard-getstarted-send.md), [Java](event-hubs-java-get-started-send.md), [Python](event-hubs-python-get-started-send.md), [JavaScript](event-hubs-node-get-started-send.md), and [Go](event-hubs-go-get-started-send.md) client libraries for publishing events to an event hub. For other runtimes and platforms, you can use any AMQP 1.0 client, such as [Apache Qpid](https://qpid.apache.org/).
2828

articles/managed-grafana/quickstart-managed-grafana-cli.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,10 @@ az login
3838

3939
This command prompts your web browser to launch and load an Azure sign-in page.
4040

41-
The CLI experience for Azure Managed Grafana is part of the `amg` extension for the Azure CLI (version 2.30.0 or higher). The extension automatically installs the first time you run the `az grafana` command.
41+
The CLI experience for Azure Managed Grafana is part of the `amg` extension for the Azure CLI (version 2.30.0 or higher). The extension automatically installs the first time you run the `az grafana` command. If this doesn't work, run:
42+
```azurecli
43+
az extension add --name amg
44+
```
4245

4346
## Create a resource group
4447

0 commit comments

Comments
 (0)