Skip to content

Commit 4690a31

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-roles-refactor-anchors
2 parents 4a5fc09 + 6ee65c4 commit 4690a31

7 files changed

+72
-52
lines changed

articles/azure-app-configuration/concept-disaster-recovery.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: avanigupta
55
ms.author: avgupta
66
ms.service: azure-app-configuration
77
ms.topic: conceptual
8-
ms.date: 04/20/2023
8+
ms.date: 02/16/2024
99
---
1010

1111
# Resiliency and disaster recovery
@@ -14,6 +14,9 @@ Azure App Configuration is a regional service. Each configuration store is creat
1414

1515
This article provides general guidance on how you can use multiple replicas across Azure regions to increase the geo-resiliency of your application.
1616

17+
> [!TIP]
18+
> See [best practices](./howto-best-practices.md#building-applications-with-high-resiliency) for building applications with high resiliency.
19+
1720
## High-availability architecture
1821

1922
The original App Configuration store is also considered a replica, so to realize cross-region redundancy, you need to create at least one new replica in a different region. However, you can choose to create multiple App Configuration replicas in different regions based on your requirements. You may then utilize these replicas in your application in the order of your preference. With this setup, your application has at least one additional replica to fall back on if the primary replica becomes inaccessible.

articles/azure-app-configuration/enable-dynamic-configuration-azure-kubernetes-service.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,23 @@
11
---
2-
title: "Tutorial: Use dynamic configuration in Azure App Configuration Kubernetes Provider | Microsoft Docs"
2+
title: "Tutorial: Use dynamic configuration in Azure App Configuration Kubernetes Provider"
33
description: "In this quickstart, use the Azure App Configuration Kubernetes Provider to dynamically load updated key-values from App Configuration store."
44
services: azure-app-configuration
55
author: junbchen
66
ms.service: azure-app-configuration
77
ms.devlang: csharp
88
ms.custom: devx-track-csharp
99
ms.topic: tutorial
10-
ms.date: 11/14/2023
10+
ms.date: 02/16/2024
1111
ms.author: linglingye
1212
#Customer intent: As an Azure Kubernetes Service user, I want to manage all my app settings in one place using Azure App Configuration.
1313
---
1414

1515
# Tutorial: Use dynamic configuration in Azure Kubernetes Service
1616

17-
If you use Azure Kubernetes Service (AKS), this tutorial will show you how to enable dynamic configuration for your workloads in AKS by leveraging Azure App Configuration and its Kubernetes Provider. The tutorial assumes that you have already worked through the quickstart and have an App Configuration Kubernetes Provider set up, so before proceeding, make sure you have completed the [Use Azure App Configuration in Azure Kubernetes Service](./quickstart-azure-kubernetes-service.md) quickstart.
17+
If you use Azure Kubernetes Service (AKS), this tutorial shows you how to enable dynamic configuration for your workloads in AKS by leveraging Azure App Configuration and its Kubernetes Provider. The tutorial assumes that you work through the quickstart and have an App Configuration Kubernetes Provider set up, so before proceeding, make sure you complete the [Use Azure App Configuration in Azure Kubernetes Service](./quickstart-azure-kubernetes-service.md) quickstart.
1818

19+
> [!TIP]
20+
> See [options](./howto-best-practices.md#azure-kubernetes-service-access-to-app-configuration) for workloads hosted in Kubernetes to access Azure App Configuration.
1921
2022
## Prerequisites
2123

@@ -36,7 +38,7 @@ Add the following key-value to your App Configuration store. For more informatio
3638

3739
## Reload data from App Configuration
3840

39-
1. Open the *appConfigurationProvider.yaml* file located in the *Deployment* directory. Then, add the `refresh` section under the `configuration` property as shown below. It enables configuration refresh by monitoring the sentinel key.
41+
1. Open the *appConfigurationProvider.yaml* file located in the *Deployment* directory. Then, add the `refresh` section under the `configuration` property. It enables configuration refresh by monitoring the sentinel key.
4042

4143
```yaml
4244
apiVersion: azconfig.io/v1
@@ -64,15 +66,15 @@ Add the following key-value to your App Configuration store. For more informatio
6466
> [!TIP]
6567
> By default, the Kubernetes provider polls the monitoring key-values every 30 seconds for change detection. However, you can change this behavior by setting the `interval` property of the `refresh`. If you want to reduce the number of requests to your App Configuration store, you can adjust it to a higher value.
6668

67-
1. Open the *deployment.yaml* file in the *Deployment* directory and add the following content to the `spec.containers` section. Your application will load configuration from a volume-mounted file the App Configuration Kubernetes provider generates. By setting this environment variable, your application can [ use polling to monitor changes in mounted files](/dotnet/api/microsoft.extensions.fileproviders.physicalfileprovider.usepollingfilewatcher).
69+
1. Open the *deployment.yaml* file in the *Deployment* directory and add the following content to the `spec.containers` section. Your application loads configuration from a volume-mounted file the App Configuration Kubernetes provider generates. By setting this environment variable, your application can [ use polling to monitor changes in mounted files](/dotnet/api/microsoft.extensions.fileproviders.physicalfileprovider.usepollingfilewatcher).
6870

6971
```yaml
7072
env:
7173
- name: DOTNET_USE_POLLING_FILE_WATCHER
7274
value: "true"
7375
```
7476

75-
1. Run the following command to deploy the change. Replace the namespace if you are using your existing AKS application.
77+
1. Run the following command to deploy the change. Replace the namespace if you're using your existing AKS application.
7678

7779
```console
7880
kubectl apply -f ./Deployment -n appconfig-demo
@@ -90,7 +92,7 @@ Add the following key-value to your App Configuration store. For more informatio
9092
| Settings:Message | Hello from Azure App Configuration - now with live updates! |
9193
| Settings:Sentinel | 2 |
9294

93-
1. After refreshing the browser a few times, you will see the updated content once the ConfigMap is updated in 30 seconds.
95+
1. After refreshing the browser a few times, you'll see the updated content once the ConfigMap is updated in 30 seconds.
9496

9597
![Screenshot of the web app with updated values.](./media/quickstarts/kubernetes-provider-app-launch-dynamic-after.png)
9698

articles/azure-app-configuration/faq.yml

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ metadata:
33
title: Azure App Configuration FAQ
44
description: Read answers to frequently asked questions (FAQ) about Azure App Configuration, such as how it's different from Azure Key Vault.
55
services: azure-app-configuration
6-
author: maud-lv
6+
author: zhenlan
77
ms.service: azure-app-configuration
88
ms.topic: faq
9-
ms.date: 08/23/2022
10-
ms.author: malev
9+
ms.date: 02/16/2024
10+
ms.author: zhenlwa
1111
ms.custom: references_regions
1212
title: Azure App Configuration FAQ
1313
summary: This article answers frequently asked questions about Azure App Configuration.
@@ -35,7 +35,7 @@ sections:
3535
answer: |
3636
Although App Configuration provides hardened security, Key Vault is still the best place for storing application secrets. Key Vault provides hardware-level encryption, granular access policies, and management operations such as certificate rotation.
3737
38-
You can create App Configuration values that reference secrets stored in Key Vault. For more information, see [Use Key Vault references in an ASP.NET Core app](./use-key-vault-references-dotnet-core.md).
38+
You can create App Configuration key-values that reference secrets stored in Key Vault. For more information, see [Use Key Vault references in an ASP.NET Core app](./use-key-vault-references-dotnet-core.md).
3939
4040
- question: Does App Configuration encrypt my data?
4141
answer: Yes. App Configuration always encrypts all data in transit and at rest. All network communication is over TLS 1.2 or TLS 1.3. App Configuration supports encryption at rest with either [Microsoft-managed keys or customer-managed keys](./concept-customer-managed-keys.md).
@@ -54,6 +54,8 @@ sections:
5454
5555
This limit should be sufficient for a single setting in most applications. If you find that your setting is larger than this limit, you may consider storing your data elsewhere, and [add a reference of that data](./howto-best-practices.md#references-to-external-data) in App Configuration.
5656
57+
For more information, see [Azure subscription and service limits](/azure/azure-resource-manager/management/azure-subscription-service-limits#azure-app-configuration).
58+
5759
- question: How should I store configurations for multiple environments (test, staging, production, and so on)?
5860
answer: |
5961
You control who can access App Configuration at a per-store level. Use a separate store for each environment that requires different permissions. This approach provides the best security isolation.
@@ -77,19 +79,19 @@ sections:
7779
7880
- question: Which App Configuration tier should I use?
7981
answer: |
80-
Both App Configuration tiers offer core functionality, including config settings, feature flags, Key Vault references, basic management operations, metrics, and logs.
82+
Both App Configuration tiers offer core functionality, including config settings, feature flags, Key Vault references, configuration snapshots, basic management operations, metrics, and logs.
8183
8284
The following are considerations for choosing a tier.
8385
84-
- **Resources per subscription**: A resource consists of a single configuration store. Each subscription is limited to one configuration store in the free tier. Subscriptions can have an unlimited number of configuration stores in the standard tier.
85-
- **Storage per resource**: In the free tier, each configuration store is limited to 10 MB of storage. In the standard tier, each configuration store can use up to 1 GB of storage.
86+
- **Resources per subscription**: A resource consists of a single configuration store. Each subscription is limited to one configuration store per region in the free tier. Subscriptions can have an unlimited number of configuration stores in the standard tier.
87+
- **Storage per resource**: In the free tier, each configuration store is limited to 10 MB of regular storage and 10 MB of snapshot storage. In the standard tier, each configuration store can use up to 1 GB of regular storage and an additional 1 GB of snapshot storage.
8688
- **Revision history**: App Configuration stores a history of all changes made to keys. In the free tier, this history is stored for seven days. In the standard tier, this history is stored for 30 days.
8789
- **Requests quota**: Free tier stores are limited to 1,000 requests per day. When a store reaches 1,000 requests, it returns HTTP status code 429 for all requests until midnight UTC.
8890
8991
Standard tier stores are limited to 30,000 requests per hour. When the hourly quota is exhausted, requests may return HTTP status code 429 indicating too many requests until end of the hour. As more requests are sent which are above quota, a higher percentage of them may return status code 429.
9092
91-
- **Service level agreement**: The standard tier has an SLA of 99.9% availability. The free tier doesn't have an SLA.
92-
- **Security features**: Both tiers include basic security functionality, including encryption with Microsoft-managed keys, authentication via HMAC or Azure Active Directory, Azure RBAC support, managed identity, and service tags. The Standard tier offers more advanced security functionality, including Private Link support and encryption with customer-managed keys.
93+
- **Service level agreement**: The standard tier has an SLA of 99.9% availability and 99.95% availability with geo-replication enabled. The free tier doesn't have an SLA.
94+
- **Features**: Both tiers include functionalities, including encryption with Microsoft-managed keys, authentication via access key or Microsoft Entra ID, Azure role-based access control (RBAC), managed identity, service tags, and availability zone redundancy. The Standard tier offers more functionalities, including Private Link support, encryption with customer-managed keys, soft delete protection, and geo-replication capability.
9395
- **Cost**: Standard tier stores have a daily usage charge. The first 200,000 requests each day are included in the daily charge. There's also an overage charge for requests past the daily allocation. There's no cost to use a free tier store.
9496
9597
- question: Can I upgrade a store from the Free tier to the Standard tier? Can I downgrade a store from the Standard tier to the Free tier?

0 commit comments

Comments
 (0)