Skip to content

Commit 4e686b1

Browse files
authored
Merge pull request #297199 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST, 3/28
2 parents bc7ae96 + 83d59fa commit 4e686b1

File tree

22 files changed

+226
-51
lines changed

22 files changed

+226
-51
lines changed

articles/api-management/api-management-capacity.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -123,10 +123,6 @@ Access metrics in the portal to understand how much capacity is used over time.
123123
> [!IMPORTANT]
124124
> Currently, the **CPU Percentage of Gateway** and **Memory Consumption of Gateway** metrics also appear in the portal for instances in classic tiers. However, they're not supported for use in classic tiers and show a value of 0.
125125
126-
127-
128-
129-
130126
> [!NOTE]
131127
> * You can set a [metric alert](api-management-howto-use-azure-monitor.md#set-up-an-alert-rule) to let you know when something unexpected is happening. For example, get notifications when your API Management instance has exceeded its expected peak capacity for more than 20 minutes.
132128
> * You can use Azure Monitor [autoscaling](api-management-howto-autoscale.md) to automatically add an Azure API Management unit. Scaling operation can take around 30 minutes, so you should plan your rules accordingly.
@@ -146,8 +142,11 @@ Use capacity metrics for making decisions whether to scale an API Management ins
146142
>[!TIP]
147143
> If you are able to estimate your traffic beforehand, test your API Management instance on workloads you expect. You can increase the request load on your tenant gradually and monitor the value of the capacity metric that corresponds to your peak load. Follow the steps from the previous section to use Azure portal to understand how much capacity is used at any given time.
148144
145+
> [!IMPORTANT]
146+
> When defining autoscaling rules, make sure to avoid autoscaling flapping that will cause a scale in/scale out loop. To learn more, we recommend reading [Azure Monitor Autoscale's guidance around flapping](/azure/azure-monitor/autoscale/autoscale-flapping).
147+
149148
## Related content
150149

151150
- [Upgrade and scale an Azure API Management service instance](upgrade-and-scale.md)
152151
- [Automatically scale an Azure API Management instance](api-management-howto-autoscale.md)
153-
- [Plan and manage costs for API Management](plan-manage-costs.md)
152+
- [Plan and manage costs for API Management](plan-manage-costs.md)

articles/azure-app-configuration/howto-create-snapshots.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: Muksvso
55
ms.author: mubatra
66
ms.service: azure-app-configuration
77
ms.topic: how-to
8-
ms.date: 11/15/2023
8+
ms.date: 03/19/2025
99
---
1010

1111
# Manage and use snapshots
@@ -96,8 +96,8 @@ Edit the call to the `AddAzureAppConfiguration` method, which is often found in
9696
```csharp
9797
configurationBuilder.AddAzureAppConfiguration(options =>
9898
{
99-
options.Connect(Environment.GetEnvironmentVariable("ConnectionString"));
100-
99+
string endpoint = Environment.GetEnvironmentVariable("Endpoint");
100+
options.Connect(new Uri(endpoint), new DefaultAzureCredential());
101101
// Select an existing snapshot by name. This will add all of the key-values from the snapshot to this application's configuration.
102102
options.SelectSnapshot("SnapshotName");
103103

articles/azure-app-configuration/howto-labels-aspnet-core.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ ms.devlang: csharp
77
author: maud-lv
88
ms.topic: conceptual
99
ms.custom: devx-track-csharp
10-
ms.date: 02/20/2024
10+
ms.date: 03/19/2025
1111
ms.author: malev
1212

1313
---
1414
# Use labels to provide per-environment configuration values.
1515

16-
Many applications need to use different configurations for different environments. Suppose that an application has a configuration value that defines the connection string to use for its back-end database. The application developers use a different database from the one used in production. The database connection string that the application uses must change as the application moves from development to production.
16+
Many applications need to use different configurations for different environments. Suppose that an application has a configuration value that defines the endpoint to use for its back-end database. The application developers use a different database from the one used in production. The database endpoint that the application uses must change as the application moves from development to production.
1717

1818
In Azure App Configuration, you can use *labels* to define different values for the same key. For example, you can define a single key with different values for development and production. You can specify which label to load when connecting to App Configuration.
1919

@@ -47,17 +47,15 @@ var builder = WebApplication.CreateBuilder(args);
4747

4848
builder.Configuration.AddAzureAppConfiguration(options =>
4949
{
50-
options.Connect(builder.Configuration.GetConnectionString("AppConfig"))
51-
// Load configuration values with no label
52-
.Select(KeyFilter.Any, LabelFilter.Null)
53-
// Override with any configuration values specific to current hosting env
54-
.Select(KeyFilter.Any, builder.Environment.EnvironmentName);
50+
string endpoint = Environment.GetEnvironmentVariable("Endpoint");
51+
options.Connect(new Uri(endpoint), new DefaultAzureCredential())
52+
// Load configuration values with no label
53+
.Select(KeyFilter.Any, LabelFilter.Null)
54+
// Override with any configuration values specific to current hosting env
55+
.Select(KeyFilter.Any, builder.Environment.EnvironmentName);
5556
});
5657
```
5758

58-
> [!IMPORTANT]
59-
> The preceding code snippet uses the Secret Manager tool to load App Configuration connection string. For information storing the connection string using the Secret Manager, see [Quickstart for Azure App Configuration with ASP.NET Core](quickstart-aspnet-core-app.md).
60-
6159
The `Select` method is called twice. The first time, it loads configuration values with no label. Then, it loads configuration values with the label corresponding to the current environment. These environment-specific values override any corresponding values with no label. You don't need to define environment-specific values for every key. If a key doesn't have a value with a label corresponding to the current environment, it uses the value with no label.
6260

6361
## Test in different environments

articles/backup/blob-backup-configure-quick.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Quickstart - Configure vaulted backup for Azure Blobs using Azure Backup
33
description: In this quickstart, learn how to configure vaulted backup for Azure Blobs.
44
ms.topic: quickstart
5-
ms.date: 02/12/2025
5+
ms.date: 03/28/2025
66
ms.service: azure-backup
77
author: jyothisuri
88
ms.author: jsuri
@@ -29,7 +29,6 @@ Things to remember before you start configuring blob vaulted backup:
2929

3030
- Vaulted backup of blobs is a managed offsite backup solution that transfers data to the backup vault and retains as per the retention configured in the backup policy. You can retain data for a maximum of *10 years*.
3131
- Currently, you can use the vaulted backup solution to restore data to a different storage account only. While performing restores, ensure that the target storage account doesn't contain any *containers* with the same name as those backed up in a recovery point. If any conflicts arise due to the same name of containers, the restore operation fails.
32-
- Storage accounts to be backed up need to have *cross-tenant replication* enabled. To ensure if the checkbox for this setting is enabled, go to the **storage account** > **Object replication** > **Advanced settings**.
3332

3433
For more information about the supported scenarios, limitations, and availability, see the [support matrix](blob-backup-support-matrix.md).
3534

25.8 KB
Loading

articles/data-factory/connector-azure-database-for-postgresql.md

Lines changed: 81 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,11 +83,10 @@ The following properties are supported for the Azure Database for PostgreSQL lin
8383
|:--- |:--- |:--- |
8484
| type | The type property must be set to: **AzurePostgreSql**. | Yes |
8585
| version | The version that you specify. The value is `2.0`. | Yes |
86+
| authenticationType | Select from basic or service principal authentication | Yes |
8687
| server | Specifies the host name and optionally port on which Azure Database for PostgreSQL is running. | Yes |
8788
| port |The TCP port of the Azure Database for PostgreSQL server. The default value is `5432`. |No |
8889
| database| The name of the Azure Database for PostgreSQL database to connect to. |Yes |
89-
| username| The username to connect with. Not required if using IntegratedSecurity. |Yes |
90-
| password| The password to connect with. Not required if using IntegratedSecurity. Mark this field as **SecureString** to store it securely. Or, you can [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). |Yes |
9190
| sslMode | Controls whether SSL is used, depending on server support. <br/>- **Disable**: SSL is disabled. If the server requires SSL, the connection will fail.<br/>- **Allow**: Prefer non-SSL connections if the server allows them, but allow SSL connections.<br/>- **Prefer**: Prefer SSL connections if the server allows them, but allow connections without SSL.<br/>- **Require**: The connection fails if the server doesn't support SSL.<br/>- **Verify-ca**: The connection fails if the server doesn't support SSL. Also verifies server certificate.<br/>- **Verify-full**: The connection fails if the server doesn't support SSL. Also verifies server certificate with host's name. <br/>Options: Disable (0) / Allow (1) / Prefer (2) **(Default)** / Require (3) / Verify-ca (4) / Verify-full (5) | No |
9291
| connectVia | This property represents the [integration runtime](concepts-integration-runtime.md) to be used to connect to the data store. You can use Azure Integration Runtime or Self-hosted Integration Runtime (if your data store is located in private network). If not specified, it uses the default Azure Integration Runtime.|No|
9392
| ***Additional connection properties:*** | | |
@@ -100,6 +99,13 @@ The following properties are supported for the Azure Database for PostgreSQL lin
10099
| timezone | Gets or sets the session timezone. | No |
101100
| encoding | Gets or sets the .NET encoding that will be used to encode/decode PostgreSQL string data. | No |
102101

102+
### Basic authentication
103+
104+
| Property | Description | Required |
105+
|:--- |:--- |:--- |
106+
| username | The username to connect with. Not required if using IntegratedSecurity. | Yes |
107+
| password | The password to connect with. Not required if using IntegratedSecurity. Mark this field as **SecureString** to store it securely. Or, you can [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | Yes |
108+
103109
**Example**:
104110

105111
```json
@@ -149,8 +155,81 @@ The following properties are supported for the Azure Database for PostgreSQL lin
149155
}
150156
}
151157
}
158+
```
159+
160+
### Service principal authentication
161+
162+
| Property | Description | Required |
163+
|:--- |:--- |:--- |
164+
| username | The display name of the service principal | Yes |
165+
| tenant | The tenant which the Azure Database for PostgreSQL server is located |Yes |
166+
| servicePrincipalId | Application ID of service principal |Yes |
167+
| servicePrincipalCredentialType | Select if service principal certificate or service principal key is desired authentication method<br/>- **ServicePrincipalCert**: Set to service principal certificate for service principal certificate.<br/>- **ServicePrincipalKey**: Set to service principal key for service principal key authentication. | Yes |
168+
| servicePrincipalKey | Client secret value. Used when service principal key is selected | Yes |
169+
| azureCloudType | Select the Azure cloud type of your Azure Database for PostgreSQL server | Yes |
170+
| servicePrincipalEmbeddedCert | Service principal certificate file | Yes |
171+
| servicePrincipalEmbeddedCertPassword | Service principal certificate password if required | No |
172+
173+
**Example**:
174+
175+
**Service principal key**
176+
```json
177+
{
178+
"name": "AzurePostgreSqlLinkedService",
179+
"type": "Microsoft.DataFactory/factories/linkedservices",
180+
"properties": {
181+
"annotations": [],
182+
"type": "AzurePostgreSql",
183+
"version": "2.0",
184+
"typeProperties": {
185+
"server": "<server name>",
186+
"port": 5432,
187+
"database": "<database name>",
188+
"sslMode": 2,
189+
"username": "<service principal name>",
190+
"authenticationType": "<authentication type>",
191+
"tenant": "<tenant>",
192+
"servicePrincipalId": "<service principal ID>",
193+
"azureCloudType": "<azure cloud type>",
194+
"servicePrincipalCredentialType": "<service principal type>",
195+
"servicePrincipalKey": "<service principal key>"
196+
}
197+
}
198+
}
199+
```
200+
201+
**Example**:
202+
203+
**Service principal certificate**
204+
```json
205+
{
206+
"name": "AzurePostgreSqlLinkedService",
207+
"type": "Microsoft.DataFactory/factories/linkedservices",
208+
"properties": {
209+
"annotations": [],
210+
"type": "AzurePostgreSql",
211+
"version": "2.0",
212+
"typeProperties": {
213+
"server": "<server name>",
214+
"port": 5432,
215+
"database": "<database name>",
216+
"sslMode": 2,
217+
"username": "<service principal name>",
218+
"authenticationType": "<authentication type>",
219+
"tenant": "<tenant>",
220+
"servicePrincipalId": "<service principal ID>",
221+
"azureCloudType": "<azure cloud type>",
222+
"servicePrincipalCredentialType": "<service principal type>",
223+
"servicePrincipalEmbeddedCert": "<service principal certificate>",
224+
"servicePrincipalEmbeddedCertPassword": "<service principal embedded certificate password>"
225+
}
226+
}
227+
}
152228
```
153229

230+
231+
232+
154233
### Version 1.0
155234

156235
The following properties are supported for the Azure Database for PostgreSQL linked service when you apply version 1.0:

0 commit comments

Comments
 (0)