You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/api-management-capacity.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -123,10 +123,6 @@ Access metrics in the portal to understand how much capacity is used over time.
123
123
> [!IMPORTANT]
124
124
> Currently, the **CPU Percentage of Gateway** and **Memory Consumption of Gateway** metrics also appear in the portal for instances in classic tiers. However, they're not supported for use in classic tiers and show a value of 0.
125
125
126
-
127
-
128
-
129
-
130
126
> [!NOTE]
131
127
> * You can set a [metric alert](api-management-howto-use-azure-monitor.md#set-up-an-alert-rule) to let you know when something unexpected is happening. For example, get notifications when your API Management instance has exceeded its expected peak capacity for more than 20 minutes.
132
128
> * You can use Azure Monitor [autoscaling](api-management-howto-autoscale.md) to automatically add an Azure API Management unit. Scaling operation can take around 30 minutes, so you should plan your rules accordingly.
@@ -146,8 +142,11 @@ Use capacity metrics for making decisions whether to scale an API Management ins
146
142
>[!TIP]
147
143
> If you are able to estimate your traffic beforehand, test your API Management instance on workloads you expect. You can increase the request load on your tenant gradually and monitor the value of the capacity metric that corresponds to your peak load. Follow the steps from the previous section to use Azure portal to understand how much capacity is used at any given time.
148
144
145
+
> [!IMPORTANT]
146
+
> When defining autoscaling rules, make sure to avoid autoscaling flapping that will cause a scale in/scale out loop. To learn more, we recommend reading [Azure Monitor Autoscale's guidance around flapping](/azure/azure-monitor/autoscale/autoscale-flapping).
147
+
149
148
## Related content
150
149
151
150
-[Upgrade and scale an Azure API Management service instance](upgrade-and-scale.md)
152
151
-[Automatically scale an Azure API Management instance](api-management-howto-autoscale.md)
153
-
-[Plan and manage costs for API Management](plan-manage-costs.md)
152
+
-[Plan and manage costs for API Management](plan-manage-costs.md)
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/howto-labels-aspnet-core.md
+8-10Lines changed: 8 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,13 +7,13 @@ ms.devlang: csharp
7
7
author: maud-lv
8
8
ms.topic: conceptual
9
9
ms.custom: devx-track-csharp
10
-
ms.date: 02/20/2024
10
+
ms.date: 03/19/2025
11
11
ms.author: malev
12
12
13
13
---
14
14
# Use labels to provide per-environment configuration values.
15
15
16
-
Many applications need to use different configurations for different environments. Suppose that an application has a configuration value that defines the connection string to use for its back-end database. The application developers use a different database from the one used in production. The database connection string that the application uses must change as the application moves from development to production.
16
+
Many applications need to use different configurations for different environments. Suppose that an application has a configuration value that defines the endpoint to use for its back-end database. The application developers use a different database from the one used in production. The database endpoint that the application uses must change as the application moves from development to production.
17
17
18
18
In Azure App Configuration, you can use *labels* to define different values for the same key. For example, you can define a single key with different values for development and production. You can specify which label to load when connecting to App Configuration.
19
19
@@ -47,17 +47,15 @@ var builder = WebApplication.CreateBuilder(args);
> The preceding code snippet uses the Secret Manager tool to load App Configuration connection string. For information storing the connection string using the Secret Manager, see [Quickstart for Azure App Configuration with ASP.NET Core](quickstart-aspnet-core-app.md).
60
-
61
59
The `Select` method is called twice. The first time, it loads configuration values with no label. Then, it loads configuration values with the label corresponding to the current environment. These environment-specific values override any corresponding values with no label. You don't need to define environment-specific values for every key. If a key doesn't have a value with a label corresponding to the current environment, it uses the value with no label.
Copy file name to clipboardExpand all lines: articles/backup/blob-backup-configure-quick.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Quickstart - Configure vaulted backup for Azure Blobs using Azure Backup
3
3
description: In this quickstart, learn how to configure vaulted backup for Azure Blobs.
4
4
ms.topic: quickstart
5
-
ms.date: 02/12/2025
5
+
ms.date: 03/28/2025
6
6
ms.service: azure-backup
7
7
author: jyothisuri
8
8
ms.author: jsuri
@@ -29,7 +29,6 @@ Things to remember before you start configuring blob vaulted backup:
29
29
30
30
- Vaulted backup of blobs is a managed offsite backup solution that transfers data to the backup vault and retains as per the retention configured in the backup policy. You can retain data for a maximum of *10 years*.
31
31
- Currently, you can use the vaulted backup solution to restore data to a different storage account only. While performing restores, ensure that the target storage account doesn't contain any *containers* with the same name as those backed up in a recovery point. If any conflicts arise due to the same name of containers, the restore operation fails.
32
-
- Storage accounts to be backed up need to have *cross-tenant replication* enabled. To ensure if the checkbox for this setting is enabled, go to the **storage account** > **Object replication** > **Advanced settings**.
33
32
34
33
For more information about the supported scenarios, limitations, and availability, see the [support matrix](blob-backup-support-matrix.md).
Copy file name to clipboardExpand all lines: articles/data-factory/connector-azure-database-for-postgresql.md
+81-2Lines changed: 81 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,11 +83,10 @@ The following properties are supported for the Azure Database for PostgreSQL lin
83
83
|:--- |:--- |:--- |
84
84
| type | The type property must be set to: **AzurePostgreSql**. | Yes |
85
85
| version | The version that you specify. The value is `2.0`. | Yes |
86
+
| authenticationType | Select from basic or service principal authentication | Yes |
86
87
| server | Specifies the host name and optionally port on which Azure Database for PostgreSQL is running. | Yes |
87
88
| port |The TCP port of the Azure Database for PostgreSQL server. The default value is `5432`. |No |
88
89
| database| The name of the Azure Database for PostgreSQL database to connect to. |Yes |
89
-
| username| The username to connect with. Not required if using IntegratedSecurity. |Yes |
90
-
| password| The password to connect with. Not required if using IntegratedSecurity. Mark this field as **SecureString** to store it securely. Or, you can [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). |Yes |
91
90
| sslMode | Controls whether SSL is used, depending on server support. <br/>- **Disable**: SSL is disabled. If the server requires SSL, the connection will fail.<br/>- **Allow**: Prefer non-SSL connections if the server allows them, but allow SSL connections.<br/>- **Prefer**: Prefer SSL connections if the server allows them, but allow connections without SSL.<br/>- **Require**: The connection fails if the server doesn't support SSL.<br/>- **Verify-ca**: The connection fails if the server doesn't support SSL. Also verifies server certificate.<br/>- **Verify-full**: The connection fails if the server doesn't support SSL. Also verifies server certificate with host's name. <br/>Options: Disable (0) / Allow (1) / Prefer (2) **(Default)** / Require (3) / Verify-ca (4) / Verify-full (5) | No |
92
91
| connectVia | This property represents the [integration runtime](concepts-integration-runtime.md) to be used to connect to the data store. You can use Azure Integration Runtime or Self-hosted Integration Runtime (if your data store is located in private network). If not specified, it uses the default Azure Integration Runtime.|No|
93
92
|***Additional connection properties:***|||
@@ -100,6 +99,13 @@ The following properties are supported for the Azure Database for PostgreSQL lin
100
99
| timezone | Gets or sets the session timezone. | No |
101
100
| encoding | Gets or sets the .NET encoding that will be used to encode/decode PostgreSQL string data. | No |
102
101
102
+
### Basic authentication
103
+
104
+
| Property | Description | Required |
105
+
|:--- |:--- |:--- |
106
+
| username | The username to connect with. Not required if using IntegratedSecurity. | Yes |
107
+
| password | The password to connect with. Not required if using IntegratedSecurity. Mark this field as **SecureString** to store it securely. Or, you can [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | Yes |
108
+
103
109
**Example**:
104
110
105
111
```json
@@ -149,8 +155,81 @@ The following properties are supported for the Azure Database for PostgreSQL lin
149
155
}
150
156
}
151
157
}
158
+
```
159
+
160
+
### Service principal authentication
161
+
162
+
| Property | Description | Required |
163
+
|:--- |:--- |:--- |
164
+
| username | The display name of the service principal | Yes |
165
+
| tenant | The tenant which the Azure Database for PostgreSQL server is located |Yes |
166
+
| servicePrincipalId | Application ID of service principal |Yes |
167
+
| servicePrincipalCredentialType | Select if service principal certificate or service principal key is desired authentication method<br/>- **ServicePrincipalCert**: Set to service principal certificate for service principal certificate.<br/>- **ServicePrincipalKey**: Set to service principal key for service principal key authentication. | Yes |
168
+
| servicePrincipalKey | Client secret value. Used when service principal key is selected | Yes |
169
+
| azureCloudType | Select the Azure cloud type of your Azure Database for PostgreSQL server | Yes |
170
+
| servicePrincipalEmbeddedCert | Service principal certificate file | Yes |
171
+
| servicePrincipalEmbeddedCertPassword | Service principal certificate password if required | No |
0 commit comments