Skip to content

Commit 5cc968f

Browse files
authored
Merge pull request #295239 from MicrosoftDocs/main
2/24/2025 PM Publish
2 parents a583a0c + 63f6824 commit 5cc968f

File tree

757 files changed

+1784
-1315
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

757 files changed

+1784
-1315
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5970,5 +5970,10 @@
59705970
"redirect_url": "/azure/nat-gateway/nat-overview",
59715971
"redirect_document_id": false
59725972
},
5973+
{
5974+
"source_path": "articles/sentinel/kusto-resources.md",
5975+
"redirect_url": "/kusto/query/kql-learning-resources?view=microsoft-sentinel?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json",
5976+
"redirect_document_id": false
5977+
}
59735978
]
59745979
}

articles/api-management/api-management-howto-properties.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom: engagement-fy23, devx-track-azurecli
1717

1818
[API Management policies](api-management-howto-policies.md) are a powerful capability of the system that allow the publisher to change the behavior of the API through configuration. Policies are a collection of statements that are executed sequentially on the request or response of an API. Policy statements can be constructed using literal text values, policy expressions, and named values.
1919

20-
*Named values* are a global collection of name/value pairs in each API Management instance. There is no imposed limit on the number of items in the collection. Named values can be used to manage constant string values and secrets across all API configurations and policies.
20+
*Named values* are a global collection of name/value pairs in each API Management instance. There's no imposed limit on the number of items in the collection. Named values can be used to manage constant string values and secrets across all API configurations and policies.
2121

2222
:::image type="content" source="media/api-management-howto-properties/named-values.png" alt-text="Named values in the Azure portal":::
2323

@@ -44,10 +44,10 @@ Using key vault secrets is recommended because it helps improve API Management s
4444
* Secrets updated in the key vault are automatically rotated in API Management. After update in the key vault, a named value in API Management is updated within 4 hours. You can also manually refresh the secret using the Azure portal or via the management REST API.
4545

4646
> [!NOTE]
47-
> The secrets stored in Azure Key Vault must be between 1 and 4096 characters, as API Management cannot retrieve values that exceed this limit.
47+
> The secrets stored in Azure Key Vault must be between 1 and 4096 characters, as API Management can't retrieve values that exceed this limit.
4848
## Prerequisites
4949

50-
* If you have not created an API Management service instance yet, see [Create an API Management service instance](get-started-create-service-instance.md).
50+
* If you haven't created an API Management service instance yet, see [Create an API Management service instance](get-started-create-service-instance.md).
5151

5252
### Prerequisites for key vault integration
5353

@@ -59,8 +59,7 @@ Using key vault secrets is recommended because it helps improve API Management s
5959

6060
- Enable a system-assigned or user-assigned [managed identity](api-management-howto-use-managed-service-identity.md) in the API Management instance.
6161

62-
[!INCLUDE [api-management-key-vault-access](../../includes/api-management-key-vault-access.md)]
63-
62+
[!INCLUDE [api-management-key-vault-secret-access](../../includes/api-management-key-vault-secret-access.md)]
6463

6564
[!INCLUDE [api-management-key-vault-network](../../includes/api-management-key-vault-network.md)]
6665

@@ -134,7 +133,7 @@ az apim nv show --resource-group apim-hello-word-resource-group \
134133
--service-name apim-hello-world --named-value-id named_value_01
135134
```
136135

137-
This example is a secret value. The previous command does not return the value. To see the value, run the [az apim nv show-secret](/cli/azure/apim/nv#az-apim-nv-show-secret) command:
136+
This example is a secret value. The previous command doesn't return the value. To see the value, run the [az apim nv show-secret](/cli/azure/apim/nv#az-apim-nv-show-secret) command:
138137

139138
```azurecli
140139
az apim nv show-secret --resource-group apim-hello-word-resource-group \

articles/api-management/api-management-howto-use-managed-service-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,9 +123,9 @@ The `tenantId` property identifies which Microsoft Entra tenant the identity bel
123123
124124
## Configure Key Vault access using a managed identity
125125

126-
The following configurations are needed for API Management to access secrets and certificates from an Azure key vault.
126+
The following configurations are needed for API Management to access certificates from an Azure key vault.
127127

128-
[!INCLUDE [api-management-key-vault-access](../../includes/api-management-key-vault-access.md)]
128+
[!INCLUDE [api-management-key-vault-certificate-access](../../includes/api-management-key-vault-certificate-access.md)]
129129

130130
[!INCLUDE [api-management-key-vault-network](../../includes/api-management-key-vault-network.md)]
131131

articles/api-management/configure-custom-domain.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -89,8 +89,7 @@ To fetch a TLS/SSL certificate, API Management must have the list and get secret
8989
1. On the **Managed identities** page of your API Management instance, enable a system-assigned or user-assigned [managed identity](api-management-howto-use-managed-service-identity.md). Note the principal ID on that page.
9090
1. Assign permissions to the managed identity to access the key vault. Use steps in the following section.
9191

92-
[!INCLUDE [api-management-key-vault-access](../../includes/api-management-key-vault-access.md)]
93-
92+
[!INCLUDE [api-management-key-vault-certificate-access](../../includes/api-management-key-vault-certificate-access.md)]
9493

9594
If the certificate is set to `autorenew` and your API Management tier has an SLA (that is, in all tiers except the Developer tier), API Management will pick up the latest version automatically, without downtime to the service.
9695

articles/app-service/environment/how-to-upgrade-preference.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,10 +32,10 @@ In smaller regions, Early and Late upgrade preferences might be very close to ea
3232

3333
## Manual upgrade preference
3434

35-
Manual upgrade preference gives you the option to receive a notification when an upgrade is available. The availability is also visible in the Azure portal. After the upgrade is available, you'll have 15 days to start the upgrade process. If you don't start the upgrade within the 15 days, the upgrade is processed with the remaining automatic upgrades in the region.
35+
Manual upgrade preference gives you the option to receive a notification when an upgrade is available. The availability is also visible in the Azure portal. After the upgrade is available, you'll typically have 15 days to start the upgrade process. If you don't start the upgrade within the 15 days, the upgrade is processed with the remaining automatic upgrades in the region.
3636

37-
> [!IMPORTANT]
38-
> In rare cases, you might see an upgrade is available in the **Configuration** page for your App Service Environment, but you don't receive a **Service Health** notification (if you [configure notifications](#configure-notifications)). If you don't receive a Service Health notification, this available upgrade isn't required and the 15-day time limit doesn't apply. This is a known bug that we are working to fix.
37+
> [!NOTE]
38+
> Our goal is to provide you with a 15-day notice before the upgrade is applied automatically. In rare cases, the notice period is less than 15 days. The "End Time" for the planned maintenance event that you receive always indicates the end of the notice period.
3939
>
4040
4141
Upgrades normally don't affect the availability of your apps. The upgrade adds extra instances to ensure that the same capacity is available during upgrade. Patched and restarted instances are added back in rotation, and when you have workloads sensitive to restarts you should plan to start the maintenance during non-business hours. The full upgrade process normally finishes within 18 hours, but could take longer. Once the upgrade is started the upgrade runs until it's complete and isn't paused during standard business hours.
@@ -44,6 +44,10 @@ Upgrades normally don't affect the availability of your apps. The upgrade adds e
4444
> In rare cases, the upgrade availability might be impacted by a security hotfix superseding the planned upgrade, or a regression found in the planned upgrade before it has been applied to your instance. In these rare cases, the available upgrade will be removed and will transition to automatic upgrade.
4545
>
4646
47+
> [!IMPORTANT]
48+
> In rare cases, you might see an upgrade is available in the **Configuration** page for your App Service Environment, but you don't receive a **Service Health** notification (if you [configure notifications](#configure-notifications)). If you don't receive a Service Health notification, this available upgrade isn't required and the 15-day time limit doesn't apply. This is a known bug that we are working to fix.
49+
>
50+
4751
## Configure notifications
4852

4953
When an upgrade is available, Azure adds a planned maintenance event in the Service Health dashboard of Azure Monitor. To see past notifications in the [Azure portal](https://portal.azure.com), navigate to **Home > Monitor > Service Health > Planned maintenance**. To make it easy to find the relevant events, select the **Service** box and check only the App Service type. You can also filter by subscription and region.
17.8 KB
Loading
30.1 KB
Loading
-7.41 KB
Loading

articles/app-service/includes/configure-azure-storage/azure-storage-linux-container-pivot.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -218,6 +218,9 @@ To validate that the Azure Storage is mounted successfully for the app:
218218
1. Regenerate **key2**.
219219
1. In the storage mount configuration, update the access the key to use the regenerated **key2**.
220220
1. Regenerate **key1**.
221+
222+
#### Configuration
223+
- If needing to use a real time file system, where changes to alter, add, or remove files are expected to be shown quickly, then use _Azure Files_ as the storage type when mounting storage. Azure Blob should be used when files are static and aren't expected to be changed.
221224
222225
#### Troubleshooting
223226

articles/app-service/provision-resource-bicep.md

Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ ms.author: msangapu
66
ms.topic: article
77
ms.custom: devx-track-bicep
88
ms.date: 11/18/2022
9+
zone_pivot_groups: app-service-bicep
910
---
1011

1112
# Create App Service app using Bicep
@@ -22,6 +23,8 @@ To effectively create resources with Bicep, you'll need to set up a Bicep [devel
2223

2324
## Review the template
2425

26+
::: zone pivot="app-service-bicep-linux"
27+
2528
The template used in this quickstart is shown below. It deploys an App Service plan and an App Service app on Linux and a sample Node.js "Hello World" app from the [Azure Samples](https://github.com/Azure-Samples) repo.
2629

2730
```bicep
@@ -113,6 +116,82 @@ To deploy a different language stack, update `linuxFxVersion` with appropriate v
113116

114117
---
115118

119+
::: zone-end
120+
121+
::: zone pivot="app-service-bicep-windows-container"
122+
123+
The template used in this quickstart is shown below. It deploys an App Service plan and an App Service app on Windows and a sample .NET "Hello World" app from the [Azure Samples](https://github.com/Azure-Samples) repo.
124+
125+
```bicep
126+
param webAppName string = uniqueString(resourceGroup().id) // generate unique name for web app
127+
param location string = resourceGroup().location // location for all resources
128+
param sku string = 'P1V3' // The SKU of App Service Plan
129+
param dockerContainerImage string = 'mcr.microsoft.com/dotnet/framework/samples:aspnetapp' // sample .NET app
130+
var appServicePlanName = toLower('ASP-${webAppName}') // generate unique name for App Service Plan
131+
132+
resource appServicePlan 'Microsoft.Web/serverfarms@2021-02-01' = {
133+
name: appServicePlanName
134+
location: location
135+
sku: {
136+
name: sku
137+
}
138+
properties: {
139+
hyperV: true
140+
}
141+
}
142+
143+
resource webApp 'Microsoft.Web/sites@2024-04-01' = {
144+
name: webAppName
145+
location: location
146+
kind:'app,container,windows'
147+
properties: {
148+
serverFarmId: appServicePlan.id
149+
siteConfig: {
150+
windowsFxVersion: 'DOCKER|${dockerContainerImage}'
151+
appCommandLine: ''
152+
alwaysOn: true
153+
minTlsVersion: '1.3'
154+
}
155+
httpsOnly: true
156+
}
157+
}
158+
159+
```
160+
161+
Two Azure resources are defined in the template:
162+
163+
* [**Microsoft.Web/serverfarms**](/azure/templates/microsoft.web/serverfarms): create an App Service plan.
164+
* [**Microsoft.Web/sites**](/azure/templates/microsoft.web/sites): create an App Service app.
165+
166+
This template contains several parameters that are predefined for your convenience. See the table below for parameter defaults and their descriptions:
167+
168+
| Parameters | Type | Default value | Description |
169+
|------------|---------|------------------------------|-------------|
170+
| webAppName | string | "webApp-**[`<uniqueString>`](../azure-resource-manager/templates/template-functions-string.md#uniquestring)**" | App name |
171+
| location | string | "[[resourceGroup().location](../azure-resource-manager/templates/template-functions-resource.md#resourcegroup)]" | App region |
172+
| sku | string | "P1V3" | Instance size |
173+
| appServicePlanName | string | "toLower('ASP-${webAppName}')" | App Service Plan name |
174+
| dockerContainerImage | string | "mcr.microsoft.com/dotnet/framework/samples:aspnetapp" | container image sample |
175+
176+
---
177+
178+
## Deploy the template
179+
180+
Copy and paste the template to your preferred editor/IDE and save the file to your local working directory.
181+
182+
Azure CLI is used here to deploy the template. You can also use the Azure portal, Azure PowerShell, and REST API. To learn other deployment methods, see [Bicep Deployment Commands](../azure-resource-manager/bicep/deploy-cli.md).
183+
184+
The following code creates a resource group, an App Service plan, and a web app. A default resource group, App Service plan, and location have been set for you. Replace `<app-name>` with a globally unique app name (valid characters are `a-z`, `0-9`, and `-`).
185+
186+
Open up a terminal where the Azure CLI is installed and run the code below to create a .NET app.
187+
188+
```azurecli-interactive
189+
az group create --name myResourceGroup --location "southcentralus" &&
190+
az deployment group create --resource-group myResourceGroup --template-file <path-to-template>
191+
```
192+
193+
::: zone-end
194+
116195
## Validate the deployment
117196

118197
Browse to `http://<app_name>.azurewebsites.net/` and verify it's been created.

0 commit comments

Comments
 (0)