Skip to content

Commit 5ce95b1

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into appgw-upd
2 parents 0b6a2ff + 704c322 commit 5ce95b1

File tree

24 files changed

+16
-8
lines changed

24 files changed

+16
-8
lines changed

articles/app-service/deploy-staging-slots.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -547,6 +547,13 @@ Here are some common swap errors:
547547

548548
- Local cache initialization might fail when the app content exceeds the local disk quota specified for the local cache. For more information, see [Local cache overview](overview-local-cache.md).
549549

550+
- During a site update operation, the following error may occur "_The slot cannot be changed because its configuration settings have been prepared for swap_". This can occur if either [swap with preview (multi-phase swap)](#swap-with-preview-multi-phase-swap) phase 1 has been completed but phase 2 has not yet been performed, or a swap has failed. There are two ways resolve the issue:
551+
552+
1. Cancel the swap operation which will reset the site back to the old state
553+
1. Complete the swap operation which will update site to the desired new state
554+
555+
Refer to [swap with preview (multi-phase swap)](#swap-with-preview-multi-phase-swap) to learn how to cancel or complete the swap operation.
556+
550557
- During [custom warm-up](#Warm-up), the HTTP requests are made internally (without going through the external URL). They can fail with certain URL rewrite rules in *Web.config*. For example, rules for redirecting domain names or enforcing HTTPS can prevent warm-up requests from reaching the app code. To work around this issue, modify your rewrite rules by adding the following two conditions:
551558

552559
```xml

articles/azure-cache-for-redis/cache-azure-active-directory-for-authentication.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,9 +63,12 @@ Using Microsoft Entra is the secure way to connect your cache. We recommend that
6363

6464
When you disable access key authentication for a cache, all existing client connections are terminated, whether they use access keys or Microsoft Entra authentication. Follow the recommended Redis client best practices to implement proper retry mechanisms for reconnecting Microsoft Entra-based connections, if any.
6565

66-
Before you disable access keys:
66+
### Before you disable access keys:
6767

68-
- Microsoft Entra authorization must be enabled.
68+
- Ensure that Microsoft Entra authentication is enabled and you have at least one Redis User configured.
69+
- Ensure all applications connecting to your cache instance switch to using Microsoft Entra Authentication.
70+
- Ensure that the metrics _Connected Clients_ and _Connected Clients Using Microsoft Entra Token_ have the same values. If the values for these two metrics are not the same, that means there are still some connections that were created using access keys and not Entra Token.
71+
- Consider disabling access during the scheduled maintenance window for your cache instance.
6972
- Disabling access keys is only available for Basic, Standard, and Premium tier caches.
7073
- For geo-replicated caches, you must:
7174

9.6 KB
Loading
1.48 KB
Loading
-34.1 KB
Loading
5.73 KB
Loading
7.11 KB
Loading
-66.6 KB
Loading
-15.7 KB
Loading

0 commit comments

Comments
 (0)