You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/app-service-web-get-started-windows-container.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -159,15 +159,15 @@ The streamed logs looks like this:
159
159
160
160
## Use a different parent image
161
161
162
-
You're free to use a different custom Docker image to run your app. However, you must choose the right [parent image](https://docs.docker.com/develop/develop-images/baseimages/) for the framework you want:
162
+
You're free to use a different custom Docker image to run your app. However, you must choose the right [parent image (base image)](https://docs.docker.com/develop/develop-images/baseimages/) for the framework you want:
163
163
164
164
- To deploy .NET Framework apps, use a parent image based on the Windows Server Core 2019 [Long-Term Servicing Channel (LTSC)](https://docs.microsoft.com/windows-server/get-started-19/servicing-channels-19#long-term-servicing-channel-ltsc) release.
165
165
- To deploy .NET Core apps, use a parent image based on the Windows Server Nano 1809 [Semi-Annual Servicing Channel (SAC)](https://docs.microsoft.com/windows-server/get-started-19/servicing-channels-19#semi-annual-channel) release.
166
166
167
167
It takes some time to download a parent image during app start-up. However, you can reduce start-up time by using one of the following parent images that are already cached in Azure App Service:
-[mcr.microsoft.com/windows/nanoserver](https://hub.docker.com/_/microsoft-windows-nanoserver/):1809 - this image is the base container used across Microsoft [ASP.NET Core](https://hub.docker.com/_microsoft-dotnet-cores-aspnet) Microsoft Windows Nano Server images.
170
+
-[mcr.microsoft.com/windows/nanoserver](https://hub.docker.com/_/microsoft-windows-nanoserver/):1809 - this image is the base container used across Microsoft [ASP.NET Core](https://hub.docker.com/_/microsoft-dotnet-core-aspnet/) Microsoft Windows Nano Server images.
Copy file name to clipboardExpand all lines: articles/app-service/containers/how-to-configure-python.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ az webapp config set --resource-group <resource-group-name> --name <app-name> --
46
46
47
47
## Container characteristics
48
48
49
-
Python apps deployed to App Service on Linux run within a Docker container that's defined in the GitHub repository, [Python 3.6](https://github.com/Azure-App-Service/python/tree/master/3.6.6) or [Python 3.7](https://github.com/Azure-App-Service/python/tree/master/3.7.0).
49
+
Python apps deployed to App Service on Linux run within a Docker container that's defined in the [App Service Python GitHub repository](https://github.com/Azure-App-Service/python). You can find the image configurations inside the version-specific directories.
Copy file name to clipboardExpand all lines: articles/app-service/deploy-zip.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,6 +85,8 @@ For more information, see [Kudu documentation](https://github.com/projectkudu/ku
85
85
86
86
To deploy a WAR file to App Service, send a POST request to `https://<app_name>.scm.azurewebsites.net/api/wardeploy`. The POST request must contain the .war file in the message body. The deployment credentials for your app are provided in the request by using HTTP BASIC authentication.
87
87
88
+
Always use `/api/wardeploy` when deploying WAR files. This API will expand your WAR file and place it on the shared file drive. using other deployment APIs may result in inconsistent behavior.
89
+
88
90
For the HTTP BASIC authentication, you need your App Service deployment credentials. To see how to set your deployment credentials, see [Set and reset user-level credentials](deploy-configure-credentials.md#userscope).
Copy file name to clipboardExpand all lines: articles/automation/automation-secure-asset-encryption.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,13 +18,13 @@ Based on the top-level key used for the encryption, there are two models for enc
18
18
- Using Microsoft-managed keys
19
19
- Using customer-managed keys
20
20
21
-
###Microsoft-managed Keys
21
+
## Microsoft-managed Keys
22
22
23
23
By default, your Azure Automation account uses Microsoft-managed keys.
24
24
25
25
Each secure asset is encrypted and stored in Azure Automation using a unique key (Data Encryption key) that is generated for each automation account. These keys themselves are encrypted and stored in Azure Automation using yet another unique key that is generated for each account called an Account Encryption Key (AEK). These account encryption keys encrypted and stored in Azure Automation using Microsoft Managed Keys.
26
26
27
-
###Customer-managed Keys with Key Vault (preview)
27
+
## Customer-managed Keys with Key Vault (preview)
28
28
29
29
You can manage encryption of secure assets in Azure Automation at the level of an automation account with your own keys. When you specify a customer-managed key at the level of the Automation account, that key is used to protect and control access to the account encryption key for the automation account, which in turn is used to encrypt and decrypt all the secure assets. Customer-managed keys offer greater flexibility to create, rotate, disable, and revoke access controls. You can also audit the encryption keys used to protect your secure assets.
30
30
@@ -36,12 +36,12 @@ When you enable encryption with customer-managed keys for an automation account,
36
36
37
37
A new automation account is always encrypted using Microsoft-managed keys. It's not possible to enable customer-managed keys at the time that the account is created. Customer-managed keys are stored in Azure Key Vault, and the key vault must be provisioned with access policies that grant key permissions to the managed identity that is associated with the automation account. The managed identity is available only after the storage account is created.
38
38
39
-
When you modify the key being used for Azure Automation secure asset encryption by enabling or disabling customer-managed keys, updating the key version, or specifying a different key, then the encryption of the root key changes, but the secure assets in your Azure Automation account do not need to be re-encrypted.
39
+
When you modify the key being used for Azure Automation secure asset encryption by enabling or disabling customer-managed keys, updating the key version, or specifying a different key, then the encryption of the account encryption key changes, but the secure assets in your Azure Automation account do not need to be re-encrypted.
40
40
41
41
The following three sections describe the mechanics of enabling customer-managed keys for an Automation account.
42
42
43
43
> [!NOTE]
44
-
> To enable customer-managed keys, you will currently need to make Azure Automation REST APIs using api version 2020-01-13-preview
44
+
> To enable customer-managed keys, you will currently need to make Azure Automation REST API calls using api version 2020-01-13-preview
45
45
46
46
### Pre-requisites for using Customer-managed keys in Azure Automation
47
47
@@ -122,7 +122,7 @@ Request body
122
122
```
123
123
124
124
> [!NOTE]
125
-
> The tenantId and objectId fields must be provided with values of identity.tenantId and identity.principalId from the response of managed identity for the automation account.
125
+
> The **tenantId** and **objectId** fields must be provided with values of **identity.tenantId** and **identity.principalId** respectively from the response of managed identity for the automation account.
126
126
127
127
### Change the configuration of automation account to use customer managed key
128
128
@@ -175,11 +175,11 @@ Sample response
175
175
176
176
You can rotate a customer-managed key in Azure Key Vault according to your compliance policies. When the key is rotated, you must update the automation account to use the new key URI.
177
177
178
-
Rotating the key does not trigger re-encryption of data in the storage account. There is no further action required from the user.
178
+
Rotating the key does not trigger re-encryption of secure assets in the automation account. There is no further action required from the user.
179
179
180
-
## Revoke access to customer-managed keys
180
+
###Revoke access to customer-managed keys
181
181
182
-
To revoke access to customer-managed keys, use PowerShell or Azure CLI. For more information, see [Azure Key Vault PowerShell](https://docs.microsoft.com/powershell/module/az.keyvault/) or [Azure Key Vault CLI](https://docs.microsoft.com/cli/azure/keyvault). Revoking access effectively blocks access to all data in the storage account, as the encryption key is inaccessible by Azure Storage.
182
+
To revoke access to customer-managed keys, use PowerShell or Azure CLI. For more information, see [Azure Key Vault PowerShell](https://docs.microsoft.com/powershell/module/az.keyvault/) or [Azure Key Vault CLI](https://docs.microsoft.com/cli/azure/keyvault). Revoking access effectively blocks access to all secure assets in the automation account, as the encryption key is inaccessible by Azure Automation.
Copy file name to clipboardExpand all lines: articles/backup/tutorial-backup-azure-files.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,6 @@ Before you can back up an Azure file share, ensure that it's present in one of t
23
23
24
24
Backup for Azure file shares is in preview. Azure file shares in both general-purpose v1 and general-purpose v2 storage accounts are supported. The following backup scenarios aren't supported for Azure file shares:
25
25
26
-
* You can't protect Azure file shares in storage accounts that have Virtual Networks or Firewall enabled.
27
26
* There is no CLI available for protecting Azure Files using Azure Backup.
28
27
* The maximum number of scheduled backups per day is one.
29
28
* The maximum number of on-demand backups per day is four.
Copy file name to clipboardExpand all lines: articles/data-factory/solution-template-bulk-copy-from-files-to-database.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Bulk Copy from Files to Database
2
+
title: Bulk copy from files to database
3
3
description: Learn how to use a solution template to copy data in bulk from Azure Data Lake Storage Gen2 to Azure Synapse Analytics / Azure SQL Database.
4
4
services: data-factory
5
5
author: linda33wj
@@ -10,7 +10,7 @@ ms.topic: conceptual
10
10
ms.date: 01/08/2020
11
11
---
12
12
13
-
# Bulk Copy from Files to Database
13
+
# Bulk copy from files to database
14
14
15
15
This article describes a solution template that you can use to copy data in bulk from Azure Data Lake Storage Gen2 to Azure Synapse Analytics / Azure SQL Database.
Copy file name to clipboardExpand all lines: articles/event-grid/cloudevents-schema.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ Here is an example of an Azure Blob Storage event in CloudEvents format:
56
56
}
57
57
```
58
58
59
-
A detailed description of the available fields, their types, and definitions in CloudEvents v0.1 is [available here](https://github.com/cloudevents/spec/blob/v1.0/spec.md#required-attributes).
59
+
A detailed description of the available fields, their types, and definitions in CloudEvents v1.0 is [available here](https://github.com/cloudevents/spec/blob/v1.0/spec.md#required-attributes).
60
60
61
61
The headers values for events delivered in the CloudEvents schema and the Event Grid schema are the same except for `content-type`. For CloudEvents schema, that header value is `"content-type":"application/cloudevents+json; charset=utf-8"`. For Event Grid schema, that header value is `"content-type":"application/json; charset=utf-8"`.
0 commit comments