Skip to content

Commit 6a9acd9

Browse files
authored
Merge pull request #293055 from MicrosoftDocs/main
1/15/2025 11:00 AM IST Publish
2 parents d810107 + fda9392 commit 6a9acd9

27 files changed

+275
-27
lines changed

articles/active-directory-b2c/tenant-management-emergency-access-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Use the following steps to create an emergency access account:
8585

8686
Once you create your emergency accounts, you need to do the following:
8787

88-
- Make sure you [exclude at least one account from phone-based multifactor authentication](../active-directory/roles/security-emergency-access.md#exclude-at-least-one-account-from-phone-based-multi-factor-authentication)
88+
- Make sure at least one of your emergency access accounts shouldn't have the same multifactor authentication mechanism as your other non-emergency accounts.
8989

9090
- If you use [Conditional Access](conditional-access-user-flow.md), at least one emergency access account needs to be excluded from all conditional access policies.
9191

articles/application-gateway/application-gateway-autoscaling-zone-redundant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Azure Application Gateways are always deployed in a highly available fashion. Th
3030

3131
Even if you configure autoscaling with zero minimum instances the service is still highly available, which is always included with the fixed price.
3232

33-
However, it’s important to note that provisioning a new instance may take approximately six to seven minutes. Understanding the scaling behavior of Application Gateway instances is key to maintaining performance under varying loads. These instances scale out in groups, and the group size is increased proactively when the current instance count is higher. This strategy allows the system to manage workload surges efficiently, preventing potential service disruptions or slowdowns. Each Azure Application Gateway instance can handle up to 10 Capacity Units. To optimize your autoscaling settings, consider your typical traffic patterns and set the minimum instances accordingly to ensure smooth operation.
33+
However, it’s important to note that provisioning a new instance may take approximately three to five minutes. Understanding the scaling behavior of Application Gateway instances is key to maintaining performance under varying loads. These instances scale out in groups, and the group size is increased proactively when the current instance count is higher. This strategy allows the system to manage workload surges efficiently, preventing potential service disruptions or slowdowns. Each Azure Application Gateway instance can handle up to 10 Capacity Units. To optimize your autoscaling settings, consider your typical traffic patterns and set the minimum instances accordingly to ensure smooth operation.
3434

3535
For scale-in events, Application Gateway drains existing connections for 5 minutes on the instance that is subject for removal. After 5 minutes, existing connections are closed and the instance removed. Any new connections during or after the 5 minute scale-in time is established to other existing instances on the same gateway.
3636

articles/application-gateway/high-traffic-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Make sure to check your subnet size and available IP address count in your subne
4444

4545
### Set your minimum instance count based on your average Compute Unit usage
4646

47-
For Application Gateway v2 SKU, autoscaling takes six to seven minutes to scale out and provision additional set of instances ready to take traffic. Until then, if there are short spikes in traffic, your existing gateway instances might get under stress and this may cause unexpected latency or loss of traffic.
47+
For Application Gateway v2 SKU, autoscaling takes three to five minutes to scale out and provision additional set of instances ready to take traffic. Until then, if there are short spikes in traffic, your existing gateway instances might get under stress and this may cause unexpected latency or loss of traffic.
4848

4949
It's recommended that you set your minimum instance count to an optimal level. For example, if you require 50 instances to handle the traffic at peak load, then setting the minimum 25 to 30 is a good idea rather than at <10 so that even when there are short bursts of traffic, Application Gateway would be able to handle it and give enough time for autoscaling to respond and take effect.
5050

articles/azure-app-configuration/concept-customer-managed-keys.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,9 @@ After these resources are configured, use the following steps so that the Azure
7878
}
7979
```
8080
81+
> [!NOTE]
82+
> To create a user-assigned managed identity, follow this [tutorial](./overview-managed-identity.md#adding-a-user-assigned-identity).
83+
8184
1. The managed identity of the Azure App Configuration instance needs access to the key to perform key validation, encryption, and decryption. The specific set of actions to which it needs access includes: `GET`, `WRAP`, and `UNWRAP` for keys. These permissions can be granted by assigning the `Key Vault Crypto Service Encryption User` role for Azure RBAC enabled Key Vaults. For Key Vaults using access policy authorization, set the policy for the aforementioned key permissions. Granting access requires the principal ID of the App Configuration instance's managed identity. Replace the value shown below as `contoso-principalId` with the principal ID obtained in the previous step. Grant permission to the managed key by using the command line:
8285
8386
### [Azure RBAC](#tab/azurerbac)
@@ -102,6 +105,11 @@ After these resources are configured, use the following steps so that the Azure
102105
az appconfig update -g contoso-resource-group -n contoso-app-config --encryption-key-name key-name --encryption-key-version key-version --encryption-key-vault key-vault-Uri
103106
```
104107
108+
The command uses system-assigned managed identity to authenticate with the key vault by default.
109+
110+
> [!NOTE]
111+
> When using a user-assigned managed identity to access the customer managed key, you can specify its client ID explicitly by adding `--identity-client-id <client ID of your user assigned identity>` to the command.
112+
105113
Your Azure App Configuration instance is now configured to use a customer-managed key stored in Azure Key Vault.
106114
107115
## Next Steps

articles/azure-cache-for-redis/cache-how-to-active-geo-replication.md

Lines changed: 38 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure active geo-replication for Enterprise Azure Cache for Redis ins
33
description: Learn how to replicate your Azure Cache for Redis Enterprise instances across Azure regions.
44
ms.custom: devx-track-azurecli, ignite-2024
55
ms.topic: conceptual
6-
ms.date: 11/11/2024
6+
ms.date: 01/10/2025
77
---
88

99
# Configure active geo-replication for Enterprise Azure Cache for Redis instances
@@ -62,7 +62,7 @@ To remove a cache instance from an active geo-replication group, you just delete
6262

6363
In case one of the caches in your replication group is unavailable due to region outage, you can forcefully remove the unavailable cache from the replication group. After you apply **Force-unlink** to a cache, you can't sync any data that is written to that cache back to the replication group after force-unlinking.
6464

65-
You should remove the unavailable cache because the remaining caches in the replication group start storing the metadata that hasn’t been shared to the unavailable cache. When this happens, the available caches in your replication group might run out of memory.
65+
You should remove the unavailable cache because the remaining caches in the replication group start storing the metadata that wasn't shared to the unavailable cache. When this happens, the available caches in your replication group might run out of memory.
6666

6767
1. Go to Azure portal and select one of the caches in the replication group that is still available.
6868

@@ -154,7 +154,7 @@ Let's say you want to scale up each instance in this geo-replication group to an
154154

155155
At this point, the `Redis01` and `Redis02` instances can only scale up to an Enterprise E20 instance. All other scaling operations are blocked.
156156
>[!NOTE]
157-
> The `Redis00` instance is not blocked from scaling further at this point. But it will be blocked once either `Redis01` or `Redis02` is scaled to be an Enterprise E20.
157+
> The `Redis00` instance isn't blocked from scaling further at this point. But it's blocked once either `Redis01` or `Redis02` is scaled to be an Enterprise E20.
158158
>
159159
160160
Once each instance is scaled to the same tier and size, all scaling locks are removed:
@@ -169,6 +169,41 @@ Due to the potential for inadvertent data loss, you can't use the `FLUSHALL` and
169169

170170
:::image type="content" source="media/cache-how-to-active-geo-replication/cache-active-flush.png" alt-text="Screenshot showing Active geo-replication selected in the Resource menu and the Flush cache feature has a red box around it.":::
171171

172+
## Geo-replication Metric
173+
174+
The _Geo Replication Healthy_ metric in the Enterprise tier of Azure Cache for Redis helps monitor the health of geo-replicated clusters. You use this metric to monitor the sync status among geo-replicas.
175+
176+
To monitor the _Geo Replication Healthy_ metric in the Azure portal:
177+
178+
1. Open the Azure portal and select your Azure Cache for Redis instance.
179+
180+
1. On the Resource menu, select **Metrics** under the **Monitoring** section.
181+
182+
1. Select **Add Metric** and select the **Geo Replication Healthy** metric.
183+
184+
1. If needed, apply filters for specific geo-replicas.
185+
186+
1. You can configure an alert to notify you if the **Geo replication Healthy** metric emits an unhealthy value (0) continuously for over 60 minutes.
187+
188+
1. Select **New Alert Rule**.
189+
190+
1. Define the condition to trigger if the metric value is 0 for at least 60 minutes, the recommended time.
191+
192+
1. Add action groups for notifications, for example: email, SMS, and others.
193+
194+
1. Save the alert.
195+
196+
1. For more information on how to setup alerts for you Redis Enterprise cache, see the alert section in [Monitor Redis Caches](/azure/azure-cache-for-redis/monitor-cache?tabs=enterprise-enterprise-flash).
197+
198+
> [!IMPORTANT]
199+
> This metric might temporarily show as unhealthy due to routine operations like maintenance events or scaling, initiated either by Azure or the customer. To avoid false alarms, we recommend setting up an observation window of 60 minutes, where the metric continues to stay unhealthy as the appropriate time for generating an alert as it might indicate a problem that requires intervention.
200+
201+
## Common Client-side issues that can cause sync issues among geo-replicas
202+
203+
- Use of custom Hash tags – Using custom hashtags in Redis can lead to uneven distribution of data across shards, which might cause performance issues and synchronization problems in geo-replicas therefore avoid using custom hashtags unless the database needs to perform multiple key operations.
204+
205+
- Large Key Size - Large keys can create synchronization issues among geo-replicas. To maintain smooth performance and reliable replication, we recommend keeping key sizes under 500MB when using geo-replication. If individual key size gets close to 2GB the cache faces geo-replication health issues.
206+
172207
### Flush caches using Azure CLI or PowerShell
173208

174209
The Azure CLI and PowerShell can also be used to trigger a flush operation. For more information on using Azure CLI, see [az redisenterprise database flush](/cli/azure/redisenterprise#az-redisenterprise-database-flush). For more information on using PowerShell, see [Invoke-AzRedisEnterpriseCacheDatabaseFlush](/powershell/module/az.redisenterprisecache/invoke-azredisenterprisecachedatabaseflush).

0 commit comments

Comments
 (0)