You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/app-service-key-vault-references.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ If your vault is configured with [network restrictions](/azure/key-vault/general
58
58
59
59
### Access vaults with a user-assigned identity
60
60
61
-
Some apps need to reference secrets at creation time, when a system-assigned identity isn't available yet. In these cases, a you can create a user-assigned identity and give it access to the vault in advance.
61
+
Some apps need to reference secrets at creation time, when a system-assigned identity isn't available yet. In these cases, you can create a user-assigned identity and give it access to the vault in advance.
62
62
63
63
After you grant permissions to the user-assigned identity, follow these steps:
64
64
@@ -124,7 +124,7 @@ Alternatively:
124
124
125
125
Apps can use the `WEBSITE_CONTENTAZUREFILECONNECTIONSTRING` application setting to mount [Azure Files](../storage/files/storage-files-introduction.md) as the file system. This setting has validation checks to ensure that the app can be properly started.
126
126
127
-
The platform relies on having a content share within Azure Files, and it assumes a default name unless one is specified via the `WEBSITE_CONTENTSHARE` setting. For any requests that modify these settings, the platform validates if this content share exists. If the content share doesn't exist, the plaform tries to create it. If the platform can't locate or create the content share, it blocks the request.
127
+
The platform relies on having a content share within Azure Files, and it assumes a default name unless one is specified via the `WEBSITE_CONTENTSHARE` setting. For any requests that modify these settings, the platform validates if this content share exists. If the content share doesn't exist, the platform tries to create it. If the platform can't locate or create the content share, it blocks the request.
128
128
129
129
When you use Key Vault references in this setting, the validation check fails by default, because the secret itself can't be resolved while during processing of the incoming request. To avoid this problem, you can skip the validation by setting `WEBSITE_SKIP_CONTENTSHARE_VALIDATION` to `1`. This setting tells App Service to bypass all checks, and it doesn't create the content share for you. You should ensure that it's created in advance.
Copy file name to clipboardExpand all lines: articles/app-service/configure-common.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,7 +60,7 @@ App settings are always encrypted when they're stored (encrypted at rest).
60
60
1. In the dialog, you can [stick the setting to the current slot](deploy-staging-slots.md#which-settings-are-swapped).
61
61
62
62
> [!NOTE]
63
-
> In a default Linux app service or a custom Linux container, any nested JSON key structure in the app setting name needs to be configured differently for the key name. Replace any colon (`:`) with a double underscore (`__`), and replace any period (`.`) with with a single underscore (`_`). For example, `ApplicationInsights:InstrumentationKey` needs to be configured in App Service as `ApplicationInsights__InstrumentationKey` for the key name.
63
+
> In a default Linux app service or a custom Linux container, any nested JSON key structure in the app setting name needs to be configured differently for the key name. Replace any colon (`:`) with a double underscore (`__`), and replace any period (`.`) with a single underscore (`_`). For example, `ApplicationInsights:InstrumentationKey` needs to be configured in App Service as `ApplicationInsights__InstrumentationKey` for the key name.
64
64
65
65
1. When you finish, select **Apply**. Don't forget to also select **Apply** on the **Environment variables** page.
66
66
@@ -227,7 +227,7 @@ At runtime, connection strings are available as environment variables, prefixed
227
227
- Redis cache: `REDISCACHECONNSTR_`
228
228
229
229
> [!NOTE]
230
-
> .NET apps that target PostgreSQL, Notification Hubs, Service Bus, Event Hubs, Azure Cosmos DB, and Redis cache should set the connection string to **Custom** as workaround for a [known issue in .NET EnvironmentVariablesConfigurationProvider](https://github.com/dotnet/runtime/issues/36123).
230
+
> .NET apps that target PostgreSQL, Notification Hubs, Service Bus, Event Hubs, Azure Cosmos DB, and Redis cache should set the connection string to **Custom** as a workaround for a [known issue in .NET EnvironmentVariablesConfigurationProvider](https://github.com/dotnet/runtime/issues/36123).
231
231
232
232
For example, a MySQL connection string named *connectionstring1* can be accessed as the environment variable `MYSQLCONNSTR_connectionString1`. For steps that are specific to each language stack, see:
233
233
@@ -450,7 +450,7 @@ Here, you can configure some common settings for the app. Some settings require
450
450
-**FTP state**: Allow only FTPS, or disable FTP altogether.
451
451
-**HTTP version**: Set to **2.0** to enable support for the [HTTPS/2](https://wikipedia.org/wiki/HTTP/2) protocol.
452
452
> [!NOTE]
453
-
> Most modern browsers support the HTTP/2 protocol over TLS only, while non-encrypted traffic continues to use HTTP/1.1. To ensure that client browsers connect to your app with HTTP/2, secure your custom DNS name. For more information, see [Provide security for a custom DNS name with a TLS/SSL binding in App Service](configure-ssl-bindings.md).
453
+
> Most modern browsers support the HTTP/2 protocol over TLS only, while unencrypted traffic continues to use HTTP/1.1. To ensure that client browsers connect to your app with HTTP/2, secure your custom DNS name. For more information, see [Provide security for a custom DNS name with a TLS/SSL binding in App Service](configure-ssl-bindings.md).
454
454
-**Web sockets**: Configure for [ASP.NET SignalR] or [socket.io](https://socket.io/), for example.
455
455
-**Always On**: Turn on if you want to keep the app loaded even when there's no traffic.
456
456
@@ -489,7 +489,7 @@ To show the existing settings, use the [Get-AzWebApp](/powershell/module/az.webs
489
489
-----
490
490
## Configure default documents
491
491
492
-
The default document is the webpage that's displayed at the root URL of an App Service app. The first matching file in the list is used. If the app uses modules that route based on URL instead of serving static content, there's no need for default documents.
492
+
The default document is the webpage that appears at the root URL of an App Service app. The first matching file in the list is used. If the app uses modules that route based on URL instead of serving static content, there's no need for default documents.
493
493
494
494
The setting to configure default documents is only for Windows apps.
Copy file name to clipboardExpand all lines: articles/app-service/overview-hosting-plans.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -106,7 +106,7 @@ If you integrate App Service with another Azure service, you might need to consi
106
106
107
107
## Scaling for capabilities or features
108
108
109
-
You can sale your App Service plan up or down at any time. It's as simple as changing the pricing tier of the plan. You can choose a lower pricing tier at first, and then scale up later when you need more App Service features.
109
+
You can scale your App Service plan up or down at any time. It's as simple as changing the pricing tier of the plan. You can choose a lower pricing tier at first, and then scale up later when you need more App Service features.
110
110
111
111
For example, you can start testing your web app in a Free-tier App Service plan and pay nothing. When you add your [custom DNS name](app-service-web-tutorial-custom-domain.md) to the web app, just scale your plan up to the Shared tier. Later, when you want to [create a TLS binding](configure-ssl-bindings.md), scale your plan up to the Basic tier. When you want to have [staging environments](deploy-staging-slots.md), scale up to the Standard tier. When you need more cores, memory, or storage, scale up to a bigger VM size in the same tier.
0 commit comments