Skip to content

Commit 78a8a57

Browse files
committed
2 parents 370a15d + ef1cccb commit 78a8a57

11 files changed

+457
-288
lines changed

articles/app-service/configure-common.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -443,7 +443,7 @@ Here, you can configure some common settings for the app. Some settings require
443443
> [!NOTE]
444444
> Most modern browsers support HTTP/2 protocol over TLS only, while non-encrypted traffic continues to use HTTP/1.1. To ensure that client browsers connect to your app with HTTP/2, secure your custom DNS name. For more information, see [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](configure-ssl-bindings.md).
445445
- **Web sockets**: For [ASP.NET SignalR] or [socket.io](https://socket.io/), for example.
446-
- **Always On**: Keeps the app loaded even when there's no traffic. When **Always On** isn't turned on (default), the app is unloaded after 20 minutes without any incoming requests. The unloaded app can cause high latency for new requests because of its warm-up time. When **Always On** is turned on, the front-end load balancer sends a GET request to the application root every five minutes. It's important to ensure this request receives a 200 OK response to ensure any re-imaging operations are performed correctly. The continuous ping prevents the app from being unloaded.
446+
- **Always On**: Keeps the app loaded even when there's no traffic. When **Always On** isn't turned on (default), the app is unloaded after 20 minutes without any incoming requests. The unloaded app can cause high latency for new requests because of its warm-up time. When **Always On** is turned on, the front-end load balancer sends a GET request to the application root every five minutes. The continuous ping prevents the app from being unloaded.
447447

448448
Always On is required for continuous WebJobs or for WebJobs that are triggered using a CRON expression.
449449
- **Session affinity**: In a multi-instance deployment, ensure that the client is routed to the same instance for the life of the session. You can set this option to **Off** for stateless applications.

articles/azure-functions/functions-create-maven-eclipse.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ This article shows you how to create a [serverless](https://azure.microsoft.com/
1919

2020
To develop a functions app with Java and Eclipse, you must have the following installed:
2121

22-
- [Java Developer Kit](/java/openjdk/download#openjdk-17), version 8, 11, 17 or 21. (Java 21 is currently supported in preview only on Linux)
22+
- [Java Developer Kit](/java/openjdk/download#openjdk-17), version 8, 11, 17 or 21. (Java 21 is currently supported only on Linux)
2323
- [Apache Maven](https://maven.apache.org), version 3.0 or above.
2424
- [Eclipse](https://www.eclipse.org/downloads/packages/), with Java and Maven support.
2525
- [Azure CLI](/cli/azure)

articles/cloud-shell/get-started/classic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ To see all resource providers, and the registration status for your subscription
2020

2121
1. Sign in to the [Azure portal][04].
2222
1. On the Azure portal menu, search for **Subscriptions**. Select it from the available options.
23-
1. On the **Subscriptions** page, select the subscription your subscription.
23+
1. On the **Subscriptions** page, select your subscription.
2424
1. On your subscription page, expand **Settings** in left menu and select **Resource providers**.
2525
1. In the **Filter by name...** box, enter `cloudshell` to search for the resource provider.
2626
1. Select the **Microsoft.CloudShell** resource provider from the provider list.

articles/frontdoor/health-probes.md

Lines changed: 0 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -65,29 +65,6 @@ Azure Front Door uses a three-step process across all algorithms to determine he
6565
> [!NOTE]
6666
> If a single endpoint is a member of multiple origin groups, Front Door optimizes the number of health probes sent to the origin to reduce the load on the origin. Health probe requests are sent based on the lowest configured sample interval. The responses from same health probes determine the health of the endpoint in all origin groups.
6767
68-
## Adjusting probe settings for long-starting containers
69-
70-
When you deal with long-starting containers, adjusting the probe settings can prevent premature failure. Increasing the `ProbeTimeout` and `Interval` values gives your containers more time to start before Front Door marks them as unhealthy.
71-
72-
### Values for long-starting containers
73-
- **ProbeTimeout**: Increase the timeout period to 10–30 seconds.
74-
- **Interval**: Set a longer interval (for example, 30–60 seconds) between probes.
75-
- **UnhealthyThreshold**: Increase the number of consecutive failed probes before the container is considered unhealthy (for example, 3-5 retries).
76-
77-
> [!NOTE]
78-
> The values provided for `ProbeTimeout`, `Interval`, and `UnhealthyThreshold` are sample ranges for example purposes. You can adjust these values based on your specific container's startup behavior and requirements.
79-
80-
> [!NOTE]
81-
> These changes might cause a delay in detecting real failures, so balance these values carefully according to your container's startup behavior.
82-
83-
## Probe interaction during container lifecycle phases
84-
85-
1. **Container Start Phase**: During this phase, the container might not be fully ready to serve traffic. Health probes help detect when a container isn't responding by checking for specific HTTP status codes (for example, `200 OK`). If the probe frequency is too high or the timeout is too short, the container is marked as unhealthy before initialization. Increase probe timeouts or intervals during this phase.
86-
87-
1. **Running Phase**: Once the container is running, probes continue checking for health responses. If health checks consistently return `200 OK`, Front Door keeps the origin in rotation for traffic. If probes consistently fail (for example, due to a container crashing), Front Door marks the origin as unhealthy.
88-
89-
1. **Failure Phase**: If health probes fail for the configured threshold (for example, `UnhealthyThreshold`), the origin is considered unhealthy, and traffic is routed to other healthy origins.
90-
9168
## Complete health probe failure
9269

9370
If health probes fail for every origin in an origin group, then Front Door considers all origins unhealthy and routes traffic in a round robin distribution across all of them.
271 Bytes
Loading

0 commit comments

Comments
 (0)