You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/double-encryption-at-rest.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,21 +5,21 @@ services: azure-netapp-files
5
5
author: b-hchen
6
6
ms.service: azure-netapp-files
7
7
ms.topic: concept-article
8
-
ms.date: 09/05/2024
8
+
ms.date: 05/05/2025
9
9
ms.author: anfdocs
10
10
ms.custom: references_regions
11
11
---
12
12
# Azure NetApp Files double encryption at rest
13
13
14
-
By default, Azure NetApp Files capacity pools use single encryption at rest. When you [create a capacity pool](azure-netapp-files-set-up-capacity-pool.md#encryption_type), you have the option to use double encryption at rest for the volumes in the capacity pool. You can do so by selecting `double` as the **encryption type** for the capacity pool that you are creating.
14
+
By default, Azure NetApp Files capacity pools use single encryption at rest. When you [create a capacity pool](azure-netapp-files-set-up-capacity-pool.md#encryption_type), you have the option to use double encryption at rest for the volumes in the capacity pool. You can do so by selecting `double` as the **encryption type** for the capacity pool that you're creating.
15
15
16
16
Critical data is often found in places such as financial institutions, military users, business customer data, government records, health care medical records, and so on. While single encryption at rest may be considered sufficient for some data, you should use double encryption at rest for data where a breach of confidentiality would be catastrophic. Leaks of information such as customer sensitive data, names, addresses, and government identification can result in extremely high liability, and it can be mitigated by having data confidentiality protected by double encryption at rest.
17
17
18
18
When data is transported over networks, additional encryption such as Transport Layer Security (TLS) can help to protect the transit of data. But once the data has arrived, protection of that data at rest helps to address the vulnerability. Using Azure NetApp Files double encryption at rest complements the security that’s inherent with the physically secure cloud storage in Azure data centers.
19
19
20
20
Azure NetApp Files double encryption at rest provides two levels of encryption protection: both a hardware-based encryption layer (encrypted SSD drives) and a software-encryption layer. The hardware-based encryption layer resides at the physical storage level, using FIPS 140-2 certified drives. The software-based encryption layer is at the volume level completing the second level of encryption protection.
21
21
22
-
If you are using this feature for the first time, you need to create a double-encryption capacity pool. For details, see [Create a capacity pool for Azure NetApp Files](azure-netapp-files-set-up-capacity-pool.md).
22
+
If you're using this feature for the first time, you need to create a double-encryption capacity pool. For details, see [Create a capacity pool for Azure NetApp Files](azure-netapp-files-set-up-capacity-pool.md).
23
23
24
24
When you create a volume in a double-encryption capacity pool, the default key management (the **Encryption key source** field) is `Microsoft Managed Key`, and the other choice is `Customer Managed Key`. Using customer-managed keys requires additional preparation of an Azure Key Vault and other details. For more information about using volume encryption with customer managed keys, see [Configure customer-managed keys for Azure NetApp Files volume encryption](configure-customer-managed-keys.md).
25
25
@@ -77,6 +77,7 @@ Azure NetApp Files double encryption at rest is supported for the following regi
77
77
* You can't convert volumes in a single-encryption capacity pool to use double encryption at rest. However, you can copy data in a single-encryption volume to a volume created in a capacity pool that is configured with double encryption.
78
78
* For capacity pools created with double encryption at rest, volume names in the capacity pool are visible only to volume owners for maximum security.
79
79
* Using double encryption at rest might have performance impacts based on the workload type and frequency. The performance impact can be a minimal 1-2%, depending on the workload profile.
80
+
* When [creating](/cli/azure/netappfiles/pool#az-netappfiles-pool-create) or [updating](/cli/azure/netappfiles/pool#az-netappfiles-pool-update) a capacity pool with the CLI, set the `--encryption-type` to `double` to enable double encryption.
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/large-volumes-requirements-considerations.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ The following requirements and considerations apply to large volumes. For perfor
24
24
* Large volumes are currently not supported with Azure NetApp Files backup.
25
25
* You can't create a large volume with application volume groups.
26
26
* Currently, large volumes aren't suited for database (HANA, Oracle, SQL Server, etc.) data and log volumes. For database workloads requiring more than a single volume’s throughput limit, consider deploying multiple regular volumes. To optimize multiple volume deployments for databases, use [application volume groups](application-volume-group-concept.md).
27
-
*Throughput ceilings for all the Standard, Premium, and Ultra service levels with large volumes is 12,800 MiB/s. You're able to grow to 1 PiB with the throughput ceiling per the following table:
27
+
*The throughput ceiling for the Standard, Premium, and Ultra service levels with large volumes is 12,800 MiB/s. You're able to grow to 1 PiB with the throughput ceiling per the following table:
28
28
29
29
<table><thead>
30
30
<tr>
@@ -36,28 +36,28 @@ The following requirements and considerations apply to large volumes. For perfor
36
36
<tr>
37
37
<td>Capacity tier</td>
38
38
<td>Minimum volume size<br>(TiB)</td>
39
-
<td>Maximum volume size (TiB)</td>
39
+
<td>Maximum volume size (TiB)*</td>
40
40
<td>Minimum throughput for capacity tier (MiB/s)</td>
41
41
<td>Maximum throughput for capacity tier (MiB/s)</td>
|[VMSA-2025-0005](https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.broadcom.com%2Fweb%2Fecx%2Fsupport-content-notification%2F-%2Fexternal%2Fcontent%2FSecurityAdvisories%2F0%2F25518&data=05%7C02%7Cjacobjaygbay%40microsoft.com%7C63a10c374bad4e1e21ca08dd88002ad4%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638816256483262655%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=U4GruR4roReR8NNKCd8vT%2BqP5117ROHVHU9hikBWH8w%3D&reserved=0) VMware Tools for Windows update addresses an authentication bypass vulnerability (CVE-2025-22230). | April 2025 |To remediate CVE-2025-22230, apply version 12.5.1 of VMware Tools, use the RUN Command``Set-Tools-Repo.``| May 2025 |
18
+
|[VMSA-2025-0005](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25518) VMware Tools for Windows update addresses an authentication bypass vulnerability (CVE-2025-22230). | April 2025 |To remediate CVE-2025-22230, apply version 12.5.1 of VMware Tools, use the Azure VMware Solution Run command``Set-Tools-Repo.``| May 2025 |
19
19
| If you're a user of AV64, you may notice a “Status of other hardware objects” alarm on your hosts in vCenter Server. This alarm doesn't indicate a hardware issue. It's triggered when the System Event Log (SEL) reaches its capacity threshold according to vCenter Server. Despite the alarm, the host remains healthy with no hardware-related error signatures detected, and no high availability (HA) events are expected as a result. It's safe to continue operating your private cloud without interruption. The alarm has only two possible states—green and red—with no intermediate warning state. Once the status changes to red, it will remain red even if conditions improve to what would typically qualify as a warning. | April 2025 | This alarm should be treated as a warning and won't affect operability of your private cloud. Microsoft adjusts thresholds for the alarm, so it doesn't alert in vCenter Server. | May 2025 |
20
20
| After deploying an AV48 private cloud, you may see a High pNIC error rate detected. Check the host's vSAN performance view for details if alert is active in the vSphere Client. | April 2025 | The alert should be considered an informational message, since Microsoft manages the service. Select the **Reset to Green** link to clear it. | April 2025 |
21
21
| [VMSA-2025-0004](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390) VMCI Heap-overflow, ESXi arbitrary write, and Information disclosure vulnerabilities | March 2025 | Microsoft has verified the applicability of the vulnerabilities within the Azure VMware Solution service and have adjudicated the vulnerabilities at a combined adjusted Environmental Score of [9.4](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/MAC:L/MPR:N/MUI:N/MS:C/MC:H/MI:H/MA:H). Customers are advised to take additional precautions when granting administrative access to, and monitor any administrative activities on, guest VMs until the update is fully addressed. For additional information on the vulnerability and Microsoft’s involvement, please see [this blog post](https://techcommunity.microsoft.com/blog/azuremigrationblog/azure-vmware-solution-broadcom-vmsa-2025-0004-remediation/4388074). (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) | March 2025 - Resolved in [ESXi 8.0_U2d](https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u2d-release-notes.html) |
Copy file name to clipboardExpand all lines: articles/container-apps/functions-overview.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,22 +37,27 @@ Azure Functions on Container Apps provide a versatile combination of services to
37
37
38
38
-**Serverless workloads**: Serverless workload processing of videos, images, transcripts, or any other processing intensive tasks that required GPU compute resources.
39
39
40
+
-**Common Azure Functions scenarios**: All common Azure Functions scenarios like processing file uploads, running scheduled tasks, responding to database changes, machine learning/AI and others detailed in [Azure Functions scenarios](/azure/azure-functions/functions-scenarios?pivots=programming-language-csharp).
41
+
40
42
## Event-driven scaling
41
43
42
44
All Functions triggers are available in your containerized Functions app. However, only the following triggers can dynamically scale (from zero instances) based on received events when running in a Container Apps environment:
43
45
44
46
- Azure Event Grid
45
47
- Azure Event Hubs
46
-
- Azure Blob Storage (event-based)
48
+
- Azure Blob Storage (Event Grid based)
47
49
- Azure Queue Storage
48
50
- Azure Service Bus
49
51
- Durable Functions (MSSQL storage provider)
50
52
- HTTP
51
53
- Kafka
52
54
- Timer
55
+
- Azure Cosmos DB
53
56
54
57
Azure Functions on Container Apps are designed to configure the scale parameters and rules as per the event target. You don't need to worry about configuring the KEDA scaled objects. You can still set minimum and maximum replica count when creating or modifying your function app.
55
58
59
+
Auto scaling for Azure Cosmos DB trigger and Durable functions is currently supported using connection strings only.
60
+
56
61
You can write your function code in any [language stack supported](/azure/azure-functions/supported-languages?tabs=isolated-process%2Cv4&pivots=programming-language-csharp) by Azure Functions. You can use the same Functions triggers and bindings with event-driven scaling.
Copy file name to clipboardExpand all lines: articles/container-apps/log-monitoring.md
+14-15Lines changed: 14 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,25 +5,24 @@ services: container-apps
5
5
author: craigshoemaker
6
6
ms.service: azure-container-apps
7
7
ms.topic: how-to
8
-
ms.date: 08/30/2022
8
+
ms.date: 05/02/2025
9
9
ms.author: cshoe
10
10
---
11
11
12
12
# Monitor logs in Azure Container Apps with Log Analytics
13
13
14
-
Azure Container Apps is integrated with Azure Monitor Log Analytics to monitor and analyze your container app's logs. When selected as your log monitoring solution, your Container Apps environment includes a Log Analytics workspace that provides a common place to store the system and application log data from all container apps running in the environment.
14
+
Azure Container Apps is integrated with Azure Monitor Log Analytics to monitor and analyze your container app's logs. When selected as your log monitoring solution, your Container Apps environment includes a Log Analytics workspace that provides a common place to store the system and application log data from all container apps running in the environment.
15
15
16
16
Log entries are accessible by querying Log Analytics tables through the Azure portal or a command shell using the [Azure CLI](/cli/azure/monitor/log-analytics).
17
17
18
-
There are two types of logs for Container Apps.
19
-
20
-
- Console logs, which are emitted by your app.
21
-
- System logs, which are emitted by the Container Apps service.
18
+
Azure Container Apps provides two types of logs to help you monitor and troubleshoot:
22
19
20
+
-**Console logs**: Your application generates these logs.
21
+
-**System logs**: The Container Apps service generates these logs.
23
22
24
23
## System Logs
25
24
26
-
The Container Apps service provides system log messages at the container app level. System logs emit the following messages:
25
+
The Container Apps service provides system log messages at the container app level. System logs emit the following messages:
27
26
28
27
| Source | Type | Message |
29
28
|---------|------|---------|
@@ -52,10 +51,10 @@ The system log data is accessible by querying the `ContainerAppSystemLogs_CL` ta
52
51
53
52
## Console Logs
54
53
55
-
Console logs originate from the `stderr` and `stdout` messages from the containers in your container app and Dapr sidecars. You can view console logs by querying the `ContainerAppConsoleLogs_CL` table.
54
+
Console logs originate from the `stderr` and `stdout` messages from the containers in your container app and Dapr sidecars. You can view console logs by querying the `ContainerAppConsoleLogs_CL` table.
56
55
57
56
> [!TIP]
58
-
> Instrumenting your code with well-defined log messages can help you to understand how your code is performing and to debug issues. To learn more about best practices refer to [Design for operations](/azure/architecture/guide/design-principles/design-for-operations).
57
+
> Instrumenting your code with well-defined log messages can help you to understand how your code is performing and to debug issues. To learn more about best practices, refer to [Design for operations](/azure/architecture/guide/design-principles/design-for-operations).
59
58
60
59
The most commonly used Container Apps specific columns in ContainerAppConsoleLogs_CL include:
61
60
@@ -75,13 +74,13 @@ Log Analytics is a tool in the Azure portal that you can use to view and analyze
75
74
76
75
### Azure portal
77
76
78
-
Start Log Analytics from **Logs** in the sidebar menu on your container app page. You can also start Log Analytics from **Monitor>Logs**.
77
+
Start Log Analytics from **Logs** in the sidebar menu on your container app page. You can also start Log Analytics from **Monitor>Logs**.
79
78
80
-
You can query the logs using the tables listed in the **CustomLogs** category **Tables** tab. The tables in this category are the `ContainerAppSystemlogs_CL` and `ContainerAppConsoleLogs_CL` tables.
79
+
You can query the logs using the tables listed in the **CustomLogs** category **Tables** tab. The tables in this category are the `ContainerAppSystemlogs_CL` and `ContainerAppConsoleLogs_CL` tables.
81
80
82
81
:::image type="content" source="media/observability/log-analytics-query-page.png" alt-text="Screenshot of the Log Analytics custom log tables.":::
83
82
84
-
Below is a Kusto query that displays console log entries for the container app named *album-api*.
83
+
The following Kusto query displays console log entries for the container app named *album-api*.
85
84
86
85
```kusto
87
86
ContainerAppConsoleLogs_CL
@@ -90,7 +89,7 @@ ContainerAppConsoleLogs_CL
90
89
| take 100
91
90
```
92
91
93
-
Below is a Kusto query that displays system log entries for the container app named *album-api*.
92
+
The following Kusto query displays system log entries for the container app named *album-api*.
94
93
95
94
```kusto
96
95
ContainerAppSystemLogs_CL
@@ -103,9 +102,9 @@ For more information regarding Log Analytics and log queries, see the [Log Analy
103
102
104
103
### Azure CLI/PowerShell
105
104
106
-
Container Apps logs can be queried using the [Azure CLI](/cli/azure/monitor/log-analytics).
105
+
Container Apps logs can be queried using the [Azure CLI](/cli/azure/monitor/log-analytics).
107
106
108
-
These example Azure CLI queries output a table containing log records for the container app name **album-api**. The table columns are specified by the parameters after the `project` operator. The `$WORKSPACE_CUSTOMER_ID` variable contains the GUID of the Log Analytics workspace.
107
+
These example Azure CLI queries output a table containing log records for the container app name **album-api**. The parameters after the `project` operator specify the table columns. The `$WORKSPACE_CUSTOMER_ID` variable contains the GUID of the Log Analytics workspace.
109
108
110
109
111
110
This example queries the `ContainerAppConsoleLogs_CL` table:
@@ -18,7 +18,7 @@ The Azure Container Apps service enables you to run microservices and containeri
18
18
In this tutorial, you create a secure Container Apps environment and deploy your first container app.
19
19
20
20
> [!NOTE]
21
-
> You can also deploy this app using the [az containerapp up](/cli/azure/containerapp#az_containerapp_up) by following the instructions in the [Quickstart: Deploy your first container app with containerapp up](get-started.md) article. The `az containerapp up` command is a fast and convenient way to build and deploy your app to Azure Container Apps using a single command. However, it doesn't provide the same level of customization for your container app.
21
+
> You can also deploy this app using the [az containerapp up](/cli/azure/containerapp#az_containerapp_up) by following the instructions in the [Quickstart: Deploy your first container app with containerapp up](get-started.md) article. The `az containerapp up` command is a fast and convenient way to build and deploy your app to Azure Container Apps using a single command. However, it doesn't provide the same level of customization for your container app.
22
22
23
23
24
24
## Prerequisites
@@ -115,7 +115,7 @@ Copy this location to a web browser.
115
115
If you're not going to continue to use this application, run the following command to delete the resource group along with all the resources created in this tutorial.
116
116
117
117
>[!CAUTION]
118
-
> The following command deletes the specified resource group and all resources contained within it. If resources outside the scope of this tutorial exist in the specified resource group, they will also be deleted.
118
+
> The following command deletes the specified resource group and all resources contained within it. If resources outside the scope of this tutorial exist in the specified resource group, they're also deleted.
0 commit comments