Skip to content

Commit 9a5c692

Browse files
authored
Merge pull request #266371 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 4df9c55 + efdf214 commit 9a5c692

File tree

223 files changed

+561
-695
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

223 files changed

+561
-695
lines changed

articles/ai-services/immersive-reader/how-to-create-immersive-reader.md

Lines changed: 34 additions & 40 deletions
Large diffs are not rendered by default.

articles/api-management/quickstart-arm-template.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@ description: Use this quickstart to create an Azure API Management instance in t
44
services: azure-resource-manager
55
author: dlepow
66
ms.service: api-management
7-
tags: azure-resource-manager
87
ms.topic: quickstart-arm
98
ms.custom: subject-armqs, mode-arm, devx-track-arm-template
109
ms.author: danlep

articles/app-service/environment/networking.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: App Service Environment networking
33
description: App Service Environment networking details
44
author: madsd
55
ms.topic: overview
6-
ms.date: 10/02/2023
6+
ms.date: 01/31/2024
77
ms.author: madsd
88
---
99

@@ -26,7 +26,7 @@ If you use a smaller subnet, be aware of the following limitations:
2626
- For any App Service plan OS/SKU combination used in your App Service Environment like I1v2 Windows, one standby instance is created for every 20 active instances. The standby instances also require IP addresses.
2727
- When scaling App Service plans in the App Service Environment up/down, the amount of IP addresses used by the App Service plan is temporarily doubled while the scale operation completes. The new instances need to be fully operational before the existing instances are deprovisioned.
2828
- Platform upgrades need free IP addresses to ensure upgrades can happen without interruptions to outbound traffic.
29-
- After scale up, down, or in operations complete, there might be a short period of time before IP addresses are released. In rare cases, this can be up to 12 hours.
29+
- After scale up, down, or in operations complete, there might be a short period of time before IP addresses are released. In rare cases, this operation can be up to 12 hours.
3030
- If you run out of addresses within your subnet, you can be restricted from scaling out your App Service plans in the App Service Environment. Another possibility is that you can experience increased latency during intensive traffic load, if Microsoft isn't able to scale the supporting infrastructure.
3131

3232
>[!NOTE]
@@ -63,6 +63,13 @@ You can find details in the **IP Addresses** portion of the portal, as shown in
6363

6464
As you scale your App Service plans in your App Service Environment, you use more addresses out of your subnet. The number of addresses you use varies, based on the number of App Service plan instances you have, and how much traffic there is. Apps in the App Service Environment don't have dedicated addresses in the subnet. The specific addresses used by an app in the subnet will change over time.
6565

66+
### Bring your own inbound address
67+
68+
You can bring your own inbound address to your App Service Environment. If you create an App Service Environment with an internal VIP, you can specify a static IP address in the subnet. If you create an App Service Environment with an external VIP, you can use your own Azure Public IP address by specifying the resource ID of the Public IP address. The following are limitations for bringing your own inbound address:
69+
70+
- For App Service Environment with external VIP, the Azure Public IP address resource must be in the same subscription as the App Service Environment.
71+
- The inbound address can't be changed after the App Service Environment is created.
72+
6673
## Ports and network restrictions
6774

6875
For your app to receive traffic, ensure that inbound network security group (NSG) rules allow the App Service Environment subnet to receive traffic from the required ports. In addition to any ports, you'd like to receive traffic on, you should ensure that Azure Load Balancer is able to connect to the subnet on port 80. This port is used for health checks of the internal virtual machine. You can still control port 80 traffic from the virtual network to your subnet.
@@ -122,7 +129,7 @@ For more information about Private Endpoint and Web App, see [Azure Web App Priv
122129

123130
## DNS
124131

125-
The following sections describe the DNS considerations and configuration that apply inbound to and outbound from your App Service Environment. The examples use the domain suffix `appserviceenvironment.net` from Azure Public Cloud. If you're using other clouds like Azure Government, you need to use their respective domain suffix. Note that for App Service Environment domains, the site name will be truncated at 40 characters because of DNS limits. If you have a slot, the slot name will be truncated at 19 characters.
132+
The following sections describe the DNS considerations and configuration that apply inbound to and outbound from your App Service Environment. The examples use the domain suffix `appserviceenvironment.net` from Azure Public Cloud. If you're using other clouds like Azure Government, you need to use their respective domain suffix. For App Service Environment domains, the site name is truncated at 40 characters because of DNS limits. If you have a slot, the slot name is truncated at 19 characters.
126133

127134
### DNS configuration to your App Service Environment
128135

@@ -156,7 +163,7 @@ In addition to setting up DNS, you also need to enable it in the [App Service En
156163

157164
### DNS configuration from your App Service Environment
158165

159-
The apps in your App Service Environment uses the DNS that your virtual network is configured with. If you want some apps to use a different DNS server, you can manually set it on a per app basis, with the app settings `WEBSITE_DNS_SERVER` and `WEBSITE_DNS_ALT_SERVER`. `WEBSITE_DNS_ALT_SERVER` configures the secondary DNS server. The secondary DNS server is only used when there's no response from the primary DNS server.
166+
The apps in your App Service Environment use the DNS that your virtual network is configured with. If you want some apps to use a different DNS server, you can manually set it on a per app basis, with the app settings `WEBSITE_DNS_SERVER` and `WEBSITE_DNS_ALT_SERVER`. `WEBSITE_DNS_ALT_SERVER` configures the secondary DNS server. The secondary DNS server is only used when there's no response from the primary DNS server.
160167

161168
## More resources
162169

articles/application-gateway/scripts/create-vmss-cli.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ title: Azure CLI Script Sample - Manage web traffic | Microsoft Docs
33
description: Azure CLI Script Sample - Manage web traffic with an application gateway and a virtual machine scale set.
44
services: application-gateway
55
author: greg-lindsay
6-
tags: azure-resource-manager
76
ms.service: application-gateway
87
ms.topic: sample
98
ms.tgt_pltfrm: vm-windows

articles/application-gateway/scripts/create-vmss-powershell.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ title: Azure PowerShell Script Sample - Manage web traffic | Microsoft Docs
33
description: Azure PowerShell Script Sample - Manage web traffic with an application gateway and a virtual machine scale set.
44
services: application-gateway
55
author: greg-lindsay
6-
tags: azure-resource-manager
76
ms.service: application-gateway
87
ms.topic: sample
98
ms.tgt_pltfrm: vm-windows

articles/application-gateway/scripts/create-vmss-waf-cli.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ title: Azure CLI Script Sample - Restrict web traffic | Microsoft Docs
33
description: Azure CLI Script Sample - Create an application gateway with a web application firewall and a virtual machine scale set that uses OWASP rules to restrict traffic.
44
services: application-gateway
55
author: greg-lindsay
6-
tags: azure-resource-manager
76
ms.service: application-gateway
87
ms.topic: sample
98
ms.tgt_pltfrm: vm-windows

articles/application-gateway/scripts/create-vmss-waf-powershell.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ title: Azure PowerShell Script Sample - Restrict web traffic | Microsoft Docs
33
description: Azure PowerShell Script Sample - Create an application gateway with a web application firewall and a virtual machine scale set that uses OWASP rules to restrict traffic.
44
services: application-gateway
55
author: greg-lindsay
6-
tags: azure-resource-manager
76
ms.service: application-gateway
87
ms.topic: sample
98
ms.tgt_pltfrm: vm-windows

articles/azure-app-configuration/howto-best-practices.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,16 @@ App Configuration offers the option to bulk [import](./howto-import-export-data.
105105

106106
If your application is deployed in multiple regions, we recommend that you [enable geo-replication](./howto-geo-replication.md) of your App Configuration store. You can let your application primarily connect to the replica matching the region where instances of your application are deployed and allow them to fail over to replicas in other regions. This setup minimizes the latency between your application and App Configuration, spreads the load as each replica has separate throttling quotas, and enhances your application's resiliency against transient and regional outages. See [Resiliency and Disaster Recovery](./concept-disaster-recovery.md) for more information.
107107

108+
## Building applications with high resiliency
109+
110+
Applications often rely on configuration to start, making Azure App Configuration's high availability critical. For improved resiliency, applications should leverage App Configuration's reliability features and consider taking the following measures based on your specific requirements.
111+
112+
* **Provision in regions with Azure availability zone support.** Availability zones allow applications to be resilient to data center outages. App Configuration offers zone redundancy for all customers without any extra charges. Creating your App Configuration store in regions with support for availability zones is recommended. You can find [a list of regions](./faq.yml#how-does-app-configuration-ensure-high-data-availability) where App Configuration has enabled availability zone support.
113+
* **[Enable geo-replication](./howto-geo-replication.md) and allow your application to failover among replicas.** This setup gives you a model for scalability and enhanced resiliency against transient failures and regional outages. See [Resiliency and Disaster Recovery](./concept-disaster-recovery.md) for more information.
114+
* **Deploy configuration with [safe deployment practices](/azure/well-architected/operational-excellence/safe-deployments).** Incorrect or accidental configuration changes can frequently cause application downtime. You should avoid making configuration changes that impact the production directly from, for example, the Azure portal whenever possible. In safe deployment practices (SDP), you use a progressive exposure deployment model to minimize the potential blast radius of deployment-caused issues. If you adopt SDP, you can build and test a [configuration snapshot](./howto-create-snapshots.md) before deploying it to production. During the deployment, you can update instances of your application to progressively pick up the new snapshot. If issues are detected, you can roll back the change by redeploying the last-known-good (LKG) snapshot. The snapshot is immutable, guaranteeing consistency throughout all deployments. You can utilize snapshots along with dynamic configuration. Use a snapshot for your foundational configuration and dynamic configuration for emergency configuration overrides and feature flags.
115+
* **Include configuration with your application.** If you want to ensure that your application always has access to a copy of the configuration, or if you prefer to avoid a runtime dependency on App Configuration altogether, you can pull the configuration from App Configuration during build or release time and include it with your application. To learn more, check out examples of integrating App Configuration with your [CI/CD pipeline](./integrate-ci-cd-pipeline.md) or [Kubernetes deployment](./integrate-kubernetes-deployment-helm.md).
116+
* **Use App Configuration providers.** Applications play a critical part in achieving high resiliency because they can account for issues arising during their runtime, such as networking problems, and respond to failures more quickly. The App Configuration providers offer a range of built-in resiliency features, including automatic replica discovery, replica failover, startup retries with customizable timeouts, configuration caching, and adaptive strategies for reliable configuration refresh. It's highly recommended that you use App Configuration providers to benefit from these features. If that's not an option, you should consider implementing similar features in your custom solution to achieve the highest level of resiliency.
117+
108118
## Client applications in App Configuration
109119

110120
When you use App Configuration in client applications, ensure that you consider two major factors. First, if you're using the connection string in a client application, you risk exposing the access key of your App Configuration store to the public. Second, the typical scale of a client application might cause excessive requests to your App Configuration store, which can result in overage charges or throttling. For more information about throttling, see the [FAQ](./faq.yml#are-there-any-limits-on-the-number-of-requests-made-to-app-configuration).

articles/azure-app-configuration/use-feature-flags-dotnet-core.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ In this tutorial, you will learn how to:
3030
3131
## Set up feature management
3232

33-
To access the .NET feature manager, your app must have references to the `Microsoft.FeatureManagement.AspNetCore` NuGet package.
33+
To access the .NET feature manager, your app must have references to the `Microsoft.Azure.AppConfiguration.AspNetCore` and `Microsoft.FeatureManagement.AspNetCore` NuGet packages.
3434

3535
The .NET feature manager is configured from the framework's native configuration system. As a result, you can define your application's feature flag settings by using any configuration source that .NET supports, including the local `appsettings.json` file or environment variables.
3636

articles/azure-cache-for-redis/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,6 +127,8 @@
127127
href: cache-best-practices-scale.md
128128
- name: Server load management best practice
129129
href: cache-best-practices-server-load.md
130+
- name: Performance testing
131+
href: cache-best-practices-performance.md
130132

131133

132134
- name: Authentication and authorization
@@ -236,11 +238,11 @@
236238
href: cache-best-practices-kubernetes.md
237239
- name: Artificial Intelligence
238240
items:
239-
- name: Vector Search
241+
- name: Vector search concepts
240242
href: cache-overview-vector-similarity.md
241243
- name: Vector similarity search
242244
href: cache-tutorial-vector-similarity.md
243-
- name: Semantic caching search
245+
- name: Semantic caching
244246
href: cache-tutorial-semantic-cache.md
245247
- name: ASP.NET
246248
items:

0 commit comments

Comments
 (0)