Skip to content

Commit 9dffb2a

Browse files
authored
Merge pull request #180539 from mattchenderson/idcxnfix2
updating blob connecting configuration details
2 parents 4ace820 + ba8fbb2 commit 9dffb2a

File tree

2 files changed

+14
-7
lines changed

2 files changed

+14
-7
lines changed

includes/functions-blob-permissions.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,12 @@ You will need to create a role assignment that provides access to your blob cont
1010

1111
| Binding type | Example built-in roles |
1212
|----------------|---------------------------------------|
13-
| Trigger | [Storage Blob Data Owner]<sup>1</sup> |
13+
| Trigger | [Storage Blob Data Owner] **and** [Storage Queue Data Contributor]<sup>1</sup> |
1414
| Input binding | [Storage Blob Data Reader] |
1515
| Output binding | [Storage Blob Data Owner] |
1616

17-
<sup>1</sup> In some configurations, a blob trigger may additionally require [Storage Queue Data Contributor](../articles/role-based-access-control/built-in-roles.md#storage-queue-data-contributor).
17+
<sup>1</sup> By default, the blob trigger uses Azure Queues internally. It therefore also requires [Storage Queue Data Contributor] permissions to create and receive messages.
1818

1919
[Storage Blob Data Reader]: ../articles/role-based-access-control/built-in-roles.md#storage-blob-data-reader
2020
[Storage Blob Data Owner]: ../articles/role-based-access-control/built-in-roles.md#storage-blob-data-owner
21+
[Storage Queue Data Contributor]: ../articles/role-based-access-control/built-in-roles.md#storage-queue-data-contributor

includes/functions-storage-blob-connections.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,15 +31,21 @@ In this mode, the extension requires the following properties:
3131

3232
| Property | Environment variable template | Description | Example value |
3333
|---------------------------|-----------------------------------------------------|--------------------------------------------|---------|
34-
| Blob Service URI | `<CONNECTION_NAME_PREFIX>__blobServiceUri`<sup>1</sup> | The data plane URI of the blob service to which you are connecting, using the HTTPS scheme. | https://<storage_account_name>.blob.core.windows.net |
34+
| Blob Service URI | `<CONNECTION_NAME_PREFIX>__serviceUri`<sup>1</sup> | The data plane URI of the blob service to which you are connecting, using the HTTPS scheme. | https://<storage_account_name>.blob.core.windows.net |
3535

36-
<sup>1</sup> `<CONNECTION_NAME_PREFIX>__serviceUri` can be used as an alias. If both aliases provided, the `blobServiceUri` form will be used. The `serviceUri` form cannot be used when the overall connection configuration is to be used across blobs, queues, and/or tables.
37-
38-
> [!NOTE]
39-
> By default, the blob trigger uses Azure Queues internally. `<CONNECTION_NAME_PREFIX>__queueServiceUri` can also be specified, but the default behavior without it is to use the connection defined by "AzureWebJobsStorage". The trigger would need [Storage Queue Data Contributor](../articles/role-based-access-control/built-in-roles.md#storage-queue-data-contributor) on whichever connection is to be used for these queues.
36+
<sup>1</sup> `<CONNECTION_NAME_PREFIX>__blobServiceUri` can be used as an alias. If the connection configuration will be used by a blob trigger, `blobServiceUri` must also be accompanied by `queueServiceUri`. See below.
4037

4138
Additional properties may be set to customize the connection. See [Common properties for identity-based connections](../articles/azure-functions/functions-reference.md#common-properties-for-identity-based-connections).
4239

40+
The `serviceUri` form cannot be used when the overall connection configuration is to be used across blobs, queues, and/or tables. The URI itself can only designate the blob service. As an alternative, you can provide a URI specifically for each service, allowing a single connection to be used. If both versions are provided, the multi-service form will be used. To configure the connection for multiple services, instead of `<CONNECTION_NAME_PREFIX>__serviceUri`, set:
41+
42+
| Property | Environment variable template | Description | Example value |
43+
|---------------------------|-----------------------------------------------------|--------------------------------------------|---------|
44+
| Blob Service URI | `<CONNECTION_NAME_PREFIX>__blobServiceUri` | The data plane URI of the blob service to which you are connecting, using the HTTPS scheme. | https://<storage_account_name>.blob.core.windows.net |
45+
| Queue Service URI (**required for blob triggers**<sup>2</sup>) | `<CONNECTION_NAME_PREFIX>__queueServiceUri` | The data plane URI of a queue service, using the HTTPS scheme. This value is only needed for blob triggers. | https://<storage_account_name>.queue.core.windows.net |
46+
47+
<sup>2</sup> By default, the blob trigger uses Azure Queues internally. In the `serviceUri` form, the `AzureWebJobsStorage` connection is used. However, when specifying `blobServiceUri`, a queue service URI must also be provided with `queueServiceUri`. It is recommended that you use the service from the same storage account as the blob service. You will also need to make sure the trigger can read and write messages in the configured queue service by assigning a role like [Storage Queue Data Contributor](../articles/role-based-access-control/built-in-roles.md#storage-queue-data-contributor).
48+
4349
[!INCLUDE [functions-identity-based-connections-configuration](./functions-identity-based-connections-configuration.md)]
4450

4551
[!INCLUDE [functions-blob-permissions](./functions-blob-permissions.md)]

0 commit comments

Comments
 (0)