You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/restore-sql-database-azure-vm.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Restore SQL Server databases on an Azure VM
3
3
description: This article describes how to restore SQL Server databases that are running on an Azure VM and that are backed up with Azure Backup. You can also use Cross Region Restore to restore your databases to a secondary region.
4
4
ms.topic: how-to
5
-
ms.date: 09/11/2024
5
+
ms.date: 09/19/2024
6
6
ms.service: azure-backup
7
7
author: AbhishekMallick-MS
8
8
ms.author: v-abhmallick
@@ -35,6 +35,8 @@ Before you restore a database, note the following:
35
35
- We strongly recommended to restore the "master" database using the [Restore as files](#restore-as-files) option and then restore [using T-SQL commands](/sql/relational-databases/backup-restore/restore-the-master-database-transact-sql).
36
36
- For all system databases (model, msdb), stop the SQL Server Agent service before you trigger the restore.
37
37
- Close any applications that might try to take a connection to any of these databases.
38
+
- For the **master databases**, the **Alternate Location** option for restore isn't supported. We recommend you to restore the **master database** using the **Restore as files** option, and then restore using the `T-SQL` commands.
39
+
- For `msdb` and `model`, the **Alternate Location** option for restore is supported only when the **Restored database name** is different from the **target database** name. If you want to restore the same name with the **target database**, we recommend you to restore using the **Restore as files** option, and then restore using the `T-SQL` commands.
Copy file name to clipboardExpand all lines: articles/container-apps/custom-domains-managed-certificates.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: craigshoemaker
6
6
ms.service: azure-container-apps
7
7
ms.custom: build-2023, devx-track-azurecli
8
8
ms.topic: how-to
9
-
ms.date: 03/08/2024
9
+
ms.date: 09/19/2024
10
10
ms.author: cshoe
11
11
zone_pivot_groups: azure-cli-or-portal
12
12
---
@@ -26,11 +26,11 @@ Azure Container Apps provides a free managed certificate for your custom domain.
26
26
27
27
The requirements are:
28
28
29
-
-Your container app has HTTP ingress enabled and is publicly accessible.
29
+
-Enable HTTP ingress and ensure your container app is publicly accessible.
30
30
31
-
-For apex domains, you must have an A record pointing to your Container Apps environment's IP address.
31
+
-Must have an A record for apex domains that points to your Container Apps environment's IP address.
32
32
33
-
-For subdomains, you must have a CNAME record mapped directly to the container app's automatically generated domain name. Mapping to an intermediate CNAME value blocks certificate issuance and renewal. Examples of CNAME values are traffic managers, Cloudflare, and similar services.
33
+
-Establish a CNAME record for subdomains that maps directly to the container app's automatically generated domain name. Mapping to an intermediate CNAME value blocks certificate issuance and renewal. Examples of CNAME values are traffic managers, Cloudflare, and similar services.
34
34
35
35
> [!NOTE]
36
36
> To ensure the certificate issuance and subsequent renewals proceed successfully, all requirements must be met at all times when the managed certificate is assigned.
@@ -40,7 +40,7 @@ The requirements are:
40
40
41
41
1. Navigate to your container app in the [Azure portal](https://portal.azure.com)
42
42
43
-
1. Verify that your app has HTTP ingress enabled by selecting **Ingress** in the *Settings* section. If ingress isn't enabled, enable it with these steps:
43
+
1. Verify that your app has HTTP ingress enabled by selecting **Ingress** in the *Settings* section. If ingress isn't enabled, enable it with these steps:
44
44
45
45
1. Set *HTTP Ingress* to **Enabled**.
46
46
1. Select the desired *Ingress traffic* setting.
@@ -62,7 +62,7 @@ The requirements are:
62
62
| Apex domain | A record | An apex domain is a domain at the root level of your domain. For example, if your DNS zone is `contoso.com`, then `contoso.com` is the apex domain. |
63
63
| Subdomain | CNAME | A subdomain is a domain that is part of another domain. For example, if your DNS zone is `contoso.com`, then `www.contoso.com` is an example of a subdomain that can be configured in the zone. |
64
64
65
-
1. Using the DNS provider that is hosting your domain, create DNS records based on the *Hostname record type* you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you are the owner.
65
+
1. Using the DNS provider that is hosting your domain, create DNS records based on the *Hostname record type* you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you're the owner.
66
66
67
67
- If you selected *A record*, create the following DNS records:
68
68
@@ -82,7 +82,7 @@ The requirements are:
82
82
83
83
1. Once validation succeeds, select **Add**.
84
84
85
-
It may take several minutes to issue the certificate and add the domain to your container app.
85
+
It might take several minutes to issue the certificate and add the domain to your container app.
86
86
87
87
88
88
1. Once the operation is complete, you see your domain name in the list of custom domains with a status of *Secured*. Navigate to your domain to verify that it's accessible.
@@ -184,7 +184,7 @@ Container Apps supports apex domains and subdomains. Each domain type requires a
184
184
- If you're configuring an *A record*, replace `<VALIDATION_METHOD>` with `HTTP`.
185
185
- If you're configuring a *CNAME*, replace `<VALIDATION_METHOD>` with `CNAME`.
186
186
187
-
It may take several minutes to issue the certificate and add the domain to your container app.
187
+
It might take several minutes to issue the certificate and add the domain to your container app.
188
188
189
189
1. Once the operation is complete, navigate to your domain to verify that it's accessible.
Copy file name to clipboardExpand all lines: articles/container-apps/java-get-started.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ The following image is a screenshot of how your application looks once deployed
31
31
| Azure CLI | Install the [Azure CLI](/cli/azure/install-azure-cli).|
32
32
| Container Apps CLI extension | Use version `0.3.47` or higher. Use the `az extension add --name containerapp --upgrade --allow-preview` command to install the latest version. |
33
33
| Java | Install the [Java Development Kit](/java/openjdk/install). Use version 17 or later. |
34
-
| Maven |Install the [Maven](https://maven.apache.org/download.cgi).|
34
+
|Apache Maven |Download and install [Apache Maven](https://maven.apache.org/download.cgi).|
35
35
36
36
## Prepare the project
37
37
@@ -67,7 +67,7 @@ cd spring-petclinic
67
67
Clean the Maven build area, compile the project's code, and create a JAR file, all while skipping any tests.
68
68
69
69
```bash
70
-
mvn clean package -DskipTests
70
+
mvn clean verify
71
71
```
72
72
73
73
After you execute the build command, a file named *petclinic.jar* is generated in the */target* folder.
@@ -88,7 +88,7 @@ cd spring-framework-petclinic
88
88
Clean the Maven build area, compile the project's code, and create a WAR file, all while skipping any tests.
89
89
90
90
```bash
91
-
mvn clean package -DskipTests
91
+
mvn clean verify
92
92
```
93
93
94
94
After you execute the build command, a file named *petclinic.war* is generated in the */target* folder.
Copy file name to clipboardExpand all lines: articles/container-apps/storage-mounts.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: craigshoemaker
6
6
ms.service: azure-container-apps
7
7
ms.custom: devx-track-azurecli
8
8
ms.topic: conceptual
9
-
ms.date: 04/10/2024
9
+
ms.date: 09/19/2024
10
10
ms.author: cshoe
11
11
zone_pivot_groups: arm-azure-cli-portal
12
12
---
@@ -17,13 +17,13 @@ A container app has access to different types of storage. A single app can take
17
17
18
18
| Storage type | Description | Persistence | Usage example |
19
19
|--|--|--|
20
-
|[Container-scoped storage](#container-scoped-storage)| Ephemeral storage available to a running container | Data is available until container shuts down | Writing a local app cache. |
21
-
|[Replica-scoped storage](#replica-scoped-storage)| Ephemeral storage for sharing files between containers in the same replica | Data is available until replica shuts down | The main app container writing log files that are processed by a sidecar container. |
20
+
|[Container-scoped storage](#container-scoped-storage)| Ephemeral storage available to a running container | Data is available until container shuts down | Writing a local app cache. |
21
+
|[Replica-scoped storage](#replica-scoped-storage)| Ephemeral storage for sharing files between containers in the same replica | Data is available until replica shuts down | The main app container writing log files that a sidecar container processes. |
22
22
|[Azure Files](#azure-files)| Permanent storage | Data is persisted to Azure Files | Writing files to a file share to make data accessible by other systems. |
23
23
24
24
## Ephemeral storage
25
25
26
-
A container app can read and write temporary data to ephemeral storage. Ephemeral storage can be scoped to a container or a replica. The total amount of container-scoped and replica-scoped storage available to each replica depends on the total amount of vCPUs allocated to the replica.
26
+
A container app can read and write temporary data to ephemeral storage. Ephemeral storage can be scoped to a container or a replica. The total amount of container-scoped and replica-scoped storage available to each replica depends on the total number of vCPUs allocated to the replica.
27
27
28
28
| vCPUs | Total ephemeral storage |
29
29
|--|--|
@@ -227,15 +227,15 @@ Azure Files storage has the following characteristics:
227
227
* All containers that mount the share can access files written by any other container or method.
228
228
* More than one Azure Files volume can be mounted in a single container.
229
229
230
-
Azure Files supports both SMB and NFS protocols. You can mount an Azure Files share using either protocol. The file share you define in the environment must be configured with the same protocol used by the file share in the storage account.
230
+
Azure Files supports both SMB (Server Message Block) and NFS (Network File System) protocols. You can mount an Azure Files share using either protocol. The file share you define in the environment must be configured with the same protocol used by the file share in the storage account.
231
231
232
232
> [!NOTE]
233
233
> Support for mounting NFS shares in Azure Container Apps is in preview.
234
234
235
235
To enable Azure Files storage in your container, you need to set up your environment and container app as follows:
236
236
237
237
* Create a storage definition in the Container Apps environment.
238
-
* If you are using NFS, your environment must be configured with a custom VNet and the storage account must be configured to allow access from the VNet. For more information, see [NFS file shares in Azure Files
238
+
* If you're using NFS, your environment must be configured with a custom VNet and the storage account must be configured to allow access from the VNet. For more information, see [NFS file shares in Azure Files
239
239
](../storage/files/files-nfs-protocol.md).
240
240
* If your environment is configured with a custom VNet, you must allow ports 445 and 2049 in the network security group (NSG) associated with the subnet.
241
241
* Define a volume of type `AzureFile` (SMB) or `NfsAzureFile` (NFS) in a revision.
Copy file name to clipboardExpand all lines: articles/virtual-desktop/client-device-redirection-intune.md
+5-13Lines changed: 5 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,15 +4,11 @@ description: Learn how to configure redirection settings for Windows App and the
4
4
ms.topic: how-to
5
5
author: dknappettmsft
6
6
ms.author: daknappe
7
-
ms.date: 05/29/2024
7
+
ms.date: 08/21/2024
8
8
---
9
9
10
10
# Configure client device redirection settings for Windows App and the Remote Desktop app using Microsoft Intune
11
11
12
-
> [!IMPORTANT]
13
-
> Configure redirection settings for Windows App and the Remote Desktop app using Microsoft Intune is currently in PREVIEW.
14
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
15
-
16
12
> [!TIP]
17
13
> This article contains information for multiple products that use the Remote Desktop Protocol (RDP) to provide remote access to Windows desktops and applications.
@@ -188,11 +184,7 @@ You need to create an [app configuration policy for managed apps](/mem/intune/ap
188
184
189
185
To create and apply an app configuration policy for managed apps, follow the steps in [App configuration policies for Intune App SDK managed apps](/mem/intune/apps/app-configuration-policies-managed-app) and use the following settings:
190
186
191
-
- On the **Basics** tab, do the following, depending on whether you're targeting Windows App or the Remote Desktop app
192
-
193
-
- For Windows App, select **Select custom apps**, then for **Bundle or Package ID**, enter `com.microsoft.rdc.apple` and for platform, select **iOS/iPadOS**.
194
-
195
-
- For the Remote Desktop app, select **Select public apps**, then search for and select **Remote Desktop** for each platform you want to target.
187
+
- On the **Basics** tab, search for and select **Windows App** or **Remote Desktop**.
196
188
197
189
- On the **Settings** tab, expand **General configuration settings**, then enter the following name and value pairs for each redirection setting you want to configure exactly as shown. These values correspond to the RDP properties listed on [Supported RDP properties](/azure/virtual-desktop/rdp-properties#device-redirection), but the syntax is different:
198
190
@@ -217,9 +209,9 @@ To create and apply an app protection policy, follow the steps in [How to create
217
209
218
210
- On the **Apps** tab, do the following, depending on whether you're targeting Windows App or the Remote Desktop app
219
211
220
-
- For Windows App on iOS/iPadOS, select **Select custom apps**, then for **Bundle or Package ID**, enter `com.microsoft.rdc.apple`.
212
+
- For Windows App on iOS/iPadOS, select **Select public apps**, then search for and select **Windows App**.
221
213
222
-
- For the Remote Desktop app, select **Select public apps**, then search for and select **Remote Desktop**.
214
+
- For the Remote Desktop app on Android, select **Select public apps**, then search for and select **Remote Desktop**.
223
215
224
216
- On the **Data protection** tab, only the following settings are relevant to Windows App and the Remote Desktop app. The other settings don't apply as Windows App and the Remote Desktop app interact with the session host and not with data in the app. On mobile devices, unapproved keyboards are a source of keystroke logging and theft.
0 commit comments