Skip to content

Commit ad76c65

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into appgw
2 parents ca408ef + 14485f2 commit ad76c65

File tree

6 files changed

+29
-31
lines changed

6 files changed

+29
-31
lines changed

articles/backup/restore-sql-database-azure-vm.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Restore SQL Server databases on an Azure VM
33
description: This article describes how to restore SQL Server databases that are running on an Azure VM and that are backed up with Azure Backup. You can also use Cross Region Restore to restore your databases to a secondary region.
44
ms.topic: how-to
5-
ms.date: 09/11/2024
5+
ms.date: 09/19/2024
66
ms.service: azure-backup
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick
@@ -35,6 +35,8 @@ Before you restore a database, note the following:
3535
- We strongly recommended to restore the "master" database using the [Restore as files](#restore-as-files) option and then restore [using T-SQL commands](/sql/relational-databases/backup-restore/restore-the-master-database-transact-sql).
3636
- For all system databases (model, msdb), stop the SQL Server Agent service before you trigger the restore.
3737
- Close any applications that might try to take a connection to any of these databases.
38+
- For the **master databases**, the **Alternate Location** option for restore isn't supported. We recommend you to restore the **master database** using the **Restore as files** option, and then restore using the `T-SQL` commands.
39+
- For `msdb` and `model`, the **Alternate Location** option for restore is supported only when the **Restored database name** is different from the **target database** name. If you want to restore the same name with the **target database**, we recommend you to restore using the **Restore as files** option, and then restore using the `T-SQL` commands.
3840

3941
## Restore a database
4042

articles/container-apps/custom-domains-managed-certificates.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: craigshoemaker
66
ms.service: azure-container-apps
77
ms.custom: build-2023, devx-track-azurecli
88
ms.topic: how-to
9-
ms.date: 03/08/2024
9+
ms.date: 09/19/2024
1010
ms.author: cshoe
1111
zone_pivot_groups: azure-cli-or-portal
1212
---
@@ -26,11 +26,11 @@ Azure Container Apps provides a free managed certificate for your custom domain.
2626

2727
The requirements are:
2828

29-
- Your container app has HTTP ingress enabled and is publicly accessible.
29+
- Enable HTTP ingress and ensure your container app is publicly accessible.
3030

31-
- For apex domains, you must have an A record pointing to your Container Apps environment's IP address.
31+
- Must have an A record for apex domains that points to your Container Apps environment's IP address.
3232

33-
- For subdomains, you must have a CNAME record mapped directly to the container app's automatically generated domain name. Mapping to an intermediate CNAME value blocks certificate issuance and renewal. Examples of CNAME values are traffic managers, Cloudflare, and similar services.
33+
- Establish a CNAME record for subdomains that maps directly to the container app's automatically generated domain name. Mapping to an intermediate CNAME value blocks certificate issuance and renewal. Examples of CNAME values are traffic managers, Cloudflare, and similar services.
3434

3535
> [!NOTE]
3636
> To ensure the certificate issuance and subsequent renewals proceed successfully, all requirements must be met at all times when the managed certificate is assigned.
@@ -40,7 +40,7 @@ The requirements are:
4040

4141
1. Navigate to your container app in the [Azure portal](https://portal.azure.com)
4242

43-
1. Verify that your app has HTTP ingress enabled by selecting **Ingress** in the *Settings* section. If ingress isn't enabled, enable it with these steps:
43+
1. Verify that your app has HTTP ingress enabled by selecting **Ingress** in the *Settings* section. If ingress isn't enabled, enable it with these steps:
4444

4545
1. Set *HTTP Ingress* to **Enabled**.
4646
1. Select the desired *Ingress traffic* setting.
@@ -62,7 +62,7 @@ The requirements are:
6262
| Apex domain | A record | An apex domain is a domain at the root level of your domain. For example, if your DNS zone is `contoso.com`, then `contoso.com` is the apex domain. |
6363
| Subdomain | CNAME | A subdomain is a domain that is part of another domain. For example, if your DNS zone is `contoso.com`, then `www.contoso.com` is an example of a subdomain that can be configured in the zone. |
6464

65-
1. Using the DNS provider that is hosting your domain, create DNS records based on the *Hostname record type* you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you are the owner.
65+
1. Using the DNS provider that is hosting your domain, create DNS records based on the *Hostname record type* you selected using the values shown in the *Domain validation* section. The records point the domain to your container app and verify that you're the owner.
6666

6767
- If you selected *A record*, create the following DNS records:
6868

@@ -82,7 +82,7 @@ The requirements are:
8282

8383
1. Once validation succeeds, select **Add**.
8484

85-
It may take several minutes to issue the certificate and add the domain to your container app.
85+
It might take several minutes to issue the certificate and add the domain to your container app.
8686

8787

8888
1. Once the operation is complete, you see your domain name in the list of custom domains with a status of *Secured*. Navigate to your domain to verify that it's accessible.
@@ -184,7 +184,7 @@ Container Apps supports apex domains and subdomains. Each domain type requires a
184184
- If you're configuring an *A record*, replace `<VALIDATION_METHOD>` with `HTTP`.
185185
- If you're configuring a *CNAME*, replace `<VALIDATION_METHOD>` with `CNAME`.
186186
187-
It may take several minutes to issue the certificate and add the domain to your container app.
187+
It might take several minutes to issue the certificate and add the domain to your container app.
188188
189189
1. Once the operation is complete, navigate to your domain to verify that it's accessible.
190190

articles/container-apps/index.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,10 @@ landingContent:
2121
url: overview.md
2222
- text: Compare container options in Azure
2323
url: compare-options.md
24+
- text: Learn to develop with .NET
25+
url: dotnet-overview.md
26+
- text: Learn to develop with Java
27+
url: java-overview.md
2428
- title: Get started
2529
linkLists:
2630
- linkListType: quickstart

articles/container-apps/java-get-started.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ The following image is a screenshot of how your application looks once deployed
3131
| Azure CLI | Install the [Azure CLI](/cli/azure/install-azure-cli).|
3232
| Container Apps CLI extension | Use version `0.3.47` or higher. Use the `az extension add --name containerapp --upgrade --allow-preview` command to install the latest version. |
3333
| Java | Install the [Java Development Kit](/java/openjdk/install). Use version 17 or later. |
34-
| Maven | Install the [Maven](https://maven.apache.org/download.cgi).|
34+
| Apache Maven | Download and install [Apache Maven](https://maven.apache.org/download.cgi).|
3535

3636
## Prepare the project
3737

@@ -67,7 +67,7 @@ cd spring-petclinic
6767
Clean the Maven build area, compile the project's code, and create a JAR file, all while skipping any tests.
6868

6969
```bash
70-
mvn clean package -DskipTests
70+
mvn clean verify
7171
```
7272

7373
After you execute the build command, a file named *petclinic.jar* is generated in the */target* folder.
@@ -88,7 +88,7 @@ cd spring-framework-petclinic
8888
Clean the Maven build area, compile the project's code, and create a WAR file, all while skipping any tests.
8989

9090
```bash
91-
mvn clean package -DskipTests
91+
mvn clean verify
9292
```
9393

9494
After you execute the build command, a file named *petclinic.war* is generated in the */target* folder.

articles/container-apps/storage-mounts.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: craigshoemaker
66
ms.service: azure-container-apps
77
ms.custom: devx-track-azurecli
88
ms.topic: conceptual
9-
ms.date: 04/10/2024
9+
ms.date: 09/19/2024
1010
ms.author: cshoe
1111
zone_pivot_groups: arm-azure-cli-portal
1212
---
@@ -17,13 +17,13 @@ A container app has access to different types of storage. A single app can take
1717

1818
| Storage type | Description | Persistence | Usage example |
1919
|--|--|--|
20-
| [Container-scoped storage](#container-scoped-storage) | Ephemeral storage available to a running container | Data is available until container shuts down | Writing a local app cache. |
21-
| [Replica-scoped storage](#replica-scoped-storage) | Ephemeral storage for sharing files between containers in the same replica | Data is available until replica shuts down | The main app container writing log files that are processed by a sidecar container. |
20+
| [Container-scoped storage](#container-scoped-storage) | Ephemeral storage available to a running container | Data is available until container shuts down | Writing a local app cache. |
21+
| [Replica-scoped storage](#replica-scoped-storage) | Ephemeral storage for sharing files between containers in the same replica | Data is available until replica shuts down | The main app container writing log files that a sidecar container processes. |
2222
| [Azure Files](#azure-files) | Permanent storage | Data is persisted to Azure Files | Writing files to a file share to make data accessible by other systems. |
2323

2424
## Ephemeral storage
2525

26-
A container app can read and write temporary data to ephemeral storage. Ephemeral storage can be scoped to a container or a replica. The total amount of container-scoped and replica-scoped storage available to each replica depends on the total amount of vCPUs allocated to the replica.
26+
A container app can read and write temporary data to ephemeral storage. Ephemeral storage can be scoped to a container or a replica. The total amount of container-scoped and replica-scoped storage available to each replica depends on the total number of vCPUs allocated to the replica.
2727

2828
| vCPUs | Total ephemeral storage |
2929
|--|--|
@@ -227,15 +227,15 @@ Azure Files storage has the following characteristics:
227227
* All containers that mount the share can access files written by any other container or method.
228228
* More than one Azure Files volume can be mounted in a single container.
229229

230-
Azure Files supports both SMB and NFS protocols. You can mount an Azure Files share using either protocol. The file share you define in the environment must be configured with the same protocol used by the file share in the storage account.
230+
Azure Files supports both SMB (Server Message Block) and NFS (Network File System) protocols. You can mount an Azure Files share using either protocol. The file share you define in the environment must be configured with the same protocol used by the file share in the storage account.
231231

232232
> [!NOTE]
233233
> Support for mounting NFS shares in Azure Container Apps is in preview.
234234
235235
To enable Azure Files storage in your container, you need to set up your environment and container app as follows:
236236

237237
* Create a storage definition in the Container Apps environment.
238-
* If you are using NFS, your environment must be configured with a custom VNet and the storage account must be configured to allow access from the VNet. For more information, see [NFS file shares in Azure Files
238+
* If you're using NFS, your environment must be configured with a custom VNet and the storage account must be configured to allow access from the VNet. For more information, see [NFS file shares in Azure Files
239239
](../storage/files/files-nfs-protocol.md).
240240
* If your environment is configured with a custom VNet, you must allow ports 445 and 2049 in the network security group (NSG) associated with the subnet.
241241
* Define a volume of type `AzureFile` (SMB) or `NfsAzureFile` (NFS) in a revision.

articles/virtual-desktop/client-device-redirection-intune.md

Lines changed: 5 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,11 @@ description: Learn how to configure redirection settings for Windows App and the
44
ms.topic: how-to
55
author: dknappettmsft
66
ms.author: daknappe
7-
ms.date: 05/29/2024
7+
ms.date: 08/21/2024
88
---
99

1010
# Configure client device redirection settings for Windows App and the Remote Desktop app using Microsoft Intune
1111

12-
> [!IMPORTANT]
13-
> Configure redirection settings for Windows App and the Remote Desktop app using Microsoft Intune is currently in PREVIEW.
14-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
15-
1612
> [!TIP]
1713
> This article contains information for multiple products that use the Remote Desktop Protocol (RDP) to provide remote access to Windows desktops and applications.
1814
@@ -49,7 +45,7 @@ For Windows App:
4945

5046
| Device platform | Managed devices | Unmanaged devices |
5147
|--|:--:|:--:|
52-
| iOS and iPadOS | <sub>:::image type="icon" source="media/no.svg" border="false":::</sub> | <sub>:::image type="icon" source="media/yes.svg" border="false":::</sub> |
48+
| iOS and iPadOS | <sub>:::image type="icon" source="media/yes.svg" border="false":::</sub> | <sub>:::image type="icon" source="media/yes.svg" border="false":::</sub> |
5349

5450
For the Remote Desktop app:
5551

@@ -188,11 +184,7 @@ You need to create an [app configuration policy for managed apps](/mem/intune/ap
188184

189185
To create and apply an app configuration policy for managed apps, follow the steps in [App configuration policies for Intune App SDK managed apps](/mem/intune/apps/app-configuration-policies-managed-app) and use the following settings:
190186

191-
- On the **Basics** tab, do the following, depending on whether you're targeting Windows App or the Remote Desktop app
192-
193-
- For Windows App, select **Select custom apps**, then for **Bundle or Package ID**, enter `com.microsoft.rdc.apple` and for platform, select **iOS/iPadOS**.
194-
195-
- For the Remote Desktop app, select **Select public apps**, then search for and select **Remote Desktop** for each platform you want to target.
187+
- On the **Basics** tab, search for and select **Windows App** or **Remote Desktop**.
196188

197189
- On the **Settings** tab, expand **General configuration settings**, then enter the following name and value pairs for each redirection setting you want to configure exactly as shown. These values correspond to the RDP properties listed on [Supported RDP properties](/azure/virtual-desktop/rdp-properties#device-redirection), but the syntax is different:
198190

@@ -217,9 +209,9 @@ To create and apply an app protection policy, follow the steps in [How to create
217209

218210
- On the **Apps** tab, do the following, depending on whether you're targeting Windows App or the Remote Desktop app
219211

220-
- For Windows App on iOS/iPadOS, select **Select custom apps**, then for **Bundle or Package ID**, enter `com.microsoft.rdc.apple`.
212+
- For Windows App on iOS/iPadOS, select **Select public apps**, then search for and select **Windows App**.
221213

222-
- For the Remote Desktop app, select **Select public apps**, then search for and select **Remote Desktop**.
214+
- For the Remote Desktop app on Android, select **Select public apps**, then search for and select **Remote Desktop**.
223215

224216
- On the **Data protection** tab, only the following settings are relevant to Windows App and the Remote Desktop app. The other settings don't apply as Windows App and the Remote Desktop app interact with the session host and not with data in the app. On mobile devices, unapproved keyboards are a source of keystroke logging and theft.
225217

0 commit comments

Comments
 (0)