You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/app-service-local-cache-overview.md
+10-6Lines changed: 10 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,8 @@ title: Azure App Service Local Cache overview | Microsoft Docs
3
3
description: This article describes how to enable, resize, and query the status of the Azure App Service Local Cache feature
4
4
services: app-service
5
5
documentationcenter: app-service
6
-
author: SyntaxC4
7
-
manager: yochayk
6
+
author: cephalin
7
+
manager: jpconnock
8
8
editor: ''
9
9
tags: optional
10
10
keywords: ''
@@ -16,10 +16,14 @@ ms.topic: article
16
16
ms.tgt_pltfrm: na
17
17
ms.workload: na
18
18
ms.date: 03/04/2016
19
-
ms.author: cfowler
19
+
ms.author: cephalin
20
20
21
21
---
22
22
# Azure App Service Local Cache overview
23
+
24
+
> [!NOTE]
25
+
> Local cache is not supported in containerized App Service apps, such as on [App Service on Linux](containers/app-service-linux-intro.md).
26
+
23
27
Azure web app content is stored on Azure Storage and is surfaced up in a durable manner as a content share. This design is intended to work with a variety of apps and has the following attributes:
24
28
25
29
* The content is shared across multiple virtual machine (VM) instances of the web app.
@@ -37,11 +41,11 @@ The Azure App Service Local Cache feature provides a web role view of your conte
37
41
38
42
## How Local Cache changes the behavior of App Service
39
43
* The local cache is a copy of the /site and /siteextensions folders of the web app. It is created on the local VM instance on web app startup. The size of the local cache per web app is limited to 300 MB by default, but you can increase it up to 2 GB.
40
-
* The local cache is read-write. However, any modifications is discarded when the web app moves virtual machines or gets restarted. Do not use Local Cache for apps that store mission-critical data in the content store.
44
+
* The local cache is read-write. However, any modification is discarded when the web app moves virtual machines or gets restarted. Do not use Local Cache for apps that store mission-critical data in the content store.
41
45
* Web apps can continue to write log files and diagnostic data as they do currently. Log files and data, however, are stored locally on the VM. Then they are copied over periodically to the shared content store. The copy to the shared content store is a best-case effort--write backs could be lost due to a sudden crash of a VM instance.
42
46
* There is a change in the folder structure of the LogFiles and Data folders for web apps that use Local Cache. There are now subfolders in the storage LogFiles and Data folders that follow the naming pattern of "unique identifier" + time stamp. Each of the subfolders corresponds to a VM instance where the web app is running or has run.
43
-
* Publishing changes to the web app through any of the publishing mechanisms will publish to the shared content store. This is by design because we want the published content to be durable. To refresh the local cache of the web app, it needs to be restarted. Does this seem like an excessive step? To make the lifecycle seamless, see the information later in this article.
44
-
* D:\Home points to the local cache. D:\local continue to point to the temporary VM-specific storage.
47
+
* Publishing changes to the web app through any of the publishing mechanisms will publish to the durable shared content store. To refresh the local cache of the web app, it needs to be restarted. To make the lifecycle seamless, see the information later in this article.
48
+
* D:\Home points to the local cache. D:\local continues to point to the temporary VM-specific storage.
45
49
* The default content view of the SCM site continues to be that of the shared content store.
Copy file name to clipboardExpand all lines: articles/app-service/app-service-web-tutorial-auth-aad.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.workload: web
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: dotnet
15
15
ms.topic: tutorial
16
-
ms.date: 04/03/2018
16
+
ms.date: 08/07/2018
17
17
ms.author: cephalin
18
18
---
19
19
@@ -237,7 +237,7 @@ From the management page of the AD application, copy the **Application ID** to a
237
237
238
238
Follow the same steps for the front-end app, but skip the last step. You don't need the **Application ID** for the front-end app. Keep the **Azure Active Directory Settings** page open.
239
239
240
-
If you like, navigate to `http://<front_end_app_name>.azurewebsites.net`. It should now direct you to a sign-in page. After you sign in, you still can't access the data from the back-end app, because you still need to do three things:
240
+
If you like, navigate to `http://<front_end_app_name>.azurewebsites.net`. It should now direct you to a secured sign-in page. After you sign in, you still can't access the data from the back-end app, because you still need to do three things:
241
241
242
242
- Grant the front end access to the back end
243
243
- Configure App Service to return a usable token
@@ -318,7 +318,7 @@ git commit -m "add authorization header for server code"
318
318
git push frontend master
319
319
```
320
320
321
-
Sign in to `http://<front_end_app_name>.azurewebsites.net` again. At the user data usage agreement page, click **Accept**.
321
+
Sign in to `https://<front_end_app_name>.azurewebsites.net` again. At the user data usage agreement page, click **Accept**.
322
322
323
323
You should now be able to create, read, update, and delete data from the back-end app as before. The only difference now is that both apps are now secured by App Service authentication and authorization, including the service-to-service calls.
324
324
@@ -348,7 +348,7 @@ This step is not related to authentication and authorization. However, you need
348
348
349
349
In the local repository, open _wwwroot/index.html_.
350
350
351
-
In Line 51, set the `apiEndpoint` variable to the URL of your back-end app (`http://<back_end_app_name>.azurewebsites.net`). Replace _\<back\_end\_app\_name>_ with your app name in App Service.
351
+
In Line 51, set the `apiEndpoint` variable to the URL of your back-end app (`https://<back_end_app_name>.azurewebsites.net`). Replace _\<back\_end\_app\_name>_ with your app name in App Service.
352
352
353
353
In the local repository, open _wwwroot/app/scripts/todoListSvc.js_ and see that `apiEndpoint` is prepended to all the API calls. Your Angular.js app is now calling the back-end APIs.
Navigate to `http://<front_end_app_name>.azurewebsites.net` again. You should now be able to create, read, update, and delete data from the back-end app, directly in the Angular.js app.
405
+
Navigate to `https://<front_end_app_name>.azurewebsites.net` again. You should now be able to create, read, update, and delete data from the back-end app, directly in the Angular.js app.
406
406
407
407
Congratulations! Your client code is now accessing the back-end data on behalf of the authenticated user.
0 commit comments