Skip to content

Commit cb2fa32

Browse files
committed
minor wording changes and callouts
1 parent 35adeaa commit cb2fa32

File tree

2 files changed

+13
-19
lines changed

2 files changed

+13
-19
lines changed

articles/azure-functions/durable/durable-functions-mssql-container-apps-hosting.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.topic: how-to
55
ms.date: 05/06/2025
66
---
77

8-
# Host a Durable Functions app in Azure Container Apps
8+
# Host a Durable Functions app in Azure Container Apps (.NET isolated)
99

1010
Azure Functions provides integrated support for developing, deploying, and managing containerized Function Apps on Azure Container Apps. Use Azure Container Apps for your Functions apps when you need to run in the same environment as other microservices, APIs, websites, workflows, or any container hosted programs. Learn more about [running Azure Functions in Container Apps](../../container-apps/functions-overview.md).
1111

@@ -163,7 +163,6 @@ A [workload profile](../functions-container-apps-hosting.md#hosting-and-workload
163163
--resource-group $resourceGroup \
164164
--name $containerAppEnv \
165165
--location $location \
166-
--infrastructure-subnet-resource-id $subnetId
167166
```
168167
169168
1. Create a container app based on the Durable Functions image.
@@ -178,7 +177,7 @@ A [workload profile](../functions-container-apps-hosting.md#hosting-and-workload
178177
--query properties.outputs.fqdn
179178
```
180179
181-
1. Make note of the app URL, which should look similar to `https://<APP_NAME>.victoriouswave-3866c33e.<REGION>.azurecontainerapps.io`.
180+
1. Make note of the app URL, which should look similar to `https://<APP_NAME>.<ENVIRONMENT_IDENTIFIER>.<REGION>.azurecontainerapps.io`.
182181
183182
### Create databases
184183
@@ -235,22 +234,22 @@ In this section, you set up **user-assigned managed identity** for Azure Storage
235234
clientId=$(az identity show --name $identity --resource-group $resourceGroup --query 'clientId' --output tsv)
236235
```
237236
238-
1. Assign the role `Storage Blob Data Owner` role for access to the storage account.
237+
1. Assign the role **Storage Blob Data Owner** role for access to the storage account.
239238
240239
```azurecli
241240
echo "Assign Storage Blob Data Owner role to identity"
242241
az role assignment create --assignee "$clientId" --role "Storage Blob Data Owner" --scope "$scope"
243242
```
244243
245244
### Set up app settings
246-
247-
Authenticating to the MSSQL database using managed identity isn't supported when hosting a Durable Functions app in Azure Container Apps. For now, this guide authenticates using connection strings.
245+
> [!NOTE]
246+
> Authenticating to the MSSQL database using managed identity isn't supported when hosting a Durable Functions app in Azure Container Apps. For now, this guide authenticates using connection strings.
248247
249248
1. From the SQL database resource in the Azure portal, navigate to **Settings** > **Connection strings** to find the connection string.
250249
251250
:::image type="content" source="./media/quickstart-mssql/mssql-azure-db-connection-string.png" alt-text="Screenshot showing database connection string.":::
252251
253-
The connection string should be a format similar to:
252+
The connection string should have a format similar to:
254253
255254
```bash
256255
dbserver=<SQL_SERVER_NAME>

articles/azure-functions/durable/quickstart-mssql.md

Lines changed: 7 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -76,11 +76,6 @@ Another file, *HelloOrchestration.cs*, contains the basic building blocks of a D
7676

7777
For more information about these functions, see [Durable Functions types and features](./durable-functions-types-features-overview.md).
7878

79-
#### Check for latest extension version
80-
For .NET apps, check the `.csproj` file and make sure the latest version of the [Microsoft.Azure.Functions.Worker.Extensions.DurableTask](https://www.nuget.org/packages/Microsoft.Azure.Functions.Worker.Extensions.DurableTask) package is referenced.
81-
82-
"Non-.NET apps" references the extension bundles, which automatically use the latest package.
83-
8479
## Set up your database
8580

8681
> [!NOTE]
@@ -218,13 +213,13 @@ To run your app in Azure, you need to create various resources. For convenient c
218213

219214
> [!NOTE]
220215
> If you already have an Azure SQL database or another publicly accessible SQL Server instance that you would like to use, you can go to the next section.
216+
>
217+
> The instructions below about enabling **Allow Azure services and resources to access this [SQL] server** is _not_ a recommended security practice for production scenarios. Real applications should implement more secure approaches, such as stronger firewall restrictions or virtual network configurations.
221218

222219
In the Azure portal, you can [create an Azure SQL database](/azure/azure-sql/database/single-database-create-quickstart). During creation:
223220
- Enable Azure services and resources to access this server (under _Networking_)
224221
- Set the value for _Database collation_ (under _Additional settings_) to `Latin1_General_100_BIN2_UTF8`.
225222

226-
Enabling the **Allow Azure services and resources to access this server** setting is _not_ a recommended security practice for production scenarios. Real applications should implement more secure approaches, such as stronger firewall restrictions or virtual network configurations.
227-
228223
### Create an Azure Functions app and supporting resources
229224

230225
1. Open a terminal window and sign in to Azure:
@@ -289,8 +284,8 @@ principalId=$(az identity show --name $identity --resource-group $resourceGroup
289284

290285
### Grant access to Azure Storage and Azure SQL Database
291286
#### Azure Storage
292-
Assign the identity `Storage Blob Data Owner` role for access to the storage account.
293-
```
287+
Assign the identity **Storage Blob Data Owner** role for access to the storage account.
288+
```azurecli
294289
# Set the scope of the access
295290
scope="/subscriptions/$subscription/resourceGroups/$resourceGroup/providers/Microsoft.Storage/storageAccounts/$storage"
296291
@@ -301,7 +296,7 @@ az role assignment create --assignee "$clientId" --role "Storage Blob Data Owner
301296

302297
#### Azure SQL Database
303298
>[!NOTE]
304-
> Authenticating to the MSSQL database using managed identity is _not_ supported when hosting a Durable Functions app in the Flex Consumption plan. Use connection string for now. Thus, if your app is hosted in the Flex Consumption plan, skip to the [set app application settings](#set-required-app-settings) section.
299+
> Authenticating to Azure SQL database using managed identity is _not_ supported when hosting a Durable Functions app in the Flex Consumption plan. If your app is hosted in the Flex Consumption plan, skip to the [set app settings](#set-required-app-settings) section.
305300
306301
1. Start by setting your developer identity as the database's admin.
307302

@@ -315,7 +310,7 @@ az role assignment create --assignee "$clientId" --role "Storage Blob Data Owner
315310
az sql server ad-admin create --resource-group $resourceGroup --server-name <SQL_SERVER_NAME> --display-name ADMIN --object-id "$assignee"
316311
```
317312
318-
1. Connect to the SQL database created previously using tools such as [Azure Data Studio](/azure-data-studio/download-azure-data-studio) or [SQL Management Server Studio](/ssms/download-sql-server-management-studio-ssms) to grant access to the managed identity. Or you can run the following [SQLCMD](/sql/tools/sqlcmd/sqlcmd-utility) command to connect:
313+
1. Connect to the SQL database created previously using tools such as [Azure Data Studio](/azure-data-studio/download-azure-data-studio) or [SQL Management Server Studio](/ssms/download-sql-server-management-studio-ssms). Or you can run the following [SQLCMD](/sql/tools/sqlcmd/sqlcmd-utility) command to connect:
319314
```bash
320315
sqlcmd -S <SQL_SERVER_NAME>.database.windows.net -d <DATABASE_NAME> -U <[email protected]> -P "ACCOUNT_PASSWORD" -G -l 30
321316
```
@@ -349,7 +344,7 @@ If you're using user-assigned managed identity to authenticate to the SQL databa
349344
sqlconnstr="Server=tcp:$dbserver.database.windows.net,1433;Initial Catalog=$sqlDB;Persist Security Info=False;User ID=$clientId;MultipleActiveResultSets=False;Encrypt=True;TrustServerCertificate=False;Authentication='Active Directory Managed Identity';"
350345
```
351346

352-
If you're using a simple connection string to authenticate, you can find it by going to the SQL database resource on Azure portal, navigating to the **Settings** tab, then clicking on **Connection strings**:
347+
For Flex Consumption apps, use a connection string to authenticate for now. You can find it by going to the SQL database resource on Azure portal, navigating to the **Settings** tab, then clicking on **Connection strings**:
353348

354349
:::image type="content" source="./media/quickstart-mssql/mssql-azure-db-connection-string.png" alt-text="Screenshot showing database connection string.":::
355350

0 commit comments

Comments
 (0)