You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/app-service-key-vault-references.md
+25-2Lines changed: 25 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,11 +32,21 @@ If your vault is configured with [network restrictions](../key-vault/general/ove
32
32
33
33
1. Make sure the application has outbound networking capabilities configured, as described in [App Service networking features](./networking-features.md) and [Azure Functions networking options](../azure-functions/functions-networking-options.md).
34
34
35
-
Linux applications attempting to use private endpoints additionally require that the app be explicitly configured to have all traffic route through the virtual network. This requirement will be removed in a forthcoming update. To set this, use the following CLI command:
35
+
Linux applications attempting to use private endpoints additionally require that the app be explicitly configured to have all traffic route through the virtual network. This requirement will be removed in a forthcoming update. To set this, use the following Azure CLI or Azure PowerShell command:
36
+
37
+
# [Azure CLI](#tab/azure-cli)
36
38
37
39
```azurecli
38
-
az webapp config set --subscription <sub> -g <rg> -n <appname> --generic-configurations '{"vnetRouteAllEnabled": true}'
40
+
az webapp config set --subscription <sub> -g MyResourceGroupName -n MyAppName --generic-configurations '{"vnetRouteAllEnabled": true}'
2. Make sure that the vault's configuration accounts for the network or subnet through which your app will access it.
42
52
@@ -53,11 +63,24 @@ Once you have granted permissions to the user-assigned identity, follow these st
53
63
54
64
1. Configure the app to use this identity for Key Vault reference operations by setting the `keyVaultReferenceIdentity` property to the resource ID of the user-assigned identity.
55
65
66
+
# [Azure CLI](#tab/azure-cli)
67
+
56
68
```azurecli-interactive
57
69
userAssignedIdentityResourceId=$(az identity show -g MyResourceGroupName -n MyUserAssignedIdentityName --query id -o tsv)
58
70
appResourceId=$(az webapp show -g MyResourceGroupName -n MyAppName --query id -o tsv)
59
71
az rest --method PATCH --uri "${appResourceId}?api-version=2021-01-01" --body "{'properties':{'keyVaultReferenceIdentity':'${userAssignedIdentityResourceId}'}}"
Copy file name to clipboardExpand all lines: articles/azure-arc/data/release-notes.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,6 +56,8 @@ Add support for specifying labels and annotations on the secondary service endpo
56
56
- If three replicas, then `REQUIRED_SECONDARIES_TO_COMMIT = 1`.
57
57
- If one or two replicas, then `REQUIRED_SECONDARIES_TO_COMMIT = 0`.
58
58
59
+
In this release, the default value of the readable secondary service is `Cluster IP`. The secondary service type can be set in the Kubernetes yaml/json at `spec.services.readableSecondaries.type`. In the next release, the default value will be the same as the primary service type.
60
+
59
61
### User experience improvements
60
62
61
63
Notifications added in Azure Portal if billing data has not been uploaded to Azure recently.
If you need the outbound communication from Arc agents to authenticate via a certificate, pass the certificate during onboarding. In case you need to pass multiple certificates, combine them into a single certificate chain and pass it through.
261
-
262
-
### [Azure CLI](#tab/azure-cli)
263
-
264
-
Run the connect command with parameters specified:
265
-
266
-
```azurecli
267
-
az connectedk8s connect --name <cluster-name> --resource-group <resource-group> --proxy-cert <path-to-cert-file>
268
-
```
269
-
270
-
### [Azure PowerShell](#tab/azure-powershell)
271
-
272
-
This scenario is not supported via the powershell cmdlet.
273
-
274
-
---
275
-
276
258
## Connect using an outbound proxy server
277
259
278
260
If your cluster is behind an outbound proxy server, requests must be routed via the outbound proxy server.
@@ -317,6 +299,22 @@ If your cluster is behind an outbound proxy server, requests must be routed via
317
299
318
300
---
319
301
302
+
For outbound proxy servers where only a trusted certificate needs to be provided without the proxy server endpoint inputs, `az connectedk8s connect` can be run with just the `--proxy-cert` input specified. In case multiple trusted certificates are expected, the combined certificate chain can be provided in a single file using the `--proxy-cert` parameter.
303
+
304
+
### [Azure CLI](#tab/azure-cli)
305
+
306
+
Run the connect command with the `--proxy-cert` parameter specified:
307
+
308
+
```azurecli
309
+
az connectedk8s connect --name <cluster-name> --resource-group <resource-group> --proxy-cert <path-to-cert-file>
310
+
```
311
+
312
+
### [Azure PowerShell](#tab/azure-powershell)
313
+
314
+
The ability to pass in the proxy certificate only without the proxy server endpoint details is not yet supported via PowerShell.
> Enabling virtual network triggers may have an impact on the performance of your application since your App Service plan instances will need to monitor your triggers to determine when to scale. This impact is likely to be very small.
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-premium-plan.md
+67-2Lines changed: 67 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,7 @@ In the Premium plan, you can have your app always ready on a specified number of
57
57
58
58
You can configure the number of always ready instances in the Azure portal by selected your **Function App**, going to the **Platform Features** tab, and selecting the **Scale Out** options. In the function app edit window, always ready instances are specific to that app.
@@ -80,12 +91,32 @@ Consider this example of how always-ready instances and pre-warmed instances wor
80
91
81
92
As soon as the first trigger comes in, the five always-ready instances become active, and a pre-warmed instance is allocated. The app is now running with six provisioned instances: the five now-active always ready instances, and the sixth pre-warmed and inactive buffer. If the rate of executions continues to increase, the five active instances are eventually used. When the platform decides to scale beyond five instances, it scales into the pre-warmed instance. When that happens, there are now six active instances, and a seventh instance is instantly provisioned and fill the pre-warmed buffer. This sequence of scaling and pre-warming continues until the maximum instance count for the app is reached. No instances are pre-warmed or activated beyond the maximum.
82
93
94
+
# [Portal](#tab/portal)
95
+
96
+
You can configure the number of pre-warmed instances in the Azure portal by selecting the **Scale Out** options under **Settings** of a function app deployed to that plan and then adjusting the **Always Ready Instances** count.
97
+
98
+

99
+
100
+
# [Azure CLI](#tab/azurecli)
101
+
83
102
You can modify the number of pre-warmed instances for an app using the Azure CLI.
In addition to the [plan maximum instance count](#plan-and-sku-settings), you can configure a per-app maximum. The app maximum can be configured using the [app scale limit](./event-driven-scaling.md#limit-scale-out).
@@ -120,27 +151,61 @@ When you create the plan, there are two plan size settings: the minimum number o
120
151
121
152
If your app requires instances beyond the always-ready instances, it can continue to scale out until the number of instances hits the maximum burst limit. You're billed for instances beyond your plan size only while they are running and allocated to you, on a per-second basis. The platform makes it's best effort at scaling your app out to the defined maximum limit.
122
153
123
-
You can configure the plan size and maximums in the Azure portal by selecting the **Scale Out** options in the plan or a function app deployed to that plan (under **Platform Features**).
154
+
# [Portal](#tab/portal)
155
+
156
+
You can configure the plan size and maximums in the Azure portal by selecting the **Scale Out** options under **Settings** of a function app deployed to that plan.
157
+
158
+

159
+
160
+
# [Azure CLI](#tab/azurecli)
124
161
125
162
You can also increase the maximum burst limit from the Azure CLI:
126
163
127
164
```azurecli-interactive
128
165
az functionapp plan update -g <resource_group> -n <premium_plan_name> --max-burst <desired_max_burst>
129
166
```
130
167
168
+
# [Azure PowerShell](#tab/azure-powershell)
169
+
170
+
You can also increase the maximum burst limit from the Azure PowerShell:
The minimum for every plan will be at least one instance. The actual minimum number of instances will be autoconfigured for you based on the always ready instances requested by apps in the plan. For example, if app A requests five always ready instances, and app B requests two always ready instances in the same plan, the minimum plan size will be calculated as five. App A will be running on all 5, and app B will only be running on 2.
132
179
133
180
> [!IMPORTANT]
134
181
> You are charged for each instance allocated in the minimum instance count regardless if functions are executing or not.
135
182
136
183
In most circumstances, this autocalculated minimum is sufficient. However, scaling beyond the minimum occurs at a best effort. It's possible, though unlikely, that at a specific time scale-out could be delayed if additional instances are unavailable. By setting a minimum higher than the autocalculated minimum, you reserve instances in advance of scale-out.
137
184
185
+
# [Portal](#tab/portal)
186
+
187
+
You can configure the minimum instances in the Azure portal by selecting the **Scale Out** options under **Settings** of a function app deployed to that plan.
188
+
189
+

190
+
191
+
# [Azure CLI](#tab/azurecli)
192
+
138
193
Increasing the calculated minimum for a plan can be done using the Azure CLI.
139
194
140
195
```azurecli-interactive
141
196
az functionapp plan update -g <resource_group> -n <premium_plan_name> --min-instances <desired_min_instances>
142
197
```
143
198
199
+
# [Azure PowerShell](#tab/azure-powershell)
200
+
201
+
Increasing the calculated minimum for a plan can be done using the Azure PowerShell.
When creating or scaling your plan, you can choose between three instance sizes. You will be billed for the total number of cores and memory provisioned, per second that each instance is allocated to you. Your app can automatically scale out to multiple instances as needed.
Copy file name to clipboardExpand all lines: articles/azure-monitor/agents/agent-linux.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,16 +7,15 @@ ms.date: 03/31/2022
7
7
---
8
8
9
9
# Install Log Analytics agent on Linux computers
10
-
The Log Analytics agents are on a **deprecation path** and will no longer be supported after **August 31, 2024**. If you use the Log Analytics agents to ingest data to Azure Monitor, make sure to [migrate to the new Azure Monitor agent](./azure-monitor-agent-migration.md) prior to that date.
11
-
12
-
13
10
This article provides details on installing the Log Analytics agent on Linux computers using the following methods:
14
11
15
12
*[Install the agent for Linux using a wrapper-script](#install-the-agent-using-wrapper-script) hosted on GitHub. This is the recommended method to install and upgrade the agent when the computer has connectivity with the Internet, directly or through a proxy server.
16
13
*[Manually download and install](#install-the-agent-manually) the agent. This is required when the Linux computer does not have access to the Internet and will be communicating with Azure Monitor or Azure Automation through the [Log Analytics gateway](./gateway.md).
17
14
15
+
The installation methods described in this article are typically used for virtual machines on-premises or in other clouds. See [Installation options](./log-analytics-agent.md#installation-options) for more efficient options you can use for Azure virtual machines.
16
+
18
17
>[!IMPORTANT]
19
-
> The installation methods described in this article are typically used for virtual machines on-premises or in other clouds. See [Installation options](./log-analytics-agent.md#installation-options) for more efficient options you can use for Azure virtual machines.
18
+
> The Log Analytics agents are on a **deprecation path** and will no longer be supported after **August 31, 2024**. If you use the Log Analytics agents to ingest data to Azure Monitor, make sure to [migrate to the new Azure Monitor agent](./azure-monitor-agent-migration.md) prior to that date.
0 commit comments