You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/deploy-staging-slots.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -547,6 +547,13 @@ Here are some common swap errors:
547
547
548
548
- Local cache initialization might fail when the app content exceeds the local disk quota specified for the local cache. For more information, see [Local cache overview](overview-local-cache.md).
549
549
550
+
- During a site update operation, the following error may occur "_The slot cannot be changed because its configuration settings have been prepared for swap_". This can occur if either [swap with preview (multi-phase swap)](#swap-with-preview-multi-phase-swap) phase 1 has been completed but phase 2 has not yet been performed, or a swap has failed. There are two ways resolve the issue:
551
+
552
+
1. Cancel the swap operation which will reset the site back to the old state
553
+
1. Complete the swap operation which will update site to the desired new state
554
+
555
+
Refer to [swap with preview (multi-phase swap)](#swap-with-preview-multi-phase-swap) to learn how to cancel or complete the swap operation.
556
+
550
557
- During [custom warm-up](#Warm-up), the HTTP requests are made internally (without going through the external URL). They can fail with certain URL rewrite rules in *Web.config*. For example, rules for redirecting domain names or enforcing HTTPS can prevent warm-up requests from reaching the app code. To work around this issue, modify your rewrite rules by adding the following two conditions:
- A Node.js Express application. Create the sample app using our [quickstart](/azure/app-service/quickstart-nodejs?tabs=linux&pivots=development-environment-vscode).
17
17
18
18
### Set up web app
19
19
20
-
For this application, we’re building off the [quickstart](/azure/app-service/quickstart-nodejs?tabs=linux&pivots=development-environment-vscode) Express app and adding an extra feature to make a request to an Azure OpenAI or OpenAI service.
20
+
For this application, we're building off the [quickstart](/azure/app-service/quickstart-nodejs?tabs=linux&pivots=development-environment-vscode) Express app and adding an extra feature to make a request to an Azure OpenAI or OpenAI service.
21
21
22
22
First, copy and replace the `index.ejs` file with the following code:
23
23
@@ -48,7 +48,7 @@ The previous code will add an input box to our index page to submit requests to
48
48
49
49
First, you need to grab the keys and endpoint values from Azure OpenAI, or OpenAI and add them as secrets for use in your application. Retrieve and save the values for later use to build the client.
50
50
51
-
For Azure OpenAI, see[this documentation](/azure/ai-services/openai/quickstart?pivots=programming-language-csharp&tabs=command-line%2Cpython#retrieve-key-and-endpoint) to retrieve the key and endpoint values. If you’re planning to use managed identity to secure your app you’ll only need the `deploymentName` and `apiVersion` values.
51
+
For Azure OpenAI, see[this documentation](/azure/ai-services/openai/quickstart?pivots=programming-language-csharp&tabs=command-line%2Cpython#retrieve-key-and-endpoint) to retrieve the key and endpoint values. If you're planning to use managed identity to secure your app you'll only need the `deploymentName` and `apiVersion` values.
52
52
53
53
Otherwise, you need each of the following:
54
54
@@ -63,9 +63,9 @@ For OpenAI, see this documentation to retrieve the API keys. For our application
63
63
64
64
-`apiKey`
65
65
66
-
Since we're deploying to App Service, we can secure these secrets in **Azure Key Vault** for protection. Follow the[Quickstart](/azure/key-vault/secrets/quick-create-cli#create-a-key-vault) to set up your Key Vault and add the secrets you saved from earlier.
66
+
Since we're deploying to App Service, we can secure these secrets in **Azure Key Vault** for protection. Follow the[Quickstart](/azure/key-vault/secrets/quick-create-cli#create-a-key-vault) to set up your Key Vault and add the secrets you saved from earlier.
67
67
68
-
Next, we can use Key Vault references as app settings in our App Service resource to reference in our application. Follow the instructions in the[documentation](../../app-service-key-vault-references.md?source=recommendations&tabs=azure-cli) to grant your app access to your Key Vault and to set up Key Vault references.
68
+
Next, we can use Key Vault references as app settings in our App Service resource to reference in our application. Follow the instructions in the[documentation](../../app-service-key-vault-references.md?source=recommendations&tabs=azure-cli) to grant your app access to your Key Vault and to set up Key Vault references.
69
69
70
70
Then, go to the portal Environment Variables page in your resource and add the following app settings:
71
71
@@ -149,7 +149,7 @@ import OpenAI from 'openai';
149
149
150
150
### Secure your app with managed identity
151
151
152
-
Although optional, it's highly recommended to secure your application using[managed identity](../../overview-managed-identity.md) to authenticate your app to your Azure OpenAI resource. Skip this step if you are not using Azure OpenAI. This enables your application to access the Azure OpenAI resource without needing to manage API keys.
152
+
Although optional, it's highly recommended to secure your application using[managed identity](../../overview-managed-identity.md) to authenticate your app to your Azure OpenAI resource. Skip this step if you are not using Azure OpenAI. This enables your application to access the Azure OpenAI resource without needing to manage API keys.
153
153
154
154
Follow the steps below to secure your application:
155
155
@@ -177,14 +177,14 @@ Create the Azure OpenAI client with the token provider.
177
177
178
178
Once the credentials are added to the application, enable managed identity in your application and grant access to the resource:
179
179
180
-
1. In your web app resource, navigate to the **Identity** blade and turn on **System assigned** and select **Save**.
180
+
1. In your web app resource, navigate to the **Identity** blade and turn on **System assigned** and select **Save**.
181
181
2. Once System assigned identity is turned on, it will register the web app with Microsoft Entra ID and the web app can be granted permissions to access protected resources.
182
-
3. Go to your Azure OpenAI resource and navigate to the **Access control (IAM)** page on the left pane.
183
-
4. Find the **Grant access to this resource** card and select **Add role assignment**.
184
-
5. Search for the **Cognitive Services OpenAI User** role and select **Next**.
185
-
6. On the **Members** tab, find **Assign access to** and choose the **Managed identity** option.
186
-
7. Next, select **+Select Members** and find your web app.
187
-
8. Select **Review + assign**.
182
+
3. Go to your Azure OpenAI resource and navigate to the **Access control (IAM)** page on the left pane.
183
+
4. Find the **Grant access to this resource** card and select **Add role assignment**.
184
+
5. Search for the **Cognitive Services OpenAI User** role and select **Next**.
185
+
6. On the **Members** tab, find **Assign access to** and choose the **Managed identity** option.
186
+
7. Next, select **+Select Members** and find your web app.
187
+
8. Select **Review + assign**.
188
188
189
189
Your web app is now added as a cognitive service OpenAI user and can communicate to your Azure OpenAI resource.
This post function will create the OpenAI client and add the message being sent to OpenAI with a returned response.
238
238
239
-
Here’s the example in it’s complete form. In this example, use the Azure OpenAI chat completion service OR the OpenAI chat completion service, not both.
239
+
Here's the example in it's complete form. In this example, use the Azure OpenAI chat completion service OR the OpenAI chat completion service, not both.
240
240
241
241
```jsx
242
242
var createError =require('http-errors');
@@ -339,6 +339,6 @@ Once the app is deployed, you can visit your site URL and see the text that cont
339
339
340
340
### Authentication
341
341
342
-
Although optional, it's highly recommended that you also add authentication to your web app when using an Azure OpenAI or OpenAI service. This can add a level of security with no other code. Learn how to enable authentication for your web app[here](../../scenario-secure-app-authentication-app-service.md).
342
+
Although optional, it's highly recommended that you also add authentication to your web app when using an Azure OpenAI or OpenAI service. This can add a level of security with no other code. Learn how to enable authentication for your web app[here](../../scenario-secure-app-authentication-app-service.md).
343
343
344
-
Once deployed, browse to the web app and navigate to the OpenAI tab. Enter a query to the service and you should see a populated response from the server. The tutorial is now complete and you now know how to use OpenAI services to create intelligent applications.
344
+
Once deployed, browse to the web app and navigate to the OpenAI tab. Enter a query to the service and you should see a populated response from the server. The tutorial is now complete and you now know how to use OpenAI services to create intelligent applications.
Copy file name to clipboardExpand all lines: articles/application-gateway/classic-to-resource-manager.md
+37-12Lines changed: 37 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,27 +1,27 @@
1
1
---
2
-
title: Application Gateway classic to Resource Manager
3
-
description: Learn about moving Application Gateway resources from the classic deployment model to the Resource Manager deployment model.
2
+
title: Azure Application Gateway classic to Resource Manager
3
+
description: Learn about moving Azure Application Gateway resources from the classic deployment model to the Resource Manager deployment model.
4
4
services: application-gateway
5
5
author: greg-lindsay
6
6
ms.service: azure-application-gateway
7
7
ms.topic: how-to
8
-
ms.date: 06/27/2024
8
+
ms.date: 10/02/2024
9
9
ms.author: greglin
10
10
---
11
11
12
-
# Application Gateway classic to Resource Manager migration
12
+
# Application gateway classic to Resource Manager migration
13
13
14
14
Resource Manager enables deploying complex applications through templates, configures virtual machines by using VM extensions, and incorporates access management and tagging. Azure Resource Manager includes scalable, parallel deployment for virtual machines into availability sets. The new deployment model also provides lifecycle management of compute, network, and storage independently.
15
15
You can read more about Azure Resource Manager [features and benefits](../azure-resource-manager/management/overview.md).
16
16
17
-
Application Gateway resources will**not** be migrated automatically as part of VNet migration from classic to Resource Manager.
18
-
As part of VNet migration process as documented at [IaaS resources migration page](/azure/virtual-machines/migration-classic-resource-manager-ps), if you have an Application Gateway resource present on the VNet that you're trying to migrate to Resource Manager deployment model, the automatic migration wouldn't be successful.
17
+
Application gateway resources are**not** migrated automatically as part of VNet migration from classic to Resource Manager.
18
+
As part of VNet migration process as documented at [IaaS resources migration page](/azure/virtual-machines/migration-classic-resource-manager-ps), if you have an application gateway resource present on the VNet that you're trying to migrate to Resource Manager deployment model, the automatic migration wouldn't be successful.
19
19
20
-
In order to migrate your Application Gateway resource to Resource Manager deployment model, you'll have to remove the Application Resource from the VNet before beginning migration and then recreate the Application Gateway resource once migration is complete.
20
+
To migrate your application gateway resource to Resource Manager deployment model, you'll have to remove the Application Resource from the VNet before beginning migration and then recreate the application gateway resource once migration is complete.
21
21
22
-
## Creating a new Application Gateway resource
22
+
## Creating a new application gateway resource
23
23
24
-
For more information on how to set up an Application Gateway resource after VNet migration, you can refer:
24
+
For more information on how to set up an application gateway resource after VNet migration, you can refer:
25
25
26
26
*[Deployment via portal](quick-create-portal.md)
27
27
*[Deployment via PowerShell](quick-create-powershell.md)
@@ -43,13 +43,38 @@ Azure Resource Manager is the latest control plane of Azure responsible for crea
43
43
44
44
### Where can I find more information regarding classic to Azure Resource Manager migration?
45
45
46
-
Please refer to [Frequently asked questions about classic to Azure Resource Manager migration](/azure/virtual-machines/migration-classic-resource-manager-faq)
46
+
Refer to [Frequently asked questions about classic to Azure Resource Manager migration](/azure/virtual-machines/migration-classic-resource-manager-faq)
47
+
48
+
### How can I clean up my classic application gateway deployment?
49
+
50
+
Step 1: Install the old PowerShell version for managing legacy resources.
51
+
52
+
[Installing the Azure PowerShell Service Management module](/powershell/azure/servicemanagement/install-azure-ps)
53
+
54
+
> [!NOTE]
55
+
> The cmdlets referenced in this documentation are for managing legacy Azure resources that use Azure Service Manager (ASM) APIs. This legacy PowerShell module isn't recommended for creating new resources since ASM is scheduled for retirement.
56
+
57
+
Step 2: Run the following command to remove the application gateway.
Post your issues and questions about migration to our [Microsoft Q&A page](/answers/topics/azure-virtual-network.html). We recommend posting all your questions on this forum. If you have a support contract, you're welcome to log a support ticket as well.
51
76
52
77
## Next steps
53
-
To get started see: [platform-supported migration of IaaS resources from classic to Resource Manager](/azure/virtual-machines/migration-classic-resource-manager-ps)
78
+
To get started, see: [platform-supported migration of IaaS resources from classic to Resource Manager](/azure/virtual-machines/migration-classic-resource-manager-ps)
54
79
55
-
For any concerns around migration, you can contact Azure Support. Learn more about [Azure support here](https://azure.microsoft.com/support/options/).
80
+
For any concerns around migration, you can contact Azure Support. Learn more about [Azure support here](https://azure.microsoft.com/support/options/).
| Scale | Max. connections per second<br>Number of listeners<br>Number of backend pools<br>Number of backend servers per pool<br>Number of rules | 200<sup>1</sup><br>5<br>5<br>5<br>5 | 62500<sup>1</sup><br>100<br>100<br>1200<br>400 |
57
57
| Capacity Unit | Connections per second per compute unit<br>Throughput<br>Persistent new connections | 10<br>2.22 Mbps<br>2500 | 50<br>2.22 Mbps<br>2500 |
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-azure-active-directory-for-authentication.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,9 +63,12 @@ Using Microsoft Entra is the secure way to connect your cache. We recommend that
63
63
64
64
When you disable access key authentication for a cache, all existing client connections are terminated, whether they use access keys or Microsoft Entra authentication. Follow the recommended Redis client best practices to implement proper retry mechanisms for reconnecting Microsoft Entra-based connections, if any.
65
65
66
-
Before you disable access keys:
66
+
### Before you disable access keys:
67
67
68
-
- Microsoft Entra authorization must be enabled.
68
+
- Ensure that Microsoft Entra authentication is enabled and you have at least one Redis User configured.
69
+
- Ensure all applications connecting to your cache instance switch to using Microsoft Entra Authentication.
70
+
- Ensure that the metrics _Connected Clients_ and _Connected Clients Using Microsoft Entra Token_ have the same values. If the values for these two metrics are not the same, that means there are still some connections that were created using access keys and not Entra Token.
71
+
- Consider disabling access during the scheduled maintenance window for your cache instance.
69
72
- Disabling access keys is only available for Basic, Standard, and Premium tier caches.
Copy file name to clipboardExpand all lines: articles/azure-functions/flex-consumption-plan.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -145,6 +145,7 @@ Keep these other considerations in mind when using Flex Consumption plan during
145
145
+**Scale**: The lowest maximum scale in preview is `40`. The highest currently supported value is `1000`.
146
146
+**Managed dependencies**: [Managed dependencies in PowerShell](functions-reference-powershell.md#dependency-management) aren't supported by Flex Consumption. You must instead [define your own custom modules](functions-reference-powershell.md#custom-modules).
147
147
+**Diagnostic settings**: Diagnostic settings are not currently supported.
148
+
+**Certificates**: Loading certificates with the WEBSITE_LOAD_CERTIFICATES app setting is currently not supported.
Copy file name to clipboardExpand all lines: articles/azure-government/compliance/azure-services-in-fedramp-auditscope.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ Microsoft Azure cloud environments meet demanding US government compliance requi
30
30
-[DoD IL4](/azure/compliance/offerings/offering-dod-il4) PA issued by DISA
31
31
-[DoD IL5](/azure/compliance/offerings/offering-dod-il5) PA issued by DISA
32
32
33
-
For current Azure Government regions and available services, see [Products available by region](https://azure.microsoft.com/global-infrastructure/services/?products=all®ions=non-regional,usgov-non-regional,us-dod-central,us-dod-east,usgov-arizona,usgov-texas,usgov-virginia&rar=true).
33
+
For current Azure Government regions and available services, see [Products available by region](https://go.microsoft.com/fwlink/?linkid=2274941&clcid=0x409).
0 commit comments