Skip to content

Commit f461f70

Browse files
Add info about autoConfigureDataProtection
1 parent bb91a3b commit f461f70

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

articles/container-apps/dotnet-overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,8 @@ For a chance to implement custom logic to determine the health of your applicati
112112

113113
By default, Azure Container Apps automatically scales your ASP.NET Core apps based on the number of incoming HTTP requests. You can also configure custom autoscaling rules based on other metrics, such as CPU or memory usage. To learn more about scaling, see [Set scaling rules in Azure Container Apps](scale-app.md).
114114

115+
In .NET 8 and later, when a ASP.NET Core app that uses [Data Protection](/aspnet/core/security/data-protection/introduction) is deployed, the environment variable `autoConfigureDataProtection` is automatically set true. This setting starts a key manager and handles the writing and sharing keys across multiple instances when the app auto-scales. For more information, see [this GitHub pull request](https://github.com/Azure/azure-rest-api-specs/pull/28001). `autoConfigureDataProtection=true` allows ASP.NET Core apps that use Data Protection to scale horizontally when deployed to ACA by providing a default configuration.
116+
115117
Autoscaling changes the number of replicas of your app based on the rules you define. By default, Container Apps randomly routes incoming traffic to the replicas of your ASP.NET Core app. Since traffic can split among different replicas, your app should be stateless so your application doesn't experience state-related issues.
116118

117119
Features such as anti-forgery, authentication, SignalR, Blazor Server, and Razor Pages depend on data protection require extra configuration to work correctly when scaling to multiple replicas.

0 commit comments

Comments
 (0)