You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/includes/configure-azure-storage/azure-storage-linux-container-pivot.md
+28-28Lines changed: 28 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
author: msangapu-msft
3
3
ms.service: azure-app-service
4
4
ms.topic: include
5
-
ms.date: 01/23/2026
5
+
ms.date: 02/09/2026
6
6
ms.author: msangapu
7
7
ms.custom:
8
8
- linux-related-content
@@ -45,8 +45,8 @@ You need to mount the storage to the app. Here are three mounting options for Az
45
45
| Mounting option | Usage |
46
46
|:----------------|:------|
47
47
| Basic | Choose this option to mount storage using the Azure portal. You can use the basic option as long as the storage account doesn't use [service endpoints](../../../storage/common/storage-network-security.md#grant-access-from-a-virtual-network), [private endpoints](../../../storage/common/storage-private-endpoints.md), or [Azure Key Vault](/azure/key-vault/general/overview). In this case, the portal gets and stores the access key for you. |
48
-
| Access Key | If you plan to mount storage using the Azure CLI, you need to obtain an access key. Choose this option if storage account doesn't use [service endpoints](../../../storage/common/storage-network-security.md#grant-access-from-a-virtual-network), [private endpoints](../../../storage/common/storage-private-endpoints.md), or [Azure Key Vault](/azure/key-vault/general/overview). |
49
-
| Key Vault | Also use this option when you plan to mount storage using the Azure CLI, which requires the access key. Choose this option when you use Azure Key Vault to securely store and retrieve access keys. [Azure Key Vault](/azure/key-vault/general/overview) has the benefits of storing application secrets centrally and securely with the ability to monitor, administer, and integrate with other Azure services like Azure App Service. |
48
+
| Access Key | If you plan to mount storage by using the Azure CLI, you need to get an access key. Choose this option if the storage account doesn't use [service endpoints](../../../storage/common/storage-network-security.md#grant-access-from-a-virtual-network), [private endpoints](../../../storage/common/storage-private-endpoints.md), or [Azure Key Vault](/azure/key-vault/general/overview). |
49
+
| Key Vault | Also use this option when you plan to mount storage by using the Azure CLI, which requires the access key. Choose this option when you use Azure Key Vault to securely store and retrieve access keys. [Azure Key Vault](/azure/key-vault/general/overview) has the benefits of storing application secrets centrally and securely with the ability to monitor, administer, and integrate with other Azure services like Azure App Service. |
50
50
51
51
## Prerequisites
52
52
@@ -79,17 +79,17 @@ No extra steps are required because the portal gets and stores the access key fo
79
79
80
80
### [Access Key](#tab/access-key)
81
81
82
-
You need to obtain the access key from your storage account.
82
+
You need to get the access key from your storage account.
83
83
84
84
### [Key Vault](#tab/key-vault)
85
85
86
-
Before you can mount storage using Key Vault access, you need to get the Key Vault secret and add it as an application setting in your app.
86
+
Before you can mount storage by using Key Vault access, you need to get the Key Vault secret and add it as an application setting in your app.
87
87
88
88
1. In the Azure portal, browse to your Key Vault. Select **Objects** > **Secrets**. Copy the **Secret Identifier** to your clipboard.
89
89
90
90
:::image type="content" source="../../media/configure-azure-storage/key-vault-secret-identifier.png" alt-text="Screenshot of Key Vault secret identifier.":::
91
91
92
-
1. Back in your app, follow the [key vault reference](../../app-service-key-vault-references.md#source-app-settings-from-key-vault) to create an [**application setting**](../../configure-common.md#configure-app-settings) using the **Secret Identifier**.
92
+
1. Back in your app, follow the [key vault reference](../../app-service-key-vault-references.md#source-app-settings-from-key-vault) to create an [**application setting**](../../configure-common.md#configure-app-settings)by using the **Secret Identifier**.
93
93
94
94
Example app setting value: `@Microsoft.KeyVault(SecretUri=https://mykeyvault.vault.azure.net/secrets/mykeyvaultsecret/aaaaaaaa0b0b1c1c2d2d333333333333)`
95
95
@@ -103,13 +103,13 @@ The way that you mount storage depends on your storage access option and whether
103
103
104
104
# [Azure portal](#tab/portal/basic)
105
105
106
-
1. In the [Azure portal](https://portal.azure.com), navigate to the app.
107
-
1. From the left navigation, select **Settings** > **Configuration**. Select **Path mappings**, then **New Azure Storage Mount**.
106
+
1. In the [Azure portal](https://portal.azure.com), go to the app.
107
+
1. From the left navigation, select **Settings** > **Configuration**. Select **Path mappings**, and then select**New Azure Storage Mount**.
108
108
1. Configure the storage mount according to the following table. When finished, select **OK**.
109
109
110
110
| Setting | Description |
111
111
|:--------|:------------|
112
-
|**Name**| Name of the mount configuration. Spaces aren't allowed. |
112
+
|**Name**| Name of the mount configuration. Don't use spaces. |
113
113
|**Configuration options**| Select **Basic** if the storage account doesn't use [service endpoints](../../../storage/common/storage-network-security.md#grant-access-from-a-virtual-network), [private endpoints](../../../storage/common/storage-private-endpoints.md), or [Azure Key Vault](/azure/key-vault/general/overview). Otherwise, select **Advanced**. |
114
114
|**Storage accounts**| Azure Storage account. |
115
115
|**Storage type**| Select the type based on the storage you want to mount. Azure Blobs only supports read-only access. |
@@ -119,13 +119,13 @@ The way that you mount storage depends on your storage access option and whether
119
119
120
120
# [Azure portal](#tab/portal/access-key)
121
121
122
-
1. In the [Azure portal](https://portal.azure.com), navigate to the app.
123
-
1. From the left navigation, select **Settings** > **Configuration**. Select **Path mappings**, then **New Azure Storage Mount**.
122
+
1. In the [Azure portal](https://portal.azure.com), go to the app.
123
+
1. From the left navigation, select **Settings** > **Configuration**. Select **Path mappings**, and then select**New Azure Storage Mount**.
124
124
1. Configure the storage mount according to the following table. When finished, select **OK**.
125
125
126
126
| Setting | Description |
127
127
|:--------|:------------|
128
-
|**Name**| Name of the mount configuration. Spaces aren't allowed. |
128
+
|**Name**| Name of the mount configuration. Don't use spaces. |
-Disabling auto‑recovery is not recommended unless troubleshooting specific mount behavior.
245
+
-Don't disable auto‑recovery unless you're troubleshooting specific mount behavior.
246
246
247
247
## Best practices
248
248
249
249
### Performance
250
250
251
-
- To avoid latency issues, place the app and the Azure Storage account in the same region. If you grant access from App Service IP addresses in the [Azure Storage firewall configuration](../../../storage/common/storage-network-security.md) when the app and Azure Storage account are in the same region, then these IP restrictions aren't honored.
251
+
- To avoid latency problems, place the app and the Azure Storage account in the same region. If you grant access from App Service IP addresses in the [Azure Storage firewall configuration](../../../storage/common/storage-network-security.md) when the app and Azure Storage account are in the same region, these IP restrictions aren't honored.
252
252
- The mounted Azure Storage account can be either Standard or Premium performance tier. Based on the app capacity and throughput requirements, choose the appropriate performance tier for the storage account. See the scalability and performance targets that correspond to the storage type: [Files](../../../storage/files/storage-files-scale-targets.md) and [Blobs](../../../storage/blobs/scalability-targets.md).
253
253
254
-
- If your app [scales to multiple instances](/azure/azure-monitor/autoscale/autoscale-get-started), all the instances connect to the same mounted Azure Storage account. To avoid performance bottlenecks and throughput issues, choose the appropriate performance tier for the storage account.
254
+
- If your app [scales to multiple instances](/azure/azure-monitor/autoscale/autoscale-get-started), all the instances connect to the same mounted Azure Storage account. To avoid performance bottlenecks and throughput problems, choose the appropriate performance tier for the storage account.
255
255
256
256
### Security
257
257
@@ -268,9 +268,9 @@ You can customize health‑check behavior using the following app settings.
268
268
### Troubleshooting
269
269
270
270
- The mount directory in the custom container should be empty. Any content stored at this path is deleted when the Azure Storage is mounted, if you specify a directory under */home*, for example. If you migrate files for an existing app, make a backup of the app and its content before you begin.
271
-
- When mounting an NFS share, you'll need to ensure that Secure Transfer Required is disabled on the storage account. App Service doesn't support mounting NFS shares when this is enabled. It uses port 2409 and virtual network integration and private endpoints as the security measure.
271
+
- When mounting an NFS share, you need to ensure that Secure Transfer Required is disabled on the storage account. App Service doesn't support mounting NFS shares when this setting is enabled. It uses port 2409 and virtual network integration and private endpoints as the security measure.
272
272
- If you delete an Azure Storage account, container, or share, remove the corresponding storage mount configuration in the app to avoid possible error scenarios.
273
-
-We don't recommend that you use storage mounts for local databases, such as SQLite, or for any other applications and components that rely on file handles and locks.
273
+
-Don't use storage mounts for local databases, such as SQLite, or for any other applications and components that rely on file handles and locks.
274
274
- Ensure the following ports are open when using virtual network integration: Azure Files: 80 and 445. Azure Blobs: 80 and 443.
275
275
- If you [initiate a storage failover](../../../storage/common/storage-initiate-account-failover.md) when the storage account is mounted to the app, the mount doesn't connect until the app is restarted or the storage mount is removed and added again.
0 commit comments