Skip to content

Commit 09a7643

Browse files
authored
Merge pull request #311622 from MicrosoftDocs/main
Auto Publish – main to live - 2026-02-10 18:00 UTC
2 parents a3c17a8 + dbdb2f5 commit 09a7643

16 files changed

Lines changed: 249 additions & 220 deletions

articles/app-service/configure-connect-to-azure-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: msangapu-msft
55

66
ms.topic: how-to
77
ms.custom: devx-track-azurecli, linux-related-content
8-
ms.date: 03/04/2025
8+
ms.date: 02/09/2026
99
ms.author: msangapu
1010
zone_pivot_groups: app-service-containers-code
1111
#customer intent: As an app designer, I want to be able to mount Azure Storage to support my web apps in Azure App Service.

articles/app-service/includes/configure-azure-storage/azure-storage-linux-container-pivot.md

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: msangapu-msft
33
ms.service: azure-app-service
44
ms.topic: include
5-
ms.date: 01/23/2026
5+
ms.date: 02/09/2026
66
ms.author: msangapu
77
ms.custom:
88
- linux-related-content
@@ -45,8 +45,8 @@ You need to mount the storage to the app. Here are three mounting options for Az
4545
| Mounting option | Usage |
4646
|:----------------|:------|
4747
| Basic | Choose this option to mount storage using the Azure portal. You can use the basic option as long as the storage account doesn't use [service endpoints](../../../storage/common/storage-network-security.md#grant-access-from-a-virtual-network), [private endpoints](../../../storage/common/storage-private-endpoints.md), or [Azure Key Vault](/azure/key-vault/general/overview). In this case, the portal gets and stores the access key for you. |
48-
| Access Key | If you plan to mount storage using the Azure CLI, you need to obtain an access key. Choose this option if storage account doesn't use [service endpoints](../../../storage/common/storage-network-security.md#grant-access-from-a-virtual-network), [private endpoints](../../../storage/common/storage-private-endpoints.md), or [Azure Key Vault](/azure/key-vault/general/overview). |
49-
| Key Vault | Also use this option when you plan to mount storage using the Azure CLI, which requires the access key. Choose this option when you use Azure Key Vault to securely store and retrieve access keys. [Azure Key Vault](/azure/key-vault/general/overview) has the benefits of storing application secrets centrally and securely with the ability to monitor, administer, and integrate with other Azure services like Azure App Service. |
48+
| Access Key | If you plan to mount storage by using the Azure CLI, you need to get an access key. Choose this option if the storage account doesn't use [service endpoints](../../../storage/common/storage-network-security.md#grant-access-from-a-virtual-network), [private endpoints](../../../storage/common/storage-private-endpoints.md), or [Azure Key Vault](/azure/key-vault/general/overview). |
49+
| Key Vault | Also use this option when you plan to mount storage by using the Azure CLI, which requires the access key. Choose this option when you use Azure Key Vault to securely store and retrieve access keys. [Azure Key Vault](/azure/key-vault/general/overview) has the benefits of storing application secrets centrally and securely with the ability to monitor, administer, and integrate with other Azure services like Azure App Service. |
5050

5151
## Prerequisites
5252

@@ -79,17 +79,17 @@ No extra steps are required because the portal gets and stores the access key fo
7979

8080
### [Access Key](#tab/access-key)
8181

82-
You need to obtain the access key from your storage account.
82+
You need to get the access key from your storage account.
8383

8484
### [Key Vault](#tab/key-vault)
8585

86-
Before you can mount storage using Key Vault access, you need to get the Key Vault secret and add it as an application setting in your app.
86+
Before you can mount storage by using Key Vault access, you need to get the Key Vault secret and add it as an application setting in your app.
8787

8888
1. In the Azure portal, browse to your Key Vault. Select **Objects** > **Secrets**. Copy the **Secret Identifier** to your clipboard.
8989

9090
:::image type="content" source="../../media/configure-azure-storage/key-vault-secret-identifier.png" alt-text="Screenshot of Key Vault secret identifier.":::
9191

92-
1. Back in your app, follow the [key vault reference](../../app-service-key-vault-references.md#source-app-settings-from-key-vault) to create an [**application setting**](../../configure-common.md#configure-app-settings) using the **Secret Identifier**.
92+
1. Back in your app, follow the [key vault reference](../../app-service-key-vault-references.md#source-app-settings-from-key-vault) to create an [**application setting**](../../configure-common.md#configure-app-settings) by using the **Secret Identifier**.
9393

9494
Example app setting value: `@Microsoft.KeyVault(SecretUri=https://mykeyvault.vault.azure.net/secrets/mykeyvaultsecret/aaaaaaaa0b0b1c1c2d2d333333333333)`
9595

@@ -103,13 +103,13 @@ The way that you mount storage depends on your storage access option and whether
103103

104104
# [Azure portal](#tab/portal/basic)
105105

106-
1. In the [Azure portal](https://portal.azure.com), navigate to the app.
107-
1. From the left navigation, select **Settings** > **Configuration**. Select **Path mappings**, then **New Azure Storage Mount**.
106+
1. In the [Azure portal](https://portal.azure.com), go to the app.
107+
1. From the left navigation, select **Settings** > **Configuration**. Select **Path mappings**, and then select **New Azure Storage Mount**.
108108
1. Configure the storage mount according to the following table. When finished, select **OK**.
109109

110110
| Setting | Description |
111111
|:--------|:------------|
112-
| **Name** | Name of the mount configuration. Spaces aren't allowed. |
112+
| **Name** | Name of the mount configuration. Don't use spaces. |
113113
| **Configuration options** | Select **Basic** if the storage account doesn't use [service endpoints](../../../storage/common/storage-network-security.md#grant-access-from-a-virtual-network), [private endpoints](../../../storage/common/storage-private-endpoints.md), or [Azure Key Vault](/azure/key-vault/general/overview). Otherwise, select **Advanced**. |
114114
| **Storage accounts** | Azure Storage account. |
115115
| **Storage type** | Select the type based on the storage you want to mount. Azure Blobs only supports read-only access. |
@@ -119,13 +119,13 @@ The way that you mount storage depends on your storage access option and whether
119119

120120
# [Azure portal](#tab/portal/access-key)
121121

122-
1. In the [Azure portal](https://portal.azure.com), navigate to the app.
123-
1. From the left navigation, select **Settings** > **Configuration**. Select **Path mappings**, then **New Azure Storage Mount**.
122+
1. In the [Azure portal](https://portal.azure.com), go to the app.
123+
1. From the left navigation, select **Settings** > **Configuration**. Select **Path mappings**, and then select **New Azure Storage Mount**.
124124
1. Configure the storage mount according to the following table. When finished, select **OK**.
125125

126126
| Setting | Description |
127127
|:--------|:------------|
128-
| **Name** | Name of the mount configuration. Spaces aren't allowed. |
128+
| **Name** | Name of the mount configuration. Don't use spaces. |
129129
| **Configuration options** | Select **Advanced**. |
130130
| **Storage accounts** | Azure Storage account. |
131131
| **Storage type** | Select the type based on the storage you want to mount. Azure Blobs only supports read-only access. |
@@ -137,13 +137,13 @@ The way that you mount storage depends on your storage access option and whether
137137

138138
# [Azure portal](#tab/portal/key-vault)
139139

140-
1. In the [Azure portal](https://portal.azure.com), navigate to the app.
141-
1. From the left navigation, select **Settings** > **Configuration**. Select **Path mappings**, then **New Azure Storage Mount**.
140+
1. In the [Azure portal](https://portal.azure.com), go to the app.
141+
1. From the left navigation, select **Settings** > **Configuration**. Select **Path mappings**, and then select **New Azure Storage Mount**.
142142
1. Configure the storage mount according to the following table. When finished, select **OK**.
143143

144144
| Setting | Description |
145145
|:--------|:------------|
146-
| **Name** | Name of the mount configuration. Spaces aren't allowed. |
146+
| **Name** | Name of the mount configuration. Don't use spaces. |
147147
| **Configuration options** | Select **Advanced**. |
148148
| **Storage accounts** | Azure Storage account. |
149149
| **Storage type** | Select the type based on the storage you want to mount. Azure Blobs only supports read-only access. |
@@ -157,7 +157,7 @@ The way that you mount storage depends on your storage access option and whether
157157

158158
# [Azure CLI](#tab/cli/basic)
159159

160-
Using Azure CLI to mount storage requires you to provide the storage access key.
160+
To use Azure CLI to mount storage, you need to provide the storage access key.
161161

162162
# [Azure CLI](#tab/cli/access-key)
163163

@@ -183,11 +183,11 @@ The Azure CLI doesn't currently support mounting storage with Key Vault access.
183183
---
184184

185185
> [!NOTE]
186-
> Adding, editing, or deleting a storage mount causes the app to restart.
186+
> Adding, editing, or deleting a storage mount restarts the app.
187187
188188
## Validate the mounted storage
189189

190-
To validate that the Azure Storage is mounted successfully for the app:
190+
To validate that Azure Storage is mounted successfully for the app:
191191

192192
1. [Open an SSH session](../../configure-linux-open-ssh-session.md) into the container.
193193
1. In the SSH terminal, execute the following command:
@@ -197,7 +197,7 @@ To validate that the Azure Storage is mounted successfully for the app:
197197
```
198198

199199
1. Check if the storage share is mounted. If it's not present, there's an issue with mounting the storage share.
200-
1. Check latency or general reachability of the storage mount with the following command:
200+
1. Check latency or general reachability of the storage mount by using the following command:
201201

202202
```bash
203203
tcpping Storageaccount.file.core.windows.net
@@ -214,12 +214,12 @@ Azure App Service includes a built‑in health‑check mechanism to ensure that
214214
- **Location:** A `LogFiles` subdirectory under the mounted path (for example, `/mount/path/LogFiles/__lastCheckTime.txt`).
215215
- **Behavior:**
216216
- A read operation is attempted on this file.
217-
- The file does *not* need to exist—“file not found is treated as a successful check.
217+
- The file doesn't need to exist – "file not found" is treated as a successful check.
218218

219-
2. **Frequency**
219+
1. **Frequency**
220220
The check runs every **5 seconds** by default.
221221

222-
3. **Failure handling**
222+
1. **Failure handling**
223223
- Each failed or timed‑out check increments a *failed ping counter*.
224224
- When failures exceed the configured threshold:
225225
- **Azure Files:** 18 failed pings
@@ -228,7 +228,7 @@ Azure App Service includes a built‑in health‑check mechanism to ensure that
228228

229229
#### Configuration via App Settings
230230

231-
You can customize health‑check behavior using the following app settings.
231+
You can customize health‑check behavior by using the following app settings.
232232

233233
| Storage type | Setting name | Default value | Description |
234234
|--------------|--------------|---------------|-------------|
@@ -242,16 +242,16 @@ You can customize health‑check behavior using the following app settings.
242242

243243
#### Notes
244244
- Auto‑recovery helps prevent long‑running application hangs caused by unresponsive storage paths.
245-
- Disabling auto‑recovery is not recommended unless troubleshooting specific mount behavior.
245+
- Don't disable auto‑recovery unless you're troubleshooting specific mount behavior.
246246

247247
## Best practices
248248

249249
### Performance
250250

251-
- To avoid latency issues, place the app and the Azure Storage account in the same region. If you grant access from App Service IP addresses in the [Azure Storage firewall configuration](../../../storage/common/storage-network-security.md) when the app and Azure Storage account are in the same region, then these IP restrictions aren't honored.
251+
- To avoid latency problems, place the app and the Azure Storage account in the same region. If you grant access from App Service IP addresses in the [Azure Storage firewall configuration](../../../storage/common/storage-network-security.md) when the app and Azure Storage account are in the same region, these IP restrictions aren't honored.
252252
- The mounted Azure Storage account can be either Standard or Premium performance tier. Based on the app capacity and throughput requirements, choose the appropriate performance tier for the storage account. See the scalability and performance targets that correspond to the storage type: [Files](../../../storage/files/storage-files-scale-targets.md) and [Blobs](../../../storage/blobs/scalability-targets.md).
253253

254-
- If your app [scales to multiple instances](/azure/azure-monitor/autoscale/autoscale-get-started), all the instances connect to the same mounted Azure Storage account. To avoid performance bottlenecks and throughput issues, choose the appropriate performance tier for the storage account.
254+
- If your app [scales to multiple instances](/azure/azure-monitor/autoscale/autoscale-get-started), all the instances connect to the same mounted Azure Storage account. To avoid performance bottlenecks and throughput problems, choose the appropriate performance tier for the storage account.
255255

256256
### Security
257257

@@ -268,9 +268,9 @@ You can customize health‑check behavior using the following app settings.
268268
### Troubleshooting
269269

270270
- The mount directory in the custom container should be empty. Any content stored at this path is deleted when the Azure Storage is mounted, if you specify a directory under */home*, for example. If you migrate files for an existing app, make a backup of the app and its content before you begin.
271-
- When mounting an NFS share, you'll need to ensure that Secure Transfer Required is disabled on the storage account. App Service doesn't support mounting NFS shares when this is enabled. It uses port 2409 and virtual network integration and private endpoints as the security measure.
271+
- When mounting an NFS share, you need to ensure that Secure Transfer Required is disabled on the storage account. App Service doesn't support mounting NFS shares when this setting is enabled. It uses port 2409 and virtual network integration and private endpoints as the security measure.
272272
- If you delete an Azure Storage account, container, or share, remove the corresponding storage mount configuration in the app to avoid possible error scenarios.
273-
- We don't recommend that you use storage mounts for local databases, such as SQLite, or for any other applications and components that rely on file handles and locks.
273+
- Don't use storage mounts for local databases, such as SQLite, or for any other applications and components that rely on file handles and locks.
274274
- Ensure the following ports are open when using virtual network integration: Azure Files: 80 and 445. Azure Blobs: 80 and 443.
275275
- If you [initiate a storage failover](../../../storage/common/storage-initiate-account-failover.md) when the storage account is mounted to the app, the mount doesn't connect until the app is restarted or the storage mount is removed and added again.
276276

0 commit comments

Comments
 (0)