You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-functions/durable/tutorial-durable-text-analysis-azure-files.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,11 +75,14 @@ This sample is an [Azure Developer CLI (azd)](/azure/developer/azure-developer-c
75
75
76
76
When prompted, selectthe Azure subscription and location to use. The command then:
77
77
78
-
- Creates a resource group, storage account, Flex Consumption functionapp with a Durable Functions configuration, Application Insights instance, and managed identity
78
+
- Creates a resource group, storage account, Key Vault, Flex Consumption functionapp with a Durable Functions configuration, Application Insights instance, and managed identity
79
79
- Deploys the Python functioncode
80
80
- Uploads sample text files to the Azure Files share
81
81
- Runs a health check
82
82
83
+
> [!NOTE]
84
+
> Because Azure Files SMB mounts don't yet support managed identity authentication, a storage account key is required. As a best practice, the deployment stores this key in [Azure Key Vault](/azure/key-vault/general/overview) and uses a [Key Vault reference](/azure/app-service/app-service-key-vault-references) so the key is never exposed in app settings. This approach provides centralized secret management, auditing, and support for key rotation.
85
+
83
86
The deployment takes a few minutes. When it completes, you see a summary of the created resources.
84
87
85
88
1. Save resource names as shell variables for the remaining steps:
Copy file name to clipboardExpand all lines: articles/azure-functions/tutorial-ffmpeg-processing-azure-files.md
+11-4Lines changed: 11 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,13 +61,17 @@ The three key pieces that make OS mount–based processing work are the infrastr
61
61
62
62
### Mount configuration (Bicep)
63
63
64
-
The `mounts.bicep` module configures an Azure Files SMB mount on the functionapp. The `mountPath` value determines the local path where files appear at runtime:
64
+
The `mounts.bicep` module configures an Azure Files SMB mount on the functionapp. The `mountPath` value determines the local path where files appear at runtime. The storage account access key is passed in as a parameter that the platform resolves at runtime via a Key Vault reference:
The mount is invoked from `main.bicep`with the share name and path:
68
+
Because Azure Files SMB mounts don't yet support managed identity authentication, a storage account key is required. As a best practice, the deployment stores this key in Azure Key Vault and uses a [Key Vault reference](/azure/app-service/app-service-key-vault-references) in an app setting. The mount configuration references that app setting with `@AppSettingRef()`, so the key is never exposed in your Bicep templates. The `keyvault.bicep` module creates the vault, stores the key, and grants RBAC roles:
@@ -100,12 +104,15 @@ This sample is an [Azure Developer CLI (azd)](/azure/developer/azure-developer-c
100
104
101
105
When prompted, selectthe Azure subscription and location to use. The command then:
102
106
103
-
- Creates a resource group, storage account, Flex Consumption function app, Application Insights instance, and managed identity.
107
+
- Creates a resource group, storage account, Key Vault, Flex Consumption functionapp, Application Insights instance, and managed identity.
104
108
- Deploys the Python functioncode.
105
109
- Downloads and uploads the ffmpeg binary to the Azure Files share.
106
110
- Creates an EventGrid subscription so blob uploads trigger your function.
107
111
- Runs a health check.
108
112
113
+
> [!NOTE]
114
+
> Because Azure Files SMB mounts don't yet support managed identity authentication, a storage account key is required. As a best practice, the deployment stores this key in [Azure Key Vault](/azure/key-vault/general/overview) and uses a [Key Vault reference](/azure/app-service/app-service-key-vault-references) so the key is never exposed in app settings. This approach provides centralized secret management, auditing, and support for key rotation.
115
+
109
116
The deployment takes a few minutes. When it completes, you see a summary of the created resources.
110
117
111
118
1. Save resource names as shell variables for the remaining steps:
0 commit comments