You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/app-service-configuration-references.md
+59-9Lines changed: 59 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Set up Azure App Service and Azure Functions to use App Configurati
4
4
author: muksvso
5
5
6
6
ms.topic: how-to
7
-
ms.date: 05/08/2025
7
+
ms.date: 03/30/2026
8
8
ms.author: mubatra
9
9
10
10
#customer intent: As a developer, I want to use Azure App Configuration references so that I can make configuration key/value pairs available to code.
@@ -17,6 +17,20 @@ ms.custom: sfi-ropc-nochange
17
17
18
18
This article shows how to work with configuration data in Azure App Service or Azure Functions applications without making any code changes. [Azure App Configuration](../azure-app-configuration/overview.md) is an Azure service that you can use to centrally manage application configuration. It's also an effective tool for auditing your configuration values over time or across releases.
19
19
20
+
## Important notes for Azure Functions local development
21
+
22
+
App Configuration references (`@Microsoft.AppConfiguration(...)`) are resolved by the Azure App Service/Functions platform when your app runs in Azure.
23
+
24
+
-**Azure (supported):** Put the reference in your function app's **Application settings** (for example, in the Azure portal, ARM/Bicep, or other deployment tooling).
25
+
-**Local (not supported):** The Functions host running on your development machine doesn't resolve `@Microsoft.AppConfiguration(...)` values from *local.settings.json*.
26
+
-**User secrets (not supported):** The Functions user secrets store (*secrets.json*) is also not processed for `@Microsoft.AppConfiguration(...)` references.
27
+
-**SDK code (not required for this feature):** Calling `AddAzureAppConfiguration()` configures the App Configuration SDK for in-process resolution, but it doesn't make the platform resolve `@Microsoft.AppConfiguration(...)` references locally.
28
+
29
+
If you want the same configuration values locally, use one of the following approaches:
30
+
31
+
- Add the values directly to *local.settings.json* (for example, set `MySetting` to the literal value you want locally).
32
+
- Use the App Configuration SDK in your app code (for example, by configuring `AddAzureAppConfiguration()` and connecting to your store with a connection string or credentials appropriate for local dev). This approach is separate from platform references.
33
+
20
34
## Grant app access to App Configuration
21
35
22
36
To get started with using App Configuration references in App Service, first you create an App Configuration store. You then grant permissions to your app to access the configuration key/value pairs that are in the store.
@@ -78,20 +92,58 @@ An App Configuration reference has the form `@Microsoft.AppConfiguration({refere
78
92
Here's an example of a complete reference that includes `Label`:
Any configuration change to the app that results in a site restart causes an immediate refetch of all referenced key/value pairs from the App Configuration store.
91
105
92
106
> [!NOTE]
93
107
> Automatic refresh and refetch of these values when the key/value pairs are updated in App Configuration isn't currently supported.
94
108
109
+
## Working example (Azure Functions)
110
+
111
+
The following example shows where the `@Microsoft.AppConfiguration(...)` syntax goes for an Azure Functions app.
112
+
113
+
### 1) Create a key/value in App Configuration
114
+
115
+
In your App Configuration store, create a key/value pair:
116
+
117
+
-**Key:**`Demo:Color`
118
+
-**Label:** (optional) `dev`
119
+
-**Value:**`Blue`
120
+
121
+
### 2) Add an application setting to your function app in Azure
122
+
123
+
In your Function App (in Azure), add an application setting named `Demo__Color` and set its value to an App Configuration reference.
124
+
125
+
> [!NOTE]
126
+
> Use double underscores (`__`) if you want .NET configuration binding to map to `Demo:Color`.
At runtime, your code reads `Demo:Color` like any other app setting.
143
+
144
+
> [!TIP]
145
+
> You don't need to call `AddAzureAppConfiguration()` for platform references. Use `AddAzureAppConfiguration()` only when you want to load configuration directly via the SDK.
146
+
95
147
## Source application settings from App Configuration
96
148
97
149
You can use App Configuration references as values for [application settings](configure-common.md#configure-app-settings) so you can keep configuration data in App Configuration instead of in the site configuration settings. Application settings and App Configuration key/value pairs are both securely encrypted at rest. If you need centralized configuration management capabilities, add configuration data to App Configuration.
@@ -162,8 +214,8 @@ Here's a sample template for a function app that has App Configuration reference
Copy file name to clipboardExpand all lines: articles/app-service/scripts/terraform-secure-backend-frontend.md
+35-30Lines changed: 35 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,43 +4,45 @@ description: Learn how to use terraform provider for App Service to deploy two w
4
4
author: ericgre
5
5
ms.assetid: 3e5d1bbd-5581-40cc-8f65-bc74f1802156
6
6
ms.topic: sample
7
-
ms.date: 12/06/2022
7
+
ms.date: 03/30/2026
8
8
ms.author: ericg
9
9
ms.service: azure-app-service
10
10
ms.custom: devx-track-terraform
11
11
---
12
12
13
13
# Create two web apps connected securely with Private Endpoint and VNet integration
14
14
15
-
This article illustrates an example use of [Private Endpoint](../networking/private-endpoint.md) and regional [VNet integration](../overview-vnet-integration.md) to connect two web apps (frontend and backend) securely with the following terraform configuration:
16
-
- Deploy a VNet
17
-
- Create the first subnet for the integration
18
-
- Create the second subnet for the private endpoint, you have to set a specific parameter to disable network policies
19
-
- Deploy one App Service plan of type Basic, Standard, PremiumV2, PremiumV3, IsolatedV2, Functions Premium (sometimes referred to as the Elastic Premium plan), required for Private Endpoint feature
20
-
- Create the frontend web app with specific app settings to consume the private DNS zone, [more details](../overview-vnet-integration.md#azure-dns-private-zones)
21
-
- Connect the frontend web app to the integration subnet
22
-
- Create the backend web app
23
-
- Create the DNS private zone with the name of the private link zone for web app privatelink.azurewebsites.net
24
-
- Link this zone to the VNet
25
-
- Create the private endpoint for the backend web app in the endpoint subnet, and register DNS names (website and SCM) in the previously created DNS private zone
15
+
This article illustrates an example use of [Private Endpoint](../networking/private-endpoint.md) and regional [VNet integration](../overview-vnet-integration.md) to connect two web apps (frontend and backend) securely with the following Terraform configuration:
16
+
17
+
1. Deploy a VNet
18
+
1. Create the first subnet for the integration
19
+
1. Create the second subnet for the private endpoint, and disable subnet network policies for private endpoints (set `private_endpoint_network_policies_enabled = false`)
20
+
1. Deploy one App Service plan of type Basic, Standard, PremiumV2, PremiumV3, IsolatedV2, Functions Premium (sometimes referred to as the Elastic Premium plan), required for the Private Endpoint feature
21
+
1. Create the frontend web app with specific app settings to consume the private DNS zone. For more information, see [Azure DNS private zones](../overview-vnet-integration.md#azure-dns-private-zones).
22
+
1. Connect the frontend web app to the integration subnet
23
+
1. Create the backend web app
24
+
1. Create the DNS private zone with the name of the private link zone for web apps (`privatelink.azurewebsites.net`)
25
+
1. Link this zone to the VNet
26
+
1. Create the private endpoint for the backend web app in the endpoint subnet, and register DNS names (site and SCM) in the previously created DNS private zone
26
27
27
28
## How to use terraform in Azure
28
29
29
30
Browse to the [Azure documentation](/azure/developer/terraform/) to learn how to use terraform with Azure.
30
31
31
32
## The complete terraform file
32
33
33
-
To use this file, replace the placeholders _\<unique-frontend-app-name>_ and _\<unique-backend-app-name>_ (app name is used to form a unique DNS name worldwide).
34
+
To use this file, replace the placeholders _\<unique-frontend-app-name>_ and _\<unique-backend-app-name>_ (app name is used to form a unique DNS name worldwide).
For more information, see [Azure permissions for Networking](../role-based-access-control/permissions/networking.md) and [Virtual network permissions](../virtual-network/virtual-network-manage-subnet.md#permissions).
93
+
For mo re information, see [Azure permissions for Networking](../role-based-access-control/permissions/networking.md) and [Virtual network permissions](../virtual-network/virtual-network-manage-subnet.md#permissions).
94
94
95
95
> [!NOTE]
96
96
> When deploying an Application Gateway as part of an [Azure Managed Application](../azure-resource-manager/managed-applications/overview.md), ensure that any deny assignments do not conflict with the RBAC Owner role assignment, as deny assignments take precedence over RBAC permissions.
Copy file name to clipboardExpand all lines: articles/container-apps/opentelemetry-agents.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn to record and query data collected using OpenTelemetry in Azu
4
4
services: container-apps
5
5
author: craigshoemaker
6
6
ms.service: azure-container-apps
7
-
ms.date: 12/09/2025
7
+
ms.date: 03/30/2026
8
8
ms.author: cshoe
9
9
ms.topic: how-to
10
10
ms.custom:
@@ -756,14 +756,15 @@ In the event of a messaging inturruptions to an endpoint, the OpenTelemetry agen
756
756
757
757
The OpenTelemetry agent automatically injects a set of environment variables into your application at runtime.
758
758
759
-
The first two environment variables follow standard OpenTelemetry exporter configuration and are used in OTLP standard software development kits. If you explicitly set the environment variable in the container app specification, your value overwrites the automatically injected value.
759
+
The first three environment variables follow standard OpenTelemetry configuration and are used in OTLP standard software development kits. If you explicitly set the environment variable in the container app specification, your value overwrites the automatically injected value.
760
760
761
761
Learn about the OTLP exporter configuration see, [OTLP Exporter Configuration](https://opentelemetry.io/docs/languages/sdk-configuration/otlp-exporter/).
762
762
763
763
| Name | Description |
764
764
|---|---|
765
765
|`OTEL_EXPORTER_OTLP_ENDPOINT`| A base endpoint URL for any signal type, with an optionally specified port number. This setting is helpful when you’re sending more than one signal to the same endpoint and want one environment variable to control the endpoint. Example: `http://otel.service.k8se-apps:4317/`|
766
766
|`OTEL_EXPORTER_OTLP_PROTOCOL`| Specifies the OTLP transport protocol used for all telemetry data. The managed agent only supports `grpc`. Value: `grpc`. |
767
+
|`OTEL_RESOURCE_ATTRIBUTES`| A comma-separated list of key-value pairs that define [resource attributes](https://opentelemetry.io/docs/specs/otel/resource/sdk/) attached to all telemetry data. The managed agent populates this variable with container app attributes such as the app name and environment. Some OpenTelemetry SDK implementations require you to explicitly enable environment-based resource detection to use these attributes. If you set this variable in the container app specification, your value overwrites the automatically injected value. |
767
768
768
769
The other three environment variables are specific to Azure Container Apps, and are always injected. These variables hold agent’s endpoint URLs for each specific data type (logs, metrics, traces).
0 commit comments