Skip to content

Commit 96b54cd

Browse files
Merge pull request #304498 from MicrosoftDocs/main
Auto Publish – main to live - 2025-08-20 22:00 UTC
2 parents 5dd5699 + 5d47f60 commit 96b54cd

79 files changed

Lines changed: 1030 additions & 2227 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

articles/api-management/azure-openai-semantic-cache-lookup-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ Use the `azure-openai-semantic-cache-lookup` policy to perform cache lookup of r
6363

6464
- [**Policy sections:**](./api-management-howto-policies.md#understanding-policy-configuration) inbound
6565
- [**Policy scopes:**](./api-management-howto-policies.md#scopes) global, product, API, operation
66-
- [**Gateways:**](api-management-gateways-overview.md) classic, v2, consumption
66+
- [**Gateways:**](api-management-gateways-overview.md) classic, v2, consumption, self-hosted
6767

6868
### Usage notes
6969

articles/api-management/azure-openai-semantic-cache-store-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The `azure-openai-semantic-cache-store` policy caches responses to Azure OpenAI
4646

4747
- [**Policy sections:**](./api-management-howto-policies.md#understanding-policy-configuration) outbound
4848
- [**Policy scopes:**](./api-management-howto-policies.md#scopes) global, product, API, operation
49-
- [**Gateways:**](api-management-gateways-overview.md) classic, v2, consumption
49+
- [**Gateways:**](api-management-gateways-overview.md) classic, v2, consumption, self-hosted
5050

5151
### Usage notes
5252

articles/api-management/llm-semantic-cache-lookup-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Use the `llm-semantic-cache-lookup` policy to perform cache lookup of responses
6262

6363
- [**Policy sections:**](./api-management-howto-policies.md#understanding-policy-configuration) inbound
6464
- [**Policy scopes:**](./api-management-howto-policies.md#scopes) global, product, API, operation
65-
- [**Gateways:**](api-management-gateways-overview.md) classic, v2, consumption
65+
- [**Gateways:**](api-management-gateways-overview.md) classic, v2, consumption, self-hosted
6666

6767
### Usage notes
6868

articles/api-management/llm-semantic-cache-store-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ The `llm-semantic-cache-store` policy caches responses to chat completion API re
4545

4646
- [**Policy sections:**](./api-management-howto-policies.md#understanding-policy-configuration) outbound
4747
- [**Policy scopes:**](./api-management-howto-policies.md#scopes) global, product, API, operation
48-
- [**Gateways:**](api-management-gateways-overview.md) classic, v2, consumption
48+
- [**Gateways:**](api-management-gateways-overview.md) classic, v2, consumption, self-hosted
4949

5050
### Usage notes
5151

articles/app-service/environment/app-service-app-service-environment-custom-settings.md

Lines changed: 17 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -5,21 +5,19 @@ author: seligj95
55

66
ms.assetid: 1d1d85f3-6cc6-4d57-ae1a-5b37c642d812
77
ms.topic: tutorial
8-
ms.date: 03/06/2024
8+
ms.date: 08/20/2025
99
ms.author: jordanselig
1010
ms.custom: mvc, devx-track-arm-template
1111
ms.service: azure-app-service
1212
---
1313

1414
# Custom configuration settings for App Service Environments
1515

16-
## Overview
17-
1816
Because App Service Environments are isolated to a single customer, there are certain configuration settings that can be applied exclusively to App Service Environments. This article documents the various specific customizations that are available for App Service Environments.
1917

20-
If you do not have an App Service Environment, see [How to Create an App Service Environment v3](./creation.md).
18+
If you don't have an App Service Environment, see [How to Create an App Service Environment v3](./creation.md).
2119

22-
You can store App Service Environment customizations by using an array in the new **clusterSettings** attribute. This attribute is found in the "Properties" dictionary of the *hostingEnvironments* Azure Resource Manager entity.
20+
You can store App Service Environment customizations by using an array in the **clusterSettings** attribute. This attribute is found in the "Properties" dictionary of the *hostingEnvironments* Azure Resource Manager entity.
2321

2422
The following abbreviated Resource Manager template snippet shows the **clusterSettings** attribute:
2523

@@ -43,24 +41,13 @@ The following abbreviated Resource Manager template snippet shows the **clusterS
4341
}
4442
```
4543

46-
The **clusterSettings** attribute can be included in a Resource Manager template to update the App Service Environment.
47-
48-
## Use Azure Resource Explorer to update an App Service Environment
49-
50-
Alternatively, you can update the App Service Environment by using [Azure Resource Explorer](https://resources.azure.com).
51-
52-
1. In Resource Explorer, go to the node for the App Service Environment (**subscriptions** > **{your Subscription}** > **resourceGroups** > **{your Resource Group}** > **providers** > **Microsoft.Web** > **hostingEnvironments**). Then click the specific App Service Environment that you want to update.
53-
2. In the right pane, click **Read/Write** in the upper toolbar to allow interactive editing in Resource Explorer.
54-
3. Click the blue **Edit** button to make the Resource Manager template editable.
55-
4. Scroll to the bottom of the right pane. The **clusterSettings** attribute is at the very bottom, where you can enter or update its value.
56-
5. Type (or copy and paste) the array of configuration values you want in the **clusterSettings** attribute.
57-
6. Click the green **PUT** button that's located at the top of the right pane to commit the change to the App Service Environment.
44+
The **clusterSettings** attribute can be included in a Resource Manager template or with the Azure CLI to update the App Service Environment. Certain settings are available in the Azure portal.
5845

59-
However you submit the change, the change is not immediate and it can take up to 24 hours for the change to take full effect. Some settings have specific details on the time and impact of configuring the specific setting.
46+
However you submit the change, the change isn't immediate and it can take up to 24 hours for the change to take full effect. Some settings have specific details on the time and effect of configuring the specific setting.
6047

6148
## Enable internal encryption
6249

63-
The App Service Environment operates as a black box system where you cannot see the internal components or the communication within the system. To enable higher throughput, encryption is not enabled by default between internal components. The system is secure as the traffic is inaccessible to being monitored or accessed. If you have a compliance requirement though that requires complete encryption of the data path from end to end, there is a way to enable encryption of the complete data path with a clusterSetting.
50+
The App Service Environment operates as a black box system where you can't see the internal components or the communication within the system. To enable higher throughput, encryption isn't enabled by default between internal components. The system is secure as the traffic is inaccessible to being monitored or accessed. If you have a compliance requirement though that requires complete encryption of the data path from end to end, there's a way to enable encryption of the complete data path with a clusterSetting.
6451

6552
```json
6653
"clusterSettings": [
@@ -71,7 +58,11 @@ The App Service Environment operates as a black box system where you cannot see
7158
],
7259
```
7360

74-
Setting InternalEncryption to true encrypts internal network traffic in your App Service Environment between the front ends and workers, encrypts the pagefile and also encrypts the worker disks. After the InternalEncryption clusterSetting is enabled, there can be an impact to your system performance. When you make the change to enable InternalEncryption, your App Service Environment will be in an unstable state until the change is fully propagated. Complete propagation of the change can take a few hours to complete, depending on how many instances you have in your App Service Environment. We highly recommend that you do not enable InternalEncryption on an App Service Environment while it is in use. If you need to enable InternalEncryption on an actively used App Service Environment, we highly recommend that you divert traffic to a backup environment until the operation completes.
61+
You can also enable internal encryption using the Azure portal by going to the **Configuration** page for your App Service Environment.
62+
63+
:::image type="content" source="./media/app-service-app-service-environment-custom-settings/app-service-environment-portal-internal-encryption.png" alt-text="Screenshot of the Configuration page in the Azure portal for an App Service Environment showing where to enable internal encryption." border="false":::
64+
65+
Setting InternalEncryption to true encrypts internal network traffic in your App Service Environment between the front ends and workers, encrypts the pagefile and also encrypts the worker disks. After the InternalEncryption clusterSetting is enabled, there can be an effect to your system performance. When you make the change to enable InternalEncryption, your App Service Environment is in an unstable state until the change is fully propagated. Complete propagation of the change can take a few hours to complete, depending on how many instances you have in your App Service Environment. We highly recommend that you don't enable InternalEncryption on an App Service Environment while it is in use. If you need to enable InternalEncryption on an actively used App Service Environment, we highly recommend that you divert traffic to a backup environment until the operation completes.
7566

7667
## Disable TLS 1.0 and TLS 1.1
7768

@@ -90,9 +81,13 @@ If you want to disable all inbound TLS 1.0 and TLS 1.1 traffic for all of the ap
9081

9182
The name of the setting says 1.0 but when configured, it disables both TLS 1.0 and TLS 1.1.
9283

84+
You can also disable TLS 1.0 and TLS 1.1 using the Azure portal by going to the **Configuration** page for your App Service Environment and unchecking the checkbox.
85+
86+
:::image type="content" source="./media/app-service-app-service-environment-custom-settings/app-service-environment-portal-disable-tls.png" alt-text="Screenshot of the Configuration page in the Azure portal for an App Service Environment showing where to disable TLS 1.0 and TLS 1.1." border="false":::
87+
9388
## Change TLS cipher suite order
9489

95-
App Service Environment supports changing the cipher suite from the default. The default set of ciphers is the same set that is used in the multi-tenant App Service. Changing the cipher suite is only possible with App Service Environment, the single-tenant offering, not the multi-tenant offering, because changing it affects the entire App Service deployment. There are two cipher suites that are required for an App Service Environment: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 and TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256. Additionally, you should include the following cipher suites, which are required for TLS 1.3: TLS_AES_256_GCM_SHA384 and TLS_AES_128_GCM_SHA256.
90+
App Service Environment supports changing the cipher suite from the default. The default set of ciphers is the same set that is used in the multitenant App Service. Changing the cipher suite is only possible with App Service Environment, the single-tenant offering, not the multitenant offering, because changing it affects the entire App Service deployment. There are two cipher suites that are required for an App Service Environment: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 and TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256. Additionally, you should include the following cipher suites, which are required for TLS 1.3: TLS_AES_256_GCM_SHA384 and TLS_AES_128_GCM_SHA256.
9691

9792
To configure your App Service Environment to use just the ciphers that it requires, modify the **clusterSettings** as shown in the following sample. **Ensure that the TLS 1.3 ciphers are included at the beginning of the list**.
9893

@@ -106,7 +101,7 @@ To configure your App Service Environment to use just the ciphers that it requir
106101
```
107102

108103
> [!WARNING]
109-
> If incorrect values are set for the cipher suite that SChannel cannot understand, all TLS communication to your server might stop functioning. In such a case, you will need to remove the *FrontEndSSLCipherSuiteOrder* entry from **clusterSettings** and submit the updated Resource Manager template to revert back to the default cipher suite settings. Please use this functionality with caution.
104+
> If incorrect values are set for the cipher suite that SChannel can't understand, all TLS communication to your server might stop functioning. In such a case, you'll need to remove the *FrontEndSSLCipherSuiteOrder* entry from **clusterSettings** and submit the updated Resource Manager template to revert back to the default cipher suite settings. Use this functionality with caution.
110105
111106
## Get started
112107

Loading
Loading

articles/application-gateway/application-gateway-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ sections:
186186
answer: |
187187
Updates initiated to Application Gateway are applied one [update domain](/azure/virtual-machines/availability-set-overview#how-do-availability-sets-work) at a time. As each update domain's instances are being updated, the remaining instances in other update domains continue to serve traffic. Active connections are gracefully drained from the instances being updated for up to 5 minutes to help establish connectivity to instances in a different update domain before the update begins. The update process proceeds to the next set of instances only if the current set of instances were upgraded successfully.
188188
189-
Azure Application Gateway also supports MaxSurge ([Rolling Upgrades with MaxSurge](/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-maxsurge)), a capability within Azure Virtual Machine Scale Sets (VMSS) that enables new instances to be provisioned during rolling upgrades without taking existing ones offline. By integrating MaxSurge into the upgrade process, customers can transition to newer gateway versions without any capacity degradation. MaxSurge is automatically enabled on Application Gateway and requires no configuration.
189+
Azure Application Gateway also supports MaxSurge, a capability that enables new instances to be provisioned during rolling upgrades without taking existing ones offline. It allows customers to transition to newer gateway versions without any capacity degradation. MaxSurge is automatically enabled on Application Gateway and requires no configuration.
190190
191191
**Note:** Additional IP space is required to provision the temporary instances used by MaxSurge. If sufficient IP space is not available during an update, Application Gateway will fall back to the traditional upgrade method, which may result in reduced maximum capacity based on the number of instances.
192192

articles/azure-netapp-files/azacsnap-cmd-ref-runbefore-runafter.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: Phil-Jensen
66
ms.service: azure-netapp-files
77
ms.topic: reference
8-
ms.date: 02/20/2025
8+
ms.date: 08/20/2025
99
ms.author: phjensen
1010
# Customer intent: "As a cloud administrator, I want to use the runbefore and runafter capabilities of the Application Consistent Snapshot tool, so that I can automate command execution for backup and restoration processes with Azure NetApp Files."
1111
---
@@ -105,6 +105,7 @@ if [ -r "${SAS_KEY_FILE}" ]; then
105105
source "${SAS_KEY_FILE}"
106106
else
107107
echo "Credential file '${SAS_KEY_FILE}' not found, exiting!"
108+
exit 2
108109
fi
109110
110111

articles/azure-netapp-files/configure-network-features.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,9 +70,7 @@ You can edit the network features option of existing volumes from *Basic* to *St
7070

7171
### Register the feature
7272

73-
Before editing network features on an existing volume, you need to register the feature. Ensure you are using the correct feature name for the change in network features you want to perform.
74-
75-
* To upgrade to Standard network features from Basic, use the feature name `ANFBasicToStdNetworkFeaturesUpgrade`.
73+
Before upgradeing from Basic to Standard network features, you need to register the feature.
7674

7775
1. Register the feature:
7876

0 commit comments

Comments
 (0)