Skip to content

Commit ace5288

Browse files
Merge pull request #313797 from MicrosoftDocs/main
Auto Publish – main to live - 2026-03-27 17:00 UTC
2 parents bf2b25f + ad92653 commit ace5288

14 files changed

Lines changed: 653 additions & 211 deletions

articles/container-apps/authentication-github.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: container-apps
55
author: craigshoemaker
66
ms.service: azure-container-apps
77
ms.topic: how-to
8-
ms.date: 10/28/2024
8+
ms.date: 03/23/2026
99
ms.author: cshoe
1010
---
1111

@@ -15,7 +15,7 @@ This article shows how to configure Azure Container Apps to use GitHub as an aut
1515

1616
To complete the procedure in this article, you need a GitHub account. To create a new GitHub account, go to [GitHub](https://github.com/).
1717

18-
## <a name="github-register"> </a>Register your application with GitHub
18+
## Register your application with GitHub
1919

2020
1. Sign in to the [Azure portal] and go to your application. Copy your **URL**. You use it to configure your GitHub app.
2121
1. Follow the instructions for [creating an OAuth app on GitHub](https://docs.github.com/developers/apps/building-oauth-apps/creating-an-oauth-app). In the **Authorization callback URL** section, enter the HTTPS URL of your app and append the path `/.auth/login/github/callback`. For example, `https://<hostname>.azurecontainerapps.io/.auth/login/github/callback`.
@@ -24,19 +24,19 @@ To complete the procedure in this article, you need a GitHub account. To create
2424
1. Make note of the client secret value, which you need later.
2525

2626
> [!IMPORTANT]
27-
> The client secret is an important security credential. Do not share this secret with anyone or distribute it with your app.
27+
> The client secret is an important security credential. Don't share this secret with anyone or distribute it with your app.
2828
29-
## <a name="github-secrets"> </a>Add GitHub information to your application
29+
## Add GitHub information to your application
3030

3131
1. Sign in to the [Azure portal] and navigate to your app.
3232
1. Select **Authentication** in the menu on the left. Select **Add identity provider**.
3333
1. Select **GitHub** in the identity provider dropdown. Paste in the `Client ID` and `Client secret` values that you obtained previously.
3434

35-
The secret is stored as a secret in your container app.
35+
The secret is stored as a secret in your container app.
3636

3737
1. If you're configuring the first identity provider for this application, you also see a **Container Apps authentication settings** section. Otherwise, you can move on to the next step.
3838

39-
These options determine how your application responds to unauthenticated requests. The default selections redirect all requests to sign in with this new provider. You can change customize this behavior now or adjust these settings later from the main **Authentication** screen by choosing **Edit** next to **Authentication settings**. To learn more about these options, see [Authentication flow](./authentication.md#authentication-flow).
39+
These options determine how your application responds to unauthenticated requests. The default selections redirect all requests to sign in with this new provider. You can change customize this behavior now or adjust these settings later from the main **Authentication** screen by choosing **Edit** next to **Authentication settings**. To learn more about these options, see [Authentication flow](./authentication.md#authentication-flow).
4040

4141
1. Select **Add**.
4242

@@ -46,8 +46,8 @@ You're now ready to use GitHub for authentication in your app. The provider is l
4646

4747
Use the following guides for details on working with authenticated users.
4848

49-
* [Customize sign-in and sign-out](authentication.md#customize-sign-in-and-sign-out)
50-
* [Access user claims in application code](authentication.md#access-user-claims-in-application-code)
49+
- [Customize sign-in and sign out](authentication.md#customize-sign-in-and-sign-out)
50+
- [Access user claims in application code](authentication.md#access-user-claims-in-application-code)
5151

5252
## Next steps
5353

articles/container-apps/authentication-google.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
description: Learn to use the built-in Google authentication provider in Azure Container Apps.
66
author: craigshoemaker
77
ms.author: cshoe
8-
ms.date: 11/18/2024
8+
ms.date: 03/23/2026
99
ms.service: azure-container-apps
1010
ms.topic: how-to
1111
ms.custom:
@@ -46,9 +46,9 @@ procedureSection:
4646
4747
The secret will be stored as a [secret](manage-secrets.md) in your container app.
4848
- |
49-
If you're configuring the first identity provider for this application, you'll also be prompted with a **Container Apps authentication settings** section. Otherwise, you may move on to the next step.
49+
If you're configuring the first identity provider for this application, you're prompted with a **Container Apps authentication settings** section. Otherwise, you may move on to the next step.
5050
51-
These options determine how your application responds to unauthenticated requests. The default selections redirect all requests to sign in with this new provider. You can change customize this behavior now or adjust these settings later from the main **Authentication** screen by choosing **Edit** next to **Authentication settings**. To learn more about these options, see [Authentication flow](authentication.md#authentication-flow).
51+
These options determine how your application responds to unauthenticated requests. The default selections redirect all requests to sign in with this new provider. You can change or customize this behavior now or adjust these settings later from the main **Authentication** screen by choosing **Edit** next to **Authentication settings**. To learn more about these options, see [Authentication flow](authentication.md#authentication-flow).
5252
- |
5353
Select **Add**.
5454

articles/container-apps/authentication-twitter.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: container-apps
55
author: craigshoemaker
66
ms.service: azure-container-apps
77
ms.topic: how-to
8-
ms.date: 11/18/2024
8+
ms.date: 03/23/2026
99
ms.author: cshoe
1010
---
1111

@@ -15,7 +15,7 @@ This article shows how to configure Azure Container Apps to use X as an authenti
1515

1616
To complete the procedure in this article, you need an X account that has a verified email address and phone number. To create a new X account, go to [x.com](https://x.com).
1717

18-
## <a name="twitter-register"> </a>Register your application with X
18+
## Register your application with X
1919

2020
1. Sign in to the [Azure portal] and go to your application. Copy your **URL**, later you use it to configure your X app.
2121
1. Go to the [X Developers] website, sign in with your X account credentials, and select **Create an app**.
@@ -24,23 +24,24 @@ To complete the procedure in this article, you need an X account that has a veri
2424
1. Select the **Keys and Access Tokens** tab.
2525

2626
Make a note of these values:
27+
2728
- API key
2829
- API secret key
2930

3031
> [!IMPORTANT]
31-
> The API secret key is an important security credential. Do not share this secret with anyone or distribute it with your app.
32+
> The API secret key is an important security credential. Don't share this secret with anyone or distribute it with your app.
3233
33-
## <a name="twitter-secrets"> </a>Add X information to your application
34+
## Add X information to your application
3435

3536
1. Sign in to the [Azure portal] and navigate to your app.
3637
1. Select **Authentication** in the menu on the left. Select **Add identity provider**.
3738
1. Select **Twitter** in the identity provider dropdown. Paste in the `API key` and `API secret key` values that you obtained previously.
3839

39-
The secret is stored as [secret](manage-secrets.md) in your container app.
40+
The secret is stored as [secret](manage-secrets.md) in your container app.
4041

4142
1. If you're configuring the first identity provider for this application, you're prompted with a **Container Apps authentication settings** section. Otherwise, you move on to the next step.
4243

43-
These options determine how your application responds to unauthenticated requests. The default selections redirect all requests to sign in with this new provider. You can change customize this behavior now or adjust these settings later from the main **Authentication** screen by choosing **Edit** next to **Authentication settings**. To learn more about these options, see [Authentication flow](authentication.md#authentication-flow).
44+
These options determine how your application responds to unauthenticated requests. The default selections redirect all requests to sign in with this new provider. You can change customize this behavior now or adjust these settings later from the main **Authentication** screen by choosing **Edit** next to **Authentication settings**. To learn more about these options, see [Authentication flow](authentication.md#authentication-flow).
4445

4546
1. Select **Add**.
4647

@@ -50,8 +51,8 @@ You're now ready to use X for authentication in your app. The provider is listed
5051

5152
Use the following guides for details on working with authenticated users.
5253

53-
* [Customize sign-in and sign-out](authentication.md#customize-sign-in-and-sign-out)
54-
* [Access user claims in application code](authentication.md#access-user-claims-in-application-code)
54+
- [Customize sign-in and sign out](authentication.md#customize-sign-in-and-sign-out)
55+
- [Access user claims in application code](authentication.md#access-user-claims-in-application-code)
5556

5657
## Next steps
5758

articles/container-apps/java-metrics-scale-with-keda.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: craigshoemaker
66
ms.service: azure-container-apps
77
ms.custom: devx-track-extended-java
88
ms.topic: tutorial
9-
ms.date: 12/23/2024
9+
ms.date: 03/25/2026
1010
ms.author: cshoe
1111
#customer intent: As a developer, I want to set up auto scale using Java metrics exposed from Azure Container Apps
1212
---
@@ -19,9 +19,9 @@ In this tutorial, you add a custom scale rule to scale your container app with J
1919

2020
## Prerequisites
2121

22-
* An Azure account with an active subscription. If you don't already have one, you can [create one for free](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
23-
* [Azure CLI](/cli/azure/install-azure-cli).
24-
* [A Java application deployed in Azure Container Apps](java-get-started.md).
22+
- An Azure account with an active subscription. If you don't already have one, you can [create one for free](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
23+
- [Azure CLI](/cli/azure/install-azure-cli).
24+
- [A Java application deployed in Azure Container Apps](java-get-started.md).
2525

2626
## Set up the environment
2727

@@ -42,7 +42,7 @@ Use the following steps to define environment variables and set up the environme
4242
|-------------------------|------------------------------------------------------------------------------------|
4343
| `LOCATION` | The Azure region location where you create your Azure Container Apps. |
4444
| `TENANT_ID` | Your tenant's ID. |
45-
| `SUBSCRIPTION_ID` | The subscription ID which you use to create your Azure Container Apps. |
45+
| `SUBSCRIPTION_ID` | The subscription ID, which you use to create your Azure Container Apps. |
4646
| `RESOURCE_GROUP` | The Azure resource group name for your Azure Container Apps. |
4747
| `APP_NAME` | The app name for your Azure Container Apps. |
4848
| `IDENTITY_NAME` | The name for your managed identity, which is assigned to your Azure Container Apps.|
@@ -54,25 +54,27 @@ Use the following steps to define environment variables and set up the environme
5454
```
5555
5656
## Set up a managed identity for your Azure Container Apps
57+
5758
To scale with Azure Container Apps platform metrics, you need a managed identity to access metrics from Azure Monitor.
5859
5960
1. Create a user-assigned identity and assign it to your Azure Container Apps. You can follow the doc [add a user-assigned identity](./managed-identity.md#add-a-user-assigned-identity). After you create the identity, run the CLI command to set the identity ID.
6061
61-
```azurecli
62-
USER_ASSIGNED_IDENTITY_ID=$(az identity show --resource-group $RESOURCE_GROUP --name $IDENTITY_NAME --query "id" --output tsv)
63-
```
62+
```azurecli
63+
USER_ASSIGNED_IDENTITY_ID=$(az identity show --resource-group $RESOURCE_GROUP --name $IDENTITY_NAME --query "id" --output tsv)
64+
```
6465
6566
2. Grant the `Monitoring Reader` role for your managed identity to read data from Azure Monitor. You can find more details about the roles for Azure Monitor in [Azure built-in roles for Monitor](../role-based-access-control/built-in-roles/monitor.md#monitoring-reader).
6667
67-
```azurecli
68-
# Get the principal ID for your managed identity
69-
PRINCIPAL_ID=$(az identity show --resource-group $RESOURCE_GROUP --name $IDENTITY_NAME --query "principalId" --output tsv)
68+
```azurecli
69+
# Get the principal ID for your managed identity
70+
PRINCIPAL_ID=$(az identity show --resource-group $RESOURCE_GROUP --name $IDENTITY_NAME --query "principalId" --output tsv)
7071
71-
az role assignment create --assignee $PRINCIPAL_ID --role "Monitoring Reader" --scope /subscriptions/$SUBSCRIPTION_ID
72-
```
72+
az role assignment create --assignee $PRINCIPAL_ID --role "Monitoring Reader" --scope /subscriptions/$SUBSCRIPTION_ID
73+
```
7374
7475
## Add a scale rule with Azure Monitor metrics
75-
To scale with Azure Monitor metrics, you can refer to [Azure Monitor KEDA scaler](https://keda.sh/docs/2.16/scalers/azure-monitor/) to define your Container Apps scale rule.
76+
77+
To scale with Azure Monitor metrics, you can refer to the [Azure Monitor Kubernetes Event-driven Autoscaling (KEDA) scaler](https://keda.sh/docs/2.16/scalers/azure-monitor/) to define your Container Apps scale rule.
7678
7779
Here's a list of core metadata to set up the scale rule.
7880

@@ -85,11 +87,9 @@ Here's a list of core metadata to set up the scale rule.
8587
| metricName | Name of the metric to query. |
8688
| metricAggregationType | Aggregation method of the Azure Monitor metric. Options include Average, Total, Maximum. |
8789
| metricFilter | Name of the filter to be more specific by using dimensions listed in the official documentation. (Optional) |
88-
| metricAggregationInterval | Collection time of the metric in format "hh:mm:ss" (Default: "0:5:0", Optional) |
90+
| metricAggregationInterval | Collection time of the metric in the format `hh:mm:ss` (Default: `0:5:0`, Optional) |
8991
| targetValue | Target value to trigger scaling actions. (This value can be a float) |
9092

91-
92-
9393
Add a scale rule with [Azure Monitor metrics for Azure Container Apps](./metrics.md) for your application.
9494

9595
### [Azure CLI](#tab/azurecli)
@@ -161,19 +161,19 @@ This command adds a scale rule to your container app with the name `scale-with-a
161161
> The metric `JvmGcCount` is only used as an example. You can use any metric from Azure Monitor. Before setting up the scale rule, view the metrics in the Azure portal to determine the appropriate metric, aggregation interval, and target value based on your application's requirements. Additionally, consider using the built-in [HTTP/TCP scale rules](./scale-app.md#http), which can meet most common scaling scenarios, before opting for a custom metric.
162162
163163
## View scaling in Azure portal (optional)
164+
164165
Once your new revision is ready, [send requests](./tutorial-scaling.md#send-requests) to your container app to trigger auto scale with your Java metrics.
165166
1. Go to the `Metrics` blade in the Azure portal for your Azure Container Apps.
166167
1. Add a chart, use the metric `jvm.gc.count`, with filter `Revision=<your-revision>`, aggregation using `Sum`, and split by `Replica`. You can see the `JvmGcCount` metric value for each replica in this chat.
167168
1. Add a chart, use the metric `jvm.gc.count`, with filter `Revision=<your-revision>` and aggregation using `Sum`. You can see the total aggregated `JvmGcCount` metric value for the revision in this chat.
168169
1. Add a chart, use the metric `Replica Count`, with filter `Revision=<your-revision>` and aggregation using `Max`. You can see the replica count for the revision in this chat.
169170
170-
171171
Here's a sample metric snapshot for the example scale rule.
172172

173173
:::image type="content" source="media/java-metrics-keda/keda-auto-scale-java-gc-portal.png" alt-text="Screenshot of KEDA scale with JVM metrics." lightbox="media/java-metrics-keda/keda-auto-scale-java-gc-portal.png":::
174174

175175
1. Initially, there's one replica (the `minReplicas`) for the app.
176-
1. A spike in requests causes the Java app to experience frequent JVM garbage collection (GC).
176+
1. A spike in requests causes the Java app to experience frequent Java Virtual Machine (JVM) garbage collection (GC).
177177
1. KEDA observes the aggregated metric value for `jvm.gc.count` is increased to `256`, and calculates the `desiredReplicas` value as `ceil(256/30)=9`.
178178
1. KEDA scales out the container app's replica count to 9.
179179
1. The http traffic is distributed across more replicas, reducing the average GC count.

0 commit comments

Comments
 (0)