You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/manage-backup.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -120,6 +120,9 @@ There are two types of backups in App Service. If your app is in a supported pri
120
120
1. At the top of the **Backups** page, select **Configure custom backups**.
121
121
122
122
1. In **Storage account**, select an existing storage account in the same subscription or select **Create new**. Repeat in **Container**.
123
+
> [!NOTE]
124
+
> Custom backups for Azure App Service require an Azure Storage account that supports Shared Access Signature (SAS)–based authorization. Managed Identity–based authentication to the storage account isn't supported for App Service backup and restore operations.
125
+
123
126
124
127
To back up the linked databases, select **Next: Advanced** > **Include database**, and select the databases to backup.
@@ -37,8 +37,6 @@ For example, suppose you have a bucket size of 250 tokens for read requests and
37
37
38
38
Reading metrics using the `*/providers/microsoft.insights/metrics` API contributes significantly to overall Azure Resource Manager traffic and is a common cause of subscription throttling events. If you use this API heavily, we recommend that you switch to the `getBatch` API. You can query multiple resources in a single REST request, which improves performance and reduces throttling. For more information about converting your operations, see [How to migrate from the metrics API to the getBatch API](/azure/azure-monitor/essentials/migrate-to-batch-api).
39
39
40
-
These limits and architecture will also apply to all sovereign clouds by the end of 2026.
41
-
42
40
### How can I view my throttled requests?
43
41
44
42
To view your throttled requests and other Resource Manager metrics, see [Accessing Azure Resource Manager metrics](/azure/azure-resource-manager/management/monitor-resource-manager#accessing-azure-resource-manager-metrics).
@@ -63,39 +61,6 @@ The request for subscription '{0}' could not be processed due to an excessive vo
63
61
64
62
Customers might experience throttling due to excessive background jobs, which can be triggered by high-frequency operations or system-wide activities. While customers do not have direct control over the creation or execution of these jobs, awareness of potential throttling is important.
65
63
66
-
## Throttling for sovereign clouds
67
-
68
-
Throttling happens at two levels. Azure Resource Manager throttles requests for the subscription and tenant. If the request is under the throttling limits for the subscription and tenant, Resource Manager routes the request to the resource provider. The resource provider applies throttling limits that are tailored to its operations.
69
-
70
-
Requests are initially throttled per principal ID and per Azure Resource Manager instance in the region of the user sending the request. Requests to the Azure Resource Manager instance in the region are also throttled per principal user ID and per hour. When the request is forwarded to the resource provider, requests are throttled per region of the resource rather than per Azure Resource Manager instance in region of the user.
71
-
72
-
> [!NOTE]
73
-
> The limits of a resource provider can differ from the limits of the Azure Resource Manager instance in the region of the user.
74
-
75
-
The following image shows how throttling is applied as a request goes from the user to Azure Resource Manager and the resource provider.
76
-
77
-
:::image type="content" source="./media/request-limits-and-throttling/request-throttling.svg" alt-text="Diagram that shows how throttling is applied as a request goes from the user to Azure Resource Manager and the resource provider.":::
78
-
79
-
## Subscription and tenant limits
80
-
81
-
Every subscription-level and tenant-level operation is subject to throttling limits. Subscription requests are ones that involve passing your subscription ID, such as retrieving the resource groups in your subscription. For example, sending a request to `https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups?api-version=2022-01-01` is a subscription-level operation. Tenant requests don't include your subscription ID, such as retrieving valid Azure locations. For example, sending a request to `https://management.azure.com/tenants?api-version=2022-01-01` is a tenant-level operation.
82
-
83
-
The default throttling limits per hour are shown in the following table.
84
-
85
-
| Scope | Operations | Limit |
86
-
| ----- | ---------- | ------- |
87
-
| Subscription | reads | 12,000 |
88
-
| Subscription | deletes | 15,000 |
89
-
| Subscription | writes | 1,200 |
90
-
| Tenant | reads | 12,000 |
91
-
| Tenant | writes | 1,200 |
92
-
93
-
These limits are scoped to the security principal (user or application) making the requests and the subscription ID or tenant ID. If your requests come from more than one security principal, your limit across the subscription or tenant is greater than 12,000 and 1,200 per hour.
94
-
95
-
These limits apply to each Azure Resource Manager instance. There are multiple instances in every Azure region, and Azure Resource Manager is deployed to all Azure regions. So, in practice, the limits are higher than these limits. Different instances of Azure Resource Manager usually handle the user's requests.
96
-
97
-
The remaining requests are returned in the [response header values](#remaining-requests).
98
-
99
64
## Resource provider limits
100
65
101
66
Resource providers apply their own throttling limits. Within each subscription, the resource provider throttles per region of the resource in the request. Because Resource Manager throttles by instance of Resource Manager, and there are several instances of Resource Manager in each region, the resource provider might receive more requests than the default limits in the previous section.
Copy file name to clipboardExpand all lines: articles/container-apps/compose-agent.md
+12-3Lines changed: 12 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,15 +2,15 @@
2
2
title: Deploy Docker Compose for agents to Azure Container Apps Preview
3
3
description: Learn how to use Docker Compose for Agents on Azure Container Apps Preview.
4
4
ms.topic: how-to
5
-
ms.date: 11/18/2025
5
+
ms.date: 03/31/2026
6
6
ms.service: azure-container-apps
7
7
ms.author: cshoe
8
8
author: craigshoemaker
9
9
---
10
10
11
11
# Deploy Docker Compose for agents to Azure Container Apps Preview
12
12
13
-
This article shows you how to deploy applications to Azure Container Apps by using Docker’s Compose for Agents. This feature keeps the compose file you already use locally and allows you to deploy it onto Container Apps. The `az-cli` container app extension then translates the compose file into Azure Container App applications and manages identities, scaling, and model lifecycle for you.
13
+
This article shows you how to deploy applications to Azure Container Apps by using Docker's Compose for Agents. This feature keeps the compose file you already use locally and allows you to deploy it onto Container Apps. The `az-cli` container app extension then translates the compose file into Azure Container App applications and manages identities, scaling, and model lifecycle for you.
14
14
15
15
In this article, you learn to:
16
16
@@ -37,7 +37,7 @@ When you run `az containerapp compose create`, the CLI translates agent-focused
37
37
38
38
### Model context protocol (MCP) tooling
39
39
40
-
Azure Container Apps runs a variant of [Docker’s MCP gateway](https://github.com/docker/mcp-gateway) as its own container app. It uses system-assigned managed identity to add or remove MCP tool containers within the environment dynamically. This setup appears as separate containers under the mcp-gateway application. Gateway to MCP tooling communication is limited to the network. Stdio MCP servers are wrapped to run as SSE based MCP servers on Azure Container Apps. Docker for Agents on Azure Container Apps currently supports the following Stdio MCP servers: AppSignal, BigQuery, Confluence, DuckDuckGo, Fetch, Filesystem, Git, Google Drive, Jira, MongoDB, MySQL, Notion, Playwright, PostgreSQL, SequentialThinking, Slack, SQLite, Supabase, Time, Twist.
40
+
Azure Container Apps runs a variant of [Docker's MCP gateway](https://github.com/docker/mcp-gateway) as its own container app. It uses system-assigned managed identity to add or remove MCP tool containers within the environment dynamically. This setup appears as separate containers under the mcp-gateway application. Gateway to MCP tooling communication is limited to the network. Stdio MCP servers are wrapped to run as SSE based MCP servers on Azure Container Apps. Docker for Agents on Azure Container Apps currently supports the following Stdio MCP servers: AppSignal, BigQuery, Confluence, DuckDuckGo, Fetch, Filesystem, Git, Google Drive, Jira, MongoDB, MySQL, Notion, Playwright, PostgreSQL, SequentialThinking, Slack, SQLite, Supabase, Time, Twist.
41
41
42
42
### Models
43
43
@@ -138,6 +138,15 @@ az containerapp compose create \
138
138
--environment $ENV_NAME
139
139
```
140
140
141
+
### Agent settings defaults
142
+
143
+
Applications created without explicit agent settings receive the following defaults:
144
+
145
+
*`DiscoveryMode` = `Auto`, which automatically detects agent capabilities and dependencies.
146
+
*`IsAgent` = `false`, indicating that the app doesn't act as an agent unless explicitly configured.
147
+
148
+
These defaults ensure consistent behavior for all container apps in your environment.
149
+
141
150
### Uninstalling and switching back
142
151
143
152
To switch back to the stable release of the container app extension:
@@ -167,6 +167,7 @@ The following variables are available to container apps:
167
167
|`CONTAINER_APP_ENV_DNS_SUFFIX`| The DNS suffix for the Container Apps environment. To obtain the fully qualified domain name (FQDN) of the app, append the app name to the DNS suffix in the format `$CONTAINER_APP_NAME.$CONTAINER_APP_ENV_DNS_SUFFIX`. |`<DEFAULT_HOSTNAME>.<REGION>.azurecontainerapps.io`|
168
168
|`CONTAINER_APP_PORT`| The target port of the container app. |`8080`|
169
169
|`CONTAINER_APP_REPLICA_NAME`| The name of the container app replica. |`my-containerapp--20mh1s9-86c8c4b497-zx9bq`|
170
+
|`CONTAINER_NAME`| The name of the replica. Available for managed function apps and logic apps. |`my-containerapp--20mh1s9-86c8c4b497-zx9bq`|
0 commit comments