You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-compute-fleet/overview.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.topic: overview
7
7
ms.service: azure-compute-fleet
8
8
ms.custom:
9
9
- ignite-2024
10
-
ms.date: 04/21/2025
10
+
ms.date: 10/29/2025
11
11
ms.reviewer: jushiman
12
12
# Customer intent: As a cloud administrator, I want to deploy and manage multiple virtual machines efficiently using an automated compute resource management tool, so that I can optimize resource allocation based on cost and capacity while ensuring high availability for my workloads.
13
13
---
@@ -32,7 +32,6 @@ Using Azure Compute Fleet, you can:
32
32
## Features and benefits
33
33
34
34
-**Multiple VM series:** Compute Fleet launches multiple VM series within a given fleet. Overall availability in the fleet is enhanced by ensuring it isn't reliant on any single VM type.
35
-
-**Distributing VMs across Availability Zones:** Compute Fleet automatically distributes VMs across multiple Availability Zones to ensure high availability and resilience against potential zone failures.
36
35
-**Diverse pricing models:** Compute Fleet leverages various purchasing options, including Spot VMs for cost savings and standard pay-as-you-go VMs. You can also integrate Azure Reserved Instances and Savings Plans to optimize costs while ensuring consistent capacity. There's no extra charge for using Azure Compute Fleet. You're only charged for the VMs your Compute Fleet launches per hour. For more information, see [states and billing status of Azure VMs](/azure/virtual-machines/states-billing).
37
36
-**Automated Replacement of Spot VMs:** When using Spot VMs, Compute Fleet can automatically replace Spot VMs when evicted due to price fluctuations or capacity constraints.
38
37
-**Multi-Region deployment:** Compute Fleet allows you to dynamically distribute workloads across multiple regions. For more information, see [Multi-Region Compute Fleet (Preview)](multi-region-compute-fleet.md).
Copy file name to clipboardExpand all lines: articles/azure-functions/dotnet-aspire-integration.md
+149Lines changed: 149 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -180,6 +180,155 @@ By default, when you publish an Azure Functions project to Azure, it's deployed
180
180
181
181
During the preview period, the container app resources don't support event-driven scaling. Azure Functions support is not available for apps deployed in this mode. If you need to open a support ticket, select the Azure Container Apps resource type.
182
182
183
+
### Access keys
184
+
185
+
Several Azure Functions scenarios use access keys to provide a basic mitigation against unwanted access. For example, HTTP trigger functions by default require an access key to be invoked, though this requirement can be disabled using the [`AuthLevel` property](./functions-bindings-http-webhook-trigger.md#attributes). See [Work with access keys in Azure Functions](./function-keys-how-to.md) for scenarios which may require a key.
186
+
187
+
When you deploy a Functions project using Aspire to Azure Container Apps, the system doesn't automatically create or manage Functions access keys. If you need to use access keys, you can manage them as part of your App Host setup. This section shows you how to create an extension method that you can call from your app host's `Program.cs` file to create and manage access keys. This approach uses Azure Key Vault to store the keys and mounts them into the container app as secrets.
188
+
189
+
> [!NOTE]
190
+
> The behavior here relies on the `ContainerApps` secret provider, which is only available starting with Functions host version `4.1044.0`. This version is not yet available in all regions, and until it is, when you publish your Aspire project, the base image used for the Functions project may not include the necessary changes.
191
+
192
+
These steps require Bicep version `0.38.3` or later. You can check your Bicep version by running `bicep --version` from a command prompt. If you have the Azure CLI installed, you can use `az bicep upgrade` to quickly update Bicep to the latest version.
193
+
194
+
Add the following NuGet packages to your app host project:
This example uses a default key vault created by the extension method. It results in a default key and a system key for use with the [Model Context Protocol extension](./functions-bindings-mcp.md#connect-to-your-mcp-server).
329
+
330
+
To use these keys from clients, you need to retrieve them from the key vault.
331
+
183
332
## Considerations and best practices
184
333
185
334
Consider the following points when you're evaluating the integration of Azure Functions with Aspire:
Copy file name to clipboardExpand all lines: articles/azure-functions/function-keys-how-to.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,8 @@ Keys are stored as part of your function app in Azure and are encrypted at rest.
63
63
| A second storage account |`blob`| Stores keys in Blob storage in a storage account that's different than the one used by the Functions runtime. The specific account and container used are defined by a shared access signature (SAS) URL set in the [`AzureWebJobsSecretStorageSas`](functions-app-settings.md#azurewebjobssecretstoragesas) setting. You must maintain the `AzureWebJobsSecretStorageSas` setting when the SAS URL changes. |
64
64
|[Azure Key Vault](/azure/key-vault/general/overview)|`keyvault`| The key vault set in [`AzureWebJobsSecretStorageKeyVaultUri`](functions-app-settings.md#azurewebjobssecretstoragekeyvaulturi) is used to store keys. |
65
65
| File system |`files`| Keys are persisted on the local file system, which is the default in Functions v1.x. File system storage isn't recommended. |
66
-
| Kubernetes Secrets |`kubernetes`| The resource set in [AzureWebJobsKubernetesSecretName](functions-app-settings.md#azurewebjobskubernetessecretname) is used to store keys. Supported only when your function app is deployed to Kubernetes. The [Azure Functions Core Tools](functions-run-local.md) generates the values automatically when you use it to deploy your app to a Kubernetes cluster. [Immutable secrets](https://kubernetes.io/docs/concepts/configuration/secret/#secret-immutable) aren't supported. |
66
+
| Kubernetes Secrets |`kubernetes`| The resource set in [AzureWebJobsKubernetesSecretName](functions-app-settings.md#azurewebjobskubernetessecretname) is used to store keys. Supported only when your function app is deployed to Kubernetes. The [Azure Functions Core Tools](functions-run-local.md) generates the values automatically when you use it to deploy your app to a Kubernetes cluster. [Immutable secrets](https://kubernetes.io/docs/concepts/configuration/secret/#secret-immutable) aren't supported. |
67
+
| Azure Container Apps secrets |`ContainerApps`| Keys are stored in the Azure Container Apps secrets store. Supported only when your function app is deployed to Azure Container Apps. |
67
68
68
69
When you use Key Vault for key storage, the app settings you need depend on the managed identity type, either system-assigned or user-assigned.
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/azure-netapp-files-metrics.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -287,22 +287,22 @@ Azure NetApp Files provides metrics on allocated storage, actual storage usage,
287
287
Whether the status of the volume replication is transferring.
288
288
289
289
- *Volume replication lag time* <br>
290
-
Lag time is the actual amount of time the replication lags behind the source. It indicates the age of the replicated data in the destination volume relative to the source volume.
290
+
The delay between when data is written to the source volume and when it’s available on the destination volume.
291
291
292
292
> [!NOTE]
293
293
> When assessing the health status of the volume replication, consider the volume replication lag time. If the lag time is greater than the replication schedule, the replication volume won't catch up to the source. To resolve this issue, adjust the replication speed or the replication schedule.
294
294
295
295
- *Volume replication last transfer duration*
296
-
The amount of time in seconds it took for the last transfer to complete.
296
+
The time taken for the most recent replication session to transfer all changed data (example: blocks, snapshots) from the source volume to the destination volume.
297
297
298
298
- *Volume replication last transfer size*
299
-
The total number of bytes transferred as part of the last transfer.
300
-
299
+
The total amount of data transferred during the most recent replication session from a source volume to its destination volume.
300
+
301
301
- *Volume replication progress*
302
302
The total amount of data in bytes transferred for the current transfer operation.
303
303
304
304
- *Volume replication total transfer*
305
-
The cumulative bytes transferred for the relationship.
305
+
The cumulative volume of data transferred from the source volume to the destination volume throughout the entire lifetime of the replication relationship.
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-azure-elastic-san.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,19 +27,19 @@ The following prerequisites are required to continue.
27
27
28
28
> [!IMPORTANT]
29
29
> As of November 2025, creating and deleting an Azure Elastic SAN based datastore in Azure VMware Solution requires appropriate permissions. If you're using built-in roles such as Owner and Contributor across the these two services, no changes are necessary. If you're using custom roles, ensure you have the correct permissions configured.
30
-
><details><summary>For a complete list of required permissions, expand this section.</summary>
31
-
>> To create an Elastic SAN datastore, you must have the following permissions:
>For information about creating and modifying custom roles, see [create or update Azure custom roles using the Azure portal](../role-based-access-control/custom-roles-portal.md).
42
-
30
+
><details><summary>For a complete list of required permissions, expand this section.</summary>
31
+
>
32
+
>To create an Elastic SAN datastore, you must have the following permissions:
>For information about creating and modifying custom roles, see [create or update Azure custom roles using the Azure portal](../role-based-access-control/custom-roles-portal.md).
43
43
</details>
44
44
45
45
- Have a fully configured Azure VMware solution private cloud in a [region that Elastic SAN is available in](../storage/elastic-san/elastic-san-create.md).
0 commit comments