Skip to content

Commit ca68b91

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into recovery-services-vaults
2 parents daec675 + b2b5225 commit ca68b91

202 files changed

Lines changed: 5667 additions & 2069 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6659,6 +6659,11 @@
66596659
"source_path": "articles/reliability/migrate-load-balancer.md",
66606660
"redirect_url": "/azure/reliability/reliability-load-balancer",
66616661
"redirect_document_id": false
6662+
},
6663+
{
6664+
"source_path": "articles/nat-gateway/nat-availability-zones.md",
6665+
"redirect_url": "/azure/reliability/reliability-nat-gateway",
6666+
"redirect_document_id": false
66626667
}
66636668
]
66646669
}

articles/api-management/v2-service-tiers-overview.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,7 @@ The following are currently unavailable in the v2 tiers.
8888
* Direct Management API access
8989
* Back up and restore of API Management instance
9090
* Upgrade to v2 tiers from classic tiers
91+
* Resource move operation
9192

9293
**Developer portal**
9394
* Reports

articles/app-service/includes/configure-azure-storage/azure-storage-linux-container-pivot.md

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -203,6 +203,46 @@ To validate that the Azure Storage is mounted successfully for the app:
203203
tcpping Storageaccount.file.core.windows.net
204204
```
205205

206+
### Storage mount health checks and auto‑recovery
207+
208+
Azure App Service includes a built‑in health‑check mechanism to ensure that mounted Azure Storage volumes (Azure Files or Azure Blob) remain accessible and responsive. This system helps prevent application hangs caused by stale or disconnected storage mounts.
209+
210+
#### How the health check works
211+
212+
1. **Periodic I/O test**
213+
App Service periodically performs file I/O on a marker file named `__lastCheckTime.txt`.
214+
- **Location:** A `LogFiles` subdirectory under the mounted path (for example, `/mount/path/LogFiles/__lastCheckTime.txt`).
215+
- **Behavior:**
216+
- A read operation is attempted on this file.
217+
- The file does *not* need to exist—“file not found” is treated as a successful check.
218+
219+
2. **Frequency**
220+
The check runs every **5 seconds** by default.
221+
222+
3. **Failure handling**
223+
- Each failed or timed‑out check increments a *failed ping counter*.
224+
- When failures exceed the configured threshold:
225+
- **Azure Files:** 18 failed pings
226+
- **Azure Blob:** 15 failed pings
227+
- The mount is marked **Faulted**, and **App Service automatically restarts the app** to restore connectivity to the share.
228+
229+
#### Configuration via App Settings
230+
231+
You can customize health‑check behavior using the following app settings.
232+
233+
| Storage type | Setting name | Default value | Description |
234+
|--------------|--------------|---------------|-------------|
235+
| Azure Files | `WEBSITE_BYOS_FILES_HEALTH_CHECK_FREQUENCY` | `5` | Interval in seconds between health checks. |
236+
| Azure Files | `WEBSITE_BYOS_FILES_MAX_FAILED_PINGS` | `18` | Number of consecutive failures before marking the volume as faulted. |
237+
| Azure Files | `WEBSITE_BYOS_FILES_AUTO_RECOVERY_ENABLED` | `true` | Set to `false` to disable auto‑recovery logic. |
238+
| Azure Blob | `WEBSITE_BYOS_BLOB_HEALTH_CHECK_FREQUENCY` | `5` | Interval in seconds between health checks. |
239+
| Azure Blob | `WEBSITE_BYOS_BLOB_MAX_FAILED_PINGS` | `15` | Number of consecutive failures before marking the volume as faulted. |
240+
| Azure Blob | `WEBSITE_BYOS_BLOB_AUTO_RECOVERY_ENABLED` | `true` | Set to `false` to disable auto‑recovery logic. |
241+
242+
#### Notes
243+
- Auto‑recovery helps prevent long‑running application hangs caused by unresponsive storage paths.
244+
- Disabling auto‑recovery is not recommended unless troubleshooting specific mount behavior.
245+
206246
## Best practices
207247

208248
### Performance

articles/app-service/manage-automatic-scaling.md

Lines changed: 35 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -4,32 +4,50 @@ description: Learn how to scale automatically in Azure App Service with no confi
44
author: msangapu-msft
55
ms.author: msangapu
66
ms.topic: how-to
7-
ms.date: 04/18/2025
7+
ms.date: 01/09/2026
88
ms.custom: devx-track-azurecli
9-
109
ms.service: azure-app-service
1110
---
1211

1312
# Automatic scaling in Azure App Service
1413

15-
> [!NOTE]
16-
> Automatic scaling is available for all app types: Windows and Linux (deploy as code and container). Automatic scaling isn't supported for deployment slot traffic.
17-
>
14+
> [!NOTE]
15+
> Automatic scaling is available for all app types: Windows and Linux (deploy as code or container).
16+
> Automatic scaling isn't supported for deployment slot traffic.
17+
18+
Automatic scaling is a scale-out option that automatically handles scaling decisions for your web apps and App Service plans. It's different from [Azure autoscale](/azure/azure-monitor/autoscale/autoscale-overview), which lets you define scaling rules based on metrics and schedules.
19+
20+
With automatic scaling, you can adjust scaling settings to improve performance and reduce cold-start delays. The platform prewarms instances to act as a buffer, ensuring smooth scaling transitions. You're billed per second for every instance, including prewarmed instances.
1821

19-
Automatic scaling is a scale-out option that automatically handles scaling decisions for your web apps and App Service plans. It's different from **[Azure autoscale](/azure/azure-monitor/autoscale/autoscale-overview)**, which lets you define scaling rules based on schedules and resources.
22+
## Before you begin
2023

21-
With automatic scaling, you can adjust scaling settings to improve your app's performance and avoid cold start issues. The platform prewarms instances to act as a buffer when scaling out, ensuring smooth performance transitions. You're charged per second for every instance, including prewarmed instances.
24+
Automatic scaling in App Service is different from autoscale.
25+
Use automatic scaling when you want App Service to handle scaling automatically based on HTTP traffic, without creating rules or schedules.
2226

23-
The following table compares scale-out and scale-in options available on App Service:
27+
**Automatic scaling (this article):**
28+
- Scales automatically based on incoming HTTP traffic
29+
- Configured per app
30+
- Supports Always ready, per-app limits, Maximum burst, and prewarmed instances
2431

25-
| | **Manual** | **Autoscale** | **Automatic scaling** |
26-
| --- | --- | --- | --- |
27-
| Available pricing tiers | Basic and up | Standard and up | Premium V2 (P1V2, P2V2, and P3V2) pricing tiers. Premium V3 (P0V3, P1V3, P2V3, P3V3, P1MV3, P2MV3, P3MV3, P4MV3, and P5MV3) pricing tiers.|
28-
|Rule-based scaling |No |Yes |No, the platform manages the scale-out and scale-in based on HTTP traffic. |
29-
|Schedule-based scaling |No |Yes |No |
30-
|Always-ready instances | No, your web app runs on the number of manually scaled instances. | No, your web app runs on other instances available during the scale-out operation, based on the threshold defined for autoscale rules. | Yes (minimum 1) |
31-
|Prewarmed instances |No |No |Yes (default 1) |
32-
|Per-app maximum |No |No |Yes |
32+
**Autoscale:**
33+
- Uses metrics (CPU, memory, queue length, custom metrics)
34+
- Supports schedule-based scaling
35+
- Applies to the entire App Service plan
36+
37+
If you need CPU-, memory-, or time-based scaling, use autoscale instead.
38+
Only one scaling method should be active for an App Service plan.
39+
40+
## Scale-out options available in App Service
41+
42+
|   | **Manual** | **Autoscale** | **Automatic scaling** |
43+
|--------|------------|---------------|------------------------|
44+
| Available tiers | Basic and up | Standard and up | Premium v2 and Premium v3 |
45+
| Rule-based scaling | No | Yes | No (traffic-based) |
46+
| Schedule-based scaling | No | Yes | No |
47+
| Always-ready instances | No | No | Yes (minimum 1) |
48+
| Prewarmed instances | No | No | Yes (default 1) |
49+
| Per-app maximum | No | No | Yes |
50+
| ARR affinity behavior | On by default | On unless manually disabled | [Should be disabled manually](#arr-affinity) |
3351

3452
## How automatic scaling works
3553

@@ -175,7 +193,7 @@ If your web app returns a 5xx status, these endpoint pings might result in inter
175193
### How do I track the number of scaled-out instances during the automatic scaling event?
176194

177195
The `AutomaticScalingInstanceCount` metric reports the number of virtual machines on which the app is running, including the prewarmed instance if it's deployed. This metric can also be used to track the maximum number of instances your web app scaled out during an automatic scaling event. This metric is available only for the apps that have **Automatic Scaling** enabled.
178-
196+
<a name='arr-affinity'></a>
179197
### How does ARR Affinity affect automatic scaling?
180198

181199
> [!NOTE]

articles/app-service/overview-managed-instance.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Managed Instance on App Service overview (preview)
33
description: Managed Instance on Azure App Service is a specialized hosting option that provides isolation, customization, and secure integration with Azure resources, ideal for legacy, and infrastructure-dependent web apps.
44
keywords: app service, azure app service, managed instance, isolation, vnet integration, registry, COM, RDP, installation scripts, key vault, pv4, pmv4, windows services, GAC, third-party dependencies
55
ms.topic: overview
6-
ms.date: 11/08/2025
6+
ms.date: 01/09/2026
77
ms.author: msangapu
88
author: msangapu-msft
99
ms.service: azure-app-service
@@ -95,7 +95,7 @@ Managed Instance provides plan-level configuration through:
9595
|-----------|---------|
9696
| **Platform** | • Windows only (no Linux/containers)<br>• Not available in ASE |
9797
| **SKUs** | Pv4 and Pmv4 only |
98-
| **Regions** | East Asia, West Central US, North Europe, East US |
98+
| **Regions** | East Asia, West Central US, North Europe, East US, Australia East |
9999
| **Authentication** | Entra ID and Managed Identity only (no domain join/NTLM/Kerberos) |
100100
| **Workloads** | Web apps only (no WebJobs, TCP/NetPipes) |
101101
| **Configuration** | Persistent changes require scripts (RDP is diagnostics-only) |
@@ -114,4 +114,4 @@ Managed Instance provides plan-level configuration through:
114114
- [Managed Instance Quickstart](quickstart-managed-instance.md)
115115
- [App Service overview](overview.md)
116116
- [Configure Managed Instance](configure-managed-instance.md)
117-
- [App Service Environment comparison](./environment/overview.md)
117+
- [App Service Environment comparison](./environment/overview.md)

articles/application-gateway/application-gateway-ssl-policy-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application gateway
55
author: mbender-ms
66
ms.service: azure-application-gateway
77
ms.topic: concept-article
8-
ms.date: 07/23/2025
8+
ms.date: 01/12/2026
99
ms.author: mbender
1010
#customer intent: As an IT administrator, I want to configure a TLS policy for the Application Gateway, so that I can centralize certificate management and ensure compliance with security standards while optimizing backend performance.
1111
---
@@ -42,8 +42,8 @@ The following table shows the list of cipher suites and minimum protocol version
4242
| **Minimum Protocol Version** | 1.0 | 1.1 | 1.2 | 1.2 | 1.2 |
4343
| **Enabled protocol versions** | 1.0<br/>1.1<br/>1.2 | 1.1<br/>1.2 | 1.2 | 1.2<br/>1.3 | 1.2<br/>1.3 |
4444
| **Default** | True<br/>(for API version < 2023-02-01) | False | False | True<br/>(for API version >= 2023-02-01) | False |
45-
| TLS_AES_128_GCM_SHA256 | &cross; | &cross; | &cross; | &check; | &check; |
4645
| TLS_AES_256_GCM_SHA384 | &cross; | &cross; | &cross; | &check; | &check; |
46+
| TLS_AES_128_GCM_SHA256 | &cross; | &cross; | &cross; | &check; | &check; |
4747
| TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 | &check; | &check; | &check; | &check; | &check; |
4848
| TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 | &check; | &check; | &check; | &check; | &check; |
4949
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 | &check; | &cross; | &cross; | &check; | &cross; |

articles/artifact-signing/how-to-signing-integrations.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -118,14 +118,14 @@ For example:
118118

119119
To download and install the Artifact Signing dlib package (a .zip file):
120120

121-
1. Download the [Artifact Signing dlib package](https://www.nuget.org/packages/Microsoft.Trusted.Signing.Client).
121+
1. Download the [Artifact Signing dlib package](https://www.nuget.org/packages/Microsoft.ArtifactSigning.Client).
122122

123123
1. Extract the Artifact Signing dlib zipped content and install it on your signing node in your choice of directory. The node must be the node where you use SignTool to sign files.
124124

125-
Another option is to download the [Artifact Signing dlib package](https://www.nuget.org/packages/Microsoft.Trusted.Signing.Client) via NuGet similar like the Windows SDK Build Tools NuGet package:
125+
Another option is to download the [Artifact Signing dlib package](https://www.nuget.org/packages/Microsoft.ArtifactSigning.Client) via NuGet similar like the Windows SDK Build Tools NuGet package:
126126

127127
```powershell
128-
.\nuget.exe install Microsoft.Trusted.Signing.Client -x
128+
.\nuget.exe install Microsoft.ArtifactSigning.Client -x
129129
```
130130

131131
> [!NOTE]
@@ -223,4 +223,4 @@ You can also use the following tools or platforms to set up signing integrations
223223

224224
- **Artifact Signing SDK**: To create your own signing integration, you can use our open-source [Artifact Signing SDK](https://www.nuget.org/packages/Azure.CodeSigning.Sdk).
225225

226-
- [**Azure.Developer.TrustedSigning.CryptoProvider**](https://www.nuget.org/packages/Azure.Developer.TrustedSigning.CryptoProvider): Simplifies integration of the service with a .NET crypto provider that abstracts the service endpoint integration from the consumer.
226+
- [**Azure.Developer.ArtifactSigning.CryptoProvider**](https://www.nuget.org/packages/Azure.Developer.ArtifactSigning.CryptoProvider): Simplifies integration of the service with a .NET crypto provider that abstracts the service endpoint integration from the consumer.

articles/azure-app-configuration/concept-snapshot-references.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,18 @@ A snapshot reference is stored as a key-value whose value contains the name of t
2828
> [!NOTE]
2929
> You don't have to call a specialized API to opt into snapshot references. If you select the key-value that is a snapshot reference, resolution is automatic.
3030
31+
## Creating a snapshot reference
32+
33+
1. Open your App Configuration store in the Azure portal.
34+
2. Select **Configuration Explorer**.
35+
3. Choose **Create**.
36+
4. Select **Snapshot reference**.
37+
5. Enter a key for the reference. Optionally set a label.
38+
6. Choose the target snapshot name from the list (or enter it).
39+
7. Select **Create**.
40+
41+
Once created, the snapshot reference appears alongside other key-values in Configuration Explorer.
42+
3143
## Consuming snapshot references
3244

3345
No new code is required to use a snapshot reference. If the key for a snapshot reference is part of the selected key-values when building configuration, the provider automatically resolves and loads the referenced snapshot's key-values. Compare this to direct snapshot usage where you explicitly call an API such as `SelectSnapshot("SnapshotName")`, fixing the snapshot choice at startup so switching later requires a code change or redeployment.

0 commit comments

Comments
 (0)