Skip to content

Commit d70e749

Browse files
authored
Merge pull request #311003 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 775233e + 883e113 commit d70e749

6 files changed

Lines changed: 16 additions & 23 deletions

File tree

articles/azure-functions/migrate-dotnet-to-isolated-model.md

Lines changed: 4 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -310,20 +310,13 @@ using Microsoft.Extensions.Logging;
310310

311311
namespace Company.Function
312312
{
313-
public class HttpTriggerCSharp
313+
public class HttpTriggerCSharp(ILogger<HttpTriggerCSharp> logger)
314314
{
315-
private readonly ILogger<HttpTriggerCSharp> _logger;
316-
317-
public HttpTriggerCSharp(ILogger<HttpTriggerCSharp> logger)
318-
{
319-
_logger = logger;
320-
}
321-
322315
[Function("HttpTriggerCSharp")]
323316
public IActionResult Run(
324317
[HttpTrigger(AuthorizationLevel.Function, "get")] HttpRequest req)
325318
{
326-
_logger.LogInformation("C# HTTP trigger function processed a request.");
319+
logger.LogInformation("C# HTTP trigger function processed a request.");
327320

328321
return new OkObjectResult($"Welcome to Azure Functions, {req.Query["name"]}!");
329322
}
@@ -341,19 +334,12 @@ using System.Net;
341334

342335
namespace Company.Function
343336
{
344-
public class HttpTriggerCSharp
337+
public class HttpTriggerCSharp(ILogger<HttpTriggerCSharp> logger)
345338
{
346-
private readonly ILogger<HttpTriggerCSharp> _logger;
347-
348-
public HttpTriggerCSharp(ILogger<HttpTriggerCSharp> logger)
349-
{
350-
_logger = logger;
351-
}
352-
353339
[Function("HttpTriggerCSharp")]
354340
public HttpResponseData Run([HttpTrigger(AuthorizationLevel.Function, "get")] HttpRequestData req)
355341
{
356-
_logger.LogInformation("C# HTTP trigger function processed a request.");
342+
logger.LogInformation("C# HTTP trigger function processed a request.");
357343

358344
var response = req.CreateResponse(HttpStatusCode.OK);
359345
response.Headers.Add("Content-Type", "text/plain; charset=utf-8");

articles/azure-functions/run-functions-from-deployment-package.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ To enable your function app to run from a package on the [Consumption](./consump
3434

3535
| Value | Description |
3636
|---------|---------|
37-
| **`1`** | Indicates that the function app runs from a local package file deployed in the `c:\home\data\SitePackages` (Windows) or `/home/data/SitePackages` (Linux) folder of your function app. |
37+
| **`1`** | Indicates that the function app runs from a local package file deployed in the `c:\home\data\SitePackages` (Windows) or `/home/data/SitePackages` (Linux) folder of your function app. This is the default option when you use [Azure Functions Core Tools](/azure/azure-functions/functions-run-local). |
3838
|**`<URL>`** | Sets a URL that is the remote location of the specific package file you want to run. Required for functions apps running on Linux in a Consumption plan. |
3939

4040
The following table indicates the recommended `WEBSITE_RUN_FROM_PACKAGE` values for deployment to a specific operating system and hosting plan:

articles/cost-management-billing/manage/manage-azure-subscription-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ This article helps you to configure Azure subscription policies to control the m
2020

2121
## Prerequisites
2222

23-
- Only directory [global administrators](../../active-directory/roles/permissions-reference.md#global-administrator) can edit subscription policies. Before editing subscription policies, the global administrator must [Elevate access to manage all Azure subscriptions and management groups](../../role-based-access-control/elevate-access-global-admin.md). Then they can edit subscription policies.
23+
- Only directory [global administrators](../../active-directory/roles/permissions-reference.md#global-administrator) with direct role assignment can edit subscription policies. Before editing subscription policies, the global administrator must [Elevate access to manage all Azure subscriptions and management groups](../../role-based-access-control/elevate-access-global-admin.md). Then they can edit subscription policies.
2424
- All other users can only read the current policy setting.
2525
- Subscriptions transferred into or out of a directory must remain associated with a Billing Tenant to ensure billing occurs correctly.
2626

articles/sentinel/enable-entity-behavior-analytics.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,9 @@ To enable or disable this feature (these prerequisites aren't required to use th
3939
- Your user must be assigned to the Microsoft Entra ID **Security Administrator** role in your tenant or the equivalent permissions.
4040

4141
- Your user must be assigned at least one of the following **Azure roles** ([Learn more about Azure RBAC](roles.md)):
42-
- **Microsoft Sentinel Contributor** at the workspace or resource group levels.
43-
- **Log Analytics Contributor** at the resource group or subscription levels.
42+
- **Owner** at the resource group level or above.
43+
- **Contributor** at the resource group level or above.
44+
- (Least privileged) **Microsoft Sentinel Contributor** at the workspace level or above and **Log Analytics Contributor** at the resource group level or above.
4445

4546
- Your workspace must not have any Azure resource locks applied to it. [Learn more about Azure resource locking](../azure-resource-manager/management/lock-resources.md).
4647

articles/virtual-network/create-virtual-machine-accelerated-networking.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -370,7 +370,12 @@ New-AzBastion @bastionParams -AsJob
370370

371371
### [Portal](#tab/portal)
372372

373-
Accelerated networking is enabled in the portal during virtual machine creation. Create a virtual machine in the following section.
373+
Accelerated networking is enabled in the portal during virtual machine creation. Create a virtual machine in the following section.
374+
375+
>[!NOTE]
376+
>- The Accelerated Networking setting in the portal shows the user-selected state. Accelerated Networking allows choosing Disabled in the portal even if the VM size requires Accelerated Networking. VM sizes that require Accelerated Networking enable Accelerated Networking at runtime regardless of the user setting in the portal. Accelerated Networking is a required feature for general purpose VM sizes of v5 or higher.
377+
378+
374379

375380
### [PowerShell](#tab/powershell)
376381

includes/functions-create-container-registry.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -165,6 +165,7 @@ func new --name HttpExample --template "HTTP trigger"
165165
```
166166
::: zone-end
167167
To test the function locally, start the local Azure Functions runtime host in the root of the project folder.
168+
To ensure the function can be called later when hosted in Docker, check that the authorization level is set to AuthorizationLevel.Anonymous, or set it if not already configured.
168169
::: zone pivot="programming-language-csharp"
169170
```console
170171
func start

0 commit comments

Comments
 (0)