Skip to content

Commit eddc3dc

Browse files
Merge pull request #310383 from MicrosoftDocs/main
Auto Publish – main to live - 2026-01-12 18:00 UTC
2 parents 90e681b + 3d2b779 commit eddc3dc

22 files changed

Lines changed: 158 additions & 69 deletions

articles/app-service/includes/configure-azure-storage/azure-storage-linux-container-pivot.md

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -203,6 +203,46 @@ To validate that the Azure Storage is mounted successfully for the app:
203203
tcpping Storageaccount.file.core.windows.net
204204
```
205205

206+
### Storage mount health checks and auto‑recovery
207+
208+
Azure App Service includes a built‑in health‑check mechanism to ensure that mounted Azure Storage volumes (Azure Files or Azure Blob) remain accessible and responsive. This system helps prevent application hangs caused by stale or disconnected storage mounts.
209+
210+
#### How the health check works
211+
212+
1. **Periodic I/O test**
213+
App Service periodically performs file I/O on a marker file named `__lastCheckTime.txt`.
214+
- **Location:** A `LogFiles` subdirectory under the mounted path (for example, `/mount/path/LogFiles/__lastCheckTime.txt`).
215+
- **Behavior:**
216+
- A read operation is attempted on this file.
217+
- The file does *not* need to exist—“file not found” is treated as a successful check.
218+
219+
2. **Frequency**
220+
The check runs every **5 seconds** by default.
221+
222+
3. **Failure handling**
223+
- Each failed or timed‑out check increments a *failed ping counter*.
224+
- When failures exceed the configured threshold:
225+
- **Azure Files:** 18 failed pings
226+
- **Azure Blob:** 15 failed pings
227+
- The mount is marked **Faulted**, and **App Service automatically restarts the app** to restore connectivity to the share.
228+
229+
#### Configuration via App Settings
230+
231+
You can customize health‑check behavior using the following app settings.
232+
233+
| Storage type | Setting name | Default value | Description |
234+
|--------------|--------------|---------------|-------------|
235+
| Azure Files | `WEBSITE_BYOS_FILES_HEALTH_CHECK_FREQUENCY` | `5` | Interval in seconds between health checks. |
236+
| Azure Files | `WEBSITE_BYOS_FILES_MAX_FAILED_PINGS` | `18` | Number of consecutive failures before marking the volume as faulted. |
237+
| Azure Files | `WEBSITE_BYOS_FILES_AUTO_RECOVERY_ENABLED` | `true` | Set to `false` to disable auto‑recovery logic. |
238+
| Azure Blob | `WEBSITE_BYOS_BLOB_HEALTH_CHECK_FREQUENCY` | `5` | Interval in seconds between health checks. |
239+
| Azure Blob | `WEBSITE_BYOS_BLOB_MAX_FAILED_PINGS` | `15` | Number of consecutive failures before marking the volume as faulted. |
240+
| Azure Blob | `WEBSITE_BYOS_BLOB_AUTO_RECOVERY_ENABLED` | `true` | Set to `false` to disable auto‑recovery logic. |
241+
242+
#### Notes
243+
- Auto‑recovery helps prevent long‑running application hangs caused by unresponsive storage paths.
244+
- Disabling auto‑recovery is not recommended unless troubleshooting specific mount behavior.
245+
206246
## Best practices
207247

208248
### Performance

articles/app-service/overview-managed-instance.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Managed Instance on App Service overview (preview)
33
description: Managed Instance on Azure App Service is a specialized hosting option that provides isolation, customization, and secure integration with Azure resources, ideal for legacy, and infrastructure-dependent web apps.
44
keywords: app service, azure app service, managed instance, isolation, vnet integration, registry, COM, RDP, installation scripts, key vault, pv4, pmv4, windows services, GAC, third-party dependencies
55
ms.topic: overview
6-
ms.date: 11/08/2025
6+
ms.date: 01/09/2026
77
ms.author: msangapu
88
author: msangapu-msft
99
ms.service: azure-app-service
@@ -95,7 +95,7 @@ Managed Instance provides plan-level configuration through:
9595
|-----------|---------|
9696
| **Platform** | • Windows only (no Linux/containers)<br>• Not available in ASE |
9797
| **SKUs** | Pv4 and Pmv4 only |
98-
| **Regions** | East Asia, West Central US, North Europe, East US |
98+
| **Regions** | East Asia, West Central US, North Europe, East US, Australia East |
9999
| **Authentication** | Entra ID and Managed Identity only (no domain join/NTLM/Kerberos) |
100100
| **Workloads** | Web apps only (no WebJobs, TCP/NetPipes) |
101101
| **Configuration** | Persistent changes require scripts (RDP is diagnostics-only) |
@@ -114,4 +114,4 @@ Managed Instance provides plan-level configuration through:
114114
- [Managed Instance Quickstart](quickstart-managed-instance.md)
115115
- [App Service overview](overview.md)
116116
- [Configure Managed Instance](configure-managed-instance.md)
117-
- [App Service Environment comparison](./environment/overview.md)
117+
- [App Service Environment comparison](./environment/overview.md)

articles/azure-resource-manager/bicep/diagnostics/bcp337.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.date: 12/03/2025
66
ms.custom: devx-track-bicep
77
---
88

9-
# BCP337
9+
# Bicep diagnostic code - BCP337
1010

1111
This diagnostic occurs when an invalid declaration type is found in a Bicep parameters file.
1212

articles/azure-resource-manager/bicep/diagnostics/bcp338.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.date: 10/30/2025
66
ms.custom: devx-track-bicep
77
---
88

9-
# BCP338
9+
# Bicep diagnostic code - BCP338
1010

1111
This diagnostic occurs when Bicep can't resolve a parameter name in a Bicep parameters file.
1212

articles/azure-vmware/faq.yml

Lines changed: 30 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,35 @@ sections:
177177

178178
- question: What about support for ISV backup solutions?
179179
answer: As these backup solutions are installed and managed by customers, they can reach out to the respective ISV for support.
180-
180+
181+
- name: Reliability and availability
182+
questions:
183+
184+
- question: Can I deploy a stretched cluster across availability zones for higher availability?
185+
answer: Azure VMware Solution supports stretched clusters across availability zones in supported Azure regions and configurations. Availability varies by Azure VMware Solution generation and region. For more information, see [Deploy a stretched cluster](deploy-vsan-stretched-clusters.md).
186+
187+
- question: Does Azure VMware Solution Gen2 support Availability Zones?
188+
answer: Yes. In Azure VMware Solution Gen2, you can select the Availability Zone where your private cloud is deployed (subject to capacity availability in that zone). You can also deploy separate private clouds in different Availability Zones as part of a disaster recovery (DR) or high-availability strategy.
189+
190+
- question: Does Azure VMware Solution Gen2 support vSAN stretched clusters across Availability Zones?
191+
answer: No. vSAN stretched clusters (a single private cloud stretched across two Availability Zones) aren't supported on Azure VMware Solution Gen2 today.
192+
193+
- question: In Azure VMware Solution Gen1, can I choose the Availability Zone for my private cloud?
194+
answer: No. In Azure VMware Solution Gen1, selecting an Availability Zone isn't supported when deploying a private cloud.
195+
196+
- question: In Azure VMware Solution Gen1 stretched clusters, what happens if the Availability Zone hosting the vSAN witness becomes unavailable?
197+
answer: |
198+
Azure VMware Solution Gen1 uses a single vSAN witness that is statically placed in a specific Availability Zone within a region. If the Availability Zone hosting the witness becomes unavailable, the witness becomes unreachable.
199+
200+
As long as sufficient data replicas remain available, data hosts and running workloads continue operating without immediate data loss. However, vSAN loses quorum awareness in this state, which prevents it from safely making placement and recovery decisions and causes certain operations (such as VM power-on after failures, rebalancing, and repairs) to be blocked.
201+
202+
The witness isn't automatically recreated or moved to another Availability Zone during this time.
203+
204+
- question: Do four-zone Azure regions change how Azure VMware Solution uses Availability Zones?
205+
answer: No. Azure VMware Solution remains unaffected. Availability Zone capabilities depend on what Azure VMware Solution supports in that region and available capacity.
206+
207+
- question: Are there built-in capabilities to run workloads across multiple Azure VMware Solution private clouds for DR/HA?
208+
answer: No. Deploying workloads across multiple private clouds (for example, across Availability Zones) typically requires customer-managed orchestration and replication. For DR, customers commonly use third-party solutions such as Jetstream, Zerto, or Azure Site Recovery, based on workload requirements.
181209

182210
- name: Networking and interconnectivity
183211
questions:
@@ -330,7 +358,7 @@ sections:
330358
answer: No. We currently don't support cloudadmin extension privileges and have no plans to support it.
331359

332360

333-
- name: CSP and multi-tenancy
361+
- name: CSP and multitenancy
334362
questions:
335363

336364
- question: Does Azure VMware Solution provide an option for hoster partners to resell the service?

articles/backup/soft-delete-azure-backup-faq.yml

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ metadata:
44
description: Answers to common questions about the security feature - soft delete.
55
ms.topic: faq
66
ms.service: azure-backup
7-
ms.date: 01/31/2025
7+
ms.date: 01/12/2026
88
author: AbhishekMallick-MS
99
ms.author: v-mallicka
1010

@@ -33,7 +33,7 @@ sections:
3333
- question: |
3434
Can I perform a restore operation when my data is in soft delete state?
3535
answer: |
36-
No, you need to undelete the soft deleted resource in order to restore. The undelete operation will bring the resource back into the **Stop protection with retain data state** where you can restore to any point in time. Garbage collector remains paused in this state.
36+
No, you need to undelete the soft deleted resource in order to restore. The undelete-operation will bring the resource back into the **Stop protection with retain data state** where you can restore to any point in time. Garbage collector remains paused in this state.
3737
3838
- question: |
3939
Will my snapshots follow the same lifecycle as my recovery points in the vault?
@@ -43,7 +43,7 @@ sections:
4343
- question: |
4444
How can I trigger the scheduled backups again for a soft-deleted resource?
4545
answer: |
46-
Undelete followed by a resume operation will protect the resource again. The resume operation associates a backup policy to trigger the scheduled backups with the selected retention period. Also, the garbage collector runs as soon as the resume operation completes. If you wish to perform a restore from a recovery point that's past its expiration date, you're advised to do it before triggering the resume operation.
46+
Undelete followed by a resume operation will protect the resource again. The resume-operation associates a backup policy to trigger the scheduled backups with the selected retention period. Also, the garbage collector runs as soon as the resume-operation completes. If you wish to perform a restore from a recovery point that's past its expiration date, you're advised to do it before triggering the resume-operation.
4747
4848
- question: |
4949
Can I delete my vault if there are soft-deleted items in the vault?
@@ -53,7 +53,7 @@ sections:
5353
- question: |
5454
Can I delete the data earlier than the 14 days soft-delete period after deletion?
5555
answer: |
56-
No. You can't force-delete the soft-deleted items. They're automatically deleted after 14 days. This security feature is enabled to safeguard the backed-up data from accidental or malicious deletes. You should wait for 14 days before performing any other action on the item. Soft-deleted items won't be charged. If you need to reprotect the items marked for soft-delete within 14 days in a new vault, then contact Microsoft support.
56+
No. You can't force-delete the soft-deleted items. They're automatically deleted after 14 days. This security feature is enabled to safeguard the backed-up data from accidental or malicious deletes. You should wait for 14 days before performing any other action on the item. Soft-deleted items won't be charged. If you need to reprotect the items marked for soft-delete within 14 days in a new vault, then contact Microsoft support.
5757
5858
- question: |
5959
Can soft delete operations be performed in PowerShell or CLI?
@@ -63,4 +63,5 @@ sections:
6363
additionalContent: |
6464
6565
## Next steps
66-
[Manage the soft delete features in Azure Backup](backup-azure-security-feature-cloud.md).
66+
- [Manage the soft delete features in Azure Backup](backup-azure-security-feature-cloud.md).
67+
- [About enhanced soft delete for Azure Backup](backup-azure-enhanced-soft-delete-about.md).

articles/communication-services/quickstarts/tpe/teams-phone-extensibility-quickstart.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -166,6 +166,14 @@ You need to assign a public switched telephone network (PSTN) number to your Res
166166
1. Also, if you plan to make outbound PSTN calls using your Resource Accounts assigned phone number, now is a good time to assign a [Microsoft Teams Calling Plan](/microsoftteams/calling-plans-for-office-365).
167167
168168
169+
> **Note:** Proper configuration depends on the phone number service type assigned to the Resource account:
170+
> - **Direct Routing** – The tenant must be configured for Direct Routing with a verified Session Border Controller (SBC), a Direct Routing phone number assigned to the Resource account, and a Voice Routing Policy that allows PSTN calls assigned to the Resource account.
171+
> - **Calling Plan** – The Resource account must be assigned a Calling Plan service number and licensed with Microsoft Teams Phone Resource Account.
172+
> - **Operator Connect** – The phone number must be provisioned by an approved Operator Connect provider that supports outbound PSTN calling for voice applications.
173+
> - For all these connectivity options, you need to make sure you have the proper Microsoft licenses in place as detailed in the [general license prerequisite](/azure/communication-services/concepts/interop/tpe/teams-phone-extensibility-overview#prerequisites) or specifically for [Outbound license requirements](/azure/communication-services/quickstarts/tpe/teams-phone-extensibility-server-outbound-call#licensing-requirements)
174+
175+
176+
169177
### CCaaS Developer: Get Resource Account Information
170178
171179
We're introducing a new Graph API to get a list of Resource Accounts and phone numbers where assigned. The Graph API supports an optional filter on your Microsoft Entra first party `applicationID` / `clientId`.

articles/container-apps/ip-restrictions.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ There are two types of restrictions:
2222
* *Allow*: Allow inbound traffic only from address ranges you specify in allow rules.
2323
* *Deny*: Deny all inbound traffic only from address ranges you specify in deny rules.
2424

25-
when no IP restriction rules are defined, all inbound traffic is allowed.
25+
When no IP restriction rules are defined, all inbound traffic is allowed.
2626

2727
IP restrictions rules contain the following properties:
2828

@@ -186,6 +186,16 @@ az containerapp ingress access-restriction list
186186

187187
::: zone-end
188188

189+
## Troubleshooting
190+
191+
Use the following information to help you troubleshoot IP-related issues in your container app.
192+
193+
### Access denied
194+
195+
An *RBAC: Access Denied* message returned to the client indicates the client is blocked by IP restrictions from the container app. To fix this, make sure the client IP address requesting access is allowed based on either the "allow" or "deny" rules.
196+
197+
If using an address range, make sure the blocked IP falls within an allowed range.
198+
189199
## Next steps
190200

191201
> [!div class="nextstepaction"]

articles/container-apps/premium-ingress.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ az containerapp env premium-ingress remove \
142142
To remove the workload profile from the environment, run the following command:
143143

144144
````azurecli
145-
az containerapp env workload-profile remove \
145+
az containerapp env workload-profile delete \
146146
--resource-group my-resource-group \
147147
--name my-container-apps-env \
148148
--workload-profile-name Ingress-D4

0 commit comments

Comments
 (0)