Azure Functions 2.x, Function runtime V3.2

Photo from: https://wardpeter.com/trigger-azure-function-using-power-automate-part-3/

Configuration

The common way that we apply our custom setting under azure function via local.settings.json (for development) as example below:

``` local.settings.json
{
"IsEncrypted": false,
"Values": {
"AzureWebJobsStorage": "UseDevelopmentStorage=true",
"FUNCTIONS_WORKER_RUNTIME": "dotnet",
"BYOB_TokenMap": "D:\\Temp",
"Uri": "http://xxxxxx/api/getxxxxx"
}
}

For the application side we could retrieve the user defined (Uri) using below code…

Preprocessing in the earlier stage

Suppose we have below class:

public class TestResultInBound {
[JsonProperty ("supplier_code")]
public string SupplierCode { get; set; }
[JsonProperty ("supplier_name")]
public string SupplierName { get; set; }
[JsonProperty ("commodity_name")]
public string CommodityName { get; set; }
[JsonProperty ("site")]
public string Site { get; set; }
[JsonProperty("unit")]…

BizTalk — take EDI 850 (X12_00401) N1 looing section as example

Photo from: https://safe-software.gitbooks.io/fme-desktop-basic-training-2017/content/DesktopBasic2Transformation/2.04.SchemaMapping.html

The default route for dealing with EDI850 could be:

1. Receiving EDI850 (source in)
2. BizTalk mapping and processing
3. Store into database table (target)
4. ERP processing
5. Others...

According to EDI 850 schema, we having Looing N1 elements in header section as below definition.

Photo from: https://www.rina.org/en/business/transport-infrastructure/resilience-engineering

Sometimes we would like to robust our application(s) or service(s) under diverse situations. For instance, networking recovering/monitoring handling (Retry/Circuit-breaker/Cache…policies). If you might interest more detail see Polly which could through you into more details.

The article might talking about using cache policy (memory cache) to handle duplicated requests (might comes…

Take ASP.NET Core 3.1 as an example

Photo from: https://wateroxconsulting.com/archives/whitelist/

In some scenarios, we would like to create a white list to allow the specific end-user to access the diverse resource(s) under SignalR. So if we could retrieving request information something like IP address, user identity…that we might apply some access controlling logic during data transmission among SignralR server and…

LAI TOCA

Coding for fun

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store