Skip to content

Commit 1ba19fb

Browse files
committed
Merge branch 'main' into release-backup-security
2 parents 3e86411 + 2e1d571 commit 1ba19fb

38 files changed

Lines changed: 1584 additions & 1526 deletions

File tree

articles/azure-government/azure-secure-isolation-guidance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -601,7 +601,7 @@ You can enable IPsec in addition to MACsec on your ExpressRoute Direct ports, as
601601
#### Traffic across Microsoft global network backbone
602602
Azure services such as Storage and SQL Database can be configured for geo-replication to help ensure durability and high availability especially for disaster recovery scenarios. Azure relies on [paired regions](../reliability/cross-region-replication-azure.md) to deliver [geo-redundant storage](../storage/common/storage-redundancy.md) (GRS) and paired regions are also recommended when configuring active [geo-replication](/azure/azure-sql/database/active-geo-replication-overview) for Azure SQL Database. Paired regions are located within the same geography; however, network traffic isn't guaranteed to always follow the same path from one Azure region to another. To provide the reliability needed for the Azure cloud, Microsoft has many physical networking paths with automatic routing around failures for optimal reliability.
603603

604-
Moreover, all Azure traffic traveling within a region or between regions is [encrypted by Microsoft using MACsec](../security/fundamentals/encryption-overview.md#data-link-layer-encryption-in-azure), which relies on AES-128 block cipher for encryption. This traffic stays entirely within the Microsoft [global network backbone](../networking/microsoft-global-network.md) and never enters the public Internet. The backbone is one of the largest in the world with more than 250,000 km of lit fiber optic and undersea cable systems.
604+
Moreover, all Azure traffic traveling within a region or between regions is [encrypted by Microsoft using MACsec](../security/fundamentals/encryption-overview.md#data-link-layer-encryption), which relies on AES-128 block cipher for encryption. This traffic stays entirely within the Microsoft [global network backbone](../networking/microsoft-global-network.md) and never enters the public Internet. The backbone is one of the largest in the world with more than 250,000 km of lit fiber optic and undersea cable systems.
605605

606606
> [!IMPORTANT]
607607
> You should review Azure **[best practices for the protection of data in transit](../security/fundamentals/data-encryption-best-practices.md#protect-data-in-transit)** to help ensure that all data in transit is encrypted. For key Azure PaaS storage services (for example, Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics), data encryption in transit is **[enforced by default](/azure/azure-sql/database/security-overview#transport-layer-security-encryption-in-transit)**.

articles/azure-netapp-files/configure-cache-volumes.md

Lines changed: 57 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -18,44 +18,64 @@ Azure NetApp Files cache volumes are cloud-based caches of an external origin vo
1818

1919
Write-back allows the write to be committed to stable storage at the cache and acknowledges the client without waiting for the data to make it to the origin. This results in a globally distributed file system that enables writes to perform at near-local speeds for specific workloads and environments, offering significant performance benefits whereas write-around waits for the origin to commit the writes to the stable storage before acknowledging the client. This results in every write incurring the penalty of traversing the network between the cache and origin.
2020

21-
## Considerations
21+
## Requirements and considerations
2222

2323
* Cache volumes are currently only supported with the REST API (new caches endpoint).
24-
* The delegated subnet address space for hosting the Azure NetApp Files volumes must have at least seven free IP addresses: six for cluster peering and one for data access to one or more cache volumes.
25-
* Ensure the delegated subnet address space is sized appropriately to accommodate the Azure NetApp Files network interfaces. Review the [guidelines for Azure NetApp Files network planning](azure-netapp-files-network-topologies.md) to ensure you meet the requirements for delegated subnet sizing.
26-
* When creating each cache volume, the Azure NetApp Files volume placement algorithm attempts to reuse the same Azure NetApp Files storage system as any previously created cache volumes in the subscription to reduce the number of NICs/IPs consumed in the delegated subnet. If this isn't possible, another 6+1 NICs are consumed.
27-
* You can't use the same source cluster for multiple subscriptions for creating cache volumes in the same availability zone in the same region.
28-
* If enabling write-back on the external origin volume:
29-
* You must be running ONTAP 9.15.1P5 or later on the system hosting the external origin volume.
30-
* Each external origin system node has at least 128 GB of RAM and 20 CPUs to absorb the write-back messages initiated by write-back enabled caches. This is the equivalent of an A400 or greater. If the origin cluster serves as the origin to multiple write-back enabled Azure NetApp Files cache volumes, it requires more CPUs and RAM.
31-
* Testing is executed for files smaller than 100 GB and WAN roundtrip times between the cache and origin not exceeding 100 milliseconds. Any workloads outside of these limits might result in unexpected performance characteristics.
32-
* The external origin must remain less than 80% full. Cache volumes aren't granted exclusive lock delegations if there isn't at least 20% space remaining in the origin volume. Calls to a write-back-enabled cache are forwarded to the origin in this situation. This helps prevent running out of space at the origin, which would result in leaving dirty data orphaned at a write-back-enabled cache.
33-
* You shouldn't configure qtree, user, or group quotas at an origin volume with write-back enabled cache volumes. This may incur a significant latency increase.
34-
* You should be aware of the supported and unsupported features for cache volumes in Azure NetApp Files.
35-
* Unsupported features:
36-
* NFSv4.2
37-
* Ransomware protection
38-
* FlexCache disaster recovery
39-
* S3 Buckets
40-
* Azure NetApp Files backup
41-
* Cross-region, cross-zone, and cross-zone-region replication
42-
* Snapshot policies
43-
* Application volume groups
44-
* Supported features:
45-
* NFSv3 and NFSv4.1, SMB, and dual-protocol (NFS and SMB)
46-
* Lightweight Directory Access Protocol (LDAP)
47-
* Kerberos
48-
* Availability zone volume placement
49-
* Customer-managed keys
5024
* The Azure NetApp Files cache volume must be deployed in an availability zone. To populate a new or existing volume in an availability zone, see [Manage availability zones in Azure NetApp Files](manage-availability-zone-volume-placement.md).
51-
* Cache volumes only support Standard network features. Basic network features can't be configured on cache volumes.
52-
* When creating a cache volume, ensure there's sufficient space in the capacity pool to accommodate the new cache volume.
53-
* You can't move a cache volume to another capacity pool.
54-
* You can't transition noncustomer managed key cache volumes to customer managed key (CMK).
25+
* When creating a cache volume, ensure that there's sufficient space in the capacity pool to accommodate the new cache volume.
5526
* You should ensure that the protocol type is the same for the cache volume and origin volume. The security style and the Unix permissions are inherited from the origin volume. For example, creating a cache volume with NFSv3 or NFSv4 when origin is UNIX, and SMB when the origin is NTFS.
5627
* You should enable encryption on the origin volume.
5728
* You should configure an Active Directory (AD) or LDAP connection within the NetApp account to create an LDAP-enabled cache volume.
58-
* The `globalFileLocking` parameter value must be the same on all cache volumes that share the same origin volume. Global file locking can be enabled when creating the first cache volume by setting `globalFileLocking` to true. The subsequent cache volumes from the same origin volume must have this setting set to true. To change the global file locking setting on existing cache volumes, you must update the origin volume first and then the change will propagate to all the cache volumes associated with that origin volume. The `volume flexcache origin config modify -is-global-file-locking-enabled` command should be executed on the source cluster to change the setting on the origin volume.
29+
* You can't move a cache volume to another capacity pool.
30+
* The `globalFileLocking` parameter value must be the same on all cache volumes that share the same origin volume. Global file locking can be enabled when creating the first cache volume by setting `globalFileLocking` to true. The subsequent cache volumes from the same origin volume must have this setting set to true. To change the global file locking setting on existing cache volumes, you must update the origin volume first. After updating the origin volume, the change propagates to all the cache volumes associated with that origin volume. The `volume flexcache origin config modify -is-global-file-locking-enabled` command should be executed on the source cluster to change the setting on the origin volume.
31+
32+
### Networking considerations
33+
34+
* Cache volumes only support Standard network features. Basic network features can't be configured on cache volumes.
35+
* The delegated subnet address space for hosting the Azure NetApp Files volumes must have at least seven free IP addresses: six for cluster peering and one for data access to one or more cache volumes.
36+
* Ensure that the delegated subnet address space is sized appropriately to accommodate the Azure NetApp Files network interfaces. Review the [guidelines for Azure NetApp Files network planning](azure-netapp-files-network-topologies.md) to ensure you meet the requirements for delegated subnet sizing.
37+
* When creating each cache volume, the Azure NetApp Files volume placement algorithm attempts to reuse the same Azure NetApp Files storage system as any previously created cache volumes in the subscription to reduce the number of network interface cards (NICs)/IPs consumed in the delegated subnet. If this isn't possible, another 6+1 NICs are consumed.
38+
* You can't use the same source cluster for multiple subscriptions for creating cache volumes in the same availability zone in the same region.
39+
40+
### Write-back considerations
41+
42+
If you're enabling write-back on the external origin volume:
43+
44+
* You must be running ONTAP 9.15.1P5 or later on the system hosting the external origin volume.
45+
* Each external origin system node has at least 128 GB of RAM and 20 CPUs to absorb the write-back messages initiated by write-back enabled caches. This is the equivalent of an A400 or greater. If the origin cluster serves as the origin to multiple write-back enabled Azure NetApp Files cache volumes, it requires more CPUs and RAM.
46+
* Testing is executed for files smaller than 100 GB and WAN roundtrip times between the cache and origin not exceeding 100 milliseconds. Any workloads outside of these limits might result in unexpected performance characteristics.
47+
* The external origin must remain less than 80% full. Cache volumes aren't granted exclusive lock delegations if there isn't at least 20% space remaining in the origin volume. Calls to a write-back-enabled cache are forwarded to the origin in this situation. This helps prevent running out of space at the origin, which would result in leaving dirty data orphaned at a write-back-enabled cache.
48+
* You shouldn't configure qtree, user, or group quotas at an origin volume with write-back enabled cache volumes. This may incur a significant latency increase.
49+
50+
### Interoperability considerations
51+
52+
You can't use cache volumes if the following features are configured on the source or destination:
53+
54+
#### Unsupported features
55+
56+
The following features can't be used with Azure NetApp Files cache volumes:
57+
58+
* Application volume groups
59+
* Azure NetApp Files backup
60+
* Cross-region, cross-zone, and cross-zone-region replication
61+
* FlexCache disaster recovery
62+
* NFSv4.2
63+
* Ransomware protection
64+
* Snapshot policies
65+
* S3 Buckets
66+
67+
#### Supported features
68+
69+
The following features are supported with cache volumes:
70+
71+
* Availability zone volume placement
72+
* Customer-managed keys
73+
* Lightweight Directory Access Protocol (LDAP)
74+
* NFSv3 and NFSv4.1, SMB, and dual-protocol (NFS and SMB)
75+
* Kerberos
76+
77+
>[!NOTE]
78+
>You can't transition noncustomer managed key cache volumes to customer managed key.
5979
6080
## Register the feature
6181

@@ -119,19 +139,19 @@ The network connectivity must be in place for all intercluster (IC) LIFs on the
119139
> Don't execute the `vserverPeeringCommand` until the next step.
120140
121141
> [!NOTE]
122-
> If cache volumes are already created using this ONTAP system, then the existing cluster peer is reused. There can be situations where a different Azure NetApp Files cluster may be used which would require a new cluster peer.
142+
> If cache volumes are already created using this ONTAP system, then the existing cluster peer is reused. There can be situations where a different Azure NetApp Files cluster might be used, which requires a new cluster peer.
123143
124144
3. Monitor if the cache state is available for storage VM peering using a GET request.
125145
126-
When the `cacheState = VserverPeeringOfferSent`, go to the ONTAP system that contains the external origin volume and execute the `vserver peer show` command until an entry appears where the remote storage VM displays the `<value of the -peer-vserver in the vserverPeeringCommand>`. The Peer State shows "pending".
146+
When the `cacheState = VserverPeeringOfferSent`, go to the ONTAP system that contains the external origin volume and execute the `vserver peer show` command until an entry appears where the remote storage VM displays the `<value of the -peer-vserver in the vserverPeeringCommand>`. The peer state shows "pending."
127147
128-
Execute the `vserverPeeringCommand` on the ONTAP system that contains the external origin volume. The peer state should transition to "peered".
148+
Execute the `vserverPeeringCommand` on the ONTAP system that contains the external origin volume. The peer state should transition to "peered."
129149
130150
> [!NOTE]
131-
> You have 12 minutes after the `cacheState` transitions to `VserverPeeringOfferSent` to complete execution of the `vserverPeeringCommand`. If you don't execute the command within 12 minutes, cache creation fails. You will need to delete the cache volume and initiate a new PUT request.
151+
> You have 12 minutes after the `cacheState` transitions to `VserverPeeringOfferSent` to complete execution of the `vserverPeeringCommand`. If you don't execute the command within 12 minutes, cache creation fails. You'll need to delete the cache volume and initiate a new PUT request.
132152
133153
> [!NOTE]
134-
> If cache volumes are already created using this ONTAP system and the cluster peer was reused, then the existing vserver peer may be reused. If that happens, then step 3 will be skipped and the next step will be executed.
154+
> If cache volumes are already created using this ONTAP system and the cluster peer was reused, then the existing vserver peer may be reused. If that happens, you'll skip step three and the next step will be executed.
135155
136156
4. Complete the cache volume creation.
137157

articles/azure-netapp-files/faq-data-migration-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,11 +99,11 @@ No. If you want to use the existing subnet, you should clean up the IP addresses
9999

100100
### Can I enable cool access on a migration volume in the migration assistant tool?
101101

102-
You should only enable cool access if you've finalized migration. Otherwise, use a different volume. Finalizing the migration converts the volume a regular Azure NetApp Files volume allowing you to enable cool access.
102+
You should only enable cool access if you've finalized migration. Otherwise, use a different volume. Finalizing the migration converts the volume to a regular Azure NetApp Files volume, allowing you to enable cool access.
103103

104104
### Why am I not able to resume migrations after it has been paused from the migration assistant tool?
105105

106-
Select the action from the **Migration** tab of the volume, not from the migration assistant view. The Migration tab is up to date for all migrations that are paused or resumed.
106+
Select the action icon from the **Migration** tab of the volume, not from the migration assistant view.
107107

108108
### Are there post-migration steps to be performed on ONTAP systems?
109109

articles/azure-netapp-files/migrate-volumes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ The network connectivity must be in place for all intercluster (IC) LIFs on the
196196
GET https://<region>.management.azure.com/subscriptions/<subscription-ID>/providers/Microsoft.NetApp/locations/<location>/operationResults/<>?api-version=2025-06-01&...
197197
```
198198
199-
An example response:
199+
The response looks like:
200200
201201
```json
202202
{
@@ -259,7 +259,7 @@ The portal version of the migration assistant is currently in preview.
259259
| **Cut over** | Removes the replication relationship. If this is the last migration to this Azure NetApp Files storage, the peering relationship is also removed. |
260260
| **Finalize migration** | Deletes the external migration relationship and converts the destination volume into a regular volume. If this is the last migration to this Azure NetApp Files account, the peering relationship is also removed. |
261261
| **Cancel migration** | Cancels the migration process and deletes the destination volume. The peering relationship between the ONTAP cluster and Azure NetApp Files is removed if it's not used by any other migration volume. |
262-
| **View migration details** | Migration details provide information about the migration for a specific volume. To view these details, go to the under the **Actions** column then select the three dots `...` associated with the volume and **View migration details**. |
262+
| **View migration details** | Learn about the migration status and details for a specific volume. To view these details, select the three dots `...` associated with the volume under the Actions column then **View migration details**. |
263263
264264
2. Select **New migration**.
265265
3. In the **Source** tab, provide the following information:
@@ -268,7 +268,7 @@ The portal version of the migration assistant is currently in preview.
268268
Enter the name for the cluster that contains the volume you're migrating.
269269
270270
* **SVM Name**
271-
Enter the name for the external storage VM that contains the volume you're migrating.
271+
Enter the name for the external SVM that contains the volume you're migrating.
272272
273273
* **Source volume name**
274274
Enter the name for the external ONTAP volume that you're migrating.

articles/cost-management-billing/manage/subscription-transfer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.reviewer: nicholak
77
ms.service: cost-management-billing
88
ms.subservice: billing
99
ms.topic: concept-article
10-
ms.date: 10/21/2025
10+
ms.date: 11/06/2025
1111
---
1212

1313
# Azure product transfer hub

0 commit comments

Comments
 (0)