You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-government/azure-secure-isolation-guidance.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -601,7 +601,7 @@ You can enable IPsec in addition to MACsec on your ExpressRoute Direct ports, as
601
601
#### Traffic across Microsoft global network backbone
602
602
Azure services such as Storage and SQL Database can be configured for geo-replication to help ensure durability and high availability especially for disaster recovery scenarios. Azure relies on [paired regions](../reliability/cross-region-replication-azure.md) to deliver [geo-redundant storage](../storage/common/storage-redundancy.md) (GRS) and paired regions are also recommended when configuring active [geo-replication](/azure/azure-sql/database/active-geo-replication-overview) for Azure SQL Database. Paired regions are located within the same geography; however, network traffic isn't guaranteed to always follow the same path from one Azure region to another. To provide the reliability needed for the Azure cloud, Microsoft has many physical networking paths with automatic routing around failures for optimal reliability.
603
603
604
-
Moreover, all Azure traffic traveling within a region or between regions is [encrypted by Microsoft using MACsec](../security/fundamentals/encryption-overview.md#data-link-layer-encryption-in-azure), which relies on AES-128 block cipher for encryption. This traffic stays entirely within the Microsoft [global network backbone](../networking/microsoft-global-network.md) and never enters the public Internet. The backbone is one of the largest in the world with more than 250,000 km of lit fiber optic and undersea cable systems.
604
+
Moreover, all Azure traffic traveling within a region or between regions is [encrypted by Microsoft using MACsec](../security/fundamentals/encryption-overview.md#data-link-layer-encryption), which relies on AES-128 block cipher for encryption. This traffic stays entirely within the Microsoft [global network backbone](../networking/microsoft-global-network.md) and never enters the public Internet. The backbone is one of the largest in the world with more than 250,000 km of lit fiber optic and undersea cable systems.
605
605
606
606
> [!IMPORTANT]
607
607
> You should review Azure **[best practices for the protection of data in transit](../security/fundamentals/data-encryption-best-practices.md#protect-data-in-transit)** to help ensure that all data in transit is encrypted. For key Azure PaaS storage services (for example, Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics), data encryption in transit is **[enforced by default](/azure/azure-sql/database/security-overview#transport-layer-security-encryption-in-transit)**.
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/configure-cache-volumes.md
+57-37Lines changed: 57 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,44 +18,64 @@ Azure NetApp Files cache volumes are cloud-based caches of an external origin vo
18
18
19
19
Write-back allows the write to be committed to stable storage at the cache and acknowledges the client without waiting for the data to make it to the origin. This results in a globally distributed file system that enables writes to perform at near-local speeds for specific workloads and environments, offering significant performance benefits whereas write-around waits for the origin to commit the writes to the stable storage before acknowledging the client. This results in every write incurring the penalty of traversing the network between the cache and origin.
20
20
21
-
## Considerations
21
+
## Requirements and considerations
22
22
23
23
* Cache volumes are currently only supported with the REST API (new caches endpoint).
24
-
* The delegated subnet address space for hosting the Azure NetApp Files volumes must have at least seven free IP addresses: six for cluster peering and one for data access to one or more cache volumes.
25
-
* Ensure the delegated subnet address space is sized appropriately to accommodate the Azure NetApp Files network interfaces. Review the [guidelines for Azure NetApp Files network planning](azure-netapp-files-network-topologies.md) to ensure you meet the requirements for delegated subnet sizing.
26
-
* When creating each cache volume, the Azure NetApp Files volume placement algorithm attempts to reuse the same Azure NetApp Files storage system as any previously created cache volumes in the subscription to reduce the number of NICs/IPs consumed in the delegated subnet. If this isn't possible, another 6+1 NICs are consumed.
27
-
* You can't use the same source cluster for multiple subscriptions for creating cache volumes in the same availability zone in the same region.
28
-
* If enabling write-back on the external origin volume:
29
-
* You must be running ONTAP 9.15.1P5 or later on the system hosting the external origin volume.
30
-
* Each external origin system node has at least 128 GB of RAM and 20 CPUs to absorb the write-back messages initiated by write-back enabled caches. This is the equivalent of an A400 or greater. If the origin cluster serves as the origin to multiple write-back enabled Azure NetApp Files cache volumes, it requires more CPUs and RAM.
31
-
* Testing is executed for files smaller than 100 GB and WAN roundtrip times between the cache and origin not exceeding 100 milliseconds. Any workloads outside of these limits might result in unexpected performance characteristics.
32
-
* The external origin must remain less than 80% full. Cache volumes aren't granted exclusive lock delegations if there isn't at least 20% space remaining in the origin volume. Calls to a write-back-enabled cache are forwarded to the origin in this situation. This helps prevent running out of space at the origin, which would result in leaving dirty data orphaned at a write-back-enabled cache.
33
-
* You shouldn't configure qtree, user, or group quotas at an origin volume with write-back enabled cache volumes. This may incur a significant latency increase.
34
-
* You should be aware of the supported and unsupported features for cache volumes in Azure NetApp Files.
35
-
* Unsupported features:
36
-
* NFSv4.2
37
-
* Ransomware protection
38
-
* FlexCache disaster recovery
39
-
* S3 Buckets
40
-
* Azure NetApp Files backup
41
-
* Cross-region, cross-zone, and cross-zone-region replication
42
-
* Snapshot policies
43
-
* Application volume groups
44
-
* Supported features:
45
-
* NFSv3 and NFSv4.1, SMB, and dual-protocol (NFS and SMB)
46
-
* Lightweight Directory Access Protocol (LDAP)
47
-
* Kerberos
48
-
* Availability zone volume placement
49
-
* Customer-managed keys
50
24
* The Azure NetApp Files cache volume must be deployed in an availability zone. To populate a new or existing volume in an availability zone, see [Manage availability zones in Azure NetApp Files](manage-availability-zone-volume-placement.md).
51
-
* Cache volumes only support Standard network features. Basic network features can't be configured on cache volumes.
52
-
* When creating a cache volume, ensure there's sufficient space in the capacity pool to accommodate the new cache volume.
53
-
* You can't move a cache volume to another capacity pool.
54
-
* You can't transition noncustomer managed key cache volumes to customer managed key (CMK).
25
+
* When creating a cache volume, ensure that there's sufficient space in the capacity pool to accommodate the new cache volume.
55
26
* You should ensure that the protocol type is the same for the cache volume and origin volume. The security style and the Unix permissions are inherited from the origin volume. For example, creating a cache volume with NFSv3 or NFSv4 when origin is UNIX, and SMB when the origin is NTFS.
56
27
* You should enable encryption on the origin volume.
57
28
* You should configure an Active Directory (AD) or LDAP connection within the NetApp account to create an LDAP-enabled cache volume.
58
-
* The `globalFileLocking` parameter value must be the same on all cache volumes that share the same origin volume. Global file locking can be enabled when creating the first cache volume by setting `globalFileLocking` to true. The subsequent cache volumes from the same origin volume must have this setting set to true. To change the global file locking setting on existing cache volumes, you must update the origin volume first and then the change will propagate to all the cache volumes associated with that origin volume. The `volume flexcache origin config modify -is-global-file-locking-enabled` command should be executed on the source cluster to change the setting on the origin volume.
29
+
* You can't move a cache volume to another capacity pool.
30
+
* The `globalFileLocking` parameter value must be the same on all cache volumes that share the same origin volume. Global file locking can be enabled when creating the first cache volume by setting `globalFileLocking` to true. The subsequent cache volumes from the same origin volume must have this setting set to true. To change the global file locking setting on existing cache volumes, you must update the origin volume first. After updating the origin volume, the change propagates to all the cache volumes associated with that origin volume. The `volume flexcache origin config modify -is-global-file-locking-enabled` command should be executed on the source cluster to change the setting on the origin volume.
31
+
32
+
### Networking considerations
33
+
34
+
* Cache volumes only support Standard network features. Basic network features can't be configured on cache volumes.
35
+
* The delegated subnet address space for hosting the Azure NetApp Files volumes must have at least seven free IP addresses: six for cluster peering and one for data access to one or more cache volumes.
36
+
* Ensure that the delegated subnet address space is sized appropriately to accommodate the Azure NetApp Files network interfaces. Review the [guidelines for Azure NetApp Files network planning](azure-netapp-files-network-topologies.md) to ensure you meet the requirements for delegated subnet sizing.
37
+
* When creating each cache volume, the Azure NetApp Files volume placement algorithm attempts to reuse the same Azure NetApp Files storage system as any previously created cache volumes in the subscription to reduce the number of network interface cards (NICs)/IPs consumed in the delegated subnet. If this isn't possible, another 6+1 NICs are consumed.
38
+
* You can't use the same source cluster for multiple subscriptions for creating cache volumes in the same availability zone in the same region.
39
+
40
+
### Write-back considerations
41
+
42
+
If you're enabling write-back on the external origin volume:
43
+
44
+
* You must be running ONTAP 9.15.1P5 or later on the system hosting the external origin volume.
45
+
* Each external origin system node has at least 128 GB of RAM and 20 CPUs to absorb the write-back messages initiated by write-back enabled caches. This is the equivalent of an A400 or greater. If the origin cluster serves as the origin to multiple write-back enabled Azure NetApp Files cache volumes, it requires more CPUs and RAM.
46
+
* Testing is executed for files smaller than 100 GB and WAN roundtrip times between the cache and origin not exceeding 100 milliseconds. Any workloads outside of these limits might result in unexpected performance characteristics.
47
+
* The external origin must remain less than 80% full. Cache volumes aren't granted exclusive lock delegations if there isn't at least 20% space remaining in the origin volume. Calls to a write-back-enabled cache are forwarded to the origin in this situation. This helps prevent running out of space at the origin, which would result in leaving dirty data orphaned at a write-back-enabled cache.
48
+
* You shouldn't configure qtree, user, or group quotas at an origin volume with write-back enabled cache volumes. This may incur a significant latency increase.
49
+
50
+
### Interoperability considerations
51
+
52
+
You can't use cache volumes if the following features are configured on the source or destination:
53
+
54
+
#### Unsupported features
55
+
56
+
The following features can't be used with Azure NetApp Files cache volumes:
57
+
58
+
* Application volume groups
59
+
* Azure NetApp Files backup
60
+
* Cross-region, cross-zone, and cross-zone-region replication
61
+
* FlexCache disaster recovery
62
+
* NFSv4.2
63
+
* Ransomware protection
64
+
* Snapshot policies
65
+
* S3 Buckets
66
+
67
+
#### Supported features
68
+
69
+
The following features are supported with cache volumes:
70
+
71
+
* Availability zone volume placement
72
+
* Customer-managed keys
73
+
* Lightweight Directory Access Protocol (LDAP)
74
+
* NFSv3 and NFSv4.1, SMB, and dual-protocol (NFS and SMB)
@@ -119,19 +139,19 @@ The network connectivity must be in place for all intercluster (IC) LIFs on the
119
139
> Don't execute the `vserverPeeringCommand` until the next step.
120
140
121
141
> [!NOTE]
122
-
> If cache volumes are already created using this ONTAP system, then the existing cluster peer is reused. There can be situations where a different Azure NetApp Files cluster may be used which would require a new cluster peer.
142
+
> If cache volumes are already created using this ONTAP system, then the existing cluster peer is reused. There can be situations where a different Azure NetApp Files cluster might be used, which requires a new cluster peer.
123
143
124
144
3. Monitor if the cache state is available for storage VM peering using a GET request.
125
145
126
-
When the `cacheState = VserverPeeringOfferSent`, go to the ONTAP system that contains the external origin volume and execute the `vserver peer show` command until an entry appears where the remote storage VM displays the `<value of the -peer-vserver in the vserverPeeringCommand>`. The Peer State shows "pending".
146
+
When the `cacheState = VserverPeeringOfferSent`, go to the ONTAP system that contains the external origin volume and execute the `vserver peer show` command until an entry appears where the remote storage VM displays the `<value of the -peer-vserver in the vserverPeeringCommand>`. The peer state shows "pending."
127
147
128
-
Execute the `vserverPeeringCommand` on the ONTAP system that contains the external origin volume. The peer state should transition to "peered".
148
+
Execute the `vserverPeeringCommand` on the ONTAP system that contains the external origin volume. The peer state should transition to "peered."
129
149
130
150
> [!NOTE]
131
-
> You have 12 minutes after the `cacheState` transitions to `VserverPeeringOfferSent` to complete execution of the `vserverPeeringCommand`. If you don't execute the command within 12 minutes, cache creation fails. You will need to delete the cache volume and initiate a new PUT request.
151
+
> You have 12 minutes after the `cacheState` transitions to `VserverPeeringOfferSent` to complete execution of the `vserverPeeringCommand`. If you don't execute the command within 12 minutes, cache creation fails. You'll need to delete the cache volume and initiate a new PUT request.
132
152
133
153
> [!NOTE]
134
-
> If cache volumes are already created using this ONTAP system and the cluster peer was reused, then the existing vserver peer may be reused. If that happens, then step 3 will be skipped and the next step will be executed.
154
+
> If cache volumes are already created using this ONTAP system and the cluster peer was reused, then the existing vserver peer may be reused. If that happens, you'll skip step three and the next step will be executed.
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/faq-data-migration-protection.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,11 +99,11 @@ No. If you want to use the existing subnet, you should clean up the IP addresses
99
99
100
100
### Can I enable cool access on a migration volume in the migration assistant tool?
101
101
102
-
You should only enable cool access if you've finalized migration. Otherwise, use a different volume. Finalizing the migration converts the volume a regular Azure NetApp Files volume allowing you to enable cool access.
102
+
You should only enable cool access if you've finalized migration. Otherwise, use a different volume. Finalizing the migration converts the volume to a regular Azure NetApp Files volume, allowing you to enable cool access.
103
103
104
104
### Why am I not able to resume migrations after it has been paused from the migration assistant tool?
105
105
106
-
Select the action from the **Migration** tab of the volume, not from the migration assistant view. The Migration tab is up to date for all migrations that are paused or resumed.
106
+
Select the action icon from the **Migration** tab of the volume, not from the migration assistant view.
107
107
108
108
### Are there post-migration steps to be performed on ONTAP systems?
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/migrate-volumes.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -196,7 +196,7 @@ The network connectivity must be in place for all intercluster (IC) LIFs on the
196
196
GET https://<region>.management.azure.com/subscriptions/<subscription-ID>/providers/Microsoft.NetApp/locations/<location>/operationResults/<>?api-version=2025-06-01&...
197
197
```
198
198
199
-
An example response:
199
+
The response looks like:
200
200
201
201
```json
202
202
{
@@ -259,7 +259,7 @@ The portal version of the migration assistant is currently in preview.
259
259
| **Cut over** | Removes the replication relationship. If this is the last migration to this Azure NetApp Files storage, the peering relationship is also removed. |
260
260
| **Finalize migration** | Deletes the external migration relationship and converts the destination volume into a regular volume. If this is the last migration to this Azure NetApp Files account, the peering relationship is also removed. |
261
261
| **Cancel migration** | Cancels the migration process and deletes the destination volume. The peering relationship between the ONTAP cluster and Azure NetApp Files is removed if it's not used by any other migration volume. |
262
-
| **View migration details** | Migration details provide information about the migration for a specific volume. To view these details, go to the under the **Actions** column then select the three dots `...` associated with the volume and **View migration details**. |
262
+
| **View migration details** | Learn about the migration status and details for a specific volume. To view these details, select the three dots `...` associated with the volume under the Actions column then **View migration details**. |
263
263
264
264
2. Select **New migration**.
265
265
3. In the **Source** tab, provide the following information:
@@ -268,7 +268,7 @@ The portal version of the migration assistant is currently in preview.
268
268
Enter the name for the cluster that contains the volume you're migrating.
269
269
270
270
* **SVM Name**
271
-
Enter the name for the external storage VM that contains the volume you're migrating.
271
+
Enter the name for the external SVM that contains the volume you're migrating.
272
272
273
273
* **Source volume name**
274
274
Enter the name for the external ONTAP volume that you're migrating.
0 commit comments