You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/azure-netapp-files-resource-limits.md
+8-1Lines changed: 8 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ The following table describes resource limits for the Flexible, Standard, Premiu
43
43
| Maximum size of a single file | 16 TiB | No |
44
44
| Maximum size of directory metadata in a single directory | 320 MB | No |
45
45
| Maximum number of files in a single directory |*Approximately* 4 million. <br> See [Determine if a directory is approaching the limit size](directory-sizes-concept.md#directory-limit). | No |
46
-
| Maximum number of `maxfiles` per volume | See [`maxfiles`](maxfiles-concept.md)| Yes |
46
+
| Maximum number of `maxfiles` per volume | See [`maxfiles`](maxfiles-concept.md)| Yes****|
47
47
| Maximum number of export policy rules per volume | 5 | No |
48
48
| Maximum number of quota rules per volume | 1,000 | No |
49
49
| Minimum assigned throughput for a manual Quality of Service (QoS) volume | 1 MiB/s | No |
@@ -64,6 +64,13 @@ The following table describes resource limits for the Flexible, Standard, Premiu
64
64
65
65
\*** This feature is available [when cool access is enabled and by request](large-volumes-requirements-considerations.md#requirements-and-considerations-for-large-volumes-up-to-72-pib-preview). When enabled, the minimum size of the volume is 2,400 GiB.
66
66
67
+
\**** Support request to adjust maxfiles limits is appropriate only when the volume is already provisioned at a size that supports the requested file count. While Azure NetApp Files support can adjust maxfiles limits within supported backend thresholds, these adjustments cannot override the fundamental relationship between volume size and inode capacity. If a workload requires a higher maxfiles limit, then the volume must be provisioned at a size that natively supports that file count. Support requests cannot be used to keep a small volume size while enabling a maxfiles limit that is only supported by a much larger volume. Support requests should not be opened in the following situations as support engineers cannot make backend changes to satisfy the request:
68
+
69
+
* To avoid increasing volume size
70
+
* To request maxfiles limits that exceed what the current volume size supports
71
+
* To request backend exceptions for inode limits
72
+
73
+
67
74
For more information, see [Capacity management FAQs](faq-capacity-management.md).
Copy file name to clipboardExpand all lines: articles/event-grid/authenticate-with-namespaces-using-webhook-authentication.md
+54-3Lines changed: 54 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article shows you how to authenticate with Azure Event Grid na
4
4
ms.topic: how-to
5
5
ms.custom:
6
6
- build-2025
7
-
ms.date: 07/30/2025
7
+
ms.date: 03/23/2026
8
8
author: Connected-Seth
9
9
ms.author: seshanmugam
10
10
---
@@ -47,6 +47,40 @@ az eventgrid namespace update --resource-group <resource group name> --name <nam
47
47
48
48
For information on how to configure system and user-assigned identities by using the Azure portal, see [Enable managed identity for an Event Grid namespace](event-grid-namespace-managed-identity.md).
Azure Functions can host the webhook logic using `Microsoft.Identity.Web` to validate token automatically. We need Microsoft Entra app registration for Webhook API for validating Event Grid caller tokens, which has an Application ID URI for token issuance. Client side (Event Grid) already has managed identity.
This implementation can be any external HTTPS Endpoint (any cloud, any backend), using Microsoft Entra ID JWT validation with `Microsoft.IdentityModel` libraries.
71
+
72
+
Use any runtime: .NET / Node / Java / Python.
73
+
74
+
Key requirements:
75
+
76
+
- Must be HTTPS
77
+
- Must validate caller JWT
78
+
- Must validate device JWT
79
+
- Must respond within timeout (~5 sec recommended)
80
+
81
+
:::image type="content" source="./media/authenticate-with-namespaces-using-webhook-authentication/custom-webhook-implementations.svg" alt-text="Diagram that shows custom webhook implementations." lightbox="./media/authenticate-with-namespaces-using-webhook-authentication/custom-webhook-implementations.svg":::
82
+
83
+
50
84
## Grant the managed identity appropriate access to a function or webhook
51
85
52
86
Grant the managed identity of your Event Grid namespace the appropriate access to the target Azure function or webhook.
@@ -131,7 +165,11 @@ Replace `<NAMESPACE_NAME>` and `<RESOURCE_GROUP_NAME>` with your actual values.
131
165
132
166
### Request headers
133
167
168
+
Azure Event Grid sends the following headers in the request to the webhook:
169
+
170
+
```
134
171
**Authorization**: Bearer token
172
+
```
135
173
136
174
The token is a Microsoft Entra token for the managed identity that was configured to call the webhook.
137
175
@@ -158,9 +196,8 @@ The token is a Microsoft Entra token for the managed identity that was configure
158
196
|`password`| Optional | Password from MQTT CONNECT packet in Base64 encoding. |
|`authenticationData`| Optional | Authentication data from MQTT CONNECT packet in Base64 encoding (MQTT5 only). |
161
-
|`clientCertificate`| Optional | Client certificate in PEM format. |
199
+
|`clientCertificate`| Optional | Client certificate in Privacy-Enhanced Mail (PEM) format. |
162
200
|`clientCertificateChain`| Optional | Other certificates provided by the client required to build the chain from the client certificate to the Certificate Authority certificate. |
163
-
|`userProperties`| Optional | User properties from CONNECT packet (MQTT5 only). |
0 commit comments