You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/monitor-app-configuration.md
+11Lines changed: 11 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -237,6 +237,17 @@ The following table lists common and recommended alert rules for App C
237
237
### Metrics schema
238
238
For details on the metrics schema, see [App Configuration Metrics](/azure/azure-monitor/reference/supported-metrics/microsoft-appconfiguration-configurationstores-metrics)
239
239
240
+
#### Metrics Dimensions
241
+
| Metric Name | Dimension description |
242
+
|-------|-----|
243
+
| HTTP Incoming Request Count | The supported dimensions are the **HttpStatusCode**, **AuthenticationScheme**, and **Endpoint** of each request. **AuthenticationScheme** can be filtered by "AAD" or "HMAC" authentication. |
244
+
| HTTP Incoming Request Duration | The supported dimensions are the **HttpStatusCode**, **AuthenticationScheme**, and **Endpoint** of each request. **AuthenticationScheme** can be filtered by "AAD" or "HMAC" authentication. |
245
+
| Throttled HTTP Request Count | The **Endpoint** of each request is included as a dimension. |
246
+
| Daily Storage Usage | This metric does not have any dimensions. |
247
+
| Request Quota Usage | The supported dimensions are the **OperationType** ("Read" or "Write") and **Endpoint** of each request. |
248
+
| Replication Latency | The **Endpoint** of the replica that data was replicated to is included as a dimension. |
249
+
| Snapshot Storage Size | This metric does not have any dimensions. |
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/advanced-ransomware-protection.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
5
5
author: netapp-manishc
6
6
ms.service: azure-netapp-files
7
7
ms.topic: concept-article
8
-
ms.date: 01/13/2026
8
+
ms.date: 03/17/2026
9
9
ms.author: anfdocs
10
10
ms.custom: references_regions
11
11
# Customer intent: "As a data engineer, I want to understand the advanced ransomware protection features of Azure NetApp Files, so that I can safeguard the cloud file data against ransomware attacks."
@@ -56,7 +56,10 @@ Advanced ransomware protection (ARP) in Azure NetApp Files is a built-in capabil
# Customer intent: As a government IT administrator, I want to understand how to access and utilize Azure NetApp Files in Azure Government, so that I can effectively manage mission-critical workloads within the dedicated cloud environment.
12
12
---
@@ -25,7 +25,6 @@ All [Azure NetApp Files features](whats-new.md) available on Azure public cloud
25
25
26
26
| Azure NetApp Files features | Azure public cloud availability | Azure Government availability |
27
27
|:--- |:--- |:--- |
28
-
| Advanced ransomware protection | Preview | No |
29
28
| Customer-managed keys with managed Hardware Security Module | Generally available | No |
30
29
| Elastic zone-redundant storage service level | Preview | No |
31
30
| File access logs | Generally available |[Partial support](manage-file-access-logs.md#supported-regions)|
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/azure-netapp-files-metrics.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
5
5
author: b-hchen
6
6
ms.service: azure-netapp-files
7
7
ms.topic: concept-article
8
-
ms.date: 01/16/2026
8
+
ms.date: 03/16/2026
9
9
ms.author: anfdocs
10
10
# Customer intent: As a cloud storage administrator, I want to analyze performance and usage metrics for Azure NetApp Files, so that I can optimize storage provisioning and ensure efficient operation of my storage resources.
11
11
---
@@ -314,7 +314,7 @@ Azure NetApp Files provides metrics on allocated storage, actual storage usage,
314
314
The delay between when data is written to the source volume and when it’s available on the destination volume.
315
315
316
316
> [!NOTE]
317
-
> When assessing the health status of the volume replication, consider the volume replication lag time. If the lag time is greater than the replication schedule, the replication volume won't catch up to the source. To resolve this issue, adjust the replication speed or the replication schedule.
317
+
> When assessing the health status of the volume replication, consider the volume replication lag time. If the lag time is greater than the replication schedule, the replication volume won't catch up to the source. To resolve this issue, adjust the replication schedule.
318
318
319
319
-*Volume replication last transfer duration*
320
320
The time taken for the most recent replication session to transfer all changed data (example: blocks, snapshots) from the source volume to the destination volume.
Copy file name to clipboardExpand all lines: articles/backup/aks-backup-faq.yml
+23-5Lines changed: 23 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ sections:
37
37
answer: |
38
38
The pods associated with the AKS Backup Extension are deployed on the NodePools of the AKS cluster. To successfully deploy these pods and prevent them from interfering with your application resources, ensure the following:
39
39
- The AKS cluster must have the agent node pool with the `Linux` operating system including both Azure Linux and Ubuntu.
40
-
- The agent node pool must have VMSS SKUs based on non-ARM64 based architecture.
40
+
- The agent node pool must have Azure Virtual Machine Scale Sets SKUs based on non-ARM64 based architecture.
41
41
- The agent node pool must have the taint `CriticalAddOnOnly` associated with it. This taint is automatically added to the node pool when the AKS Cluster is created via Portal. It ensures that only critical add-on pods, such as the AKS Backup Extension pods, are scheduled on the node pool. This prevents interference with your application workloads and ensures that backup operations are isolated from other workloads in the cluster. In case the taint isn't present, you can add it manually before installing the AKS Backup Extension.
42
42
43
43
- question: |
@@ -70,10 +70,10 @@ sections:
70
70
As part of the Backup Extension installation, a User Identity also gets created in the Node Resource Group of the cluster. This identity is used by the AKS Backup Extension to access the Azure resources required for backup operations. The User Identity is assigned `Storage Blob Data Contributor` role over the storage account to enable access for the Extension. Whenever extension is uninstalled from the AKS cluster, the identity also gets deleted.
71
71
72
72
- question: |
73
-
Why should Velero shouldn't be used in the cluster alongside of AKS Backup Extension?
73
+
Why Velero shouldn't be used in the cluster alongside of AKS Backup Extension?
74
74
answer: |
75
75
Velero is a third-party backup solution for Kubernetes that can conflict with the AKS Backup Extension. It's recommended to use only the AKS Backup Extension for backup operations in a cluster, but not both simultaneously.
76
-
AKS Backup Extension also deploys Velero CRDs in the cluster. In case standalone Velero is installed in the AKS cluster along with Backup Extension and the versions used by each installation differ at any point in time can lead to failures due to contract mismatches. Additionally, custom Velero configurations created by the you—such as a VolumeSnapshotClass for Velero CSI-based snapshotting—might interfere with the AKS Backup snapshotting setup. Velero annotations containing `velero.io` applied to various resources in the cluster can also impact the behavior of AKS Backup in unsupported ways.
76
+
AKS Backup Extension also deploys Velero CRDs in the cluster. In case standalone Velero is installed in the AKS cluster along with Backup Extension and the versions used by each installation differ at any point in time can lead to failures due to contract mismatches. Additionally, custom Velero configurations created by yousuch as a VolumeSnapshotClass for Velero CSI-based snapshotting—might interfere with the AKS Backup snapshotting setup. Velero annotations containing `velero.io` applied to various resources in the cluster can also impact the behavior of AKS Backup in unsupported ways.
77
77
78
78
- question: |
79
79
What is a snapshot resource group?
@@ -88,16 +88,34 @@ sections:
88
88
- question: |
89
89
What are the types of Persistent Volumes that are supported by Azure Backup for AKS?
90
90
answer: |
91
-
Azure Backup for AKS relies on CSI driver-based snapshots for its backup and restore operations. Because of this dependency, only Azure Disk-based Persistent Volumes attached via the CSI driver are currently supported. Other Azure storage options—such as Azure File Share, Azure Blob, Azure Container Storage, Azure NetApp Files, Azure Managed Lustre, and third-party storage solutions—aren't supported at this time. Within Azure Disks, the following SKUs are supported:
91
+
Azure Backup for AKS relies on CSI driver-based snapshots for its backup and restore operations. The following persistent volume types are supported:
92
+
93
+
**Azure Disk-based Persistent Volumes**: Attached via the CSI driver with the following SKUs:
92
94
93
95
- Premium SSD
94
96
- Standard SSD
95
97
- Standard HDD
98
+
- Premium SSD v2
99
+
- Ultra Disks
100
+
101
+
> [!NOTE]
102
+
> While snapshot and restore operations are supported across all disk SKUs, operations for Premium SSD v2 and Ultra Disks may take longer because the process involves copying data from the volume to a snapshot and back. The snapshot may appear available and the volume may be mounted before the underlying data copy operation is fully completed, causing a delay before the restored data becomes visible.
96
103
97
-
However, Premium SSD v2 and Ultra Disks aren't supported. Additionally, when it comes to Azure Disks with network access settings:
104
+
When it comes to Azure Disks with network access settings:
98
105
99
106
- The Operational Tier supports both Public and Private access disks of any size.
100
107
- The Vault Tier supports only Public access disks, with a maximum size of up to 1TB.
108
+
109
+
**Azure Files-based Persistent Volumes**: Provisioned via the CSI driver (`file.csi.azure.com`) with the following characteristics:
110
+
111
+
- SMB protocol only (NFS is not supported)
112
+
- Both Standard and Premium file shares
113
+
- Public network endpoints only (private endpoints are not supported)
114
+
- Maximum 25,000 files per file share
115
+
- Operational Tier backup only (Vault Tier is not supported)
116
+
- Retention up to 30 days
117
+
118
+
Other Azure storage options—such as Azure Blob, Azure Container Storage, Azure NetApp Files, Azure Managed Lustre, and third-party storage solutions—aren't supported at this time. [Learn more about Azure Files support and limitations](azure-kubernetes-service-cluster-backup-support-matrix.md#azure-files-based-persistent-volumes---additional-considerations).
101
119
102
120
- question: |
103
121
If an AKS cluster has Persistent Volumes of unsupported types, what happens during the backup operation?
0 commit comments