Skip to content

Commit 3baad9e

Browse files
committed
update activity log text
1 parent cbd9e59 commit 3baad9e

File tree

2 files changed

+11
-11
lines changed

2 files changed

+11
-11
lines changed

articles/azure-netapp-files/kerberos.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -170,13 +170,13 @@ New machine accounts are created when an Azure NetApp Files SMB volume is provis
170170
| First new SMB volume | New SMB machine account/DNS name |
171171
| Subsequent SMB volumes created in short succession from first SMB volume | Reused SMB machine account/DNS name (in most cases). |
172172
| Subsequent SMB volumes created much later than first SMB volume | The service determines if new machine account is needed. It's possible multiple machine accounts can be created, which creates multiple IP address endpoints. |
173-
| First dual protocol volume | New SMB machine account/DNS name |
174-
| Subsequent dual protocol volumes created in short succession from first dual protocol volume | Reused SMB machine account/DNS name (in most cases) |
175-
| Subsequent dual protocol volumes created much later than first dual protocol volume | The service determines if a new machine account is needed. It's possible multiple machine accounts can be created, which creates multiple IP address endpoints |
176-
| First SMB volume created after dual protocol volume | New SMB machine account/DNS name |
177-
| First dual protocol volume created after SMB volume | New SMB machine account/DNS name |
173+
| First dual-protocol volume | New SMB machine account/DNS name |
174+
| Subsequent dual-protocol volumes created in short succession from first dual-protocol volume | Reused SMB machine account/DNS name (in most cases) |
175+
| Subsequent dual-protocol volumes created much later than first dual-protocol volume | The service determines if a new machine account is needed. It's possible multiple machine accounts can be created, which creates multiple IP address endpoints |
176+
| First SMB volume created after dual-protocol volume | New SMB machine account/DNS name |
177+
| First dual-protocol volume created after SMB volume | New SMB machine account/DNS name |
178178

179-
The SMB machine account created for the Azure NetApp Files SMB (or dual protocol) volume uses a naming convention that adheres to the [15-character maximum that is enforced by Active Directory](/troubleshoot/windows-server/active-directory/naming-conventions-for-computer-domain-site-ou). The name uses the structure of [SMB Server prefix specified in Azure AD connection configuration]-[unique numeric identifier].
179+
The SMB machine account created for the Azure NetApp Files SMB (or dual-protocol) volume uses a naming convention that adheres to the [15-character maximum that is enforced by Active Directory](/troubleshoot/windows-server/active-directory/naming-conventions-for-computer-domain-site-ou). The name uses the structure of [SMB Server prefix specified in Azure AD connection configuration]-[unique numeric identifier].
180180

181181
For instance, if you've [configured your Azure AD connections](create-active-directory-connections.md) to use the SMB server prefix "AZURE," the SMB machine account that Azure NetApp Files creates resembles "AZURE-7806." That same name is used in the UNC path for the SMB share (for example, \\AZURE-7806) and is the name that dynamic DNS services use to create the A/AAAA record.
182182

@@ -185,7 +185,7 @@ For instance, if you've [configured your Azure AD connections](create-active-dir
185185
186186
:::image type="content" source="media/kerberos/multiple-dns-smb.png" alt-text="Diagram of multiple machine accounts/DNS entries in Azure NetApp Files." lightbox="media/kerberos/multiple-dns-smb.png":::
187187

188-
In some cases, when creating multiple SMB and/or dual protocol volumes, the configuration can end up with multiple disparate SMB machine accounts and DNS names.
188+
In some cases, when creating multiple SMB and/or dual-protocol volumes, the configuration can end up with multiple disparate SMB machine accounts and DNS names.
189189

190190
If a single namespace for user access across the volumes is desired, this can present a challenge in configuration, as a single CNAME alias can only point to a single A/AAAA host record, while using multiple identical A/AAAA record aliases can result in unpredictability of data access in accessing volumes across different SMB machine accounts, as there's no guarantee that the endpoint the client selects in the DNS lookup contains the expected volume due to the round-robin nature of DNS record selection in those configurations.
191191

@@ -196,7 +196,7 @@ To address this limitation, [Azure NetApp Files volumes can participate as targe
196196

197197
### SMB Kerberos SPN creation workflow
198198

199-
The following diagram illustrates how an SMB Kerberos SPN is created when an Azure NetApp Files SMB or dual protocol volume is created. SMB SPNs are associated with SMB machine account objects in the domain. The SPN can be viewed and managed via the machine account properties using the attribute editor in the Advanced view.
199+
The following diagram illustrates how an SMB Kerberos SPN is created when an Azure NetApp Files SMB or dual-protocol volume is created. SMB SPNs are associated with SMB machine account objects in the domain. The SPN can be viewed and managed via the machine account properties using the attribute editor in the Advanced view.
200200

201201
:::image type="content" source="media/kerberos/azure-smb-properties.png" alt-text="Screenshot of Azure-SMB properties." lightbox="media/kerberos/azure-smb-properties.png":::
202202

@@ -337,7 +337,7 @@ When an Azure NetApp Files volume is mounting using Kerberos, a Kerberos ticket
337337
- The SMB service ticket is retrieved from the KDC.
338338
- Azure NetApp Files attempts to map the Windows user requesting access to the share to a valid UNIX user.
339339
- A Kerberos TGS request is made using the SMB server Kerberos credentials stored with the SMB server’s keytab from initial SMB server creation to use for an LDAP server bind.
340-
- LDAP is searched for a UNIX user that is mapped to the SMB user requesting share access. If no UNIX user exists in LDAP, then the default UNIX user `pcuser` is used by Azure NetApp Files for name mapping (files/folders written in dual protocol volumes use the mapped UNIX user as the UNIX owner).
340+
- LDAP is searched for a UNIX user that is mapped to the SMB user requesting share access. If no UNIX user exists in LDAP, then the default UNIX user `pcuser` is used by Azure NetApp Files for name mapping (files/folders written in dual-protocol volumes use the mapped UNIX user as the UNIX owner).
341341
- Another negotiate protocol/session request/tree connect is performed, this time using the SMB server’s Kerberos SPN to the Active Directory DC’s IPC$ share.
342342
- A named pipe is established to the share via the `srvsvc`.
343343
- A NETLOGON session is established to the share and the Windows user is authenticated.
@@ -456,7 +456,7 @@ In most cases, knowing these steps in depth won’t be necessary for day-to-day
456456

457457
### NFS Kerberos SPN creation workflow
458458

459-
The following diagram shows how an NFS SPN is created when an Azure NetApp Files NFS or dual protocol volume is created with Kerberos enabled. In most cases, knowing detailed steps in depth won’t be necessary for day-to-day administration tasks, but are useful in troubleshooting any failures when attempting to create an SMB volume in Azure NetApp Files.
459+
The following diagram shows how an NFS SPN is created when an Azure NetApp Files NFS or dual-protocol volume is created with Kerberos enabled. In most cases, knowing detailed steps in depth won’t be necessary for day-to-day administration tasks, but are useful in troubleshooting any failures when attempting to create an SMB volume in Azure NetApp Files.
460460

461461
:::image type="content" source="media/kerberos/nfs-keberos-spn.png" alt-text="Diagram of NFS Kerberos SPN creation workflow." lightbox="media/kerberos/nfs-keberos-spn.png":::
462462

articles/azure-netapp-files/manage-file-access-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ platform logging captured in the [Azure Activity Log](/azure/azure-monitor/essen
3838
* When clubbing events such as READ/WRITE, only a handful of operation per file read or write are captured to reduce event logging rate. 
3939
* File access logs support a [log generation rate metric](azure-netapp-files-metrics.md). The log generation rate should not exceed 64 MiB/minute.
4040

41-
If the rate of file access event generation exceeds 64 MiB/minute, you'll see an error message, and logging events can be delayed or dropped. If you are approaching this limit, disable noncritical auditing ACLs to reduce the event generation rate.
41+
If the rate of file access event generation exceeds 64 MiB/minute, the [Activity log](monitor-azure-netapp-files.md) sends a message stating that the rate of file access log generation is exceeding the limit. If log generation exceeds the limit, logging events can be delayed or dropped. If you are approaching this limit, disable noncritical auditing ACLs to reduce the event generation rate.
4242

4343
* During migration or robocopy operations, disable file access logs to reduce log generation.
4444
* Volumes with file access logs enabled should be grouped separately from volumes without file access logs. Contact your account specialists for assistance.

0 commit comments

Comments
 (0)