You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/kerberos.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -170,13 +170,13 @@ New machine accounts are created when an Azure NetApp Files SMB volume is provis
170
170
| First new SMB volume | New SMB machine account/DNS name |
171
171
| Subsequent SMB volumes created in short succession from first SMB volume | Reused SMB machine account/DNS name (in most cases). |
172
172
| Subsequent SMB volumes created much later than first SMB volume | The service determines if new machine account is needed. It's possible multiple machine accounts can be created, which creates multiple IP address endpoints. |
173
-
| First dualprotocol volume | New SMB machine account/DNS name |
174
-
| Subsequent dualprotocol volumes created in short succession from first dualprotocol volume | Reused SMB machine account/DNS name (in most cases) |
175
-
| Subsequent dualprotocol volumes created much later than first dualprotocol volume | The service determines if a new machine account is needed. It's possible multiple machine accounts can be created, which creates multiple IP address endpoints |
176
-
| First SMB volume created after dualprotocol volume | New SMB machine account/DNS name |
177
-
| First dualprotocol volume created after SMB volume | New SMB machine account/DNS name |
173
+
| First dual-protocol volume | New SMB machine account/DNS name |
174
+
| Subsequent dual-protocol volumes created in short succession from first dual-protocol volume | Reused SMB machine account/DNS name (in most cases) |
175
+
| Subsequent dual-protocol volumes created much later than first dual-protocol volume | The service determines if a new machine account is needed. It's possible multiple machine accounts can be created, which creates multiple IP address endpoints |
176
+
| First SMB volume created after dual-protocol volume | New SMB machine account/DNS name |
177
+
| First dual-protocol volume created after SMB volume | New SMB machine account/DNS name |
178
178
179
-
The SMB machine account created for the Azure NetApp Files SMB (or dualprotocol) volume uses a naming convention that adheres to the [15-character maximum that is enforced by Active Directory](/troubleshoot/windows-server/active-directory/naming-conventions-for-computer-domain-site-ou). The name uses the structure of [SMB Server prefix specified in Azure AD connection configuration]-[unique numeric identifier].
179
+
The SMB machine account created for the Azure NetApp Files SMB (or dual-protocol) volume uses a naming convention that adheres to the [15-character maximum that is enforced by Active Directory](/troubleshoot/windows-server/active-directory/naming-conventions-for-computer-domain-site-ou). The name uses the structure of [SMB Server prefix specified in Azure AD connection configuration]-[unique numeric identifier].
180
180
181
181
For instance, if you've [configured your Azure AD connections](create-active-directory-connections.md) to use the SMB server prefix "AZURE," the SMB machine account that Azure NetApp Files creates resembles "AZURE-7806." That same name is used in the UNC path for the SMB share (for example, \\AZURE-7806) and is the name that dynamic DNS services use to create the A/AAAA record.
182
182
@@ -185,7 +185,7 @@ For instance, if you've [configured your Azure AD connections](create-active-dir
185
185
186
186
:::image type="content" source="media/kerberos/multiple-dns-smb.png" alt-text="Diagram of multiple machine accounts/DNS entries in Azure NetApp Files." lightbox="media/kerberos/multiple-dns-smb.png":::
187
187
188
-
In some cases, when creating multiple SMB and/or dualprotocol volumes, the configuration can end up with multiple disparate SMB machine accounts and DNS names.
188
+
In some cases, when creating multiple SMB and/or dual-protocol volumes, the configuration can end up with multiple disparate SMB machine accounts and DNS names.
189
189
190
190
If a single namespace for user access across the volumes is desired, this can present a challenge in configuration, as a single CNAME alias can only point to a single A/AAAA host record, while using multiple identical A/AAAA record aliases can result in unpredictability of data access in accessing volumes across different SMB machine accounts, as there's no guarantee that the endpoint the client selects in the DNS lookup contains the expected volume due to the round-robin nature of DNS record selection in those configurations.
191
191
@@ -196,7 +196,7 @@ To address this limitation, [Azure NetApp Files volumes can participate as targe
196
196
197
197
### SMB Kerberos SPN creation workflow
198
198
199
-
The following diagram illustrates how an SMB Kerberos SPN is created when an Azure NetApp Files SMB or dualprotocol volume is created. SMB SPNs are associated with SMB machine account objects in the domain. The SPN can be viewed and managed via the machine account properties using the attribute editor in the Advanced view.
199
+
The following diagram illustrates how an SMB Kerberos SPN is created when an Azure NetApp Files SMB or dual-protocol volume is created. SMB SPNs are associated with SMB machine account objects in the domain. The SPN can be viewed and managed via the machine account properties using the attribute editor in the Advanced view.
200
200
201
201
:::image type="content" source="media/kerberos/azure-smb-properties.png" alt-text="Screenshot of Azure-SMB properties." lightbox="media/kerberos/azure-smb-properties.png":::
202
202
@@ -337,7 +337,7 @@ When an Azure NetApp Files volume is mounting using Kerberos, a Kerberos ticket
337
337
- The SMB service ticket is retrieved from the KDC.
338
338
- Azure NetApp Files attempts to map the Windows user requesting access to the share to a valid UNIX user.
339
339
- A Kerberos TGS request is made using the SMB server Kerberos credentials stored with the SMB server’s keytab from initial SMB server creation to use for an LDAP server bind.
340
-
- LDAP is searched for a UNIX user that is mapped to the SMB user requesting share access. If no UNIX user exists in LDAP, then the default UNIX user `pcuser` is used by Azure NetApp Files for name mapping (files/folders written in dualprotocol volumes use the mapped UNIX user as the UNIX owner).
340
+
- LDAP is searched for a UNIX user that is mapped to the SMB user requesting share access. If no UNIX user exists in LDAP, then the default UNIX user `pcuser` is used by Azure NetApp Files for name mapping (files/folders written in dual-protocol volumes use the mapped UNIX user as the UNIX owner).
341
341
- Another negotiate protocol/session request/tree connect is performed, this time using the SMB server’s Kerberos SPN to the Active Directory DC’s IPC$ share.
342
342
- A named pipe is established to the share via the `srvsvc`.
343
343
- A NETLOGON session is established to the share and the Windows user is authenticated.
@@ -456,7 +456,7 @@ In most cases, knowing these steps in depth won’t be necessary for day-to-day
456
456
457
457
### NFS Kerberos SPN creation workflow
458
458
459
-
The following diagram shows how an NFS SPN is created when an Azure NetApp Files NFS or dualprotocol volume is created with Kerberos enabled. In most cases, knowing detailed steps in depth won’t be necessary for day-to-day administration tasks, but are useful in troubleshooting any failures when attempting to create an SMB volume in Azure NetApp Files.
459
+
The following diagram shows how an NFS SPN is created when an Azure NetApp Files NFS or dual-protocol volume is created with Kerberos enabled. In most cases, knowing detailed steps in depth won’t be necessary for day-to-day administration tasks, but are useful in troubleshooting any failures when attempting to create an SMB volume in Azure NetApp Files.
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/manage-file-access-logs.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ platform logging captured in the [Azure Activity Log](/azure/azure-monitor/essen
38
38
* When clubbing events such as READ/WRITE, only a handful of operation per file read or write are captured to reduce event logging rate.
39
39
* File access logs support a [log generation rate metric](azure-netapp-files-metrics.md). The log generation rate should not exceed 64 MiB/minute.
40
40
41
-
If the rate of file access event generation exceeds 64 MiB/minute, you'll see an error message, and logging events can be delayed or dropped. If you are approaching this limit, disable noncritical auditing ACLs to reduce the event generation rate.
41
+
If the rate of file access event generation exceeds 64 MiB/minute, the [Activity log](monitor-azure-netapp-files.md) sends a message stating that the rate of file access log generation is exceeding the limit. If log generation exceeds the limit, logging events can be delayed or dropped. If you are approaching this limit, disable noncritical auditing ACLs to reduce the event generation rate.
42
42
43
43
* During migration or robocopy operations, disable file access logs to reduce log generation.
44
44
* Volumes with file access logs enabled should be grouped separately from volumes without file access logs. Contact your account specialists for assistance.
0 commit comments