Skip to content

Commit 90a9725

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into privlinkvids
2 parents 7921aa5 + c27a099 commit 90a9725

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/cloud-shell/persisting-shell-storage.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Cloud Shell uses an Azure File Share in a storage account, inside a specified su
5858
Users should lock down access to their files by setting the permissions at the storage account or the subscription level.
5959

6060
## Supported storage regions
61-
Associated Azure storage accounts must reside in the same region as the Cloud Shell machine that you're mounting them to. To find your current region you may run `env` in Bash and locate the variable `ACC_LOCATION`. File shares receive a 5-GB image created for you to persist your `$Home` directory.
61+
To find your current region you may run `env` in Bash and locate the variable `ACC_LOCATION`, or from PowerShell run `$env:ACC_LOCATION`. File shares receive a 5-GB image created for you to persist your `$Home` directory.
6262

6363
Cloud Shell machines exist in the following regions:
6464

@@ -68,6 +68,9 @@ Cloud Shell machines exist in the following regions:
6868
|Europe|North Europe, West Europe|
6969
|Asia Pacific|India Central, Southeast Asia|
7070

71+
### Secondary storage regions
72+
If a secondary storage region is used, the associated Azure storage account resides in a different region as the Cloud Shell machine that you're mounting them to. For example, Jane can set her storage account to be located in Canada East, a secondary region, but the machine she is mounted to is still located in East US. Her data at rest is located in Canada, but it is processed in the United States.
73+
7174
## Restrict resource creation with an Azure resource policy
7275
Storage accounts that you create in Cloud Shell are tagged with `ms-resource-usage:azure-cloud-shell`. If you want to disallow users from creating storage accounts in Cloud Shell, create an [Azure resource policy for tags](../azure-policy/json-samples.md) that are triggered by this specific tag.
7376

0 commit comments

Comments
 (0)