Skip to content

Commit 9247813

Browse files
authored
Merge pull request #104805 from xyh1/patch-101
updates for GA
2 parents 7b014f1 + 10434d0 commit 9247813

File tree

2 files changed

+22
-23
lines changed

2 files changed

+22
-23
lines changed

articles/storage/blobs/storage-blob-immutability-policies-manage.md

Lines changed: 18 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -113,10 +113,10 @@ Remove-AzRmStorageContainerLegalHold -ResourceGroupName $resourceGroup `
113113
-StorageAccountName $storageAccount -Name $container -Tag <tag3>
114114
```
115115

116-
Create or update immutability policies:
116+
Create or update time-based immutability policies:
117117

118118
```powershell
119-
# Create an immutablity policy
119+
# Create a time-based immutablity policy
120120
Set-AzRmStorageContainerImmutabilityPolicy -ResourceGroupName $resourceGroup `
121121
-StorageAccountName $storageAccount -ContainerName $container -ImmutabilityPeriod 10
122122
```
@@ -165,18 +165,25 @@ Remove-AzRmStorageContainerImmutabilityPolicy -ImmutabilityPolicy $policy
165165

166166
## Enabling allow protected append blobs writes
167167

168-
At this time, you can only access the `allowProtectedAppendWrites` setting for time-based retention policies through this specific [portal link](https://aka.ms/immutableappendblobs).
169-
170-
> [!IMPORTANT]
171-
> The allow protected append blobs writes setting under time-based retention is currently available and visible only in the following regions:
172-
> - East US
173-
> - South Central US
174-
> - West US 2
175-
>
176-
> For more information, see [Allow Protected Append Blobs Writes](storage-blob-immutable-storage.md#allow-protected-append-blobs-writes).
168+
### [Portal](#tab/azure-portal)
177169

178170
![Allow additional append writes](media/storage-blob-immutability-policies-manage/immutable-allow-additional-append-writes.png)
179171

172+
### [Azure CLI](#tab/azure-cli)
173+
174+
The feature is included in the following command groups:
175+
`az storage container immutability-policy` and `az storage container legal-hold`. Run `-h` on them to see the commands.
176+
177+
### [PowerShell](#tab/azure-powershell)
178+
179+
```powershell
180+
# Create an immutablity policy with appends allowed
181+
Set-AzRmStorageContainerImmutabilityPolicy -ResourceGroupName $resourceGroup `
182+
-StorageAccountName $storageAccount -ContainerName $container -ImmutabilityPeriod 10 -AllowProtectedAppendWrite $true
183+
```
184+
185+
---
186+
180187
## Next steps
181188

182189
[Store business-critical blob data with immutable storage](storage-blob-immutable-storage.md)

articles/storage/blobs/storage-blob-immutable-storage.md

Lines changed: 4 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ An unlocked time-based retention policy is recommended only for feature testing
6464
The following limits apply to retention policies:
6565

6666
- For a storage account, the maximum number of containers with locked time-based immutable policies is 10,000.
67-
- The minimum retention interval is one day. The maximum is 146,000 days (400 years).
67+
- The minimum retention interval is 1 day. The maximum is 146,000 days (400 years).
6868
- For a container, the maximum number of edits to extend a retention interval for locked time-based immutable policies is 5.
6969
- For a container, a maximum of seven time-based retention policy audit logs are retained for a locked policy.
7070

@@ -80,15 +80,7 @@ For example, suppose that a user creates a time-based retention policy with `all
8080

8181
Unlocked time-based retention policies allow the `allowProtectedAppendWrites` setting to be enabled and disabled at any time. Once the time-based retention policy is locked, the `allowProtectedAppendWrites` setting cannot be changed.
8282

83-
Legal hold policies cannot enable `allowProtectedAppendWrites` and do not allow for new blocks to be appended to append blobs. If a legal hold is applied to a time-based retention policy with `allowProtectedAppendWrites` enabled, the *AppendBlock* API will fail until the legal hold is lifted.
84-
85-
> [!IMPORTANT]
86-
> The allow protected append blobs writes setting under time-based retention is currently available in the following regions:
87-
> - East US
88-
> - South Central US
89-
> - West US 2
90-
>
91-
> At this time, we strongly advise that you do not enable `allowProtectedAppendWrites` in any other regions besides those specified, as it may cause intermittent failures and affect compliance for append blobs. For more information on how to set and lock time-based retention policies, see [Enabling allow protected append blobs writes](storage-blob-immutability-policies-manage.md#enabling-allow-protected-append-blobs-writes).
83+
Legal hold policies cannot enable `allowProtectedAppendWrites` and any legal holds will nullify the 'allowProtectedAppendWrites' property. If a legal hold is applied to a time-based retention policy with `allowProtectedAppendWrites` enabled, the *AppendBlock* API will fail until the legal hold is lifted.
9284

9385
## Legal holds
9486

@@ -137,7 +129,7 @@ No, you can use immutable storage with any existing or newly created general-pur
137129

138130
**Can I apply both a legal hold and time-based retention policy?**
139131

140-
Yes, a container can have both a legal hold and a time-based retention policy at the same time. All blobs in that container stay in the immutable state until all legal holds are cleared, even if their effective retention period has expired. Conversely, a blob stays in an immutable state until the effective retention period expires, even though all legal holds have been cleared.
132+
Yes, a container can have both a legal hold and a time-based retention policy at the same time; however, the 'allowProtectedAppendWrites' setting will not apply until the legal hold is cleared. All blobs in that container stay in the immutable state until all legal holds are cleared, even if their effective retention period has expired. Conversely, a blob stays in an immutable state until the effective retention period expires, even though all legal holds have been cleared.
141133

142134
**Are legal hold policies only for legal proceedings or are there other use scenarios?**
143135

@@ -161,7 +153,7 @@ Yes, you can use the Set Blob Tier command to move data across the blob tiers wh
161153

162154
**What happens if I fail to pay and my retention interval has not expired?**
163155

164-
In the case of non-payment, normal data retention policies will apply as stipulated in the terms and conditions of your contract with Microsoft.
156+
In the case of non-payment, normal data retention policies will apply as stipulated in the terms and conditions of your contract with Microsoft. For general information, see [Data management at Microsoft](https://www.microsoft.com/en-us/trust-center/privacy/data-management).
165157

166158
**Do you offer a trial or grace period for just trying out the feature?**
167159

0 commit comments

Comments
 (0)