Skip to content

Commit 9d8c8fc

Browse files
committed
More freshness reviews
1 parent 4671b65 commit 9d8c8fc

20 files changed

+84
-126
lines changed

articles/storage/blobs/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1387,8 +1387,6 @@ items:
13871387
href: data-lake-storage-events.md
13881388
- name: Use with other Azure services
13891389
href: data-lake-storage-integrate-with-services-tutorials.md
1390-
- name: Use with Azure services
1391-
href: data-lake-storage-integrate-with-services-tutorials.md
13921390
- name: Reference
13931391
items:
13941392
- name: Blob Storage APIs

articles/storage/blobs/data-lake-storage-acl-azure-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: normesta
66

77
ms.service: azure-data-lake-storage
88
ms.topic: how-to
9-
ms.date: 03/09/2023
9+
ms.date: 11/18/2024
1010
ms.author: normesta
1111
---
1212

articles/storage/blobs/data-lake-storage-acl-cli.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: normesta
77

88
ms.service: azure-data-lake-storage
99
ms.topic: how-to
10-
ms.date: 06/09/2023
10+
ms.date: 11/18/2024
1111
ms.author: normesta
1212
ms.reviewer: prishet
1313
ms.devlang: azurecli
@@ -36,8 +36,6 @@ ACL inheritance is already available for new child items that are created under
3636

3737
- Owning user of the target container or directory to which you plan to apply ACL settings. To set ACLs recursively, this includes all child items in the target container or directory.
3838

39-
- Storage account key.
40-
4139
## Ensure that you have the correct version of Azure CLI installed
4240

4341
1. Open the [Azure Cloud Shell](../../cloud-shell/overview.md), or if you've [installed](/cli/azure/install-azure-cli) the Azure CLI locally, open a command console application such as Windows PowerShell.
@@ -64,7 +62,7 @@ ACL inheritance is already available for new child items that are created under
6462

6563
To learn more about different authentication methods, see [Authorize access to blob or queue data with Azure CLI](./authorize-data-operations-cli.md).
6664

67-
2. If your identity is associated with more than one subscription, then set your active subscription to subscription of the storage account that will host your static website.
65+
2. If your identity is associated with more than one subscription, and you are not prompted to select the subscription, then set your active subscription to subscription of the storage account that you want operate upon. In this example, replace the `<subscription-id>` placeholder value with the ID of your subscription.
6866

6967
```azurecli
7068
az account set --subscription <subscription-id>

articles/storage/blobs/data-lake-storage-acl-powershell.md

Lines changed: 13 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: normesta
66

77
ms.service: azure-data-lake-storage
88
ms.topic: how-to
9-
ms.date: 02/17/2021
9+
ms.date: 11/18/2024
1010
ms.author: normesta
1111
ms.reviewer: prishet
1212
ms.devlang: powershell
@@ -35,8 +35,6 @@ ACL inheritance is already available for new child items that are created under
3535

3636
- Owning user of the target container or directory to which you plan to apply ACL settings. To set ACLs recursively, this includes all child items in the target container or directory.
3737

38-
- Storage account key.
39-
4038
## Install the PowerShell module
4139

4240
1. Verify that the version of PowerShell that have installed is `5.1` or higher by using the following command.
@@ -57,24 +55,13 @@ ACL inheritance is already available for new child items that are created under
5755

5856
## Connect to the account
5957

60-
Choose how you want your commands to obtain authorization to the storage account.
61-
62-
<a name='option-1-obtain-authorization-by-using-azure-active-directory-ad'></a>
63-
64-
### Option 1: Obtain authorization by using Microsoft Entra ID
65-
66-
> [!NOTE]
67-
> If you're using Microsoft Entra ID to authorize access, then make sure that your security principal has been assigned the [Storage Blob Data Owner role](../../role-based-access-control/built-in-roles.md#storage-blob-data-owner). To learn more about how ACL permissions are applied and the effects of changing them, see [Access control model in Azure Data Lake Storage](./data-lake-storage-access-control-model.md).
68-
69-
With this approach, the system ensures that your user account has the appropriate Azure role-based access control (Azure RBAC) assignments and ACL permissions.
70-
71-
1. Open a Windows PowerShell command window, and then sign in to your Azure subscription with the `Connect-AzAccount` command and follow the on-screen directions.
58+
1. Open a Windows PowerShell command window, and then sign in to your Azure subscription with the [Connect-AzAccount](/powershell/module/az.accounts/connect-azaccount) command and follow the on-screen directions.
7259

7360
```powershell
7461
Connect-AzAccount
7562
```
7663

77-
2. If your identity is associated with more than one subscription, then set your active subscription to subscription of the storage account that you want create and manage directories in. In this example, replace the `<subscription-id>` placeholder value with the ID of your subscription.
64+
2. If your identity is associated with more than one subscription, and you are not prompted to select the subscription, then set your active subscription to subscription of the storage account that you want operate upon. In this example, replace the `<subscription-id>` placeholder value with the ID of your subscription.
7865

7966
```powershell
8067
Select-AzSubscription -SubscriptionId <subscription-id>
@@ -86,17 +73,9 @@ With this approach, the system ensures that your user account has the appropriat
8673
$ctx = New-AzStorageContext -StorageAccountName '<storage-account-name>' -UseConnectedAccount
8774
```
8875

89-
### Option 2: Obtain authorization by using the storage account key
90-
91-
With this approach, the system doesn't check Azure RBAC or ACL permissions. Get the storage account context by using an account key.
92-
93-
```powershell
94-
$ctx = New-AzStorageContext -StorageAccountName '<storage-account-name>' -StorageAccountKey '<storage-account-key>'
95-
```
96-
9776
## Get ACLs
9877

99-
Get the ACL of a directory or file by using the `Get-AzDataLakeGen2Item`cmdlet.
78+
Get the ACL of a directory or file by using the [Get-AzDataLakeGen2Item](/powershell/module/az.storage/get-azdatalakegen2item) cmdlet.
10079

10180
This example gets the ACL of the root directory of a **container** and then prints the ACL to the console.
10281

@@ -142,7 +121,7 @@ This section shows you how to:
142121

143122
### Set an ACL
144123

145-
Use the `Set-AzDataLakeGen2ItemAclObject` cmdlet to create an ACL for the owning user, owning group, or other users. Then, use the `Update-AzDataLakeGen2Item` cmdlet to commit the ACL.
124+
Use the [Set-AzDataLakeGen2ItemAclObject](/powershell/module/az.storage/set-azdatalakegen2itemaclobject) cmdlet to create an ACL for the owning user, owning group, or other users. Then, use the[Update-AzDataLakeGen2Item](/powershell/module/az.storage/update-azdatalakegen2item) cmdlet to commit the ACL.
146125

147126
This example sets the ACL on the root directory of a **container** for the owning user, owning group, or other users, and then prints the ACL to the console.
148127

@@ -170,7 +149,7 @@ $dir.ACL
170149
```
171150

172151
> [!NOTE]
173-
> If you want to set a **default** ACL entry, use the **-DefaultScope** parameter when you run the **Set-AzDataLakeGen2ItemAclObject** command. For example: `$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -Permission rwx -DefaultScope`.
152+
> If you want to set a **default** ACL entry, use the **-DefaultScope** parameter when you run the [Set-AzDataLakeGen2ItemAclObject](/powershell/module/az.storage/set-azdatalakegen2itemaclobject) command. For example: `$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -Permission rwx -DefaultScope`.
174153
175154
This example sets the ACL on a **file** for the owning user, owning group, or other users, and then prints the ACL to the console.
176155

@@ -196,7 +175,7 @@ In this example, the owning user and owning group have only read and write permi
196175

197176
### Set ACLs recursively
198177

199-
Set ACLs recursively by using the **Set-AzDataLakeGen2AclRecursive** cmdlet.
178+
Set ACLs recursively by using the [Set-AzDataLakeGen2AclRecursive](/powershell/module/az.storage/set-azdatalakegen2aclrecursive) cmdlet.
200179

201180
This example sets the ACL of a directory named `my-parent-directory`. These entries give the owning user read, write, and execute permissions, gives the owning group only read and execute permissions, and gives all others no access. The last ACL entry in this example gives a specific user with the object ID "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" read and execute permissions.
202181

@@ -215,7 +194,7 @@ Set-AzDataLakeGen2AclRecursive -Context $ctx -FileSystem $filesystemName -Path $
215194
```
216195

217196
> [!NOTE]
218-
> If you want to set a **default** ACL entry, use the **-DefaultScope** parameter when you run the **Set-AzDataLakeGen2ItemAclObject** command. For example: `$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -Permission rwx -DefaultScope`.
197+
> If you want to set a **default** ACL entry, use the **-DefaultScope** parameter when you run the [Set-AzDataLakeGen2AclRecursive](/powershell/module/az.storage/set-azdatalakegen2aclrecursive) command. For example: `$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -Permission rwx -DefaultScope`.
219198
220199
To see an example that sets ACLs recursively in batches by specifying a batch size, see the [Set-AzDataLakeGen2AclRecursive](/powershell/module/az.storage/set-azdatalakegen2aclrecursive) reference article.
221200

@@ -230,7 +209,7 @@ This section shows you how to:
230209

231210
### Update an ACL
232211

233-
First, get the ACL. Then, use the `Set-AzDataLakeGen2ItemAclObject` cmdlet to add or update an ACL entry. Use the `Update-AzDataLakeGen2Item` cmdlet to commit the ACL.
212+
First, get the ACL. Then, use the [Set-AzDataLakeGen2ItemAclObject](/powershell/module/az.storage/set-azdatalakegen2itemaclobject) cmdlet to add or update an ACL entry. Use the [Set-AzDataLakeGen2ItemAclObject](/powershell/module/az.storage/set-azdatalakegen2itemaclobject)` cmdlet to commit the ACL.
234213

235214
This example creates or updates the ACL on a **directory** for a user.
236215

@@ -243,11 +222,11 @@ Update-AzDataLakeGen2Item -Context $ctx -FileSystem $filesystemName -Path $dirna
243222
```
244223

245224
> [!NOTE]
246-
> If you want to update a **default** ACL entry, use the **-DefaultScope** parameter when you run the **Set-AzDataLakeGen2ItemAclObject** command. For example: `$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -EntityID xxxxxxxx-xxxx-xxxxxxxxxxx -Permission r-x -DefaultScope`.
225+
> If you want to update a **default** ACL entry, use the **-DefaultScope** parameter when you run the [Set-AzDataLakeGen2ItemAclObject](/powershell/module/az.storage/set-azdatalakegen2itemaclobject)* command. For example: `$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -EntityID xxxxxxxx-xxxx-xxxxxxxxxxx -Permission r-x -DefaultScope`.
247226
248227
### Update ACLs recursively
249228

250-
Update ACLs recursively by using the **Update-AzDataLakeGen2AclRecursive** cmdlet.
229+
Update ACLs recursively by using the [Update-AzDataLakeGen2AclRecursive](/powershell/module/az.storage/update-azdatalakegen2aclrecursive) cmdlet.
251230

252231
This example updates an ACL entry with write permission.
253232

@@ -299,7 +278,7 @@ Update-AzDataLakeGen2Item -Context $ctx -FileSystem $filesystemName -Path $dirna
299278

300279
You can remove one or more ACL entries recursively. To remove an ACL entry, create a new ACL object for ACL entry to be removed, and then use that object in remove ACL operation. Do not get the existing ACL, just provide the ACL entries to be removed.
301280

302-
Remove ACL entries by using the **Remove-AzDataLakeGen2AclRecursive** cmdlet.
281+
Remove ACL entries by using the [Remove-AzDataLakeGen2AclRecursive](/powershell/module/az.storage/remove-azdatalakegen2aclrecursive) cmdlet.
303282

304283
This example removes an ACL entry from the root directory of the container.
305284

@@ -313,7 +292,7 @@ Remove-AzDataLakeGen2AclRecursive -Context $ctx -FileSystem $filesystemName -Ac
313292
```
314293

315294
> [!NOTE]
316-
> If you want to remove a **default** ACL entry, use the **-DefaultScope** parameter when you run the **Set-AzDataLakeGen2ItemAclObject** command. For example: `$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -EntityId $userID -Permission "---" -DefaultScope`.
295+
> If you want to remove a **default** ACL entry, use the **-DefaultScope** parameter when you run the [Set-AzDataLakeGen2ItemAclObject](/powershell/module/az.storage/set-azdatalakegen2itemaclobject) command. For example: `$acl = Set-AzDataLakeGen2ItemAclObject -AccessControlType user -EntityId $userID -Permission "---" -DefaultScope`.
317296
318297
To see an example that removes ACLs recursively in batches by specifying a batch size, see the [Remove-AzDataLakeGen2AclRecursive](/powershell/module/az.storage/remove-azdatalakegen2aclrecursive) reference article.
319298

articles/storage/blobs/data-lake-storage-directory-file-acl-cli.md

Lines changed: 18 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: normesta
77

88
ms.service: azure-data-lake-storage
99
ms.topic: how-to
10-
ms.date: 02/17/2021
10+
ms.date: 11/18/2024
1111
ms.author: normesta
1212
ms.reviewer: prishet
1313
ms.devlang: azurecli
@@ -56,20 +56,21 @@ To learn about how to get, set, and update the access control lists (ACL) of dir
5656

5757
To learn more about different authentication methods, see [Authorize access to blob or queue data with Azure CLI](./authorize-data-operations-cli.md).
5858

59-
2. If your identity is associated with more than one subscription, then set your active subscription to subscription of the storage account that will host your static website.
59+
2. If your identity is associated with more than one subscription, and you are not prompted to select the subscription, then set your active subscription to subscription of the storage account that you want operate upon. In this example, replace the `<subscription-id>` placeholder value with the ID of your subscription.
6060

6161
```azurecli
6262
az account set --subscription <subscription-id>
6363
```
6464

6565
Replace the `<subscription-id>` placeholder value with the ID of your subscription.
66+
Replace the `<subscription-id>` placeholder value with the ID of your subscription.
6667

6768
> [!NOTE]
6869
> The example presented in this article show Microsoft Entra authorization. To learn more about authorization methods, see [Authorize access to blob or queue data with Azure CLI](./authorize-data-operations-cli.md).
6970
7071
## Create a container
7172

72-
A container acts as a file system for your files. You can create one by using the `az storage fs create` command.
73+
A container acts as a file system for your files. You can create one by using the [az storage fs create](/cli/azure/storage/fs#az-storage-fs-create) command.
7374

7475
This example creates a container named `my-file-system`.
7576

@@ -79,15 +80,15 @@ az storage fs create -n my-file-system --account-name mystorageaccount --auth-mo
7980

8081
## Show container properties
8182

82-
You can print the properties of a container to the console by using the `az storage fs show` command.
83+
You can print the properties of a container to the console by using the [az storage fs show](/cli/azure/storage/fs#az-storage-fs-show) command.
8384

8485
```azurecli
8586
az storage fs show -n my-file-system --account-name mystorageaccount --auth-mode login
8687
```
8788

8889
## List container contents
8990

90-
List the contents of a directory by using the `az storage fs file list` command.
91+
List the contents of a directory by using the [az storage fs file list](/cli/azure/storage/fs/file#az-storage-fs-file-list) command.
9192

9293
This example lists the contents of a container named `my-file-system`.
9394

@@ -97,7 +98,7 @@ az storage fs file list -f my-file-system --account-name mystorageaccount --auth
9798

9899
## Delete a container
99100

100-
Delete a container by using the `az storage fs delete` command.
101+
Delete a container by using the [az storage fs delete](/cli/azure/storage/fs#az-storage-fs-delete) command.
101102

102103
This example deletes a container named `my-file-system`.
103104

@@ -107,7 +108,7 @@ az storage fs delete -n my-file-system --account-name mystorageaccount --auth-mo
107108

108109
## Create a directory
109110

110-
Create a directory reference by using the `az storage fs directory create` command.
111+
Create a directory reference by using the [az storage fs directory create](/cli/azure/storage/fs/directory#az-storage-fs-directory-create) command.
111112

112113
This example adds a directory named `my-directory` to a container named `my-file-system` that is located in an account named `mystorageaccount`.
113114

@@ -117,15 +118,15 @@ az storage fs directory create -n my-directory -f my-file-system --account-name
117118

118119
## Show directory properties
119120

120-
You can print the properties of a directory to the console by using the `az storage fs directory show` command.
121+
You can print the properties of a directory to the console by using the [az storage fs directory show](/cli/azure/storage/fs/directory#az-storage-fs-directory-show) command.
121122

122123
```azurecli
123124
az storage fs directory show -n my-directory -f my-file-system --account-name mystorageaccount --auth-mode login
124125
```
125126

126127
## Rename or move a directory
127128

128-
Rename or move a directory by using the `az storage fs directory move` command.
129+
Rename or move a directory by using the [az storage fs directory move](/cli/azure/storage/fs/directory#az-storage-fs-directory-move) command.
129130

130131
This example renames a directory from the name `my-directory` to the name `my-new-directory` in the same container.
131132

@@ -141,7 +142,7 @@ az storage fs directory move -n my-directory -f my-file-system --new-directory "
141142

142143
## Delete a directory
143144

144-
Delete a directory by using the `az storage fs directory delete` command.
145+
Delete a directory by using the [az storage fs directory delete](/cli/azure/storage/fs/directory#az-storage-fs-directory-delete) command.
145146

146147
This example deletes a directory named `my-directory`.
147148

@@ -151,7 +152,7 @@ az storage fs directory delete -n my-directory -f my-file-system --account-name
151152

152153
## Check if a directory exists
153154

154-
Determine if a specific directory exists in the container by using the `az storage fs directory exists` command.
155+
Determine if a specific directory exists in the container by using the [az storage fs directory exists](/cli/azure/storage/fs/directory#az-storage-fs-directory-exists) command.
155156

156157
This example reveals whether a directory named `my-directory` exists in the `my-file-system` container.
157158

@@ -161,7 +162,7 @@ az storage fs directory exists -n my-directory -f my-file-system --account-name
161162

162163
## Download from a directory
163164

164-
Download a file from a directory by using the `az storage fs file download` command.
165+
Download a file from a directory by using the [az storage fs file download](/cli/azure/storage/fs/file#az-storage-fs-file-download) command.
165166

166167
This example downloads a file named `upload.txt` from a directory named `my-directory`.
167168

@@ -171,7 +172,7 @@ az storage fs file download -p my-directory/upload.txt -f my-file-system -d "C:\
171172

172173
## List directory contents
173174

174-
List the contents of a directory by using the `az storage fs file list` command.
175+
List the contents of a directory by using the [az storage fs file list](/cli/azure/storage/fs/file#az-storage-fs-file-list) command.
175176

176177
This example lists the contents of a directory named `my-directory` that is located in the `my-file-system` container of a storage account named `mystorageaccount`.
177178

@@ -181,7 +182,7 @@ az storage fs file list -f my-file-system --path my-directory --account-name mys
181182

182183
## Upload a file to a directory
183184

184-
Upload a file to a directory by using the `az storage fs file upload` command.
185+
Upload a file to a directory by using the [az storage fs file upload](/cli/azure/storage/fs/file#az-storage-fs-file-upload) command.
185186

186187
This example uploads a file named `upload.txt` to a directory named `my-directory`.
187188

@@ -191,15 +192,15 @@ az storage fs file upload -s "C:\myFolder\upload.txt" -p my-directory/upload.txt
191192

192193
## Show file properties
193194

194-
You can print the properties of a file to the console by using the `az storage fs file show` command.
195+
You can print the properties of a file to the console by using the [az storage fs file show](/cli/azure/storage/fs/file#az-storage-fs-file-show) command.
195196

196197
```azurecli
197198
az storage fs file show -p my-file.txt -f my-file-system --account-name mystorageaccount --auth-mode login
198199
```
199200

200201
## Rename or move a file
201202

202-
Rename or move a file by using the `az storage fs file move` command.
203+
Rename or move a file by using the [az storage fs file move](/cli/azure/storage/fs/file#az-storage-fs-file-move) command.
203204

204205
This example renames a file from the name `my-file.txt` to the name `my-file-renamed.txt`.
205206

@@ -209,7 +210,7 @@ az storage fs file move -p my-file.txt -f my-file-system --new-path my-file-syst
209210

210211
## Delete a file
211212

212-
Delete a file by using the `az storage fs file delete` command.
213+
Delete a file by using the [az storage fs file delete](/cli/azure/storage/fs/file#az-storage-fs-file-delete) command.
213214

214215
This example deletes a file named `my-file.txt`
215216

0 commit comments

Comments
 (0)