Skip to content

Commit c9e9863

Browse files
Merge pull request #297268 from wmgries/consistent-media-tiers
Remove 'smart quotes'.
2 parents 135d5df + c89b2e6 commit c9e9863

7 files changed

+9
-9
lines changed

articles/storage/files/azure-files-case-study.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,4 +34,4 @@ A sportswear brand was looking for ways to elevate the speed and ease of collabo
3434

3535
## Azure Files large files use case
3636

37-
Game studios deal with large files on a daily basis to store their valuable digital assets, sharing builds and reviewing crash dumps. When the COVID-19 pandemic prompted game developers to transition from an in-office workforce to a globally distributed remote team, working with large files didnt scale well. The increased demand for remote access resulted in high latency when working with large files, as well as an increase in internet egress costs. Azure Files offered a scalable solution for the team to easily work with large files.
37+
Game studios deal with large files on a daily basis to store their valuable digital assets, sharing builds and reviewing crash dumps. When the COVID-19 pandemic prompted game developers to transition from an in-office workforce to a globally distributed remote team, working with large files didn't scale well. The increased demand for remote access resulted in high latency when working with large files, as well as an increase in internet egress costs. Azure Files offered a scalable solution for the team to easily work with large files.

articles/storage/files/files-whats-new.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ Azure Files geo-redundancy for large file shares preview significantly improves
127127

128128
#### New SLA of 99.99 percent uptime for Azure Files Premium Tier is generally available
129129

130-
Azure Files now offers a 99.99 percent SLA per file share for all Azure Files Premium shares, regardless of protocol (SMB, NFS, and REST) or redundancy type. This means that you can benefit from this SLA immediately, without any configuration changes or extra costs. If the availability drops below the guaranteed 99.99 percent uptime, youre eligible for service credits.
130+
Azure Files now offers a 99.99 percent SLA per file share for all Azure Files Premium shares, regardless of protocol (SMB, NFS, and REST) or redundancy type. This means that you can benefit from this SLA immediately, without any configuration changes or extra costs. If the availability drops below the guaranteed 99.99 percent uptime, you're eligible for service credits.
131131

132132
#### Support for Azure Files REST API with OAuth authentication is in public preview
133133

@@ -153,7 +153,7 @@ Azure File Sync is now a zone-redundant service, which means an outage in a zone
153153

154154
### 2022 quarter 4 (October, November, December)
155155
#### Azure Active Directory (Azure AD) Kerberos authentication for hybrid identities on Azure Files is generally available
156-
This [feature](storage-files-identity-auth-hybrid-identities-enable.md) builds on top of [FSLogix profile container support](../../virtual-desktop/create-profile-container-azure-ad.yml) released in December 2022 and expands it to support more use cases (SMB only). Hybrid identities, which are user identities created in Active Directory Domain Services (AD DS) and synced to Azure AD, can mount and access Azure file shares without the need for network connectivity to an Active Directory domain controller. While the initial support is limited to hybrid identities, its a significant milestone as we simplify identity-based authentication for Azure Files customers. [Read the blog post](https://techcommunity.microsoft.com/t5/azure-storage-blog/general-availability-azure-active-directory-kerberos-with-azure/ba-p/3612111).
156+
This [feature](storage-files-identity-auth-hybrid-identities-enable.md) builds on top of [FSLogix profile container support](../../virtual-desktop/create-profile-container-azure-ad.yml) released in December 2022 and expands it to support more use cases (SMB only). Hybrid identities, which are user identities created in Active Directory Domain Services (AD DS) and synced to Azure AD, can mount and access Azure file shares without the need for network connectivity to an Active Directory domain controller. While the initial support is limited to hybrid identities, it's a significant milestone as we simplify identity-based authentication for Azure Files customers. [Read the blog post](https://techcommunity.microsoft.com/t5/azure-storage-blog/general-availability-azure-active-directory-kerberos-with-azure/ba-p/3612111).
157157

158158
### 2022 quarter 2 (April, May, June)
159159
#### SUSE Linux support for SAP HANA System Replication (HSR) and Pacemaker
@@ -163,7 +163,7 @@ Azure customers can now [deploy a highly available SAP HANA system in a scale-ou
163163
#### Azure File Sync TCO improvements
164164
To offer sync and tiering, Azure File Sync performs two types of transactions on behalf of the customer:
165165
- Transactions from churn, including changed files (sync) and recalled files (tiering).
166-
- Transactions from cloud change enumeration, done to discover changes made directly on the Azure file share. Historically, this was a major component of an Azure File Sync customers Azure Files bill.
166+
- Transactions from cloud change enumeration, done to discover changes made directly on the Azure file share. Historically, this was a major component of an Azure File Sync customer's Azure Files bill.
167167

168168
To improve TCO, we markedly decreased the number of transactions needed to fully scan an Azure file share. Prior to this change, most customers were best off in the hot tier. Now most customers are best off in the cool tier.
169169

articles/storage/files/nfs-performance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ While Azure Files supports setting `nconnect` up to the maximum setting of 16, w
8484

8585
#### Size virtual machines carefully
8686

87-
Depending on your workload requirements, its important to correctly size the client virtual machines (VMs) to avoid being restricted by their [expected network bandwidth](../../virtual-network/virtual-machine-network-throughput.md#expected-network-throughput). You don't need multiple network interface controllers (NICs) in order to achieve the expected network throughput. While it's common to use [general purpose VMs](/azure/virtual-machines/sizes-general) with Azure Files, various VM types are available depending on your workload needs and region availability. For more information, see [Azure VM Selector](https://azure.microsoft.com/pricing/vm-selector/).
87+
Depending on your workload requirements, it's important to correctly size the client virtual machines (VMs) to avoid being restricted by their [expected network bandwidth](../../virtual-network/virtual-machine-network-throughput.md#expected-network-throughput). You don't need multiple network interface controllers (NICs) in order to achieve the expected network throughput. While it's common to use [general purpose VMs](/azure/virtual-machines/sizes-general) with Azure Files, various VM types are available depending on your workload needs and region availability. For more information, see [Azure VM Selector](https://azure.microsoft.com/pricing/vm-selector/).
8888

8989
#### Keep queue depth less than or equal to 64
9090

articles/storage/files/storage-files-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ ms.topic: faq
5151
**Why are my tiered files not showing thumbnails or previews in Windows File Explorer?**
5252
For tiered files, thumbnails and previews won't be visible at your server endpoint. This is expected behavior because the thumbnail cache feature in Windows intentionally skips reading files with the offline attribute. With Cloud Tiering enabled, reading through tiered files would cause them to be downloaded (recalled).
5353

54-
This behavior isn't specific to Azure File Sync. Windows File Explorer displays a "grey X" for any files that have the offline attribute set. You'll see the X icon when accessing files over SMB. For a detailed explanation of this behavior, refer to [Why dont I get thumbnails for files that are marked offline?](https://devblogs.microsoft.com/oldnewthing/20170503-00/?p=96105)
54+
This behavior isn't specific to Azure File Sync. Windows File Explorer displays a "grey X" for any files that have the offline attribute set. You'll see the X icon when accessing files over SMB. For a detailed explanation of this behavior, refer to [Why don't I get thumbnails for files that are marked offline?](https://devblogs.microsoft.com/oldnewthing/20170503-00/?p=96105)
5555

5656
For questions on how to manage tiered files, see [How to manage tiered files](../file-sync/file-sync-how-to-manage-tiered-files.md).
5757

articles/storage/files/storage-files-identity-auth-domain-services-enable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ Log into the domain-joined client machine as a Microsoft Entra Domain Services u
157157
```powershell
158158
# 1. Find the service account in your managed domain that represents the storage account.
159159
160-
$storageAccountName= <InsertStorageAccountNameHere>
160+
$storageAccountName= "<InsertStorageAccountNameHere>"
161161
$searchFilter = "Name -like '*{0}*'" -f $storageAccountName
162162
$userObject = Get-ADUser -filter $searchFilter
163163

articles/storage/files/storage-files-identity-auth-hybrid-cloud-trust.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Before implementing the incoming trust-based authentication flow, ensure that th
5050
| --- | --- |
5151
| Client must run Windows 10, Windows Server 2012, or a higher version of Windows. | |
5252
| Clients must be joined to Active Directory (AD). The domain must have a functional level of Windows Server 2012 or higher. | You can determine if the client is joined to AD by running the [dsregcmd command](/azure/active-directory/devices/troubleshoot-device-dsregcmd): `dsregcmd.exe /status` |
53-
| A Microsoft Entra tenant. | A Microsoft Entra Tenant is an identity security boundary that's under the control of your organizations IT department. It's an instance of Microsoft Entra ID in which information about a single organization resides. |
53+
| A Microsoft Entra tenant. | A Microsoft Entra Tenant is an identity security boundary that's under the control of your organization's IT department. It's an instance of Microsoft Entra ID in which information about a single organization resides. |
5454
| An Azure subscription under the same Microsoft Entra tenant you plan to use for authentication. | |
5555
| An Azure storage account in the Azure subscription. | An Azure storage account is a resource that acts as a container for grouping all the data services from Azure Storage, including files. |
5656
| [Microsoft Entra Connect](/azure/active-directory/hybrid/whatis-azure-ad-connect) or [Microsoft Entra Connect cloud sync](../../active-directory/cloud-sync/what-is-cloud-sync.md) must be installed. | These solutions are used in [hybrid environments](../../active-directory/hybrid/whatis-hybrid-identity.md) where identities exist both in Microsoft Entra ID and on-premises AD DS. |

articles/storage/files/storage-files-networking-dns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ If you prefer not to deploy DNS server VMs, you can accomplish the same task usi
9696
There's no difference in how you configure your on-premises DNS servers, except that instead of pointing to the IP addresses of the DNS servers in Azure, you point to the resolver's inbound endpoint IP address. The resolver doesn't require any configuration, as it will forward queries to the Azure private DNS server by default. If a private DNS zone is linked to the VNet where the resolver is deployed, the resolver will be able to reply with records from that DNS zone.
9797

9898
> [!WARNING]
99-
> When configuring forwarders for the *core.windows.net* zone, all queries for this public domain will be forwarded to your Azure DNS infrastructure. This causes an issue when you try to access a storage account of a different tenant that has been configured with private endpoints, because Azure DNS will answer the query for the storage account public name with a CNAME that doesnt exist in your private DNS zone. A workaround for this issue is to create a cross-tenant private endpoint in your environment to connect to that storage account.
99+
> When configuring forwarders for the *core.windows.net* zone, all queries for this public domain will be forwarded to your Azure DNS infrastructure. This causes an issue when you try to access a storage account of a different tenant that has been configured with private endpoints, because Azure DNS will answer the query for the storage account public name with a CNAME that doesn't exist in your private DNS zone. A workaround for this issue is to create a cross-tenant private endpoint in your environment to connect to that storage account.
100100
101101
To configure DNS forwarding using Azure DNS Private Resolver, run this script on your on-premises DNS servers. Replace `<resolver-ip>` with the resolver's inbound endpoint IP address.
102102

0 commit comments

Comments
 (0)