You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/configure-access-control-lists.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
-
title: Configure access control lists with Azure NetApp Files | Microsoft Docs
2
+
title: Configure access control lists with Azure NetApp Files
3
3
description: Learn how to configure access control lists (ACLs) on NFSv4.1 with Azure NetApp Files.
4
4
author: b-ahibbard
5
5
ms.service: azure-netapp-files
6
6
ms.topic: how-to
7
-
ms.date: 07/10/2025
7
+
ms.date: 07/14/2025
8
8
ms.author: anfdocs
9
9
# Customer intent: "As a system administrator, I want to configure access control lists on NFSv4.1 volumes in Azure NetApp Files, so that I can manage fine-grained file permissions for users and groups to enhance security and control over shared resources."
10
10
---
@@ -58,10 +58,9 @@ To learn more about ACLs in Azure NetApp Files, see [Understand NFSv4.x ACLs](nf
- If you're configuring an ACE for [file access logs](manage-file-access-logs.md), you must use the `U:` prefix to denote the ACE is an audit ACE. The following example configures an audit log for everyone for successful and failed access attempts:
63
-
`nfs4_setfacl -a U:fdiSF:EVERYONE@:rwaDdxtTnNcCoy /<mount_point>`
64
-
62
+
`nfs4_setfacl -a U:fdiSF:EVERYONE@:rwaDdxtTnNcCoy /<mount_point>`.
63
+
- To apply ACLs recursively on a directory and its contents, use the `-R` option with the `nfs4_setfacl` command. This option ensures the ACL changes are applied to all files and subdirectories within the specified directory.
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/configure-network-features.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Configure network features for an Azure NetApp Files volume | Microsoft Docs
2
+
title: Configure network features for an Azure NetApp Files volume
3
3
description: Describes the options for network features and how to configure the Network Features option for a volume.
4
4
services: azure-netapp-files
5
5
author: b-hchen
@@ -41,7 +41,7 @@ Two settings are available for network features:
41
41
* When you change the network features option of existing volumes from Basic to Standard network features, access to existing Basic networking volumes might be lost if your UDR or NSG implementations prevent the Basic networking volumes from connecting to DNS and domain controllers. You might also lose the ability to update information, such as the site name, in the Active Directory connector if all volumes can’t communicate with DNS and domain controllers. For guidance about UDRs and NSGs, see [Configure network features for an Azure NetApp Files volume](azure-netapp-files-network-topologies.md#udrs-and-nsgs).
42
42
43
43
>[!NOTE]
44
-
> The networking features of the DP volume are not affected by changing the source volume from Basic to Standard network features.
44
+
> The networking features of the data protection volume aren't affected by changing the source volume from Basic to Standard network features.
45
45
46
46
## <aname="set-the-network-features-option"></a>Set network features option during volume creation
47
47
@@ -108,7 +108,7 @@ You can edit the network features option of existing volumes from *Basic* to *St
108
108
109
109
If your Azure NetApp Files volume is managed using Terraform, editing the network features requires additional steps. Terraform-managed Azure resources store their state in a local file, which is in your Terraform module or in Terraform Cloud.
110
110
111
-
Updating the network features of your volume alters the underlying network sibling set of the NIC utilized by that volume. This NIC can be utilized by other volumes you own, and other NICs can share the same network sibling set. **If not performed correctly, updating the network features of one Terraform-managed volume can inadvertently update the network features of several other volumes.**
111
+
Updating the network features of your volume alters the underlying network sibling set of the NIC utilized by that volume. This NIC can be utilized by other volumes you own, and other NICs can share the same network sibling set. **If performed incorrectly, updating the network features of one Terraform-managed volume can inadvertently update the network features of several other volumes.**
112
112
113
113
>[!IMPORTANT]
114
114
>A discontinuity between state data and remote Azure resource configurations--notably, in the `network_features` argument--can result in the destruction of one or more volumes and possible data loss upon running `terraform apply`. Carefully follow the workaround outlined here to safely update the network features from Basic to Standard of Terraform-managed volumes.
@@ -120,7 +120,7 @@ The name of the state file in your Terraform module is `terraform.tfstate`. It c
120
120
121
121
:::image type="content" source="./media/configure-network-features/terraform-module.png" alt-text="Screenshot of Terraform module." lightbox="./media/configure-network-features/terraform-module.png":::
122
122
123
-
Do _not_ manually update the `terraform.tfstate` file. Likewise, the `network_features` argument in the `*.tf` and `*.tf.json` configuration files should also not be updated until you follow the steps outlined here as this would cause a mismatch in the arguments of the remote volume and the local configuration file representing that remote volume. When Terraform detects a mismatch between the arguments of remote resources and local configuration files representing those remote resources, Terraform can destroy the remote resources and reprovision them with the arguments in the local configuration files. This can cause data loss in a volume.
123
+
Do ***not*** manually update the `terraform.tfstate` file. Likewise, the `network_features` argument in the `*.tf` and `*.tf.json` configuration files should also not be updated until you follow the steps outlined here as this would cause a mismatch in the arguments of the remote volume and the local configuration file representing that remote volume. When Terraform detects a mismatch between the arguments of remote resources and local configuration files representing those remote resources, Terraform can destroy the remote resources and reprovision them with the arguments in the local configuration files. This can cause data loss in a volume.
124
124
125
125
By following the steps outlined here, the `network_features` argument in the `terraform.tfstate` file is automatically updated by Terraform to have the value of "Standard" without destroying the remote volume, thus indicating the network features has been successfully updated to Standard.
126
126
@@ -141,7 +141,7 @@ Changing the network features for an Azure NetApp Files Volume can impact the ne
141
141
All Terraform configuration files that define these volumes need to be updated, meaning you need to find the Terraform configuration files that define these volumes. The configuration files representing the affected volumes might not be in the same Terraform module.
142
142
143
143
>[!IMPORTANT]
144
-
>With the exception of the single volume you know is managed by Terraform, additional affected volumes might not be managed by Terraform. An additional volume that is listed as being in the same network sibling set does not mean that this additional volume is managed by Terraform.
144
+
>With the exception of the single volume you know is managed by Terraform, additional affected volumes might not be managed by Terraform. Another volume that's listed as being in the same network sibling set doesn't mean this other volume is managed by Terraform.
145
145
146
146
#### Modify the affected volumes’ configuration files
147
147
@@ -151,7 +151,7 @@ You must modify the configuration files for each affected volume managed by Terr
151
151
>Depending on your volume’s lifecycle configuration block settings in your Terraform configuration file, your volume can be destroyed, including possible data loss upon running `terraform apply`. Ensure you know which affected volumes are managed by Terraform and which are not.
152
152
153
153
1. Locate the affected Terraform-managed volumes configuration files.
154
-
1. Add the `ignore_changes = [network_features]` to the volume's `lifecycle` configuration block. If the `lifecycle` block does not exist in that volume’s configuration, add it.
154
+
1. Add the `ignore_changes = [network_features]` to the volume's `lifecycle` configuration block. If the `lifecycle` block doesn't exist in that volume’s configuration, add it.
155
155
156
156
:::image type="content" source="./media/configure-network-features/terraform-lifecycle.png" alt-text="Screenshot of the lifecycle configuration." lightbox="./media/configure-network-features/terraform-lifecycle.png":::
157
157
@@ -174,7 +174,7 @@ The `ignore_changes` feature is intended to be used when a resource’s referenc
174
174
:::image type="content" source="./media/configure-network-features/terraform-plan-output.png" alt-text="Screenshot of terraform plan command output." lightbox="./media/configure-network-features/terraform-plan-output.png":::
175
175
176
176
>[!IMPORTANT]
177
-
> As a safety precaution, execute `terraform plan` before executing `terraform apply`. The command `terraform plan` allows you to create a “plan” file, which contains the changes to your remote resources. This plan allows you to know if any of your affected volumes will be destroyed by running `terraform apply`.
177
+
> As a safety precaution, execute `terraform plan` before executing `terraform apply`. The command `terraform plan` allows you to create a “plan” file, which contains the changes to your remote resources. This plan allows you to know if any of your affected volumes can be destroyed by running `terraform apply`.
178
178
179
179
1. Run `terraform apply` to update the `terraform.tfstate` file.
180
180
@@ -194,7 +194,7 @@ Once you've update the volumes' network features, you must also modify the `netw
194
194
195
195
1. Repeat for each affected Terraform-managed volume.
196
196
1. Verify that the updated configuration files accurately represent the configuration of the remote resources by running `terraform plan`. Confirm the output reads "No changes."
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/create-cross-zone-replication.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
-
title: Create cross-zone replication relationships for Azure NetApp Files | Microsoft Docs
2
+
title: Create cross-zone replication relationships for Azure NetApp Files
3
3
description: This article shows you how to create and manage cross-zone replication relationships for Azure NetApp Files.
4
4
services: azure-netapp-files
5
5
author: b-ahibbard
6
6
ms.service: azure-netapp-files
7
7
ms.topic: how-to
8
-
ms.date: 07/30/2024
8
+
ms.date: 05/30/2025
9
9
ms.author: anfdocs
10
10
# Customer intent: "As a cloud administrator, I want to establish cross-zone replication for Azure NetApp Files, so that I can ensure high availability and disaster recovery for my critical applications across availability zones."
0 commit comments