Skip to content

Commit e95717f

Browse files
committed
update audit ace info
1 parent f2ebbeb commit e95717f

File tree

3 files changed

+16
-11
lines changed

3 files changed

+16
-11
lines changed

articles/azure-netapp-files/configure-access-control-lists.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure access control lists (ACLs) on NFSv4.1 with
44
author: b-ahibbard
55
ms.service: azure-netapp-files
66
ms.topic: how-to
7-
ms.date: 12/20/2024
7+
ms.date: 07/10/2025
88
ms.author: anfdocs
99
# Customer intent: "As a system administrator, I want to configure access control lists on NFSv4.1 volumes in Azure NetApp Files, so that I can manage fine-grained file permissions for users and groups to enhance security and control over shared resources."
1010
---
@@ -48,17 +48,22 @@ To learn more about ACLs in Azure NetApp Files, see [Understand NFSv4.x ACLs](nf
4848
- `A:g:GROUP@:rwaDxtTnNcy` - group has full (RWX) access
4949
- `A::EVERYONE@:tcy` - everyone else has no access
5050

51-
1. To modify an ACE for a user, use the `nfs4_setfacl` command: `nfs4_setfacl -a|x A|D::<user|group>:<permissions_alias> <file>`
51+
1. To modify an ACE for a user, use the `nfs4_setfacl` command: `nfs4_setfacl -a|x A|D|U::<user|group>:<permissions_alias> <file>`
52+
5253
- Use `-a` to add permission. Use `-x` to remove permission.
53-
- `A` creates access; `D` denies access.
54+
- `A` creates access; `D` denies access. `U:` is used for audit ACEs to log access attempts.
5455
- In an Active Directory-joined set up, enter an email address for the user. Otherwise, enter the numerical user ID.
55-
- Permission aliases include read, write, append, execute, etc.
56+
- Permission aliases include read, write, append, execute, and others. For a full list of permissions, see: [NFSv4.x permissions](nfs-access-control-lists.md#nfsv4x-permissions).
5657
In the following Active Directory-joined example, user [email protected] is given read, write, and execute access to `/nfsldap/engineering`:
5758
```bash
5859
nfs4_setfacl -a A::[email protected]:RWX /nfsldap/engineering
5960
```
6061

62+
- If you're configuring an ACE for [file access logs](manage-file-access-logs.md), you must use the `U:` prefix to denote the ACE is an audit ACE. The following example configures an audit log for everyone for successful and failed access attempts:
63+
`nfs4_setfacl -a U:fdiSF:EVERYONE@:rwaDdxtTnNcCoy /<mount_point>`
64+
65+
6166
## Next steps
6267
6368
* [Configure NFS clients](configure-nfs-clients.md)
64-
* [Understand NFSv4.x ACLs](nfs-access-control-lists.md).
69+
* [Understand NFSv4.x ACLs](nfs-access-control-lists.md)

articles/azure-netapp-files/manage-file-access-logs.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: b-ahibbard
66
ms.service: azure-netapp-files
77
ms.topic: how-to
8-
ms.date: 04/18/2025
8+
ms.date: 07/10/2025
99
ms.author: anfdocs
1010
ms.custom: references_regions
1111
# Customer intent: As a storage administrator, I want to enable file access logs on Azure NetApp Files volumes so that I can monitor file access operations and troubleshoot access issues effectively.
@@ -33,7 +33,7 @@ File access logs provide file access logging for individual volumes, capturing f
3333
* Events such as file/folder creation or deletion are key events to log.
3434
* System access control list (SACL) settings for logging should be used sparingly. Frequent operations (for example, READ or GET) can have significant performance impact, but have limited logging value. It's recommended that SACL setting not log these frequent operations to conserve performance.
3535
* SACL policy additions aren't currently supported with file access logs.
36-
* When clubbing events such as READ/WRITE, only a handful of operation per file read or write are captured to reduce event logging rate. 
36+
* With clubbing events such as READ/WRITE, only a handful of operation per file read or write are captured to reduce event logging rate. 
3737
* File access logs support a [log generation rate metric](azure-netapp-files-metrics.md). The log generation rate shouldn't exceed 64 MiB/minute.
3838

3939
If the rate of file access event generation exceeds 64 MiB/minute, the [Activity log](monitor-azure-netapp-files.md) sends a message stating that the rate of file access log generation is exceeding the limit. If log generation exceeds the limit, logging events can be delayed or dropped. If you're approaching this limit, disable noncritical auditing ACLs to reduce the event generation rate. As a precaution, you can [create an alert](/azure/azure-monitor/alerts/alerts-create-activity-log-alert-rule) for this event.
@@ -151,7 +151,7 @@ To enable logging access on individual files and directories, complete the follo
151151
152152
For NFSv4.1, both discretionary and system ACEs are stored in the same ACL, not separate discretionary ACLs and SACLs. Exercise caution when adding audit ACEs to an existing ACL to avoid overwriting and losing an existing ACL. The order in which you add audit ACEs to an existing ACL doesn't matter.
153153
154-
**For steps**, see [Configure access control lists on NFSv4.1 volumes](configure-access-control-lists.md).
154+
Whe configuring the Audit ACE, ensure you use the `U:` prefix to denote it's an Audit ACE. **For steps**, see [Configure access control lists on NFSv4.1 volumes](configure-access-control-lists.md).
155155
156156
---
157157

articles/azure-netapp-files/nfs-access-control-lists.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: azure-netapp-files
55
author: b-ahibbard
66
ms.service: azure-netapp-files
77
ms.topic: concept-article
8-
ms.date: 02/13/2025
8+
ms.date: 07/10/2025
99
ms.author: anfdocs
1010
# Customer intent: "As a system administrator managing data access in Azure NetApp Files, I want to understand NFSv4.x ACLs and their permissions so that I can effectively control access and secure our file storage while ensuring compliance with user management policies."
1111
---
@@ -16,7 +16,7 @@ The NFSv4.x protocol can provide access control in the form of [access control l
1616

1717
:::image type="content" source="./media/nfs-access-control-lists/access-control-entity-to-client-diagram.png" alt-text="Diagram of access control entity to Azure NetApp Files." lightbox="./media/nfs-access-control-lists/access-control-entity-to-client-diagram.png":::
1818

19-
Each NFSv4.x ACL is created with the format of `type:flags:principal:permissions`.
19+
Each NFSv4.x ACL uses the format of `type:flags:principal:permissions`.
2020

2121
* **Type** – the type of ACL being defined. Valid choices include Access (A), Deny (D), Audit (U), Alarm (L). Azure NetApp Files supports Access, Deny and Audit ACL types, but Audit ACLs, while being able to be set, don't currently produce audit logs.
2222
* **Flags** – adds extra context for an ACL. There are three kinds of ACE flags: group, inheritance, and administrative. For more information on flags, see [NFSv4.x ACE flags](#nfsv4x-ace-flags).
@@ -180,7 +180,7 @@ Administrative flags in NFSv4.x ACLs are special flags that are used only with A
180180
181181
This Audit ACL is an example of that, where `user1` is audited for failed access attempts for any permission level: `U:F:[email protected]:rwatTnNcCy`.
182182
183-
Azure NetApp Files only supports setting administrative flags for Audit ACEs, however the ACEs don't function. Alarm ACEs aren't supported in Azure NetApp Files.
183+
Azure NetApp Files only supports setting administrative flags for Audit ACEs. Audit ACEs are required for [file access logs](manage-file-access-logs.md). Alarm ACEs aren't supported in Azure NetApp Files.
184184
185185
## NFSv4.x user and group principals
186186

0 commit comments

Comments
 (0)