0% found this document useful (0 votes)
6 views

Microsoft Azure Storage

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Microsoft Azure Storage

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 66

Microsoft Azure Storage:

The Definitive Guide

Avinash Valiramani
Microsoft Azure Storage: The Definitive Guide
Published with the authorization of Microsoft Corporation by: CREDITS
Pearson Education, Inc.
EDITOR-IN-CHIEF
Copyright © 2024 by Pearson Education, Inc. Brett Bartow

All rights reserved. This publication is protected by copyright, and permission EXECUTIVE EDITOR
must be obtained from the publisher prior to any prohibited reproduction, Loretta Yates
storage in a retrieval system, or transmission in any form or by any means, DEVELOPMENT EDITOR
electronic, mechanical, photocopying, recording, or likewise. For information Kate Shoup
regarding permissions, request forms, and the appropriate contacts within the
Pearson Education Global Rights & Permissions Department, please visit MANAGING EDITOR
www.pearson.com/permissions. Sandra Schroeder

No patent liability is assumed with respect to the use of the information con- SENIOR PROJECT EDITOR
tained herein. Although every precaution has been taken in the preparation of Tracey Croom
this book, the publisher and author assume no responsibility for errors or omis-
COPY EDITOR
sions. Nor is any liability assumed for damages resulting from the use of the
Sarah Kearns
information contained herein.
INDEXER
ISBN-13: 978-0-13-759318-7 Ken Johnson
ISBN-10: 0-13-759318-X
PROOFREADER
Donna E. Mulder
Library of Congress Control Number: 2023938511
TECHNICAL EDITOR
$PrintCode Thomas Palathra

TRADEMARKS EDITORIAL ASSISTANT


Microsoft and the trademarks listed at http://www.microsoft.com on the Cindy Teeters
“Trademarks” webpage are trademarks of the Microsoft group of companies. COVER DESIGNER
All other marks are property of their respective owners. Twist Creative, Seattle
WARNING AND DISCLAIMER COVER ILLUSTRATION
Every effort has been made to make this book as complete and as accurate as O.C Ritz / www.shutterstock.com
possible, but no warranty or fitness is implied. The information provided is on COMPOSITOR
an “as is” basis. The author, the publisher, and Microsoft Corporation shall have codeMantra
neither liability nor responsibility to any person or entity with respect to any
loss or damages arising from the information contained in this book or from GRAPHICS
the use of the programs accompanying it. codeMantra

SPECIAL SALES
For information about buying this title in bulk quantities, or for special sales
opportunities (which may include electronic versions; custom cover designs;
and content particular to your business, training goals, marketing focus, or
branding interests), please contact our corporate sales department at
[email protected] or (800) 382-3419.

For government sales inquiries, please contact


[email protected].

For questions about sales outside the U.S., please contact


[email protected].
Pearson’s Commitment to Diversity,
Equity, and Inclusion
Pearson is dedicated to creating bias-free content that reflects the diversity of all learners. We
embrace the many dimensions of diversity, including but not limited to race, ethnicity, gender,
socioeconomic status, ability, age, sexual orientation, and religious or political beliefs.
Education is a powerful force for equity and change in our world. It has the potential to
deliver opportunities that improve lives and enable economic mobility. As we work with
authors to create content for every product and service, we acknowledge our responsibility to
demonstrate inclusivity and incorporate diverse scholarship so that everyone can achieve their
potential through learning. As the world’s leading learning company, we have a duty to help
drive change and live up to our purpose to help more people create a better life for them-
selves and to create a better world.
Our ambition is to purposefully contribute to a world where:

■■ Everyone has an equitable and lifelong opportunity to succeed through learning.


■■ Our educational products and services are inclusive and represent the rich diversity of
learners.
■■ Our educational content accurately reflects the histories and experiences of the learners
we serve.
■■ Our educational content prompts deeper discussions with learners and motivates them
to expand their own learning (and worldview).

While we work hard to present unbiased content, we want to hear from you about any
concerns or needs with this Pearson product so that we can investigate and address them.

■■ Please contact us with concerns about any potential bias at


https://www.pearson.com/report-bias.html.

  iii
Contents at a Glance
Acknowledgments xii

About the author xiii

Introduction to Microsoft Azure Storage xiv

Chapter 1 Azure Blob Storage 1

Chapter 2
Azure Files 79

Chapter 3
Azure Managed Disks 139

Chapter 4
Azure Queue Storage 193

Chapter 5
Azure Data Box 231

Chapter 6
Azure Data Share 251
Index 273

v
Contents
Acknowledgments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
About the author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii

Introduction to Microsoft Azure Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv

Chapter 1 Azure Blob Storage 1


Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Key concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Storage components 1
Storage tiers 5
Storage redundancy types 5
Storage endpoints 10
Storage encryption for at-rest data 10
Storage data integrity 12
Storage account walkthrough 12
Data access authorization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Azure Active Directory (Azure AD) 25
Shared Key 26
Shared access signature (SAS) 29
Networking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Network routing 33
Network File System (NFS) 3.0 protocol 35
SSH File Transfer (SFTP) protocol 36
Storage account firewall and virtual networks 36
Networking endpoints 41
Storage access tiers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Early deletion fees 51
Default access tier configuration 51
Blob lifecycle management 54
Storage reservations 58

Contents vii
Static website hosting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Data protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Soft delete for containers and blobs 59
Blob versioning 59
Blob change feed 60
Point-in-time restore 61
Data protection walkthrough 61
Azure Backup integration 65
Blob snapshots 70
Disaster recovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Storage account failover 74
Last Sync Time 74
Best practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Chapter 2 Azure Files 79


Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Key features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Key concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Deployment models 81
Storage accounts 82
File shares 90
Storage tiers for file shares 99
Networking considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Network protocols 101
Networking endpoints 103
Network routing 110
Encryption in transit 111
Storage account firewall 112
SMB Multichannel 116
Identity and access considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Identity and access considerations walkthrough 120
Data redundancy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Data protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

viii Contents
Encryption for at-rest data 124
Soft delete 124
Share snapshots 124
Azure Backup integration 127
Best practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

Chapter 3 Azure Managed Disks 139


Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Key features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Key concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Disk roles 141
Disk types 141
Managed disk creation walkthrough 143
Private Link integration 151
Encryption 158
Managed disk snapshots 158
Managed images 167
Performance tiering 172
Disk redundancy 176
Shared disks 177
Managed disk bursting 180
Managed disk backup 181
Best practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

Chapter 4 Azure Queue Storage 193


Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Key features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Key concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Azure Storage account 195
Queues and messages 202
Networking considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Storage firewall and virtual networks 209
Private endpoints 213

Contents ix
Requiring secure transfers 220
Enforcing TLS versions 220
Identity and access considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Data redundancy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Disaster recovery 225
Storage account failover 225
Last Sync Time 226
Data encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Infrastructure encryption 227
Service-level encryption 228
Client-side encryption 228
Best practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228

Chapter 5 Azure Data Box 231


Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Key features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Key concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Data Box components 232
Import/export workflow 233
Data security 234
Data-transfer speeds 235
Supported Azure services 236
Supported client operating systems 236
Availability 236
Data resiliency 236
Partner integrations 237
Preserving ACLs, file attributes, and timestamps 237
Limitations 238
Azure Data Box walkthrough 238
Data Box use cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Best practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249

x Contents
Chapter 6 Azure Data Share 251
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Key features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Key concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Data types 252
Data provider 252
Data consumer 252
Sharing models 253
Data stores 254
Sharing caveats 254
Managed identities 256
Share and receive data with Azure Data Share . . . . . . . . . . . . . . . . . . . . . . 257
Set up an Azure Data Share resource to share data
walkthrough 257
Set up an Azure Data Share resource to receive data
walkthrough 265
Best practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271

Index 273

Contents xi
Acknowledgments
At the outset, I want to express my deepest gratitude to Loretta Yates for bestow-
ing upon me this tremendous responsibility. Only because of your unwavering trust
and belief in my abilities, these books have come to fruition. I am forever grateful
for the opportunity you have given me.
To my amazing mom, I am incredibly grateful for your unwavering support
throughout the past two years as I wrote these books. Your love and understanding
have meant the world to me. Thank you for being my rock.
To Celine, my sincere gratitude for being a constant source of guidance and
assistance, whenever I needed you, throughout the journey of these last three
books. Celine, thank you for your constant presence and encouragement. It has
made this journey all the more meaningful.
To my beloved family, I am forever grateful for your understanding and patience
during the countless hours I spent engrossed in writing these books.
To my extended family, thank you for tolerating my absence for over two years
as I immersed myself in this writing endeavor. Hope to catch up with you all soon.
A heartfelt thank you goes to Kate Shoup for her exceptional editing and review
work throughout all four books in the series. Your keen eye for detail and guidance
throughout these books have been immeasurably valuable. Collaborating with you
has been an enriching experience, and I am grateful for your exceptional skills as an
editor.
I would also like to express my appreciation to Thomas Palathra, Sarah Kearns,
and Tracey Croom for their meticulous contributions that brought this book to its
completion. This endeavor has been a collective labor of love, and I am elated and
grateful for our collaborative efforts.
Lastly, I extend my thanks to the entire Microsoft Press/Pearson team for their
support and guidance throughout this project. Your expertise and guidance have
been instrumental in shaping this book, and I am grateful for the opportunity to
work alongside such a dedicated team.
Thank you all for being a part of this incredible journey. Your contributions and
support have made these books a reality, and I am humbled and grateful for each
and every one of you.

xii
About the author
Avinash Valiramani is a highly experienced IT Infrastructure and Cloud Architect,
specializing in Microsoft Technologies such as Microsoft Azure, Microsoft 365,
Windows Server, Active Directory, Microsoft Exchange, SCCM, Intune, and Hyper-V.
With over 17 years of expertise, he has worked with large and mid-size enterprises
globally, designing their Cloud Architecture, devising migration strategies, and
executing complex implementations. Avinash holds multiple certifications in Azure
Infrastructure, Azure Artificial Intelligence, Azure Security, and Microsoft 365.
As part of the Microsoft Azure Best Practices series, Avinash is currently pub-
lishing four books, including this one, that draw from extensive real-world experi-
ences. These books provide a comprehensive and concise resource for aspiring
technologists and professionals alike. In addition to his Microsoft expertise, Avinash
is also certified in Amazon AWS, Barracuda, Citrix, VMware, and other IT/Security
industry domains, which further complements his skill set.
Avinash’s contributions extend beyond writing books. He has authored an
Azure Virtual Desktop course for O’Reilly Media and has plans for creating
additional courses in the near future. You can stay updated with Avinash’s insights
and updates by following him on Twitter at @avaliramani. Furthermore, he will
be sharing frequent blogs on his websites www.avinashvaliramani.com and
www.cloudconsulting.services.
With his wealth of experience, industry certifications, and passion for advanc-
ing cloud technologies, Avinash Valiramani is a trusted advisor and sought-after
resource in the realm of Microsoft Azure and Microsoft Office365. His expertise
and dedication make him an invaluable asset for anyone seeking to leverage the
full potential of the cloud.

xiii
Introduction to Microsoft Azure
Storage
Welcome to Microsoft Azure Storage: The Definitive Guide. This book includes
in-depth information about the various Azure services that provide storage capa-
bilities and shares best practices based on real-life experiences with these services
in different environments.
This book focuses primarily on Azure storage services generally available during
2022, encompassing development work done on these services over the years.
A few storage features and functionalities were under preview at the time of this
writing and could change before they are widely available; thus, we will cover the
most notable ones in subsequent iterations of this book as they go live globally.

Overview
Over the years, Microsoft has introduced services related to the Azure storage
stack to address various types of application and infrastructure requirements.
Microsoft has released regular updates to these services, introducing additional
features and functionality, enhancing each service’s support matrix, and making
these services easier to deploy and manage with each iteration.
Following is a brief timeline of the announcement of each of these services in
public preview or general availability:
■■ Azure Blob Storage February 2010
■■ Azure Queue Storage February 2010
■■ Azure Files September 2015
■■ Azure Managed Disks February 2017
■■ Azure Data Box September 2017
■■ Azure Data Share July 2019
Each service provides customers with different options and features to address
their storage requirements. This book dives into each of these services to highlight
important considerations in deploying and managing them and to share associated
best practices.

xiv
Each chapter focuses first on the features provided by a service. The chapter
then explores in-depth the concepts behind that service and the components that
comprise it so you will understand how that service can deliver value in your Azure
deployment. Finally, each chapter focuses on deployment considerations and strat-
egies where necessary, with step-by-step walkthroughs to illustrate deployment
and management methods, followed by some best practices.

Cloud service categories


As in earlier books in this series, let’s start by first discussing the different types of
cloud service categories. Currently, cloud services are broken down into four main
categories: infrastructure as a service (IaaS), platform as a service (PaaS), func-
tion as a service (FaaS), and software as a service (SaaS). SaaS is not relevant to the
content covered in this Microsoft Azure book series; thus, we will focus on better
understanding the first three categories:
■■ Infrastructure as a service (IaaS) Using virtual machines (VMs) with
storage and networking is generally referred to as infrastructure as a service
(IaaS). This is a traditional approach to using cloud services in line with
on-premises workloads. Most on-premises environments use virtualization
technologies such as Hyper-V to virtualize Windows and Linux workloads.
Migrating to IaaS from such an environment is much easier than migrating
to PaaS or FaaS. Over time, as an organization’s understanding of various
other types of cloud services grows, it can migrate to PaaS or FaaS.
■■ Platform as a service (PaaS) One of the biggest benefits of using a cloud
service is the capability to offload the management of back-end infrastruc-
ture to a service provider. This model is called platform as a service (PaaS).
Examples of back-end infrastructure include different layers of the applica-
tion, such as the compute layer, storage layer, networking layer, security
layer, and monitoring layer. Organizations can use PaaS to free up their IT
staff to focus on higher-level tasks and core organizational needs instead of
on routine infrastructure monitoring, upgrade, and maintenance activities.
Azure Storage Service and Azure Data Share are examples of Azure PaaS
offerings.

Introduction xv
■■ Function as a service (FaaS) Function as a service (FaaS) offerings go one
step beyond PaaS to enable organizations to focus only on their application
code, leaving the entire back-end infrastructure deployment and manage-
ment to the cloud service provider. This provides developers with a great
way to deploy their code without worrying about the back-end infrastruc-
ture deployment, scaling, and management. It also enables the use of
microservices architectures for applications. An example of an Azure FaaS
offering is Azure Functions. There are no such examples for storage services.
In the Azure storage stack, some services fall under the PaaS category, including
the following:
■■ Azure Queue Storage This PaaS service enables you to store large num-
bers of messages in a queue that can be ingested and processed by various
application workloads.
■■ Azure File Share This PaaS service allows you to configure and manage
SMB/NFS file shares in the Azure cloud platform and access them from
Azure or on-premises environments.
Each cloud-service category has various features and limitations. Limitations
might relate to the application, technological know-how, costs for redevelopment,
among others. As a result, most organizations use some combination of different
types of these cloud services to maximize their cloud investments.
Each service provides a different level of control and ease of management. For
example:
■■ IaaS provides maximum control and flexibility in migration and use.
■■ FaaS provides maximum automation for workload deployment, manage-
ment, and use.
■■ PaaS provides a mix of both at varying levels, depending on the PaaS service
used.
Each service also offers varying levels of scalability or redundancy. For example:
■■ IaaS might require the use of additional services to achieve true geographi-
cal redundancy—for example, using Azure Site Recovery services, a PaaS
service, to replicate Azure VMs and the underlying Azure managed disks
across multiple Azure regions for redundancy and disaster recovery.
■■ PaaS and FaaS services are generally designed with built-in scalability and
load-balancing features—for example, Azure Blob Storage with GRS redun-
dancy level automatically replicates data to another Azure region.

xvi Introduction
Cost-wise, each service provides varying levels of efficiency. For example:
■■ FaaS offerings charge for compute based only on the usage hours for
compute services, making them extremely cost-effective.
■■ IaaS offerings charge for compute services regardless of usage once the
compute service (for example, a VM) is online.
■■ PaaS offerings are a mixed bag depending on how the services are config-
ured. Some PaaS products charge for storage resources regardless of usage,
while others, if configured correctly, charge based on usage alone. For
example:
■■ Azure standard file shares are charged based on the storage used to store
the data in the primary region and secondary region, if configured for
GRS.
■■ Azure premium file shares are charged based on the storage allocated to
store the data in the primary region and secondary region, if configured
for GRS, regardless of the storage used.

Migration factors and strategies


Along with these features and limitations, there are certain migration factors to
consider when deciding which category of cloud storage service might be the best
solution in an organization’s cloud journey. (See Figure I-1.) Of course, organiza-
tions can always start with one type of storage service and migrate to another type
of storage service over time as their understanding of the cloud matures.
Let’s examine the flow chart shown in Figure I-1 in more detail:
■■ Lift-and-shift migration strategy In a lift-and-shift migration, the orga-
nization migrates its existing on-premises environment as-is to the cloud,
without redeveloping or redesigning the application stack. A lift-and-shift
migration strategy generally involves less effort because no code changes
are necessary. Application components remain as-is and are migrated in
their current state to the cloud. This is a preferred migration approach for
organizations in which:
■■ A hardware refresh or procurement is planned.
■■ Scaling or security limitations require the organization to migrate to the
cloud as quickly as possible, with the least amount of disruption.
■■ The organization wants to use IaaS mainly to host its application and
database workloads.

Introduction xvii
xviii
Start

Azure Managed Azure Blob

Introduction
On-premises Cloud-native Storage
Disks Yes application that Migrate New Build Yes
Migrate or app with persistent
uses a local disk new build? unstructured data
or iSCSI

Option 1
No No

Backup and
Container-based Yes
disaster recovery or
Yes application using long-term data
persistent volumes retention

No
No

Option 2 Azure Queue


Yes Storage
Azure Files Store large numbers of
Storage Yes messages
On-premises file
shares to Azure

No

No Azure Managed
Disks
Yes
IaaS VM or VMSS with disk
Azure Data Box
Move large volume storage
Yes
of data to Azure
Archive Blob Storage Option 1
No

Container-based
application using Yes
persistent volumes

No
Option 2
Azure Files
Yes Storage
SMB/NFS cloud-native
File Share

Azure Data
Container-based Yes Shares
application using
persistent volumes

FIGURE I-1 Cloud-migration considerations.


■■ Cloud-optimized strategy With cloud-optimized migrations, the
organization redesigns or recodes its application as necessary to use PaaS-
based storage services. This enables the organization to use microservice
architectures, allowing it to truly benefit from the scalability and cost ben-
efits that a cloud service like Azure provides.
Organizations can use a lift-and-shift migration strategy, a cloud-optimized
migration strategy, or a combination of the two. For example, an organization
might use the flexibility provided by the Azure Managed Disks service to quickly
migrate their existing on-premises VMs to Azure using a lift-and-shift approach to
quickly benefit from the scaling and global availability of Azure. Then, over time,
the organization could migrate to more cloud-optimized PaaS services, such as the
Azure File Shares or Azure Blob Storage service, to meet those same needs.

Who is this book for?


Azure Storage: The Definitive Guide is for anyone interested in Azure infrastructure
solutions—IT and cloud administrators, network professionals, security profession-
als, developers, and engineers. It is designed to be useful for the entire spectrum of
Azure users. Whether you have basic experience using Azure or other on-premises
or cloud virtualization technologies, or you are an expert, you will still derive value
from this book. Azure Storage: The Definitive Guide provides introductory, interme-
diate, and advanced coverage of each widely used storage service.
The book especially targets those who are working in medium to large enter-
prise organizations; have at least basic experience in administering, deploying, and
managing Azure infrastructure or other virtualization technologies such as Micro-
soft Hyper-V; and want to enhance their understanding of how to build resiliency
and redundancy in their on-premises and cloud environments and to leverage the
wide range of infrastructure services provided by Microsoft Azure.

How is this book organized?


This book is organized into six chapters:
■■ Chapter 1: Azure Blob Storage
■■ Chapter 2: Azure Files
■■ Chapter 3: Azure Managed Disks
■■ Chapter 4: Azure Queue Storage

Introduction xix
■■ Chapter 5: Azure Data Box
■■ Chapter 6: Azure Data Share
Each chapter focuses on a specific Azure storage service, covering its inner
workings in depth, with walkthroughs to guide you in building and testing the
service and real-world best practices to help you maximize your Azure investments.
The approach adopted for the book is a unique mix of didactic, narrative, and
experiential instruction:
■■ The didactic component covers the core introductions to the services.
■■ The narrative leverages what you already understand and acts as a bridge to
introduce concepts.
■■ The experiential instruction takes into account real-world experiences and
challenges in small and large environments and the factors to consider while
designing and implementing workloads. Step-by-step walkthroughs on
how to configure each Azure monitoring and management service and its
related features and options enable you to take advantage of all the benefits
each service has to offer.

System requirements
To get the most out of this book, your system must meet the following
requirements:
■■ An Azure subscription Microsoft provides a 30-day USD200 trial
subscription that can be used to explore most services covered in this book.
Some services, such as dedicated hosts, cannot be created using the trial
subscription, however. To test and validate these services, you will need a
paid subscription. If you plan to deploy any of these restricted services, you
will need to procure a paid subscription.
■■ Windows 10/11 This should include the latest updates from Microsoft
Update Service.
■■ Azure PowerShell For more information, see https://docs.microsoft.com/
en-us/powershell/azure/install-az-ps.
■■ Azure CLI For more information, see https://docs.microsoft.com/en-us/cli/
azure/install-azure-cli.
■■ Display monitor This must be capable of 1024 x 768 resolution.
■■ Pointing device You need a Microsoft mouse or compatible pointing
device.

xx Introduction
About the companion content
The companion content for this book can be downloaded from one of the
following pages:
https://MicrosoftPressStore.com/StorageTDG/downloads
https://github.com/avinashvaliramani/AzureStorageTDG
The companion content includes the following:
■■ PowerShell code for each walkthrough in the book (where applicable)
■■ CLI code for each walkthrough in the book (where applicable)

Errata, updates, & book support


We’ve made every effort to ensure the accuracy of this book and its companion
content. You can access updates to this book—in the form of a list of submitted
errata and their related corrections—at:

MicrosoftPressStore.com/StorageTDG/errata
If you discover an error that is not already listed, please submit it to us at the
same page.
For additional book support and information, please visit MicrosoftPressStore.
com/Support.
Please note that product support for Microsoft software and hardware is
not offered through the previous addresses. For help with Microsoft software or
hardware, go to http://support.microsoft.com.

Stay in touch
Let’s keep the conversation going! We’re on Twitter: http://twitter.com/
MicrosoftPress.

Introduction xxi
Chapter 3

Azure Managed Disks


Overview
In February 2017, Microsoft announced the general availability for the Azure Managed
Disks service, starting with the Standard and Premium disk types. Managed disks enable
Azure customers to reduce overhead associated with managing and scaling storages
account while creating or managing virtual machine (VM) disks. Microsoft also intro-
duced numerous features that made managed disks a compelling solution for every
Azure-hosted infrastructure as a service (IaaS) environment and for customers consider-
ing migrating to the cloud. Over time, the list of features and benefits associated with the
Azure Managed Disks service has grown, and it has become the default disk solution for
most organizations that use Azure for their VMs.
Each Azure managed disk is a fully managed block-level storage volume designed for
the highest level of redundancy and availability. Azure currently offers different types of
managed disks, including Ultra Disks, Premium SSD Disks, Standard SSD Disks, and Stan-
dard HDD disks. Each disk type provides varying levels of performance and scalability.

Key features
Some key features and benefits of using managed disks in your Azure environment
include the following:
■■ High availability, resiliency, and redundancy Microsoft provides 99.999%
availability for VM workloads that use managed disks. Managed disks are designed
to maintain multiple replicas—three to be exact, spread across an Azure region.
This makes managed disks extremely resilient, and ensures that your workload
can continue to process even if there are issues with one or two replicas. Microsoft
provides an industry leading 0% annualized failure rate.
■■ High scalability Microsoft currently supports the deployment of 50,000 man-
aged disks per region per subscription, allowing large enterprises to deploy thou-
sands of VMs in a single subscription.
■■ Support for large Virtual Machine Scale Sets (VMSS) You can use managed
disks with VMSS. The scalability of managed disks makes it possible to deploy large
VMSS consisting of up to 1,000 nodes.

139
■■ Support for availability sets Azure Managed Disks provides native integration with
availability sets. Disks for VMs that are part of an availability set are spread across mul-
tiple fault domains with the selected Azure region and isolated from each other.
■■ Support for availability zones You can deploy managed disks across availability
zones to improve redundancy. Availability zones provide additional redundancy over
availability sets because the power and networking in each availability zone is indepen-
dent of the others.
■■ Support for existing virtual hard disks (VHDs) You can easily upload existing VHDs
up to 32 terabytes (TB) in size to Azure for use as managed disks. This process makes it
extremely easy for organizations to migrate their existing workloads to Azure.
■■ Role-based access control (RBAC) Azure Managed Disks supports permission
management using Azure RBAC, making it possible to granularly assign permissions to
managed disks to administrators based on their roles and responsibilities.
■■ Native integration with Azure Backup You can use Azure Backup to back up man-
aged disks from within the Azure Managed Disks service. You can schedule backups
during off-peak hours and retain backups based on your organizational policies. You
restore backups from the Azure Backup service.
■■ Disk encryption Managed disks are encrypted by default. They support multiple
types of encryption, including Microsoft-managed encryption keys, customer-managed
encryption keys, and double encryption with both types of keys. In addition, managed
disks support Azure Disk Encryption, which allows you to encrypt the disk inside the VM
using BitLocker for Windows or DM-Crypt for Linux VMs.
■■ Easy migration for unmanaged disks You can easily migrate unmanaged disks
stored in Azure Storage accounts to managed disks. This increases the resiliency and
redundancy of your IaaS VMs and provides significantly higher availability for your
workloads.
■■ Support for shared disks for clustered applications You can set up managed disks
as shared disks. This allows you to attach them to multiple VMs to host or migrate clus-
tered applications to Azure.
■■ Disk bursting for better performance Managed disks allow you to increase the
IOPS available for use for Premium and Standard SSD disks with on-demand or credit-
based bursting models. Each model provides different capabilities to maximize the
performance of your workloads when needed.
■■ Private Link Support You can use Private Link to import or export managed disks to
or from Azure. This enables organizations to securely transfer disk data over a com-
pletely private connection.

Key concepts
Now that you have an initial understanding of the Azure Managed Disks service, let’s spend
some time going through all the different components and features in detail.

140   Chapter 3 Azure Managed Disks


Disk roles
In Azure, disks play three primary roles:
■■ Operating system (OS) disk An OS disk is created by default for every VM you create
in Azure. This disk contains the OS running on the VM as well as the boot volume. The
OS disk supports partitioning with a master boot record (MBR) and GUID partition table
(GPT) depending on the OS requirement. By default, most operating systems use parti-
tioning with MBR, which limits the OS disk capacity to 2 TB. However, you can increase
this to 4 TB by converting the disk from MBR to GPT.
■■ Temporary disk Microsoft provides a temporary disk as a non-persistent disk for
specific VM models in Azure. When selecting the VM size in Azure, you can see the size
of the temporary disk provided with that VM type. Any data you store on the temporary
disk should be data that you are willing to lose, such as page files, swap files, or tempo-
rary logs. Each time a VM undergoes a forced restart, maintenance, or a redeployment,
data on the temporary disk is erased. The VM can retain data stored on these disks
only during standard reboot operations. Temporary disks are not encrypted by default,
although you can enable encryption if needed. These disks are mapped as D: in Win-
dows VMs and /dev/sdb in Linux-based VMs.
■■ Data disk Data disks are optional, and you can use them based on your workload
requirements—for example, separating database installation files from data and log
files, which can be stored on their own or individual data disks. As mentioned, OS disks
have a maximum capacity of 4 TB, so any data-storage requirements that exceed that
would require you to use data disks. The maximum disk capacity for a single data disk
is currently 32,767 gigabytes (GB) for Standard HDD, Standard SSD, and Premium SSD
disks. However, Ultra disks can be scaled up to 65,536 GB. The number and type of data
disks that you can use with a VM depends on the size and type of the VM. Be sure to
consider this when selecting the size for your VM.

NOTE Every VM has an OS disk. Whether a VM has a temporary disk depends on the
VM model. Data disks are optional based on your workload requirements.

Disk types
Azure offers four types of disks:
■■ Standard HDD disks
■■ Standard SSD disks
■■ Premium SSD disks
■■ Ultra disks

Key concepts Chapter 3   141


Standard HDD disks
Standard HDD disks are suitable for workloads that are less critical and are not latency sensitive
and for dev/test environments. These disks provide write latencies of less than 10 milliseconds
(ms) and read latencies of less than 20 ms. Their performance varies depending on numerous
factors, including IO size and workload pattern. Standard HDD disks are the least expensive
(per gigabyte) disk option in Azure.

Standard SSD disks


Standard SSD disks are a great alternative for customers that want better performance, scal-
ability, availability, and reliability than is possible with Standard HDD disks. Standard SSD disks
are a great choice for low-intensity workloads that require consistent performance, such as
web servers, low-usage business applications, and low IOPS applications. Standard SSD disks of
512 GB or more support credit-based bursting, making them ideal for applications that require
a burst of performance only on rare occasions. All Azure VMs support Standard SSD disks.

Premium SSD disks


Premium SSD disks offer the second highest level of disk performance, with single-digit mil-
lisecond latencies, targeted IOPS, and defined throughput 99.9% of the time. They are suitable
for high-intensity workloads, such as production applications and databases.
Premium SSD disks come in different sizes, and the level of IOPS support differs depending
on the size of the Premium SSD disk. For example, P1 4 GB to P4 32 GB disks provide 120 IOPS,
P10 128 GB disks provide 500 IOPS, while P80 32 TB disks provide 20,000 IOPS. Disk throughput
and burst performance also increase as the capacity of the Premium SSD disks go up.
A few more features of Premium SSD disks are as follows:
■■ Premium SSD disks support one-year reservations to help you save on costs. You can set
reservations for disks 1 TB and larger.
■■ Premium SSD disks support on-demand and credit-based bursting models. Bursting
enables the Premium SSD to increase its performance in the short term to meet work-
load requirements.
■■ Only specific Azure VM types support Premium SSD disks. When you select a VM
type, Azure shows you which types of disks that VM type supports. Because Microsoft
adds and removes VM SKUs on an ongoing basis, I have not listed the VM types here,
because they may change by the time you read this.

Ultra disks
Ultra disks currently provide the highest level of performance in terms of IOPS and disk
throughput, with sub-millisecond latency 99.99% of the time. This makes Ultra disks suitable
for critical high-performance workloads such as SAP HANA, mission-critical databases, and
transaction-heavy applications.

142   Chapter 3 Azure Managed Disks


By default, each Ultra disk can be scaled up to 32 TB. However, you can contact Azure
support to request an increase of up to 64 TB. In terms of IOPS, each Ultra disk supports a mini-
mum of 300 IOPS per gibibyte (GiB) and currently maxes out at 160,000 IOPS per disk.
Ultra disks allow you to adjust IOPS and throughput performance during runtime. You are
permitted four adjustments every 24 hours. Each adjustment can take up to one hour to take
effect and requires sufficient performance bandwidth capacity to prevent failures.
At present, Ultra disks have numerous limitations. These include lack of support for the
following:
■■ Availability sets
■■ Azure Dedicated Host
■■ Disk snapshots
■■ Azure Backup
■■ Azure Site Recovery
■■ Disk exports
■■ VM image creation
In addition, Ultra disks cannot be used as OS disks. They can only be set up as data disks. For
high-performance workloads that call for the use of an Ultra disk, you will want to set up the
OS disk as a Premium SSD disk and leverage Ultra disks for all your workload data.

TIP Review the latest guidance available from Microsoft when planning your deploy-
ment, as these limitations may have changed by that time.

Managed disk creation walkthrough


The following sections step you through the process of creating a managed disk using the
Azure portal, Azure PowerShell, and the Azure CLI.

IMPORTANT If you are following along, select resources and resource names based
on your environment.

IMPORTANT If you are following along, be sure to delete any unwanted resources
after you have completed testing to reduce charges levied by Microsoft.

Key concepts Chapter 3   143


USING AZURE PORTAL
To create a managed disk using the Azure portal, follow these steps:
1. Log in to the Azure portal, type disks in the search box, and select the Disks option in
the list that appears. (See Figure 3-1.)

FIGURE 3-1 Searching for the Disks service in the Azure portal.

2. On the Disks page (see Figure 3-2), click Create.

FIGURE 3-2 Creating a new disk.

3. In the Basics tab of the Create a Managed Disk wizard (see Figure 3-3), enter the follow-
ing information:
■■ Subscription Select the subscription in which you want to create the new man-
aged disk.
■■ Resource Group Select an existing resource group in which to create the new
managed disk or create a new one.
■■ Disk Name Enter a unique name for the managed disk.
■■ Region Select the Azure region where you want to host the managed disk.
■■ Availability Zone Select the availability zone you want to use or leave this option
set to None (the default).
■■ Source Type If the disk will be created from source data, such as a snapshot, stor-
age blob, another disk, etc., select the source type.

4. To create a disk that is a different redundancy level, type, size, or performance tier from
the default (1,024 GiB Premium SSD LRS), click the Change Size link in the Size section
of the wizard’s Basics tab.
5. In the Select a Disk Size dialog box, open the Disk SKU drop-down list and choose a
disk type/redundancy level pairing. (See Figure 3-4.)

144   Chapter 3 Azure Managed Disks


NOTE For more on redundancy levels for managed disks, see the section “Disk redun-
dancy” later in this chapter.

FIGURE 3-3 The Basics tab of the Create a Managed Disk wizard.

FIGURE 3-4 Choose a disk type and redundancy level.

Key concepts Chapter 3   145


6. Click a size option in the list to select it. Alternatively, use the Custom Disk Size (GiB)
and Performance Tier drop-down lists to choose a custom size/tier pairing. Then click
OK. (See Figure 3-5.)

FIGURE 3-5 Selecting a different disk size and performance tier.

7. Back in the Basics tab of the Create a Managed Disk wizard, click Next.
8. In the Encryption tab of the Create a Managed Disk wizard (see Figure 3-6), open the Key
Management drop-down list and choose Platform-Managed Key, Customer-
Managed Key, or Platform-Managed and Customer-Managed Keys. Then click Next.

NOTE To use customer-managed keys, you must first generate and store the keys in
the Azure Key Vault service.

FIGURE 3-6 The Encryption tab of the Create a Managed Disk wizard.

9. In the Networking tab of the Create a Managed Disk wizard (see Figure 3-7), in the
Network Access section, leave the Enable Public Access from All Networks option
button selected and click Next.
10. In the Advanced tab of the Create a Managed Disk wizard (see Figure 3-8), enter the
following information and click Next:
■■ Enable Shared Disk If you want to use this managed disk as a shared disk, select
the Yes Option button. Then use the Max Shares drop-down list to specify how
many VMs will share the disk.

146   Chapter 3 Azure Managed Disks


FIGURE 3-7 The Networking tab of the Create a Managed Disk wizard.

NOTE For more on shared disks, see the section “Shared disks” later in this chapter.

■■ On-Demand Bursting If you want this managed disk to be capable of on-demand


bursting, select the Enable On-Demand Bursting check box.

NOTE The Enable On-Demand Bursting check box is available only if your managed
disk is 512 GB or more. This option is covered in more detail later in this chapter.

■■ Enable Data Access Authentication Mode Optionally, select this check box to
enable data access authentication. When you enable data access authentication, you
can limit who can download the disk to admins who are authorized using Azure AD
and authenticated using an approved account.

FIGURE 3-8 The Advanced tab of the Create a Managed Disk wizard.

Key concepts Chapter 3   147


11. In the Tags tab (see Figure 3-9), enter any tags you want to associate with the managed
disk and click Next.

FIGURE 3-9 The Tags tab of the Create a Managed Disk wizard.

12. In the Review + Create tab (see Figure 3-10), review your settings, and click Create to
create the managed disk.

FIGURE 3-10 The Review + Create tab of the Create a Managed Disk wizard.

148   Chapter 3 Azure Managed Disks


13. After the managed disk is created, click Go to Resource to access its page. (See
Figure 3-11.)

FIGURE 3-11 Managed disk deployment completion.

USING AZURE POWERSHELL


Use the following Azure PowerShell code to create a managed disk:

#Define variables
$resourceGroup = "RG01"
$location = "EastUS2"
$vm = "SourceVM"
$MgdDiskName = "ManagedDisk01"

#Create a disk config object – Change the disk redundancy as needed


$MgdDiskConfig = New-AzDiskConfig `
-Location $location `
-CreateOption Empty `
-DiskSizeGB 64 `
-EncryptionType EncryptionAtRestWithPlatformKey `
-PublicNetworkAccess true `
-Architecture X64 `
-SkuName Standard_LRS/Premium_LRS/StandardSSD_LRS/UltraSSD_LRS/Premium_ZRS/
StandardSSD_ZRS

#Create Data Disk


$MgdDisk = New-AzDisk `
-ResourceGroupName $resourceGroup `
-DiskName $MgdDiskName `
-Disk $mgddiskConfig

#Verify disk
Get-AzDisk `
-ResourceGroupName $resourceGroup `

Key concepts Chapter 3   149


-DiskName $MgdDiskName

#Optional - Attach disk to VM


$Azvm = Get-AzVM `
-ResourceGroupName $resourceGroup `
-Name $vm

$Azvm = Add-AzVMDataDisk `
-VM $vm `
-Name $MgdDiskName `
-CreateOption Attach `
-ManagedDiskId $MgdDisk.Id `
-Lun 1

Update-AzVM `
-ResourceGroupName $resourceGroup `
-VM $Azvm

USING AZURE CLI


Use the following code to create a managed disk in the Azure CLI:

#Define variables
resourceGroup="RG01"
location="EastUS2"
vm="SourceVM"
MgdDiskName="ManagedDisk01"

#Create managed disk – Change the disk redundancy as needed


az disk create \
--resource-group $resourceGroup \
--name $MgdDiskName \
--size-gb 64 \
--architecture x64 \
--encryption-type EncryptionAtRestWithPlatformKey \
--location $location \
--public-network-access Enabled \
--sku Premium_LRS/PremiumV2_LRS/Premium_ZRS/StandardSSD_LRS/StandardSSD_ZRS/
Standard_LRS/UltraSSD_LRS

#Verify disk
mgddisk=$(az disk show \
--name $MgdDiskName \
--resource-group $resourceGroup)

#Optional - Attach disk to VM


az vm disk attach \

150   Chapter 3 Azure Managed Disks


--disks $mgddisk \
--name $MgdDiskName \
--resource-group $resourceGroup \
--vm-name $vm

Private Link integration


Private Link provides secure connectivity to Azure PaaS services and Azure hosted services
from your networks over a private endpoint. A private endpoint is a network interface con-
nected to the Azure PaaS service or Azure hosted service, such as Managed Disks, that is
attached to an Azure virtual network. With Private Link and private endpoints, you can safely
and securely transfer managed disk files between regions using a private connection on the
Microsoft backbone network instead of the public internet. You can also import VHD files from
an on-premises environment directly to an empty managed disk in Azure over a private con-
nection. Time-restricted Shared Access Signature (SAS) URLs can provide access to the unused
managed disks and snapshots for transfer.

NOTE Another book in this series, Microsoft Azure Networking: The Definitive Guide,
covers Private Link in detail in Chapter 10.

Private Link integration walkthrough


The following sections step you through the process of creating a private endpoint and inte-
grating Private Link with the managed disk using the Azure portal and the Azure CLI.

IMPORTANT If you are following along, select resources and resource names based
on your environment.

IMPORTANT If you are following along, be sure to delete any unwanted resources
after you have completed testing to reduce charges levied by Microsoft.

USING AZURE PORTAL


To create a private endpoint and integrate Private Link with a managed disk using the Azure
portal, follow these steps:
1. Log in to the Azure portal, type disk accesses in the search box, and select the Disk
Access option from the list that appears. (See Figure 3-12.)

Key concepts Chapter 3   151


FIGURE 3-12 Searching for disk accesses in the Azure portal.

2. On the Disk Access page, click Create Disk Access. (See Figure 3-13.)

FIGURE 3-13 Create disk access.

3. In the Basics tab of the Create a Disk Access wizard (see Figure 3-14), enter the following
information:
■■ Subscription Select the subscription in which you want to create the disk access
resource.
■■ Resource Group Select an existing resource group in which to create the disk
access resource or create a new one.
■■ Name Enter a unique name for the disk access resource.
■■ Region Select the Azure region where you want to host the disk access resource.

Before you continue with the Create a Disk Access wizard, you need to create the private
endpoint. You’ll do that next.
4. At the bottom of the Basics tab, click Add.
5. In the Create a Private Endpoint dialog box (see Figure 3-15), enter the following infor-
mation and click OK:
■■ Subscription Select the subscription you want to use to create the private
endpoint.

152   Chapter 3 Azure Managed Disks


FIGURE 3-14 The Basics tab of the Create a Disk Access wizard.

■■ Resource Group Select an existing resource group in which to create the private
endpoint or create a new one.
■■ Location Select the Azure region where you want to host the private endpoint.
■■ Name Enter a unique name for the private endpoint.
■■ Target Resource Select Disks.
■■ Virtual Network Select the virtual network on which to create the private
endpoint.
■■ Subnet Select the subnet on which to create the private endpoint.
■■ Integrate with Private DNS Zone Select Yes to integrate with a private DNS zone
or select No if you plan to create a DNS record in your own DNS servers or on the
host files of the workloads VMs. In this case, select Yes.
■■ Private DNS Zone Select the private DNS zone with which you want to integrate
the private endpoint. In this case, leave it set to the default, privatelink.blob.core.
windows.net.

Key concepts Chapter 3   153


FIGURE 3-15 The Create Private Endpoint dialog box.

6. Click the Tags tab (see Figure 3-16), enter any tags you want to associate with the private
endpoint, and click Next.
7. In the Review + Create tab (see Figure 3-17), review your settings and click Create to
create the private endpoint.

154   Chapter 3 Azure Managed Disks


FIGURE 3-16 The Tags tab of the Create a Disk Access wizard.

FIGURE 3-17 The Review + Create tab of the Create a Disk Access wizard.

8. After the private endpoint is created, click Go to Resource to access its page. (See
Figure 3-18.)

Key concepts Chapter 3   155


FIGURE 3-18 Private endpoint deployment completion.

9. In the left pane of the page for the managed disk you created earlier, under Settings,
click Networking.
10. On the managed disk’s Networking page (see Figure 3-19), perform the following steps
and click Save:
■■ Network Access Select the Disable Public Access and Enable Private Access
option button.
■■ Disk Access Select the private endpoint you just created.

FIGURE 3-19 The managed disk’s Networking page.

USING AZURE CLI


Use the following code to create a private endpoint and integrate Private Link with a managed
disk in the Azure CLI:

#Define variables
resourceGroup="RG01"

156   Chapter 3 Azure Managed Disks


location="EastUS2"
vm="SourceVM"
MgdDiskName="ManagedDisk01"
diskAccess="ManagedDisk01-DiskAccess"
vnet="VNET-01"
subnet="default"
privateEndPoint="ManagedDisk01-DiskAccess-PrivateEndpoint01"
#Create disk access
az disk-access create \
--name $diskAccess \
--resource-group $resourceGroup \
--location $location

diskAccessId=$(az disk-access show \


--name $diskAccess \
--resource-group $resourceGroup \
--query [id] -o tsv)

#Create private endpoint


az network private-endpoint create
--resource-group $resourceGroup \
--name $privateEndPoint \
--vnet-name $vnet \
--subnet $subnet \
--private-connection-resource-id $diskAccessId \
--group-ids disks \
--connection-name $privateEndPoint

#Create Private DNS zone config


az network private-dns zone create \
--resource-group $resourceGroup \
--name "privatelink.blob.core.windows.net"

az network private-dns link vnet create \


--resource-group $resourceGroup \
--zone-name "privatelink.blob.core.windows.net" \
--name $privateEndPoint-DNSLink \
--virtual-network $vnet \
--registration-enabled false

az network private-endpoint dns-zone-group create \


--resource-group $resourceGroup \
--endpoint-name $privateEndPoint \
--name $privateEndPoint-ZoneGroup \

Key concepts Chapter 3   157


--private-dns-zone "privatelink.blob.core.windows.net" \
--zone-name disks

#Update managed disk with Private Link config


diskAccessId=$(az resource show \
--name $diskAccess \
--resource-group $resourceGroup \
--namespace Microsoft.Compute \
--resource-type diskAccesses \
--query [id] -o tsv)

az disk update \
--name $diskName \
--resource-group $resourceGroup \
--network-access-policy AllowPrivate \
--disk-access $diskAccessId

Encryption
Managed disks support two types of disk encryption:
■■ Server-Side Encryption (SSE) SSE manages encryption on the storage layer and is
handled by the Azure Storage service. It provides encryption-at-rest and during write
operations to the underlying storage, thereby ensuring that disks stored in Azure are
not readable in the event of data theft. SSE is enabled by default for all managed disks,
snapshots, and images across all Azure regions. SSE supports two types of key manage-
ment: Azure platform-managed keys or customer-managed keys. You can choose which
type of key management you want to use for each managed disk you create.
■■ Azure Disk Encryption (ADE) ADE refers to encryption within the system. It applies
to the OS and data disks in an Azure IaaS VM. ADE encryption is performed using
BitLocker technology in Windows and DM-Crypt technology in Linux. In both scenarios,
the keys are integrated and stored in Azure Key Vault to make it easier for you to man-
age them.

Managed disk snapshots


Snapshots provide an easy way to back up a point-in-time copy of your managed disk for
restore or cloning operations. Snapshots are read-only, crash-consistent copies of the disk. You
can use them to create new managed disks without affecting the source managed disk in any
way. Snapshots are, by default, stored as standard managed disks, but you can change this dur-
ing the snapshot creation process.

158   Chapter 3 Azure Managed Disks


IMPORTANT While snapshots serve as a great way to create a copy of a managed disk,
they are not a replacement for regular backups, and you should not use them as such.

The first time you take a snapshot of a managed disk, it will be a full snapshot. Subsequent
snapshots, however, can be incremental. An incremental snapshot captures all changes to the
managed disk since the last snapshot of the disk. This reduces your storage footprint. If you
need to restore from a single incremental snapshot, Azure automatically identifies all the incre-
mental and full snapshots preceding the current one to reconstruct the entire disk. This makes
incremental snapshots extremely cost-effective, making them the preferred option for regular
snapshot management.

NOTE If the zone in which the incremental snapshot is created provides ZRS redun-
dancy capabilities, then the incremental snapshot will automatically be saved with ZRS,
too, unless specified otherwise.

NOTE If you are using full snapshots on premium storage to scale up VM deployments,
we recommend you use custom images on standard storage in the Shared Image Gallery.
This will help you achieve a more massive scale with a lower cost. For more on this, see
Chapter 2, “Virtual Machine Scale Sets,” in Microsoft Azure Compute: The Definitive Guide.

Incremental snapshots can also be useful for disaster recovery between Azure regions—
that is, you can identify changes between two snapshots of the same disk, and then transfer
only the differential changes to the secondary region instead of the entire snapshot. Then,
when you restore/rebuild in the secondary region, you can use the snapshot of the base blob
of the managed disk in combination with these differential changes. (See Figure 3-20.) This
strategy can reduce time, costs, and network requirements for disaster recovery for
managed disks.

NOTE Microsoft provides sample .NET code online to help you test this capability if
you are interested in exploring it.

Key concepts Chapter 3   159


160   Chapter 3 Azure Managed Disks
Azure Region - Primary Azure Region - Primary

Incremental Snapshot 1 Page Blob Snapshot 1


Copy base blob

GetPageRanges + PutPage
Incremental Snapshot 2 Page Blob Snapshot 2

GetPageRanges + PutPage
Incremental Snapshot 3 Page Blob Snapshot 3
Base Page Blob
Managed Disk
GetPageRanges + PutPage
Incremental Snapshot 4 Page Blob Snapshot 4

FIGURE 3-20 Incremental snapshots.


Incremental snapshots are a great feature, but they do have some limitations that exist at
the time of this writing. By the time you read this, these limitations may have been addressed.
Be sure to review Microsoft’s latest guidance before finalizing your snapshot management
strategy. Some key limitations at present include the following:
■■ Unlike full snapshots, incremental snapshots always use Standard HDD disks, regardless
of the disk type used for the full snapshot.
■■ A single managed disk supports a maximum of 500 incremental snapshots.
■■ Each managed disk limits you to creating seven incremental snapshots, with a wait time
of 5 minutes between each snapshot.
■■ The managed disk and snapshots must all be part of the same subscription.
■■ If you want to move a managed disk to another subscription, you will not be able to do
so if the disk has incremental snapshots. You will need to keep this in mind when plan-
ning any such migrations.
■■ Differentials do not work for disks larger than 4 TB.

Managed disk snapshots walkthrough


The following sections step you through the process of creating a snapshot of a managed disk
using the Azure portal, Azure PowerShell, and the Azure CLI.

IMPORTANT If you are following along, select resources and resource names based
on your environment.

IMPORTANT If you are following along, be sure to delete any unwanted resources
after you have completed testing to reduce charges levied by Microsoft.

USING AZURE PORTAL


To create a managed disk snapshot using the Azure portal, follow these steps:
1. In the Overview page for the managed disk you created earlier, click Create Snapshot.
(See Figure 3-21.)

Key concepts Chapter 3   161


FIGURE 3-21 The Overview page for ManagedDisk01.

2. In the Basics tab of the Create Snapshot wizard (see Figure 3-22), enter the following
information and click Next:
■■ Subscription Select the subscription in which you want to create the snapshot.
■■ Resource Group Select an existing resource group in which to create the snapshot
or create a new one.
■■ Name Enter a unique name for the snapshot.
■■ Snapshot Type Leave this set to the default value of Full.

NOTE Figure 3-22 shows a Full button and an Incremental button. Your screen might
not reflect that because this is the first time you’re creating a snapshot of this managed
disk. The next time you create a snapshot, you’ll want to choose the Incremental button.

■■ Storage Type Select Standard HDD, Standard SSD, or Premium SSD, depending
on your needs. (Remember, this is for the full snapshot; incremental snapshots always
use Standard HDD disks.)
3. In the Encryption tab of the Create Snapshot wizard (see Figure 3-23), open the Key
Management drop-down list and choose Platform-Managed Key, Customer-Man-
aged Key, or Platform-Managed and Customer-Managed Keys. Then click Next.

NOTE To use customer-managed keys, you must first generate and store the keys in
the Azure Key Vault service.

162   Chapter 3 Azure Managed Disks


FIGURE 3-22 The Basics tab of the Create Snapshot wizard.

FIGURE 3-23 The Encryption tab of the Create Snapshot wizard.

4. In the Networking tab of the Create Snapshot wizard (see Figure 3-24), in the Network
Access section, select the Enable Public Access from All Networks option button.

Key concepts Chapter 3   163


FIGURE 3-24 The Networking tab of the Create Snapshot wizard.

5. The Advanced tab of the Create Snapshot wizard (see Figure 3-25) includes an Enable
Data Access Authentication Mode check box. For this example, leave it unchecked.
Then click Next.

FIGURE 3-25 The Advanced tab of the Create Snapshot wizard.

6. In the Tags tab (see Figure 3-26), enter any tags you want to associate with the snapshot
and click Next.

FIGURE 3-26 The Tags tab of the Create Snapshot wizard.

7. In the Review + Create tab (see Figure 3-27), review your settings, and click Create to
create the snapshot.

164   Chapter 3 Azure Managed Disks


FIGURE 3-27 The Review + Create tab of the Create Snapshot wizard.

8. After the snapshot is created, click Go to Resource to access its page. (See Figure 3-28.)

FIGURE 3-28 Snapshot deployment completion.

Key concepts Chapter 3   165


The snapshot’s Overview page displays the properties of the snapshot, as well as Create
Disk, Copy Snapshot, Delete, and Refresh options. (See Figure 3-29.)

FIGURE 3-29 The new disk snapshot’s Overview page.

USING AZURE POWERSHELL


Use the following Azure PowerShell code to create a disk snapshot:

#Define variables
$resourceGroup = "RG01"
$location = "EastUS2"
$vm = "SourceVM"
$snapshotName = "SourceVM-Snapshot-20230228"

#get the VM
$vminfo = Get-AzVM `
-ResourceGroupName $resourceGroup `
-Name $vm

#Create the snapshot configuration


$snapshotconfig = New-AzSnapshotConfig `
-SourceUri $vminfo.StorageProfile.OsDisk.ManagedDisk.Id `
-Location $location `
-CreateOption copy

#Take the snapshot.


New-AzSnapshot `
-Snapshot $snapshotconfig `

166   Chapter 3 Azure Managed Disks


-SnapshotName $snapshotName `
-ResourceGroupName $resourceGroup

#Verify snapshot
Get-AzSnapshot `
-ResourceGroupName $resourceGroup

USING AZURE CLI


Use the following code to create a disk snapshot in the Azure CLI:

#Define variables
resourceGroup="RG01"
location="EastUS2"
vm="SourceVM"
snapshotName="SourceVM-Snapshot-20230228"

#get the VM
DiskInfo=$(az vm show \
--resource-group $resourceGroup \
--name $vm \
--query "storageProfile.osDisk.managedDisk.id" \
-o tsv)

#Take the snapshot.


az snapshot create \
--resource-group $resourceGroup \
--source "$DiskInfo" \
--name $snapshotName

#Verify snapshot
az snapshot list \
--resource-group $resourceGroup \
-o table

Managed images
Managed images enable you to create hundreds of copies of customized VMs in Azure without
having to create multiple copies of the underlying disks associated with each VM or manage
any storage accounts to host them. You can easily create managed images out of managed
disks; the resulting managed image will contain the configuration of the source VM, includ-
ing all the managed disks associated with that source VM. This helps you to scale your VM
resources using features like VMSS or Azure Virtual Desktop Session Host Pools, where capac-
ity is added as load increases.
The primary difference between managed disks and managed images is that an image is
built from a generalized VM and includes all the associated disks, whereas a snapshot is specific

Key concepts Chapter 3   167


to a single disk and is a point-in-time copy of that disk. Generalizing a VM removes machine
and user-specific information from the VM. So, for a VM that has multiple disks using disk
spanning, a snapshot currently does not support a coordinated restore of all the disks and,
therefore, might not be the right solution.

Managed images walkthrough


The following sections step you through the process of creating a managed image using the
Azure portal, Azure PowerShell, and the Azure CLI.

IMPORTANT If you are following along, select resources and resource names based
on your environment.

IMPORTANT If you are following along, be sure to delete any unwanted resources
after you have completed testing to reduce charges levied by Microsoft.

PREREQUISITE If you are following along, you must create a VM to use to create
the managed image. Be sure to stop that VM before starting the following procedure,
however. The wizard will generalize this VM and make it unusable after the image is
captured. (Optionally, you back up the VM and restore it after the process is complete.)

USING AZURE PORTAL


To create a managed image using the Azure portal, follow these steps:
1. On the Overview page of the VM for which you want to create an image, click Capture.
(See Figure 3-30.)

FIGURE 3-30 The Overview page for the VM.

2. In the Basics tab of the Create an Image wizard (see Figure 3-31), enter the following
information and click Next:
■■ Resource Group Select an existing resource group in which to create the new
managed image or create a new one.
■■ Share Image to Azure Compute Gallery For this walkthrough, select the No,
Capture Only a Managed Image option button.

168   Chapter 3 Azure Managed Disks


■■ Automatically Delete this Virtual Machine After Creating the Image Leave
this checkbox unchecked (the default).
■■ Zone Resiliency Select this check box if you want to create a zone redundant image.
■■ Name Enter a unique name for the managed image.

FIGURE 3-31 The Basics tab of the Create an Image wizard.

3. In the Tags tab (see Figure 3-32), enter any tags you want to associate with the
managed image and click Next.

FIGURE 3-32 The Tags tab of the Create an Image wizard.

Key concepts Chapter 3   169


4. In the Review + Create tab (see Figure 3-33), review your settings, and click Create to
create the managed image.

FIGURE 3-33 The Review + Create tab of the Create an Image wizard.

The source VM will be stopped automatically if you haven’t turned it off already. (See
Figure 3-34.) Azure will then generalize the VM and create the image.

FIGURE 3-34 The VM is stopped (unless you stopped it already).

170   Chapter 3 Azure Managed Disks


5. After the managed image is created, click Go to Resource to access its page. (See
Figure 3-35.)

FIGURE 3-35 Managed image deployment completion.

The managed image’s Overview page displays the properties of the managed image as
well as Create VM, Clone to a VM Image, Delete, and Refresh options. (See Figure 3-36.)

FIGURE 3-36 The new managed image’s Overview page.

USING AZURE POWERSHELL


Use the following Azure PowerShell code to create a managed image:

#Define variables
$vm = "SourceVM"
$resourcegroup = RG01
$location = "EastUS2"
$imageName = "SourceVM-Image-20221203"

Key concepts Chapter 3   171


#VM has been deallocated
Stop-AzVM -ResourceGroupName $resourcegroup -Name $vm -Force

#Set the status of the virtual machine to Generalized.


Set-AzVm -ResourceGroupName $resourcegroup -Name $vm -Generalized

#Create the image configuration.


$vminfo = Get-AzVM -Name $vm -ResourceGroupName $resourcegroup
$vmimage = New-AzImageConfig -Location $location -SourceVirtualMachineId $vminfo.Id

#Create the image.


New-AzImage -Image $vmimage -ImageName $imageName -ResourceGroupName $resourcegroup

USING AZURE CLI


Use the following code to create a managed image in the Azure CLI:

#Define variables
vm="SourceVM"
resourcegroup=$RG01
location="EastUS2"
imageName="SourceVM-Image-20221203"

#VM has been deallocated


az vm deallocate \
--resource-group $resourcegroup \
--name $vm

#Set the status of the virtual machine to Generalized.


az vm generalize \
--resource-group $resourcegroup \
--name $vm

#Create the image.


az image create \
--resource-group $resourcegroup \
--location $location \
--zone-resilient false \
--name $imageName --source $vm

Performance tiering
When you create a managed disk, Azure automatically assigns a default performance target
for that disk. This is based on predefined targets associated with the disk provisioned for the
managed disk. This determines the IOPS and throughput available for that managed disk. This

172   Chapter 3 Azure Managed Disks


Index

A
ABAC (Attribute-Based Access Control), Azure AD, 25 RBAC, 26
access resource scope, 26
Azure Files, 118–122 Azure Backup integration, 65–70
Azure Queue Storage, 220–221 Azure Blob Storage
Azure AD, 221 archived blobs, rehydrating, 50
SAS, 222–223 Azure Backup integration, 65–70
storage account access keys, 221 best practices, 75–77
data access authorization, 24–25 blobs, 2
Azure AD, 25–26 append blobs, 4
SAS, 29–33 block blobs, 4
shared key authorization, 26–28 change feeds, 60
storage access tiers, Azure Blob Storage, 49–50 lifecycle management, 54–58
accounts point-in-time restores, 61
Azure Queue Storage, 195–202 premium block blobs, 3
storage accounts, 1 premium page blobs, 3
Azure Files, 82–90 rehydrating, 50
costs, 3 snapshots, 70–73
failover, 74 soft-deleting, 59
firewalls, 112–116 versioning, 59
names, 2 components, overview, 1–2
premium block blobs, 3 containers, 1, 4
premium page blobs, 3 names, 4
standard general purpose v2 storage accounts, 3 soft-deleting, 59
types of, 3 CRC, 12
ACL (Access Control Lists), Azure Data Box, 237 data access authorization, 24–25
ADE (Azure Disk Encryption), 158 Azure AD, 25–26
append blobs, 4 SAS, 29–33
archive tier, storage access, 50 shared key authorization, 26–28
archived blobs, rehydrating, 50 data protection, 59–65
at-rest data encryption, Azure Blob Storage, 10–11 data redundancy, 5
authorization, data access, 24–25 GRS, 8
Azure AD, 25–26 GZRS, 9
SAS, 29–33 LRS, 6
shared key authorization, 26–28 RA-GRS, 10–11
availability, Azure Data Box, 236 RA-GZRS, 10–11
Azure AD (Active Directory), 25 ZRS, 6–7
ABAC, 25 disaster recovery, 73–75
Azure Queue Storage, 221 encryption, 10–11

273
Azure Blob Storage

Azure Blob Storage, continued performance tiering, 176


networking Private Link integration, 156–158
endpoints, 41–49 shared disks, 180
NFS 3.0 protocol, 35 snapshots, 167
routing, 33–35 Azure Queue Storage
SSH File Transfer protocol, 36 accounts, 202
storage account firewalls, 36 firewalls, 213
overview, 1 Last Sync Time, 227
page blobs, 4 private endpoints, 219–220
premium block blobs, 3 queues and messages, 208
static website hosting, 58 blob snapshots, 73
storage access tiers, 49–50 data protection, 64–65
configuring, 51–54 Last Sync Time, 75
early deletion fees, 51 network routing, 35
rehydrating archived blobs, 50 SAS, 32–33
storage accounts, 1 Azure Data Box, 232
Azure CLI setups, 23–24 ACL, 237
Azure portal setups, 12–21 availability, 236
Azure PowerShell setups, 22–23 Azure Data Box Disk, 232–233
costs, 3 Azure Data Box Heavy, 233
names, 2 best practices, 249
premium block blobs, 3 components, 232–233
premium page blobs, 3 data resiliency, 236–237
setting up, 12–24 data security, 234–235
standard general purpose v2 storage accounts, 3 data-transfer speeds, 235
types of, 3 features, 231–232
walkthrough, 12–24 file attributes, 237
storage data integrity, 12 import/export workflow, 233–234
storage endpoints, 10 limitations, 238
storage reservations, 58 overview, 231
tiers, 5 supported client OS, 236
Azure CLI (Command-Line Interface) supported services, 236
Azure Backup integration, 69–70 timestamps, 237
Azure Blob Storage use cases, 248–249
private endpoints, 48–49 walkthrough, 238–248
storage access tiers, 54 Azure Data Explorer, 255–256
storage account firewalls, 40–41 Azure Data Share
storage accounts, 23–24 Azure Data Explorer, 255–256
Azure Files best practices, 271
backups, 135–136 data consumers, 252, 256–257
file shares, 98–99 data providers, 252, 256
identity/access, 121–122 data stores, 254
networking, endpoints, 109–110 data types, 252
SMB MultiChannel, 118 features, 251–252
storage account firewalls, 115–116 key concepts, 252–254
storage accounts, 89–90 managed identities, 256–257
Azure Managed Disks overview, 251
creating, 150–151 in-place sharing, 253
managed images, 172 receiving data, 265–271

274
Azure portal

sharing data, 257–265 managed images, 167–172


sharing models, 253 OS disks, 141
snapshot-based sharing, 253, 255 overview, 139
SQL-based sources, 255 performance tiering, 172–176
storage services, 254 premium SSD disks, 142
Azure Files Private Link integration, 151–158
access, 118–122 shared disks, 177–180
backups, 127–136 snapshots, 158–167
best practices, 137–138 standard HDD disks, 142
data protection, 123–136 standard SSD disks, 142
data redundancy, 122 temporary disks, 141
GRS, 123 ultra disks, 142–143
GZRS, 123 Azure portal
LRS, 122 Azure Blob Storage
ZRS, 122–123 Azure Backup integration, 66–68
deployment models, 81 blob lifecycle management, 55–57
encryption, 111–112, 124 blob snapshots, 71–72
features, 79–81 data protection, 62–63
file shares, 90–99 network routing, 34
cool file shares, 100–101 private endpoints, 42–48
file shares, storage tiers, 99–101 SAS, 29–32
hot file shares, 100 shared key authorization, 27–28
premium file shares, 100 storage access tiers, 51–53
transaction-optimized file shares, 100 storage account firewalls, 37–39
identity/access, 118–122 storage accounts, 12–21
networking, 101 Azure Data Box, 238–248
encryption in transit, 111–112 Azure Data Share
endpoints, 103–110 receiving data, 265–271
FileREST API, 102 sharing data, 257–265
NFS, 102 Azure Files
routing, 110–111 backups, 129–133
SMB, 101–102 file shares, 91–96
storage account firewalls, 112–116 identity/access, 120–121
overview, 79 networking, endpoints, 104–108
share snapshots, 122 share snapshots, 125–127
SMB MultiChannel, 116–118 SMB MultiChannel, 116–117
soft-deleting, 124 storage account firewalls, 112–114
storage accounts, 82–90 storage accounts, 83–88
Azure Managed Disks Azure Managed Disks
backups, 181–192 backups, 181–192
best practices, 192 creating, 144–149
bursting, 180 managed images, 168–171
creating, 143–151 performance tiering, 174–175
data disks, 141 Private Link integration, 151–156
disk redundancy, 176–177 shared disks, 179
disk roles, 140–141 snapshots, 161–166
disk types, 141–143 Azure Queue Storage
encryption, 158 accounts, 196–202
features, 139–140 firewalls, 209–212

275
Azure portal

Azure portal, continued identity/access, 220–221


private endpoints, 214–218 Azure AD, 221
queues and messages, 203–207 SAS, 222–223
SAS, 222–223 storage account access keys, 221
Azure PowerShell Last Sync Time, 226–227
Azure Blob Storage networking, 208
Azure Backup integration, 68–69 firewalls, 209–213
blob lifecycle management, 57–58 private endpoints, 213–220
blob snapshots, 72–73 secure transfers, 220
data protection, 63–64 TLS, 220
Last Sync Time, 75 overview, 193–194
network routing, 35 queues and messages, 202–208
private endpoints, 48 storage account failover, 225–226
SAS, 32
storage access tiers, 53
storage account firewalls, 39–40
storage accounts, 22–23 B
Azure Files backups
backups, 134–135 Azure Backup integration, 65–70
file shares, 96–98 Azure Files, 127–136
identity/access, 121 Azure Managed Disks, 181–192
networking, endpoints, 108–109 best practices
share snapshots, 127 Azure Blob Storage, 75–77
SMB MultiChannel, 117 Azure Data Box, 249
storage account firewalls, 114–115 Azure Data Share, 271
storage accounts, 89 Azure Files, 137–138
Azure Managed Disks Azure Managed Disks, 192
creating, 149–150 Azure Queue Storage, 228–230
managed images, 171–172 Blob Storage. See Azure Blob Storage
performance tiering, 175 blobs, 2
shared disks, 179 append blobs, 4
snapshots, 166–167 archived blobs, rehydrating, 50
Azure Queue Storage block blobs, 4
firewalls, 212–213 change feeds, 60
Last Sync Time, 226 lifecycle management, 54–58
private endpoints, 218–219 page blobs, 4
Azure Queue Storage point-in-time restores, 61
accounts, 195–202 premium block blobs, 3
Azure AD, 221 premium page blobs, 3
best practices, 228–230 snapshots, 70–73
data redundancy, 223–225 soft-deleting, 59
disaster recovery, 225 versioning, 59
encryption, 227 block blobs, 4
client-side encryption, 228 bursting
infrastructure encryption, 227 Azure Managed Disks, 180
service-level encryption, 228 credit-based bursting, 180
features, 194 on-demand bursting, 180

276
disk redundancy, Azure Managed Disks

C cool tier, storage access, 50


costs, data storage in storage accounts, 3
change feeds, Azure Blob Storage, 60 CRC (Cyclic Redundancy Checks), 12
CIFS. See SMB credit-based bursting, 180
CLI (Command-Line Interface)
Azure Backup integration, 69–70
Azure Blob Storage
private endpoints, 48–49
D
storage access tiers, 54 data access authorization, 24–25
storage account firewalls, 40–41 Azure AD, 25–26
storage accounts, 23–24 SAS, 29–33
Azure Files shared key authorization, 26–28
backups, 135–136 Data Box. See Azure Data Box
file shares, 98–99 data consumers, Azure Data Share, 252, 256–257
identity/access, 121–122 data disks, 141
networking, endpoints, 109–110 data integrity, Azure Blob Storage, 12
SMB MultiChannel, 118 data protection
storage account firewalls, 115–116 Azure Blob Storage, 59–65
storage accounts, 89–90 Azure Files, 123–136
Azure Managed Disks data providers, Azure Data Share, 252, 256
creating, 150–151 data redundancy, 5
managed images, 172 Azure Blob Storage
performance tiering, 176 GRS, 8
Private Link integration, 156–158 GZRS, 9
shared disks, 180 LRS, 6
snapshots, 167 RA-GRS, 10–11
Azure Queue Storage RA-GZRS, 10–11
accounts, 202 ZRS, 6–7
firewalls, 213 Azure Files, 122
Last Sync Time, 227 GRS, 123
private endpoints, 219–220 GZRS, 123
queues and messages, 208 LRS, 122
blob snapshots, 73 ZRS, 122–123
data protection, 64–65 Azure Queue Storage, 223–225
Last Sync Time, 75 data resiliency, Azure Data Box, 236–237
network routing, 35 data security, Azure Data Box, 234–235
SAS, 32–33 data stores, Azure Data Share, 254
client-OS, Azure Data Box, 236 data transfers. See Azure Data Box
client-side encryption, Azure Queue Storage, 228 data types, Azure Data Share, 252
configuring data-transfer speeds, Azure Data Box, 235
storage access tiers, 51–54 deleting, blobs/containers, 59
storage accounts deletion fees, storage access tiers, 51
Azure CLI, 23–24 deployment models, Azure Files, 81
Azure portal, 12–24 disaster recovery
Azure PowerShell, 22–23 Azure Blob Storage, 73–75
containers, 1, 4 Azure Queue Storage, 225
names, 4 Last Sync Time, 74–75
soft-deleting, 59 storage account failover, 74
cool file shares, Azure Files, 100–101 disk redundancy, Azure Managed Disks, 176–177

277
early deletion fees, storage access tiers

E GZRS (Geo-Zone Redundant Storage)


Azure Blob Storage, 9
early deletion fees, storage access tiers, 51 Azure Files, 123
encryption Azure Queue Storage, 224
ADE, 158
Azure Blob Storage, 10–11
Azure Files, 111–112, 124
Azure Managed Disks, 158
H
Azure Queue Storage, 227 HDD disks, standard, 142
client-side encryption, 228 hosting websites, Azure Blob Storage, 58
infrastructure encryption, 227 hot file shares, Azure Files, 100
service-level encryption, 228 hot tier, storage access, 49–50
SSE, 158
endpoints
Azure Blob Storage, 42–49
private endpoints, 42–49 I
public endpoints, 42–49 identity/access
Azure Files Azure Data Share, 256–257
private endpoints, 103–110 Azure Files, 118–122
public endpoints, 103 Azure Queue Storage, 220–221
Azure Queue Storage, 213–220 Azure AD, 221
export/import workflow, Azure Data Box, 233–234 SAS, 222–223
storage account access keys, 221
images, managed, Azure Managed Disks, 167–172
F import/export workflow, Azure Data Box, 233–234
infrastructure encryption, Azure Queue Storage, 227
failover, storage accounts, 74 in-place sharing, Azure Data Share, 253
file attributes, Azure Data Box, 237 Internet routing, Azure Files, 110–111
FileREST API, Azure Files, 102
file shares, Azure Files, 90–99
cool file shares, 100–101
file shares, storage tiers, 99–101 L
hot file shares, 100 Last Sync Time
premium file shares, 100 Azure Blob Storage, 74–75
transaction-optimized file shares, 100 Azure Queue Storage, 226–227
firewalls lifecycle management, blobs, 54–58
Azure Queue Storage, 209–213 LRS (Locally Redundant Storage)
storage accounts Azure Blob Storage, 6
Azure Blob Storage, 36 Azure Files, 122
Azure Files, 112–116 Azure Managed Disks, 176
Azure Queue Storage, 223

G
GRS (Geo-Redundant Storage) M
Azure Blob Storage, 8 managing
Azure Files, 123 blobs, lifecycle management, 54–58
Azure Queue Storage, 224 discs. See Azure Managed Disks
images, Azure Managed Disks, 167–172

278
public endpoints

messages, Azure Queue Storage, 202–208


Microsoft routing, Azure Files, 110–111
P
page blobs, 4
partner integrations, Azure Data Box, 237

N performance tiering, Azure Managed Disks, 172–176


point-in-time restores, 61
names PowerShell
containers, 4 Azure Blob Storage
storage accounts, 2 Azure Backup integration, 68–69
networking blob lifecycle management, 57–58
Azure Blob Storage blob snapshots, 72–73
endpoints, 41–49 data protection, 63–64
NFS 3.0 protocol, 35 Last Sync Time, 75
private endpoints, 42–49 network routing, 35
public endpoints, 42 private endpoints, 48
routing, 33–35 SAS, 32
SSH File Transfer protocol, 36 storage access tiers, 53
storage account firewalls, 36 storage account firewalls, 39–40
Azure Files, 100–101 storage accounts, 22–23
encryption in transit, 111–112 Azure Files
endpoints, 103–110 backups, 134–135
FileREST API, 102 file shares, 96–98
NFS, 102 identity/access, 121
routing, 110–111 networking, endpoints, 108–109
SMB, 101–102 share snapshots, 127
storage account firewalls, 112–116 SMB MultiChannel, 117
Azure Queue Storage, 208 storage account firewalls, 114–115
firewalls, 209–213 storage accounts, 89
private endpoints, 213–220 Azure Managed Disks
secure transfers, 220 creating, 149–150
TLS, 220 managed images, 171–172
NFS 3.0 protocol, 35 performance tiering, 175
routing shared disks, 179
Azure CLI, 35 snapshots, 166–167
Azure portal, 34 Azure Queue Storage
Azure PowerShell, 35 firewalls, 212–213
walkthrough, 34–35 Last Sync Time, 226
SSH File Transfer protocol, 36 private endpoints, 218–219
storage account firewalls, 36 premium block blobs, 3
NFS (Network File System) premium file shares, Azure Files, 100
Azure Blob Storage, 35 premium page blobs, 3
Azure Files, 102 premium SSD disks, 142
private endpoints
Azure Blob Storage, 42–49

O Azure Files, 103–110


Azure Queue Storage, 213–220
on-demand bursting, 180 Private Link integration, Azure Managed Disks, 151–158
OS (Operating Systems) public endpoints
Azure Data Box, 236 Azure Blob Storage, 42
disks, 141 Azure Files, 103

279
queues, Azure Queue Storage

Q security
data protection, Azure Blob Storage, 59–65
queues, Azure Queue Storage, 202–208 data security, Azure Data Box, 234–235
encryption
ADE, 158

R
Azure Blob Storage, 10–11
Azure Files, 111–112, 124
RA-GRS (Read Only Geo-Redundant Storage) Azure Managed Disks, 158
Azure Blob Storage, 10–11 SSE, 158
Azure Queue Storage, 224 firewalls, Azure Queue Storage, 209–213
RA-GZRS (Read Only Geo-Zone Redundant Storage) storage account firewalls
Azure Blob Storage, 10–11 Azure Blob Storage, 36
Azure Queue Storage, 224 Azure Files, 112–116
RBAC (Role-Based Access Control), Azure AD, 26 TLS, Azure Queue Storage, 220
receiving data, Azure portal, 265–271 service-level encryption, Azure Queue Storage, 228
redundancy setting up
Azure Blob Storage, 5 storage access tiers, 51–54
GRS, 8 storage accounts
GZRS, 9 Azure CLI, 23–24
LRS, 6 Azure portal, 12–24
RA-GRS, 10–11 Azure PowerShell, 22–23
RA-GZRS, 10–11 share snapshots, Azure Files, 124–127
ZRS, 6–7 shared disks, Azure Managed Disks, 177–180
Azure Files, 122 shared key authorization, 26–27
GRS, 123 sharing data, Azure Data Share, 257–265
GZRS, 123 sharing models, Azure Data Share, 253
LRS, 122 SMB (Server Message Blocks), Azure Files, 101–102
ZRS, 122–123 SMB MultiChannel, Azure Files, 116–118
Azure Managed Disks, 176–177 snapshots
Azure Queue Storage, 223–225 Azure Managed Disks, 158–167
rehydrating archived blobs, 50 blobs, 70–73
reservations, storage, 58 sharing, Azure Data Share, 253, 255
resiliency, Azure Data Box, 236–237 soft-deleting
resource scope, Azure AD, 26 Azure Files, 124
restores, blobs, 61 blobs/containers, 59
routing, network SQL-based sources, Azure Data Share, 255
Azure Blob Storage, 33–35 SSD disks
Azure Files, 110–111 premium SSD disks, 142
standard SSD disks, 142
SSE (Server-Side Encryption), 158
SSH File Transfer protocol, Azure Blob Storage, 36
S standard general purpose v2 storage accounts, 3
standard HDD disks, 142
SAS (Shared Access Signature), 29
standard SSD disks, 142
Azure CLI, 32–33
static website hosting, Azure Blob Storage, 58
Azure portal, 29–32
storage access tiers
Azure PowerShell, 32
Azure Blob Storage, 49–50
Azure Queue Storage, 222–223
configuring, 51–54
walkthrough, 29–33
early deletion fees, 51
secure transfers, Azure Queue Storage, 220
rehydrating archived blobs, 50

280
ZRS (Zone-Redundant Storage)

storage accounts, 1 timestamps, Azure Data Box, 237


access keys, Azure Queue Storage, 221 TLS (Transport Layer Security), Azure Queue Storage,
Azure Files, 82–90 220
Azure Queue Storage, access keys, 221 transaction-optimized file shares, Azure Files, 100
costs, 3 transferring data. See Azure Data Box
failover
Azure Blob Storage, 74
Azure Queue Storage, 225–226
firewalls, 36–41, 112–116 U
names, 1 ultra disks, 142–143
premium page blobs, 3
setting up
Azure CLI, 23–24
Azure portal, 12–21 V
Azure PowerShell, 22–23
versioning, blobs, 59
standard general purpose v2 storage accounts, 3
types of, 3
walkthrough, 12–24
storage data integrity, Azure Blob Storage, 12 W
storage endpoints, 10
website hosting, Azure Blob Storage, 58
storage firewalls, Azure Queue Storage, 209–213
storage reservations, 58
storage services, Azure Data Share, 254
X - Y- Z
ZRS (Zone-Redundant Storage)
T Azure Blob Storage, 6–7
Azure Files, 122–123
temporary disks, 141
Azure Managed Disks, 176
tiers, Azure Blob Storage, 5
Azure Queue Storage, 224

281

You might also like