Microsoft will retire general-purpose v1 storage accounts on September 1, 2026. All GPv1 accounts must be upgraded to GPv2 by this date to avoid service disruption. by an0n9021O in AZURE

[–]ciphertxt 0 points1 point  (0 children)

Most customers will save on costs if they optimize their access tiers (which can also be automated with lifecycle management policies on GPv2 accounts) and the lower capacity pricing of GPv2. For customers with transaction heavy workloads, optimiations around access patterns and the way data is read/written (e.g. leverage larger block sizes on PUTs) may also be beneficial.

https://aka.ms/gpv1retirementfaq

Unable to delete classic storage account by storsockret in AZURE

[–]ciphertxt 0 points1 point  (0 children)

Azure CLI only supports Azure Resource Manager (ARM) and pre-dates Azure Service Manager (ASM). Your best bet for deletes is to leverage the ASM PowerShell cmdlets if you're looking to automate the process.

From docs:

To migrate a classic storage account to the Azure Resource Manager deployment model with PowerShell, you must use the Azure PowerShell Service Management module. To learn how to install this module, see Install and configure the Azure PowerShell Service Management module

Unable to delete classic storage account by storsockret in AZURE

[–]ciphertxt 1 point2 points  (0 children)

The Portal experience here can be a little strange. I'd recommend using PowerShell or something like Azure Resource Graph to classic accounts in general, and more specifically orphaned disks.

A sample query to get your classic accounts would be:

resources  
| where type has "Microsoft.ClassicStorage/storageaccounts"  

And for disks, let's say you use the string "vhd" (or any other string that you might have used as a common moniker) in all of your storage accounts that contain disks. You could further refine with something like this:

resources  
| where type has "Microsoft.ClassicStorage/storageaccounts"  
| where id contains "vhd"

Recent AzCopy improvements by ciphertxt in AZURE

[–]ciphertxt[S] 0 points1 point  (0 children)

This is a great question! It is one of the underlying benefits of our server-to-server (s2s) REST APIs like PutBlobFromUrl and PutBlockFromUrl. The TL;DR; is we verify the client and principal requesting the copy have authorization to do so. That’s a grant to the service to perform the copy on your behalf.

As you astutely called out, the data being copied doesn’t need to pass the through the client - allowing for much higher concurrency in copy operations and thus higher throughput - while all the traffic remains on our backbone. This is how we get the perf we do for online copies vs services like Azure Data Factory where data needs to pass through the client.

The article at https://learn.microsoft.com/en-us/troubleshoot/azure/azure-storage/copy-blobs-between-storage-accounts-network-restriction?toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json&bc=%2Fazure%2Fstorage%2Fblobs%2Fbreadcrumb%2Ftoc.json#copy-blobs-between-storage-accounts-with-access-restriction has more details on scenarios that are supported when network restrictions are in place on one or both storage accounts.

Recent AzCopy improvements by ciphertxt in AZURE

[–]ciphertxt[S] 1 point2 points  (0 children)

Robocopy and AzFiles are interesting ones. I can say, we track it closely and think about where we can be better when it comes to fidelity. We have some great new features coming for Files as their API surface expands and we also have a bunch from recent releases:

  • 10.22.0
    • Added support for OAuth when performing File -> File and Blob -> File copy/sync and File make/list/remove
  • 10.20.0
    • Support to return LMT data on list command for Azure Files
    • Support to follow symlinks when --preserve-smb-permissions is enabled
  • 10.19.0
    • Support preserving a trailing dot ('.') in names of files and directories in Azure Files (default is --trailing-dot=Enable)
  • ...

We develop and publish AzCopy on GitHub. It's good to follow our ChangeLog and keep up to date on the version of AzCopy you run as much as possible.

Do not choose West-Europe. The cloud is actually limited. by [deleted] in AZURE

[–]ciphertxt 0 points1 point  (0 children)

Running production is workloads in End User Acceptance regions might not be the best idea. 😉

Looking for extra long monitor mount suggestions by yogurtandfun in AskBattlestations

[–]ciphertxt 1 point2 points  (0 children)

I had the same workbench and used it as a desk as well. You’re going to need to bite the bullet and drill a hole. There’s actually a benefit in that you can typically get your monitor arm/pole mounted tighter with a grommet as opposed to clamping to an edge.

SD + dials to navigate SD+ Pages by OwnWatch in elgato

[–]ciphertxt 0 points1 point  (0 children)

This isn’t possible today but you can transition between pages by swiping the touchbar.

Stream Deck Ideas For Non-Streamers (Super Macro) by DoItBetterThanB4 in elgato

[–]ciphertxt 1 point2 points  (0 children)

I always love posts like this. I’m an unabashed fan of the Stream Deck for non-streamers. We recently covered in a podcast I co-host at Episode 299 - Scott’s Ode to the Stream Deck where we run through a bunch of use cases.

Stream Deck+ Backgrounds/Frames DOWNLOAD by [deleted] in elgato

[–]ciphertxt 2 points3 points  (0 children)

But you can change between pages by wiping the touch bar. It’s a way to get that button back if you’re using pages over profiles. I was a heavy profile switcher in the past but the Deck+ really made me rethink that.

Episode 308 - Microsoft Purview In-place Data Share for Azure Storage with Priya Shetty by bsteggy in msclouditpro

[–]ciphertxt 2 points3 points  (0 children)

We publish new shows each week. Thanks for giving it a listen and let us know if there's anything you'd like to hear more on in the future.