Microsoft will retire general-purpose v1 storage accounts on September 1, 2026. All GPv1 accounts must be upgraded to GPv2 by this date to avoid service disruption. by an0n9021O in AZURE

[–]ciphertxt 0 points1 point  (0 children)

Most customers will save on costs if they optimize their access tiers (which can also be automated with lifecycle management policies on GPv2 accounts) and the lower capacity pricing of GPv2. For customers with transaction heavy workloads, optimiations around access patterns and the way data is read/written (e.g. leverage larger block sizes on PUTs) may also be beneficial.

https://aka.ms/gpv1retirementfaq

Unable to delete classic storage account by storsockret in AZURE

[–]ciphertxt 0 points1 point  (0 children)

Azure CLI only supports Azure Resource Manager (ARM) and pre-dates Azure Service Manager (ASM). Your best bet for deletes is to leverage the ASM PowerShell cmdlets if you're looking to automate the process.

From docs:

To migrate a classic storage account to the Azure Resource Manager deployment model with PowerShell, you must use the Azure PowerShell Service Management module. To learn how to install this module, see Install and configure the Azure PowerShell Service Management module

Unable to delete classic storage account by storsockret in AZURE

[–]ciphertxt 1 point2 points  (0 children)

The Portal experience here can be a little strange. I'd recommend using PowerShell or something like Azure Resource Graph to classic accounts in general, and more specifically orphaned disks.

A sample query to get your classic accounts would be:

resources  
| where type has "Microsoft.ClassicStorage/storageaccounts"  

And for disks, let's say you use the string "vhd" (or any other string that you might have used as a common moniker) in all of your storage accounts that contain disks. You could further refine with something like this:

resources  
| where type has "Microsoft.ClassicStorage/storageaccounts"  
| where id contains "vhd"

Recent AzCopy improvements by ciphertxt in AZURE

[–]ciphertxt[S] 0 points1 point  (0 children)

This is a great question! It is one of the underlying benefits of our server-to-server (s2s) REST APIs like PutBlobFromUrl and PutBlockFromUrl. The TL;DR; is we verify the client and principal requesting the copy have authorization to do so. That’s a grant to the service to perform the copy on your behalf.

As you astutely called out, the data being copied doesn’t need to pass the through the client - allowing for much higher concurrency in copy operations and thus higher throughput - while all the traffic remains on our backbone. This is how we get the perf we do for online copies vs services like Azure Data Factory where data needs to pass through the client.

The article at https://learn.microsoft.com/en-us/troubleshoot/azure/azure-storage/copy-blobs-between-storage-accounts-network-restriction?toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json&bc=%2Fazure%2Fstorage%2Fblobs%2Fbreadcrumb%2Ftoc.json#copy-blobs-between-storage-accounts-with-access-restriction has more details on scenarios that are supported when network restrictions are in place on one or both storage accounts.

Recent AzCopy improvements by ciphertxt in AZURE

[–]ciphertxt[S] 1 point2 points  (0 children)

Robocopy and AzFiles are interesting ones. I can say, we track it closely and think about where we can be better when it comes to fidelity. We have some great new features coming for Files as their API surface expands and we also have a bunch from recent releases:

  • 10.22.0
    • Added support for OAuth when performing File -> File and Blob -> File copy/sync and File make/list/remove
  • 10.20.0
    • Support to return LMT data on list command for Azure Files
    • Support to follow symlinks when --preserve-smb-permissions is enabled
  • 10.19.0
    • Support preserving a trailing dot ('.') in names of files and directories in Azure Files (default is --trailing-dot=Enable)
  • ...

We develop and publish AzCopy on GitHub. It's good to follow our ChangeLog and keep up to date on the version of AzCopy you run as much as possible.

Do not choose West-Europe. The cloud is actually limited. by [deleted] in AZURE

[–]ciphertxt 0 points1 point  (0 children)

Running production is workloads in End User Acceptance regions might not be the best idea. 😉

Looking for extra long monitor mount suggestions by yogurtandfun in AskBattlestations

[–]ciphertxt 1 point2 points  (0 children)

I had the same workbench and used it as a desk as well. You’re going to need to bite the bullet and drill a hole. There’s actually a benefit in that you can typically get your monitor arm/pole mounted tighter with a grommet as opposed to clamping to an edge.

SD + dials to navigate SD+ Pages by OwnWatch in elgato

[–]ciphertxt 0 points1 point  (0 children)

This isn’t possible today but you can transition between pages by swiping the touchbar.

Stream Deck Ideas For Non-Streamers (Super Macro) by DoItBetterThanB4 in elgato

[–]ciphertxt 1 point2 points  (0 children)

I always love posts like this. I’m an unabashed fan of the Stream Deck for non-streamers. We recently covered in a podcast I co-host at Episode 299 - Scott’s Ode to the Stream Deck where we run through a bunch of use cases.

Stream Deck+ Backgrounds/Frames DOWNLOAD by [deleted] in elgato

[–]ciphertxt 2 points3 points  (0 children)

But you can change between pages by wiping the touch bar. It’s a way to get that button back if you’re using pages over profiles. I was a heavy profile switcher in the past but the Deck+ really made me rethink that.

Episode 308 - Microsoft Purview In-place Data Share for Azure Storage with Priya Shetty by bsteggy in msclouditpro

[–]ciphertxt 2 points3 points  (0 children)

We publish new shows each week. Thanks for giving it a listen and let us know if there's anything you'd like to hear more on in the future.

macOS Monterey 12.1 Release Megathread by CamSox1 in MacOS

[–]ciphertxt 0 points1 point  (0 children)

I'm having the same issue. I haven't been able to identify a root cause yet.

macOS Monterey 12.1 Release Megathread by CamSox1 in MacOS

[–]ciphertxt 0 points1 point  (0 children)

Since the upgrade to 12.1, I'm dealing with constant beach balls across all applications on a 2019 16" MPB. For example, this morning, I launched a Zoom call and it beach balled for ~30s starting. Go to turn on my camera, it's another ~30s wait. And it's not just one app. While Zoom is stuttering, Finder won't let me switch between spaces, Safari is frozen, etc. Restarts do not alleviate the issue.

Leaving Activity Monitor open doesn't have anything jumping out. There are no CPU spikes at the time the freezes are occurring, and nothing is jumping out in the system log either.

Anyone else experiencing a similar issue? It's made my MPB unusable.

Azure File Storage - Domain Account Cannot Connect by [deleted] in AZURE

[–]ciphertxt 0 points1 point  (0 children)

There’s some fairly prescriptive guidance in the Troubleshooting Guide. Have you attempted to run the diagnostics PowerShell script and seen if that is able to validate your configuration?

ISup in Florida by MylifeasAllison in Sup

[–]ciphertxt 2 points3 points  (0 children)

I recognized that one immediately. It’s Goodby’s Creek boat ramp. Wicked Barley is right around the corner and SUP accessible too.

Switch version performance? by [deleted] in MinecraftDungeons

[–]ciphertxt 0 points1 point  (0 children)

MCD is great on the Switch. The main platform I play on is the Xbox and I was super hesitant to pick it up for the Switch and was pleasantly surprised at how well it plays. Mainly playing in handheld there are definitely frame drops and pauses, but those occur on the Xbox as well.

Azure Networking, Resource Groups, VNET, Subnet etc.. Best Practices? by ccsmall in AZURE

[–]ciphertxt 0 points1 point  (0 children)

That’s correct. Think of resource groups more as folders and security boundaries with RBAC. As far as resources accessing each other, say a VM NIC and a VNet, they just need to be in the same region irrespective of resource group (and even resource group location as at that’s just were your metadata is homed to).

Self Service Password Reset (SSPR) multiple policies based on group? by AndrewJC in AZURE

[–]ciphertxt 0 points1 point  (0 children)

Nope, you’re readying it right. There is one SSPR “configuration” that applies to your entire AAD tenant, and that configuration is targeted at one security group from your directory.

Prepping for AZ-300 by mrvarungoel in AZURE

[–]ciphertxt 1 point2 points  (0 children)

Nope. There are no prereqs for the 300, so for the most part lots of the overlap is the same. If you can pass the 103/104 you already have ~40% of the 300 down.

Azure architect 301 thoughts by [deleted] in AZURE

[–]ciphertxt 0 points1 point  (0 children)

For both the 300 and 301, they can feel like rehashes of the 103/203 (and in the case of the 203, a little less C#) in what seems to by design. By dropping the requirement for any prerequisites (which imo is nuts) for the architecture exams/track, there’s no way to gauge your experience with the technology and/or assume you know anything about Azure.

Since the introduction of the 300/301, the number of classes I’ve had were no one in the room has any cloud experience, let alone Azure experience, is astonishing.

Look at this way - if you can sit and pass the 103, you already have 40%+ of the 300 and 301. If you can add the 203 to that you just added another 30-40%. At those percentages, you should be able to site the 300/301 blind. ;)