Skip to main content

Object Replication for Premium Block Blob Storage (Public Preview)


Microsoft has recently announced the Object Replication for Premium Block Blob Storage. This feature is in public review. Let look at why we need this and what are the benefits of having them, Specially how to setup this one





Diagram showing how object replication works




Object replication asynchronously copies block blobs in a container according to rules that you configure. The contents of the blob, any versions associated with the blob, and the blob's metadata and properties are all copied from the source container to the destination container





few things to note





  • Object replication does not support blob snapshots
  • Object replication is supported when the source and destination accounts are in the hot or cool tier.




Before you proceed you need to know following





  1. Replication Policies - Replication policy is an object that holds replication rules in the target region. You need to create the replication policies on the destination side and associate them with the source.
    • Source can replicate to multiple destination (in the same target account) using a single policy
    • Source account can replicate to maximum of two accounts
  2. Replication Rules - Replication Policies - Replication policy is an object that holds replication rules in the target region. You need to create the replication policies on the destination side and associate them with the source.
    • Each replication rule defines a single source and destination container
    • You can specify up to 10 replication rules for each replication policy




How to Guide





Following is my source and destination





Image1: Source and Destination




Browse to the source storage account and create the policy









Once you select the above you will get into the below page which where you need to define the source and destination containers





Note : A container pair consists of a container in the source account and a container in the destination account. Objects in the source container are copied over to the destination container according to the replication rule. You can optionally filter which objects are copied by specifying a prefix match and by copying objects created only after a specified date and time





replication rules




During the process you can specify the copy over status which mean what will be getting copied to the target. if you select custom you can specify a date range









Once you done hit save and apply









Once done you can see the changes in both source and destination storage accounts





Because block blob data is replicated asynchronously, the source account and destination account are not immediately in sync. There's currently no SLA on how long it takes to replicate data to the destination account.









For more details head out to the MS documentation which will have up to date features





https://docs.microsoft.com/en-us/azure/storage/blobs/object-replication-overview?tabs=powershell


Comments

Popular posts from this blog

Updating Azure VM Data Disk Sizes

Summary Hope you are doing great, this time I came up with a simple azure DevOps solution for updating VM disk sizes. The current project that I'm in has a bunch of virtual machines. So, we need a way to update the VM disk with minimal administrative effort and changes.  In this scenario, we have used Bicep as the IAC language Azure DevOps pipelines YAML variable files  Here is the high-level workflow for a particular VM in the solution YAML Pipeline file got two workflows, firstly the VM build pipeline, and the second is the disk update one. If you focus on the green arrow and the purple arrow, basically I'm modifying the same bicep module file and passing the same set of variables. You may wonder why we cannot use the same flow to build the VM and update the disk later, that's because for the disk updates VM needs to be in a shutdown state, and other components in the 1st flow need the VM up and running especially the extension modules YAML Variable Files I have decided t

Deploying an Automation Account with a Runbook and Schedule Using Bicep

Introduction Automation is a key component in many organizations' cloud strategy. Azure Automation allows you to automate the creation, deployment, and management of resources in your Azure environment. In this post, we will walk through the process of deploying an Automation Account with a Runbook and Schedule using Bicep, a new domain-specific language for deploying Azure resources. Intention My intention at the  end is to run a PowerShell  script to start and shutdown Azure VMs based on tag values. PowerShell  script that I have used is from below l ink.  And two  of me   collogue s ( Michael Turnley   and Saudh Mohomad helped to modify the  PowerShell  script. Prerequisites Before we begin, you will need the following: An Azure subscription The Azure CLI installed on your machine. The Azure Bicep extension for the Azure CLI Creating the Automation Account The first step in deploying an Automation Account with a Runbook and Schedule is to create the Aut

Securing Azure Services with Fetian FIDO

Hey Folks  Here again with another security topic with Fetian Fido. And once again Fetian devices proved their excellent quality and stability. For this I choose Fetian K33 -  AllinPass FIDO Security Key – FEITIAN (ftsafe.com) and  K39 -  Single-button FIDO Security Keys | FEITIAN (ftsafe.com) Use case  In an organization following changes needs to be implemented.  1. Update the password policy 2. Update the user session time out to 30 minutes Once these changes being implemented, the following issues need to be addressed 1. Users' complaint new passwords need to be so long 2. Users complain sessions time out makes them work so much slower with the longer passwords 3. Etc... Solution  One of my friends reached out to me to help solve this problem. All I could think of was using passwordless auth with FIDO devices. We have decided to use Fido2 keys for better security and flexibility for the users. The FIDO (Fast IDentity Online) Alliance helps to promote open authentication stand