Service for store files, messages, tables or other data, fileshare.

Main 3 categorys

General purpose storage, Standard (HDD), premium (SSD)

Storage service is accessed via storage account:

Storage account kinds

Microsoft Azure supports 4 different replication services, locally-redundant storage, zone-redundant storage, geo-redundant storage and read-access geo-redundant storage (also known as LRS, ZRS, GRS and RA-GRS respectively.)

General purpose V2, replication options: LRS, GRS, RA-GRS, ZRS, File storage replication options is LRS and ZRS (limited reg)

Replication strategies

Data in storage is always replicated, (durability and availability). replication copies data for protection against plan/unplanned actions like HW fail, network, power faults, natural disaster and so on.

LRS (Locally redundant storage), lowest cost replication, least durability. Disaster in data center, all replicas can be lost/unrecoverable.

ZRS (Zone redundant storage), replicates across 3 cluster storage’s in a region, physically away from each other and is in its own variability zone. If one zone goes down, data can be access in another. Good performance and low latency. Btw: not in all regions, changing ZRS then must move “data” physically, and may not protect data for a regional fault, multiple zone fault.

GRS (Geo redundant storage), replicate data to a second region (far away from primary region). GRS cost > LRS, protect against region fault. At second region, it is replicated with LRS. SLA, 99.9 (16 9’s) %

Two options

GZRS (Geo), ZRS (Zone redundant storage) and GRS (Geo redundant storage) combined. For apps with consistency, durability, performance, availability and be able to read in case of a disaster. SLA, 99.9 (16 9’s) %

Accessing storage

Unique URL for blob, table, queue and file.
-- Where blob can be substituted with table, queue or file

Custom domain can be mapped with CNAME (

(CNAME is a Canonical Name Record or Alias Record, The DNS resolves the system’s domain name to its IP address, but sometimes more than one domain name resolves to the same IP address, and this is where the CNAME is useful.

A machine can have an unlimited number of CNAME aliases, but a separate CNAME record must be in the database for each alias. The major advantage of using CNAME is that if we change the IP address of one A record then any CNAME record pointing to that host will also changed.)

Secure storage endpoints with firewall and virtual networks function to allow connection from specific vnets or subnets, the net’s must be in same region as storage account.

Blob storage

Unstructured data stored as objects, text/binary, msi file, video, document. Common use of this storage is serving images, streaming video/audio, bck/recover, archiving, distributed access, ie install files.

Here we made a blob container in the rg

Since we have made the access private, we get a “Resource not found” when visiting the Url with the image:

Lets make Blob (anonymous read access for blobs only)

Public access level, default it is private to account owner.

Blob access tiers, hot (frequent access, most cost, new storage accounts are default hot (view picture below)), cool (storing large amounts, infrequent access, minimum 30 days, cost effective, but access is expensive), archive(several hours of retrieval latency, minimum 180 days, cheaper the both, but cost much when access)

Lifecycle management

Uploading, Block blobs for storing data, like text or binary (file, image, video), Append like block but good for append (log), Page (max 8 TB), good for read, write vm’s uses this as data and OS disk.

Upload tools, AzCopy (cmd), Data factory (with account key, shared access signature, service principal, managed id), Data box disk (transfer on-prem data if large dataset or network limitations, get disk cope, send and ship), Import/Export service almost like Data box disk, Storage explorer and a .Net library also.

Storage Pricing is important and must be checked before making a storage.

Table (NoSQL)

Here we added a table, but how do we interact with it and the other storage’s?

Use some SDK’s or storage explorer

Download the StorageExplorer.exe and install it, then connect to you account and signin. You will the be presented with a view like this:

Now lets view the table we just create, press the folder icon

And here all the data we have access to is present, for more information on tables, view

Lets add some items and add an extra column for one entity.

Here we added 3 entity’s and for the TAG-2 we added a column Value (others entity’s does not get this column )

For running a query, press query tab, here we did a query with = operator for PLANT-2 and got back just the one we have.


Security to build secure applications, shared access signature, encryption and good practices.


Request for secure resources



When creating SAS you get a URI with parameters/tokens.

Paramters like URI (endpoint), version, service, resource, ip range (accept from this range) and more. SAS applies to blob and file.

So if we have a storage account, a blob storage and a image, and make a SAS at service level :

After pressing the Generate SAS token and URL we can use a browser to view the file


“A shared access signature is a signed URI that points to one or more storage resources and includes a token that contains a special set of query parameters. The token indicates how the resources may be accessed by the client. One of the query parameters, the signature, is constructed from the SAS parameters and signed with the key that was used to create the SAS. This signature is used by Azure Storage to authorize access to the storage resource.”


SAS account level, must select allowed resource types, one must be selected.

Encryption is made for all new/existing accounts by default and no disabled.

Managed keys

Access keys for auth to application on request, can use key vault for storing keys. The storage account and key vault must be in same region.

Security best practice

If SAS stolen, anyone can use it.

Files and File sync

File stores uses SMB

“The Server Message Block (SMB) Protocol is a network file sharing protocol, and as implemented in Microsoft Windows is known as Microsoft SMB Protocol. The set of message packets that defines a particular version of the protocol is called a dialect. The Common Internet File System (CIFS) Protocol is a dialect of SMB. Both SMB and CIFS are also available on VMS, several versions of Unix, and other operating systems.”


Port 445 must be open, TCP 445, SMB.

Snapshots stored the state in time for the files, read copy of data. If you want to remove share, then must remove all snapshots.

File sync, well I need a coffee now, read about it when you need it.

Managing storage