@@ -59,28 +59,28 @@ The **New-AzStorageAccount** cmdlet creates an Azure Storage account.
59
59
60
60
### Example 1: Create a Storage account
61
61
``` powershell
62
- PS C:\>New-AzStorageAccount -ResourceGroupName MyResourceGroup -AccountName mystorageaccount -Location westus -SkuName Standard_GRS
62
+ PS C:\>New-AzStorageAccount -ResourceGroupName MyResourceGroup -Name mystorageaccount -Location westus -SkuName Standard_GRS
63
63
```
64
64
65
65
This command creates a Storage account for the resource group name MyResourceGroup.
66
66
67
67
### Example 2: Create a Blob Storage account with BlobStorage Kind and hot AccessTier
68
68
``` powershell
69
- PS C:\>New-AzStorageAccount -ResourceGroupName MyResourceGroup -AccountName mystorageaccount -Location westus -SkuName Standard_GRS -Kind BlobStorage -AccessTier Hot
69
+ PS C:\>New-AzStorageAccount -ResourceGroupName MyResourceGroup -Name mystorageaccount -Location westus -SkuName Standard_GRS -Kind BlobStorage -AccessTier Hot
70
70
```
71
71
72
72
This command creates a Blob Storage account that with BlobStorage Kind and hot AccessTier
73
73
74
74
### Example 3: Create a Storage account with Kind StorageV2, and Generate and Assign an Identity for Azure KeyVault.
75
75
``` powershell
76
- PS C:\>New-AzStorageAccount -ResourceGroupName MyResourceGroup -AccountName mystorageaccount -Location westus -SkuName Standard_GRS -Kind StorageV2 -AssignIdentity
76
+ PS C:\>New-AzStorageAccount -ResourceGroupName MyResourceGroup -Name mystorageaccount -Location westus -SkuName Standard_GRS -Kind StorageV2 -AssignIdentity
77
77
```
78
78
79
79
This command creates a Storage account with Kind StorageV2. It also generates and assigns an identity that can be used to manage account keys through Azure KeyVault.
80
80
81
81
### Example 4: Create a Storage account with NetworkRuleSet from JSON
82
82
``` powershell
83
- PS C:\>New-AzStorageAccount -ResourceGroupName MyResourceGroup -AccountName mystorageaccount -Location westus -Type Standard_LRS -NetworkRuleSet (@{bypass="Logging,Metrics";
83
+ PS C:\>New-AzStorageAccount -ResourceGroupName MyResourceGroup -Name mystorageaccount -Location westus -Type Standard_LRS -NetworkRuleSet (@{bypass="Logging,Metrics";
84
84
ipRules=(@{IPAddressOrRange="20.11.0.0/16";Action="allow"},
85
85
@{IPAddressOrRange="10.0.0.0/7";Action="allow"});
86
86
virtualNetworkRules=(@{VirtualNetworkResourceId="/subscriptions/s1/resourceGroups/g1/providers/Microsoft.Network/virtualNetworks/vnet1/subnets/subnet1";Action="allow"},
@@ -92,21 +92,21 @@ This command creates a Storage account that has NetworkRuleSet property from JSO
92
92
93
93
### Example 5: Create a Storage account with Hierarchical Namespace enabled.
94
94
``` powershell
95
- PS C:\>New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -AccountName "mystorageaccount" -Location "US West" -SkuName "Standard_GRS" -Kind StorageV2 -EnableHierarchicalNamespace $true
95
+ PS C:\>New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Location "US West" -SkuName "Standard_GRS" -Kind StorageV2 -EnableHierarchicalNamespace $true
96
96
```
97
97
98
98
This command creates a Storage account with Hierarchical Namespace enabled.
99
99
100
100
### Example 6: Create a Storage account with Azure Files AAD DS Authentication, and enable large file share.
101
101
``` powershell
102
- PS C:\>New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -AccountName "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -Kind StorageV2 -EnableAzureActiveDirectoryDomainServicesForFile $true -EnableLargeFileShare
102
+ PS C:\>New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -Kind StorageV2 -EnableAzureActiveDirectoryDomainServicesForFile $true -EnableLargeFileShare
103
103
```
104
104
105
105
This command creates a Storage account with Azure Files AAD DS Authentication, and enable large file share.
106
106
107
107
### Example 7: Create a Storage account with enable Files Active Directory Domain Service Authentication and DefaultSharePermission.
108
108
```
109
- PS C:\>New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -AccountName "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -Kind StorageV2 -EnableActiveDirectoryDomainServicesForFile $true `
109
+ PS C:\>New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -Kind StorageV2 -EnableActiveDirectoryDomainServicesForFile $true `
110
110
-ActiveDirectoryDomainName "mydomain.com" `
111
111
-ActiveDirectoryNetBiosDomainName "mydomain.com" `
112
112
-ActiveDirectoryForestName "mydomain.com" `
@@ -122,9 +122,9 @@ This command creates a Storage account withenable Files Active Directory Domain
122
122
123
123
### Example 8: Create a Storage account with Queue and Table Service use account-scoped encryption key, and Require Infrastructure Encryption.
124
124
``` powershell
125
- PS C:\>New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -AccountName "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -Kind StorageV2 -EncryptionKeyTypeForTable Account -EncryptionKeyTypeForQueue Account -RequireInfrastructureEncryption
125
+ PS C:\>New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -Kind StorageV2 -EncryptionKeyTypeForTable Account -EncryptionKeyTypeForQueue Account -RequireInfrastructureEncryption
126
126
127
- PS C:\>$account = get -AzStorageAccount -ResourceGroupName $rgname -StorageAccountName $accountName
127
+ PS C:\>$account = Get -AzStorageAccount -ResourceGroupName $rgname -Name $accountName
128
128
129
129
PS C:\>$account.Encryption.Services.Queue
130
130
@@ -147,7 +147,7 @@ Then get the Storage account properties, and view the encryption keytype of Queu
147
147
148
148
### Example 9: Create account MinimumTlsVersion and AllowBlobPublicAccess, and disable SharedKey Access
149
149
```
150
- PS C:\> $account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -AccountName "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -Kind StorageV2 -MinimumTlsVersion TLS1_1 -AllowBlobPublicAccess $false -AllowSharedKeyAccess $false
150
+ PS C:\> $account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -Kind StorageV2 -MinimumTlsVersion TLS1_1 -AllowBlobPublicAccess $false -AllowSharedKeyAccess $false
151
151
152
152
PS C:\> $account.MinimumTlsVersion
153
153
TLS1_1
@@ -163,7 +163,7 @@ The command create account with MinimumTlsVersion, AllowBlobPublicAccess, and di
163
163
164
164
### Example 10: Create a Storage account with RoutingPreference setting
165
165
``` powershell
166
- PS C:\>$account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -AccountName "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -PublishMicrosoftEndpoint $true -PublishInternetEndpoint $true -RoutingChoice MicrosoftRouting
166
+ PS C:\>$account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -Location "eastus2euap" -SkuName "Standard_LRS" -PublishMicrosoftEndpoint $true -PublishInternetEndpoint $true -RoutingChoice MicrosoftRouting
167
167
168
168
PS C:\>$account.RoutingPreference
169
169
@@ -189,7 +189,7 @@ This command creates a Storage account with RoutingPreference setting: PublishMi
189
189
190
190
### Example 11: Create a Storage account with EdgeZone and AllowCrossTenantReplication
191
191
``` powershell
192
- PS C:\>$account = New-AzStorageAccount -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -SkuName Premium_LRS -Location westus -EdgeZone "microsoftlosangeles1" -AllowCrossTenantReplication $false
192
+ PS C:\>$account = New-AzStorageAccount -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -SkuName Premium_LRS -Location westus -EdgeZone "microsoftlosangeles1" -AllowCrossTenantReplication $false
193
193
194
194
PS C:\>$account.ExtendedLocation
195
195
@@ -205,7 +205,7 @@ This command creates a Storage account with EdgeZone as "microsoftlosangeles1" a
205
205
206
206
### Example 12: Create a Storage account with KeyExpirationPeriod and SasExpirationPeriod
207
207
``` powershell
208
- PS C:\> $account = New-AzStorageAccount -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -SkuName Premium_LRS -Location eastus -KeyExpirationPeriodInDay 5 -SasExpirationPeriod "1.12:05:06"
208
+ PS C:\> $account = New-AzStorageAccount -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -SkuName Premium_LRS -Location eastus -KeyExpirationPeriodInDay 5 -SasExpirationPeriod "1.12:05:06"
209
209
210
210
PS C:\> $$account.KeyPolicy.KeyExpirationPeriodInDays
211
211
5
@@ -251,7 +251,7 @@ This command first create a keyvault and a user assigned identity, then create a
251
251
252
252
### Example 13: Create account with EnableNfsV3
253
253
```
254
- PS C:\> $account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -AccountName "mystorageaccount" -SkuName Standard_LRS -Location centraluseuap -Kind StorageV2 -EnableNfsV3 $true -EnableHierarchicalNamespace $true -EnableHttpsTrafficOnly $false -NetworkRuleSet (@{bypass="Logging,Metrics";
254
+ PS C:\> $account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -SkuName Standard_LRS -Location centraluseuap -Kind StorageV2 -EnableNfsV3 $true -EnableHierarchicalNamespace $true -EnableHttpsTrafficOnly $false -NetworkRuleSet (@{bypass="Logging,Metrics";
255
255
virtualNetworkRules=(@{VirtualNetworkResourceId="$vnet1";Action="allow"});
256
256
defaultAction="deny"})
257
257
PS C:\> $account.EnableNfsV3
@@ -262,7 +262,7 @@ The command create account with EnableNfsV3 as true, and then show the EnableNfs
262
262
263
263
### Example 14: Create account with disable PublicNetworkAccess
264
264
```
265
- PS C:\> $account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -AccountName "mystorageaccount" -SkuName Standard_LRS -Location centraluseuap -Kind StorageV2 -PublicNetworkAccess Disabled
265
+ PS C:\> $account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -SkuName Standard_LRS -Location centraluseuap -Kind StorageV2 -PublicNetworkAccess Disabled
266
266
267
267
PS C:\> $account.PublicNetworkAccess
268
268
Disabled
@@ -272,7 +272,7 @@ The command creates account with disable PublicNetworkAccess of the account.
272
272
273
273
### Example 15: Create account with account level mmutability policy
274
274
```
275
- PS C:\> $account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -AccountName "mystorageaccount" -SkuName Standard_LRS -Location centraluseuap -Kind StorageV2 -EnableAccountLevelImmutability -ImmutabilityPeriod 1 -ImmutabilityPolicyState Unlocked
275
+ PS C:\> $account = New-AzStorageAccount -ResourceGroupName "MyResourceGroup" -Name "mystorageaccount" -SkuName Standard_LRS -Location centraluseuap -Kind StorageV2 -EnableAccountLevelImmutability -ImmutabilityPeriod 1 -ImmutabilityPolicyState Unlocked
276
276
277
277
PS C:\> $account.ImmutableStorageWithVersioning.Enabled
278
278
True
0 commit comments