Microsoft Docs

Your source for Microsoft product documentation

Managing Azure Storage

This section provides comprehensive documentation and guidance on managing your Azure Storage resources, including best practices, common tasks, and advanced configurations.

Key Management Areas

Common Management Tasks

The following articles detail step-by-step instructions for performing essential management operations:

Creating and Configuring Storage Accounts

To create a new Azure Storage account, you can use the Azure portal, Azure CLI, Azure PowerShell, or REST API.

Managing Access Keys

Access keys provide full administrative access to your storage account. It's recommended to regenerate keys periodically for security.

# Example using Azure CLI to list keys
az storage account keys list --account-name mystorageaccount --resource-group myresourcegroup

Configuring Blob Storage Lifecycle Management

Lifecycle management policies allow you to automatically transition blobs between tiers or delete them based on rules.

# Example of a lifecycle policy configuration (JSON)
{
    "rules": [
        {
            "name": "move_to_cool",
            "enabled": true,
            "type": "Lifecycle",
            "definition": {
                "actions": {
                    "version": {
                        "tierArchiveAfterDays": 365,
                        "tierCoolAfterDays": 90
                    },
                    "baseBlob": {
                        "tierArchiveAfterDays": 365,
                        "tierCoolAfterDays": 90
                    }
                },
                "filters": {
                    "prefix": "logs/"
                }
            }
        }
    ]
}
Security Best Practice: Avoid hardcoding storage account keys in your application code. Use Azure Key Vault or Managed Identities for secure access.

Monitoring Storage Performance

Azure Monitor provides metrics for storage operations, latency, availability, and transaction counts.

Tip: Regularly review your storage account access logs to detect suspicious activity.

Resources