From 129849fe8ac50b416a7426899559f7ec6056b2d9 Mon Sep 17 00:00:00 2001 From: lkatepaga <107553714+lkatepaga@users.noreply.github.com> Date: Wed, 31 Jul 2024 12:28:41 +0530 Subject: [PATCH 1/2] Create AccessPolicyExpiryDatesFromAllContainersAlongWithNextMarkerSchemeImplementation.ps1 This script helps in listing the Access Policies and its expiry dates, present in all the containers in a storage account along with the next marker scheme implementation in it --- ...longWithNextMarkerSchemeImplementation.ps1 | 42 +++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 AccessPolicyExpiryDatesFromAllContainersAlongWithNextMarkerSchemeImplementation.ps1 diff --git a/AccessPolicyExpiryDatesFromAllContainersAlongWithNextMarkerSchemeImplementation.ps1 b/AccessPolicyExpiryDatesFromAllContainersAlongWithNextMarkerSchemeImplementation.ps1 new file mode 100644 index 0000000..984bdc4 --- /dev/null +++ b/AccessPolicyExpiryDatesFromAllContainersAlongWithNextMarkerSchemeImplementation.ps1 @@ -0,0 +1,42 @@ +###ATTENTION: DISCLAIMER### + +#DISCLAIMER +#The sample scripts are not supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and documentation remains with you. In no event shall Microsoft, its authors, owners of this repository or anyone else involved in the creation, production, or delivery of the scripts be liable for any damages whatsoever (including, +#without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if Microsoft has been advised of the possibility of such damages + + +############# Script Overview ################################################################# +########## This script helps in listing the Access Policies and its expiry dates, present in all the containers in a storage account #### +########## along with the next marker scheme implementation in it. ######################### + + +# Replace with your storage account name +$storageAccountName = "" + +# Get the storage account context +$ctx = New-AzStorageContext -StorageAccountName $storageAccountName -UseConnectedAccount + +# Initialize the marker +$marker = $null + +# Loop through containers using the marker until all are processed +do { + # List containers using the marker + $containersResult = Get-AzStorageContainer -Context $ctx -MaxCount 100 -ContinuationToken $marker + $containers = $containersResult.CloudBlobContainer + + # Loop through each container + foreach ($container in $containers) { + # Get the stored access policies for the container + $policies = Get-AzStorageContainerStoredAccessPolicy -Container $container.Name -Context $ctx + + # Output the details of the policy + foreach ($policy in $policies) { + Write-Output "Container: $($container.Name), Policy Name: $($policy.Name), Permissions: $($policy.Permission), Start Time: $($policy.StartTime), Expiry Time: $($policy.ExpiryTime)" + } + } + + # Update the marker + $marker = $containersResult.NextMarker +} while ($marker -ne $null) + #End of Script# From 4cbb8569a04addcf57ccff7f7e2dbb9dd30ae050 Mon Sep 17 00:00:00 2001 From: lkatepaga <107553714+lkatepaga@users.noreply.github.com> Date: Sun, 28 Dec 2025 16:02:01 +0530 Subject: [PATCH 2/2] Create DeleteFilesWithASpecificExtensionFromAGivenSubfolderInADLS.ps1 --- ...ificExtensionFromAGivenSubfolderInADLS.ps1 | 32 +++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 Storage/Powershell/DeleteFilesWithASpecificExtensionFromAGivenSubfolderInADLS.ps1 diff --git a/Storage/Powershell/DeleteFilesWithASpecificExtensionFromAGivenSubfolderInADLS.ps1 b/Storage/Powershell/DeleteFilesWithASpecificExtensionFromAGivenSubfolderInADLS.ps1 new file mode 100644 index 0000000..6dd2b03 --- /dev/null +++ b/Storage/Powershell/DeleteFilesWithASpecificExtensionFromAGivenSubfolderInADLS.ps1 @@ -0,0 +1,32 @@ +###ATTENTION: DISCLAIMER### + +#DISCLAIMER +#The sample scripts are not supported under any Microsoft standard support program or service. The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the use or performance of the sample scripts and documentation remains with you. In no event shall Microsoft, its authors, owners of this repository or anyone else involved in the creation, production, or delivery of the scripts be liable for any damages whatsoever (including, +#without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to use the sample scripts or documentation, even if Microsoft has been advised of the possibility of such damages + + +############# Script Overview ################################################################# +##########The below PowerShell script helps delete files with a specific extension from a given subfolder path +######in an Azure Data Lake Storage Gen2 container (hierarchical namespace enabled). +######It recursively scans the specified directory and removes matching files while skipping folders.###### + +# Input Parameters +$storageAccountName = "" +$storageAccountKey = "" +$containerName = "" # Also called the file system name +$subfolderPath = "" # Example: "logs/2025/may" +$fileExtension = ".txt" # Extension of files to delete + +# Authenticate with storage account +$context = New-AzStorageContext -StorageAccountName $storageAccountName -StorageAccountKey $storageAccountKey + +# Get list of items in the specified subfolder path +$items = Get-AzDataLakeGen2ChildItem -Context $context -FileSystem $containerName -Path $subfolderPath -Recurse + +foreach ($item in $items) { + if (-not $item.IsDirectory -and $item.Name.EndsWith($fileExtension)) { + $blobPath = $item.Path + Remove-AzDataLakeGen2Item -Context $context -FileSystem $containerName -Path $blobPath -Force + Write-Output "Deleted: $blobPath" + } +}