You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-service/container-service-kubernetes-walkthrough.md
-8
Original file line number
Diff line number
Diff line change
@@ -183,11 +183,3 @@ To use pscp from [putty](http://www.chiark.greenend.org.uk/~sgtatham/putty/downl
183
183
1.[Kubernetes Bootcamp](https://katacoda.com/embed/kubernetes-bootcamp/1/) - shows you how to deploy, scale, update, and debug containerized applications.
184
184
2.[Kubernetes Userguide](http://kubernetes.io/docs/user-guide/) - provides information on running programs in an existing Kubernetes cluster.
185
185
3.[Kubernetes Examples](https://github.com/kubernetes/kubernetes/tree/master/examples) - provides a number of examples on how to run real applications with Kubernetes.
186
-
187
-
## Kubernetes Production Users
188
-
Here are a sampling of production Kubernetes users from recent talks at the Kubernetes Conference (KubeCon)
The value of StartDateTime is the start time for the error/problem slice you noted from the previous step. The date-time should be enclosed in double quotes.
239
239
4. You should see the output with details about the error (similar to the following):
240
240
241
241
Id : 841b77c9-d56c-48d1-99a3-8c16c3e77d39
242
242
ResourceGroupName : ADF
243
243
DataFactoryName : LogProcessingFactory3
244
-
TableName : EnrichedGameEventsTable
244
+
DatasetName : EnrichedGameEventsTable
245
245
ProcessingStartTime : 10/10/2014 3:04:52 AM
246
246
ProcessingEndTime : 10/10/2014 3:06:49 AM
247
247
PercentComplete : 0
@@ -279,7 +279,7 @@ The following example sets the status of all slices for the table 'DAWikiAggrega
279
279
280
280
The UpdateType is set to UpstreamInPipeline, which means that statuses of each slice for the table and all the dependent (upstream) tables are set to "Waiting." Other possible value for this parameter is "Individual."
Copy file name to clipboardExpand all lines: articles/iot-suite/iot-suite-what-are-preconfigured-solutions.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -86,7 +86,7 @@ In this preconfigured solution, the ASA jobs form part of to the **IoT solution
86
86
## Event processor
87
87
In this preconfigured solution, the event processor forms part of the **IoT solution back end** in a typical [IoT solution architecture][lnk-what-is-azure-iot].
88
88
89
-
The **DeviceInfo** and **Rules** ASA jobs send their output to Event hubs for delivery to other back-end services. The solution uses an [EventPocessorHost][lnk-event-processor] instance, running in a [WebJob][lnk-web-job], to read the messages from these Event hubs. The **EventProcessorHost** uses the **DeviceInfo** data to update the device data in the DocumentDB database, and uses the **Rules** data to invoke the Logic app and update the alerts display in the solution portal.
89
+
The **DeviceInfo** and **Rules** ASA jobs send their output to Event hubs for delivery to other back-end services. The solution uses an [EventProcessorHost][lnk-event-processor] instance, running in a [WebJob][lnk-web-job], to read the messages from these Event hubs. The **EventProcessorHost** uses the **DeviceInfo** data to update the device data in the DocumentDB database, and uses the **Rules** data to invoke the Logic app and update the alerts display in the solution portal.
90
90
91
91
## Device identity registry and DocumentDB
92
92
Every IoT hub includes a [device identity registry][lnk-identity-registry] that stores device keys. IoT Hub uses this information authenticate devices - a device must be registered and have a valid key before it can connect to the hub.
* Set permissions to Azure AD app to write secrets to KeyVault: `azure keyvault set-policy --vault-name <keyVaultName> --spn <aadClientID> --perms-to-keys [\"all\"] --perms-to-secrets [\"all\"]`
* Set permissions to Azure AD app to write secrets to KeyVault: “azure keyvault set-policy --vault-name <keyVaultName> --spn <aadClientID> --perms-to-keys [\"all\"] --perms-to-secrets [\"all\"]”
452
-
2. To enable encryption on an existing/running VM, type:
* Set permissions to Azure AD app to write secrets to KeyVault: `azure keyvault set-policy --vault-name <keyVaultName> --spn <aadClientID> --perms-to-keys '["wrapKey"]' --perms-to-secrets '["set"]'`
455
+
2. To enable encryption on an existing/running VM: `azure vm enable-disk-encryption --resource-group <resourceGroupName> --name <vmName> --aad-client-id <aadClientId> --aad-client-secret <aadClientSecret> --disk-encryption-key-vault-url <keyVaultURL> --disk-encryption-key-vault-id <keyVaultResourceId> --volume-type [All|OS|Data]`
456
+
3. Get encryption status: `azure vm show-disk-encryption-status --resource-group <resourceGroupName> --name <vmName> --json`
455
457
4. To enable encryption on a new VM from customer encrypted VHD, use the below parameters with “azure vm create” command:
@@ -480,11 +482,14 @@ The Resource Manager template parameters details for existing/running VM scenari
480
482
Disk encryption can be enabled on customer encrypted VHD using the CLI command installed from [here](../xplat-cli-install.md). Follow the steps below to enable encryption on existing/running IaaS Linux VM in Azure using CLI commands:
* Set permissions to Azure AD app to write secrets to KeyVault: “azure keyvault set-policy --vault-name <keyVaultName> --spn <aadClientID> --perms-to-keys [\"all\"] --perms-to-secrets [\"all\"]”
485
-
2. To enable encryption on an existing/running VM, type:
Copy file name to clipboardExpand all lines: articles/virtual-machines/virtual-machines-windows-reset-local-password-without-agent.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -122,7 +122,7 @@ Always try to reset a password using the [Azure portal or Azure PowerShell](virt
122
122

123
123
9. Create a VM from the source VM’s OS disk:
124
124
125
-
* Use [this Azure Resource Manager template](https://github.com/Azure/azure-quickstart-templates/tree/master/201-vm-from-specialized-vhd) to create a VM from a specialized VHD. Click the `Deploy to Azure` button to open the Azure portal with the templated details populated for you.
125
+
* Use [this Azure Resource Manager template](https://github.com/Azure/azure-quickstart-templates/tree/master/201-vm-specialized-vhd) to create a VM from a specialized VHD. Click the `Deploy to Azure` button to open the Azure portal with the templated details populated for you.
126
126
* If you want to retain all the previous settings for the VM, select *Edit template* to provide your existing VNet, subnet, network adapter, or public IP.
127
127
* In the `OSDISKVHDURI` parameter text box, paste the URI of your source VHD obtain in the preceding step:
0 commit comments