Skip to content

Commit 0a92001

Browse files
author
Sreekanth Iyer (Ushta Te Consultancy Services)
committed
Improved Correctness Score
1 parent f33a400 commit 0a92001

11 files changed

+57
-57
lines changed

articles/hdinsight/azure-cli-samples.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,9 @@ This article provides sample scripts for common tasks. For each example, update
2222

2323
* Optional: Bash. The examples in this article use the Bash shell on Windows 10. See [Windows Subsystem for Linux Installation Guide for Windows 10](/windows/wsl/install-win10) for installation steps. The examples work from a Windows Command prompt with some slight modifications.
2424

25-
## az login
25+
## `az login`
2626

27-
[Log in to Azure](/cli/azure/reference-index#az-login).
27+
[Sign in to Azure](/cli/azure/reference-index#az-login).
2828

2929
```azurecli
3030
az login
@@ -33,7 +33,7 @@ az login
3333
# az account set --subscription "SUBSCRIPTIONID"
3434
```
3535

36-
## az hdinsight create
36+
## `az hdinsight create`
3737

3838
[Creates a new cluster](/cli/azure/hdinsight#az-hdinsight-create).
3939

@@ -166,7 +166,7 @@ az hdinsight create \
166166
--cluster-configuration $clusterConfiguration
167167
```
168168

169-
## az hdinsight application create
169+
## `az hdinsight application create`
170170

171171
[Create an application for a HDInsight cluster](/cli/azure/hdinsight/application#az-hdinsight-application-create).
172172

@@ -233,7 +233,7 @@ az hdinsight application create \
233233
--sub-domain-suffix $subDomainSuffix
234234
```
235235

236-
## az hdinsight script-action execute
236+
## `az hdinsight script-action execute`
237237

238238
[Execute script actions on the specified HDInsight cluster](/cli/azure/hdinsight/script-action#az-hdinsight-script-action-execute).
239239

articles/hdinsight/domain-joined/apache-domain-joined-configure-using-azure-adds.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ ms.date: 09/06/2024
99

1010
# Configure HDInsight clusters for Microsoft Entra integration with Enterprise Security Package
1111

12-
This article provides a summary and overview of the process of creating and configuring an HDInsight cluster integrated with Microsoft Entra ID. This integration relies on a HDInsight feature called Enterprise Security Package (ESP), Microsoft Entra Domain Services and your pre-existing on-premises Active Directory.
12+
This article provides a summary and overview of the process of creating and configuring an HDInsight cluster integrated with Microsoft Entra ID. This integration relies on a HDInsight feature called Enterprise Security Package (ESP), Microsoft Entra Domain Services and your preexisting on-premises Active Directory.
1313

14-
For a detailed, step-by-step tutorial on setting up and configuring a domain in Azure and creating an ESP enabled cluster and then syncing on-premises users, see [Create and configure Enterprise Security Package clusters in Azure HDInsight](apache-domain-joined-create-configure-enterprise-security-cluster.md).
14+
For a detailed, step-by-step tutorial on setting up and configuring a domain in Azure and creating an ESP enabled cluster and then syncing on-premises users, see [Create, and configure Enterprise Security Package clusters in Azure HDInsight](apache-domain-joined-create-configure-enterprise-security-cluster.md).
1515

1616
## Background
1717

@@ -30,7 +30,7 @@ There are a few prerequisites to complete before you can create an ESP-enabled H
3030
- Create and authorize a managed identity.
3131
- Complete Networking setup for DNS and related issues.
3232

33-
Each of these items are discussed in details. For a walkthrough of completing all of these steps, see [Create and configure Enterprise Security Package clusters in Azure HDInsight](apache-domain-joined-create-configure-enterprise-security-cluster.md).
33+
Each of this item is discussed in details. For a walkthrough of completing all of these steps, see [Create and configure Enterprise Security Package clusters in Azure HDInsight](apache-domain-joined-create-configure-enterprise-security-cluster.md).
3434

3535
<a name='enable-azure-ad-ds'></a>
3636

@@ -66,7 +66,7 @@ New-SelfSignedCertificate -Subject contoso100.onmicrosoft.com `
6666

6767
### Check Microsoft Entra Domain Services health status
6868

69-
View the health status of Microsoft Entra Domain Services by selecting **Health** in the **Manage** category. Make sure the status of Microsoft Entra Domain Services is green (running) and the synchronization is complete.
69+
View the health status of Microsoft Entra Domain Services by selecting `Health` in the `Manage` category. Make sure the status of Microsoft Entra Domain Services is green (running) and the synchronization is complete.
7070

7171
:::image type="content" source="./media/apache-domain-joined-configure-using-azure-adds/hdinsight-aadds-health.png" alt-text="Microsoft Entra Domain Services health." border="true":::
7272

@@ -95,7 +95,7 @@ For example, the Microsoft Entra Domain Services admin can assign this role to t
9595
> [!NOTE]
9696
> Microsoft Entra Domain Services must be deployed in an Azure Resource Manager-based virtual network. Classic virtual networks are not supported for Microsoft Entra Domain Services. For more information, see [Enable Microsoft Entra Domain Services by using the Azure portal](../../active-directory-domain-services/tutorial-create-instance-advanced.md#create-and-configure-the-virtual-network).
9797
98-
Enable Microsoft Entra Domain Services. Then a local Domain Name System (DNS) server runs on the Active Directory virtual machines (VMs). Configure your Microsoft Entra Domain Services virtual network to use these custom DNS servers. To locate the right IP addresses, select **Properties** in the **Manage** category and look under **IP ADDRESS ON VIRTUAL NETWORK**.
98+
Enable Microsoft Entra Domain Services. Then a local Domain Name System (DNS) server runs on the Active Directory virtual machines (VMs). Configure your Microsoft Entra Domain Services virtual network to use these custom DNS servers. To locate the right IP addresses, select `Properties` in the `Manage` category and look under **IP ADDRESS ON VIRTUAL NETWORK**.
9999

100100
:::image type="content" source="./media/apache-domain-joined-configure-using-azure-adds/hdinsight-aadds-dns1.png" alt-text="Locate IP addresses for local DNS servers." border="true":::
101101

@@ -105,7 +105,7 @@ Change the configuration of the DNS servers in the Microsoft Entra Domain Servic
105105

106106
It's easier to place both the Microsoft Entra Domain Services instance and the HDInsight cluster in the same Azure virtual network. If you plan to use different virtual networks, you must peer those virtual networks so that the domain controller is visible to HDInsight VMs. For more information, see [Virtual network peering](../../virtual-network/virtual-network-peering-overview.md).
107107

108-
After the virtual networks are peered, configure the HDInsight virtual network to use a custom DNS server. And enter the Microsoft Entra Domain Services private IPs as the DNS server addresses. When both virtual networks use the same DNS servers, your custom domain name resolves to the right IP and it is reachable from HDInsight. For example, if your domain name is `contoso.com`, then after this step, `ping contoso.com` should resolve to the right Microsoft Entra Domain Services IP.
108+
After the virtual networks are peered, configure the HDInsight virtual network to use a custom DNS server. And enter the Microsoft Entra Domain Services private IPs as the DNS server addresses. When both virtual networks use the same DNS servers, your custom domain name resolves to the right IP and it's reachable from HDInsight. For example, if your domain name is `contoso.com`, then after this step, `ping contoso.com` should resolve to the right Microsoft Entra Domain Services IP.
109109

110110
:::image type="content" source="./media/apache-domain-joined-configure-using-azure-adds/hdinsight-aadds-peered-vnet-configuration.png" alt-text="Configuring custom DNS servers for a peered virtual network." border="true":::
111111

articles/hdinsight/hadoop/apache-hadoop-dotnet-csharp-mapreduce-streaming.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ namespace mapper
8080
}
8181
```
8282

83-
After you create the application, build it to produce the */bin/Debug/mapper.exe* file in the project directory.
83+
After you create the application, build it to produce the `/bin/Debug/mapper.exe` file in the project directory.
8484

8585
## Create the reducer
8686

@@ -133,7 +133,7 @@ namespace reducer
133133
}
134134
```
135135

136-
After you create the application, build it to produce the */bin/Debug/reducer.exe* file in the project directory.
136+
After you create the application, build it to produce the `/bin/Debug/reducer.exe` file in the project directory.
137137

138138
## Upload to storage
139139

@@ -157,7 +157,7 @@ Next, you need to upload the *mapper* and *reducer* applications to HDInsight st
157157

158158
:::image type="content" source="./media/apache-hadoop-dotnet-csharp-mapreduce-streaming/hdinsight-upload-icon.png" alt-text="HDInsight upload icon for mapper, Visual Studio." border="true":::
159159

160-
In the **Upload New File** dialog box, under **File name**, select **Browse**. In the **Upload Blob** dialog box, go to the *bin\debug* folder for the *mapper* project, and then choose the *mapper.exe* file. Finally, select **Open** and then **OK** to complete the upload.
160+
In the **Upload New File** dialog box, under **File name**, select **Browse**. In the **Upload Blob** dialog box, go to the `bin\debug` folder for the *mapper* project, and then choose the *mapper.exe* file. Finally, select **Open** and then **OK** to complete the upload.
161161

162162
* For **Azure Data Lake Storage**, right-click an empty area in the file listing, and then select **Upload**. Finally, select the *mapper.exe* file and then select **Open**.
163163

@@ -243,7 +243,7 @@ The following procedure describes how to run a MapReduce job using an SSH sessio
243243

244244
Use the following PowerShell script to run a MapReduce job and download the results.
245245

246-
[!code-powershell[main](../../../powershell_scripts/hdinsight/use-csharp-mapreduce/use-csharp-mapreduce.ps1?range=5-87)]
246+
[!Code-powershell[main](../../../powershell_scripts/hdinsight/use-csharp-mapreduce/use-csharp-mapreduce.ps1?range=5-87)]
247247

248248
This script prompts you for the cluster login account name and password, along with the HDInsight cluster name. Once the job completes, the output is downloaded to a file named *output.txt*. The following text is an example of the data in the `output.txt` file:
249249

articles/hdinsight/hadoop/apache-hadoop-use-hive-curl.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ $clusterName
178178

179179
1. Once the state of the job has changed to **SUCCEEDED**, you can retrieve the results of the job from Azure Blob storage. The `statusdir` parameter passed with the query contains the location of the output file; in this case, `/example/rest`. This address stores the output in the `example/curl` directory in the clusters default storage.
180180

181-
You can list and download these files by using the [Azure CLI](/cli/azure/install-azure-cli). For more information on using the Azure CLI with Azure Storage, see the [Use Azure CLI with Azure Storage](../../storage/blobs/storage-quickstart-blobs-cli.md) document.
181+
You can list and download these files by using the [Azure CLI](/cli/azure/install-azure-cli). For more information, see [Use Azure CLI with Azure Storage](../../storage/blobs/storage-quickstart-blobs-cli.md) document.
182182

183183
## Next steps
184184

articles/hdinsight/hadoop/hdinsight-use-sqoop.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -48,14 +48,14 @@ HDInsight cluster comes with some sample data. You use the following two samples
4848
| state |string |
4949
| country |string |
5050
| querydwelltime |double |
51-
| sessionid |bigint |
51+
| `sessionid` |bigint |
5252
| sessionpagevieworder |bigint |
5353

5454
In this article, you use these two datasets to test Sqoop import and export.
5555

5656
## <a name="create-cluster-and-sql-database"></a>Set up test environment
5757

58-
The cluster, SQL database, and other objects are created through the Azure portal using an Azure Resource Manager template. The template can be found in [Azure quickstart templates](https://azure.microsoft.com/resources/templates/hdinsight-linux-with-sql-database/). The Resource Manager template calls a bacpac package to deploy the table schemas to an SQL database. If you want to use a private container for the bacpac files, use the following values in the template:
58+
The cluster, SQL database, and other objects are created through the Azure portal using an Azure Resource Manager template. The template can be found in [Azure Quickstart Templates](https://azure.microsoft.com/resources/templates/hdinsight-linux-with-sql-database/). The Resource Manager template calls a bacpac package to deploy the table schemas to an SQL database. If you want to use a private container for the bacpac files, use the following values in the template:
5959

6060
```json
6161
"storageKeyType": "Primary",
@@ -77,11 +77,11 @@ The cluster, SQL database, and other objects are created through the Azure porta
7777
|Resource group |Select your resource group from the drop-down list, or create a new one|
7878
|Location |Select a region from the drop-down list.|
7979
|Cluster Name |Enter a name for the Hadoop cluster. Use lowercase letter only.|
80-
|Cluster Login User Name |Keep the pre-populated value `admin`.|
81-
|Cluster Login Password |Enter a password.|
82-
|Ssh User Name |Keep the pre-populated value `sshuser`.|
80+
|Cluster sign-in User Name |Keep the prepopulated value `admin`.|
81+
|Cluster sign in Password |Enter a password.|
82+
|Ssh User Name |Keep the prepopulated value `sshuser`.|
8383
|Ssh Password |Enter a password.|
84-
|Sql Admin Login |Keep the pre-populated value `sqluser`.|
84+
|Sql Admin sign-in |Keep the prepopulated value `sqluser`.|
8585
|Sql Admin Password |Enter a password.|
8686
|_artifacts Location | Use the default value unless you want to use your own bacpac file in a different location.|
8787
|_artifacts Location Sas Token |Leave blank.|
@@ -100,7 +100,7 @@ HDInsight can run Sqoop jobs by using various methods. Use the following table t
100100

101101
| **Use this** if you want... | ...an **interactive** shell | ...**batch** processing | ...from this **client operating system** |
102102
|:--- |:---:|:---:|:--- |:--- |
103-
| [SSH](apache-hadoop-use-sqoop-mac-linux.md) |? |? |Linux, Unix, Mac OS X, or Windows |
103+
| [SSH](apache-hadoop-use-sqoop-mac-linux.md) |? |? |Linux, Unix, macOS X, or Windows |
104104
| [.NET SDK for Hadoop](apache-hadoop-use-sqoop-dotnet-sdk.md) |&nbsp; |? |Windows (for now) |
105105
| [Azure PowerShell](apache-hadoop-use-sqoop-powershell.md) |&nbsp; |? |Windows |
106106

articles/hdinsight/hadoop/python-udf-hdinsight.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ The script output is a concatenation of the input values for `devicemake` and `d
9999

100100
### Upload file (shell)
101101

102-
The following command, replaces `sshuser` with the actual username if different. Replace `mycluster` with the actual cluster name. Ensure your working directory is where the file is located.
102+
The following command replaces `sshuser` with the actual username if different. Replace `mycluster` with the actual cluster name. Ensure your working directory is where the file is located.
103103

104104
1. Use `scp` to copy the files to your HDInsight cluster. Edit and enter the command:
105105

@@ -393,7 +393,7 @@ In the commands below, replace `sshuser` with the actual username if different.
393393
DUMP DETAILS;
394394
```
395395

396-
3. After entering the following line, the job should start. Once the job completes, it returns output similar to the following data:
396+
3. After you enter the following line, the job should start. Once the job completes, it returns output similar to the following data:
397397

398398
```output
399399
((2012-02-03,20:11:56,SampleClass5,[TRACE],verbose detail for id 990982084))
@@ -569,13 +569,13 @@ This problem may be caused by the line endings in the Python file. Many Windows
569569

570570
You can use the following PowerShell statements to remove the CR characters before uploading the file to HDInsight:
571571

572-
[!code-powershell[main](../../../powershell_scripts/hdinsight/run-python-udf/run-python-udf.ps1?range=148-150)]
572+
[!`Code-powershell`[main](../../../powershell_scripts/hdinsight/run-python-udf/run-python-udf.ps1?range=148-150)]
573573

574574
### PowerShell scripts
575575

576576
Both of the example PowerShell scripts used to run the examples contain a commented line that displays error output for the job. If you aren't seeing the expected output for the job, uncomment the following line and see if the error information indicates a problem.
577577

578-
[!code-powershell[main](../../../powershell_scripts/hdinsight/run-python-udf/run-python-udf.ps1?range=135-139)]
578+
[!Code-powershell[main](../../../powershell_scripts/hdinsight/run-python-udf/run-python-udf.ps1?range=135-139)]
579579

580580
The error information (STDERR) and the result of the job (STDOUT) are also logged to your HDInsight storage.
581581

articles/hdinsight/hadoop/troubleshoot-invalidnetworkconfigurationerrorcode-cluster-creation-fails.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Error description contains "HostName Resolution failed."
2020

2121
### Cause
2222

23-
This error points to a problem with custom DNS configuration. DNS servers within a virtual network can forward DNS queries to Azure's recursive resolvers to resolve hostnames within that virtual network (see [Name Resolution in Virtual Networks](../../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md) for details). Access to Azure's recursive resolvers is provided via the virtual IP 168.63.129.16. This IP is only accessible from the Azure VMs. It is nonfunctional if you are using an OnPrem DNS server, or your DNS server is an Azure VM, which is not part of the cluster's virtual network.
23+
This error points to a problem with custom DNS configuration. DNS servers within a virtual network can forward DNS queries to Azure's recursive resolvers to resolve hostnames within that virtual network (see [Name Resolution in Virtual Networks](../../virtual-network/virtual-networks-name-resolution-for-vms-and-role-instances.md) for details). Access to Azure's recursive resolvers is provided via the virtual IP 168.63.129.16. This IP is only accessible from the Azure VMs. It's nonfunctional if you're using an on-premises DNS server, or your DNS server is an Azure VM, which isn't part of the cluster's virtual network.
2424

2525
### Resolution
2626

@@ -50,11 +50,11 @@ Azure Storage and SQL don't have fixed IP Addresses, so we need to allow outboun
5050

5151
### Resolution
5252

53-
* If your cluster uses a [Network Security Group (NSG)](../../virtual-network/virtual-network-vnet-plan-design-arm.md).
53+
* If your cluster uses a [Network Security Group (NSG)](../../virtual-network/virtual-network-vnet-plan-design-arm.md)
5454

5555
Go to the Azure portal and identify the NSG that is associated with the subnet where the cluster is being deployed. In the **Outbound security rules** section, allow outbound access to internet without limitation (note that a smaller **priority** number here means higher priority). Also, in the **subnets** section, confirm if this NSG is applied to the cluster subnet.
5656

57-
* If your cluster uses a [User-defined Routes (UDR)](../../virtual-network/virtual-networks-udr-overview.md).
57+
* If your cluster uses a [User-defined Routes (UDR)](../../virtual-network/virtual-networks-udr-overview.md)
5858

5959
Go to the Azure portal and identify the route table that is associated with the subnet where the cluster is being deployed. Once you find the route table for the subnet, inspect the **routes** section in it.
6060

@@ -68,14 +68,14 @@ Error description contains "Failed to establish an outbound connection from the
6868

6969
### Cause
7070

71-
When using Private Linked HDInsight clusters, outbound access from the cluster must be configured to allow connections to be made to the HDInsight resource provider.
71+
When you use Private Linked HDInsight clusters, outbound access from the cluster must be configured to allow connections to be made to the HDInsight resource provider.
7272

7373
### Resolution
7474

7575
* To resolve this issue, refer to the HDInsight Private Link setup steps at [private link setup](../hdinsight-private-link.md)
7676
---
7777

78-
## "Virtual network configuration is not compatible with HDInsight requirement"
78+
## "Virtual network configuration isn't compatible with HDInsight requirement"
7979

8080
### Issue
8181

@@ -116,7 +116,7 @@ Validate that 168.63.129.16 is in the custom DNS chain. DNS servers within a vir
116116
117117
Based on the result - choose one of the following steps to follow:
118118
119-
#### 168.63.129.16 is not in this list
119+
#### 168.63.129.16 isn't in this list
120120
121121
**Option 1**
122122
Add 168.63.129.16 as the first custom DNS for the virtual network using the steps described in [Plan a virtual network for Azure HDInsight](../hdinsight-plan-virtual-network-deployment.md). These steps are applicable only if your custom DNS server runs on Linux.
@@ -145,7 +145,7 @@ Another cause for this `InvalidNetworkConfigurationErrorCode` error code could b
145145

146146
### Resolution
147147

148-
Use the valid parameters for `Get-AzVirtualNetwork` as documented in the [Az PowerShell SDK](/powershell/module/az.network/get-azvirtualnetwork)
148+
Use the valid parameters for `Get-AzVirtualNetwork` as documented in the [Az PowerShell module PowerShell SDK](/powershell/module/az.network/get-azvirtualnetwork)
149149

150150
---
151151

0 commit comments

Comments
 (0)