You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-machines/image-builder-api-update-release-notes.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: kof-f
5
5
ms.service: virtual-machines
6
6
ms.topic: conceptual
7
7
ms.workload: infrastructure
8
-
ms.date: 11/01/2023
8
+
ms.date: 11/10/2023
9
9
ms.reviewer: erd
10
10
ms.subservice: image-builder
11
11
ms.custom: references_regions
@@ -26,6 +26,9 @@ Azure Image Builder is enabling Isolated Image Builds using Azure Container Inst
26
26
27
27
You might observe a different set of transient Azure resources appear temporarily in the staging resource group but that does not impact your actual builds or the way you interact with Azure Image Builder. For more information, please see [Isolated Image Builds](./security-isolated-image-builds-image-builder.md).
28
28
29
+
> [!IMPORTANT]
30
+
> Make sure your subscription is registered for the `Microsoft.ContainerInstance` provider.
31
+
29
32
### April 2023
30
33
New portal functionality has been added for Azure Image Builder. Search “Image Templates” in Azure portal, then click “Create”. You can also [get started here](https://ms.portal.azure.com/#create/Microsoft.ImageTemplate) with building and validating custom images inside the portal.
az image builder create -g $resourceGroupName -n $imageTemplateName --image-template helloImageTemplateforTriggers.json
163
167
```
164
168
You can use the following command to check to make sure the image template was created successfully:
165
169
166
170
```azurecli-interactive
167
-
az resource show --api-version 2022-07-01 --ids /subscriptions/$subscriptionID/resourcegroups/$resourceGroupName/providers/Microsoft.VirtualMachineImages/imageTemplates/$imageTemplateName
171
+
az image builder show --name $imageTemplateName --resource-group $resourceGroupName
168
172
```
169
173
> [!NOTE]
170
174
> When running the command above the `provisioningState` should say "Succeeded", which means the template was created without any issues. If the `provisioningState` does not say succeeded, you will not be able to make a trigger use the image template.
@@ -187,12 +191,12 @@ Trigger requirements:
187
191
Use the following command to add the trigger to your resource group.
You can also use the following command to check that the trigger was created successfully:
193
197
194
198
```azurecli
195
-
az resource show --api-version 2022-07-01 --ids /subscriptions/$subscriptionID/resourcegroups/$resourceGroupName/providers/Microsoft.VirtualMachineImages/imageTemplates/$imageTemplateName/triggers/source
199
+
az image builder trigger show --name $ibTriggerName --image-template-name $imageTemplateName --resource-group $resourceGroupName
196
200
```
197
201
> [!NOTE]
198
202
> When running the command above the `provisioningState` should say `Succeeded`, which means the trigger was created without any issues. In `status`, the code should say `Healthy` and the message should say `Trigger is active.`
@@ -204,14 +208,14 @@ az resource show --api-version 2022-07-01 --ids /subscriptions/$subscriptionID/r
204
208
Use the following command to delete the trigger:
205
209
206
210
```azurecli-interactive
207
-
az resource delete --api-version 2022-07-01 --ids /subscriptions/$subscriptionID/resourcegroups/$resourceGroupName/providers/Microsoft.VirtualMachineImages/imageTemplates/$imageTemplateName/triggers/source
* Create a standard Azure storage account in the source image resource group. You can use other resource groups or storage accounts. The storage account is used transfer the build artifacts from the DevOps task to the image.
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux/image-builder-gallery-update-image-version.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,8 @@ title: Create a new VM image version from an existing image version by using Azu
3
3
description: In this article, you'll learn how to create a new VM image version from an existing image version by using VM Image Builder in Linux.
4
4
author: kof-f
5
5
ms.author: kofiforson
6
-
ms.reviewer: cynthn
7
-
ms.date: 03/02/2020
6
+
ms.reviewer: erd
7
+
ms.date: 11/10/2020
8
8
ms.topic: how-to
9
9
ms.service: virtual-machines
10
10
ms.subservice: image-builder
@@ -18,9 +18,9 @@ In this article, you learn how to update an existing image version in an [Azure
18
18
19
19
To configure the image, you use a sample JSON template, [helloImageTemplateforSIGfromSIG.json](https://raw.githubusercontent.com/azure/azvmimagebuilder/master/quickquickstarts/2_Creating_a_Custom_Linux_Shared_Image_Gallery_Image_from_SIG/helloImageTemplateforSIGfromSIG.json).
20
20
21
-
## Register the features
21
+
## Register the providers
22
22
23
-
To use VM Image Builder, you need to register the features.
23
+
To use VM Image Builder, you need to register the providers.
24
24
25
25
1. Check your provider registrations. Make sure that each one returns *Registered*.
26
26
@@ -30,6 +30,7 @@ To use VM Image Builder, you need to register the features.
30
30
az provider show -n Microsoft.Compute | grep registrationState
31
31
az provider show -n Microsoft.Storage | grep registrationState
32
32
az provider show -n Microsoft.Network | grep registrationState
33
+
az provider show -n Microsoft.ContainerInstance | grep registrationState
33
34
```
34
35
35
36
1. If they don't return *Registered*, register the providers by running the following commands:
@@ -40,6 +41,7 @@ To use VM Image Builder, you need to register the features.
40
41
az provider register -n Microsoft.KeyVault
41
42
az provider register -n Microsoft.Storage
42
43
az provider register -n Microsoft.Network
44
+
az provider register -n Microsoft.ContainerInstance
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux/image-builder-gallery.md
+12-10Lines changed: 12 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,8 @@ title: Use Azure Image Builder & Azure Compute Gallery for Linux VMs
3
3
description: Learn how to use the Azure Image Builder, and the Azure CLI, to create an image version in an Azure Compute Gallery, and then distribute the image globally.
This article shows you how you can use the Azure Image Builder, and the Azure CLI, to create an image version in an [Azure Compute Gallery](../shared-image-galleries.md) (formerly known as Shared Image Gallery), then distribute the image globally. You can also do this using [Azure PowerShell](../windows/image-builder-gallery.md).
19
19
20
-
We will be using a sample .json template to configure the image. The .json file we are using is here: [helloImageTemplateforSIG.json](https://github.com/azure/azvmimagebuilder/blob/master/quickquickstarts/1_Creating_a_Custom_Linux_Shared_Image_Gallery_Image/helloImageTemplateforSIG.json).
20
+
We'll be using a sample .json template to configure the image. The .json file we're using is here: [helloImageTemplateforSIG.json](https://github.com/azure/azvmimagebuilder/blob/master/quickquickstarts/1_Creating_a_Custom_Linux_Shared_Image_Gallery_Image/helloImageTemplateforSIG.json).
21
21
22
22
To distribute the image to an Azure Compute Gallery, the template uses [sharedImage](image-builder-json.md#distribute-sharedimage) as the value for the `distribute` section of the template.
23
23
24
-
## Register the features
24
+
## Register the providers
25
25
26
26
To use Azure Image Builder, you need to register the feature.
27
27
@@ -33,21 +33,23 @@ az provider show -n Microsoft.KeyVault | grep registrationState
33
33
az provider show -n Microsoft.Compute | grep registrationState
34
34
az provider show -n Microsoft.Storage | grep registrationState
35
35
az provider show -n Microsoft.Network | grep registrationState
36
+
az provider show -n Microsoft.ContainerInstance | grep registrationState
36
37
```
37
38
38
-
If they do not say registered, run the following:
39
+
If they don't say registered, run the following:
39
40
40
41
```azurecli-interactive
41
42
az provider register -n Microsoft.VirtualMachineImages
42
43
az provider register -n Microsoft.Compute
43
44
az provider register -n Microsoft.KeyVault
44
45
az provider register -n Microsoft.Storage
45
46
az provider register -n Microsoft.Network
47
+
az provider register -n Microsoft.ContainerInstance
46
48
```
47
49
48
50
## Set variables and permissions
49
51
50
-
We will be using some pieces of information repeatedly, so we will create some variables to store that information.
52
+
We'll be using some pieces of information repeatedly, so we'll create some variables to store that information.
51
53
52
54
Image Builder only supports creating custom images in the same Resource Group as the source managed image. Update the resource group name in this example to be the same resource group as your source managed image.
53
55
@@ -80,7 +82,7 @@ az group create -n $sigResourceGroup -l $location
80
82
81
83
## Create a user-assigned identity and set permissions on the resource group
82
84
83
-
Image Builder will use the [user-identity](../../active-directory/managed-identities-azure-resources/qs-configure-cli-windows-vm.md#user-assigned-managed-identity) provided to inject the image into the Azure Compute Gallery. In this example, you will create an Azure role definition that has the granular actions to perform distributing the image to the gallery. The role definition will then be assigned to the user-identity.
85
+
Image Builder uses the [user-identity](../../active-directory/managed-identities-azure-resources/qs-configure-cli-windows-vm.md#user-assigned-managed-identity) provided to inject the image into the Azure Compute Gallery. In this example, you'll create an Azure role definition that has the granular actions to perform distributing the image to the gallery. The role definition will then be assigned to the user-identity.
84
86
85
87
```azurecli-interactive
86
88
# create user assigned identity for image builder to access the storage account where the script is located
@@ -115,7 +117,7 @@ az role assignment create \
115
117
116
118
## Create an image definition and gallery
117
119
118
-
To use Image Builder with an Azure Compute Gallery, you need to have an existing gallery and image definition. Image Builder will not create the gallery and image definition for you.
120
+
To use Image Builder with an Azure Compute Gallery, you need to have an existing gallery and image definition. Image Builder won't create the gallery and image definition for you.
119
121
120
122
If you don't already have a gallery and image definition to use, start by creating them. First, create a gallery.
121
123
@@ -213,9 +215,9 @@ You should see the image was customized with a *Message of the Day* as soon as y
213
215
214
216
## Clean up resources
215
217
216
-
If you want to now try re-customizing the image version to create a new version of the same image, skip the next steps and go on to [Use Azure Image Builder to create another image version](image-builder-gallery-update-image-version.md).
218
+
If you want to now try recustomizing the image version to create a new version of the same image, skip the next steps and go on to [Use Azure Image Builder to create another image version](image-builder-gallery-update-image-version.md).
217
219
218
-
This will delete the image that was created, along with all of the other resource files. Make sure you are finished with this deployment before deleting the resources.
220
+
This deletes the image that was created, along with all of the other resource files. Make sure you're finished with this deployment before deleting the resources.
219
221
220
222
When deleting gallery resources, you need delete all of the image versions before you can delete the image definition used to create them. To delete a gallery, you first need to have deleted all of the image definitions in the gallery.
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux/image-builder.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,8 @@ title: Use Azure VM Image Builder with an Azure Compute Gallery for Linux VMs
3
3
description: Create Linux VM images with Azure VM Image Builder and Azure Compute Gallery.
4
4
author: kof-f
5
5
ms.author: kofiforson
6
-
ms.reviewer: cynthn
7
-
ms.date: 04/11/2023
6
+
ms.reviewer: erd
7
+
ms.date: 11/10/2023
8
8
ms.topic: how-to
9
9
ms.service: virtual-machines
10
10
ms.subservice: image-builder
@@ -20,16 +20,17 @@ This article uses a sample JSON template to configure the image. The JSON file i
20
20
21
21
To distribute the image to an Azure Compute Gallery, the template uses [sharedImage](image-builder-json.md#distribute-sharedimage) as the value for the `distribute` section of the template.
22
22
23
-
## Register the features
23
+
## Register the providers
24
24
25
-
To use VM Image Builder, you need to register the feature. Check your registration by running the following commands:
25
+
To use VM Image Builder, you need to register the providers. Check your registration by running the following commands:
26
26
27
27
```azurecli-interactive
28
28
az provider show -n Microsoft.VirtualMachineImages -o json | grep registrationState
29
29
az provider show -n Microsoft.KeyVault -o json | grep registrationState
30
30
az provider show -n Microsoft.Compute -o json | grep registrationState
31
31
az provider show -n Microsoft.Storage -o json | grep registrationState
32
32
az provider show -n Microsoft.Network -o json | grep registrationState
33
+
az provider show -n Microsoft.ContainerInstance -o json | grep registrationState
33
34
```
34
35
35
36
If the output doesn't say *registered*, run the following commands:
@@ -40,6 +41,7 @@ az provider register -n Microsoft.Compute
40
41
az provider register -n Microsoft.KeyVault
41
42
az provider register -n Microsoft.Storage
42
43
az provider register -n Microsoft.Network
44
+
az provider register -n Microsoft.ContainerInstance
0 commit comments