Skip to content

Commit 10112d4

Browse files
committed
Adding changes for the certificate rotation work
1 parent b7bb5b0 commit 10112d4

5 files changed

+5
-5
lines changed

articles/mariadb/howto-configure-privatelink-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ az network private-endpoint create \
9191
--resource-group myResourceGroup \
9292
--vnet-name myVirtualNetwork \
9393
--subnet mySubnet \
94-
--private-connection-resource-id $(az resource show -g myResourcegroup -n mydemoserver --resource-type "Microsoft.DBforMariaDB/servers" --query "id") \
94+
--private-connection-resource-id $(az resource show -g myResourcegroup -n mydemoserver --resource-type "Microsoft.DBforMariaDB/servers" --query "id" -o tsv) \
9595
--group-id mariadbServer \
9696
--connection-name myConnection
9797
```

articles/mysql/concepts-infrastructure-double-encryption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Azure Database for MySQL uses storage [encryption of data at-rest](concepts-secu
1515
Infrastructure double encryption adds a second layer of encryption using service-managed keys. It uses FIPS 140-2 validated cryptographic module, but with a different encryption algorithm. This provides an additional layer of protection for your data at rest. The key used in Infrastructure double encryption is also managed by the Azure Database for MySQL service. Infrastructure double encryption is not enabled by default since the additional layer of encryption can have a performance impact.
1616

1717
> [!NOTE]
18-
> This feature is available in all Azure regions where Azure Database for MySQL supports "General Purpose" and "Memory Optimized" pricing tiers.
18+
> This feature is only supported for "General Purpose" and "Memory Optimized" pricing tiers in Azure Database for PostgreSQL.
1919
2020
Infrastructure Layer encryption has the benefit of being implemented at the layer closest to the storage device or network wires. Azure Database for MySQL implements the two layers of encryption using service-managed keys. Although still technically in the service layer, it is very close to hardware that stores the data at rest. You can still optionally enable data encryption at rest using [customer managed key](concepts-data-encryption-mysql.md) for the provisioned MySQL server.
2121

articles/mysql/howto-configure-privatelink-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ az network private-endpoint create \
8787
--resource-group myResourceGroup \
8888
--vnet-name myVirtualNetwork \
8989
--subnet mySubnet \
90-
--private-connection-resource-id $(az resource show -g myResourcegroup -n mydemoserver --resource-type "Microsoft.DBforMySQL/servers" --query "id") \
90+
--private-connection-resource-id $(az resource show -g myResourcegroup -n mydemoserver --resource-type "Microsoft.DBforMySQL/servers" --query "id" -o tsv) \
9191
--group-id mysqlServer \
9292
--connection-name myConnection
9393
```

articles/postgresql/concepts-infrastructure-double-encryption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Azure Database for PostgreSQL uses storage [encryption of data at-rest](concepts
1515
Infrastructure double encryption adds a second layer of encryption using service-managed keys. It uses FIPS 140-2 validated cryptographic module, but with a different encryption algorithm. This provides an additional layer of protection for your data at rest. The key used in Infrastructure double encryption is also managed by the Azure Database for PostgreSQL service. Infrastructure double encryption is not enabled by default since the additional layer of encryption can have a performance impact.
1616

1717
> [!NOTE]
18-
> This feature is available in all Azure regions where Azure Database for PostgreSQL supports "General Purpose" and "Memory Optimized" pricing tiers.
18+
> This feature is only supported for "General Purpose" and "Memory Optimized" pricing tiers in Azure Database for PostgreSQL.
1919
2020
Infrastructure Layer encryption has the benefit of being implemented at the layer closest to the storage device or network wires. Azure Database for PostgreSQL implements the two layers of encryption using service-managed keys. Although still technically in the service layer, it is very close to hardware that stores the data at rest. You can still optionally enable data encryption at rest using [customer managed key](concepts-data-encryption-postgresql.md) for the provisioned PostgreSQL server.
2121

articles/postgresql/howto-configure-privatelink-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ az network private-endpoint create \
8787
--resource-group myResourceGroup \
8888
--vnet-name myVirtualNetwork \
8989
--subnet mySubnet \
90-
--private-connection-resource-id $(az resource show -g myResourcegroup -n mydemoserver --resource-type "Microsoft.DBforPostgreSQL/servers" --query "id") \
90+
--private-connection-resource-id $(az resource show -g myResourcegroup -n mydemoserver --resource-type "Microsoft.DBforPostgreSQL/servers" --query "id" -o tsv) \
9191
--group-id postgresqlServer \
9292
--connection-name myConnection
9393
```

0 commit comments

Comments
 (0)