You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/automation/troubleshoot/start-stop-vm.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -131,7 +131,7 @@ This error can be caused by one of the following reasons:
131
131
132
132
Review the following list for potential solutions to your problem or places to look:
133
133
134
-
* When using the [sequence scenario](../automation-solution-vm-management.md#scenario-2-startstop-vms-in-sequence-by-using-tags) of the Start/Stop VM during off hours solution, you must make sure each VM you want to start or stop has the proper tag. Make sure the VMs that you want to start have the `sequencestart` tag and the VMs you want to stop have the `sequencestop` tag. Both tags require a positive integer value. You can use a query similar to the following example to look for all the VMs with the tags and their values.
134
+
* When using the [sequence scenario](../automation-solution-vm-management.md#startstop-vms-during-off-hours-solution-in-azure-automation) of the Start/Stop VM during off hours solution, you must make sure each VM you want to start or stop has the proper tag. Make sure the VMs that you want to start have the `sequencestart` tag and the VMs you want to stop have the `sequencestop` tag. Both tags require a positive integer value. You can use a query similar to the following example to look for all the VMs with the tags and their values.
@@ -181,7 +181,7 @@ Take the following steps to ensure that the solution is configured correctly.
181
181
2. Make sure the resource groups for the VMs to be started or stopped are in the `External_Start_ResourceGroupNames` or `External_Stop_ResourceGroupNames` variables, depending on your situation.
182
182
3. Test your changes by executing the `SequencedStartStop_Parent` runbook with the WHATIF parameter set to True to preview your changes.
183
183
184
-
For more detailed and additional instructions on how to use the solution to start and stop VMs in sequence, see [Start/Stop VMs in sequence](../automation-solution-vm-management.md#scenario-2-startstop-vms-in-sequence-by-using-tags).
184
+
For more detailed and additional instructions on how to use the solution to start and stop VMs in sequence, see [Start/Stop VMs in sequence](../automation-solution-vm-management.md#startstop-vms-during-off-hours-solution-in-azure-automation).
185
185
186
186
## <aname="403"></a>Scenario: Start/Stop VM job fails with 403 forbidden status
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux/disk-encryption-faq.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ To get started, read the [Azure Disk Encryption overview](disk-encryption-overvi
32
32
33
33
## What VM sizes and operating systems support Azure Disk Encryption?
34
34
35
-
The [Azure Disk Encryption overview](disk-encryption-overview.md) article lists the [VM sizes](disk-encryption-overview.md#supported-vm-sizes) and [VM operating systems](disk-encryption-overview.md#supported-operating-systems) that support Azure Disk Encryption.
35
+
The [Azure Disk Encryption overview](disk-encryption-overview.md) article lists the [VM sizes](disk-encryption-overview.md#supported-vms) and [VM operating systems](disk-encryption-overview.md#supported-operating-systems) that support Azure Disk Encryption.
36
36
37
37
## Can I encrypt both boot and data volumes with Azure Disk Encryption?
38
38
@@ -49,7 +49,7 @@ No, Azure Disk Encryption only encrypts mounted volumes.
49
49
To rotate secrets, just call the same command you used originally to enable disk encryption, specifying a different Key Vault. To rotate the key encryption key, call the same command you used originally to enable disk encryption, specifying the new key encryption.
50
50
51
51
>[!WARNING]
52
-
> - If you have previously used [Azure Disk Encryption with Azure AD app](disk-encryption-linux-aad.md) by specifying Azure AD credentials to encrypt this VM, you will have to continue use this option to encrypt your VM. You can’t use Azure Disk Encryption on this encrypted VM as this isn’t a supported scenario, meaning switching away from AAD application for this encrypted VM isn’t supported yet.
52
+
> - If you have previously used [Azure Disk Encryption with Azure AD app](disk-encryption-linux-aad.md) by specifying Azure AD credentials to encrypt this VM, you will have to continue use this option to encrypt your VM. You can't use Azure Disk Encryption on this encrypted VM as this isn't a supported scenario, meaning switching away from AAD application for this encrypted VM isn't supported yet.
53
53
54
54
## How do I add or remove a key encryption key if I didn't originally use one?
Copy file name to clipboardExpand all lines: articles/virtual-machines/linux/disk-encryption-sample-scripts.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,7 +76,7 @@ The following table shows which parameters can be used in the PowerShell script:
76
76
77
77
### Prerequisites for OS disk encryption
78
78
79
-
* The VM must be using a distribution compatible with OS disk encryption as listed in the [Azure Disk Encryption supported operating systems](disk-encryption-overview.md#supported-vm-sizes)
79
+
* The VM must be using a distribution compatible with OS disk encryption as listed in the [Azure Disk Encryption supported operating systems](disk-encryption-overview.md#supported-vms)
80
80
* The VM must be created from the Marketplace image in Azure Resource Manager.
81
81
* Azure VM with at least 4 GB of RAM (recommended size is 7 GB).
82
82
* (For RHEL and CentOS) Disable SELinux. To disable SELinux, see "4.4.2. Disabling SELinux" in the [SELinux User's and Administrator's Guide](https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/SELinux_Users_and_Administrators_Guide/sect-Security-Enhanced_Linux-Working_with_SELinux-Changing_SELinux_Modes.html#sect-Security-Enhanced_Linux-Enabling_and_Disabling_SELinux-Disabling_SELinux) on the VM.
@@ -290,7 +290,7 @@ To configure encryption to work with Azure, do the following steps:
290
290
```bash
291
291
if [ 1 ];then
292
292
```
293
-
4. Edit /usr/lib/dracut/modules.d/90crypt/cryptroot-ask.sh and append it to “# Open LUKS device”:
293
+
4. Edit /usr/lib/dracut/modules.d/90crypt/cryptroot-ask.sh and append it to "# Open LUKS device":
294
294
295
295
```bash
296
296
MountPoint=/tmp-keydisk-mount
@@ -371,7 +371,7 @@ To configure encryption to work with Azure, do the following steps:
371
371
```bash
372
372
if [ 1 ];then
373
373
```
374
-
4. Edit /usr/lib/dracut/modules.d/90crypt/cryptroot-ask.sh and append the following after the “# Open LUKS device”:
374
+
4. Edit /usr/lib/dracut/modules.d/90crypt/cryptroot-ask.sh and append the following after the "# Open LUKS device":
375
375
```bash
376
376
MountPoint=/tmp-keydisk-mount
377
377
KeyFileName=LinuxPassPhraseFileName
@@ -392,7 +392,7 @@ To configure encryption to work with Azure, do the following steps:
392
392
fi
393
393
done
394
394
```
395
-
5. Run the “/usr/sbin/dracut -f -v” to update the initrd.
395
+
5. Run the "/usr/sbin/dracut -f -v" to update the initrd.
396
396
397
397

Copy file name to clipboardExpand all lines: articles/virtual-machines/windows/disk-encryption-faq.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ To get started, read the [Azure Disk Encryption overview](disk-encryption-overvi
31
31
32
32
## What VM sizes and operating systems support Azure Disk Encryption?
33
33
34
-
The [Azure Disk Encryption overview](disk-encryption-overview.md) article lists the [VM sizes](disk-encryption-overview.md#supported-vm-sizes) and [VM operating systems](disk-encryption-overview.md#supported-operating-systems) that support Azure Disk Encryption.
34
+
The [Azure Disk Encryption overview](disk-encryption-overview.md) article lists the [VM sizes](disk-encryption-overview.md#supported-vms) and [VM operating systems](disk-encryption-overview.md#supported-operating-systems) that support Azure Disk Encryption.
35
35
36
36
## Can I encrypt both boot and data volumes with Azure Disk Encryption?
37
37
@@ -48,7 +48,7 @@ No, Azure Disk Encryption only encrypts mounted volumes.
48
48
To rotate secrets, just call the same command you used originally to enable disk encryption, specifying a different Key Vault. To rotate the key encryption key, call the same command you used originally to enable disk encryption, specifying the new key encryption.
49
49
50
50
>[!WARNING]
51
-
> - If you have previously used [Azure Disk Encryption with Azure AD app](disk-encryption-windows-aad.md) by specifying Azure AD credentials to encrypt this VM, you will have to continue use this option to encrypt your VM. You can’t use Azure Disk Encryption on this encrypted VM as this isn’t a supported scenario, meaning switching away from AAD application for this encrypted VM isn’t supported yet.
51
+
> - If you have previously used [Azure Disk Encryption with Azure AD app](disk-encryption-windows-aad.md) by specifying Azure AD credentials to encrypt this VM, you will have to continue use this option to encrypt your VM. You can't use Azure Disk Encryption on this encrypted VM as this isn't a supported scenario, meaning switching away from AAD application for this encrypted VM isn't supported yet.
52
52
53
53
## How do I add or remove a key encryption key if I didn't originally use one?
0 commit comments