Skip to content

Commit 21f559c

Browse files
author
Larry Franks
committed
Merge branch 'master' of github.com:MicrosoftDocs/azure-docs-pr
into event-grid
2 parents 68d79be + 3e5ce35 commit 21f559c

File tree

6 files changed

+12
-33
lines changed

6 files changed

+12
-33
lines changed

articles/index.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5637,19 +5637,21 @@ featureFlags:
56375637
<div class="cardSize">
56385638
<div class="cardPadding">
56395639
<div class="card">
5640+
<div class="cardImageOuter">
56405641
<div class="cardImage">
56415642
<img src="media/index/peering-service.svg" alt="" />
56425643
</div>
5643-
</div>
5644-
<div class="cardText">
5644+
</div>
5645+
<div class="cardText">
56455646
<h3>Peering Service</h3>
56465647
<p>Get optimal internet connectivity to access the Microsoft network</p>
5648+
</div>
56475649
</div>
56485650
</div>
56495651
</div>
56505652
</a>
56515653
</li>
5652-
</ul>
5654+
</ul>
56535655
</li>
56545656
<li>
56555657
<a href="#security">Security</a>

articles/internet-analyzer/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
- name: Create an Internet Analyzer test using Portal
1010
href: internet-analyzer-create-test-portal.md
1111
- name: Create an Internet Analyzer test using CLI
12-
herf: internet-analyzer-cli.md
12+
href: internet-analyzer-cli.md
1313
- name: How-to guides
1414
items:
1515
- name: Embed client

articles/openshift/howto-setup-environment.md

Lines changed: 1 addition & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: openshift
55
keywords: red hat openshift setup set up
66
author: jimzim
77
ms.author: jzim
8-
ms.date: 05/10/2019
8+
ms.date: 11/04/2019
99
ms.topic: conceptual
1010
ms.service: container-service
1111
manager: jeconnoc
@@ -16,7 +16,6 @@ manager: jeconnoc
1616

1717
To build and run Microsoft Azure Red Hat OpenShift applications, you'll need to:
1818

19-
* Purchase Azure virtual machine reserved instances.
2019
* Install version 2.0.65 (or higher) of the Azure CLI (or use the Azure Cloud Shell).
2120
* Register for the `AROGA` feature and associated resource providers.
2221
* Create an Azure Active Directory (Azure AD) tenant.
@@ -25,16 +24,6 @@ To build and run Microsoft Azure Red Hat OpenShift applications, you'll need to:
2524

2625
The following instructions will walk you through all of these prerequisites.
2726

28-
## Purchase Azure Red Hat OpenShift application nodes reserved instances
29-
30-
Before you can use Azure Red Hat OpenShift, you'll need to purchase a minimum of 4 Azure Red Hat OpenShift reserved application nodes, after which you'll be able to provision clusters.
31-
32-
If you are an Azure customer, [purchase Azure Red Hat OpenShift reserved instances](https://aka.ms/openshift/buy) through the Azure portal. After purchasing, your subscription will be activated within 24 hours.
33-
34-
If you are not an Azure customer, [contact sales](https://aka.ms/openshift/contact-sales) and fill out the sales form at the bottom of the page to start the process.
35-
36-
Refer to the [Azure Red Hat OpenShift pricing page](https://aka.ms/openshift/pricing) for more information.
37-
3827
## Install the Azure CLI
3928

4029
Azure Red Hat OpenShift requires version 2.0.65 or higher of the Azure CLI. If you've already installed the Azure CLI, you can check which version you have by running:

articles/openshift/openshift-faq.md

Lines changed: 1 addition & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,23 +7,13 @@ ms.author: jzim
77
manager: jeconnoc
88
ms.service: container-service
99
ms.topic: article
10-
ms.date: 05/08/2019
10+
ms.date: 11/04/2019
1111
---
1212

1313
# Azure Red Hat OpenShift FAQ
1414

1515
This article addresses frequently asked questions (FAQs) about Microsoft Azure Red Hat OpenShift.
1616

17-
## How do I get started?
18-
19-
Before you can use Azure Red Hat OpenShift, you'll need to purchase a minimum of 4 Azure Red Hat OpenShift reserved application nodes.
20-
21-
If you are an Azure customer,[purchase Azure Red Hat OpenShift reserved instances](https://aka.ms/openshift/buy) through the Azure portal. After purchasing, your subscription will be activated within 24 hours, after which you'll be able to provision clusters.
22-
23-
If you are not an Azure customer, [contact sales](https://aka.ms/openshift/contact-sales) and fill out the sales form at the bottom of the page to start the process.
24-
25-
Refer to the [Azure Red Hat OpenShift pricing page](https://aka.ms/openshift/pricing) for more information.
26-
2717
## Which Azure regions are supported?
2818

2919
See [Supported resources](supported-resources.md#azure-regions) for a list of global regions where Azure Red Hat OpenShift is supported.

articles/openshift/tutorial-create-cluster.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: jzim
77
manager: jeconnoc
88
ms.topic: tutorial
99
ms.service: container-service
10-
ms.date: 05/14/2019
10+
ms.date: 11/04/2019
1111
#Customer intent: As a developer, I want learn how to create an Azure Red Hat OpenShift cluster, scale it, and then clean up resources so that I am not charged for what I'm not using.
1212
---
1313

@@ -30,8 +30,6 @@ In this tutorial series you learn how to:
3030

3131
> [!IMPORTANT]
3232
> This tutorial requires version 2.0.65 of the Azure CLI.
33-
>
34-
> Before you can use Azure Red Hat OpenShift, you'll need to purchase a minimum of 4 Azure Red Hat OpenShift reserved application nodes as described in [Set up your Azure Red Hat OpenShift development environment](howto-setup-environment.md#purchase-azure-red-hat-openshift-application-nodes-reserved-instances).
3533
3634
Before you begin this tutorial:
3735

articles/sql-database/transparent-data-encryption-azure-sql.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
author: aliceku
1111
ms.author: aliceku
1212
ms.reviewer: vanto
13-
ms.date: 08/27/2019
13+
ms.date: 11/01/2019
1414
---
1515
# Transparent data encryption for SQL Database and Data Warehouse
1616

@@ -36,10 +36,10 @@ Microsoft also seamlessly moves and manages the keys as needed for geo-replicati
3636
3737
## Customer-managed transparent data encryption - Bring Your Own Key
3838

39-
[TDE with customer-managed keys in Azure Key Vault](transparent-data-encryption-byok-azure-sql.md) allows to encrypt the Database Encryption Key (DEK) with a customer-managed asymmetric key called TDE Protector. This is also generally referred to as Bring Your Own Key (BYOK) support for Transparent Data Encryption. In the BYOK scenario, the TDE Protector is stored in a customer-owned and managed [Azure Key Vault](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault), Azure’s cloud-based external key management system. The TDE Protector can be [generated by the key vault or transferred to the key vault](https://docs.microsoft.com/azure/key-vault/about-keys-secrets-and-certificates#key-vault-keys) from an on premises HSM device. The TDE DEK, which is stored on the boot page of a database, is encrypted and decrypted by the TDE Protector, which is stored in Azure Key Vault and never leaves the key vault. SQL Database needs to be granted permissions to the customer-owned key vault to decrypt and encrypt the DEK. If permissions of the logical SQL server to the key vault are revoked, a database will be inaccessible and all data is encrypted. For Azure SQL Database, the TDE protector is set at the logical SQL server level and is inherited by all databases associated with that server. For [Azure SQL Managed Instance](https://docs.microsoft.com/azure/sql-database/sql-database-howto-managed-instance) (BYOK feature in preview), the TDE protector is set at the instance level and it is inherited by all *encrypted* databases on that instance. The term *server* refers both to server and instance throughout this document, unless stated differently.
39+
[TDE with customer-managed keys in Azure Key Vault](transparent-data-encryption-byok-azure-sql.md) allows to encrypt the Database Encryption Key (DEK) with a customer-managed asymmetric key called TDE Protector. This is also generally referred to as Bring Your Own Key (BYOK) support for Transparent Data Encryption. In the BYOK scenario, the TDE Protector is stored in a customer-owned and managed [Azure Key Vault](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault), Azure’s cloud-based external key management system. The TDE Protector can be [generated by the key vault or transferred to the key vault](https://docs.microsoft.com/azure/key-vault/about-keys-secrets-and-certificates#key-vault-keys) from an on premises HSM device. The TDE DEK, which is stored on the boot page of a database, is encrypted and decrypted by the TDE Protector, which is stored in Azure Key Vault and never leaves the key vault. SQL Database needs to be granted permissions to the customer-owned key vault to decrypt and encrypt the DEK. If permissions of the logical SQL server to the key vault are revoked, a database will be inaccessible and all data is encrypted. For Azure SQL Database, the TDE protector is set at the logical SQL server level and is inherited by all databases associated with that server. For [Azure SQL Managed Instance](https://docs.microsoft.com/azure/sql-database/sql-database-howto-managed-instance), the TDE protector is set at the instance level and it is inherited by all *encrypted* databases on that instance. The term *server* refers both to server and instance throughout this document, unless stated differently.
4040

4141
With TDE with Azure Key Vault integration, users can control key management tasks including key rotations, key vault permissions, key backups, and enable auditing/reporting on all TDE protectors using Azure Key Vault functionality. Key Vault provides central key management, leverages tightly monitored hardware security modules (HSMs), and enables separation of duties between management of keys and data to help meet compliance with security policies.
42-
To learn more about transparent data encryption with Azure Key Vault integration (Bring Your Own Key support) for Azure SQL Database, SQL Managed Instance (BYOK feature in preview), and Data Warehouse, see [Transparent data encryption with Azure Key Vault integration](transparent-data-encryption-byok-azure-sql.md).
42+
To learn more about transparent data encryption with Azure Key Vault integration (Bring Your Own Key support) for Azure SQL Database, SQL Managed Instance, and Data Warehouse, see [Transparent data encryption with Azure Key Vault integration](transparent-data-encryption-byok-azure-sql.md).
4343

4444
To start using transparent data encryption with Azure Key Vault integration (Bring Your Own Key support), see the how-to guide [Turn on transparent data encryption by using your own key from Key Vault by using PowerShell](transparent-data-encryption-byok-azure-sql-configure.md).
4545

0 commit comments

Comments
 (0)