Skip to content

Commit 2a66ac6

Browse files
committed
edit pass: six-azure-managed-instance-for-apache-cassandra-articles
1 parent b042d29 commit 2a66ac6

File tree

3 files changed

+79
-72
lines changed

3 files changed

+79
-72
lines changed

articles/managed-instance-apache-cassandra/jaeger.md

Lines changed: 23 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -11,27 +11,27 @@ ms.date: 12/08/2023
1111

1212
# Run Jaeger with Azure Managed Instance for Apache Cassandra
1313

14-
Jaeger, a distributed tracing platform for monitoring microservices, enables the fast identification of performance challenges and optimization. Through features, like tracing instrumentation and logging integration.
15-
16-
The article specifically details the use of the sample application HotROD and Jaeger alongside Azure Managed Instance for Apache Cassandra for efficient storage monitoring.
14+
Jaeger is a distributed tracing platform for monitoring microservices. It enables the fast identification of performance challenges and optimization through features like tracing instrumentation and logging integration.
1715

16+
The article details the use of the sample application HotROD and Jaeger alongside Azure Managed Instance for Apache Cassandra for efficient storage monitoring.
1817

1918
## Prerequisites and setup
20-
* [Create an Azure Managed Instance for Apache Cassandra cluster](create-cluster-cli.md).
21-
* [Ensure Docker is installed](https://www.docker.com/get-started/).
2219

20+
* [Create an Azure Managed Instance for Apache Cassandra cluster](create-cluster-cli.md).
21+
* [Ensure that Docker is installed](https://www.docker.com/get-started/).
2322

2423
## Use Jaeger with Azure Managed Instance for Apache Cassandra
24+
2525
1. [Download the Jaeger repository](https://github.com/jaegertracing/jaeger.git).
26-
1. Navigate to the docker-compose folder `cd jaeger\docker-compose`.
27-
1. Add your Azure Managed Instance Cassandra cluster credentials to the `jaeger-collector and jaeger-query` section within the `jaeger-docker-compose.yml` file:
26+
1. Go to the *docker-compose* folder: `cd jaeger\docker-compose`.
27+
1. In the *jaeger-docker-compose.yml* file, add your Azure Managed Instance for Apache Cassandra cluster credentials to the `jaeger-collector` and `jaeger-query` sections:
2828

2929
```yml
3030
command: ["--cassandra.port=9042", "--cassandra.servers=seed_nodes_mi_datacenters", "--cassandra.username=cassandra", "--cassandra.password=cassandra_mi_password","--cassandra.tls.skip-host-verify","--cassandra.tls.enabled",
3131
"--cassandra.keyspace=jaeger_v1_dc1" ]
32-
```
32+
```
3333

34-
1. Additionally, add the environment variables to the `cassandra-schema and jaeger-collector`:`
34+
1. Add the environment variables to the `cassandra-schema` and `jaeger-collector` sections:
3535

3636
```yml
3737
environment:
@@ -41,7 +41,9 @@ The article specifically details the use of the sample application HotROD and Ja
4141
- CQLSH_SSL=--ssl
4242
...
4343
```
44-
1. To connect your Azure Managed Instance Cassandra cluster, add the Cassandra sign-in credentials to the `cassandra-schema`:
44+
45+
1. To connect your Azure Managed Instance Cassandra cluster, add the Cassandra sign-in credentials to the `cassandra-schema` section:
46+
4547
```yml
4648
environment:
4749
...
@@ -51,25 +53,30 @@ The article specifically details the use of the sample application HotROD and Ja
5153
- CASSANDRA_USERNAME=cassandra
5254
...
5355
```
56+
5457
1. Run `docker-compose -f jaeger-docker-compose.yml up -d` to start the application.
5558

56-
:::image type="content" source="./media/jaeger/jaeger-running.png" alt-text="Screenshot of running jaeger." lightbox="./media/jaeger/jaeger-running.png" border="true":::
59+
:::image type="content" source="./media/jaeger/jaeger-running.png" alt-text="Screenshot of a running Jaeger application." lightbox="./media/jaeger/jaeger-running.png" border="true":::
5760

5861
> [!TIP]
59-
> Five containers are created, and you should be able to access the test application at http://localhost:8080/ to generate traces that can be viewed at http://localhost:16686/search.
62+
> Five containers are created, and you should be able to access the test application at `http://localhost:8080/` to generate traces that can be viewed at `http://localhost:16686/search`.
6063

6164
1. Once the containers are running, access the Jaeger UI to view traces from the application.
65+
6266
:::image type="content" source="./media/jaeger/jaeger-page-1.png" alt-text="Screenshot of jaeger web interface." lightbox="./media/jaeger/jaeger-page-1.png" border="true":::
6367

6468
1. Verify by inspecting your Azure Managed Instance cluster.
69+
6570
:::image type="content" source="./media/jaeger/jaeger-table-1.png" alt-text="Screenshot of jaeger tables in managed instance cluster." lightbox="./media/jaeger/jaeger-table-1.png" border="true":::
6671

67-
1. Refer to the traces table to view the data related to step 7.
72+
1. Refer to the traces table to view the data related to step 7.
73+
6874
:::image type="content" source="./media/jaeger/jaeger-table-2.png" alt-text="Screenshot of jaeger trace table." lightbox="./media/jaeger/jaeger-table-2.png" border="true":::
6975

76+
## Support
7077

71-
## FAQs
72-
If you encounter issues running or testing Jaeger, open a support ticket. Provide the subscription ID and account name where your Jaeger test is running.
78+
If you have problems running or testing Jaeger, open a support ticket. Provide the subscription ID and account name where your Jaeger test is running.
7379

7480
## Next steps
75-
- Learn about [hybrid cluster configuration](configure-hybrid-cluster.md) in Azure Managed Instance for Apache Cassandra.
81+
82+
* Learn about [hybrid cluster configuration](configure-hybrid-cluster.md) in Azure Managed Instance for Apache Cassandra.
Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Use VPN with Azure Managed Instance for Apache Cassandra
3-
description: Discover how to secure your cluster with vpn when you use Azure Managed Instance for Apache Cassandra.
2+
title: Use a VPN with Azure Managed Instance for Apache Cassandra
3+
description: Discover how to secure your cluster with a VPN when you use Azure Managed Instance for Apache Cassandra.
44
author: IriaOsara
55
ms.author: iriaosara
66
ms.service: managed-instance-apache-cassandra
@@ -9,20 +9,18 @@ ms.date: 02/08/2024
99
ms.devlang: azurecli
1010

1111
---
12-
# Use VPN with Azure Managed Instance for Apache Cassandra
12+
# Use a VPN with Azure Managed Instance for Apache Cassandra
1313

14-
Azure Managed Instance for Apache Cassandra nodes requires access to many other Azure services when injected into your VNet. Normally this is enabled by ensuring your VNet has outbound access to the internet. If your security policy prohibits outbound access, you can also configure firewall rules or UDRs for the appropriate access, for more information, see [here](network-rules.md).
14+
Azure Managed Instance for Apache Cassandra nodes require access to many other Azure services when they're injected into your virtual network. Normally, you enable this access by ensuring that your virtual network has outbound access to the internet. If your security policy prohibits outbound access, you can configure firewall rules or user-defined routes for the appropriate access. For more information, see [Required outbound network rules](network-rules.md).
1515

16-
However, if you have internal security concerns around data exfiltration, your security policy might also even prohibit direct access to these services from your VNet. By using a VPN with your Azure Managed Instance for Apache Cassandra, you can ensure that data nodes in the VNet communicate only to a single secure VPN endpoint, with no direct access to any other services.
16+
However, if you have internal security concerns about data exfiltration, your security policy might prohibit direct access to these services from your virtual network. By using a virtual private network (VPN) with Azure Managed Instance for Apache Cassandra, you can ensure that data nodes in the virtual network communicate with only a single VPN endpoint, with no direct access to any other services.
1717

1818
> [!IMPORTANT]
19-
> Using VPN with Azure Managed Instance for Apache Cassandra is in public preview.
20-
> This feature is provided without a service level agreement, and it's not recommended for production workloads.
21-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
19+
> The ability to use a VPN with Azure Managed Instance for Apache Cassandra is in public preview. This feature is provided without a service-level agreement, and we don't recommend it for production workloads. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2220
23-
## How to use VPN with Azure Managed Instance for Apache Cassandra
21+
## How to use a VPN with Azure Managed Instance for Apache Cassandra
2422

25-
1. Create a cluster of Cassandra Managed Instance using "VPN" as the value for the `--azure-connection-method` option:
23+
1. Create an Azure Managed Instance for Apache Cassandra cluster by using `"VPN"` as the value for the `--azure-connection-method` option:
2624

2725
```bash
2826
az managed-cassandra cluster create \
@@ -33,26 +31,28 @@ However, if you have internal security concerns around data exfiltration, your s
3331
--initial-cassandra-admin-password "password"
3432
```
3533

36-
1. Use the following command to see the cluster properties. From the output, make a copy of the `privateLinkResourceId` ID:
34+
1. Use the following command to see the cluster properties:
3735

3836
```bash
3937
az managed-cassandra cluster show \
4038
--resource-group "vpn-test-rg" \
4139
--cluster-name "vpn-test-cluster"
4240
```
4341

44-
1. On the portal, [create a private endpoint](../cosmos-db/how-to-configure-private-endpoints.md)
45-
1. On the Resource tab, select "Connect to an Azure resource by resource ID or alias." as the connection method and `Microsoft.Network/privateLinkServices` as the resource type. Enter the `privateLinkResourceId` from step (2).
46-
1. On the Virtual Network tab, select your virtual network's subnet and make sure to select the option for "Statically allocate IP address."
42+
From the output, make a copy of the `privateLinkResourceId` ID.
43+
44+
1. In the Azure portal, [create a private endpoint](../cosmos-db/how-to-configure-private-endpoints.md) by using these details:
45+
1. On the **Resource** tab, select **Connect to an Azure resource by resource ID or alias** as the connection method and **Microsoft.Network/privateLinkServices** as the resource type. Enter the `privateLinkResourceId` value from the previous step.
46+
1. On the **Virtual Network** tab, select your virtual network's subnet, and select the **Statically allocate IP address** option.
4747
1. Validate and create.
4848
4949
> [!NOTE]
50-
> At the moment, the connection between our management service and your private endpoint requires the Azure Managed Instance for Apache Cassandra team [email protected] to approve it.
51-
52-
1. Get the IP address of your private endpoint NIC.
50+
> At the moment, the connection between the management service and your private endpoint requires approval from the [Azure Managed Instance for Apache Cassandra team](mailto:[email protected]).
5351
54-
1. Create a new data center using the IP address from (5) as the `--private-endpoint-ip-address` parameter.
52+
1. Get the IP address of your private endpoint's network interface.
5553

54+
1. Create a new datacenter by using the IP address from the previous step as the `--private-endpoint-ip-address` parameter.
5655

5756
## Next steps
57+
5858
- Learn about [hybrid cluster configuration](configure-hybrid-cluster.md) in Azure Managed Instance for Apache Cassandra.

0 commit comments

Comments
 (0)