Skip to content

Commit 3661668

Browse files
authored
Merge pull request #278394 from sreekzz/Freshness-MS-Date-Change
MS Freshness Date Change
2 parents 76f2506 + f77bd6d commit 3661668

File tree

59 files changed

+100
-100
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+100
-100
lines changed

articles/hdinsight/apache-ambari-email.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: 'Tutorial: Configure Apache Ambari email notifications in Azure HDInsight
33
description: This article describes how to use SendGrid with Apache Ambari for email notifications.
44
ms.service: hdinsight
55
ms.topic: tutorial
6-
ms.date: 05/25/2023
6+
ms.date: 06/15/2024
77

88
#Customer intent: As a HDInsight user, I want to configure Apache Ambari to send email notifications.
99
---
@@ -36,7 +36,7 @@ In this tutorial, you learn how to:
3636

3737
1. From the Overview page, click **Open SaaS Account on publisher’s site**, to go the SendGrid webpage for your account.
3838

39-
:::image type="content" source="./media/apache-ambari-email/azure-portal-sendgrid-manage.png" alt-text="SendGrid overview in azure portal.":::
39+
:::image type="content" source="./media/apache-ambari-email/azure-portal-sendgrid-manage.png" alt-text="SendGrid overview in Azure portal.":::
4040

4141
1. From the left menu, navigate to your **Settings** and then **API Keys**.
4242

articles/hdinsight/apache-ambari-usage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@ title: Apache Ambari usage in Azure HDInsight
33
description: Discussion of how Apache Ambari is used in Azure HDInsight.
44
ms.service: hdinsight
55
ms.topic: conceptual
6-
ms.date: 05/10/2023
6+
ms.date: 06/15/2024
77
---
88

99
# Apache Ambari usage in Azure HDInsight
1010

11-
HDInsight uses Apache Ambari for cluster deployment and management. Ambari agents run on every node (headnode, worker node, zookeeper, and edgenode if exists). Ambari server runs only on headnode. Only one instance of Ambari server shall run at one time. This is controlled by HDInsight failover controller. When one of the headnodes is down for reboot or maintenance, the other headnode will become active and Ambari server on the second headnode will be started.
11+
HDInsight uses Apache Ambari for cluster deployment and management. Ambari agents run on every node provided if headnode, worker node, zookeeper, and edgenode are present. Ambari server runs only on headnode. Only one instance of Ambari server shall run at one time. This is controlled by HDInsight failover controller. When one of the headnodes is down for reboot or maintenance, the other headnode will become active and Ambari server on the second headnode will be started.
1212

1313
All cluster configuration should be done through the [Ambari UI](./hdinsight-hadoop-manage-ambari.md), any local change will be overwritten when the node is restarted.
1414

articles/hdinsight/cluster-availability-monitor-logs.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: How to monitor cluster availability with Azure Monitor logs in HDInsight
33
description: Learn how to use Azure Monitor logs to monitor cluster health and availability.
44
ms.service: hdinsight
55
ms.topic: how-to
6-
ms.date: 05/23/2023
6+
ms.date: 06/15/2024
77
---
88

99
# How to monitor cluster availability with Azure Monitor logs in HDInsight
@@ -100,7 +100,7 @@ After these blades close, you should see your action group listed under the **Ac
100100
:::image type="content" source="media/cluster-availability-monitor-logs/portal-create-alert-rule-finish.png" alt-text="Portal creates alert rule finish.":::
101101

102102
> [!TIP]
103-
> The ability to specify **Severity** is a powerful tool that can be used when creating multiple alerts. For example, you could create one alert to raise a Warning (Sev 1) if a single head node goes down and another alert that raises Critical (Sev 0) in the unlikely event that both head nodes go down.
103+
> The ability to specify **Severity** is a powerful tool that can be used when creating multiple alerts. For example, you could create one alert to raise a Warning (severity 1) if a single head node goes down and another alert that raises Critical (severity 1) in the unlikely event that both head nodes go down.
104104
105105
When the condition for this alert is met, the alert will fire and you'll receive an email with the alert details like this:
106106

@@ -110,9 +110,9 @@ You can also view all alerts that have fired, grouped by severity, by going to *
110110

111111
:::image type="content" source="media/cluster-availability-monitor-logs/hdi-portal-oms-alerts.png" alt-text="Log Analytics workspace alerts.":::
112112

113-
Selecting on a severity grouping (i.e. **Sev 1,** as highlighted above) will show records for all alerts of that severity that have fired like below:
113+
When you select on a severity group (i.e. **severity 1,** as highlighted above) it will show records for all alerts of that severity that have fired like below:
114114

115-
:::image type="content" source="media/cluster-availability-monitor-logs/portal-oms-alerts-sev1.png" alt-text="Log Analytics workspace sev one alert.":::
115+
:::image type="content" source="media/cluster-availability-monitor-logs/portal-oms-alerts-sev1.png" alt-text="Screenshot showing Log Analytics workspace severity one alert.":::
116116

117117
## Next steps
118118

articles/hdinsight/cluster-reboot-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to reboot unresponsive VMs for Azure HDInsight clusters.
44
ms.custom: hdinsightactive
55
ms.service: hdinsight
66
ms.topic: how-to
7-
ms.date: 05/25/2023
7+
ms.date: 06/15/2024
88
---
99

1010
# Reboot VMs for HDInsight clusters

articles/hdinsight/connect-on-premises-network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to create an HDInsight cluster in an Azure Virtual Networ
44
ms.service: hdinsight
55
ms.topic: how-to
66
ms.custom: hdinsightactive
7-
ms.date: 05/23/2023
7+
ms.date: 06/15/2024
88
---
99

1010
# Connect HDInsight to your on-premises network

articles/hdinsight/control-network-traffic.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Control network traffic in Azure HDInsight
33
description: Learn techniques for controlling inbound and outbound traffic to Azure HDInsight clusters.
44
ms.service: hdinsight
55
ms.topic: conceptual
6-
ms.date: 05/23/2023
6+
ms.date: 06/15/2024
77
---
88

99
# Control network traffic in Azure HDInsight
@@ -26,7 +26,7 @@ If you plan on using **network security groups** to control network traffic, per
2626

2727
2. Identify the service tags required by HDInsight for your region. There are multiple ways to obtain these service tags:
2828
1. Consult the list of published service tags in [Network security group (NSG) service tags for Azure HDInsight](hdinsight-service-tags.md).
29-
2. If your region is not present in the list, use the [Service Tag Discovery API](../virtual-network/service-tags-overview.md#use-the-service-tag-discovery-api) to find a service tag for your region.
29+
2. If your region isn't present in the list, use the [Service Tag Discovery API](../virtual-network/service-tags-overview.md#use-the-service-tag-discovery-api) to find a service tag for your region.
3030
3. If you are unable to use the API, download the [service tag JSON file](../virtual-network/service-tags-overview.md#discover-service-tags-by-using-downloadable-json-files) and search for your desired region.
3131

3232

@@ -44,9 +44,9 @@ For more information on controlling outbound traffic from HDInsight clusters, se
4444

4545
Forced tunneling is a user-defined routing configuration where all traffic from a subnet is forced to a specific network or location, such as your on-premises network or Firewall. Forced tunneling of all data transfer back to on-premises is _not_ recommended due to large volumes of data transfer and potential performance impact.
4646

47-
Customers who are interested to setup forced tunneling, should use [custom metastores](./hdinsight-use-external-metadata-stores.md) and setup the appropriate connectivity from the cluster subnet or on-premises network to these custom metastores.
47+
Customers who are interested to set up forced tunneling, should use [custom metastores](./hdinsight-use-external-metadata-stores.md) and set up the appropriate connectivity from the cluster subnet or on-premises network to these custom metastores.
4848

49-
To see an example of the UDR setup with Azure Firewall, see [Configure outbound network traffic restriction for Azure HDInsight clusters](hdinsight-restrict-outbound-traffic.md).
49+
To see an example of the UDR set up with Azure Firewall, see [Configure outbound network traffic restriction for Azure HDInsight clusters](hdinsight-restrict-outbound-traffic.md).
5050

5151
## Required ports
5252

articles/hdinsight/create-cluster-error-dictionary.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to troubleshoot errors that occur when creating Azure HDI
44
ms.service: hdinsight
55
ms.topic: troubleshooting
66
ms.custom: hdinsightactive
7-
ms.date: 05/18/2023
7+
ms.date: 06/15/2024
88
---
99

1010

articles/hdinsight/disk-encryption.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure HDInsight
44
description: This article describes the two layers of encryption available for data at rest on Azure HDInsight clusters.
55
ms.service: hdinsight
66
ms.topic: conceptual
7-
ms.date: 05/23/2023
7+
ms.date: 06/15/2024
88
ms.custom: devx-track-azurepowershell, devx-track-azurecli
99
ms.devlang: azurecli
1010
---
@@ -28,8 +28,8 @@ These types are summarized in the following table.
2828

2929
|Cluster type |OS Disk (Managed disk) |Data disk (Managed disk) |Temp data disk (Local SSD) |
3030
|---|---|---|---|
31-
|Kafka, HBase with Accelerated writes|Layer1: [SSE Encryption](../virtual-machines/managed-disks-overview.md#encryption) by default|Layer1: [SSE Encryption](../virtual-machines/managed-disks-overview.md#encryption) by default, Layer2: Optional encryption at rest using CMK|Layer1: Optional Encryption at host using PMK, Layer2: Optional encryption at rest using CMK|
32-
|All other clusters (Spark, Interactive, Hadoop, HBase without Accelerated writes)|Layer1: [SSE Encryption](../virtual-machines/managed-disks-overview.md#encryption) by default|N/A|Layer1: Optional Encryption at host using PMK, Layer2: Optional encryption at rest using CMK|
31+
|Kafka, HBase with Accelerated writes|Layer 1: [SSE Encryption](../virtual-machines/managed-disks-overview.md#encryption) by default|Layer 1: [SSE Encryption](../virtual-machines/managed-disks-overview.md#encryption) by default, Layer 2: Optional encryption at rest using CMK|Layer 1: Optional Encryption at host using PMK, Layer 2: Optional encryption at rest using CMK|
32+
|All other clusters (Spark, Interactive, Hadoop, HBase without Accelerated writes)|Layer 1: [SSE Encryption](../virtual-machines/managed-disks-overview.md#encryption) by default|N/A|Layer 1: Optional Encryption at host using PMK, Layer 2: Optional encryption at rest using CMK|
3333

3434
## Encryption at rest using Customer-managed keys
3535

articles/hdinsight/domain-joined/apache-domain-joined-architecture.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to plan Azure HDInsight security with Enterprise Security
44
ms.service: hdinsight
55
ms.topic: conceptual
66
ms.custom: hdinsightactive, has-azure-ad-ps-ref
7-
ms.date: 05/11/2023
7+
ms.date: 06/15/2024
88
---
99

1010
# Use Enterprise Security Package in HDInsight
@@ -55,11 +55,11 @@ Because Kerberos relies on password hashes, you must [enable password hash sync
5555

5656
If you're using federation with Active Directory Federation Services (AD FS), you must enable password hash sync. (For a recommended setup, see [this video](https://youtu.be/qQruArbu2Ew).) Password hash sync helps with disaster recovery in case your AD FS infrastructure fails, and it also helps provide leaked-credential protection. For more information, see [Enable password hash sync with Microsoft Entra Connect Sync](../../active-directory/hybrid/how-to-connect-password-hash-synchronization.md).
5757

58-
Using on-premises Active Directory or Active Directory on IaaS VMs alone, without Microsoft Entra ID and Microsoft Entra Domain Services, isn't a supported configuration for HDInsight clusters with ESP.
58+
When you use on-premises Active Directory or Active Directory on IaaS VMs alone, without Microsoft Entra ID and Microsoft Entra Domain Services, isn't a supported configuration for HDInsight clusters with ESP.
5959

6060
[!INCLUDE [Azure AD PowerShell deprecation note](~/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
6161

62-
If federation is being used and password hashes are synced correctly, but you're getting authentication failures, check if cloud password authentication is enabled for the PowerShell service principal. If not, you must set a [Home Realm Discovery (HRD) policy](../../active-directory/manage-apps/configure-authentication-for-federated-users-portal.md) for your Microsoft Entra tenant. To check and set the HRD policy:
62+
If you use federation and password hashes are synced correctly, but you're getting authentication failures, check if cloud password authentication is enabled for the PowerShell service principal. If not, you must set a [Home Realm Discovery (HRD) policy](../../active-directory/manage-apps/configure-authentication-for-federated-users-portal.md) for your Microsoft Entra tenant. To check and set the HRD policy:
6363

6464
1. Install the preview [Azure AD PowerShell module](/powershell/azure/active-directory/install-adv2).
6565

articles/hdinsight/domain-joined/apache-domain-joined-manage.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: Manage Enterprise Security Package clusters - Azure HDInsight
33
description: Learn how to manage Azure HDInsight clusters with Enterprise Security Package.
44
ms.service: hdinsight
55
ms.topic: how-to
6-
ms.date: 05/24/2023
6+
ms.date: 06/15/2024
77
---
88

99
# Manage HDInsight clusters with Enterprise Security Package
1010

1111
Learn the users and the roles in HDInsight Enterprise Security Package (ESP), and how to manage ESP clusters.
1212

13-
## Use VSCode to link to domain joined cluster
13+
## Use VS Code to link to domain joined cluster
1414

1515
You can link a normal cluster by using Apache Ambari managed username, also link a security Apache Hadoop cluster by using domain username (such as: `[email protected]`).
1616

@@ -72,7 +72,7 @@ If you have Beeline installed locally, and connect over an Azure Virtual Network
7272
Connection string: -u 'jdbc:hive2://<headnode-FQDN>:10001/;transportMode=http'
7373
```
7474

75-
To find the fully qualified domain name of a headnode, use the information in the Manage HDInsight using the Ambari REST API document.
75+
To find the fully qualified domain name of a headnode, use the information in the Managed HDInsight using the Ambari REST API document.
7676

7777
## Users of HDInsight clusters with ESP
7878

@@ -91,9 +91,9 @@ A HDInsight cluster with ESP has three new users in addition to Ambari Admin.
9191

9292
Note the other AD users also have these privileges.
9393

94-
There are some end points within the cluster (for example, Templeton) which are not managed by Ranger, and hence aren't secure. These end points are locked down for all users except the cluster admin domain user.
94+
There are some end points within the cluster (for example, Templeton) which aren't managed by Ranger, and hence secure. These end points are locked down for all users except the cluster admin domain user.
9595

96-
- **Regular**: During cluster creation, you can provide multiple active directory groups. The users in these groups are synced to Ranger and Ambari. These users are domain users and have access to only Ranger-managed endpoints (for example, Hiveserver2). All the RBAC policies and auditing will be applicable to these users.
96+
- **Regular**: During cluster creation, you can provide multiple active directory groups. The users in these groups are synced to Ranger and Ambari. These users are domain users and have access to only Ranger-managed endpoints (for example, `Hiveserver2`). All the RBAC policies and auditing will be applicable to these users.
9797

9898
## Roles of HDInsight clusters with ESP
9999

0 commit comments

Comments
 (0)