Skip to content

Commit 409fe4c

Browse files
authored
Merge pull request #211322 from Padmalathas/Padmalathas-migration-edits
Corrected Validation Errors
2 parents 5e0190d + 736579e commit 409fe4c

11 files changed

+326
-0
lines changed

articles/batch/TOC.yml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -103,6 +103,18 @@
103103
href: high-availability-disaster-recovery.md
104104
- name: Task runtime environment variables
105105
href: batch-compute-node-environment-variables.md
106+
- name: Retirements
107+
items:
108+
- name: Batch Certificates Migration Guide
109+
href: batch-certificate-migration-guide.md
110+
- name: Batch pools without public IP addresses classic Retirement Migration Guide
111+
href: batch-pools-without-public-IP-addresses-classic-retirement-migration-guide.md
112+
- name: Batch TLS 1.0_1 Migration Guide
113+
href: batch-tls-101-migration-guide.md
114+
- name: Job Pool Lifetime Statistics Migration Guide
115+
href: job-pool-lifetime-statistics-migration-guide.md
116+
- name: Low Priority VMs Retirement Migration Guide
117+
href: low-priority-VMs-retirement-migration-guide.md
106118
- name: How-to guides
107119
items:
108120
- name: Manage Batch accounts
Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
---
2+
title: Batch Certificate Migration Guide
3+
description: Describes the migration steps for the batch certificates and the end of support details.
4+
author: harperche
5+
ms.author: harpercheng
6+
ms.service: batch
7+
ms.topic: how-to #Required; leave this attribute/value as-is.
8+
ms.date: 08/15/2022
9+
---
10+
# Batch Certificate Migration Guide
11+
12+
Securing the application and critical information has become essential in today's needs. With growing customers and increasing demand for security, managing key information plays a significant role in securing data. Many customers need to store secure data in the application, and it needs to be managed to avoid any leakage. In addition, only legitimate administrators or authorized users should access it. Azure Batch offers Certificates created and managed by the Batch service. Azure Batch also provides a Key Vault option, and it's considered an azure-standard method for delivering more controlled secure access management.
13+
14+
Azure Batch provides certificates feature at the account level. Customers must generate the Certificate and upload it manually to the Azure Batch via the portal. To access the Certificate, it must be associated and installed for the 'Current User.' The Certificate is usually valid for one year and must follow a similar procedure every year.
15+
16+
For Azure Batch customers, a secure way of access should be provided in a more standardized way, reducing any manual interruption and reducing the readability of key generated. Therefore, we'll retire the certificate feature on **29 February 2024** to reduce the maintenance effort and better guide customers to use Azure Key Vault as a standard and more modern method with advanced security. After it's retired, the Certificate functionality may cease working properly. Additionally, pool creation with certificates will be rejected and possibly resize up.
17+
18+
## Retirement alternatives
19+
20+
Azure Key Vault is the service provided by Microsoft Azure to store and manage secrets, certificates, tokens, keys, and other configuration values that authenticated users access the applications and services. The original idea was to remove the hard-coded storing of these secrets and keys in the application code.
21+
22+
Azure Key Vault provides security at the transport layer by ensuring any data flow from the key vault to the client application is encrypted. Azure key vault stores the secrets and keys with such strong encryption that even Microsoft itself won't see the keys or secrets in any way.
23+
24+
Azure Key Vault provides a secure way to store the information and define the fine-grained access control. All the secrets can be managed from one dashboard. Azure Key Vault can store the key in the software-protected or hardware protected by hardware security module (HSMs) mechanism. In addition, it has a mechanism to auto-renew the Key Vault certificates.
25+
26+
## Migration steps
27+
28+
Azure Key Vault can be created in three ways:
29+
30+
1. Using Azure portal
31+
32+
2. Using PowerShell
33+
34+
3. Using CLI
35+
36+
**Create Azure Key Vault step by step procedure using Azure portal:**
37+
38+
__Prerequisite__: Valid Azure subscription and owner/contributor access on Key Vault service.
39+
40+
1. Log in to the Azure portal.
41+
42+
2. In the top-level search box, look for **Key Vaults**.
43+
44+
3. In the Key Vault dashboard, click on create and provide all the details like subscription, resource group, Key Vault name, select the pricing tier (standard/premium), and select region. Once all these details are provided, click on review, and create. This will create the Key Vault account.
45+
46+
4. Key Vault names need to be unique across the globe. Once any user has taken a name, it won’t be available for other users.
47+
48+
5. Now go to the newly created Azure Key Vault. There you can see the vault name and the vault URI used to access the vault.
49+
50+
**Create Azure Key Vault step by step using the Azure PowerShell:**
51+
52+
1. Log in to the user PowerShell using the following command - Login-AzAccount
53+
54+
2. Create an 'azure secure' resource group in the 'eastus' location. You can change the name and location as per your need.
55+
```
56+
New-AzResourceGroup -Name "azuresecure" -Location "EastUS"
57+
```
58+
3. Create the Azure Key Vault using the cmdlet. You need to provide the key vault name, resource group, and location.
59+
```
60+
New-AzKeyVault -Name "azuresecureKeyVault" -ResourceGroupName "azuresecure" -Location "East US"
61+
```
62+
63+
4. Created the Azure Key Vault successfully using the PowerShell cmdlet.
64+
65+
**Create Azure Key Vault step by step using the Azure CLI bash:**
66+
67+
1. Create an 'azure secure' resource in the 'eastus' location. You can change the name and location as per your need. Use the following bash command.
68+
```
69+
az group create –name "azuresecure" -l "EastUS."
70+
```
71+
72+
2. Create the Azure Key Vault using the bash command. You need to provide the key vault name, resource group, and location.
73+
```
74+
az keyvault create –name “azuresecureKeyVault” –resource-group “azure” –location “EastUS”
75+
```
76+
3. Successfully created the Azure Key Vault using the Azure CLI bash command.
77+
78+
## FAQ
79+
80+
1. Is Certificates or Azure Key Vault recommended?
81+
Azure Key Vault is recommended and essential to protect the data in the cloud.
82+
83+
2. Does user subscription mode support Azure Key Vault?
84+
Yes, it's mandatory to create Key Vault while creating the Batch account in user subscription mode.
85+
86+
3. Are there best practices to use Azure Key Vault?
87+
Best practices are covered [here](../key-vault/general/best-practices.md).
88+
89+
## Next steps
90+
91+
For more information, see [Certificate Access Control](../key-vault/certificates/certificate-access-control.md).
Lines changed: 74 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,74 @@
1+
---
2+
title: Batch Pools without Public IP Addresses Classic Retirement Migration Guide
3+
description: Describes the migration steps for the batch pool without public ip addresses and the end of support details.
4+
author: harperche
5+
ms.author: harpercheng
6+
ms.service: batch
7+
ms.topic: how-to #Required; leave this attribute/value as-is.
8+
ms.date: 09/01/2022
9+
---
10+
# Batch Pools without Public IP Addresses Classic Retirement Migration Guide
11+
12+
By default, all the compute nodes in an Azure Batch virtual machine (VM) configuration pool are assigned a public IP address. This address is used by the Batch service to schedule tasks and for communication with compute nodes, including outbound access to the internet. To restrict access to these nodes and reduce the discoverability of these nodes from the internet, we released [Batch pools without public IP addresses (classic)](./batch-pool-no-public-ip-address.md).
13+
14+
In late 2021, we launched a simplified compute node communication model for Azure Batch. The new communication model improves security and simplifies the user experience. Batch pools no longer require inbound Internet access and outbound access to Azure Storage, only outbound access to the Batch service. As a result, Batch pools without public IP addresses (classic) which is currently in public preview will be retired on **31 March 2023**, and will be replaced with simplified compute node communication pools without public IPs.
15+
16+
## Retirement alternatives
17+
18+
[Simplified Compute Node Communication Pools without Public IPs](./simplified-node-communication-pool-no-public-ip.md) requires using simplified compute node communication. It provides customers with enhanced security for their workload environments on network isolation and data exfiltration to Azure Batch accounts. Its key benefits include:
19+
20+
* Allow creating simplified node communication pool without public IP addresses.
21+
* Support Batch private pool using a new private endpoint (sub-resource nodeManagement) for Azure Batch account.
22+
* Simplified private link DNS zone for Batch account private endpoints: changed from **privatelink.\<region>.batch.azure.com** to **privatelink.batch.azure.com**.
23+
* Mutable public network access for Batch accounts.
24+
* Firewall support for Batch account public endpoints: configure IP address network rules to restrict public network access with Batch accounts.
25+
26+
## Migration steps
27+
28+
Batch pool without public IP addresses (classic) will retire on **31/2023 and will be updated to simplified compute node communication pools without public IPs. For existing pools that use the previous preview version of Batch pool without public IP addresses (classic), it's only possible to migrate pools created in a virtual network. To migrate the pool, follow the opt-in process for simplified compute node communication:
29+
30+
1. Opt in to [use simplified compute node communication](./simplified-compute-node-communication.md#opt-your-batch-account-in-or-out-of-simplified-compute-node-communication).
31+
32+
![Support Request](../batch/media/certificates/opt-in.png)
33+
34+
2. Create a private endpoint for Batch node management in the virtual network.
35+
36+
![Create Endpoint](../batch/media/certificates/private-endpoint.png)
37+
38+
3. Scale down the pool to zero nodes.
39+
40+
![Scale Down](../batch/media/certificates/scale-down-pool.png)
41+
42+
4. Scale out the pool again. The pool is then automatically migrated to the new version of the preview.
43+
44+
![Scale Out](../batch/media/certificates/scale-out-pool.png)
45+
46+
## FAQ
47+
48+
* How can I migrate my Batch pool without public IP addresses (classic) to simplified compute node communication pools without public IPs?
49+
50+
You can only migrate your pool to simplified compute node communication pools if it was created in a virtual network. Otherwise, you’d need to create a new simplified compute node communication pool without public IPs.
51+
52+
* What differences will I see in billing?
53+
54+
Compared with Batch pools without public IP addresses (classic), the simplified compute node communication pools without public IPs support will reduce costs because it won’t need to create network resources the following: load balancer, network security groups, and private link service with the Batch pool deployments. However, there will be a [cost associated with private link](https://azure.microsoft.com/pricing/details/private-link/) or other outbound network connectivity used by pools, as controlled by the user, to allow communication with the Batch service without public IP addresses.
55+
56+
* Will there be any performance changes?
57+
58+
No known performance differences compared to Batch pools without public IP addresses (classic).
59+
60+
* How can I connect to my pool nodes for troubleshooting?
61+
62+
Similar to Batch pools without public IP addresses (classic). As there is no public IP address for the Batch pool, users will need to connect their pool nodes from within the virtual network. You can create a jump box VM in the virtual network or use other remote connectivity solutions like [Azure Bastion](../bastion/bastion-overview.md).
63+
64+
* Will there be any change to how my workloads are downloaded from Azure Storage?
65+
66+
Similar to Batch pools without public IP addresses (classic), users will need to provide their own internet outbound connectivity if their workloads need access to other resources like Azure Storage.
67+
68+
* What if I don’t migrate to simplified compute node communication pools without public IPs?
69+
70+
After **31 March 2023**, we will stop supporting Batch pool without public IP addresses. The functionality of the existing pool in that configuration may break, such as scale out operations, or may be actively scaled down to zero at any point in time after that date.
71+
72+
## Next steps
73+
74+
For more information, refer to [Simplified compute node communication](./simplified-compute-node-communication.md).
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: Batch Tls 1.0 Migration Guide
3+
description: Describes the migration steps for the batch TLS 1.0 and the end of support details.
4+
author: harperche
5+
ms.author: harpercheng
6+
ms.service: batch
7+
ms.topic: how-to #Required; leave this attribute/value as-is.
8+
ms.date: 08/16/2022
9+
---
10+
# Batch TLS 1.0 Migration Guide
11+
12+
Transport Layer Security (TLS) versions 1.0 and 1.1 are known to be susceptible to attacks such as BEAST and POODLE, and to have other Common Vulnerabilities and Exposures (CVE) weaknesses. They also don't support the modern encryption methods and cipher suites recommended by Payment Card Industry (PCI) compliance standards. There's an industry-wide push toward the exclusive use of TLS version 1.2 or later.
13+
14+
To follow security best practices and remain in compliance with industry standards, Azure Batch will retire Batch TLS 1.0/1.1 on **31 March 2023**. Most customers have already migrated to TLS 1.2. Customers who continue to use TLS 1.0/1.1 can be identified via existing BatchOperation telemetry. Customers will need to adjust their existing workflows to ensure that they're using TLS 1.2. Failure to migrate to TLS 1.2 will break existing Batch workflows.
15+
16+
## Migration strategy
17+
18+
Customers must update client code before the TLS 1.0/1.1 retirement.
19+
20+
- Customers using native WinHTTP for client code can follow this [guide](https://support.microsoft.com/topic/update-to-enable-tls-1-1-and-tls-1-2-as-default-secure-protocols-in-winhttp-in-windows-c4bd73d2-31d7-761e-0178-11268bb10392).
21+
22+
- Customers using .NET framework for their client code should upgrade to .NET > 4.7, that which enforces TLS 1.2 by default.
23+
24+
- For customers on .NET framework who are unable to upgrade to > 4.7, please follow this [guide](https://docs.microsoft.com/dotnet/framework/network-programming/tls) to enforce TLS 1.2.
25+
26+
For TLS best practices, refer to [TLS best practices for .NET framework](https://docs.microsoft.com/dotnet/framework/network-programming/tls).
27+
28+
## FAQ
29+
30+
* Why must we upgrade to TLS 1.2?<br>
31+
TLS 1.0/1.1 has security issues that are fixed in TLS 1.2. TLS 1.2 has been available since 2008 and is the current default version in most frameworks.
32+
33+
* What happens if I don’t upgrade?<br>
34+
After the feature retirement, our client application won't work until you upgrade.<br>
35+
36+
* Will Upgrading to TLS 1.2 affect the performance?<br>
37+
Upgrading to TLS 1.2 won't affect performance.<br>
38+
39+
* How do I know if I’m using TLS 1.0/1.1?<br>
40+
You can check the Audit Log to determine the TLS version you're using.
41+
42+
## Next steps
43+
44+
For more information, see [How to enable TLS 1.2 on clients](https://docs.microsoft.com/mem/configmgr/core/plan-design/security/enable-tls-1-2-client).
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
---
2+
title: Batch job pool lifetime statistics migration guide
3+
description: Describes the migration steps for the batch job pool lifetime statistics and the end of support details.
4+
author: harperche
5+
ms.author: harpercheng
6+
ms.service: batch
7+
ms.topic: how-to #Required; leave this attribute/value as-is.
8+
ms.date: 08/15/2022
9+
---
10+
# Batch Job Pool Lifetime Statistics Migration Guide
11+
12+
The Azure Batch service currently supports API for Job/Pool to retrieve lifetime statistics. The API is used to get lifetime statistics for all the Pools/Jobs in the specified batch account or for a specified Pool/Job. The API collects the statistical data from when the Batch account was created until the last time updated or entire lifetime of the specified Job/Pool. Job/Pool lifetime statistics API is helpful for customers to analyze and evaluate their usage.
13+
14+
To make the statistical data available for customers, the Batch service allocates batch pools and schedule jobs with an in-house MapReduce implementation to perform background periodic roll-up of statistics. The aggregation is performed for all accounts/pools/jobs in each region, no matter if customer needs or queries the stats for their account/pool/job. The operating cost includes eleven VMs allocated in each region to execute MapReduce aggregation jobs. For busy regions, we had to increase the pool size further to accommodate the extra aggregation load.
15+
16+
The MapReduce aggregation logic was implemented with legacy code, and no new features are being added or improvised due to technical challenges with legacy code. Still, the legacy code and its hosting repo need to be updated frequently to accommodate ever growing load in production and to meet security/compliance requirements. In addition, since the API is featured to provide lifetime statistics, the data is growing and demands more storage and performance issues, even though most customers aren't using the API. Batch service currently eats up all the compute and storage usage charges associated with MapReduce pools and jobs.
17+
18+
The purpose of the API is designed and maintained to serve the customer in troubleshooting. However, not many customers use it in real life, and the customers are interested in extracting the details for not more than a month. Now more advanced ways of log/job/pool data can be collected and used on a need basis using Azure portal logs, Alerts, Log export, and other methods. Therefore, we are retire Job/Pool Lifetime.
19+
20+
Job/Pool Lifetime Statistics API will be retired on **30 April 2023**. Once complete, the API will no longer work and will return an appropriate HTTP response error code back to the client.
21+
22+
## FAQ
23+
24+
* Is there an alternate way to view logs of Pool/Jobs?
25+
26+
Azure portal has various options to enable the logs, namely system logs, diagnostic logs. Refer [Monitor Batch Solutions](./monitoring-overview.md) for more information.
27+
28+
* Can customers extract logs to their system if the API doesn't exist?
29+
30+
Azure portal log feature allows every customer to extract the output and error logs to their workspace. Refer [Monitor with Application Insights](./monitor-application-insights.md) for more information.
31+
32+
## Next steps
33+
34+
For more information, refer to [Azure Monitor Logs](../azure-monitor/logs/data-platform-logs.md).

0 commit comments

Comments
 (0)