Skip to content

Commit 4ffba63

Browse files
committed
status
1 parent 5e2e635 commit 4ffba63

15 files changed

+91
-92
lines changed

articles/databox-online/azure-stack-edge-gpu-connect-resource-manager.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -474,10 +474,10 @@ Set the Azure Resource Manager environment and verify that your device to client
474474
```powershell
475475
$pass = ConvertTo-SecureString "<Your password>" -AsPlainText -Force;
476476
$cred = New-Object System.Management.Automation.PSCredential("EdgeArmUser", $pass)
477-
Connect-AzAccount -EnvironmentName AzASE -TenantId c0257de7-538f-415c-993a-1b87a031879d -credential $cred
477+
Connect-AzAccount -EnvironmentName AzASE -TenantId aaaabbbb-0000-cccc-1111-dddd2222eeee -credential $cred
478478
```
479479
480-
Use the tenant ID c0257de7-538f-415c-993a-1b87a031879d as in this instance it's hard coded.
480+
Use the tenant ID aaaabbbb-0000-cccc-1111-dddd2222eeee as in this instance it's hard coded.
481481
Use the following username and password.
482482
483483
- **Username** - *EdgeArmUser*
@@ -491,23 +491,23 @@ Set the Azure Resource Manager environment and verify that your device to client
491491
```output
492492
PS C:\windows\system32> $pass = ConvertTo-SecureString "<Your password>" -AsPlainText -Force;
493493
PS C:\windows\system32> $cred = New-Object System.Management.Automation.PSCredential("EdgeArmUser", $pass)
494-
PS C:\windows\system32> Connect-AzAccount -EnvironmentName AzASE -TenantId c0257de7-538f-415c-993a-1b87a031879d -credential $cred
494+
PS C:\windows\system32> Connect-AzAccount -EnvironmentName AzASE -TenantId aaaabbbb-0000-cccc-1111-dddd2222eeee -credential $cred
495495
496496
Account SubscriptionName TenantId Environment
497497
------- ---------------- -------- -----------
498-
EdgeArmUser@localhost Default Provider Subscription c0257de7-538f-415c-993a-1b87a031879d AzASE
498+
EdgeArmUser@localhost Default Provider Subscription aaaabbbb-0000-cccc-1111-dddd2222eeee AzASE
499499
500500
PS C:\windows\system32>
501501
```
502502
503503
An alternative way to sign in is to use the `login-AzAccount` cmdlet.
504504
505-
`login-AzAccount -EnvironmentName <Environment Name> -TenantId c0257de7-538f-415c-993a-1b87a031879d`
505+
`login-AzAccount -EnvironmentName <Environment Name> -TenantId aaaabbbb-0000-cccc-1111-dddd2222eeee`
506506
507507
Here's an example output.
508508
509509
```output
510-
PS C:\WINDOWS\system32> login-AzAccount -EnvironmentName AzASE -TenantId c0257de7-538f-415c-993a-1b87a031879d
510+
PS C:\WINDOWS\system32> login-AzAccount -EnvironmentName AzASE -TenantId aaaabbbb-0000-cccc-1111-dddd2222eeee
511511
512512
Account SubscriptionName TenantId
513513
------- ---------------- --------
@@ -596,7 +596,7 @@ Set the Azure Resource Manager environment and verify that your device to client
596596
597597
2. You can connect via `login-AzureRMAccount` or via `Connect-AzureRMAccount` command.
598598
599-
1. To sign in, type the following command. The tenant ID in this instance is hard coded - c0257de7-538f-415c-993a-1b87a031879d. Use the following username and password.
599+
1. To sign in, type the following command. The tenant ID in this instance is hard coded - aaaabbbb-0000-cccc-1111-dddd2222eeee. Use the following username and password.
600600
601601
- **Username** - *EdgeArmUser*
602602
@@ -605,28 +605,28 @@ Set the Azure Resource Manager environment and verify that your device to client
605605
```output
606606
PS C:\windows\system32> $pass = ConvertTo-SecureString "<Your password>" -AsPlainText -Force;
607607
PS C:\windows\system32> $cred = New-Object System.Management.Automation.PSCredential("EdgeArmUser", $pass)
608-
PS C:\windows\system32> Connect-AzureRmAccount -EnvironmentName AzDBE -TenantId c0257de7-538f-415c-993a-1b87a031879d -credential $cred
608+
PS C:\windows\system32> Connect-AzureRmAccount -EnvironmentName AzDBE -TenantId aaaabbbb-0000-cccc-1111-dddd2222eeee -credential $cred
609609
610610
Account SubscriptionName TenantId Environment
611611
------- ---------------- -------- -----------
612-
EdgeArmUser@localhost Default Provider Subscription c0257de7-538f-415c-993a-1b87a031879d AzDBE
612+
EdgeArmUser@localhost Default Provider Subscription aaaabbbb-0000-cccc-1111-dddd2222eeee AzDBE
613613
614614
PS C:\windows\system32>
615615
```
616616
617617
618618
An alternative way to sign in is to use the `login-AzureRmAccount` cmdlet.
619619
620-
`login-AzureRMAccount -EnvironmentName <Environment Name> -TenantId c0257de7-538f-415c-993a-1b87a031879d`
620+
`login-AzureRMAccount -EnvironmentName <Environment Name> -TenantId aaaabbbb-0000-cccc-1111-dddd2222eeee`
621621
622622
Here's a sample output of the command.
623623
624624
```output
625-
PS C:\Users\Administrator> login-AzureRMAccount -EnvironmentName AzDBE -TenantId c0257de7-538f-415c-993a-1b87a031879d
625+
PS C:\Users\Administrator> login-AzureRMAccount -EnvironmentName AzDBE -TenantId aaaabbbb-0000-cccc-1111-dddd2222eeee
626626
627627
Account SubscriptionName TenantId Environment
628628
------- ---------------- -------- -------
629-
EdgeArmUser@localhost Default Provider Subscription c0257de7-538f-415c-993a-1b87a031879d AzDBE
629+
EdgeArmUser@localhost Default Provider Subscription aaaabbbb-0000-cccc-1111-dddd2222eeee AzDBE
630630
PS C:\Users\Administrator>
631631
```
632632
---
@@ -670,7 +670,7 @@ Name : Default Provider Subscription (...) - EdgeArmUser@localhost
670670
Account : EdgeArmUser@localhost​
671671
Environment : AzDBE2​
672672
Subscription : ...​
673-
Tenant : c0257de7-538f-415c-993a-1b87a031879d
673+
Tenant : aaaabbbb-0000-cccc-1111-dddd2222eeee
674674
TokenCache : Microsoft.Azure.Commands.Common.Authentication.ProtectedFileTokenCache​
675675
VersionProfile :​
676676
ExtendedProperties : {}​
@@ -684,12 +684,12 @@ PS C:\WINDOWS\system32> Disconnect-AzAccount​
684684
​​
685685
Id : EdgeArmUser@localhost​
686686
Type : User​
687-
Tenants : {c0257de7-538f-415c-993a-1b87a031879d}​
687+
Tenants : {aaaabbbb-0000-cccc-1111-dddd2222eeee}​
688688
AccessToken :​
689689
Credential :​
690690
TenantMap : {}​
691691
CertificateThumbprint :​
692-
ExtendedProperties : {[Subscriptions, ...], [Tenants, c0257de7-538f-415c-993a-1b87a031879d]}
692+
ExtendedProperties : {[Subscriptions, ...], [Tenants, aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e]}
693693
```
694694

695695
Sign into the other environment. The sample output is shown below.
@@ -699,7 +699,7 @@ PS C:\WINDOWS\system32> Login-AzAccount -Environment "AzDBE1" -TenantId $ArmTena
699699
700700
Account SubscriptionName TenantId Environment​
701701
------- ---------------- -------- -----------​
702-
EdgeArmUser@localhost Default Provider Subscription c0257de7-538f-415c-993a-1b87a031879d AzDBE1
702+
EdgeArmUser@localhost Default Provider Subscription aaaabbbb-0000-cccc-1111-dddd2222eeee AzDBE1
703703
```
704704
705705
Run this cmdlet to confirm which environment you're connected to.
@@ -711,7 +711,7 @@ Name : Default Provider Subscription (...) - EdgeArmUser@localhost
711711
Account : EdgeArmUser@localhost​
712712
Environment : AzDBE1​
713713
Subscription : ...
714-
Tenant : c0257de7-538f-415c-993a-1b87a031879d
714+
Tenant : aaaabbbb-0000-cccc-1111-dddd2222eeee
715715
TokenCache : Microsoft.Azure.Commands.Common.Authentication.ProtectedFileTokenCache​
716716
VersionProfile :​
717717
ExtendedProperties : {}
@@ -748,7 +748,7 @@ Name : Default Provider Subscription (A4257FDE-B946-4E01-ADE7-6747
748748
Account : EdgeArmUser@localhost​
749749
Environment : AzDBE2​
750750
Subscription : ...​
751-
Tenant : c0257de7-538f-415c-993a-1b87a031879d
751+
Tenant : aaaabbbb-0000-cccc-1111-dddd2222eeee
752752
TokenCache : Microsoft.Azure.Commands.Common.Authentication.ProtectedFileTokenCache​
753753
VersionProfile :​
754754
ExtendedProperties : {}​
@@ -762,12 +762,12 @@ PS C:\WINDOWS\system32> Disconnect-AzureRmAccount​
762762
​​
763763
Id : EdgeArmUser@localhost​
764764
Type : User​
765-
Tenants : {c0257de7-538f-415c-993a-1b87a031879d}​
765+
Tenants : {aaaabbbb-0000-cccc-1111-dddd2222eeee}​
766766
AccessToken :​
767767
Credential :​
768768
TenantMap : {}​
769769
CertificateThumbprint :​
770-
ExtendedProperties : {[Subscriptions, ...], [Tenants, c0257de7-538f-415c-993a-1b87a031879d]}
770+
ExtendedProperties : {[Subscriptions, ...], [Tenants, aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e]}
771771
```
772772

773773
Sign into the other environment. The sample output is shown below.
@@ -777,7 +777,7 @@ PS C:\WINDOWS\system32> Login-AzureRmAccount -Environment "AzDBE1" -TenantId $Ar
777777
778778
Account SubscriptionName TenantId Environment​
779779
------- ---------------- -------- -----------​
780-
EdgeArmUser@localhost Default Provider Subscription c0257de7-538f-415c-993a-1b87a031879d AzDBE1
780+
EdgeArmUser@localhost Default Provider Subscription aaaabbbb-0000-cccc-1111-dddd2222eeee AzDBE1
781781
```
782782
783783
Run this cmdlet to confirm which environment you're connected to.
@@ -789,7 +789,7 @@ Name : Default Provider Subscription (...) - EdgeArmUser@localhost
789789
Account : EdgeArmUser@localhost​
790790
Environment : AzDBE1​
791791
Subscription : ...​
792-
Tenant : c0257de7-538f-415c-993a-1b87a031879d
792+
Tenant : aaaabbbb-0000-cccc-1111-dddd2222eeee
793793
TokenCache : Microsoft.Azure.Commands.Common.Authentication.ProtectedFileTokenCache​
794794
VersionProfile :​
795795
ExtendedProperties : {}

articles/databox-online/azure-stack-edge-gpu-create-virtual-machine-marketplace-image.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ PS /home/user> az disk create -g $diskRG -n $diskName --image-reference $urn
184184
"createOption": "FromImage",
185185
"galleryImageReference": null,
186186
"imageReference": {
187-
"id": "/Subscriptions/db4e2fdb-6d80-4e6e-b7cd-736098270664/Providers/Microsoft.Compute/Locations/eastus/Publishers/MicrosoftWindowsServer/ArtifactTypes/VMImage/Offers/WindowsServer/Skus/2019-Datacenter/Versions/17763.1935.2105080716",
187+
"id": "/Subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/Providers/Microsoft.Compute/Locations/eastus/Publishers/MicrosoftWindowsServer/ArtifactTypes/VMImage/Offers/WindowsServer/Skus/2019-Datacenter/Versions/17763.1935.2105080716",
188188
"lun": null
189189
},
190190
"logicalSectorSize": null,
@@ -209,7 +209,7 @@ PS /home/user> az disk create -g $diskRG -n $diskName --image-reference $urn
209209
"encryptionSettingsCollection": null,
210210
"extendedLocation": null,
211211
"hyperVGeneration": "V1",
212-
"id": "/subscriptions/db4e2fdb-6d80-4e6e-b7cd-736098270664/resourceGroups/newrgmd1/providers/Microsoft.Compute/disks/NewManagedDisk1",
212+
"id": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/newrgmd1/providers/Microsoft.Compute/disks/NewManagedDisk1",
213213
"location": "eastus",
214214
"managedBy": null,
215215
"managedByExtended": null,

articles/databox-online/azure-stack-edge-gpu-deploy-arc-kubernetes-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ You can also register resource providers via the `az cli`. For more information,
116116
PS /home/user> az role assignment create --role 34e09817-6cbe-4d01-b1a2-e0eac5743d41 --assignee xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx --scope /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myaserg1
117117
{
118118
"canDelegate": null,
119-
"id": "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myaserg1/providers/Microsoft.Authorization/roleAssignments/59272f92-e5ce-4aeb-9c0c-62532d8caf25",
119+
"id": "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myaserg1/providers/Microsoft.Authorization/roleAssignments/00000000-0000-0000-0000-000000000000",
120120
"name": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
121121
"principalId": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
122122
"principalType": "ServicePrincipal",

articles/databox-online/azure-stack-edge-gpu-deploy-virtual-machine-cli-python.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -336,7 +336,7 @@ Before you begin creating and managing a VM on your Azure Stack Edge Pro device
336336
"isDefault": true,
337337
"name": "Default Provider Subscription",
338338
"state": "Enabled",
339-
"tenantId": "c0257de7-538f-415c-993a-1b87a031879d",
339+
"tenantId": "aaaabbbb-0000-cccc-1111-dddd2222eeee",
340340
"user": {
341341
"name": "EdgeArmUser@localhost",
342342
"type": "user"
@@ -350,7 +350,7 @@ Before you begin creating and managing a VM on your Azure Stack Edge Pro device
350350
The following environment variables need to be set to work as *service principal*:
351351

352352
```
353-
$ENV:ARM_TENANT_ID = "c0257de7-538f-415c-993a-1b87a031879d"
353+
$ENV:ARM_TENANT_ID = "aaaabbbb-0000-cccc-1111-dddd2222eeee"
354354
$ENV:ARM_CLIENT_ID = "cbd868c5-7207-431f-8d16-1cb144b50971"
355355
$ENV:ARM_CLIENT_SECRET - "<Your Azure Resource Manager password>"
356356
$ENV:ARM_SUBSCRIPTION_ID = "<Your subscription ID>"

articles/databox-online/azure-stack-edge-gpu-deploy-virtual-machine-custom-script-extension.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ Etag : null
205205
Publisher : Microsoft.Compute
206206
ExtensionType : CustomScriptExtension
207207
TypeHandlerVersion : 1.10
208-
Id : /subscriptions/947b3cfd-7a1b-4a90-7cc5-e52caf221332/resourceGroups/myasegpuvm1/providers/Microsoft.Compute/virtualMachines/VM5/extensions/CustomScriptExtension
208+
Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myasegpuvm1/providers/Microsoft.Compute/virtualMachines/VM5/extensions/CustomScriptExtension
209209
PublicSettings : {
210210
"commandToExecute": "md C:\\Users\\Public\\Documents\\test"
211211
}
@@ -351,7 +351,7 @@ Etag : null
351351
Publisher : Microsoft.Compute
352352
ExtensionType : CustomScriptExtension
353353
TypeHandlerVersion : 1.10
354-
Id : /subscriptions/947b3cfd-7a1b-4a90-7cc5-e52caf221332/resourceGroups/myasegpuvm1/providers/Microsoft.Compute/virtualMachines/VM5/extensions/CustomScriptExtension
354+
Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myasegpuvm1/providers/Microsoft.Compute/virtualMachines/VM5/extensions/CustomScriptExtension
355355
PublicSettings : {
356356
"commandToExecute": "md C:\\Users\\Public\\Documents\\test"
357357
}

articles/databox-online/azure-stack-edge-gpu-deploy-virtual-machine-install-gpu-extension.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -333,7 +333,7 @@ Etag : null
333333
Publisher : Microsoft.HpcCompute
334334
ExtensionType : NvidiaGpuDriverWindows
335335
TypeHandlerVersion : 1.3
336-
Id : /subscriptions/947b3cfd-7a1b-4a90-7cc5-e52caf221332/resourceGroups/myasegpuvm1/providers/Microsoft.Compute/virtualMachines/VM2/extensions/windowsgpuext
336+
Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myasegpuvm1/providers/Microsoft.Compute/virtualMachines/VM2/extensions/windowsgpuext
337337
PublicSettings : {
338338
"DriverURL": "http://us.download.nvidia.com/tesla/442.50/442.50-tesla-desktop-winserver-2019-2016-international.exe",
339339
"DriverCertificateUrl": "https://go.microsoft.com/fwlink/?linkid=871664",
@@ -388,7 +388,7 @@ Etag : null
388388
Publisher : Microsoft.HpcCompute
389389
ExtensionType : NvidiaGpuDriverLinux
390390
TypeHandlerVersion : 1.3
391-
Id : /subscriptions/947b3cfd-7a1b-4a90-7cc5-e52caf221332/resourceGroups/rg2/providers/Microsoft.Compute/virtualMachines/VM1/extensions/gpuLinux
391+
Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/rg2/providers/Microsoft.Compute/virtualMachines/VM1/extensions/gpuLinux
392392
PublicSettings : {
393393
"DRIVER_URL": "https://go.microsoft.com/fwlink/?linkid=874271",
394394
"PUBKEY_URL": "http://download.microsoft.com/download/F/F/A/FFAC979D-AD9C-4684-A6CE-C92BB9372A3B/7fa2af80.pub",

articles/databox-online/azure-stack-edge-gpu-deploy-virtual-machine-install-password-reset-extension.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ Etag : null
172172
Publisher : Microsoft.Compute
173173
ExtensionType : VMAccessAgent
174174
TypeHandlerVersion : 2.4
175-
Id : /subscriptions/04a485ed-7a09-44ab-6671-66db7f111122/resourceGroups/myasepro2rg/provi
175+
Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myasepro2rg/provi
176176
ders/Microsoft.Compute/virtualMachines/mywindowsvm/extensions/windowsVMAccessExt
177177
PublicSettings : {
178178
"username": "azureuser"
@@ -211,7 +211,7 @@ Etag : null
211211
Publisher : Microsoft.OSTCExtensions
212212
ExtensionType : VMAccessForLinux
213213
TypeHandlerVersion : 1.5
214-
Id : /subscriptions/04a485ed-7a09-44ab-6671-66db7f111122/resourceGroups
214+
Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups
215215
/myasepro2rg/providers/Microsoft.Compute/virtualMachines/mylinuxvm
216216
5/extensions/linuxVMAccessExt
217217
PublicSettings : {}

0 commit comments

Comments
 (0)