Skip to content

Commit 598c044

Browse files
committed
Update links to cloud-shell docs
1 parent 95d552f commit 598c044

File tree

9 files changed

+108
-112
lines changed

9 files changed

+108
-112
lines changed

articles/cosmos-db/how-to-container-copy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ This article describes how to create, monitor, and manage intra-account containe
1919

2020
## Pre-requisites
2121

22-
* You may use the portal [Cloud Shell](../cloud-shell/quickstart-powershell.md#start-cloud-shell) to run container copy commands. Alternately, you may run the commands locally; make sure you have [Azure CLI](/cli/azure/install-azure-cli) or [Azure PowerShell](/powershell/azure/install-az-ps-msi) downloaded and installed on your machine.
22+
* You may use the portal [Cloud Shell](/azure/cloud-shell/quickstart?tabs=powershell) to run container copy commands. Alternately, you may run the commands locally; make sure you have [Azure CLI](/cli/azure/install-azure-cli) or [Azure PowerShell](/powershell/azure/install-az-ps-msi) downloaded and installed on your machine.
2323
* Currently, container copy is only supported in [these regions](intra-account-container-copy.md#supported-regions). Make sure your account's write region belongs to this list.
2424

2525

@@ -51,7 +51,7 @@ Create a job to copy a container within an Azure Cosmos DB API for NoSQL account
5151

5252
```azurepowershell-interactive
5353
az cosmosdb dts copy `
54-
--resource-group $resourceGroup `
54+
--resource-group $resourceGroup `
5555
--account-name $accountName `
5656
--job-name $jobName `
5757
--source-sql-container database=$sourceDatabase container=$sourceContainer `

articles/cosmos-db/intra-account-container-copy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ Currently, container copy is supported in the following regions:
141141
142142
* Error - (Request) is blocked by your Cosmos DB account firewall settings.
143143
144-
The job creation request could be blocked if the client IP isn't allowed as per the VNet and Firewall IPs configured on the account. In order to get past this issue, you need to [allow access to the IP through the Firewall setting](how-to-configure-firewall.md). Alternately, you may set **Accept connections from within public Azure datacenters** in your firewall settings and run the container copy commands through the portal [Cloud Shell](../cloud-shell/quickstart-powershell.md#start-cloud-shell).
144+
The job creation request could be blocked if the client IP isn't allowed as per the VNet and Firewall IPs configured on the account. In order to get past this issue, you need to [allow access to the IP through the Firewall setting](how-to-configure-firewall.md). Alternately, you may set **Accept connections from within public Azure datacenters** in your firewall settings and run the container copy commands through the portal [Cloud Shell](/azure/cloud-shell/quickstart?tabs=powershell).
145145
146146
```output
147147
InternalServerError Request originated from IP xxx.xxx.xxx.xxx through public internet. This is blocked by your Cosmos DB account firewall settings. More info: https://aka.ms/cosmosdb-tsg-forbidden

articles/databox-online/azure-stack-edge-gpu-deploy-arc-kubernetes-cluster.md

Lines changed: 35 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.author: alkohli
1515

1616
[!INCLUDE [applies-to-GPU-and-pro-r-and-mini-r-skus](../../includes/azure-stack-edge-applies-to-gpu-pro-r-mini-r-sku.md)]
1717

18-
This article shows you how to enable Azure Arc on an existing Kubernetes cluster on your Azure Stack Edge Pro device.
18+
This article shows you how to enable Azure Arc on an existing Kubernetes cluster on your Azure Stack Edge Pro device.
1919

2020
This procedure is intended for those who have reviewed the [Kubernetes workloads on Azure Stack Edge Pro device](azure-stack-edge-gpu-kubernetes-workload-management.md) and are familiar with the concepts of [What is Azure Arc-enabled Kubernetes (Preview)?](../azure-arc/kubernetes/overview.md).
2121

@@ -31,44 +31,44 @@ Before you can enable Azure Arc on Kubernetes cluster, make sure that you have c
3131
1. The device has the compute role configured via Azure portal and has a Kubernetes cluster. See [Configure compute](azure-stack-edge-gpu-deploy-configure-compute.md).
3232

3333
1. You've owner access to the subscription. You would need this access during the role assignment step for your service principal.
34-
34+
3535

3636
### For client accessing the device
3737

3838
1. You have a Windows client system that will be used to access the Azure Stack Edge Pro device.
39-
39+
4040
- The client is running Windows PowerShell 5.0 or later. To download the latest version of Windows PowerShell, go to [Install Windows PowerShell](/powershell/scripting/install/installing-powershell-core-on-windows).
41-
42-
- You can have any other client with a [Supported operating system](azure-stack-edge-gpu-system-requirements.md#supported-os-for-clients-connected-to-device) as well. This article describes the procedure when using a Windows client.
43-
44-
41+
42+
- You can have any other client with a [Supported operating system](azure-stack-edge-gpu-system-requirements.md#supported-os-for-clients-connected-to-device) as well. This article describes the procedure when using a Windows client.
43+
44+
4545
1. You have completed the procedure described in [Access the Kubernetes cluster on Azure Stack Edge Pro device](azure-stack-edge-gpu-create-kubernetes-cluster.md). You have:
46-
47-
- Installed `kubectl` on the client.
48-
- Make sure that the `kubectl` client version is skewed no more than one version from the Kubernetes master version running on your Azure Stack Edge Pro device.
46+
47+
- Installed `kubectl` on the client.
48+
- Make sure that the `kubectl` client version is skewed no more than one version from the Kubernetes master version running on your Azure Stack Edge Pro device.
4949
- Use `kubectl version` to check the version of kubectl running on the client. Make a note of the full version.
50-
- In the local UI of your Azure Stack Edge Pro device, go to **Software update** and note the Kubernetes server version number.
51-
52-
![Verify Kubernetes server version number](media/azure-stack-edge-gpu-connect-powershell-interface/verify-kubernetes-version-1.png)
53-
54-
- Verify these two versions are compatible.
50+
- In the local UI of your Azure Stack Edge Pro device, go to **Software update** and note the Kubernetes server version number.
51+
52+
![Verify Kubernetes server version number](media/azure-stack-edge-gpu-connect-powershell-interface/verify-kubernetes-version-1.png)
53+
54+
- Verify these two versions are compatible.
5555

5656

5757
## Register Kubernetes resource providers
5858

59-
Before you enable Azure Arc on the Kubernetes cluster, you will need to enable and register `Microsoft.Kubernetes` and `Microsoft.KubernetesConfiguration` against your subscription.
59+
Before you enable Azure Arc on the Kubernetes cluster, you will need to enable and register `Microsoft.Kubernetes` and `Microsoft.KubernetesConfiguration` against your subscription.
6060

61-
1. To enable a resource provider, in the Azure portal, go to the subscription that you are planning to use for the deployment. Go to **Resource Providers**.
61+
1. To enable a resource provider, in the Azure portal, go to the subscription that you are planning to use for the deployment. Go to **Resource Providers**.
6262
1. In the right-pane, search for the providers you want to add. In this example, `Microsoft.Kubernetes` and `Microsoft.KubernetesConfiguration`.
6363

6464
![Register Kubernetes resource providers](media/azure-stack-edge-gpu-connect-powershell-interface/register-k8-resource-providers-1.png)
6565

66-
1. Select a resource provider and from the top of the command bar, select **Register**. Registration takes several minutes.
66+
1. Select a resource provider and from the top of the command bar, select **Register**. Registration takes several minutes.
6767

6868
![Register Kubernetes resource providers 2](media/azure-stack-edge-gpu-connect-powershell-interface/register-k8-resource-providers-2.png)
6969

7070
1. Refresh the UI until you see that the resource provider is registered. Repeat the process for both resource providers.
71-
71+
7272
![Register Kubernetes resource providers 3](media/azure-stack-edge-gpu-connect-powershell-interface/register-k8-resource-providers-4.png)
7373

7474
You can also register resource providers via the `az cli`. For more information, see [Register the two providers for Azure Arc-enabled Kubernetes](../azure-arc/kubernetes/quickstart-connect-cluster.md#register-providers-for-azure-arc-enabled-kubernetes).
@@ -85,12 +85,12 @@ You can also register resource providers via the `az cli`. For more information,
8585

8686
1. To create a service principal, use the following command via the `az cli`.
8787

88-
`az ad sp create-for-rbac --name "<Informative name for service principal>"`
88+
`az ad sp create-for-rbac --name "<Informative name for service principal>"`
8989

90-
For information on how to log into the `az cli`, [Start Cloud Shell in Azure portal](../cloud-shell/quickstart-powershell.md#start-cloud-shell). If using `az cli` on a local client to create the service principal, make sure that you are running version 2.25 or later.
90+
For information on how to log into the `az cli`, [Start Cloud Shell in Azure portal](/azure/cloud-shell/quickstart). If using `az cli` on a local client to create the service principal, make sure that you are running version 2.25 or later.
91+
92+
Here is an example.
9193

92-
Here is an example.
93-
9494
```azurecli
9595
PS /home/user> az ad sp create-for-rbac --name "https://azure-arc-for-ase-k8s"
9696
{
@@ -110,7 +110,7 @@ You can also register resource providers via the `az cli`. For more information,
110110
`az role assignment create --role 34e09817-6cbe-4d01-b1a2-e0eac5743d41 --assignee <appId-from-service-principal> --scope /subscriptions/<SubscriptionID>/resourceGroups/<Resource-group-name>`
111111
112112
Here is an example.
113-
113+
114114
```azurecli
115115
PS /home/user> az role assignment create --role 34e09817-6cbe-4d01-b1a2-e0eac5743d41 --assignee xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx --scope /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myaserg1
116116
{
@@ -136,22 +136,22 @@ Follow these steps to configure the Kubernetes cluster for Azure Arc management:
136136
137137
1. Type:
138138
139-
`Set-HcsKubernetesAzureArcAgent -SubscriptionId "<Your Azure Subscription Id>" -ResourceGroupName "<Resource Group Name>" -ResourceName "<Azure Arc resource name (shouldn't exist already)>" -Location "<Region associated with resource group>" -TenantId "<Tenant Id of service principal>" -ClientId "<App id of service principal>"`
140-
139+
`Set-HcsKubernetesAzureArcAgent -SubscriptionId "<Your Azure Subscription Id>" -ResourceGroupName "<Resource Group Name>" -ResourceName "<Azure Arc resource name (shouldn't exist already)>" -Location "<Region associated with resource group>" -TenantId "<Tenant Id of service principal>" -ClientId "<App id of service principal>"`
140+
141141
When this command is run, there is a followup prompt to enter the `ClientSecret`. Provide the service principal password.
142142
143143
Add the `CloudEnvironment` parameter if you are using a cloud other than Azure public. You can set this parameter to `AZUREPUBLICCLOUD`, `AZURECHINACLOUD`, `AZUREGERMANCLOUD`, and `AZUREUSGOVERNMENTCLOUD`.
144144
145145
> [!NOTE]
146-
> - To deploy Azure Arc on your device, make sure that you are using a [Supported region for Azure Arc](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc).
146+
> - To deploy Azure Arc on your device, make sure that you are using a [Supported region for Azure Arc](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc).
147147
> - Use the `az account list-locations` command to figure out the exact location name to pass in the `Set-HcsKubernetesAzureArcAgent` cmdlet. Location names are typically formatted without any spaces.
148-
> - `ClientId` and `ClientSecret` are required.
149-
148+
> - `ClientId` and `ClientSecret` are required.
149+
150150
Here is an example:
151-
151+
152152
```powershell
153153
[10.100.10.10]: PS>Set-HcsKubernetesAzureArcAgent -SubscriptionId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" -ResourceGroupName "myaserg1" -ResourceName "myasetestresarc" -Location "westeurope" -TenantId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" -ClientId "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
154-
154+
155155
WARNING: A script or application on the remote computer 10.126.76.0 is sending a prompt request. When you are prompted,
156156
enter sensitive information, such as credentials or passwords, only if you trust the remote computer and the
157157
application or script that is requesting the data.
@@ -162,7 +162,7 @@ Follow these steps to configure the Kubernetes cluster for Azure Arc management:
162162
ClientSecret: **********************************
163163
[10.100.10.10]: PS>
164164
```
165-
165+
166166
In the Azure portal, a resource should be created with the name you provided in the preceding command.
167167
168168
![Go to Azure Arc resource](media/azure-stack-edge-gpu-connect-powershell-interface/verify-azure-arc-enabled-1.png)
@@ -171,7 +171,7 @@ Follow these steps to configure the Kubernetes cluster for Azure Arc management:
171171
172172
`kubectl get deployments,pods -n azure-arc`
173173
174-
Here is a sample output that shows the Azure Arc agents that were deployed on your Kubernetes cluster in the `azure-arc` namespace.
174+
Here is a sample output that shows the Azure Arc agents that were deployed on your Kubernetes cluster in the `azure-arc` namespace.
175175
176176
```powershell
177177
[10.128.44.240]: PS>kubectl get deployments,pods -n azure-arc
@@ -210,13 +210,13 @@ To remove the Azure Arc management, follow these steps:
210210
1. 1. [Connect to the PowerShell interface](azure-stack-edge-gpu-connect-powershell-interface.md#connect-to-the-powershell-interface) of your device.
211211
2. Type:
212212
213-
`Remove-HcsKubernetesAzureArcAgent`
213+
`Remove-HcsKubernetesAzureArcAgent`
214214
215215
216216
> [!NOTE]
217217
> By default, when resource `yamls` are deleted from the Git repository, the corresponding resources are not deleted from the Kubernetes cluster. You need to set `--sync-garbage-collection` in Arc OperatorParams to allow the deletion of resources when deleted from git repository. For more information, see [Delete a configuration](../azure-arc/kubernetes/tutorial-use-gitops-connected-cluster.md#additional-parameters)
218218
219219
## Next steps
220220
221-
To understand how to run an Azure Arc deployment, see
221+
To understand how to run an Azure Arc deployment, see
222222
[Deploy a stateless PHP `Guestbook` application with Redis via GitOps on an Azure Stack Edge Pro device](azure-stack-edge-gpu-deploy-stateless-application-git-ops-guestbook.md)

articles/devtest-labs/devtest-lab-vm-powershell.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This article shows you how to create an Azure DevTest Labs virtual machine (VM)
1717
You need the following prerequisites to work through this article:
1818

1919
- Access to a lab in DevTest Labs. [Create a lab](devtest-lab-create-lab.md), or use an existing lab.
20-
- Azure PowerShell. [Install Azure PowerShell](/powershell/azure/install-az-ps), or [use Azure Cloud Shell](../cloud-shell/quickstart-powershell.md) in the Azure portal.
20+
- Azure PowerShell. [Install Azure PowerShell](/powershell/azure/install-az-ps), or [use Azure Cloud Shell](/azure/cloud-shell/quickstart?tabs=powershell) in the Azure portal.
2121

2222
## PowerShell VM creation script
2323

@@ -36,7 +36,7 @@ Param(
3636
[Parameter(Mandatory = $true)] $UserName,
3737
[Parameter(Mandatory = $true)] $Password
3838
)
39-
39+
4040
pushd $PSScriptRoot
4141
4242
try {
@@ -62,7 +62,7 @@ try {
6262
#Prepare all the properties needed for the createEnvironment call.
6363
# The properties are slightly different depending on the type of VM base.
6464
# The virtual network setup might also affect the properties.
65-
65+
6666
$parameters = @{
6767
"name" = $NewVmName;
6868
"location" = $lab.Location;
@@ -93,7 +93,7 @@ try {
9393
})
9494
}
9595
}
96-
96+
9797
#The following line has the same effect as invoking the
9898
# https://azure.github.io/projects/apis/#!/Labs/Labs_CreateEnvironment REST API
9999
@@ -167,7 +167,7 @@ Creating a VM in the Azure portal generates an Azure Resource Manager (ARM) temp
167167

168168
1. Copy and save the template to use in future PowerShell automation, and transfer the properties to the PowerShell VM creation script.
169169

170-
170+
171171

172172
### Use the DevTest Labs Azure REST API to get VM properties
173173

@@ -178,7 +178,7 @@ You can also call the DevTest Labs REST API to get the properties of existing la
178178
- Under **labName**, enter your lab name.
179179
- Under **labResourceGroup**, enter the lab resource group name.
180180
- Under **subscriptionId**, select the lab's Azure subscription.
181-
1. Select **Run**.
181+
1. Select **Run**.
182182
1. In the **Response** section under **Body**, view the properties for all the existing VMs in the lab.
183183

184184
## Set VM expiration date

0 commit comments

Comments
 (0)