You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cosmos-db/how-to-container-copy.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ This article describes how to create, monitor, and manage intra-account containe
19
19
20
20
## Pre-requisites
21
21
22
-
* You may use the portal [Cloud Shell](../cloud-shell/quickstart-powershell.md#start-cloud-shell) to run container copy commands. Alternately, you may run the commands locally; make sure you have [Azure CLI](/cli/azure/install-azure-cli) or [Azure PowerShell](/powershell/azure/install-az-ps-msi) downloaded and installed on your machine.
22
+
* You may use the portal [Cloud Shell](/azure/cloud-shell/quickstart?tabs=powershell) to run container copy commands. Alternately, you may run the commands locally; make sure you have [Azure CLI](/cli/azure/install-azure-cli) or [Azure PowerShell](/powershell/azure/install-az-ps-msi) downloaded and installed on your machine.
23
23
* Currently, container copy is only supported in [these regions](intra-account-container-copy.md#supported-regions). Make sure your account's write region belongs to this list.
24
24
25
25
@@ -51,7 +51,7 @@ Create a job to copy a container within an Azure Cosmos DB API for NoSQL account
Copy file name to clipboardExpand all lines: articles/cosmos-db/intra-account-container-copy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -141,7 +141,7 @@ Currently, container copy is supported in the following regions:
141
141
142
142
* Error - (Request) is blocked by your Cosmos DB account firewall settings.
143
143
144
-
The job creation request could be blocked if the client IP isn't allowed as per the VNet and Firewall IPs configured on the account. In order to get past this issue, you need to [allow access to the IP through the Firewall setting](how-to-configure-firewall.md). Alternately, you may set **Accept connections from within public Azure datacenters** in your firewall settings and run the container copy commands through the portal [Cloud Shell](../cloud-shell/quickstart-powershell.md#start-cloud-shell).
144
+
The job creation request could be blocked if the client IP isn't allowed as per the VNet and Firewall IPs configured on the account. In order to get past this issue, you need to [allow access to the IP through the Firewall setting](how-to-configure-firewall.md). Alternately, you may set **Accept connections from within public Azure datacenters** in your firewall settings and run the container copy commands through the portal [Cloud Shell](/azure/cloud-shell/quickstart?tabs=powershell).
145
145
146
146
```output
147
147
InternalServerError Request originated from IP xxx.xxx.xxx.xxx through public internet. This is blocked by your Cosmos DB account firewall settings. More info: https://aka.ms/cosmosdb-tsg-forbidden
This article shows you how to enable Azure Arc on an existing Kubernetes cluster on your Azure Stack Edge Pro device.
18
+
This article shows you how to enable Azure Arc on an existing Kubernetes cluster on your Azure Stack Edge Pro device.
19
19
20
20
This procedure is intended for those who have reviewed the [Kubernetes workloads on Azure Stack Edge Pro device](azure-stack-edge-gpu-kubernetes-workload-management.md) and are familiar with the concepts of [What is Azure Arc-enabled Kubernetes (Preview)?](../azure-arc/kubernetes/overview.md).
21
21
@@ -31,44 +31,44 @@ Before you can enable Azure Arc on Kubernetes cluster, make sure that you have c
31
31
1. The device has the compute role configured via Azure portal and has a Kubernetes cluster. See [Configure compute](azure-stack-edge-gpu-deploy-configure-compute.md).
32
32
33
33
1. You've owner access to the subscription. You would need this access during the role assignment step for your service principal.
34
-
34
+
35
35
36
36
### For client accessing the device
37
37
38
38
1. You have a Windows client system that will be used to access the Azure Stack Edge Pro device.
39
-
39
+
40
40
- The client is running Windows PowerShell 5.0 or later. To download the latest version of Windows PowerShell, go to [Install Windows PowerShell](/powershell/scripting/install/installing-powershell-core-on-windows).
41
-
42
-
- You can have any other client with a [Supported operating system](azure-stack-edge-gpu-system-requirements.md#supported-os-for-clients-connected-to-device) as well. This article describes the procedure when using a Windows client.
43
-
44
-
41
+
42
+
- You can have any other client with a [Supported operating system](azure-stack-edge-gpu-system-requirements.md#supported-os-for-clients-connected-to-device) as well. This article describes the procedure when using a Windows client.
43
+
44
+
45
45
1. You have completed the procedure described in [Access the Kubernetes cluster on Azure Stack Edge Pro device](azure-stack-edge-gpu-create-kubernetes-cluster.md). You have:
46
-
47
-
- Installed `kubectl` on the client.
48
-
- Make sure that the `kubectl` client version is skewed no more than one version from the Kubernetes master version running on your Azure Stack Edge Pro device.
46
+
47
+
- Installed `kubectl` on the client.
48
+
- Make sure that the `kubectl` client version is skewed no more than one version from the Kubernetes master version running on your Azure Stack Edge Pro device.
49
49
- Use `kubectl version` to check the version of kubectl running on the client. Make a note of the full version.
50
-
- In the local UI of your Azure Stack Edge Pro device, go to **Software update** and note the Kubernetes server version number.
51
-
52
-

53
-
54
-
- Verify these two versions are compatible.
50
+
- In the local UI of your Azure Stack Edge Pro device, go to **Software update** and note the Kubernetes server version number.
51
+
52
+

53
+
54
+
- Verify these two versions are compatible.
55
55
56
56
57
57
## Register Kubernetes resource providers
58
58
59
-
Before you enable Azure Arc on the Kubernetes cluster, you will need to enable and register `Microsoft.Kubernetes` and `Microsoft.KubernetesConfiguration` against your subscription.
59
+
Before you enable Azure Arc on the Kubernetes cluster, you will need to enable and register `Microsoft.Kubernetes` and `Microsoft.KubernetesConfiguration` against your subscription.
60
60
61
-
1. To enable a resource provider, in the Azure portal, go to the subscription that you are planning to use for the deployment. Go to **Resource Providers**.
61
+
1. To enable a resource provider, in the Azure portal, go to the subscription that you are planning to use for the deployment. Go to **Resource Providers**.
62
62
1. In the right-pane, search for the providers you want to add. In this example, `Microsoft.Kubernetes` and `Microsoft.KubernetesConfiguration`.
You can also register resource providers via the `az cli`. For more information, see [Register the two providers for Azure Arc-enabled Kubernetes](../azure-arc/kubernetes/quickstart-connect-cluster.md#register-providers-for-azure-arc-enabled-kubernetes).
@@ -85,12 +85,12 @@ You can also register resource providers via the `az cli`. For more information,
85
85
86
86
1. To create a service principal, use the following command via the `az cli`.
87
87
88
-
`az ad sp create-for-rbac --name "<Informative name for service principal>"`
88
+
`az ad sp create-for-rbac --name "<Informative name for service principal>"`
89
89
90
-
For information on how to log into the `az cli`, [Start Cloud Shell in Azure portal](../cloud-shell/quickstart-powershell.md#start-cloud-shell). If using `az cli` on a local client to create the service principal, make sure that you are running version 2.25 or later.
90
+
For information on how to log into the `az cli`, [Start Cloud Shell in Azure portal](/azure/cloud-shell/quickstart). If using `az cli` on a local client to create the service principal, make sure that you are running version 2.25 or later.
91
+
92
+
Here is an example.
91
93
92
-
Here is an example.
93
-
94
94
```azurecli
95
95
PS /home/user> az ad sp create-for-rbac --name "https://azure-arc-for-ase-k8s"
96
96
{
@@ -110,7 +110,7 @@ You can also register resource providers via the `az cli`. For more information,
110
110
`az role assignment create --role 34e09817-6cbe-4d01-b1a2-e0eac5743d41 --assignee <appId-from-service-principal> --scope /subscriptions/<SubscriptionID>/resourceGroups/<Resource-group-name>`
111
111
112
112
Here is an example.
113
-
113
+
114
114
```azurecli
115
115
PS /home/user> az role assignment create --role 34e09817-6cbe-4d01-b1a2-e0eac5743d41 --assignee xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx --scope /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myaserg1
116
116
{
@@ -136,22 +136,22 @@ Follow these steps to configure the Kubernetes cluster for Azure Arc management:
136
136
137
137
1. Type:
138
138
139
-
`Set-HcsKubernetesAzureArcAgent -SubscriptionId "<Your Azure Subscription Id>" -ResourceGroupName "<Resource Group Name>" -ResourceName "<Azure Arc resource name (shouldn't exist already)>" -Location "<Region associated with resource group>" -TenantId "<Tenant Id of service principal>" -ClientId "<App id of service principal>"`
140
-
139
+
`Set-HcsKubernetesAzureArcAgent -SubscriptionId "<Your Azure Subscription Id>" -ResourceGroupName "<Resource Group Name>" -ResourceName "<Azure Arc resource name (shouldn't exist already)>" -Location "<Region associated with resource group>" -TenantId "<Tenant Id of service principal>" -ClientId "<App id of service principal>"`
140
+
141
141
When this command is run, there is a followup prompt to enter the `ClientSecret`. Provide the service principal password.
142
142
143
143
Add the `CloudEnvironment` parameter if you are using a cloud other than Azure public. You can set this parameter to `AZUREPUBLICCLOUD`, `AZURECHINACLOUD`, `AZUREGERMANCLOUD`, and `AZUREUSGOVERNMENTCLOUD`.
144
144
145
145
> [!NOTE]
146
-
> - To deploy Azure Arc on your device, make sure that you are using a [Supported region for Azure Arc](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc).
146
+
> - To deploy Azure Arc on your device, make sure that you are using a [Supported region for Azure Arc](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc).
147
147
> - Use the `az account list-locations` command to figure out the exact location name to pass in the `Set-HcsKubernetesAzureArcAgent` cmdlet. Location names are typically formatted without any spaces.
WARNING: A script or application on the remote computer 10.126.76.0 is sending a prompt request. When you are prompted,
156
156
enter sensitive information, such as credentials or passwords, only if you trust the remote computer and the
157
157
application or script that is requesting the data.
@@ -162,7 +162,7 @@ Follow these steps to configure the Kubernetes cluster for Azure Arc management:
162
162
ClientSecret: **********************************
163
163
[10.100.10.10]: PS>
164
164
```
165
-
165
+
166
166
In the Azure portal, a resource should be created with the name you provided in the preceding command.
167
167
168
168

@@ -171,7 +171,7 @@ Follow these steps to configure the Kubernetes cluster for Azure Arc management:
171
171
172
172
`kubectl get deployments,pods -n azure-arc`
173
173
174
-
Here is a sample output that shows the Azure Arc agents that were deployed on your Kubernetes cluster in the `azure-arc` namespace.
174
+
Here is a sample output that shows the Azure Arc agents that were deployed on your Kubernetes cluster in the `azure-arc` namespace.
175
175
176
176
```powershell
177
177
[10.128.44.240]: PS>kubectl get deployments,pods -n azure-arc
@@ -210,13 +210,13 @@ To remove the Azure Arc management, follow these steps:
210
210
1. 1. [Connect to the PowerShell interface](azure-stack-edge-gpu-connect-powershell-interface.md#connect-to-the-powershell-interface) of your device.
211
211
2. Type:
212
212
213
-
`Remove-HcsKubernetesAzureArcAgent`
213
+
`Remove-HcsKubernetesAzureArcAgent`
214
214
215
215
216
216
> [!NOTE]
217
217
> By default, when resource `yamls` are deleted from the Git repository, the corresponding resources are not deleted from the Kubernetes cluster. You need to set `--sync-garbage-collection` in Arc OperatorParams to allow the deletion of resources when deleted from git repository. For more information, see [Delete a configuration](../azure-arc/kubernetes/tutorial-use-gitops-connected-cluster.md#additional-parameters)
218
218
219
219
## Next steps
220
220
221
-
To understand how to run an Azure Arc deployment, see
221
+
To understand how to run an Azure Arc deployment, see
222
222
[Deploy a stateless PHP `Guestbook` application with Redis via GitOps on an Azure Stack Edge Pro device](azure-stack-edge-gpu-deploy-stateless-application-git-ops-guestbook.md)
Copy file name to clipboardExpand all lines: articles/devtest-labs/devtest-lab-vm-powershell.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ This article shows you how to create an Azure DevTest Labs virtual machine (VM)
17
17
You need the following prerequisites to work through this article:
18
18
19
19
- Access to a lab in DevTest Labs. [Create a lab](devtest-lab-create-lab.md), or use an existing lab.
20
-
- Azure PowerShell. [Install Azure PowerShell](/powershell/azure/install-az-ps), or [use Azure Cloud Shell](../cloud-shell/quickstart-powershell.md) in the Azure portal.
20
+
- Azure PowerShell. [Install Azure PowerShell](/powershell/azure/install-az-ps), or [use Azure Cloud Shell](/azure/cloud-shell/quickstart?tabs=powershell) in the Azure portal.
21
21
22
22
## PowerShell VM creation script
23
23
@@ -36,7 +36,7 @@ Param(
36
36
[Parameter(Mandatory = $true)] $UserName,
37
37
[Parameter(Mandatory = $true)] $Password
38
38
)
39
-
39
+
40
40
pushd $PSScriptRoot
41
41
42
42
try {
@@ -62,7 +62,7 @@ try {
62
62
#Prepare all the properties needed for the createEnvironment call.
63
63
# The properties are slightly different depending on the type of VM base.
64
64
# The virtual network setup might also affect the properties.
65
-
65
+
66
66
$parameters = @{
67
67
"name" = $NewVmName;
68
68
"location" = $lab.Location;
@@ -93,7 +93,7 @@ try {
93
93
})
94
94
}
95
95
}
96
-
96
+
97
97
#The following line has the same effect as invoking the
98
98
# https://azure.github.io/projects/apis/#!/Labs/Labs_CreateEnvironment REST API
99
99
@@ -167,7 +167,7 @@ Creating a VM in the Azure portal generates an Azure Resource Manager (ARM) temp
167
167
168
168
1. Copy and save the template to use in future PowerShell automation, and transfer the properties to the PowerShell VM creation script.
169
169
170
-
170
+
171
171
172
172
### Use the DevTest Labs Azure REST API to get VM properties
173
173
@@ -178,7 +178,7 @@ You can also call the DevTest Labs REST API to get the properties of existing la
178
178
- Under **labName**, enter your lab name.
179
179
- Under **labResourceGroup**, enter the lab resource group name.
180
180
- Under **subscriptionId**, select the lab's Azure subscription.
181
-
1. Select **Run**.
181
+
1. Select **Run**.
182
182
1. In the **Response** section under **Body**, view the properties for all the existing VMs in the lab.
0 commit comments