Skip to content

Commit 6a063c5

Browse files
Merge pull request #96163 from sdwheeler/sdw-fix-pslinks
Fix broken links to PowerShell docs
2 parents f06a54e + 9df92df commit 6a063c5

10 files changed

+106
-106
lines changed

articles/automation/automation-linux-hrw-install.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ The minimum requirements for a Linux Hybrid Runbook Worker are:
4848
|Python-ctypes | Python 2.x is required |
4949
|PAM | Pluggable Authentication Modules|
5050
| **Optional package** | **Description** | **Minimum version**|
51-
| PowerShell Core | To run PowerShell runbooks, PowerShell needs to be installed, see [Installing PowerShell Core on Linux](/powershell/scripting/setup/installing-powershell-core-on-linux) to learn how to install it. | 6.0.0 |
51+
| PowerShell Core | To run PowerShell runbooks, PowerShell needs to be installed, see [Installing PowerShell Core on Linux](/powershell/scripting/install/installing-powershell-core-on-linux) to learn how to install it. | 6.0.0 |
5252

5353
### Installation
5454

@@ -101,7 +101,7 @@ The following runbook types work on a Linux Hybrid Worker:
101101
* PowerShell
102102

103103
> [!NOTE]
104-
> PowerShell runbooks require PowerShell Core to be installed on the Linux machine. See [Installing PowerShell Core on Linux](/powershell/scripting/setup/installing-powershell-core-on-linux) to learn how to install it.
104+
> PowerShell runbooks require PowerShell Core to be installed on the Linux machine. See [Installing PowerShell Core on Linux](/powershell/scripting/install/installing-powershell-core-on-linux) to learn how to install it.
105105
106106
The following runbook types don't work on a Linux Hybrid Worker:
107107

articles/marketplace/cloud-partner-portal/virtual-machine/cpp-get-sas-uri.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Get shared access signature URI for your Microsoft Azure-based VM image | Azure Marketplace
33
description: Explains how to get the shared access signature (SAS) URI for your VM image.
4-
services: Azure, Marketplace, Cloud Partner Portal,
4+
services: Azure, Marketplace, Cloud Partner Portal,
55
author: pbutlerm
66
ms.service: marketplace
77
ms.subservice: partnercenter-marketplace-publisher
@@ -12,7 +12,7 @@ ms.author: pabutler
1212

1313
# Get shared access signature URI for your VM image
1414

15-
During the publishing process, you must provide a uniform resource identifier (URI) for each virtual hard disk (VHD) associated with your SKUs. Microsoft needs access to these VHDs during the certification process. This article explains how to generate a shared access signature (SAS) URI for each VHD. You will enter this URI in the **SKUs** tab in the Cloud Partner Portal.
15+
During the publishing process, you must provide a uniform resource identifier (URI) for each virtual hard disk (VHD) associated with your SKUs. Microsoft needs access to these VHDs during the certification process. This article explains how to generate a shared access signature (SAS) URI for each VHD. You will enter this URI in the **SKUs** tab in the Cloud Partner Portal.
1616

1717
When generating SAS URIs for your VHDs, adhere to the following requirements:
1818

@@ -33,35 +33,35 @@ The SAS URL can be generated in two common ways using the following tools:
3333

3434
Use the following steps to generate a SAS URI with Azure CLI.
3535

36-
1. Download and install the [Microsoft Azure CLI](https://azure.microsoft.com/documentation/articles/xplat-cli-install/). Versions are available for Windows, macOS, and various distros of Linux.
36+
1. Download and install the [Microsoft Azure CLI](https://azure.microsoft.com/documentation/articles/xplat-cli-install/). Versions are available for Windows, macOS, and various distros of Linux.
3737
2. Create a PowerShell file (`.ps1` file extension), copy in the following code, then save it locally.
3838

3939
``` powershell
4040
az storage container generate-sas --connection-string 'DefaultEndpointsProtocol=https;AccountName=<account-name>;AccountKey=<account-key>;EndpointSuffix=core.windows.net' --name <vhd-name> --permissions rl --start '<start-date>' --expiry '<expiry-date>'
4141
```
42-
42+
4343
3. Edit the file to supply the following parameter values. Dates should be provided in UTC datetime format, for example `2016-10-25T00:00:00Z`.
4444
- `<account-name>` - Your Azure storage account name
4545
- `<account-key>` - Your Azure storage account key
4646
- `<vhd-name>` - Your VHD name
47-
- `<start-date>` - Permission start date for VHD access. Provide a date one day before the current date.
48-
- `<expiry-date>` - Permission expiration date for VHD access. Provide a date at least three weeks beyond the current date.
49-
47+
- `<start-date>` - Permission start date for VHD access. Provide a date one day before the current date.
48+
- `<expiry-date>` - Permission expiration date for VHD access. Provide a date at least three weeks beyond the current date.
49+
5050
The following example shows proper parameter values (at the time of this writing).
5151

5252
``` powershell
5353
az storage container generate-sas --connection-string 'DefaultEndpointsProtocol=https;AccountName=st00009;AccountKey=6L7OWFrlabs7Jn23OaR3rvY5RykpLCNHJhxsbn9ONc+bkCq9z/VNUPNYZRKoEV1FXSrvhqq3aMIDI7N3bSSvPg==;EndpointSuffix=core.windows.net' --name vhds --permissions rl --start '2017-11-06T00:00:00Z' --expiry '2018-08-20T00:00:00Z'
5454
```
55-
55+
5656
4. Save the changes to this PowerShell script.
5757
5. Run this script, using administrative privileges, to generate a *SAS connection string* for container level access. You can use two basic approaches:
5858
- Run the script from the console. For example, in Windows, write-click on the script and select **Run as administrator**.
59-
- Run the script from a PowerShell script editor, such as the [Windows PowerShell ISE](https://docs.microsoft.com/powershell/scripting/core-powershell/ise/introducing-the-windows-powershell-ise), using administrative privileges.
60-
The following demonstrates a SAS connection string being generated within this editor.
59+
- Run the script from a PowerShell script editor, such as the [Windows PowerShell ISE](https://docs.microsoft.com/powershell/scripting/components/ise/introducing-the-windows-powershell-ise), using administrative privileges.
60+
The following demonstrates a SAS connection string being generated within this editor.
6161

6262
![SAS URI generation in PowerShell ISE](./media/publishvm_032.png)
6363

64-
6. Copy the resulting SAS connection string and save it to a text file in a secure location. You will edit this string to add the associated VHD location information to it to create the final SAS URI.
64+
6. Copy the resulting SAS connection string and save it to a text file in a secure location. You will edit this string to add the associated VHD location information to it to create the final SAS URI.
6565
7. In the Azure portal, navigate to the blob storage that contains the VHD associated with the newly generated URI.
6666
8. Copy the URL value of the **Blob service endpoint**, as shown below.
6767

@@ -86,19 +86,19 @@ Use the following steps to generate a SAS URI with the Microsoft Azure Storage E
8686
2. Open the explorer and, in the left-hand menubar, click on the **Add Account** icon. The **Connect to Azure Storage** dialog box is displayed.
8787
3. Select **Add an Azure Account** and click **Sign in**. Continue the required steps to sign into your Azure account.
8888
4. In the left-hand **Explorer** pane, navigate to your **Storage Accounts** and expand this node.
89-
5. Right-click on your VHD and select **Get Share Access Signature** from the context menu.
89+
5. Right-click on your VHD and select **Get Share Access Signature** from the context menu.
9090

9191
![Get SAS item in Azure Explorer](./media/publishvm_034.png)
9292

9393
6. The **Shared Access Signature** dialog is displayed. Enter values for the following fields:
9494
- **Start time** - Permission start date for VHD access. Provide a date that is one day before the current date.
9595
- **Expiry time** - Permission expiration date for VHD access. Provide a date at least three weeks beyond the current date.
96-
- **Permissions** - Select the `Read` and `List` permissions.
96+
- **Permissions** - Select the `Read` and `List` permissions.
9797

9898
![SAS dialog in Azure Explorer](./media/publishvm_035.png)
9999

100-
7. Click **Create** to create the associated SAS URI for this VHD. The dialog now displays details about this operation.
101-
8. Copy the **URL** value and save it to a text file in a secure location.
100+
7. Click **Create** to create the associated SAS URI for this VHD. The dialog now displays details about this operation.
101+
8. Copy the **URL** value and save it to a text file in a secure location.
102102

103103
![SAS URI create in Azure Explorer](./media/publishvm_036.png)
104104

articles/marketplace/cloud-partner-portal/virtual-machine/cpp-winrm-over-https.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Windows Remote Management over HTTPS for Azure | Azure Marketplace
33
description: Explains how to configure an Azure-hosted, Windows-based VM so that it can be managed remotely with PowerShell.
4-
services: Azure, Marketplace, Cloud Partner Portal,
4+
services: Azure, Marketplace, Cloud Partner Portal,
55
author: v-miclar
66
ms.service: marketplace
77
ms.subservice: partnercenter-marketplace-publisher
@@ -12,9 +12,9 @@ ms.author: pabutler
1212

1313
# Windows Remote Management over HTTPS
1414

15-
This section explains how to configure an Azure-hosted, Windows-based VM so that it can be managed and deployed remotely with PowerShell. To enable PowerShell remoting, the target VM must expose a Windows Remote Management (WinRM) HTTPS endpoint. For more information about PowerShell remoting, see [Running Remote Commands](https://docs.microsoft.com/powershell/scripting/core-powershell/running-remote-commands?view=powershell-6). For more information about WinRM, see [Windows Remote Management](https://docs.microsoft.com/windows/desktop/WinRM/portal).
15+
This section explains how to configure an Azure-hosted, Windows-based VM so that it can be managed and deployed remotely with PowerShell. To enable PowerShell remoting, the target VM must expose a Windows Remote Management (WinRM) HTTPS endpoint. For more information about PowerShell remoting, see [Running Remote Commands](https://docs.microsoft.com/powershell/scripting/learn/remoting/running-remote-commands). For more information about WinRM, see [Windows Remote Management](https://docs.microsoft.com/windows/desktop/WinRM/portal).
1616

17-
If you created a VM using one of the "classic" Azure approaches—either the Azure Service Manager Portal or the deprecated [Azure Service Management API](https://docs.microsoft.com/previous-versions/azure/ee460799(v=azure.100))—then it is automatically configured with a WinRM endpoint. However, if you create a VM using any of the following "modern" Azure approaches, then your VM will *not* be configured for WinRM over HTTPS.
17+
If you created a VM using one of the "classic" Azure approaches—either the Azure Service Manager Portal or the deprecated [Azure Service Management API](https://docs.microsoft.com/previous-versions/azure/ee460799(v=azure.100))—then it is automatically configured with a WinRM endpoint. However, if you create a VM using any of the following "modern" Azure approaches, then your VM will *not* be configured for WinRM over HTTPS.
1818

1919
- Using the [Azure portal](https://portal.azure.com/), typically from an approved base, as described in the section [Create an Azure-compatible VHD](https://docs.microsoft.com/azure/marketplace/cloud-partner-portal/virtual-machine/cpp-create-vhd)
2020
- [Using the Azure Resource Manager templates](https://docs.microsoft.com/azure/virtual-machines/windows/ps-template)
@@ -29,9 +29,9 @@ In contrast, typically Linux VMs are remotely managed using either [Azure CLI](h
2929

3030
The WinRM endpoint for a windows-based VM can be configured during two different stages of its development:
3131

32-
- During creation - during the deployment of a VM to an existing VHD. This is the preferred approach for new offers. This approach requires the creation of an Azure certificate, using supplied Azure Resource Manager templates, and running customized PowerShell scripts.
33-
- After deployment - on an existing VM hosted on Azure. Use this approach if you already have a VM solution deployed on Azure, and need to enable Window Remote Management for it. This approach requires manual changes in the Azure portal and the execution of a script on the target VM.
32+
- During creation - during the deployment of a VM to an existing VHD. This is the preferred approach for new offers. This approach requires the creation of an Azure certificate, using supplied Azure Resource Manager templates, and running customized PowerShell scripts.
33+
- After deployment - on an existing VM hosted on Azure. Use this approach if you already have a VM solution deployed on Azure, and need to enable Window Remote Management for it. This approach requires manual changes in the Azure portal and the execution of a script on the target VM.
3434

3535

3636
## Next steps
37-
If you are creating a new VM, you can enable WinRM during [deployment of your VM from its VHDs](./cpp-deploy-vm-vhd.md). Otherwise, WinRM can be enabled in an existing VM
37+
If you are creating a new VM, you can enable WinRM during [deployment of your VM from its VHDs](./cpp-deploy-vm-vhd.md). Otherwise, WinRM can be enabled in an existing VM

articles/service-fabric/service-fabric-cluster-standalone-deployment-preparation.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure Service Fabric Standalone Cluster Deployment Preparation | Microsoft Docs
3-
description: Documentation related to preparing the environment and creating the cluster configuration, to be considered prior to deploying a cluster intended for handling a production workload.
3+
description: Documentation related to preparing the environment and creating the cluster configuration, to be considered prior to deploying a cluster intended for handling a production workload.
44
services: service-fabric
55
documentationcenter: .net
66
author: dkkapur
@@ -63,7 +63,7 @@ Here are some recommended specs for each machine that you want to add to the clu
6363
* Connectivity to a secure network or networks for all machines
6464
* Windows Server OS installed (valid versions: 2012 R2, 2016, 1709, or 1803). Service Fabric version 6.4.654.9590 and later also supports Server 2019 and 1809.
6565
* [.NET Framework 4.5.1 or higher](https://www.microsoft.com/download/details.aspx?id=40773), full install
66-
* [Windows PowerShell 3.0](https://msdn.microsoft.com/powershell/scripting/setup/installing-windows-powershell)
66+
* [Windows PowerShell 3.0](https://msdn.microsoft.com/powershell/scripting/install/installing-windows-powershell)
6767
* The [RemoteRegistry service](https://technet.microsoft.com/library/cc754820) should be running on all the machines
6868
* Service Fabric installation drive must be NTFS File System
6969

@@ -95,7 +95,7 @@ When a cluster administrator configures a Service Fabric standalone cluster, the
9595
1. The user creating the cluster should have administrator-level security privileges to all machines that are listed as nodes in the cluster configuration file.
9696
2. Machine from which the cluster is created, as well as each cluster node machine must:
9797
* Have Service Fabric SDK uninstalled
98-
* Have Service Fabric runtime uninstalled
98+
* Have Service Fabric runtime uninstalled
9999
* Have the Windows Firewall service (mpssvc) enabled
100100
* Have the Remote Registry Service (remote registry) enabled
101101
* Have file sharing (SMB) enabled
@@ -139,7 +139,7 @@ When a cluster administrator configures a Service Fabric standalone cluster, the
139139
| FileStoreService.exe |
140140

141141
## Validate environment using TestConfiguration script
142-
The TestConfiguration.ps1 script can be found in the standalone package. It is used as a Best Practices Analyzer to validate some of the criteria above and should be used as a sanity check to validate whether a cluster can be deployed on a given environment. If there is any failure, refer to the list under [Environment Setup](service-fabric-cluster-standalone-deployment-preparation.md) for troubleshooting.
142+
The TestConfiguration.ps1 script can be found in the standalone package. It is used as a Best Practices Analyzer to validate some of the criteria above and should be used as a sanity check to validate whether a cluster can be deployed on a given environment. If there is any failure, refer to the list under [Environment Setup](service-fabric-cluster-standalone-deployment-preparation.md) for troubleshooting.
143143

144144
This script can be run on any machine that has administrator access to all the machines that are listed as nodes in the cluster configuration file. The machine that this script is run on does not have to be part of the cluster.
145145

@@ -162,12 +162,12 @@ FabricInstallable : True
162162
Passed : True
163163
```
164164

165-
Currently this configuration testing module does not validate the security configuration so this has to be done independently.
165+
Currently this configuration testing module does not validate the security configuration so this has to be done independently.
166166

167167
> [!NOTE]
168-
> We are continually making improvements to make this module more robust, so if there is a faulty or missing case which you believe isn't currently caught by TestConfiguration, please let us know through our [support channels](https://docs.microsoft.com/azure/service-fabric/service-fabric-support).
169-
>
170-
>
168+
> We are continually making improvements to make this module more robust, so if there is a faulty or missing case which you believe isn't currently caught by TestConfiguration, please let us know through our [support channels](https://docs.microsoft.com/azure/service-fabric/service-fabric-support).
169+
>
170+
>
171171
172172
## Next steps
173173
* [Create a standalone cluster running on Windows Server](service-fabric-cluster-creation-for-windows-server.md)

0 commit comments

Comments
 (0)