You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/dedicated-hsm/tutorial-deploy-hsm-cli.md
+12-11Lines changed: 12 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ Assumptions:
43
43
- You created a Resource Group for these resources and the new ones deployed in this tutorial will join that group.
44
44
- You already created the necessary virtual network, subnet, and virtual machines as per the diagram above and now want to integrate 2 HSMs into that deployment.
45
45
46
-
All instructions below assume that you have already navigated to the Azure portal and you have opened the Cloud Shell (select “\>\_” towards the top right of the portal).
46
+
All instructions below assume that you have already navigated to the Azure portal and you have opened the Cloud Shell (select "\>\_" towards the top right of the portal).
47
47
48
48
## Provisioning a Dedicated HSM
49
49
@@ -67,15 +67,15 @@ az feature show \
67
67
--name AllowBaremetalServers
68
68
```
69
69
70
-
Both commands should return a status of “Registered” (as shown below). If the commands don't return "Registered" you need to register for this service, contact your Microsoft account representative.
70
+
Both commands should return a status of "Registered" (as shown below). If the commands don't return "Registered" you need to register for this service, contact your Microsoft account representative.
An HSM is provisioned into a customers’ virtual network so a virtual network and subnet are required. A dependency for the HSM to enable communication between the virtual network and physical device is an ExpressRoute Gateway, and finally a virtual machine is required to access the HSM device using the Gemalto client software. These resources have been collected into a template file, with corresponding parameter file, for ease of use. The files are available by contacting Microsoft directly as [email protected].
76
+
An HSM is provisioned into a customers' virtual network so a virtual network and subnet are required. A dependency for the HSM to enable communication between the virtual network and physical device is an ExpressRoute Gateway, and finally a virtual machine is required to access the HSM device using the Gemalto client software. These resources have been collected into a template file, with corresponding parameter file, for ease of use. The files are available by contacting Microsoft directly as [email protected].
77
77
78
-
Once you have the files, you must edit the parameter file to insert your preferred names for resources. Edit lines with “value”: “”.
78
+
Once you have the files, you must edit the parameter file to insert your preferred names for resources. Edit lines with "value": "".
79
79
80
80
-`namingInfix` Prefix for names of HSM resources
81
81
-`ExistingVirtualNetworkName` Name of the virtual network used for the HSMs
@@ -122,7 +122,7 @@ The associated Azure Resource Manager template file will create 6 resources with
122
122
- An HSM in stamp 1
123
123
- An HSM in stamp 2
124
124
125
-
Once parameter values are set, the files need to be uploaded to Azure portal cloud shell file share for use. In the Azure portal, click the “\>\_” cloud shell symbol top right and this will make the bottom portion of the screen a command environment. The options for this are BASH and PowerShell and you should select BASH if not already set.
125
+
Once parameter values are set, the files need to be uploaded to Azure portal cloud shell file share for use. In the Azure portal, click the "\>\_" cloud shell symbol top right and this will make the bottom portion of the screen a command environment. The options for this are BASH and PowerShell and you should select BASH if not already set.
126
126
127
127
The command shell has an upload/download option on the toolbar and you should select this to upload the template and parameter files to your file share:
128
128
@@ -140,7 +140,8 @@ az network vnet create \
140
140
```
141
141
142
142
```azurecli
143
-
--vnet-name myHSM-vnet \
143
+
az network vnet create \
144
+
--vnet-name myHSM-vnet \
144
145
--resource-group myRG \
145
146
--name hsmsubnet \
146
147
--address-prefixes 10.2.1.0/24 \
@@ -156,7 +157,7 @@ az network vnet subnet create \
156
157
```
157
158
158
159
>[!NOTE]
159
-
>The most important configuration to note for the virtual network, is that the subnet for the HSM device must have delegations set to “Microsoft.HardwareSecurityModules/dedicatedHSMs”. The HSM provisioning will not work without this option being set.
160
+
>The most important configuration to note for the virtual network, is that the subnet for the HSM device must have delegations set to "Microsoft.HardwareSecurityModules/dedicatedHSMs". The HSM provisioning will not work without this option being set.
160
161
161
162
Once all pre-requisites are in place, run the following command to use the Azure Resource Manager template ensuring you have updated values with your unique names (at least the resource group name):
162
163
@@ -173,7 +174,7 @@ This deployment should take approximately 25 to 30 minutes to complete with the
When the deployment completes successfully “provisioningState”: “Succeeded” will be displayed. You can connect to your existing virtual machine and use SSH to ensure availability of the HSM device.
177
+
When the deployment completes successfully "provisioningState": "Succeeded" will be displayed. You can connect to your existing virtual machine and use SSH to ensure availability of the HSM device.
You will also now be able to see the resources using the [Azure resource explorer](https://resources.azure.com/). Once in the explorer, expand “subscriptions” on the left, expand your specific subscription for Dedicated HSM, expand “resource groups”, expand the resource group you used and finally select the “resources” item.
193
+
You will also now be able to see the resources using the [Azure resource explorer](https://resources.azure.com/). Once in the explorer, expand "subscriptions" on the left, expand your specific subscription for Dedicated HSM, expand "resource groups", expand the resource group you used and finally select the "resources" item.
193
194
194
195
## Testing the Deployment
195
196
@@ -203,9 +204,9 @@ The IP Address of the VM could also be used in place of the DNS name in the abov
>Notice the “Show hidden types” checkbox, which when selected will display HSM resources.
207
+
>Notice the "Show hidden types" checkbox, which when selected will display HSM resources.
207
208
208
-
In the screenshot above, clicking the “HSM1_HSMnic” or “HSM2_HSMnic” would show the appropriate Private IP Address. Otherwise, the `az resource show` command used above is a way to identify the right IP Address.
209
+
In the screenshot above, clicking the "HSM1_HSMnic" or "HSM2_HSMnic" would show the appropriate Private IP Address. Otherwise, the `az resource show` command used above is a way to identify the right IP Address.
209
210
210
211
When you have the correct IP address, run the following command substituting that address:
The next command imports a “bring your own key" (BYOK) package. This lets you generate your key in your local HSM, and transfer it to HSMs in the Key Vault service, without the key leaving the HSM boundary:
264
+
The next command imports a "bring your own key" (BYOK) package. This lets you generate your key in your local HSM, and transfer it to HSMs in the Key Vault service, without the key leaving the HSM boundary:
Copy file name to clipboardExpand all lines: articles/key-vault/key-vault-soft-delete-cli.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -228,13 +228,13 @@ You can enable purge protection only if soft-delete is also enabled.
228
228
229
229
To turn on both soft delete and purge protection when creating a vault, use the [az keyvault create](/cli/azure/keyvault?view=azure-cli-latest#az-keyvault-create) command:
To add purge protection to an existing vault (that already has soft delete enabled), use the [az keyvault update](/cli/azure/keyvault?view=azure-cli-latest#az-keyvault-update) command:
236
236
237
-
```
237
+
```azurecli
238
238
az keyvault update --name ContosoVault --resource-group ContosoRG --enable-purge-protection true
Copy file name to clipboardExpand all lines: articles/key-vault/tutorial-net-linux-virtual-machine.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ Before we go any further, read about [key vault basic concepts](basic-concepts.m
41
41
42
42
## Understand Managed Service Identity
43
43
44
-
Azure Key Vault can store credentials securely so they aren’t in your code, but to retrieve them you need to authenticate to Azure Key Vault. However, to authenticate to Key Vault, you need a credential. It's a classic bootstrap problem. With Azure and Azure Active Directory (Azure AD), Managed Service Identity (MSI) can provide a bootstrap identity that makes it much simpler to get things started.
44
+
Azure Key Vault can store credentials securely so they aren't in your code, but to retrieve them you need to authenticate to Azure Key Vault. However, to authenticate to Key Vault, you need a credential. It's a classic bootstrap problem. With Azure and Azure Active Directory (Azure AD), Managed Service Identity (MSI) can provide a bootstrap identity that makes it much simpler to get things started.
45
45
46
46
When you enable MSI for an Azure service like Virtual Machines, App Service, or Functions, Azure creates a service principal for the instance of the service in Azure Active Directory. It injects the credentials for the service principal into the instance of the service.
47
47
@@ -112,7 +112,7 @@ az vm create \
112
112
113
113
It takes a few minutes to create the VM and supporting resources. The following example output shows that the VM create operation was successful.
Copy file name to clipboardExpand all lines: articles/key-vault/tutorial-python-linux-virtual-machine.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ Before you go any further, make sure you understand the [basic concepts about Ke
40
40
41
41
## Understand Managed Service Identity
42
42
43
-
Azure Key Vault can store credentials securely so they aren’t in your code. To retrieve them, you need to authenticate to Azure Key Vault. However, to authenticate to Key Vault, you need a credential. It's a classic bootstrap problem. Through Azure and Azure Active Directory (Azure AD), Managed Service Identity (MSI) provides a bootstrap identity that makes it simpler to get things started.
43
+
Azure Key Vault can store credentials securely so they aren't in your code. To retrieve them, you need to authenticate to Azure Key Vault. However, to authenticate to Key Vault, you need a credential. It's a classic bootstrap problem. Through Azure and Azure Active Directory (Azure AD), Managed Service Identity (MSI) provides a bootstrap identity that makes it simpler to get things started.
44
44
45
45
When you enable MSI for an Azure service like Virtual Machines, App Service, or Functions, Azure creates a service principal for the instance of the service in Azure AD. It injects the credentials for the service principal into the instance of the service.
46
46
@@ -110,7 +110,7 @@ az vm create \
110
110
111
111
It takes a few minutes to create the VM and supporting resources. The following example output shows that the VM creation was successful:
In step 4 of [Create an internal load balancer set](load-balancer-get-started-ilb-arm-cli.md), use the following command to create the High Availability Ports load balancer rule:
Copy file name to clipboardExpand all lines: articles/load-balancer/load-balancer-get-started-ilb-arm-cli.md
+12-7Lines changed: 12 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,6 +33,7 @@ The following example creates a resource group named *myResourceGroupILB* in the
33
33
--name myResourceGroupILB \
34
34
--location eastus
35
35
```
36
+
36
37
## Create a virtual network
37
38
38
39
Create a virtual network named *myVnet* with a subnet named *mySubnet* in the *myResourceGroup* using [az network vnet create](https://docs.microsoft.com/cli/azure/network/vnet).
@@ -44,6 +45,7 @@ Create a virtual network named *myVnet* with a subnet named *mySubnet* in the *m
44
45
--location eastus \
45
46
--subnet-name mySubnet
46
47
```
48
+
47
49
## Create Basic Load Balancer
48
50
49
51
This section details how you can create and configure the following components of the load balancer:
@@ -65,7 +67,8 @@ Create an internal Load Balancer with [az network lb create](https://docs.micros
65
67
--backend-pool-name myBackEndPool \
66
68
--vnet-name myVnet \
67
69
--subnet mySubnet
68
-
```
70
+
```
71
+
69
72
### Create the health probe
70
73
71
74
A health probe checks all virtual machine instances to make sure they can receive network traffic. The virtual machine instance with failed probe checks is removed from the load balancer until it goes back online and a probe check determines that it's healthy. Create a health probe with [az network lb probe create](https://docs.microsoft.com/cli/azure/network/lb/probe?view=azure-cli-latest) to monitor the health of the virtual machines.
@@ -124,7 +127,7 @@ In this example, you create two virtual machines to be used as backend servers f
124
127
125
128
Create an availability set with [az vm availabilityset create](/cli/azure/network/nic)
126
129
127
-
```azurecli-interactive
130
+
```azurecli-interactive
128
131
az vm availability-set create \
129
132
--resource-group myResourceGroupILB \
130
133
--name myAvailabilitySet
@@ -174,11 +177,11 @@ runcmd:
174
177
- npm init
175
178
- npm install express -y
176
179
- nodejs index.js
177
-
```
178
-
180
+
```
181
+
179
182
Create the virtual machines with [az vm create](/cli/azure/vm#az-vm-create).
180
183
181
-
```azurecli-interactive
184
+
```azurecli-interactive
182
185
for i in `seq 1 2`; do
183
186
az vm create \
184
187
--resource-group myResourceGroupILB \
@@ -190,6 +193,7 @@ for i in `seq 1 2`; do
190
193
--custom-data cloud-init.txt
191
194
done
192
195
```
196
+
193
197
It may take a few minutes for the VMs to get deployed.
194
198
195
199
### Create a VM for testing the load balancer
@@ -215,14 +219,15 @@ To get the private IP address of the load balancer, use [az network lb show](/cl
When no longer needed, you can use the [az group delete](/cli/azure/group#az-group-delete) command to remove the resource group, load balancer, and all related resources.
Copy file name to clipboardExpand all lines: articles/load-balancer/load-balancer-get-started-ilb-arm-template.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,9 +53,9 @@ To deploy the template you downloaded by using PowerShell, follow the steps belo
53
53
To deploy the template by using the Azure CLI, follow the steps below.
54
54
55
55
1. If you have never used Azure CLI, see [Install and Configure the Azure CLI](../cli-install-nodejs.md) and follow the instructions up to the point where you select your Azure account and subscription.
56
-
2. Run the **azure config mode** command to switch to Resource Manager mode, as shown below.
56
+
2. Go to [https://shell.azure.com](https://shell.azure.com) to open Cloud Shell in your browser. Run the **azure config mode** command to switch to Resource Manager mode, as shown below.
57
57
58
-
```azurecli-interactive
58
+
```console
59
59
azure config mode arm
60
60
```
61
61
@@ -66,7 +66,7 @@ To deploy the template by using the Azure CLI, follow the steps below.
66
66
3. Open the parameter file, select its contents, and save it to a file in your computer. For this example, we saved the parameters file to *parameters.json*.
67
67
4. Run the **azure group deployment create** command to deploy the new internal load balancer by using the template and parameter files you downloaded and modified above. The list shown after the output explains the parameters used.
0 commit comments