Skip to content

Commit 6e3506b

Browse files
committed
Revised article
1 parent e09b181 commit 6e3506b

File tree

2 files changed

+17
-15
lines changed

2 files changed

+17
-15
lines changed

articles/virtual-machines/extensions/key-vault-linux.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,11 @@ title: Azure Key Vault VM Extension for Linux
33
description: Deploy an agent performing automatic refresh of Key Vault certificates on virtual machines using a virtual machine extension.
44
services: virtual-machines-linux
55
author: msmbaldwin
6+
tags: keyvault
67

78
ms.service: virtual-machines-linux
89
ms.topic: article
9-
ms.date: 09/23/2018
10+
ms.date: 12/02/2019
1011
ms.author: mbaldwin
1112

1213
---
@@ -36,13 +37,13 @@ The following JSON shows the schema for the Key Vault VM extension. The extensio
3637
"[concat('Microsoft.Compute/virtualMachines/', <vmName>)]"
3738
],
3839
"properties": {
39-
"publisher": "Microsoft.Azure.KeyVault.Edp",
40+
"publisher": "Microsoft.Azure.KeyVault",
4041
"type": "KeyVaultForLinux",
4142
"typeHandlerVersion": "1.0",
4243
"autoUpgradeMinorVersion": true,
4344
"settings": {
4445
"secretsManagementSettings": {
45-
"pollingIntervalInS": <polling interval in seconds>,
46+
"pollingIntervalInS": <polling interval in seconds, e.g. "3600">,
4647
"certificateStoreName": <certificate store name, e.g.: "MY">,
4748
"linkOnRenewal": <Not available on Linux e.g.: false>,
4849
"certificateStoreLocation": <certificate store location, currently it works locally only e.g.: "LocalMachine">,
@@ -65,7 +66,7 @@ The following JSON shows the schema for the Key Vault VM extension. The extensio
6566
| Name | Value / Example | Data Type |
6667
| ---- | ---- | ---- |
6768
| apiVersion | 2019-07-01 | date |
68-
| publisher | Microsoft.Azure.KeyVault.Edp | string |
69+
| publisher | Microsoft.Azure.KeyVault | string |
6970
| type | KeyVaultForLinux | string |
7071
| typeHandlerVersion | 1.0 | int |
7172
| pollingIntervalInS | 3600 | string |
@@ -92,12 +93,12 @@ The JSON configuration for a virtual machine extension must be nested inside the
9293
"[concat('Microsoft.Compute/virtualMachines/', <vmName>)]"
9394
],
9495
"properties": {
95-
"publisher": "Microsoft.Azure.KeyVault.Edp",
96+
"publisher": "Microsoft.Azure.KeyVault",
9697
"type": "KeyVaultForLinux",
9798
"typeHandlerVersion": "1.0",
9899
"autoUpgradeMinorVersion": true,
99100
"settings": {
100-
"pollingIntervalInS": <polling interval in seconds>,
101+
"pollingIntervalInS": <polling interval in seconds, e.g. "3600">,
101102
"certificateStoreName": <certificate store name, e.g.: "MY">,
102103
"certificateStoreLocation": <certificate store location, currently it works locally only e.g.: "LocalMachine">,
103104
"observedCertificates": <list of KeyVault URIs representing monitored certificates, e.g.: "https://myvault.vault.azure.net/secrets/mycertificate"
@@ -122,7 +123,7 @@ The Azure PowerShell can be used to deploy the Key Vault VM extension to an exis
122123
'", "certificateStoreLocation": "' + <certStoreLoc> +
123124
'", "observedCertificates": ["' + <observedCerts> + '"] } }'
124125
$extName = "KeyVaultForLinux"
125-
$extPublisher = "Microsoft.Azure.KeyVault.Edp"
126+
$extPublisher = "Microsoft.Azure.KeyVault"
126127
$extType = "KeyVaultForLinux"
127128
128129
@@ -142,7 +143,7 @@ The Azure PowerShell can be used to deploy the Key Vault VM extension to an exis
142143
'", "certificateStoreLocation": "' + <certStoreLoc> +
143144
'", "observedCertificates": ["' + <observedCerts> + '"] } }'
144145
$extName = "KeyVaultForLinux"
145-
$extPublisher = "Microsoft.Azure.KeyVault.Edp"
146+
$extPublisher = "Microsoft.Azure.KeyVault"
146147
$extType = "KeyVaultForLinux"
147148
148149
# Add Extension to VMSS
@@ -204,4 +205,4 @@ Get-AzVMExtension -VMName <vmName> -ResourceGroupname <resource group name>
204205

205206
### Support
206207

207-
If you need more help at any point in this article, you can contact the Azure experts on the [MSDN Azure and Stack Overflow forums](https://azure.microsoft.com/support/forums/). Alternatively, you can file an Azure support incident. Go to the [Azure support site](https://azure.microsoft.com/support/options/) and select Get support. For information about using Azure Support, read the [Microsoft Azure support FAQ](https://azure.microsoft.com/support/faq/).
208+
If you need more help at any point in this article, you can contact the Azure experts on the [MSDN Azure and Stack Overflow forums](https://azure.microsoft.com/support/forums/). Alternatively, you can file an Azure support incident. Go to the [Azure support site](https://azure.microsoft.com/support/options/) and select Get support. For information about using Azure Support, read the [Microsoft Azure support FAQ](https://azure.microsoft.com/support/faq/).

articles/virtual-machines/extensions/key-vault-windows.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,11 @@ title: Azure Key Vault VM Extension for Windows
33
description: Deploy an agent performing automatic refresh of Key Vault secrets on virtual machines using a virtual machine extension.
44
services: virtual-machines-windows
55
author: msmbaldwin
6+
tags: keyvault
67

78
ms.service: virtual-machines-windows
89
ms.topic: article
9-
ms.date: 09/23/2018
10+
ms.date: 12/02/2019
1011
ms.author: mbaldwin
1112

1213
---
@@ -42,7 +43,7 @@ The following JSON shows the schema for the Key Vault VM extension. The extensio
4243
"autoUpgradeMinorVersion": true,
4344
"settings": {
4445
"secretsManagementSettings": {
45-
"pollingIntervalInS": <polling interval in seconds>,
46+
"pollingIntervalInS": <polling interval in seconds, e.g: "3600">,
4647
"certificateStoreName": <certificate store name, e.g.: "MY">,
4748
"linkOnRenewal": <Only Windows. This feature enables auto-rotation of SSL certificates, without necessitating a re-deployment or binding. e.g.: false>,
4849
"certificateStoreLocation": <certificate store location, currently it works locally only e.g.: "LocalMachine">,
@@ -64,7 +65,7 @@ The following JSON shows the schema for the Key Vault VM extension. The extensio
6465
| Name | Value / Example | Data Type |
6566
| ---- | ---- | ---- |
6667
| apiVersion | 2019-07-01 | date |
67-
| publisher | Microsoft.Azure.KeyVault| string |
68+
| publisher | Microsoft.Azure.KeyVault | string |
6869
| type | KeyVaultForWindows | string |
6970
| typeHandlerVersion | 1.0 | int |
7071
| pollingIntervalInS | 3600 | string |
@@ -96,7 +97,7 @@ The JSON configuration for a virtual machine extension must be nested inside the
9697
"typeHandlerVersion": "1.0",
9798
"autoUpgradeMinorVersion": true,
9899
"settings": {
99-
"pollingIntervalInS": <polling interval in seconds>,
100+
"pollingIntervalInS": <polling interval in seconds, e.g: "3600">,
100101
"certificateStoreName": <certificate store name, e.g.: "MY">,
101102
"certificateStoreLocation": <certificate store location, currently it works locally only e.g.: "LocalMachine">,
102103
"observedCertificates": <list of KeyVault URIs representing monitored certificates, e.g.: "https://myvault.vault.azure.net/secrets/mycertificate"
@@ -204,10 +205,10 @@ Get-AzVMExtension -VMName <vmName> -ResourceGroupname <resource group name>
204205
Extension execution output is logged to the following file:
205206

206207
```
207-
%windrive%\WindowsAzure\Logs\Plugins\Microsoft.Azure.KeyVault.Edp.KeyVaultForWindows\<version>\akvvm_service_<date>.log
208+
%windrive%\WindowsAzure\Logs\Plugins\Microsoft.Azure.KeyVault.KeyVaultForWindows\<version>\akvvm_service_<date>.log
208209
```
209210

210211

211212
### Support
212213

213-
If you need more help at any point in this article, you can contact the Azure experts on the [MSDN Azure and Stack Overflow forums](https://azure.microsoft.com/support/forums/). Alternatively, you can file an Azure support incident. Go to the [Azure support site](https://azure.microsoft.com/support/options/) and select Get support. For information about using Azure Support, read the [Microsoft Azure support FAQ](https://azure.microsoft.com/support/faq/).
214+
If you need more help at any point in this article, you can contact the Azure experts on the [MSDN Azure and Stack Overflow forums](https://azure.microsoft.com/support/forums/). Alternatively, you can file an Azure support incident. Go to the [Azure support site](https://azure.microsoft.com/support/options/) and select Get support. For information about using Azure Support, read the [Microsoft Azure support FAQ](https://azure.microsoft.com/support/faq/).

0 commit comments

Comments
 (0)