You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/managed-instance-apache-cassandra/customer-managed-keys.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ In Azure Managed Instance for Apache Cassandra, you can use your own key to encr
18
18
19
19
- Set up a secret by using Azure Key Vault. For more information, see [About Azure Key Vault secrets](../key-vault/secrets/about-secrets.md).
20
20
- Deploy a virtual network in your resource group.
21
-
- Apply the network contributor role with the Azure Cosmos DB service principal as a member. Use the following command:
21
+
- Apply the Network Contributor role with the Azure Cosmos DB service principal as a member. Use the following command:
22
22
23
23
```azurecli-interactive
24
24
az role assignment create \
@@ -67,7 +67,7 @@ This article requires Azure CLI version 2.30.0 or later. If you're using Azure C
67
67
}
68
68
```
69
69
70
-
1. In the Azure portal, go to your key vault and select **Access policies**. Then select **Add Access Policy** to create an access policy for your keys:
70
+
1. In the Azure portal, go to your key vault and select **Access policies**. Then select **Add Access Policy** to create an access policy for your keys.
71
71
72
72
:::image type="content" source="./media/cmk/key-vault-access-policy-1.png" alt-text="Screenshot that shows the pane for access policies in the Azure portal." lightbox="./media/cmk/key-vault-access-policy-1.png" border="true":::
Copy file name to clipboardExpand all lines: articles/managed-instance-apache-cassandra/jaeger.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,7 +75,7 @@ This article details the use of the sample application HotROD and Jaeger alongsi
75
75
76
76
## Support
77
77
78
-
If you have problems running or testing Jaeger, open a support ticket. Provide the subscription ID and account name where your Jaeger test is running.
78
+
If you have problems running or testing Jaeger, open a support ticket. Provide the subscription ID and account name where your Jaeger instance is running.
Copy file name to clipboardExpand all lines: articles/managed-instance-apache-cassandra/manage-resources-cli.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,7 +111,7 @@ az managed-cassandra cluster list\
111
111
List clusters by subscription ID by using the [az managed-cassandra cluster list](/cli/azure/managed-cassandra) command:
112
112
113
113
```azurecli-interactive
114
-
# set your subscription id
114
+
# Set your subscription ID
115
115
az account set -s <subscriptionID>
116
116
117
117
az managed-cassandra cluster list
@@ -172,7 +172,7 @@ Choose the value for `--sku` from the following available virtual machine (VM) o
172
172
* Standard_L16as_v3
173
173
* Standard_L32as_v3
174
174
175
-
Currently, Azure Managed Instance for Apache Cassandra doesn't support transitioning across VM families. For instance, if you currently have a Standard_DS13_v2 VM and are interested in upgrading to a larger VM such as Standard_DS14_v2, this option isn't available. However, you can open a support ticket to request an upgrade to the larger VM.
175
+
Currently, Azure Managed Instance for Apache Cassandra doesn't support transitioning across VM families. For instance, if you currently have a Standard_DS13_v2 VM and are interested in upgrading to a larger VM such as Standard_DS14_v2, this option isn't available. However, you can open a support ticket to request the upgrade.
176
176
177
177
In the preceding command, `--availability-zone` is set to `false`. To enable availability zones, set this value to `true`. Availability zones increase the service-level agreement (SLA) for availability of the service. For more information, review the [full SLA details](https://azure.microsoft.com/support/legal/sla/managed-instance-apache-cassandra/v1_0/).
Copy file name to clipboardExpand all lines: articles/managed-instance-apache-cassandra/monitor-clusters.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ You can visualize metrics for Azure Managed Instance for Apache Cassandra in the
22
22
23
23
## Diagnostic settings in Azure
24
24
25
-
Azure Monitor uses diagnostic settings to collect resource logs, which are also called *data plane logs*. An Azure resource emits resource logs to provide rich, frequent data about its operation. Azure Monitor captures these logs per request. Examples of data plane operations include delete, insert, and readFeed. The content of these logs varies by resource type.
25
+
Azure Monitor uses diagnostic settings to collect resource logs, which are also called *data plane logs*. An Azure resource emits resource logs to provide rich, frequent data about its operations. Azure Monitor captures these logs per request. Examples of data plane operations include delete, insert, and readFeed. The content of these logs varies by resource type.
26
26
27
27
Platform metrics and activity logs are collected automatically, whereas you must create a diagnostic setting to collect resource logs or to forward them outside Azure Monitor. You can turn on diagnostic settings for Azure Managed Instance for Apache Cassandra cluster resources and send resource logs to the following sources:
28
28
@@ -33,7 +33,7 @@ Platform metrics and activity logs are collected automatically, whereas you must
33
33
> [!NOTE]
34
34
> We recommend creating the diagnostic setting in resource-specific mode.
35
35
36
-
## <aid="create-setting-portal"></a> Create diagnostic settings via the Azure portal
36
+
###<aid="create-setting-portal"></a> Create diagnostic settings via the Azure portal
37
37
38
38
1. Sign in to the [Azure portal](https://portal.azure.com).
39
39
@@ -60,7 +60,7 @@ Platform metrics and activity logs are collected automatically, whereas you must
60
60
61
61
:::image type="content" source="./media/azure-monitor/query.png" alt-text="Screenshot that shows query logs.":::
62
62
63
-
## <aid="create-setting-cli"></a> Create a diagnostic setting via Azure CLI
63
+
###<aid="create-setting-cli"></a> Create a diagnostic setting via the Azure CLI
64
64
65
65
To create a diagnostic setting by using the Azure CLI, use the [az monitor diagnostic-settings create](/cli/azure/monitor/diagnostic-settings#az-monitor-diagnostic-settings-create) command:
66
66
@@ -72,21 +72,21 @@ To create a diagnostic setting by using the Azure CLI, use the [az monitor diagn
In Cassandra 4 and later, you can configure your whitelist in the Cassandra configuration. For detailed guidance, see [Update Cassandra Configuration](create-cluster-portal.md#update-cassandra-configuration). The available options are as follows (reference: [Cassandra documentation for audit logging](https://cassandra.apache.org/doc/stable/cassandra/operating/audit_logging.html)):
180
+
In Cassandra 4 and later, you can configure your whitelist in the Cassandra configuration. For detailed guidance, see [Update Cassandra configuration](create-cluster-portal.md#update-cassandra-configuration). The available options are as follows (reference: [Cassandra documentation for audit logging](https://cassandra.apache.org/doc/stable/cassandra/operating/audit_logging.html)):
Copy file name to clipboardExpand all lines: articles/managed-instance-apache-cassandra/use-vpn.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ However, if you have internal security concerns about data exfiltration, your se
39
39
--cluster-name "vpn-test-cluster"
40
40
```
41
41
42
-
From the output, make a copy of the `privateLinkResourceId`ID.
42
+
From the output, make a copy of the `privateLinkResourceId`value.
43
43
44
44
1. In the Azure portal, [create a private endpoint](../cosmos-db/how-to-configure-private-endpoints.md) by using these details:
45
45
1. On the **Resource** tab, select**Connect to an Azure resource by resource ID or alias** as the connection method and **Microsoft.Network/privateLinkServices** as the resource type. Enter the `privateLinkResourceId` value from the previous step.
0 commit comments