Skip to content

Commit 6e7a6e0

Browse files
committed
edit pass: six-azure-managed-instance-for-apache-cassandra-articles
1 parent c4302cf commit 6e7a6e0

File tree

5 files changed

+14
-14
lines changed

5 files changed

+14
-14
lines changed

articles/managed-instance-apache-cassandra/customer-managed-keys.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ In Azure Managed Instance for Apache Cassandra, you can use your own key to encr
1818

1919
- Set up a secret by using Azure Key Vault. For more information, see [About Azure Key Vault secrets](../key-vault/secrets/about-secrets.md).
2020
- Deploy a virtual network in your resource group.
21-
- Apply the network contributor role with the Azure Cosmos DB service principal as a member. Use the following command:
21+
- Apply the Network Contributor role with the Azure Cosmos DB service principal as a member. Use the following command:
2222

2323
```azurecli-interactive
2424
az role assignment create \
@@ -67,7 +67,7 @@ This article requires Azure CLI version 2.30.0 or later. If you're using Azure C
6767
}
6868
```
6969
70-
1. In the Azure portal, go to your key vault and select **Access policies**. Then select **Add Access Policy** to create an access policy for your keys:
70+
1. In the Azure portal, go to your key vault and select **Access policies**. Then select **Add Access Policy** to create an access policy for your keys.
7171
7272
:::image type="content" source="./media/cmk/key-vault-access-policy-1.png" alt-text="Screenshot that shows the pane for access policies in the Azure portal." lightbox="./media/cmk/key-vault-access-policy-1.png" border="true":::
7373

articles/managed-instance-apache-cassandra/jaeger.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ This article details the use of the sample application HotROD and Jaeger alongsi
7575

7676
## Support
7777

78-
If you have problems running or testing Jaeger, open a support ticket. Provide the subscription ID and account name where your Jaeger test is running.
78+
If you have problems running or testing Jaeger, open a support ticket. Provide the subscription ID and account name where your Jaeger instance is running.
7979

8080
## Next steps
8181

articles/managed-instance-apache-cassandra/manage-resources-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ az managed-cassandra cluster list\
111111
List clusters by subscription ID by using the [az managed-cassandra cluster list](/cli/azure/managed-cassandra) command:
112112

113113
```azurecli-interactive
114-
# set your subscription id
114+
# Set your subscription ID
115115
az account set -s <subscriptionID>
116116
117117
az managed-cassandra cluster list
@@ -172,7 +172,7 @@ Choose the value for `--sku` from the following available virtual machine (VM) o
172172
* Standard_L16as_v3
173173
* Standard_L32as_v3
174174

175-
Currently, Azure Managed Instance for Apache Cassandra doesn't support transitioning across VM families. For instance, if you currently have a Standard_DS13_v2 VM and are interested in upgrading to a larger VM such as Standard_DS14_v2, this option isn't available. However, you can open a support ticket to request an upgrade to the larger VM.
175+
Currently, Azure Managed Instance for Apache Cassandra doesn't support transitioning across VM families. For instance, if you currently have a Standard_DS13_v2 VM and are interested in upgrading to a larger VM such as Standard_DS14_v2, this option isn't available. However, you can open a support ticket to request the upgrade.
176176

177177
In the preceding command, `--availability-zone` is set to `false`. To enable availability zones, set this value to `true`. Availability zones increase the service-level agreement (SLA) for availability of the service. For more information, review the [full SLA details](https://azure.microsoft.com/support/legal/sla/managed-instance-apache-cassandra/v1_0/).
178178

articles/managed-instance-apache-cassandra/monitor-clusters.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ You can visualize metrics for Azure Managed Instance for Apache Cassandra in the
2222

2323
## Diagnostic settings in Azure
2424

25-
Azure Monitor uses diagnostic settings to collect resource logs, which are also called *data plane logs*. An Azure resource emits resource logs to provide rich, frequent data about its operation. Azure Monitor captures these logs per request. Examples of data plane operations include delete, insert, and readFeed. The content of these logs varies by resource type.
25+
Azure Monitor uses diagnostic settings to collect resource logs, which are also called *data plane logs*. An Azure resource emits resource logs to provide rich, frequent data about its operations. Azure Monitor captures these logs per request. Examples of data plane operations include delete, insert, and readFeed. The content of these logs varies by resource type.
2626

2727
Platform metrics and activity logs are collected automatically, whereas you must create a diagnostic setting to collect resource logs or to forward them outside Azure Monitor. You can turn on diagnostic settings for Azure Managed Instance for Apache Cassandra cluster resources and send resource logs to the following sources:
2828

@@ -33,7 +33,7 @@ Platform metrics and activity logs are collected automatically, whereas you must
3333
> [!NOTE]
3434
> We recommend creating the diagnostic setting in resource-specific mode.
3535
36-
## <a id="create-setting-portal"></a> Create diagnostic settings via the Azure portal
36+
### <a id="create-setting-portal"></a> Create diagnostic settings via the Azure portal
3737

3838
1. Sign in to the [Azure portal](https://portal.azure.com).
3939

@@ -60,7 +60,7 @@ Platform metrics and activity logs are collected automatically, whereas you must
6060

6161
:::image type="content" source="./media/azure-monitor/query.png" alt-text="Screenshot that shows query logs.":::
6262

63-
## <a id="create-setting-cli"></a> Create a diagnostic setting via Azure CLI
63+
### <a id="create-setting-cli"></a> Create a diagnostic setting via the Azure CLI
6464

6565
To create a diagnostic setting by using the Azure CLI, use the [az monitor diagnostic-settings create](/cli/azure/monitor/diagnostic-settings#az-monitor-diagnostic-settings-create) command:
6666

@@ -72,21 +72,21 @@ To create a diagnostic setting by using the Azure CLI, use the [az monitor diagn
7272
az monitor diagnostic-settings create --name tvk-diagnostic-logs-cassandra --resource $resourceId --logs $logs --workspace $workspace --export-to-resource-specific true
7373
```
7474

75-
## <a id="create-diagnostic-setting"></a> Create a diagnostic setting via REST API
75+
### <a id="create-diagnostic-setting"></a> Create a diagnostic setting via the REST API
7676

7777
Use the [Azure Monitor REST API](/rest/api/monitor/diagnosticsettings/createorupdate) for creating a diagnostic setting via the interactive console.
7878

7979
> [!NOTE]
8080
> We recommend setting the `logAnalyticsDestinationType` property to `Dedicated` for enabling resource-specific tables.
8181
82-
### Request
82+
#### Request
8383

8484
```HTTP
8585
PUT
8686
https://management.azure.com/{resource-id}/providers/microsoft.insights/diagnosticSettings/service?api-version={api-version}
8787
```
8888

89-
### Headers
89+
#### Headers
9090

9191
|Parameters/Headers | Value/Description |
9292
|---------|---------|
@@ -95,7 +95,7 @@ https://management.azure.com/{resource-id}/providers/microsoft.insights/diagnost
9595
|`api-version` | `2017-05-01-preview` |
9696
|`Content-Type` | `application/json` |
9797

98-
### Body
98+
#### Body
9999

100100
```json
101101
{
@@ -177,7 +177,7 @@ Examples:
177177

178178
### Cassandra 4 and later
179179

180-
In Cassandra 4 and later, you can configure your whitelist in the Cassandra configuration. For detailed guidance, see [Update Cassandra Configuration](create-cluster-portal.md#update-cassandra-configuration). The available options are as follows (reference: [Cassandra documentation for audit logging](https://cassandra.apache.org/doc/stable/cassandra/operating/audit_logging.html)):
180+
In Cassandra 4 and later, you can configure your whitelist in the Cassandra configuration. For detailed guidance, see [Update Cassandra configuration](create-cluster-portal.md#update-cassandra-configuration). The available options are as follows (reference: [Cassandra documentation for audit logging](https://cassandra.apache.org/doc/stable/cassandra/operating/audit_logging.html)):
181181

182182
```
183183
audit_logging_options:

articles/managed-instance-apache-cassandra/use-vpn.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ However, if you have internal security concerns about data exfiltration, your se
3939
--cluster-name "vpn-test-cluster"
4040
```
4141

42-
From the output, make a copy of the `privateLinkResourceId` ID.
42+
From the output, make a copy of the `privateLinkResourceId` value.
4343

4444
1. In the Azure portal, [create a private endpoint](../cosmos-db/how-to-configure-private-endpoints.md) by using these details:
4545
1. On the **Resource** tab, select **Connect to an Azure resource by resource ID or alias** as the connection method and **Microsoft.Network/privateLinkServices** as the resource type. Enter the `privateLinkResourceId` value from the previous step.

0 commit comments

Comments
 (0)