You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-troubleshoot-vm-backup-fails-snapshot-timeout.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,7 +99,6 @@ After you register and schedule a VM for the Azure Backup service, Backup starts
99
99
100
100
This error occurs when one of the extension failures puts the VM into provisioning failed state.<br>**Open Azure portal > VM > Settings > Extensions > Extensions status** and check if all extensions are in **provisioning succeeded** state. To learn more, see [Provisioning states](../virtual-machines/states-lifecycle.md#provisioning-states).
101
101
102
-
- If VMSnapshot extension is in a failed state, then right-click on the failed extension and remove it. Trigger an on-demand backup. This action will reinstall the extensions, and run the backup job. <br>
103
102
- If any other extension is in a failed state, then it can interfere with the backup. Ensure those extension issues are resolved and retry the backup operation.
104
103
- If the VM provisioning state is in an updating state, it can interfere with the backup. Ensure that it's healthy and retry the backup operation.
Copy file name to clipboardExpand all lines: articles/iot-central/core/concepts-get-connected.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -106,7 +106,7 @@ If you have a security breach or your primary certificate is set to expire, use
106
106
107
107
### Register and connect devices
108
108
109
-
To bulk connect devices using X.509 certificates, first register the devices in your application by using a CSV file to [import the device IDs and device names](howto-manage-devices.md#import-devices). The device IDs should all be in lower case.
109
+
To bulk connect devices using X.509 certificates, first register the devices in your application by using a CSV file to [import the device IDs and device names](howto-manage-devices.md#import-devices). A device ID can contain letters, numbers, and the `-` character.
110
110
111
111
Generate X.509 leaf certificates for your devices using the root or intermediate certificate you uploaded to your X.509 enrollment group. Use the **Device ID** as the `CNAME` value in the leaf certificates. Your device code needs the **ID scope** value for your application, the **device ID**, and the corresponding device certificate.
112
112
@@ -142,7 +142,7 @@ The flow is slightly different depending on whether the devices use SAS tokens o
142
142
143
143
:::image type="content" source="media/concepts-get-connected/group-primary-key.png" alt-text="Group primary key from SAS-IoT-Devices enrollment group":::
144
144
145
-
1. Use the `az iot central device compute-device-key` command to generate the device SAS keys. Use the group primary key from the previous step. The device IDs must be lower-case:
145
+
1. Use the `az iot central device compute-device-key` command to generate the device SAS keys. Use the group primary key from the previous step. The device ID can contain letters, numbers, and the `-` character:
146
146
147
147
```azurecli
148
148
az iot central device compute-device-key --primary-key <enrollment group primary key> --device-id <device ID>
@@ -163,7 +163,7 @@ The flow is slightly different depending on whether the devices use SAS tokens o
163
163
164
164
1. [Create an enrollment group](#create-an-enrollment-group) and then [Add and verify a root or intermediate X.509 certificate](#add-and-verify-a-root-or-intermediate-x509-certificate) to your IoT Central application.
165
165
166
-
1. Generate the leaf-certificates for your devices using the root or intermediate certificate you added to your IoT Central application. Use lower-case device IDs as the `CNAME` in the leaf certificates.
166
+
1. Generate the leaf-certificates for your devices using the root or intermediate certificate you added to your IoT Central application. Use the device IDs as the `CNAME` in the leaf certificates. A device ID can contain letters, numbers, and the `-` character.
167
167
168
168
1. The OEM flashes each device with a device ID, a generated leaf X.509 certificate, and the application **ID scope** value.
169
169
@@ -178,7 +178,7 @@ The flow is slightly different depending on whether the devices use SAS tokens o
For customers connecting devices that each have their own authentication credentials, use individual enrollments. An individual enrollment is an entry for a single device that is allowed to connect. Individual enrollments can use either X.509 leaf certificates or SAS tokens (from a physical or virtual trusted platform module) as attestation mechanisms. The device ID (also known as registration ID) in an individual enrollment is alphanumeric, lowercase, and may contain hyphens. For more information, see [DPS individual enrollment](../../iot-dps/concepts-service.md#individual-enrollment).
181
+
For customers connecting devices that each have their own authentication credentials, use individual enrollments. An individual enrollment is an entry for a single device that is allowed to connect. Individual enrollments can use either X.509 leaf certificates or SAS tokens (from a physical or virtual trusted platform module) as attestation mechanisms. The device ID (also known as registration ID) in an individual enrollment A device ID can contain letters, numbers, and the `-` character. For more information, see [DPS individual enrollment](../../iot-dps/concepts-service.md#individual-enrollment).
182
182
183
183
> [!NOTE]
184
184
> When you create an individual enrollment for a device, it takes precedence over the default group enrollment options in your IoT Central application.
Copy file name to clipboardExpand all lines: articles/iot-central/core/how-to-connect-devices-x509.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,13 +46,16 @@ In this section, you use an X.509 certificate to connect a device with a cert de
46
46
npm install
47
47
```
48
48
49
-
1. Create a root certificate and then derive a device certificate by running the script. Be sure to only use lower-case alphanumerics and hyphens for certificate name:
49
+
1. Create a root certificate and then derive a device certificate by running the script:
Copy file name to clipboardExpand all lines: articles/iot-central/core/howto-manage-devices.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ To add a device to your Azure IoT Central application:
55
55
56
56
To connect large number of devices to your application, you can bulk import devices from a CSV file. The CSV file should have the following columns and headers:
57
57
58
-
***IOTC_DeviceID** - the device ID should be all lowercase.
58
+
***IOTC_DeviceID** - the device ID can contain letters, numbers, and the `-` character.
Copy file name to clipboardExpand all lines: articles/iot-central/core/quick-create-simulated-device.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -125,7 +125,7 @@ To add a simulated device to your application, you use the **MXChip IoT DevKit**
125
125
126
126
1. To add a new device as an operator choose **Devices** in the left pane. The **Devices** tab shows **All devices** and the **MXChip IoT DevKit** device template. Select **MXChip IoT DevKit**.
127
127
128
-
1. To add a simulated DevKit device, select **+**. Use the suggested **Device ID** or enter your own lowercase **Device ID**. You can also enter a name for your new device. Make sure the **Simulated** toggle is **On** and then select **Create**.
128
+
1. To add a simulated DevKit device, select **+**. Use the suggested **Device ID** or enter your own. A device ID can contain letters, numbers, and the `-` character. You can also enter a name for your new device. Make sure the **Simulated** toggle is **On** and then select **Create**.
Copy file name to clipboardExpand all lines: articles/mysql/concepts-certificate-rotation.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,7 +99,7 @@ If you do not update the root certificate before February 15, 2021 (02/15/2021),
99
99
### 4. What is the impact if using App Service with Azure Database for MySQL?
100
100
For Azure app services, connecting to Azure Database for MySQL, we can have two possible scenarios and it depends on how on you are using SSL with your application.
101
101
* This new certificate has been added to App Service at platform level. If you are using the SSL certificates included on App Service platform in your application, then no action is needed.
102
-
* If you are explicitly including the path to SSL cert file in your code, then you would need to download the new cert and update the code to use the new cert.
102
+
* If you are explicitly including the path to SSL cert file in your code, then you would need to download the new cert and update the code to use the new cert. A good example of this scenario is when you use custom containers in App Service as shared in the [App Service documentation](/app-service/tutorial-multi-container-app#configure-database-variables-in-wordpress.md)
103
103
104
104
### 5. What is the impact if using Azure Kubernetes Services (AKS) with Azure Database for MySQL?
105
105
If you are trying to connect to the Azure Database for MySQL using Azure Kubernetes Services (AKS), it is similar to access from a dedicated customers host environment. Refer to the steps [here](../aks/ingress-own-tls.md).
0 commit comments