You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/batch/account-move.md
+13-8Lines changed: 13 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Move an Azure Batch account to another region
3
3
description: Learn how to move an Azure Batch account to a different region using an Azure Resource Manager template in the Azure portal.
4
4
ms.topic: how-to
5
-
ms.date: 12/20/2021
5
+
ms.date: 02/27/2023
6
6
ms.custom: subject-moving-resources
7
7
---
8
8
@@ -17,11 +17,11 @@ For more information on Resource Manager and templates, see [Quickstart: Create
17
17
## Prerequisites
18
18
19
19
- Make sure that the services and features that your Batch account uses are supported in the new target region.
20
-
- It's recommended to move the storage account associated with your Batch account to the new target region. Follow the steps in [Move an Azure Storage account to another region](../storage/common/storage-account-move.md). If you prefer, you can leave the storage account in the original region. Typically, performance is better when your storage account is in the same region as your Batch account. This article assumes you've already migrated your storage account.
20
+
- It's recommended to move any Azure resources associated with your Batch account to the new target region. For example, follow the steps in [Move an Azure Storage account to another region](../storage/common/storage-account-move.md) to move an associated autostorage account. If you prefer, you can leave resources in the original region, however, performance is typically better when your Batch account is in the same region as your other Azure resources used by your workload. This article assumes you've already migrated your storage account or any other regional Azure resources to be aligned with your Batch account.
21
21
22
22
## Prepare the template
23
23
24
-
To get started, you'll need to export and then modify an ARM template.
24
+
To get started, you need to export and then modify an ARM template.
25
25
26
26
### Export a template
27
27
@@ -80,15 +80,15 @@ Load and modify the template so you can create a new Batch account in the target
80
80
```
81
81
82
82
1. Finally, edit the **location** property to use your target region. This example sets the target region to `centralus`.
To obtain region location codes, see [Azure Locations](https://azure.microsoft.com/global-infrastructure/locations/). The code for a region is the region name with no spaces. For example, **Central US** = **centralus**.
@@ -110,15 +110,21 @@ Deploy the template to create a new Batch account in the target region.
110
110
111
111
### Configure the new Batch account
112
112
113
-
Some features won't export to a template, so you'll have to recreate them in the new Batch account. These features include:
113
+
Some features don't export to a template, so you have to recreate them in the new Batch account. These features include:
114
114
115
-
- Jobs
115
+
- Jobs (and tasks)
116
116
- Job schedules
117
117
- Certificates
118
118
- Application packages
119
119
120
120
Be sure to configure features in the new account as needed. You can look at how you've configured these features in your source Batch account for reference.
121
121
122
+
> [!IMPORTANT]
123
+
> New Batch accounts are entirely separate from any prior existing Batch accounts, even within the same region. These newly
124
+
> created Batch accounts will have [default service and core quotas](batch-quota-limit.md) associated with them. For User
125
+
> Subscription pool allocation mode Batch accounts, core quotas from the subscription will apply. You will need to ensure
126
+
> that these new Batch accounts have sufficient quota before migrating your workload.
127
+
122
128
## Discard or clean up
123
129
124
130
Confirm that your new Batch account is successfully working in the new region. Also make sure to restore the necessary features. Then, you can delete the source Batch account.
@@ -132,4 +138,3 @@ Confirm that your new Batch account is successfully working in the new region. A
132
138
## Next steps
133
139
134
140
- Learn more about [moving resources to a new resource group or subscription](../azure-resource-manager/management/move-resource-group-and-subscription.md).
135
-
- Learn how to [move Azure VMs to another region](../site-recovery/azure-to-azure-tutorial-migrate.md).
Copy file name to clipboardExpand all lines: articles/batch/batch-customer-managed-key.md
+34-22Lines changed: 34 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,21 +1,27 @@
1
1
---
2
2
title: Configure customer-managed keys for your Azure Batch account with Azure Key Vault and Managed Identity
3
-
description: Learn how to encrypt Batch data using customer-managed keys.
3
+
description: Learn how to encrypt Batch data using customer-managed keys.
4
4
ms.topic: how-to
5
-
ms.date: 02/11/2021
5
+
ms.date: 02/27/2023
6
6
ms.devlang: csharp
7
7
ms.custom: devx-track-azurecli
8
8
---
9
9
10
10
# Configure customer-managed keys for your Azure Batch account with Azure Key Vault and Managed Identity
11
11
12
-
By default Azure Batch uses platform-managed keys to encrypt all the customer data stored in the Azure Batch Service, like certificates, job/task metadata. Optionally, you can use your own keys, i.e., customer-managed keys, to encrypt data stored in Azure Batch.
12
+
By default Azure Batch uses platform-managed keys to encrypt all the customer data stored in the Azure Batch Service, like certificates, job/task metadata. Optionally, you can use your own keys, that is, customer-managed keys, to encrypt data stored in Azure Batch.
13
13
14
14
The keys you provide must be generated in [Azure Key Vault](../key-vault/general/basic-concepts.md), and they must be accessed with [managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md).
15
15
16
16
There are two types of managed identities: [*system-assigned* and *user-assigned*](../active-directory/managed-identities-azure-resources/overview.md#managed-identity-types).
17
17
18
-
You can either create your Batch account with system-assigned managed identity, or create a separate user-assigned managed identity that will have access to the customer-managed keys. Review the [comparison table](../active-directory/managed-identities-azure-resources/overview.md#managed-identity-types) to understand the differences and consider which option works best for your solution. For example, if you want to use the same managed identity to access multiple Azure resources, a user-assigned managed identity will be needed. If not, a system-assigned managed identity associated with your Batch account may be sufficient. Using a user-assigned managed identity also gives you the option to enforce customer-managed keys at Batch account creation, as shown [in the example below](#create-a-batch-account-with-user-assigned-managed-identity-and-customer-managed-keys).
18
+
You can either create your Batch account with system-assigned managed identity, or create a separate user-assigned managed identity
19
+
that has access to the customer-managed keys. Review the
20
+
[comparison table](../active-directory/managed-identities-azure-resources/overview.md#managed-identity-types) to understand the
21
+
differences and consider which option works best for your solution. For example, if you want to use the same managed identity to
22
+
access multiple Azure resources, a user-assigned managed identity is needed. If not, a system-assigned managed identity associated
23
+
with your Batch account may be sufficient. Using a user-assigned managed identity also gives you the option to enforce
24
+
customer-managed keys at Batch account creation, as shown next.
19
25
20
26
## Create a Batch account with system-assigned managed identity
21
27
@@ -31,13 +37,13 @@ After the account is created, you can find a unique GUID in the **Identity princ
31
37
32
38

33
39
34
-
You will need this value in order to grant this Batch account access to the Key Vault.
40
+
You need this value in order to grant this Batch account access to the Key Vault.
35
41
36
42
### Azure CLI
37
43
38
44
When you create a new Batch account, specify `SystemAssigned` for the `--identity` parameter.
39
45
40
-
```azurecli
46
+
```azurecli-interactive
41
47
resourceGroupName='myResourceGroup'
42
48
accountName='mybatchaccount'
43
49
@@ -48,9 +54,9 @@ az batch account create \
48
54
--identity 'SystemAssigned'
49
55
```
50
56
51
-
After the account is created, you can verify that system-assigned managed identity has been enabled on this account. Be sure to note the `PrincipalId`, as this value will be needed to grant this Batch account access to the Key Vault.
57
+
After the account is created, you can verify that system-assigned managed identity has been enabled on this account. Be sure to note the `PrincipalId`, as this value is needed to grant this Batch account access to the Key Vault.
52
58
53
-
```azurecli
59
+
```azurecli-interactive
54
60
az batch account show \
55
61
--name $accountName \
56
62
--resource-group $resourceGroupName \
@@ -62,13 +68,13 @@ az batch account show \
62
68
63
69
## Create a user-assigned managed identity
64
70
65
-
If you prefer, you can [create a user-assigned managed identity](../active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-portal.md#create-a-user-assigned-managed-identity)which can be used to access your customer-managed keys.
71
+
If you prefer, you can [create a user-assigned managed identity](../active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-portal.md#create-a-user-assigned-managed-identity)that can be used to access your customer-managed keys.
66
72
67
-
You will need the **Client ID** value of this identity in order for it to access the Key Vault.
73
+
You need the **Client ID** value of this identity in order for it to access the Key Vault.
68
74
69
75
## Configure your Azure Key Vault instance
70
76
71
-
The Azure Key Vault in which your keys will be generated must be created in the same tenant as your Batch account. It does not need to be in the same resource group or even in the same subscription.
77
+
The Azure Key Vault in which your keys are generated must be created in the same tenant as your Batch account. It doesn't need to be in the same resource group or even in the same subscription.
72
78
73
79
### Create an Azure Key Vault
74
80
@@ -95,11 +101,11 @@ In the Azure portal, go to the Key Vault instance in the **key** section, select
95
101
96
102

97
103
98
-
After the key is created, click on the newly created key and the current version, copy the **Key Identifier** under **properties** section. Be sure sure that under **Permitted Operations**, **Wrap Key** and **Unwrap Key** are both checked.
104
+
After the key is created, click on the newly created key and the current version, copy the **Key Identifier** under **properties** section. Be sure that under **Permitted Operations**, **Wrap Key** and **Unwrap Key** are both checked.
99
105
100
106
## Enable customer-managed keys on a Batch account
101
107
102
-
Once you have followed the steps above, you can enable customer-managed keys on your Batch account.
108
+
Now that the prerequisites are in place, you can enable customer-managed keys on your Batch account.
103
109
104
110
### Azure portal
105
111
@@ -111,7 +117,7 @@ In the [Azure portal](https://portal.azure.com/), go to the Batch account page.
111
117
112
118
After the Batch account is created with system-assigned managed identity and the access to Key Vault is granted, update the Batch account with the `{Key Identifier}` URL under `keyVaultProperties` parameter. Also set `--encryption-key-source` as `Microsoft.KeyVault`.
113
119
114
-
```azurecli
120
+
```azurecli-interactive
115
121
az batch account set \
116
122
--name $accountName \
117
123
--resource-group $resourceGroupName \
@@ -121,7 +127,8 @@ az batch account set \
121
127
122
128
## Create a Batch account with user-assigned managed identity and customer-managed keys
123
129
124
-
Using the Batch management .NET client, you can create a Batch account that will have a user-assigned managed identity and customer-managed keys.
130
+
As an example using the Batch management .NET client, you can create a Batch account that has a user-assigned managed identity
> You can have your keys automatically rotate by creating a key rotation policy within Key Vault. When specifying a Key Identifier
176
+
> for the Batch account, use the versionless key identifier to enable autorotation with a valid rotation policy. For more information,
177
+
> see [how to configure key rotation](../key-vault/keys/how-to-configure-key-rotation.md) in Key Vault.
178
+
167
179
## Use a different key for Batch encryption
168
180
169
181
To change the key used for Batch encryption, follow these steps:
@@ -174,7 +186,7 @@ To change the key used for Batch encryption, follow these steps:
174
186
175
187
You can also use Azure CLI to use a different key.
176
188
177
-
```azurecli
189
+
```azurecli-interactive
178
190
az batch account set \
179
191
--name $accountName \
180
192
--resource-group $resourceGroupName \
@@ -187,11 +199,11 @@ az batch account set \
187
199
-**Can I select RSA key sizes larger than 2048 bits?** Yes, RSA key sizes of `3072` and `4096` bits are also supported.
188
200
-**What operations are available after a customer-managed key is revoked?** The only operation allowed is account deletion if Batch loses access to the customer-managed key.
189
201
-**How should I restore access to my Batch account if I accidentally delete the Key Vault key?** Since purge protection and soft delete are enabled, you could restore the existing keys. For more information, see [Recover an Azure Key Vault](../key-vault/general/key-vault-recovery.md).
190
-
-**Can I disable customer-managed keys?** You can set the encryption type of the Batch Account back to "Microsoft managed key" at any time. After this, you are free to delete or change the key.
191
-
-**How can I rotate my keys?** Customer-managed keys are not automatically rotated. To rotate the key, update the Key Identifier that the account is associated with.
202
+
-**Can I disable customer-managed keys?** You can set the encryption type of the Batch Account back to "Microsoft managed key" at any time. You're free to delete or change the key afterwards.
203
+
-**How can I rotate my keys?** Customer-managed keys aren't automatically rotated unless the [key is versionless with an appropriate key rotation policy set within Key Vault](../key-vault/keys/how-to-configure-key-rotation.md). To manually rotate the key, update the Key Identifier that the account is associated with.
192
204
-**After I restore access how long will it take for the Batch account to work again?** It can take up to 10 minutes for the account to be accessible again once access is restored.
193
-
-**While the Batch Account is unavailable what happens to my resources?** Any pools that are running when Batch access to customer-managed keys is lost will continue to run. However, the nodes will transition into an unavailable state, and tasks will stop running (and be requeued). Once access is restored, nodes will become available again and tasks will be restarted.
194
-
- **Does this encryption mechanism apply to VM disks in a Batch pool?** No. For Cloud Services Configuration pools (which are [deprecated](https://azure.microsoft.com/updates/azure-batch-cloudserviceconfiguration-pools-will-be-retired-on-29-february-2024/)), no encryption is applied for the OS and temporary disk. For Virtual Machine Configuration pools, the OS and any specified data disks will be encrypted with a Microsoft platform managed key by default. Currently, you cannot specify your own key for these disks. To encrypt the temporary disk of VMs for a Batch pool with a Microsoft platform managed key, you must enable the [diskEncryptionConfiguration](/rest/api/batchservice/pool/add#diskencryptionconfiguration) property in your [Virtual Machine Configuration](/rest/api/batchservice/pool/add#virtualmachineconfiguration) Pool. For highly sensitive environments, we recommend enabling temporary disk encryption and avoiding storing sensitive data on OS and data disks. For more information, see [Create a pool with disk encryption enabled](./disk-encryption.md)
205
+
-**While the Batch Account is unavailable what happens to my resources?** Any pools that are running when Batch access to the customer-managed key is lost will continue to run. However, the nodes in these pools will transition into an unavailable state, and tasks will stop running (and be requeued). Once access is restored, nodes become available again, and tasks are restarted.
206
+
- **Does this encryption mechanism apply to VM disks in a Batch pool?** No. For Cloud Services Configuration pools (which are [deprecated](https://azure.microsoft.com/updates/azure-batch-cloudserviceconfiguration-pools-will-be-retired-on-29-february-2024/)), no encryption is applied for the OS and temporary disk. For Virtual Machine Configuration pools, the OS and any specified data disks are encrypted with a Microsoft platform managed key by default. Currently, you can't specify your own key for these disks. To encrypt the temporary disk of VMs for a Batch pool with a Microsoft platform managed key, you must enable the [diskEncryptionConfiguration](/rest/api/batchservice/pool/add#diskencryptionconfiguration) property in your [Virtual Machine Configuration](/rest/api/batchservice/pool/add#virtualmachineconfiguration) Pool. For highly sensitive environments, we recommend enabling temporary disk encryption and avoiding storing sensitive data on OS and data disks. For more information, see [Create a pool with disk encryption enabled](./disk-encryption.md)
195
207
-**Is the system-assigned managed identity on the Batch account available on the compute nodes?** No. The system-assigned managed identity is currently used only for accessing the Azure Key Vault for the customer-managed key. To use a user-assigned managed identity on compute nodes, see [Configure managed identities in Batch pools](managed-identity-pools.md).
Copy file name to clipboardExpand all lines: articles/healthcare-apis/iot/get-started.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,14 +5,17 @@ author: msjasteppe
5
5
ms.service: healthcare-apis
6
6
ms.subservice: fhir
7
7
ms.topic: quickstart
8
-
ms.date: 1/20/2023
8
+
ms.date: 02/27/2023
9
9
ms.author: jasteppe
10
10
ms.custom: mode-api
11
11
---
12
12
13
13
# Get started with the MedTech service in the Azure Health Data Services
14
14
15
-
This article will show you how to get started with the Azure MedTech service in the [Azure Health Data Services](../healthcare-apis-overview.md). There are six steps you need to follow to be able to deploy and process MedTech service to ingest data from a device using Azure Event Hubs service, persist the data to Azure Fast Healthcare Interoperability Resources (FHIR®) service as Observation resources, and link FHIR service Observations to user and device resources. This article provides an architecture overview to help you follow the six steps of the implementation process.
15
+
> [!NOTE]
16
+
> [Fast Healthcare Interoperability Resources (FHIR®)](https://www.hl7.org/fhir/) is an open healthcare specification.
17
+
18
+
This article will show you how to get started with the Azure MedTech service in the [Azure Health Data Services](../healthcare-apis-overview.md). There are six steps you need to follow to be able to deploy and process MedTech service to ingest data from a device using Azure Event Hubs service, persist the data to Azure FHIR service as Observation resources, and link FHIR service Observations to user and device resources. This article provides an architecture overview to help you follow the six steps of the implementation process.
0 commit comments