You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -239,13 +239,18 @@ The following Embeddings models are available with [Azure Government](/azure/azu
239
239
240
240
For Assistants you need a combination of a supported model, and a supported region. Certain tools and capabilities require the latest models. For example [parallel function](../how-to/assistant-functions.md) calling requires the latest 1106 models.
241
241
242
+
| Region |`gpt-35-turbo (0613)`|`gpt-35-turbo (1106)`|`gpt-4 (0613)`|`gpt-4 (1106)`|`gpt-4 (0125)`|
243
+
|-----|---|---|---|---|---|
244
+
| Australia East | ✅ | ✅ | ✅ |✅ ||
245
+
| East US 2 | ✅ || ✅ |✅ ||
246
+
| Sweden Central | ✅ |✅ |✅ |✅||
242
247
243
-
| Region |`gpt-35-turbo (0613)`|`gpt-35-turbo (1106)`|`gpt-4 (0613)`|`gpt-4 (1106)`|
244
-
|-----|---|---|---|---|
245
-
| Australia East | ✅ | ✅ | ✅ |✅ |
246
-
| East US 2 | ✅ | ⬜| ✅ |✅ |
247
-
| Sweden Central | ✅ |✅ |✅ |✅|
248
+
Provisioned Throughput Unit (PTU) availability
248
249
250
+
| Region |`gpt-35-turbo (1106)`|`gpt-4 (1106)`|`gpt-4 (0125)`|
Copy file name to clipboardExpand all lines: articles/batch/automatic-certificate-rotation.md
+87-15Lines changed: 87 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,31 +1,32 @@
1
1
---
2
2
title: Enable automatic certificate rotation in a Batch pool
3
-
description: You can create a Batch pool with a managed identity and a certificate that will automatically be renewed.
3
+
description: You can create a Batch pool with a managed identity and a certificate that can automatically be renewed.
4
4
ms.topic: conceptual
5
5
ms.custom: linux-related-content
6
6
ms.date: 12/05/2023
7
7
---
8
+
8
9
# Enable automatic certificate rotation in a Batch pool
9
10
10
-
You can create a Batch pool with a certificate that will automatically be renewed. To do so, your pool must be created with a [user-assigned managed identity](managed-identity-pools.md) that will have access to the certificate in [Azure Key Vault](../key-vault/general/overview.md).
11
+
You can create a Batch pool with a certificate that can automatically be renewed. To do so, your pool must be created with a [user-assigned managed identity](managed-identity-pools.md) that has access to the certificate in [Azure Key Vault](../key-vault/general/overview.md).
11
12
12
13
## Create a user-assigned identity
13
14
14
15
First, [create your user-assigned managed identity](../active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-portal.md#create-a-user-assigned-managed-identity) in the same tenant as your Batch account. This managed identity doesn't need to be in the same resource group or even in the same subscription.
15
16
16
-
Be sure to note the **Client ID** of the user-assigned managed identity. You'll need this value later.
17
+
Be sure to note the **Client ID** of the user-assigned managed identity. You need this value later.
17
18
18
19
:::image type="content" source="media/automatic-certificate-rotation/client-id.png" alt-text="Screenshot showing the client ID of a user-assigned managed identity in the Azure portal.":::
19
20
20
21
## Create your certificate
21
22
22
-
Next, you'll need to create a certificate and add it to Azure Key Vault. If you haven't already created a key vault, you'll need to do that first. For instructions, see [Quickstart: Set and retrieve a certificate from Azure Key Vault using the Azure portal](../key-vault/certificates/quick-create-portal.md).
23
+
Next, you need to create a certificate and add it to Azure Key Vault. If you haven't already created a key vault, you need to do that first. For instructions, see [Quickstart: Set and retrieve a certificate from Azure Key Vault using the Azure portal](../key-vault/certificates/quick-create-portal.md).
23
24
24
25
When creating your certificate, be sure to set **Lifetime Action Type** to automatically renew, and specify the number of days after which the certificate should renew.
25
26
26
27
:::image type="content" source="media/automatic-certificate-rotation/certificate.png" alt-text="Screenshot of the certificate creation screen in the Azure portal.":::
27
28
28
-
After your certificate has been created, make note of its **Secret Identifier**. You'll need this value later.
29
+
After your certificate has been created, make note of its **Secret Identifier**. You need this value later.
29
30
30
31
:::image type="content" source="media/automatic-certificate-rotation/secret-identifier.png" alt-text="Screenshot showing the Secret Identifier of a certificate.":::
31
32
@@ -48,7 +49,68 @@ REST API URI
48
49
PUT https://management.azure.com/subscriptions/<subscriptionid>/resourceGroups/<resourcegroupName>/providers/Microsoft.Batch/batchAccounts/<batchaccountname>/pools/<poolname>?api-version=2021-01-01
[{"status":{"code":0,"formattedMessage":{"lang":"en","message":"Successfully started Key Vault extension service. 2021-03-03T23:12:23Z"},"operation":"Service start.","status":"success"},"timestampUTC":"2021-03-03T23:12:23Z","version":"1.0"}]root@74773db5fe1b42ab9a4b6cf679d929da000000:/var/lib/waagent/Microsoft.Azure.KeyVault.KeyVaultForLinux-1.0.1363.13/status#
120
185
```
121
186
187
+
## Troubleshooting Key Vault Extension
188
+
189
+
If Key Vault extension is configured incorrectly, the compute node might be in usuable state. To troubleshoot Key Vault extension failure, you can temporarily set requireInitialSync to false and redeploy your pool, then the compute node is in idle state, you can log in to the compute node to check KeyVault extension logs for errors and fix the configuration issues. Visit following Key Vault extension doc link for more information.
190
+
191
+
-[Azure Key Vault extension for Linux](../virtual-machines/extensions/key-vault-linux.md)
192
+
-[Azure Key Vault extension for Windows](../virtual-machines/extensions/key-vault-windows.md)
193
+
122
194
## Next steps
123
195
124
196
- Learn more about [Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md).
Copy file name to clipboardExpand all lines: articles/batch/batch-account-create-portal.md
+3-13Lines changed: 3 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -120,13 +120,13 @@ For detailed steps, see [Assign Azure roles by using the Azure portal](../role-b
120
120
121
121
### Create a key vault
122
122
123
-
User subscription mode requires [Azure Key Vault](/azure/key-vault/general/overview). The key vault must be in the same subscription and region as the Batch account.
123
+
User subscription mode requires [Azure Key Vault](/azure/key-vault/general/overview). The key vault must be in the same subscription and region as the Batch account and use a [Vault Access Policy](/azure/key-vault/general/assign-access-policy).
124
124
125
125
To create a new key vault:
126
126
127
127
1. Search for and select **key vaults** from the Azure Search box, and then select **Create** on the **Key vaults** page.
128
128
1. On the **Create a key vault** page, enter a name for the key vault, and choose an existing resource group or create a new one in the same region as your Batch account.
129
-
1. On the **Access configuration** tab, select either **Azure role-based access control** or **Vault access policy** under **Permission model**, and under **Resource access**, check all 3 checkboxes for **Azure Virtual Machine for deployment**, **Azure Resource Manager for template deployment** and **Azure Disk Encryption for volume encryption**.
129
+
1. On the **Access configuration** tab, select **Vault access policy** under **Permission model**.
130
130
1. Leave the remaining settings at default values, select **Review + create**, and then select **Create**.
131
131
132
132
### Create a Batch account in user subscription mode
@@ -140,18 +140,8 @@ To create a Batch account in user subscription mode:
140
140
141
141
### Grant access to the key vault manually
142
142
143
-
You can also grant access to the key vault manually in [Azure portal](https://portal.azure.com).
143
+
You can also grant access to the key vault manually.
144
144
145
-
#### If the Key Vault permission model is **Azure role-based access control**:
146
-
1. Select **Access control (IAM)** from the left navigation of the key vault page.
147
-
1. At the top of the **Access control (IAM)** page, select **Add** > **Add role assignment**.
148
-
1. On the **Add role assignment** screen, under **Role** tab, under **Job function roles** sub tab, select either **Key Vault Secrets Officer** or **Key Vault Administrator** role for the Batch account, and then select **Next**.
149
-
1. On the **Members** tab, select **Select members**. On the **Select members** screen, search for and select **Microsoft Azure Batch**, and then select **Select**.
150
-
1. Click the **Review + create** button on the bottom to go to **Review + assign** tab, and click the **Review + create** button on the bottom again.
151
-
152
-
For detailed steps, see [Assign Azure roles by using the Azure portal](../role-based-access-control/role-assignments-portal.md).
153
-
154
-
#### If the Key Vault permission model is **Vault access policy**:
155
145
1. Select **Access policies** from the left navigation of the key vault page.
156
146
1. On the **Access policies** page, select **Create**.
157
147
1. On the **Create an access policy** screen, select a minimum of **Get**, **List**, **Set**, and **Delete** permissions under **Secret permissions**. For [key vaults with soft-delete enabled](/azure/key-vault/general/soft-delete-overview), also select **Recover**.
0 commit comments