You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -68,7 +68,7 @@ You can capture the encryption settings from each disk by using the following Po
68
68
### Single pass
69
69
In a single pass, the encryption settings are stamped on each of the disks (OS and data). You can capture the encryption settings for an OS disk in a single pass as follows:
70
70
71
-
```powershell
71
+
```azurepowershell-interactive
72
72
$RGNAME = "RGNAME"
73
73
$VMNAME = "VMNAME"
74
74
@@ -92,7 +92,7 @@ If the disk doesn't have encryption settings stamped, the output will be empty:
92
92
93
93
Use the following commands to capture encryption settings for data disks:
94
94
95
-
```azurepowershell
95
+
```azurepowershell-interactive
96
96
$RGNAME = "RGNAME"
97
97
$VMNAME = "VMNAME"
98
98
@@ -118,7 +118,7 @@ In a dual pass, the encryption settings are stamped in the VM model and not on e
118
118
119
119
To verify that the encryption settings were stamped in a dual pass, use the following commands:
The following command lists all the containers under a storage account:
296
-
```azurecli
303
+
304
+
```azurecli-interactive
297
305
az storage container list --connection-string $ConnectionString --query [].[name] -o tsv
298
306
```
307
+
299
308
The container used for disks is normally named "vhds."
300
309
301
-
Store the container name on a variable:
302
-
```bash
310
+
Store the container name on a variable:
311
+
312
+
```azurecli-interactive
303
313
ContainerName="name of the container"
304
314
```
305
315
306
316
Use this command to list all the blobs on a particular container:
307
-
```azurecli
317
+
318
+
```azurecli-interactive
308
319
az storage blob list -c ${ContainerName} --connection-string $ConnectionString --query [].[name] -o tsv
309
320
```
321
+
310
322
Choose the disk that you want to query and store its name on a variable:
311
-
```bash
323
+
324
+
```azurecli-interactive
312
325
DiskName="diskname.vhd"
313
326
```
327
+
314
328
Query the disk encryption settings:
315
-
```azurecli
329
+
330
+
```azurecli-interactive
316
331
az storage blob show -c ${ContainerName} --connection-string ${ConnectionString} -n ${DiskName} --query metadata.DiskEncryptionSettings
317
332
```
318
333
319
334
## Operating system
335
+
320
336
Validate if the data disk partitions are encrypted (and the OS disk isn't).
321
337
322
338
When a partition or disk is encrypted, it's displayed as a **crypt** type. When it's not encrypted, it's displayed as a **part/disk** type.
323
339
324
340
```bash
325
-
lsblk
341
+
sudo lsblk
326
342
```
327
343
328
344

@@ -332,24 +348,25 @@ You can get more details by using the following **lsblk** variant.
332
348
You'll see a **crypt** type layer that is mounted by the extension. The following example shows logical volumes and normal disks having **crypto\_LUKS FSTYPE**.
0 commit comments