Skip to content

Commit a9f87c0

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into diberry/0114-qna-fix
2 parents 10e23ef + d9dbf91 commit a9f87c0

File tree

6 files changed

+125
-160
lines changed

6 files changed

+125
-160
lines changed

articles/azure-monitor/platform/customer-managed-keys.md

Lines changed: 106 additions & 124 deletions
Large diffs are not rendered by default.

articles/hdinsight/storm/apache-storm-develop-csharp-event-hub-topology.md

Lines changed: 12 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,13 @@
22
title: Process events from Event Hubs with Storm - Azure HDInsight
33
description: Learn how to process data from Azure Event Hubs with a C# Storm topology created in Visual Studio, by using the HDInsight tools for Visual Studio.
44
author: hrasheed-msft
5+
ms.author: hrasheed
56
ms.reviewer: jasonh
6-
77
ms.service: hdinsight
88
ms.topic: conceptual
9-
ms.date: 11/27/2017
10-
ms.author: hrasheed
11-
ROBOTS: NOINDEX
9+
ms.date: 01/14/2020
1210
---
11+
1312
# Process events from Azure Event Hubs with Apache Storm on HDInsight (C#)
1413

1514
Learn how to work with Azure Event Hubs from [Apache Storm](https://storm.apache.org/) on HDInsight. This document uses a C# Storm topology to read and write data from Event Hubs
@@ -21,20 +20,12 @@ Learn how to work with Azure Event Hubs from [Apache Storm](https://storm.apache
2120

2221
The steps in this document use SCP.NET, a NuGet package that makes it easy to create C# topologies and components for use with Storm on HDInsight.
2322

24-
> [!IMPORTANT]
25-
> While the steps in this document rely on a Windows development environment with Visual Studio, the compiled project can be submitted to a Storm on HDInsight cluster that uses Linux. Only Linux-based clusters created after October 28, 2016, support SCP.NET topologies.
26-
2723
HDInsight 3.4 and greater use Mono to run C# topologies. The example used in this document works with HDInsight 3.6. If you plan on creating your own .NET solutions for HDInsight, check the [Mono compatibility](https://www.mono-project.com/docs/about-mono/compatibility/) document for potential incompatibilities.
2824

2925
### Cluster versioning
3026

3127
The Microsoft.SCP.Net.SDK NuGet package you use for your project must match the major version of Storm installed on HDInsight. HDInsight versions 3.5 and 3.6 use Storm 1.x, so you must use SCP.NET version 1.0.x.x with these clusters.
3228

33-
> [!IMPORTANT]
34-
> The example in this document expects an HDInsight 3.5 or 3.6 cluster.
35-
>
36-
> Linux is the only operating system used on HDInsight version 3.4 or greater.
37-
3829
C# topologies must also target .NET 4.5.
3930

4031
## How to work with Event Hubs
@@ -104,9 +95,6 @@ You can download a complete version of the project created in this article from
10495

10596
* An Apache Storm cluster on HDInsight. See [Create Apache Hadoop clusters using the Azure portal](../hdinsight-hadoop-create-linux-clusters-portal.md) and select **Storm** for **Cluster type**.
10697

107-
> [!WARNING]
108-
> The example used in this document requires Storm on HDInsight version 3.5 or 3.6. This does not work with older versions of HDInsight, due to breaking class name changes. For a version of this example that works with older clusters, see [GitHub](https://github.com/Azure-Samples/hdinsight-dotnet-java-storm-eventhub/releases).
109-
11098
* An [Azure event hub](../../event-hubs/event-hubs-create.md).
11199

112100
* The [Azure .NET SDK](https://azure.microsoft.com/downloads/).
@@ -128,7 +116,7 @@ Create a directory named `eventhubspout`, and save the file into the directory.
128116

129117
Event Hubs is the data source for this example. Use the information in the "Create an event hub" section of [Get started with Event Hubs](../../event-hubs/event-hubs-create.md).
130118

131-
1. After the event hub has been created, view the **EventHub** settings in the Azure portal, and select **Shared access policies**. Select **+ Add** to add the following policies:
119+
1. After the event hub has been created, view the **EventHub** settings in the Azure portal, and select **Shared access policies**. Select **+ Add** to create the following policies:
132120

133121
| Name | Permissions |
134122
| --- | --- |
@@ -141,11 +129,11 @@ Event Hubs is the data source for this example. Use the information in the "Crea
141129

142130
## Configure the EventHubWriter
143131

144-
1. If you have not already installed the latest version of the HDInsight tools for Visual Studio, see [Get started using HDInsight tools for Visual Studio](../hadoop/apache-hadoop-visual-studio-tools-get-started.md).
132+
1. If you haven't already installed the latest version of the HDInsight tools for Visual Studio, see [Get started using HDInsight tools for Visual Studio](../hadoop/apache-hadoop-visual-studio-tools-get-started.md).
145133

146134
2. Download the solution from [eventhub-storm-hybrid](https://github.com/Azure-Samples/hdinsight-dotnet-java-storm-eventhub).
147135

148-
3. In the **EventHubWriter** project, open the **App.config** file. Use the information from the event hub that you configured earlier to fill in the value for the following keys:
136+
3. Open **EventHubExample.sln**. In the **EventHubWriter** project, open the **App.config** file. Use the information from the event hub that you configured earlier to fill in the value for the following keys:
149137

150138
| Key | Value |
151139
| --- | --- |
@@ -199,9 +187,11 @@ Event Hubs is the data source for this example. Use the information in the "Crea
199187

200188
9. In the **Executors** section, select one of the links in the **Port** column. This displays information logged by the component. The logged information is similar to the following text:
201189

202-
2017-03-02 14:51:29.255 m.s.p.TaskHost [INFO] Received C# STDOUT: 2017-03-02 14:51:29,255 [1] INFO EventHubReader_LogBolt [(null)] - Received data: {"deviceValue":1830978598,"deviceId":"8566ccbc-034d-45db-883d-d8a31f34068e"}
203-
2017-03-02 14:51:29.283 m.s.p.TaskHost [INFO] Received C# STDOUT: 2017-03-02 14:51:29,283 [1] INFO EventHubReader_LogBolt [(null)] - Received data: {"deviceValue":1756413275,"deviceId":"647a5eff-823d-482f-a8b4-b95b35ae570b"}
204-
2017-03-02 14:51:29.313 m.s.p.TaskHost [INFO] Received C# STDOUT: 2017-03-02 14:51:29,312 [1] INFO EventHubReader_LogBolt [(null)] - Received data: {"deviceValue":1108478910,"deviceId":"206a68fa-8264-4d61-9100-bfdb68ee8f0a"}
190+
```output
191+
2017-03-02 14:51:29.255 m.s.p.TaskHost [INFO] Received C# STDOUT: 2017-03-02 14:51:29,255 [1] INFO EventHubReader_LogBolt [(null)] - Received data: {"deviceValue":1830978598,"deviceId":"8566ccbc-034d-45db-883d-d8a31f34068e"}
192+
2017-03-02 14:51:29.283 m.s.p.TaskHost [INFO] Received C# STDOUT: 2017-03-02 14:51:29,283 [1] INFO EventHubReader_LogBolt [(null)] - Received data: {"deviceValue":1756413275,"deviceId":"647a5eff-823d-482f-a8b4-b95b35ae570b"}
193+
2017-03-02 14:51:29.313 m.s.p.TaskHost [INFO] Received C# STDOUT: 2017-03-02 14:51:29,312 [1] INFO EventHubReader_LogBolt [(null)] - Received data: {"deviceValue":1108478910,"deviceId":"206a68fa-8264-4d61-9100-bfdb68ee8f0a"}
194+
```
205195
206196
## Stop the topologies
207197
@@ -215,7 +205,7 @@ To stop the topologies, select each topology in the **Storm Topology Viewer**, t
215205
216206
## Next steps
217207
218-
In this document, you have learned how to use the Java Event Hubs spout and bolt from a C# topology to work with data in Azure Event Hubs. To learn more about creating C# topologies, see the following:
208+
In this document, you've learned how to use the Java Event Hubs spout and bolt from a C# topology to work with data in Azure Event Hubs. To learn more about creating C# topologies, see the following:
219209
220210
* [Develop C# topologies for Apache Storm on HDInsight using Visual Studio](apache-storm-develop-csharp-visual-studio-topology.md)
221211
* [SCP programming guide](apache-storm-scp-programming-guide.md)

articles/media-services/video-indexer/upload-index-videos.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: femila
99
ms.service: media-services
1010
ms.subservice: video-indexer
1111
ms.topic: article
12-
ms.date: 12/03/2019
12+
ms.date: 01/14/2020
1313
ms.author: juliako
1414
---
1515

@@ -311,6 +311,7 @@ The status codes listed in the following table may be returned by the Upload ope
311311
|---|---|---|
312312
|400|VIDEO_ALREADY_IN_PROGRESS|Same video is already in progress of being processed in the given account.|
313313
|400|VIDEO_ALREADY_FAILED|Same video failed to process in the given account less than 2 hours ago. API clients should wait at least 2 hours before re-uploading a video.|
314+
|409|VIDEO_INDEXING_IN_PROGRESS||
314315

315316
## Next steps
316317

-6.69 KB
Loading
-29.2 KB
Loading

articles/virtual-machines/windows/disk-encryption.md

Lines changed: 5 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Server-side encryption of Azure Managed Disks - PowerShell
33
description: Azure Storage protects your data by encrypting it at rest before persisting it to Storage clusters. You can rely on Microsoft-managed keys for the encryption of your managed disks, or you can use customer-managed keys to manage encryption with your own keys.
44
author: roygara
55

6-
ms.date: 01/13/2020
6+
ms.date: 01/10/2020
77
ms.topic: conceptual
88
ms.author: rogarana
99
ms.service: virtual-machines-windows
@@ -50,22 +50,14 @@ The following list explains the diagram in even more detail:
5050

5151
To revoke access to customer-managed keys, see [Azure Key Vault PowerShell](https://docs.microsoft.com/powershell/module/azurerm.keyvault/) and [Azure Key Vault CLI](https://docs.microsoft.com/cli/azure/keyvault). Revoking access effectively blocks access to all data in the storage account, as the encryption key is inaccessible by Azure Storage.
5252

53-
### Supported scenarios and restrictions
54-
55-
For now, only the following scenarios are supported:
53+
### Supported regions
54+
- Available as a GA offering in East US, West US 2, and South Central US.
55+
- Available as a public preview in West Central US, East US 2, Canada Central, and North Europe.
5656

57-
- Create a virtual machine (VM) from an Azure Marketplace image and encrypt the OS disk with server-side encryption using customer-managed keys.
58-
- Create a custom image encrypted with server-side encryption and customer-managed keys.
59-
- Create a VM from a custom image and encrypt the OS disk using server-side encryption and customer-managed keys.
60-
- Create data disks encrypted using server-side encryption and customer-managed keys.
61-
- (CLI/PowerShell only) Create snapshots that are encrypted using server-side encryption and customer-managed keys.
62-
- Create virtual machine scale sets that are encrypted with server-side encryption and customer-managed keys.
63-
- ["Soft" and "Hard" RSA keys](../../key-vault/about-keys-secrets-and-certificates.md#keys-and-key-types) of size 2080 are supported.
57+
### Restrictions
6458

6559
For now, we also have the following restrictions:
6660

67-
- Available as a GA offering in East US, West US 2, and South Central US.
68-
- Available as a public preview in West Central US, East US 2, Canada Central, and North Europe.
6961
- Disks created from custom images that are encrypted using server-side encryption and customer-managed keys must be encrypted using the same customer-managed keys and must be in the same subscription.
7062
- Snapshots created from disks that are encrypted with server-side encryption and customer-managed keys must be encrypted with the same customer-managed keys.
7163
- Custom images encrypted using server-side encryption and customer-managed keys cannot be used in the shared image gallery.

0 commit comments

Comments
 (0)