You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cosmos-db/how-to-container-copy.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.reviewer: sidandrews
17
17
18
18
This article describes how to create, monitor, and manage intra-account container copy jobs using Azure PowerShell or CLI commands.
19
19
20
-
## Pre-requisites
20
+
## Prerequisites
21
21
22
22
* You may use the portal [Cloud Shell](/azure/cloud-shell/quickstart?tabs=powershell) to run container copy commands. Alternately, you may run the commands locally; make sure you have [Azure CLI](/cli/azure/install-azure-cli) or [Azure PowerShell](/powershell/azure/install-az-ps-msi) downloaded and installed on your machine.
23
23
* Currently, container copy is only supported in [these regions](intra-account-container-copy.md#supported-regions). Make sure your account's write region belongs to this list.
@@ -33,7 +33,7 @@ az extension add --name cosmosdb-preview
33
33
34
34
## Set shell variables
35
35
36
-
First, set all of the variables that each individual script will use.
36
+
First, set all of the variables that each individual script uses.
37
37
38
38
```azurepowershell-interactive
39
39
$resourceGroup = "<resource-group-name>"
@@ -116,7 +116,7 @@ az cosmosdb dts resume `
116
116
```
117
117
118
118
## Get support for container copy issues
119
-
For issues related to intra-account container copy, please raise a New Support Request from the Azure Portal with the Problem Type as 'Data Migration' and Problem subtype as 'Intra-account container copy'.
119
+
For issues related to intra-account container copy, please raise a **New Support Request** from the Azure portal. Set the **Problem Type** as 'Data Migration' and **Problem subtype** as 'Intra-account container copy'.
Copy file name to clipboardExpand all lines: articles/cosmos-db/intra-account-container-copy.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ Intra-account container copy jobs can be [created and managed using CLI commands
30
30
31
31
## Get started
32
32
33
-
To get started using container copy jobs, register for "Intra-account offline container copy (Cassandra & SQL)" preview from the ['Preview Features'](access-previews.md) list in the Azure portal. Once the registration is complete, the preview will be effective for all Cassandra and API for NoSQL accounts in the subscription.
33
+
To get started using container copy jobs, register for "Intra-account offline container copy (Cassandra & SQL)" preview from the ['Preview Features'](access-previews.md) list in the Azure portal. Once the registration is complete, the preview is effective for all Cassandra and API for NoSQL accounts in the subscription.
34
34
35
35
## Overview of steps needed to do container copy
36
36
@@ -49,7 +49,7 @@ Intra-account container copy jobs perform offline data copy using the source con
49
49
* The container copy jobs run on these instances.
50
50
* A single job is executed across all instances at any time.
51
51
* The instances are shared by all the container copy jobs running within the same account.
52
-
* The platform may de-allocate the instances if they're idle for >15 mins.
52
+
* The platform may deallocate the instances if they're idle for >15 mins.
53
53
54
54
> [!NOTE]
55
55
> We currently only support offline container copy jobs. So, we strongly recommend to stop performing any operations on the source container prior to beginning the container copy. Item deletions and updates done on the source container after beginning the copy job may not be captured. Hence, continuing to perform operations on the source container while the container job is in progress may result in additional or missing data on the target container.
@@ -78,15 +78,15 @@ Container copy jobs are currently supported on best-effort basis. We don't provi
78
78
79
79
### Can I create multiple container copy jobs within an account?
80
80
81
-
Yes, you can create multiple jobs within the same account. The jobs will run consecutively. You can [list all the jobs](how-to-container-copy.md#list-all-the-container-copy-jobs-created-in-an-account) created within an account and monitor their progress.
81
+
Yes, you can create multiple jobs within the same account. The jobs run consecutively. You can [list all the jobs](how-to-container-copy.md#list-all-the-container-copy-jobs-created-in-an-account) created within an account and monitor their progress.
82
82
83
83
### Can I copy an entire database within the Azure Cosmos DB account?
84
84
85
-
You'll have to create a job for each container in the database.
85
+
You must create a job for each container in the database.
86
86
87
87
### I have an Azure Cosmos DB account with multiple regions. In which region will the container copy job run?
88
88
89
-
The container copy job will run in the write region. If there are accounts configured with multi-region writes, the job will run in one of the regions from the list.
89
+
The container copy job runs in the write region. If there are accounts configured with multi-region writes, the job runs in one of the regions from the list.
90
90
91
91
### What happens to the container copy jobs when the account's write region changes?
92
92
@@ -95,8 +95,8 @@ The account's write region may change in the rare scenario of a region outage or
95
95
### Why is a new database *__datatransferstate* created in the account when I run container copy jobs? Am I being charged for this database?
96
96
97
97
**__datatransferstate* is a database that is created while running container copy jobs. This database is used by the platform to store the state and progress of the copy job.
98
-
* The database uses manual provisioned throughput of 800 RUs. You'll be charged for this database.
99
-
* Deleting this database will remove the container copy job history from the account. It can be safely deleted once all the jobs in the account have completed, if you no longer need the job history. The platform won't clean up the *__datatransferstate* database automatically.
98
+
* The database uses manual provisioned throughput of 800 RUs. You are charged for this database.
99
+
* Deleting this database removes the container copy job history from the account. It can be safely deleted once all the jobs in the account have completed, if you no longer need the job history. The platform doesn't clean up the *__datatransferstate* database automatically.
Copy file name to clipboardExpand all lines: articles/databox-online/azure-stack-edge-gpu-deploy-arc-kubernetes-cluster.md
+16-14Lines changed: 16 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,12 +17,14 @@ ms.author: alkohli
17
17
18
18
This article shows you how to enable Azure Arc on an existing Kubernetes cluster on your Azure Stack Edge Pro device.
19
19
20
-
This procedure is intended for those who have reviewed the [Kubernetes workloads on Azure Stack Edge Pro device](azure-stack-edge-gpu-kubernetes-workload-management.md)and are familiar with the concepts of [What is Azure Arc-enabled Kubernetes (Preview)?](../azure-arc/kubernetes/overview.md).
20
+
This procedure assumes that you have read and understood the following articles:
21
21
22
+
-[Kubernetes workloads on Azure Stack Edge Pro device](azure-stack-edge-gpu-kubernetes-workload-management.md)
23
+
-[What is Azure Arc-enabled Kubernetes (Preview)?](../azure-arc/kubernetes/overview.md)
22
24
23
25
## Prerequisites
24
26
25
-
Before you can enable Azure Arc on Kubernetes cluster, make sure that you have completed the following prerequisites on your Azure Stack Edge Pro device and the client that you will use to access the device:
27
+
Make sure that you've completed the following prerequisites on your Azure Stack Edge Pro device and the client that you use to access the device:
26
28
27
29
### For device
28
30
@@ -35,14 +37,14 @@ Before you can enable Azure Arc on Kubernetes cluster, make sure that you have c
35
37
36
38
### For client accessing the device
37
39
38
-
1. You have a Windows client system that will be used to access the Azure Stack Edge Pro device.
40
+
1. You have a Windows client system that is used to access the Azure Stack Edge Pro device.
39
41
40
42
- The client is running Windows PowerShell 5.0 or later. To download the latest version of Windows PowerShell, go to [Install Windows PowerShell](/powershell/scripting/install/installing-powershell-core-on-windows).
41
43
42
44
- You can have any other client with a [Supported operating system](azure-stack-edge-gpu-system-requirements.md#supported-os-for-clients-connected-to-device) as well. This article describes the procedure when using a Windows client.
43
45
44
46
45
-
1. You have completed the procedure described in [Access the Kubernetes cluster on Azure Stack Edge Pro device](azure-stack-edge-gpu-create-kubernetes-cluster.md). You have:
47
+
1. You've completed the procedure described in [Access the Kubernetes cluster on Azure Stack Edge Pro device](azure-stack-edge-gpu-create-kubernetes-cluster.md). You have:
46
48
47
49
- Installed `kubectl` on the client.
48
50
- Make sure that the `kubectl` client version is skewed no more than one version from the Kubernetes master version running on your Azure Stack Edge Pro device.
@@ -56,9 +58,9 @@ Before you can enable Azure Arc on Kubernetes cluster, make sure that you have c
56
58
57
59
## Register Kubernetes resource providers
58
60
59
-
Before you enable Azure Arc on the Kubernetes cluster, you will need to enable and register `Microsoft.Kubernetes` and `Microsoft.KubernetesConfiguration` against your subscription.
61
+
Before you enable Azure Arc on the Kubernetes cluster, you need to enable and register `Microsoft.Kubernetes` and `Microsoft.KubernetesConfiguration` against your subscription.
60
62
61
-
1. To enable a resource provider, in the Azure portal, go to the subscription that you are planning to use for the deployment. Go to **Resource Providers**.
63
+
1. To enable a resource provider, in the Azure portal, go to the subscription that you're planning to use for the deployment. Go to **Resource Providers**.
62
64
1. In the right-pane, search for the providers you want to add. In this example, `Microsoft.Kubernetes` and `Microsoft.KubernetesConfiguration`.
@@ -87,9 +89,9 @@ You can also register resource providers via the `az cli`. For more information,
87
89
88
90
`az ad sp create-for-rbac --name "<Informative name for service principal>"`
89
91
90
-
For information on how to log into the `az cli`, [Start Cloud Shell in Azure portal](/azure/cloud-shell/quickstart). If using `az cli` on a local client to create the service principal, make sure that you are running version 2.25 or later.
92
+
For information on how to log into the `az cli`, [Start Cloud Shell in Azure portal](/azure/cloud-shell/quickstart). If using `az cli` on a local client to create the service principal, make sure that you're running version 2.25 or later.
91
93
92
-
Here is an example.
94
+
Here's an example.
93
95
94
96
```azurecli
95
97
PS /home/user> az ad sp create-for-rbac --name "https://azure-arc-for-ase-k8s"
@@ -103,13 +105,13 @@ You can also register resource providers via the `az cli`. For more information,
103
105
PS /home/user>
104
106
```
105
107
106
-
1. Make a note of the `appID`, `name`, `password`, and `tenantID` as you will use this as input in the next command.
108
+
1. Make a note of the `appID`, `name`, `password`, and `tenantID` as you'll use these values as input to the next command.
107
109
108
110
1. After creating the new service principal, assign the `Kubernetes Cluster - Azure Arc Onboarding` role to the newly created principal. This is a built-in Azure role (use the role ID in the command) with limited permissions. Use the following command:
109
111
110
112
`az role assignment create --role 34e09817-6cbe-4d01-b1a2-e0eac5743d41 --assignee <appId-from-service-principal> --scope /subscriptions/<SubscriptionID>/resourceGroups/<Resource-group-name>`
111
113
112
-
Here is an example.
114
+
Here's an example.
113
115
114
116
```azurecli
115
117
PS /home/user> az role assignment create --role 34e09817-6cbe-4d01-b1a2-e0eac5743d41 --assignee xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx --scope /subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/myaserg1
@@ -138,16 +140,16 @@ Follow these steps to configure the Kubernetes cluster for Azure Arc management:
138
140
139
141
`Set-HcsKubernetesAzureArcAgent -SubscriptionId "<Your Azure Subscription Id>" -ResourceGroupName "<Resource Group Name>" -ResourceName "<Azure Arc resource name (shouldn't exist already)>" -Location "<Region associated with resource group>" -TenantId "<Tenant Id of service principal>" -ClientId "<App id of service principal>"`
140
142
141
-
When this command is run, there is a followup prompt to enter the `ClientSecret`. Provide the service principal password.
143
+
When this command is run, there's a follow-up prompt to enter the `ClientSecret`. Provide the service principal password.
142
144
143
-
Add the `CloudEnvironment` parameter if you are using a cloud other than Azure public. You can set this parameter to `AZUREPUBLICCLOUD`, `AZURECHINACLOUD`, `AZUREGERMANCLOUD`, and `AZUREUSGOVERNMENTCLOUD`.
145
+
Add the `CloudEnvironment` parameter if you're using a cloud other than Azure public. You can set this parameter to `AZUREPUBLICCLOUD`, `AZURECHINACLOUD`, `AZUREGERMANCLOUD`, and `AZUREUSGOVERNMENTCLOUD`.
144
146
145
147
> [!NOTE]
146
148
> - To deploy Azure Arc on your device, make sure that you are using a [Supported region for Azure Arc](https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc).
147
149
> - Use the `az account list-locations` command to figure out the exact location name to pass in the `Set-HcsKubernetesAzureArcAgent` cmdlet. Location names are typically formatted without any spaces.
Copy file name to clipboardExpand all lines: articles/devtest-labs/how-to-move-labs.md
+14-13Lines changed: 14 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Move a DevTest lab to another region
2
+
title: Move DevTest Labs to another region
3
3
description: Shows you how to move a lab to another region.
4
4
ms.topic: how-to
5
5
ms.custom: devx-track-azurepowershell
@@ -8,11 +8,11 @@ author: RoseHJM
8
8
ms.date: 03/03/2022
9
9
---
10
10
11
-
# Move a DevTest lab to another region
11
+
# Move DevTest Labs to another region
12
12
13
13
To move a lab, create a copy of an existing lab in another region.
14
14
15
-
In this article, you'll learn how to:
15
+
In this article, you learn how to:
16
16
> [!div class="checklist"]
17
17
> >
18
18
> - Export an Azure Resource Manager (ARM) template of your lab.
@@ -21,13 +21,14 @@ In this article, you'll learn how to:
21
21
> - Configure the new lab.
22
22
> - Move data to the new lab.
23
23
> - Delete the resources in the source region.
24
+
24
25
## Prerequisites
25
26
26
27
- Ensure that the services and features that your account uses are supported in the target region.
27
28
28
29
- For preview features, ensure that your subscription is allowlisted for the target region.
29
30
30
-
- DevTest Labs doesn't store or expose passwords from the exported ARM template. You will need to know the passwords/secrets for:
31
+
- DevTest Labs doesn't store or expose passwords from the exported ARM template. You need to know the passwords/secrets for:
31
32
32
33
- the VMs
33
34
- the Stored Secrets
@@ -49,15 +50,15 @@ To get started, export and modify a Resource Manager template.
49
50
50
51
### Export an ARM template of your lab.
51
52
52
-
Next, you'll export a JSON template contains settings that describe your lab.
53
+
Next, you export a JSON template contains settings that describe your lab.
53
54
54
55
To export a template by using Azure portal:
55
56
56
57
1. Select **All resources**, and then select the resource group for the lab.
57
58
58
59
1. Select **Export template**.
59
60
60
-
1. Choose **Download** in the **Export template** blade.
61
+
1. Choose **Download** in **Export template**.
61
62
62
63
1. Locate the .zip file that you downloaded from the portal, and unzip that file to a folder of your choice.
63
64
@@ -95,7 +96,7 @@ To update the template by using Azure portal:
95
96
"location": "centralus",
96
97
```
97
98
98
-
1. If you have "All virtual machines in one resource group" set in the "Lab settings", also update the following in the ARM template:
99
+
1. If you have "All virtual machines in one resource group" set in the "Lab settings", also update the following values in the ARM template:
99
100
100
101
+ Update the `apiVersion` of the `microsoft.devtestlab/labs` resource to `2018-10-15-preview`.
101
102
+ Add `vmCreationResourceGroupId` to the `properties` section.
@@ -193,7 +194,7 @@ Deploy the template to create a new lab in the target region.
193
194
|**Resource group**|Select the resource group name you created in the last section. |
194
195
|**Location**|Select a location for the lab. For example, **Central US**. |
195
196
|**Lab Name**|Must be a different name. |
196
-
|**Vnet ID**|Must be the moved one, or the new one you just created. |
197
+
|**Vnet ID**|Must be the moved one, or the new one you created. |
197
198
198
199
199
200
1. Select **Review + create**.
@@ -206,18 +207,18 @@ Deploy the template to create a new lab in the target region.
206
207
207
208
While most Lab resources have been replicated under the new region using the ARM template, a few edits still need to be moved manually.
208
209
209
-
1. Add the Compute Gallery back to the lab if there're any in the original one.
210
+
1. Add the Compute Gallery back to the lab if there are any in the original one.
210
211
1. Add the policies "Virtual machines per user", "Virtual machines per lab" and "Allowed Virtual machine sizes" back to the moved lab
211
212
212
213
### Swap the OS disks of the Compute VMs under the new VMs.
213
214
214
215
Note the VMs under the new Lab have the same specs as the ones under the old Lab. The only difference is their OS Disks.
215
216
216
-
1. Create an empty disks under the new region.
217
+
1. Create an empty disk under the new region.
217
218
218
-
- Get the target Compute VM OS disk name under the new Lab. You can fnd the Compute VM and its disk under the Resource group on the lab's Virtual Machine page.
219
+
- Get the target Compute VM OS disk name under the new Lab. You can find the Compute VM and its disk under the Resource group on the lab's Virtual Machine page.
219
220
220
-
- Use [AzCopy](../storage/common/storage-use-azcopy-v10.md) to copy the old disk content into the new/empty disks in the new region. You can run the Powershell commands from your Dev Box or from the [Azure Cloud Shell](/azure/cloud-shell/quickstart?tabs=powershell).
221
+
- Use [AzCopy](../storage/common/storage-use-azcopy-v10.md) to copy the old disk content into the new/empty disks in the new region. You can run the PowerShell commands from your Dev Box or from the [Azure Cloud Shell](/azure/cloud-shell/quickstart?tabs=powershell).
221
222
222
223
AzCopy is the preferred tool to move your data over. It's optimized for performance. One way that it's faster, is that data is copied directly, so AzCopy doesn't use the network bandwidth of your computer. Use AzCopy at the command line or as part of a custom script. See [Get started with AzCopy](../storage/common/storage-use-azcopy-v10.md).
223
224
@@ -262,7 +263,7 @@ To remove a lab by using the Azure portal:
262
263
263
264
## Next steps
264
265
265
-
In this article, you moved a DevTest lab from one region to another and cleaned up the source resources. To learn more about moving resources between regions and disaster recovery in Azure, refer to:
266
+
In this article, you moved DevTest Labs from one region to another and cleaned up the source resources. To learn more about moving resources between regions and disaster recovery in Azure, refer to:
266
267
267
268
- [Move resources to a new resource group or subscription](../azure-resource-manager/management/move-resource-group-and-subscription.md)
268
269
- [Move Azure VMs to another region](../site-recovery/azure-to-azure-tutorial-migrate.md)
0 commit comments