You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-services/policy-reference.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Built-in policy definitions for Azure AI services
3
3
description: Lists Azure Policy built-in policy definitions for Azure AI services. These built-in policy definitions provide common approaches to managing your Azure resources.
Copy file name to clipboardExpand all lines: articles/ai-studio/how-to/index-add.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.service: azure-ai-studio
7
7
ms.custom:
8
8
- ignite-2023
9
9
ms.topic: how-to
10
-
ms.date: 11/15/2023
10
+
ms.date: 01/15/2024
11
11
ms.reviewer: eur
12
12
ms.author: eur
13
13
author: eric-urban
@@ -117,13 +117,12 @@ If the Azure AI resource the project uses was created through Azure portal:
117
117
118
118
1. Open your AI Studio project
119
119
1. In Flows, create a new Flow or open an existing flow
120
-
1. On the top menu of the flow designer, select More tools, and then select Vector Index Lookup
120
+
1. On the top menu of the flow designer, select **More tools**, and then select ***Index Lookup***
121
121
122
122
:::image type="content" source="../media/index-retrieve/vector-index-lookup.png" alt-text="Screenshot of Vector index Lookup from More Tools." lightbox="../media/index-retrieve/vector-index-lookup.png":::
123
123
124
-
1. Provide a name for your step and select **Add**.
125
-
1. The Vector Index Lookup tool is added to the canvas. If you don't see the tool immediately, scroll to the bottom of the canvas
126
-
1. Enter the path to your vector index, along with the query that you want to perform against the index.
124
+
1. Provide a name for your Index Lookup Tool and select **Add**.
125
+
1. Select the **mlindex_content** value box, and select your index. After completing this step, enter the queries and **query_types** to be performed against the index.
127
126
128
127
:::image type="content" source="../media/index-retrieve/configure-index-lookup.png" alt-text="Screenshot of Configure Vector index Lookup." lightbox="../media/index-retrieve/configure-index-lookup.png":::
Copy file name to clipboardExpand all lines: articles/aks/deploy-confidential-containers-default-policy.md
+86-65Lines changed: 86 additions & 65 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -175,8 +175,8 @@ To configure the workload identity, perform the following steps described in the
175
175
* Create Kubernetes service account
176
176
* Establish federated identity credential
177
177
178
-
>[!IMPORTANT]
179
-
>For the step to **Export environment variables**, set the value for the variable `SERVICE_ACCOUNT_NAMESPACE` to `kafka`.
178
+
>[!IMPORTANT]
179
+
> You need to set the *environment variables* from the section **Export environmental variables** in the [Deploy and configure workload identity][deploy-and-configure-workload-identity] article to continue completing this tutorial. Remember to set the variable `SERVICE_ACCOUNT_NAMESPACE` to `kafka`, and execute the command `kubectl create namespace kafka` before configuring workload identity.
180
180
181
181
## Deploy a trusted application with kata-cc and attestation container
182
182
@@ -192,11 +192,13 @@ For this preview release, we recommend for test and evaluation purposes to eithe
192
192
193
193
1. Grant the managed identity you created earlier, and your account, access to the key vault. [Assign][assign-key-vault-access-cli] both identities the **Key Vault Crypto Officer** and **Key Vault Crypto User** Azure RBAC roles.
194
194
195
-
>[!NOTE]
196
-
>The managed identity is the value you assign to the `USER_ASSIGNED_IDENTITY_NAME` variable.
197
-
198
-
>[!NOTE]
199
-
>To add role assignments, you must have `Microsoft.Authorization/roleAssignments/write` and `Microsoft.Authorization/roleAssignments/delete` permissions, such as [Key Vault Data Access Administrator][key-vault-data-access-admin-rbac], [User Access Administrator][user-access-admin-rbac], or [Owner][owner-rbac].
195
+
> [!NOTE]
196
+
>
197
+
> - The managed identity is the value you assign to the `USER_ASSIGNED_IDENTITY_NAME` variable.
198
+
>
199
+
> - To add role assignments, you must have `Microsoft.Authorization/roleAssignments/write` and `Microsoft.Authorization/roleAssignments/delete` permissions, such as [Key Vault Data Access Administrator][key-vault-data-access-admin-rbac], [User Access Administrator][user-access-admin-rbac], or [Owner][owner-rbac].
200
+
>
201
+
> - You must use the Key Vault Premium SKU to support HSM-protected keys.
200
202
201
203
Run the following command to set the scope:
202
204
@@ -216,37 +218,36 @@ For this preview release, we recommend for test and evaluation purposes to eithe
216
218
az role assignment create --role "Key Vault Crypto User" --assignee "${USER_ASSIGNED_IDENTITY_NAME}" --scope $AKV_SCOPE
217
219
``````
218
220
219
-
1. Copy the following YAML manifest and save it as `producer.yaml`.
221
+
1. Install the Kafka cluster in the kafka namespace by running the following command:
Copy the following YAML manifest and save it as `consumer.yaml`. Update the value for the pod environmental variable `SkrClientAKVEndpoint` to match the URL of your Azure Key Vault, excluding the protocol value `https://`. The current value placeholder value is `myKeyVault.vault.azure.net`.
227
+
1. Run the following command to apply the `kafka` cluster CR file.
1. Prepare the RSA Encryption/Decryption key using the [bash script](https://github.com/microsoft/confidential-container-demos/raw/main/kafka/setup-key.sh) for the workload from GitHub. Save the file as `setup-key.sh`.
234
+
235
+
1. Set the `MAA_ENDPOINT` environment variable with the FQDN of Attest URI by running the following command.
> Update the value for the pod environment variable `SkrClientAKVEndpoint` to match the URL of your Azure Key Vault, excluding the protocol value `https://`. The current value placeholder value is `myKeyVault.vault.azure.net`.
319
+
> Update the value for the pod environment variable `SkrClientMAAEndpoint` with the value of `MAA_ENDPOINT`. You can find the value of `MAA_ENDPOINT` by running the command `echo $MAA_ENDPOINT` or the command `az attestation show --name "myattestationprovider" --resource-group "MyResourceGroup" --query 'attestUri' -o tsv | cut -c 9-`.
333
320
334
321
1. Generate the security policy for the Kafka consumer YAML manifest and obtain the hash of the security policy stored in the `WORKLOAD_MEASUREMENT` variable by running the following command:
1. Prepare the RSA Encryption/Decryption key using the [bash script](https://github.com/microsoft/confidential-container-demos/raw/main/kafka/setup-key.sh) for the workload from GitHub. Save the file as `setup-key.sh`.
342
-
343
-
1. Set the `MAA_ENDPOINT` environmental variable to match the value for the `SkrClientMAAEndpoint` from the `consumer.yaml` manifest file by running the following command.
1. To generate an RSA asymmetric key pair (public and private keys), run the `setup-key.sh` script using the following command. The `<Azure Key Vault URL>` value should be `<your-unique-keyvault-name>.vault.azure.net`
> - The envionment variable `MANAGED_IDENTITY` is required by the bash script `setup-key.sh`.
335
+
>
336
+
> - The public key will be saved as `kafka-encryption-demo-pub.pem` after executing the bash script.
337
+
338
+
> [!IMPORTANT]
339
+
> If you receive the error `ForbiddenByRbac`,you might need to wait up to 24 hours as the backend services for managed identities maintain a cache per resource URI for up to 24 hours. See also: [Troubleshoot Azure RBAC][symptom-role-assignment-changes-are-not-being-detected].
354
340
355
-
Once the public key is downloaded, replace the `PUBKEY` environmental variable in the `producer.yaml` manifest with the public key. Paste the contents between the `-----BEGIN PUBLIC KEY-----` and `-----END PUBLIC KEY-----` strings.
356
341
357
342
1. To verify the keys have been successfully uploaded to the key vault, run the following commands:
358
343
359
344
```azurecli-interactive
360
345
az account set --subscription <Subscription ID>
361
-
az keyvault key list --vault-name <Name of vault> -o table
346
+
az keyvault key list --vault-name <KeyVault Name> -o table
347
+
```
348
+
349
+
1. Copy the following YAML manifest and save it as `producer.yaml`.
> Update the value which begin with `-----BEGIN PUBLIC KEY-----` and ends with `-----END PUBLIC KEY-----` strings with the content from `kafka-encryption-demo-pub.pem` which was created in the previous step.
381
+
382
+
364
383
1. Deploy the `consumer` and `producer` YAML manifests using the files you saved earlier.
0 commit comments