Skip to content

Commit ca2ee2c

Browse files
Additional edits.
1 parent 935e9f4 commit ca2ee2c

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

articles/virtual-machines/extensions/custom-script-windows.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: gabsta
88
author: GabstaMSFT
99
ms.reviewer: erd
1010
ms.collection: windows
11-
ms.date: 03/31/2023
11+
ms.date: 04/04/2023
1212
---
1313
# Custom Script Extension for Windows
1414

@@ -46,7 +46,7 @@ You can set the extension to use your Azure Blob Storage credentials so that it
4646

4747
### Internet connectivity
4848

49-
To download a script externally, such as from GitHub or Azure Storage, then you need to open other firewall or network security group (NSG) ports. For example, if your script is located in Azure Storage, you can allow access by using Azure NSG [service tags for Storage](../../virtual-network/network-security-groups-overview.md#service-tags).
49+
To download a script externally, such as from GitHub or Azure Storage, you need to open other firewall or network security group (NSG) ports. For example, if your script is located in Azure Storage, you can allow access by using Azure NSG [service tags for Storage](../../virtual-network/network-security-groups-overview.md#service-tags).
5050

5151
The Custom Script Extension doesn't have any way to bypass certificate validation. If you're downloading from a secured location with, for example, a self-signed certificate, you might get errors like *The remote certificate is invalid according to the validation procedure*. Make sure that the certificate is correctly installed in the *Trusted Root Certification Authorities* store on the VM.
5252

@@ -146,7 +146,7 @@ You can use this schema inside the VM resource or as a standalone resource. If t
146146
| storageAccountKey | Optional | The access key of the storage account. |
147147
| managedIdentity | Optional | The [managed identity](../../active-directory/managed-identities-azure-resources/overview.md) for downloading files. Valid values are `clientId` (optional, string), which is the client ID of the managed identity, and `objectId` (optional, string), which is the object ID of the managed identity.|
148148

149-
*Public settings* are sent in clear text to the VM where the script runs. *Protected settings* are encrypted through a key known only to Azure and the VM. The settings are saved to the VM as they were sent. That is, if the settings were encrypted, they're saved encrypted on the VM. The certificate that's used to decrypt the encrypted values is stored on the VM. The certificate is also used to decrypt settings (if necessary) at runtime.
149+
*Public settings* are sent in clear text to the VM where the script runs. *Protected settings* are encrypted through a key known only to Azure and the VM. The settings are saved to the VM as they were sent. That is, if the settings were encrypted, they're saved encrypted on the VM. The certificate that's used to decrypt the encrypted values is stored on the VM. The certificate is also used to decrypt settings, if necessary, at runtime.
150150

151151
Using public settings might be useful for debugging, but we recommend that you use protected settings.
152152

@@ -300,7 +300,8 @@ We recommend that you use [PowerShell](/powershell/module/az.compute/add-azvmsse
300300
You can retrieve data about the state of extension deployments from the Azure portal and by using the Azure PowerShell module. To see the deployment state of extensions for a VM, run the following command:
301301

302302
```powershell
303-
Get-AzVMExtension -ResourceGroupName <resourceGroupName> -VMName <vmName> -Name myExtensionName
303+
Get-AzVMExtension -ResourceGroupName <resourceGroupName> `
304+
-VMName <vmName> -Name myExtensionName
304305
```
305306

306307
Extension output is logged to files found under the following folder on the target virtual machine:

0 commit comments

Comments
 (0)