Skip to content

Commit cc872fd

Browse files
committed
add periods to alt-text
1 parent a325af6 commit cc872fd

File tree

164 files changed

+876
-876
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

164 files changed

+876
-876
lines changed

articles/hdinsight/apache-ambari-email.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,15 +36,15 @@ In this tutorial, you learn how to:
3636

3737
1. From the Overview page, click **Open SaaS Account on publisher’s site**, to go the SendGrid webpage for your account.
3838

39-
:::image type="content" source="./media/apache-ambari-email/azure-portal-sendgrid-manage.png" alt-text="SendGrid overview in azure portal":::
39+
:::image type="content" source="./media/apache-ambari-email/azure-portal-sendgrid-manage.png" alt-text="SendGrid overview in azure portal.":::
4040

4141
1. From the left menu, navigate to your **Settings** and then **API Keys**.
4242

43-
:::image type="content" source="./media/apache-ambari-email/sendgrid-dashboard-navigation.png" alt-text="SendGrid dashboard navigation":::
43+
:::image type="content" source="./media/apache-ambari-email/sendgrid-dashboard-navigation.png" alt-text="SendGrid dashboard navigation.":::
4444

4545
1. Click **Create API Key** to create an apikey and copy the apikey as smtp password in later use.
4646

47-
:::image type="content" source="./media/apache-ambari-email/sendgrid-account-details.png" alt-text="SendGrid account details":::
47+
:::image type="content" source="./media/apache-ambari-email/sendgrid-account-details.png" alt-text="SendGrid account details.":::
4848

4949
## Configure Ambari e-mail notification
5050

articles/hdinsight/apache-kafka-spark-structured-streaming-cosmosdb.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Spark structured streaming is a stream processing engine built on Spark SQL. It
2626

2727
Apache Kafka on HDInsight doesn't provide access to the Kafka brokers over the public internet. Anything that talks to Kafka must be in the same Azure virtual network as the nodes in the Kafka cluster. For this example, both the Kafka and Spark clusters are located in an Azure virtual network. The following diagram shows how communication flows between the clusters:
2828

29-
:::image type="content" source="./media/apache-kafka-spark-structured-streaming-cosmosdb/apache-spark-kafka-vnet.png" alt-text="Diagram of Spark and Kafka clusters in an Azure virtual network" border="false":::
29+
:::image type="content" source="./media/apache-kafka-spark-structured-streaming-cosmosdb/apache-spark-kafka-vnet.png" alt-text="Diagram of Spark and Kafka clusters in an Azure virtual network." border="false":::
3030

3131
> [!NOTE]
3232
> The Kafka service is limited to communication within the virtual network. Other services on the cluster, such as SSH and Ambari, can be accessed over the internet. For more information on the public ports available with HDInsight, see [Ports and URIs used by HDInsight](hdinsight-hadoop-port-settings-for-services.md).
@@ -68,7 +68,7 @@ While you can create an Azure virtual network, Kafka, and Spark clusters manuall
6868
|Ssh User Name|The SSH user to create for the Spark and Kafka clusters.|
6969
|Ssh Password|The password for the SSH user for the Spark and Kafka clusters.|
7070

71-
:::image type="content" source="./media/apache-kafka-spark-structured-streaming-cosmosdb/hdi-custom-parameters-40.png" alt-text="HDInsight version 4.0 custom deployment values":::
71+
:::image type="content" source="./media/apache-kafka-spark-structured-streaming-cosmosdb/hdi-custom-parameters-40.png" alt-text="HDInsight version 4.0 custom deployment values.":::
7272

7373
1. Read the **Terms and Conditions**, and then select **I agree to the terms and conditions stated above**.
7474

articles/hdinsight/cluster-availability-monitor-logs.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,15 @@ As a prerequisite, you'll need a Log Analytics Workspace to store the collected
2020

2121
From the HDInsight cluster resource page in the portal, select **Azure Monitor**. Then, select **enable** and select your Log Analytics workspace from the drop-down.
2222

23-
:::image type="content" source="media/cluster-availability-monitor-logs/azure-portal-monitoring.png" alt-text="HDInsight Operations Management Suite":::
23+
:::image type="content" source="media/cluster-availability-monitor-logs/azure-portal-monitoring.png" alt-text="HDInsight Operations Management Suite.":::
2424

2525
By default, this installs the OMS agent on all of the cluster nodes except for edge nodes. Because no OMS agent is installed on cluster edge nodes, there is no telemetry on edge nodes present in Log Analytics by default.
2626

2727
## Query metrics and logs tables
2828

2929
Once Azure Monitor log integration is enabled (this may take a few minutes), navigate to your **Log Analytics Workspace** resource and select **Logs**.
3030

31-
:::image type="content" source="media/cluster-availability-monitor-logs/hdinsight-portal-logs.png" alt-text="Log Analytics workspace logs":::
31+
:::image type="content" source="media/cluster-availability-monitor-logs/hdinsight-portal-logs.png" alt-text="Log Analytics workspace logs.":::
3232

3333
Logs list a number of sample queries, such as:
3434

@@ -42,7 +42,7 @@ Logs list a number of sample queries, such as:
4242

4343
As an example, run the **Availability rate** sample query by selecting **Run** on that query, as shown in the screenshot above. This will show the availability rate of each node in your cluster as a percentage. If you have enabled multiple HDInsight clusters to send metrics to the same Log Analytics workspace, you'll see the availability rate for all nodes (excluding edge nodes) in those clusters displayed.
4444

45-
:::image type="content" source="media/cluster-availability-monitor-logs/portal-availability-rate.png" alt-text="Log Analytics workspace logs 'availability rate' sample query":::
45+
:::image type="content" source="media/cluster-availability-monitor-logs/portal-availability-rate.png" alt-text="Log Analytics workspace logs 'availability rate' sample query.":::
4646

4747
> [!NOTE]
4848
> Availability rate is measured over a 24-hour period, so your cluster will need to run for at least 24 hours before you see accurate availability rates.
@@ -55,16 +55,16 @@ You can also set up Azure Monitor alerts that will trigger when the value of a m
5555

5656
From **Logs**, run the **Unavailable computers** sample query by selecting **Run** on that query, as shown below.
5757

58-
:::image type="content" source="media/cluster-availability-monitor-logs/portal-unavailable-computers.png" alt-text="Log Analytics workspace logs 'unavailable computers' sample":::
58+
:::image type="content" source="media/cluster-availability-monitor-logs/portal-unavailable-computers.png" alt-text="Log Analytics workspace logs 'unavailable computers' sample.":::
5959

6060
If all nodes are available, this query should return zero results for now. Click **New alert rule** to begin configuring your alert for this query.
6161

62-
:::image type="content" source="media/cluster-availability-monitor-logs/portal-logs-new-alert-rule.png" alt-text="Log Analytics workspace new alert rule":::
62+
:::image type="content" source="media/cluster-availability-monitor-logs/portal-logs-new-alert-rule.png" alt-text="Log Analytics workspace new alert rule.":::
6363

6464
There are three components to an alert: the *resource* for which to create the rule (the Log Analytics workspace in this case), the *condition* to trigger the alert, and the *action groups* that determine what will happen when the alert is triggered.
6565
Click the **condition title**, as shown below, to finish configuring the signal logic.
6666

67-
:::image type="content" source="media/cluster-availability-monitor-logs/portal-condition-title.png" alt-text="Portal alert create rule condition":::
67+
:::image type="content" source="media/cluster-availability-monitor-logs/portal-condition-title.png" alt-text="Portal alert create rule condition.":::
6868

6969
This will open **Configure signal logic**.
7070

@@ -80,11 +80,11 @@ For the purpose of this alert, you want to make sure **Period=Frequency.** More
8080

8181
Select **Done** when you're finished configuring the signal logic.
8282

83-
:::image type="content" source="media/cluster-availability-monitor-logs/portal-configure-signal-logic.png" alt-text="Alert rule configures signal logic":::
83+
:::image type="content" source="media/cluster-availability-monitor-logs/portal-configure-signal-logic.png" alt-text="Alert rule configures signal logic.":::
8484

8585
If you don't already have an existing action group, click **Create New** under the **Action Groups** section.
8686

87-
:::image type="content" source="media/cluster-availability-monitor-logs/portal-create-new-action-group.png" alt-text="Alert rule creates new action group":::
87+
:::image type="content" source="media/cluster-availability-monitor-logs/portal-create-new-action-group.png" alt-text="Alert rule creates new action group.":::
8888

8989
This will open **Add action group**. Choose an **Action group name**, **Short name**, **Subscription**, and **Resource group.** Under the **Actions** section, choose an **Action Name** and select **Email/SMS/Push/Voice** as the **Action Type.**
9090

@@ -93,26 +93,26 @@ This will open **Add action group**. Choose an **Action group name**, **Short na
9393
9494
This will open **Email/SMS/Push/Voice**. Choose a **Name** for the recipient, **check** the **Email** box, and type an email address to which you want the alert sent. Select **OK** in **Email/SMS/Push/Voice**, then in **Add action group** to finish configuring your action group.
9595

96-
:::image type="content" source="media/cluster-availability-monitor-logs/portal-add-action-group.png" alt-text="Alert rule creates add action group":::
96+
:::image type="content" source="media/cluster-availability-monitor-logs/portal-add-action-group.png" alt-text="Alert rule creates add action group.":::
9797

9898
After these blades close, you should see your action group listed under the **Action Groups** section. Finally, complete the **Alert Details** section by typing an **Alert Rule Name** and **Description** and choosing a **Severity**. Click **Create Alert Rule** to finish.
9999

100-
:::image type="content" source="media/cluster-availability-monitor-logs/portal-create-alert-rule-finish.png" alt-text="Portal creates alert rule finish":::
100+
:::image type="content" source="media/cluster-availability-monitor-logs/portal-create-alert-rule-finish.png" alt-text="Portal creates alert rule finish.":::
101101

102102
> [!TIP]
103103
> The ability to specify **Severity** is a powerful tool that can be used when creating multiple alerts. For example, you could create one alert to raise a Warning (Sev 1) if a single head node goes down and another alert that raises Critical (Sev 0) in the unlikely event that both head nodes go down.
104104
105105
When the condition for this alert is met, the alert will fire and you'll receive an email with the alert details like this:
106106

107-
:::image type="content" source="media/cluster-availability-monitor-logs/portal-oms-alert-email.png" alt-text="Azure Monitor alert email example":::
107+
:::image type="content" source="media/cluster-availability-monitor-logs/portal-oms-alert-email.png" alt-text="Azure Monitor alert email example.":::
108108

109109
You can also view all alerts that have fired, grouped by severity, by going to **Alerts** in your **Log Analytics Workspace**.
110110

111-
:::image type="content" source="media/cluster-availability-monitor-logs/hdi-portal-oms-alerts.png" alt-text="Log Analytics workspace alerts":::
111+
:::image type="content" source="media/cluster-availability-monitor-logs/hdi-portal-oms-alerts.png" alt-text="Log Analytics workspace alerts.":::
112112

113113
Selecting on a severity grouping (i.e. **Sev 1,** as highlighted above) will show records for all alerts of that severity that have fired like below:
114114

115-
:::image type="content" source="media/cluster-availability-monitor-logs/portal-oms-alerts-sev1.png" alt-text="Log Analytics workspace sev one alert":::
115+
:::image type="content" source="media/cluster-availability-monitor-logs/portal-oms-alerts-sev1.png" alt-text="Log Analytics workspace sev one alert.":::
116116

117117
## Next steps
118118

articles/hdinsight/connect-on-premises-network.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ These configurations enable the following behavior:
3232

3333
In the following diagram, green lines are requests for resources that end in the DNS suffix of the virtual network. Blue lines are requests for resources in the on-premises network or on the public internet.
3434

35-
:::image type="content" source="./media/connect-on-premises-network/on-premises-to-cloud-dns.png" alt-text="Diagram of how DNS requests are resolved in the configuration" border="false":::
35+
:::image type="content" source="./media/connect-on-premises-network/on-premises-to-cloud-dns.png" alt-text="Diagram of how DNS requests are resolved in the configuration." border="false":::
3636

3737
## Prerequisites
3838

@@ -59,7 +59,7 @@ These steps use the [Azure portal](https://portal.azure.com) to create an Azure
5959

6060
1. From the top menu, select **+ Create a resource**.
6161

62-
:::image type="content" source="./media/connect-on-premises-network/azure-portal-create-resource.png" alt-text="Create an Ubuntu virtual machine":::
62+
:::image type="content" source="./media/connect-on-premises-network/azure-portal-create-resource.png" alt-text="Create an Ubuntu virtual machine.":::
6363

6464
1. Select **Compute** > **Virtual machine** to go to the **Create a virtual machine** page.
6565

@@ -78,7 +78,7 @@ These steps use the [Azure portal](https://portal.azure.com) to create an Azure
7878
|Password or SSH public key | The available field is determined by your choice for **Authentication type**. Enter the appropriate value.|
7979
|Public inbound ports|Select **Allow selected ports**. Then select **SSH (22)** from the **Select inbound ports** drop-down list.|
8080

81-
:::image type="content" source="./media/connect-on-premises-network/virtual-machine-basics.png" alt-text="Virtual machine basic configuration":::
81+
:::image type="content" source="./media/connect-on-premises-network/virtual-machine-basics.png" alt-text="Virtual machine basic configuration.":::
8282

8383
Leave other entries at the default values and then select the **Networking** tab.
8484

@@ -90,7 +90,7 @@ These steps use the [Azure portal](https://portal.azure.com) to create an Azure
9090
|Subnet | Select the default subnet for the virtual network that you created earlier. Do __not__ select the subnet used by the VPN gateway.|
9191
|Public IP | Use the autopopulated value. |
9292

93-
:::image type="content" source="./media/connect-on-premises-network/virtual-network-settings.png" alt-text="HDInsight Virtual network settings":::
93+
:::image type="content" source="./media/connect-on-premises-network/virtual-network-settings.png" alt-text="HDInsight Virtual network settings.":::
9494

9595
Leave other entries at the default values and then select the **Review + create**.
9696

@@ -104,7 +104,7 @@ Once the virtual machine has been created, you'll receive a **Deployment succeed
104104

105105
2. Note the values for **PUBLIC IP ADDRESS/DNS NAME LABEL** and **PRIVATE IP ADDRESS** for later use.
106106

107-
:::image type="content" source="./media/connect-on-premises-network/virtual-machine-ip-addresses.png" alt-text="Public and private IP addresses":::
107+
:::image type="content" source="./media/connect-on-premises-network/virtual-machine-ip-addresses.png" alt-text="Public and private IP addresses.":::
108108

109109
### Install and configure Bind (DNS software)
110110

@@ -240,7 +240,7 @@ To configure the virtual network to use the custom DNS server instead of the Azu
240240
241241
5. Select __Save__. <br />
242242
243-
:::image type="content" source="./media/connect-on-premises-network/configure-custom-dns.png" alt-text="Set the custom DNS server for the network":::
243+
:::image type="content" source="./media/connect-on-premises-network/configure-custom-dns.png" alt-text="Set the custom DNS server for the network.":::
244244
245245
## Configure on-premises DNS server
246246

articles/hdinsight/control-network-traffic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Network traffic in an Azure Virtual Networks can be controlled using the followi
1616

1717
As a managed service, HDInsight requires unrestricted access to the HDInsight health and management services both for incoming and outgoing traffic from the VNET. When using NSGs, you must ensure that these services can still communicate with HDInsight cluster.
1818

19-
:::image type="content" source="./media/control-network-traffic/hdinsight-vnet-diagram.png" alt-text="Diagram of HDInsight entities created in Azure custom VNET" border="false":::
19+
:::image type="content" source="./media/control-network-traffic/hdinsight-vnet-diagram.png" alt-text="Diagram of HDInsight entities created in Azure custom VNET." border="false":::
2020

2121
## HDInsight with network security groups
2222

0 commit comments

Comments
 (0)