@@ -84,7 +84,7 @@ You can validate the **general** encryption status of an encrypted VM using the
84
84
85
85
You can capture the encryption settings from each individual disk using the following PowerShell commands:
86
86
87
- ** Single-Pass**
87
+ ### ** Single-Pass**
88
88
If single-pass the encryption settings are stamped in each of the disks (OS and Data).
89
89
You can capture the OS disk encryption settings in single pass as follows:
90
90
@@ -133,7 +133,7 @@ $VM = Get-AzVM -Name ${VMNAME} -ResourceGroupName ${RGNAME}
133
133
```
134
134
![ Verify data single ps 001] ( ./media/disk-encryption/verify-encryption-linux/verify-data-single-ps-001.png )
135
135
136
- ** Dual-Pass**
136
+ ### ** Dual-Pass**
137
137
In Dual Pass, the encryption settings are stamped in the VM model and not on each individual disk.
138
138
139
139
To verify the encryption settings were stamped in dual-pass, you can use the following commands:
@@ -157,7 +157,7 @@ Write-Host "====================================================================
157
157
```
158
158
![ Verify dual pass PowerShell 1] ( ./media/disk-encryption/verify-encryption-linux/verify-dual-ps-001.png )
159
159
160
- ** Unattached disks**
160
+ ### ** Unattached disks**
161
161
162
162
Check the encryption settings for disks that aren't attached to a VM.
163
163
@@ -185,7 +185,7 @@ az vm encryption show --name ${VMNAME} --resource-group ${RGNAME} --query "subst
185
185
```
186
186
![ Verify general using CLI ] ( ./media/disk-encryption/verify-encryption-linux/verify-gen-cli.png )
187
187
188
- ** Single Pass**
188
+ ### ** Single Pass**
189
189
You can validate the encryption settings from each individual disk using the following AZ CLI commands:
190
190
191
191
``` bash
@@ -264,11 +264,11 @@ done
264
264
265
265
![ Verify vm profile dual using CLI ] ( ./media/disk-encryption/verify-encryption-linux/verify-vm-profile-dual-cli.png )
266
266
267
- ** Unattached disks**
267
+ ### ** Unattached disks**
268
268
269
- Check the encryption settings for disks that aren't attached to a VM:
269
+ Check the encryption settings for disks that aren't attached to a VM.
270
270
271
- ** Managed disks**
271
+ ### ** Managed disks**
272
272
273
273
``` bash
274
274
RGNAME=" RGNAME"
@@ -281,7 +281,7 @@ echo -ne "Disk Encryption Key: "; az disk show -g ${RGNAME} -n ${TARGETDISKNAME}
281
281
echo -ne " key Encryption Key: " ; az disk show -g ${RGNAME} -n ${TARGETDISKNAME} --query encryptionSettingsCollection.encryptionSettings[].keyEncryptionKey.keyUrl -o tsv; \
282
282
echo " ============================================================================================================================================================="
283
283
```
284
- ** Unmanaged disks**
284
+ ### ** Unmanaged disks**
285
285
286
286
Unmanaged disks are VHD files that are stored as page blobs in Azure storage accounts.
287
287
@@ -305,15 +305,15 @@ Select the appropriate ID and store it on a variable:
305
305
``` bash
306
306
id=" /subscriptions/<subscription id>/resourceGroups/<resource group name>/providers/Microsoft.Storage/storageAccounts/<storage account name>"
307
307
```
308
- The connection string:
308
+ The connection string.
309
309
310
310
This command gets the connection string for one particular storage account and stores it on a variable:
311
311
312
312
``` bash
313
313
ConnectionString=$( az storage account show-connection-string --ids $id --query connectionString -o tsv)
314
314
```
315
315
316
- The container name:
316
+ The container name.
317
317
318
318
The following command lists all the containers under a storage account:
319
319
``` bash
@@ -326,7 +326,7 @@ Store the container name on a variable
326
326
ContainerName=" name of the container"
327
327
```
328
328
329
- The disk name:
329
+ The disk name.
330
330
331
331
Use this command to list all the blobs on a particular container
332
332
``` bash
0 commit comments