You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Customer-managed keys in Azure Managed Instance for Apache Cassandra
14
14
15
-
Azure Managed Instance for Apache Cassandra provides the capability to encrypt data on disk using your own key. This article describes how to implement customer-managed keys with Azure Key Vault.
15
+
In Azure Managed Instance for Apache Cassandra, you can use your own key to encrypt data on disk. This article describes how to implement customer-managed keys by using Azure Key Vault.
16
16
17
17
## Prerequisites
18
18
19
-
- Set up a secret using Azure Key Vault. Learn more about Azure Key Vault [here](../key-vault/secrets/about-secrets.md).
20
-
- Deployed a virtual network in your resource group, and applied the network contributor role with the Azure Cosmos DB service principal as a member. See [Create an Azure Managed Instance for Apache Cassandra cluster using Azure CLI](create-cluster-cli.md) for more detail.
19
+
- Set up a secret by using Azure Key Vault. For more information, see [About Azure Key Vault secrets](../key-vault/secrets/about-secrets.md).
20
+
- Deploy a virtual network in your resource group.
21
+
- Apply the Network Contributor role with the Azure Cosmos DB service principal as a member. Use the following command:
21
22
22
-
> [!IMPORTANT]
23
-
> This article requires the Azure CLI version 2.30.0 or higher. If you are using Azure Cloud Shell, the latest version is already installed.
## <aid="create-cluster"></a>Create a cluster with system assigned identity
30
+
Applying the appropriate role to your virtual network helps you avoid failure when you deploy an Azure Managed Instance for Apache Cassandra cluster. For more information, see [Create an Azure Managed Instance for Apache Cassandra cluster by using the Azure CLI](create-cluster-cli.md).
26
31
27
-
> [!NOTE]
28
-
> As mentioned in pre-requisites, to avoid deployment failure, make sure you have applied the appropriate role to your virtual network before attempting to deploy a managed instance cluster:
This article requires Azure CLI version 2.30.0 or later. If you're using Azure Cloud Shell, the latest version is already installed.
35
33
36
-
1. Create a cluster by specifying identity type as SystemAssigned, replacing `<subscriptionID>`, `<resourceGroupName>`, `<vnetName>`, and `<subnetName>` with the appropriate values:
34
+
## <aid="create-cluster"></a>Create a cluster with a system-assigned identity
37
35
38
-
```azurecli-interactive
36
+
1. Create a cluster by using the following command. Replace `<subscriptionID>`, `<resourceGroupName>`, `<vnetName>`, and `<subnetName>` with the appropriate values.
1. In the Azure portal, go to your keyvault and select **Access policies**. Then select **Add Access Policy** to create an accesspolicy for your keys.
73
71
74
-
1. Assign `get`, `wrap` and `unwrap` key permissions on the key vault to the cluster's `principalId` retrieved above. In the portal, you can also look up the Principal ID of the cluster by the cluster's name:
75
-
72
+
:::image type="content" source="./media/cmk/key-vault-access-policy-1.png" alt-text="Screenshot that shows the pane for access policies in the Azure portal." lightbox="./media/cmk/key-vault-access-policy-1.png" border="true":::
1. For **Key permissions**, select **get**, **wrap**, and **unwrap**. Select the **Select principal** box to open the **Principal** pane. Enter the cluster's `principalId` value that you retrieved earlier, and then select the **Select** button. (In the portal, you can also look up the principal ID of the cluster by the cluster's name.)
78
75
79
-
> [!WARNING]
80
-
> Make sure the key vault has Purge Protection enabled. Datacenter deployments will fail without it.
76
+
:::image type="content" source="./media/cmk/key-vault-access-policy-2.png" alt-text="Screenshot that shows an example of adding a principal for an access policy." lightbox="./media/cmk/key-vault-access-policy-2.png" border="true":::
81
77
82
-
1. After you click on `add` to add the access policy, make sure you save it:
78
+
> [!WARNING]
79
+
> Make sure that the key vault has purge protection turned on. Datacenter deployments will fail without it.
1. Select **Add** to add the access policy, and then select **Save**.
85
82
86
-
1. To get the key identifier, select your key:
83
+
:::image type="content" source="./media/cmk/save.png" alt-text="Screenshot that shows the button for saving an access policy." lightbox="./media/cmk/key-vault-access-policy-2.png" border="true":::
1. To get the key identifier, select **Keys**, and then select your key.
89
86
90
-
1. Click on current version:
87
+
:::image type="content" source="./media/cmk/select-key.png" alt-text="Screenshot that shows the pane for selecting a key." lightbox="./media/cmk/key-identifier-1.png" border="true":::
91
88
92
-
:::image type="content" source="./media/cmk/current-version.png" alt-text="Select current version" lightbox="./media/cmk/key-identifier-1.png" border="true":::
89
+
1. Select the current version.
93
90
94
-
1. Save the key identifier for later use:
91
+
:::image type="content" source="./media/cmk/current-version.png" alt-text="Screenshot that shows the box for selecting the current version of a key." lightbox="./media/cmk/key-identifier-1.png" border="true":::
:::image type="content" source="./media/cmk/key-identifier-2.png" alt-text="Screenshot that shows copying a key identifier to the clipboard." lightbox="./media/cmk/key-identifier-1.png" border="true":::
98
96
99
-
1. Create the datacenter by replacing `<key identifier>` with the same key (the uri you copied in previous step) for both managed disk (managed-disk-customer-key-uri) and backup storage (backup-storage-customer-key-uri) encryption as shown below (use the same value for `subnet` you used earlier):
97
+
1. Create the datacenter by replacing `<key identifier>` with the same key (the URI that you copied in the previous step) for both managed disk (`managed-disk-customer-key-uri`) and backup storage (`backup-storage-customer-key-uri`) encryption. Use the same value for `subnet` that you used earlier.
100
98
101
99
```azurecli-interactive
102
100
managedDiskKeyUri = "<key identifier>"
@@ -120,24 +118,24 @@ Azure Managed Instance for Apache Cassandra provides the capability to encrypt d
120
118
--sku Standard_DS14_v2
121
119
```
122
120
123
-
1. An existing cluster with no identity information can be assigned an identity as shown below:
121
+
You can also assign an identity to an existing cluster with no identity information:
124
122
125
-
```azurecli-interactive
126
-
az managed-cassandra cluster update --identity-type SystemAssigned -g $group -c $cluster
127
-
```
123
+
```azurecli-interactive
124
+
az managed-cassandra cluster update --identity-type SystemAssigned -g $group -c $cluster
Copy file name to clipboardExpand all lines: articles/managed-instance-apache-cassandra/jaeger.md
+28-21Lines changed: 28 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,27 +11,27 @@ ms.date: 12/08/2023
11
11
12
12
# Run Jaeger with Azure Managed Instance for Apache Cassandra
13
13
14
-
Jaeger, a distributed tracing platform for monitoring microservices, enables the fast identification of performance challenges and optimization. Through features, like tracing instrumentation and logging integration.
15
-
16
-
The article specifically details the use of the sample application HotROD and Jaeger alongside Azure Managed Instance for Apache Cassandra for efficient storage monitoring.
14
+
Jaeger is a distributed tracing platform for monitoring microservices. It enables the fast identification of performance challenges and optimization through features like tracing instrumentation and logging integration.
17
15
16
+
This article details the use of the sample application HotROD and Jaeger alongside Azure Managed Instance for Apache Cassandra for efficient storage monitoring.
18
17
19
18
## Prerequisites and setup
20
-
*[Create an Azure Managed Instance for Apache Cassandra cluster](create-cluster-cli.md).
21
-
*[Ensure Docker is installed](https://www.docker.com/get-started/).
22
19
20
+
*[Create an Azure Managed Instance for Apache Cassandra cluster](create-cluster-cli.md).
21
+
*[Ensure that Docker is installed](https://www.docker.com/get-started/).
23
22
24
23
## Use Jaeger with Azure Managed Instance for Apache Cassandra
24
+
25
25
1.[Download the Jaeger repository](https://github.com/jaegertracing/jaeger.git).
26
-
1.Navigate to the docker-compose folder `cd jaeger\docker-compose`.
27
-
1.Add your Azure Managed Instance Cassandra cluster credentials to the `jaeger-collector and jaeger-query`section within the `jaeger-docker-compose.yml` file:
26
+
1.Go to the *docker-compose* folder:`cd jaeger\docker-compose`.
27
+
1.In the *jaeger-docker-compose.yml* file, add your Azure Managed Instance for Apache Cassandra cluster credentials to the `jaeger-collector` and `jaeger-query`sections:
1. Additionally, add the environment variables to the `cassandra-schema and jaeger-collector`:`
34
+
1. Add the environment variables to the `cassandra-schema` and `jaeger-collector` sections:
35
35
36
36
```yml
37
37
environment:
@@ -41,7 +41,9 @@ The article specifically details the use of the sample application HotROD and Ja
41
41
- CQLSH_SSL=--ssl
42
42
...
43
43
```
44
-
1. To connect your Azure Managed Instance Cassandra cluster, add the Cassandra sign-in credentials to the `cassandra-schema`:
44
+
45
+
1. To connect your Azure Managed Instance for Apache Cassandra cluster, add the Cassandra sign-in credentials to the `cassandra-schema` section:
46
+
45
47
```yml
46
48
environment:
47
49
...
@@ -51,25 +53,30 @@ The article specifically details the use of the sample application HotROD and Ja
51
53
- CASSANDRA_USERNAME=cassandra
52
54
...
53
55
```
56
+
54
57
1. Run `docker-compose -f jaeger-docker-compose.yml up -d` to start the application.
55
58
56
-
:::image type="content" source="./media/jaeger/jaeger-running.png" alt-text="Screenshot of running jaeger." lightbox="./media/jaeger/jaeger-running.png" border="true":::
59
+
:::image type="content" source="./media/jaeger/jaeger-running.png" alt-text="Screenshot of a running Jaeger application." lightbox="./media/jaeger/jaeger-running.png" border="true":::
57
60
58
61
> [!TIP]
59
-
> Five containers are created, and you should be able to access the test application at http://localhost:8080/ to generate traces that can be viewed at http://localhost:16686/search.
62
+
> The command creates five containers. You can access the test application at `http://localhost:8080/` to generate traces that you can view at `http://localhost:16686/search`.
63
+
64
+
1. After the containers are running, use the Jaeger UI to view traces from the application.
60
65
61
-
1. Once the containers are running, access the Jaeger UI to view traces from the application.
62
-
:::image type="content" source="./media/jaeger/jaeger-page-1.png" alt-text="Screenshot of jaeger web interface." lightbox="./media/jaeger/jaeger-page-1.png" border="true":::
66
+
:::image type="content" source="./media/jaeger/jaeger-page-1.png" alt-text="Screenshot of the Jaeger web interface." lightbox="./media/jaeger/jaeger-page-1.png" border="true":::
63
67
64
-
1. Verify by inspecting your Azure Managed Instance cluster.
65
-
:::image type="content" source="./media/jaeger/jaeger-table-1.png" alt-text="Screenshot of jaeger tables in managed instance cluster." lightbox="./media/jaeger/jaeger-table-1.png" border="true":::
68
+
1. Verify by inspecting your Azure Managed Instance for Apache Cassandra cluster.
66
69
67
-
1. Refer to the traces table to view the data related to step 7.
68
-
:::image type="content" source="./media/jaeger/jaeger-table-2.png" alt-text="Screenshot of jaeger trace table." lightbox="./media/jaeger/jaeger-table-2.png" border="true":::
70
+
:::image type="content" source="./media/jaeger/jaeger-table-1.png" alt-text="Screenshot of Jaeger tables in a managed instance cluster." lightbox="./media/jaeger/jaeger-table-1.png" border="true":::
69
71
72
+
1. Refer to the `traces` table to view the data related to step 7.
70
73
71
-
## FAQs
72
-
If you encounter issues running or testing Jaeger, open a support ticket. Provide the subscription ID and account name where your Jaeger test is running.
74
+
:::image type="content" source="./media/jaeger/jaeger-table-2.png" alt-text="Screenshot of the Jaeger traces table." lightbox="./media/jaeger/jaeger-table-2.png" border="true":::
75
+
76
+
## Support
77
+
78
+
If you have problems running or testing Jaeger, open a support ticket. Provide the subscription ID and account name where your Jaeger instance is running.
73
79
74
80
## Next steps
75
-
- Learn about [hybrid cluster configuration](configure-hybrid-cluster.md) in Azure Managed Instance for Apache Cassandra.
81
+
82
+
* Learn about [hybrid cluster configuration](configure-hybrid-cluster.md) in Azure Managed Instance for Apache Cassandra.
0 commit comments