Skip to content

Commit 277af70

Browse files
committed
improve acrolinx score
1 parent b907161 commit 277af70

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

azure-local/manage/trusted-launch-vm-import-key.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The steps below involve copying VM guest state protection keys from the local ke
4444
4545
$publicKeyPem | Out-File -FilePath .\public.pem
4646
```
47-
1. Make a note of the wrapping key as you'll need it later.
47+
1. Make a note of the wrapping key as you need it later.
4848
4949
1. Copy the `.\public.pem` file to your Azure Local instance.
5050
@@ -59,7 +59,7 @@ The steps below involve copying VM guest state protection keys from the local ke
5959
6060
Backup-TVMKeys -WrappingKeyPath <path to public.pem> -BackupRootPath <path to backup root folder where the timestamped backup folder is stored>
6161
```
62-
Here is a sample output after running this command:
62+
Here's a sample output after running this command:
6363
6464
```output
6565
Backing up TVM Vault keys to .\<backup root folder>\20250722192116
@@ -68,7 +68,7 @@ The steps below involve copying VM guest state protection keys from the local ke
6868
Backing up key AzureStackTvmAKRootKey to RSA folder
6969
```
7070
71-
1. Make note of the timestamped backup folder created under the backup root folder. You'll need this later during recovery. For example, backup folder named "20250612205355" with the format "yyyyMMddHHmmss".
71+
1. Make note of the timestamped backup folder created under the backup root folder. You need this later during recovery. For example, backup folder named "2025-06-12-20-53-55" with the format "yyyy-MM-dd-HH-mm-ss".
7272
7373
### Restore keys
7474
@@ -85,14 +85,14 @@ The steps below involve restoring VM guest state protection keys from a folder c
8585
1. Run the following commands.
8686
8787
> [!NOTE]
88-
> Make sure to create a unique name for the WrappingKeyName. Otherwise, this will cause a failure during import:
88+
> Make sure to create a unique name for the WrappingKeyName. Otherwise, this causes a failure during import:
8989
9090
```powershell
9191
Import-Module .\TvmBackupUtils.psm1 -force
9292
9393
Import-TvmWrappingKeyFromPem -KeyName <WrappingKeyName> -PublicKeyPath <path to public.pem> -PrivateKeyPath <path to private.pem> -KeySize 2048
9494
```
95-
Here is sample output:
95+
Here's sample output:
9696
9797
```output
9898
Generating import JSON for key <WrappingKeyName> at temporary location C:\Users\HCIDeploymentUser\AppData\Local\Temp\tmpD383.tmp...
@@ -112,7 +112,7 @@ The steps below involve restoring VM guest state protection keys from a folder c
112112
```powershell
113113
Import-TVMKeys -WrappingKeyName <WrappingKeyName> -BackupPath <path to timestamped backup folder>
114114
```
115-
Here is sample output:
115+
Here's sample output:
116116
117117
```output
118118
Importing TVM keys from .\tvm_keys_backup_root\20250722192116\
@@ -124,9 +124,9 @@ The steps below involve restoring VM guest state protection keys from a folder c
124124
Importing key AzureStackTvmAKRootKey with size 4096 from RSA folder path = .\tvm_keys_backup_root\20250722192116\RSA\AzureStackTvmAKRootKey_4096.json
125125
```
126126
127-
If the local key vault of the Azure Local instance already has a VM guest state protection key with the same name or already has an `AzureStackTvmAKRootKey`, you'll receive an `InvalidVersion` error for that key. You can ignore this, as the key is already in the key vault.
127+
If the local key vault of the Azure Local instance already has a VM guest state protection key with the same name or already has an `AzureStackTvmAKRootKey`, you receive an `InvalidVersion` error for that key. You can ignore this, as the key is already in the key vault.
128128
129-
Here is sample output showing this error:
129+
Here's sample output showing this error:
130130
131131
```output
132132
Importing TVM keys from .\tvm_keys_backup_root\20250722192116\
@@ -168,7 +168,7 @@ The steps below involve restoring VM guest state protection keys from a folder c
168168
1. Delete both `public.pem` and `private.pem` files from the Azure Local instance.
169169
170170
> [!IMPORTANT]
171-
> Remove the wrapping key from the key vault of the Azure Local instance using `Remove-MocKey`. This will help avoid collisions later.
171+
> Remove the wrapping key from the key vault of the Azure Local instance using `Remove-MocKey`. This helps avoid collisions later.
172172
173173
```powershell
174174
Remove-MocKey -name WrappingKeyName -group AzureStackHostAttestation -keyvaultName AzureStackTvmKeyVault
@@ -189,7 +189,7 @@ Follow these steps to copy the VM guest state protection key from the local key
189189
190190
1. On the Azure Local system with the backup key vault, run the following commands on the Azure Local system with the backup key vault:
191191
192-
1. Create a wrapping key in the backup key vault. Make note of the name as you'll need it later:
192+
1. Create a wrapping key in the backup key vault. Make note of the name as you need it later:
193193
194194
```powershell
195195
New-MocKey -name wrappingKey -group AzureStackHostAttestation -keyvaultName AzureStackTvmKeyVault -type RSA -size 2048
@@ -255,7 +255,7 @@ Follow these steps to copy the VM guest state protection key. The key is copied
255255
256256
1. Copy the PEM file to the Azure Local system.
257257
258-
1. Get the `VM ID` from the VM files stored on disk. There is a VM config file (.xml) that has the `VM ID` as its name. You can also use the following command to obtain the `VM ID` if you know the VM name. Perform this step on a Hyper-V host that has the VM files:
258+
1. Get the `VM ID` from the VM files stored on disk. There's a VM config file (.xml) that has the `VM ID` as its name. You can also use the following command to obtain the `VM ID` if you know the VM name. Perform this step on a Hyper-V host that has the VM files:
259259
260260
```powershell
261261
(Get-VM -Name <VM name>).vmid

0 commit comments

Comments
 (0)