You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hpc-cache/customer-keys.md
+12-12Lines changed: 12 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,8 @@ description: How to use Azure Key Vault with Azure HPC Cache to control encrypti
4
4
author: ekpgh
5
5
ms.service: hpc-cache
6
6
ms.topic: conceptual
7
-
ms.date: 04/06/2020
8
-
ms.author: rohogue
7
+
ms.date: 04/15/2020
8
+
ms.author: v-erkel
9
9
---
10
10
11
11
# Use customer-managed encryption keys for Azure HPC Cache
@@ -77,7 +77,7 @@ You must specify the encryption key source when you create your Azure HPC Cache.
77
77
78
78
The user who creates the cache must have privileges equal to the [Key Vault contributor role](../role-based-access-control/built-in-roles.md#key-vault-contributor) or higher.
79
79
80
-
1. Click the button to enable privately managed keys. After you change this setting, the key vault settings appear.<!-- double check if this is true -->
80
+
1. Click the button to enable privately managed keys. After you change this setting, the key vault settings appear.
81
81
82
82
1. Click **Select a key vault** to open the key selection page. Choose or create the key vault and key for encrypting data on this cache's disks.
83
83
@@ -96,7 +96,7 @@ Continue with the rest of the specifications and create the cache as described i
96
96
## 3. Authorize Azure Key Vault encryption from the cache
97
97
<!-- header is linked from create article, update if changed -->
98
98
99
-
After a few minutes, the new Azure HPC Cache appears in your Azure portal. Go to the **Overview** page to authorize it to access your Azure Key Vault and enable customer-managed key encryption.
99
+
After a few minutes, the new Azure HPC Cache appears in your Azure portal. Go to the **Overview** page to authorize it to access your Azure Key Vault and enable customer-managed key encryption. (The cache might appear in the resources list before the "deployment underway" messages clear.)
100
100
101
101
This two-step process is necessary because the Azure HPC Cache instance needs an identity to pass to the Azure Key Vault for authorization. The cache identity doesn't exist until after its initial creation steps are complete.
102
102
@@ -105,11 +105,11 @@ This two-step process is necessary because the Azure HPC Cache instance needs an
105
105
106
106
The cache shows the status **Waiting for key**. Click the **Enable encryption** button at the top of the page to authorize the cache to access the specified key vault.
107
107
108
-

108
+

109
109
110
-
Click the **Yes** button to authorize the cache to use the encryption key. This action also enables soft-delete and purge protection (if not already enabled) on the key vault.<!-- xxx problem? xxx -->
110
+
Click **Enable encryption** and then click the **Yes** button to authorize the cache to use the encryption key. This action also enables soft-delete and purge protection (if not already enabled) on the key vault.
111
111
112
-

112
+

113
113
114
114
After the cache requests access to the key vault, it can create and encrypt the disks that store cached data.
115
115
@@ -119,17 +119,17 @@ After you authorize encryption, Azure HPC Cache goes through several more minute
119
119
120
120
You can change the key vault, key, or key version for your cache from the Azure portal. Click the cache's **Encryption** settings link to open the **Customer key settings** page. (You cannot change a cache between customer-managed keys and system-managed keys.)
121
121
122
-

122
+

123
123
124
-
Click the **Change key** link to open the key selector.
124
+
Click the **Change key** link, then click **Change the key vault, key, or version** to open the key selector.
125
125
126
-

126
+

127
127
128
128
Key vaults in the same subscription and same region as this cache are shown in the list.
129
129
130
-
After you choose the new encryption key values, click **Save**<!--not in screenshot - verify -->. A confirmation page appears with the new values. Click **Save** at the top of the confirmation page to finalize the selection.
130
+
After you choose the new encryption key values, click **Select**. A confirmation page appears with the new values. Click **Save** to finalize the selection.
131
131
132
-

132
+

Copy file name to clipboardExpand all lines: articles/hpc-cache/hpc-cache-add-storage.md
-2Lines changed: 0 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -113,8 +113,6 @@ Fill in these values for each namespace path:
113
113
114
114
***Virtual namespace path** - Set the client-facing file path for this storage target. Read [Configure aggregated namespace](hpc-cache-namespace.md) to learn more about the virtual namespace feature.
115
115
116
-
<!-- The virtual path should start with a slash ``/``. -->
117
-
118
116
***NFS export path** - Enter the path to the NFS export.
119
117
120
118
***Subdirectory path** - If you want to mount a specific subdirectory of the export, enter it here. If not, leave this field blank.
Copy file name to clipboardExpand all lines: articles/hpc-cache/hpc-cache-create.md
+7-6Lines changed: 7 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,8 @@ description: How to create an Azure HPC Cache instance
4
4
author: ekpgh
5
5
ms.service: hpc-cache
6
6
ms.topic: how-to
7
-
ms.date: 03/19/2020
8
-
ms.author: rohogue
7
+
ms.date: 04/15/2020
8
+
ms.author: v-erkel
9
9
---
10
10
11
11
# Create an Azure HPC Cache
@@ -62,10 +62,9 @@ You can skip this section if you do not need customer-managed keys. Azure encryp
62
62
63
63
For a complete explanation of the customer-managed key encryption process, read [Use customer-managed encryption keys for Azure HPC Cache](customer-keys.md).
64
64
65
-

65
+

66
66
67
-
Select **Customer managed** to choose customer-managed key encryption. The key vault specification fields appear.<!-- double check --> Select the Azure Key Vault to use, then select the key and version to use for this cache. The key must be a 2048-bit RSA key. You can create a new key vault, key, or key version from this page.
68
-
<!-- + screenshot of key create/select page -->
67
+
Select **Customer managed** to choose customer-managed key encryption. The key vault specification fields appear. Select the Azure Key Vault to use, then select the key and version to use for this cache. The key must be a 2048-bit RSA key. You can create a new key vault, key, or key version from this page.
69
68
70
69
After you create the cache, you must authorize it to use the key vault service. Read [Authorize Azure Key Vault encryption from the cache](customer-keys.md#3-authorize-azure-key-vault-encryption-from-the-cache) for details.
71
70
@@ -82,10 +81,12 @@ Cache creation takes about 10 minutes. You can track the progress in the Azure p
82
81

83
82
84
83
When creation finishes, a notification appears with a link to the new Azure HPC Cache instance, and the cache appears in your subscription's **Resources** list.
85
-
<!-- double check on notification -->
86
84
87
85

88
86
87
+
> [!NOTE]
88
+
> If your cache uses customer-managed encryption keys, the cache might appear in the resources list before the deployment status changes to complete. As soon as the cache's status is **Waiting for key** you can [authorize it](customer-keys.md#3-authorize-azure-key-vault-encryption-from-the-cache) to use the key vault.
89
+
89
90
## Next steps
90
91
91
92
After your cache appears in the **Resources** list, you can move to the next step.
Copy file name to clipboardExpand all lines: articles/hpc-cache/hpc-cache-ingest.md
+3-5Lines changed: 3 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ This article explains the best ways to move data to Blob storage for use with Az
16
16
17
17
Keep these facts in mind:
18
18
19
-
* Azure HPC Cache uses a specialized storage format to organize data in Blob storage. This is why a Blob storage target must either be a new, empty container, or a Blob container that was previously used for Azure HPC Cache data.<!--([Avere vFXT for Azure](https://azure.microsoft.com/services/storage/avere-vfxt/) also uses this cloud file system.)-->
19
+
* Azure HPC Cache uses a specialized storage format to organize data in Blob storage. This is why a Blob storage target must either be a new, empty container, or a Blob container that was previously used for Azure HPC Cache data.
20
20
21
21
* Copying data through the Azure HPC Cache to a back-end storage target is more efficient when you use multiple clients and parallel operations. A simple copy command from one client will move data slowly.
22
22
@@ -26,13 +26,13 @@ If you don't want to use the loading utility, or if you want to add content to a
26
26
27
27
## Pre-load data in Blob storage with CLFSLoad
28
28
29
-
You can use the <!--[Avere CLFSLoad](https://aka.ms/avere-clfsload)-->Avere CLFSLoad utility to copy data to a new Blob storage container before you add it as a storage target. This utility runs on a single Linux system and writes data in the proprietary format needed for Azure HPC Cache. CLFSLoad is the most efficient way to populate a Blob storage container for use with the cache.
29
+
You can use the Avere CLFSLoad utility to copy data to a new Blob storage container before you add it as a storage target. This utility runs on a single Linux system and writes data in the proprietary format needed for Azure HPC Cache. CLFSLoad is the most efficient way to populate a Blob storage container for use with the cache.
30
30
31
31
The Avere CLFSLoad utility is available by request from your Azure HPC Cache team. Ask your team contact for it, or open a [support ticket](hpc-cache-support-ticket.md) to request assistance.
32
32
33
33
This option works with new, empty containers only. Create the container before using Avere CLFSLoad.
34
34
35
-
Detailed information is included in the Avere CLFSLoad distribution, which is available on request from the Azure HPC Cache team.<!-- [Avere CLFSLoad readme](https://github.com/microsoft/Avere-CLFSLoad/blob/master/README.md). --><!-- caution literal link -->
35
+
Detailed information is included in the Avere CLFSLoad distribution, which is available on request from the Azure HPC Cache team.
36
36
37
37
A general overview of the process:
38
38
@@ -47,8 +47,6 @@ The Avere CLFSLoad utility needs the following information:
47
47
* A shared access signature (SAS) token that allows the utility to write to the container
48
48
* A local path to the data source - either a local directory that contains the data to copy, or a local path to a mounted remote system with the data
49
49
50
-
<!-- The requirements are explained in detail in the [Avere CLFSLoad readme](https://aka.ms/avere-clfsload). -->
51
-
52
50
## Copy data through the Azure HPC Cache
53
51
54
52
If you don't want to use the Avere CLFSLoad utility, or if you want to add a large amount of data to an existing Blob storage target, you can copy it through the cache. Azure HPC Cache is designed to serve multiple clients simultaneously, so to copy data through the cache, you should use parallel writes from multiple clients.
Copy file name to clipboardExpand all lines: articles/hpc-cache/hpc-cache-manage.md
-8Lines changed: 0 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -83,13 +83,6 @@ The back-end storage volumes used as storage targets are unaffected when you del
83
83
> Azure HPC Cache does not automatically write changed data from the cache to the back-end storage systems before deleting the cache.
84
84
>
85
85
> To make sure that all data in the cache has been written to long-term storage, [stop the cache](#stop-the-cache) before you delete it. Make sure that it shows the status **Stopped** before clicking the delete button.
86
-
<!--... written to long-term storage, follow this procedure:
87
-
>
88
-
> 1. [Remove](hpc-cache-edit-storage.md#remove-a-storage-target) each storage target from the Azure HPC Cache by using the delete button on the Storage targets page. The system automatically writes any changed data from the cache to the back-end storage system before removing the target.
89
-
> 1. Wait for the storage target to be completely removed. The process can take an hour or longer if there is a lot of data to write from the cache. When it is done, a portal notification says that the delete operation was successful, and the storage target disappears from the list.
90
-
> 1. After all affected storage targets have been deleted, it is safe to delete the cache.
91
-
>
92
-
> Alternatively, you can use the [flush](#flush-cached-data) option to save cached data, but there is a small risk of losing work if a client writes a change to the cache after the flush completes but before the cache instance is destroyed.-->
93
86
94
87
## Cache metrics and monitoring
95
88
@@ -101,6 +94,5 @@ These charts are part of Azure's built-in monitoring and analytics tools. Additi
101
94
102
95
## Next steps
103
96
104
-
<!-- * Learn more about metrics and statistics for hpc cache -->
105
97
* Learn more about [Azure metrics and statistics tools](../azure-monitor/index.yml)
106
98
* Get [help with your Azure HPC Cache](hpc-cache-support-ticket.md)
Copy file name to clipboardExpand all lines: articles/hpc-cache/hpc-cache-prereqs.md
-1Lines changed: 0 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -76,7 +76,6 @@ To create a compatible storage account, use these settings:
76
76
* Access tier (default): **Hot**
77
77
78
78
It's a good practice to use a storage account in the same location as your cache.
79
-
<!-- clarify location - same region or same resource group or same virtual network? -->
80
79
81
80
You also must give the cache application access to your Azure storage account as mentioned in [Permissions](#permissions), above. Follow the procedure in [Add storage targets](hpc-cache-add-storage.md#add-the-access-control-roles-to-your-account) to give the cache the required access roles. If you are not the storage account owner, have the owner do this step.
Copy file name to clipboardExpand all lines: articles/hpc-cache/hpc-region-recovery.md
-1Lines changed: 0 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -53,4 +53,3 @@ All clients will need to mount the new cache, even if the clients were not affec
53
53
## Learn more
54
54
55
55
The Azure application architecture guide includes more information about how to [recover from a region-wide service disruption](<https://docs.microsoft.com/azure/architecture/resiliency/recovery-loss-azure-region>).
56
-
<!-- this should be an internal link instead of a URL but I can't find the tree -->
0 commit comments