Skip to content

Commit 215089e

Browse files
committed
updated 6.0.0 ref content
1 parent 2735116 commit 215089e

File tree

123 files changed

+6698
-1132
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

123 files changed

+6698
-1132
lines changed

azurermps-6.0.0/AzureRM.Compute/Set-AzureRmVMDiskEncryptionExtension.md

Lines changed: 48 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,18 @@ Enables encryption on a running IaaS virtual machine in Azure.
1515

1616
## SYNTAX
1717

18-
### AADClientSecretParameterSet (Default)
18+
### SinglePassParameterSet (Default)
19+
```
20+
Set-AzureRmVMDiskEncryptionExtension [-ResourceGroupName] <String> [-VMName] <String>
21+
[-DiskEncryptionKeyVaultUrl] <String> [-DiskEncryptionKeyVaultId] <String> [[-KeyEncryptionKeyUrl] <String>]
22+
[[-KeyEncryptionKeyVaultId] <String>] [[-KeyEncryptionAlgorithm] <String>] [[-VolumeType] <String>]
23+
[[-SequenceVersion] <String>] [[-TypeHandlerVersion] <String>] [[-Name] <String>] [[-Passphrase] <String>]
24+
[-Force] [-DisableAutoUpgradeMinorVersion] [-SkipVmBackup] [-ExtensionType <String>]
25+
[-ExtensionPublisherName <String>] [-EncryptFormatAll] [-DefaultProfile <IAzureContextContainer>] [-WhatIf]
26+
[-Confirm] [<CommonParameters>]
27+
```
28+
29+
### AADClientSecretParameterSet
1930
```
2031
Set-AzureRmVMDiskEncryptionExtension [-ResourceGroupName] <String> [-VMName] <String> [-AadClientID] <String>
2132
[-AadClientSecret] <String> [-DiskEncryptionKeyVaultUrl] <String> [-DiskEncryptionKeyVaultId] <String>
@@ -46,7 +57,37 @@ It is advised that you save your work on the virtual machine before you run this
4657

4758
## EXAMPLES
4859

49-
### Example 1: Enable encryption using Azure AD Client ID and Client Secret
60+
### Example 1: Enable encryption
61+
```
62+
$RGName = "MyResourceGroup"
63+
$VMName = "MyTestVM"
64+
$VaultName= "MyKeyVault"
65+
$KeyVault = Get-AzureRmKeyVault -VaultName $VaultName -ResourceGroupName $RGName
66+
$DiskEncryptionKeyVaultUrl = $KeyVault.VaultUri
67+
$KeyVaultResourceId = $KeyVault.ResourceId
68+
Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $RGName -VMName $VMName -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId
69+
```
70+
71+
This example demonstrates enabling encryption without specifying AD credentials.
72+
73+
### Example 2: Enable encryption with pipelined input
74+
```
75+
$params = New-Object PSObject -Property @{
76+
ResourceGroupName = "[resource-group-name]"
77+
VMName = "[vm-name]"
78+
DiskEncryptionKeyVaultId = "/subscriptions/[subscription-id-guid]/resourceGroups/[resource-group-name]/providers/Microsoft.KeyVault/vaults/[keyvault-name]"
79+
DiskEncryptionKeyVaultUrl = "https://[keyvault-name].vault.azure.net"
80+
KeyEncryptionKeyVaultId = "/subscriptions/[subscription-id-guid]/resourceGroups/[resource-group-name]/providers/Microsoft.KeyVault/vaults/[keyvault-name]"
81+
KeyEncryptionKeyUrl = "https://[keyvault-name].vault.azure.net/keys/[kekname]/[kek-unique-id]"
82+
VolumeType = "All"
83+
}
84+
85+
$params | Set-AzureRmVmDiskEncryptionExtension
86+
```
87+
88+
This example demonstrates sending parameters using pipelined input to enable encryption without specifying AD credentials.
89+
90+
### Example 3: Enable encryption using Azure AD Client ID and Client Secret
5091
```
5192
$RGName = "MyResourceGroup"
5293
$VMName = "MyTestVM"
@@ -61,7 +102,7 @@ Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $RGName -VMName $VMName
61102

62103
This example enables encryption using Azure AD client ID, and client secret.
63104

64-
### Example 2: Enable encryption using Azure AD client ID and client certification thumbprint
105+
### Example 4: Enable encryption using Azure AD client ID and client certification thumbprint
65106
```
66107
$RGName = "MyResourceGroup"
67108
$VMName = "MyTestVM"
@@ -113,7 +154,7 @@ Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $RGName -VMName $VMName
113154

114155
This example enables encryption using Azure AD client ID and client certification thumbprints.
115156

116-
### Example 3: Enable encryption using Azure AD client ID, client secret, and wrap disk encryption key by using key encryption key
157+
### Example 5: Enable encryption using Azure AD client ID, client secret, and wrap disk encryption key by using key encryption key
117158
```
118159
$RGName = "MyResourceGroup"
119160
$VMName = "MyTestVM"
@@ -134,7 +175,7 @@ Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $RGName -VMName $VMName
134175

135176
This example enables encryption using Azure AD client ID, client secret, and wrap disk encryption key by using the key encryption key.
136177

137-
### Example 4: Enable encryption using Azure AD client ID, client cert thumbprint, and wrap disk encryptionkey by using key encryption key
178+
### Example 6: Enable encryption using Azure AD client ID, client cert thumbprint, and wrap disk encryptionkey by using key encryption key
138179
```
139180
$RGName = "MyResourceGroup"
140181
$VMName = "MyTestVM"
@@ -213,7 +254,7 @@ Specifies the client ID of the Azure AD application that has permissions to writ
213254
214255
```yaml
215256
Type: String
216-
Parameter Sets: (All)
257+
Parameter Sets: AADClientSecretParameterSet, AADClientCertParameterSet
217258
Aliases:
218259

219260
Required: True
@@ -239,7 +280,7 @@ Accept wildcard characters: False
239280
```
240281
241282
### -DefaultProfile
242-
The credentials, account, tenant, and subscription used for communication with azure.
283+
The credentials, account, tenant, and subscription used for communication with Azure.
243284
244285
```yaml
245286
Type: IAzureContextContainer

azurermps-6.0.0/AzureRM.DataLakeAnalytics/New-AzureRmDataLakeAnalyticsAccount.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ A string,string dictionary of tags associated with this account
164164
```yaml
165165
Type: Hashtable
166166
Parameter Sets: (All)
167-
Aliases: Tags
167+
Aliases:
168168

169169
Required: False
170170
Position: 4

azurermps-6.0.0/AzureRM.DataLakeAnalytics/Set-AzureRmDataLakeAnalyticsAccount.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ A string,string dictionary of tags associated with this account that should repl
164164
```yaml
165165
Type: Hashtable
166166
Parameter Sets: (All)
167-
Aliases: Tags
167+
Aliases:
168168

169169
Required: False
170170
Position: 1

azurermps-6.0.0/AzureRM.DataLakeStore/AzureRM.DataLakeStore.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@ Adds a trusted identity provider to the specified Data Lake Store account.
2525
### [Enable-AzureRmDataLakeStoreKeyVault](Enable-AzureRmDataLakeStoreKeyVault.md)
2626
Attempts to enable a user managed Key Vault for encryption of the specified Data Lake Store account.
2727

28+
### [Export-AzureRmDataLakeStoreChildItemProperties](Export-AzureRmDataLakeStoreChildItemProperties.md)
29+
Exports the properties (Disk usage and Acl) for the entire tree from the specified path to a ouput path
30+
2831
### [Export-AzureRmDataLakeStoreItem](Export-AzureRmDataLakeStoreItem.md)
2932
Downloads a file from Data Lake Store.
3033

@@ -34,6 +37,9 @@ Gets details of a Data Lake Store account.
3437
### [Get-AzureRmDataLakeStoreChildItem](Get-AzureRmDataLakeStoreChildItem.md)
3538
Gets the list of items in a folder in Data Lake Store.
3639

40+
### [Get-AzureRmDataLakeStoreChildItemSummary](Get-AzureRmDataLakeStoreChildItemSummary.md)
41+
Gets the summary of total size, files and directories contained in the path specified
42+
3743
### [Get-AzureRmDataLakeStoreFirewallRule](Get-AzureRmDataLakeStoreFirewallRule.md)
3844
Gets the specified firewall rules in the specified Data Lake Store.
3945
If no firewall rule is specified, then lists all firewall rules for the account.

0 commit comments

Comments
 (0)