Skip to content

Conversation

@uday31in
Copy link
Member

Hgs keyvault

uday31in and others added 22 commits January 30, 2016 17:01
Adding ARM Template to deploy Host Guardian Service in Azure.

The “Host Guardian Service” (HGS) is a new server role introduced in
Windows Server 2016. HGS provides Attestation and Key Protection
services that enable Hyper-V to run Shielded virtual machines. A Hyper-V
host is known as a “guarded host” once the Attestation service
affirmatively validates its identity & configuration. Once affirmatively
attested, the Key Protection service provides the transport key (TK)
needed to unlock & run Shielded VMs.
updating title
adding medata.json
edit readme.md
…"maxLength" criteria

AssertionError: hgs/metadata.json - #/itemDisplayName:Failed "maxLength"
criteria
# Conflicts:
#	hgs/metadata.json
fix metadata.json
hgs-keyvault
@azurecla
Copy link

Hi @uday31in, I'm your friendly neighborhood Azure Pull Request Bot (You can call me AZPRBOT). Thanks for your contribution!


It looks like you're working at Microsoft (udpandya). If you're full-time, we DON'T require a contribution license agreement.



If you are a vendor, DO please sign the electronic contribution license agreement. It will take 2 minutes and there's no faxing! https://cla.azure.com.

TTYL, AZPRBOT;

@uday31in uday31in changed the title Hgs keyvault Hgs with Certificate Stored in keyvault Oct 27, 2016
@uday31in
Copy link
Member Author

@bmoore-msft - please integrate it in main repo.

@@ -0,0 +1,16 @@
# Deploy Host Guardian Service (HGS) + KeyVault For Shielded VM in Windows Server 2016 in Standalone or High Availability mode using Failover Clustering.

<a href="https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2Fuday31in%2Fazure-quickstart-templates%2Fmaster%2Fhgs%2Fazuredeploy.json" target="_blank">
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

shouldn't this link point to hgs-keyvault instead of hgs?

<a href="https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2Fuday31in%2Fazure-quickstart-templates%2Fmaster%2Fhgs%2Fazuredeploy.json" target="_blank">
<img src="http://azuredeploy.net/deploybutton.png"/>
</a>
<a href="http://armviz.io/#/?load=https%3A%2F%2Fraw.githubusercontent.com%2Fuday31in%2Fazure-quickstart-templates%2Fmaster%2Fhgs%2Fazuredeploy.json" target="_blank">
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same

"description": "Resource Group of Key Vault that has a secret"
}
},
"httpsCertificateUrl": {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

are any of these urls supposed to be secret? If so, please use securestring instead of string; if they don't need to be secret, then this is fine as is

{
"type": "Microsoft.Storage/storageAccounts",
"name": "[variables('storageAccountName')]",
"apiVersion": "2015-05-01-preview",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

can we use a non-preview api version?

"dhcpOptions": {
"dnsServers": [
"[variables('subnetdns')]",
"8.8.8.8"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why use google DNS? Is the built-in DNS not sufficient?

"settings": {

"fileUris": [
"https://udayvw.blob.core.windows.net/artefacts/dscinit.ps1"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"fileUris": [
"https://udayvw.blob.core.windows.net/artefacts/dscinit.ps1"
],
"commandToExecute": "[concat('powershell -ExecutionPolicy Unrestricted -File ', variables('DSCInitScriptFileName') , ' -NodeType:' , concat('', copyindex()) ,' -HgsServerPrimaryIPAddress:10.0.0.4 -GenerateSelfSignedCertificate:false', concat(' -HgsServerPrimaryAdminUsername:', parameters('adminUsername')), concat(' -HgsServerPrimaryAdminPassword:', parameters('adminPassword')) )]"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this contains a password, so the commandToExecute should go into "protectedSettings" instead of "settings"

"contentVersion": "1.0.0.0",
"parameters": {
"adminUsername": {
"value": "uday"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

can we use a more generic username here, like 'azureuser'?

"value": "GEN-UNIQUE-13"
},

"vaultName": {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it seems the indenting is inconsistent in this file; could we run this through a json formatter?

"value": "UdayKeyVault"
},
"httpsCertificateUrl": {
"value": "https://hgskeyvault.vault.azure.net:443/secrets/HTTPSCert/8ee99c94155749e5804fb373502565dd"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should probably replace urls with fake values

@gatneil
Copy link
Contributor

gatneil commented Dec 21, 2016

Left comments on hgs-keyvault, but most of the comments also apply to hgs. Could you make the changes in both?

@gatneil
Copy link
Contributor

gatneil commented Feb 15, 2017

No activity; closing

@gatneil gatneil closed this Feb 15, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants