Skip to content

Commit 3f611a9

Browse files
Merge pull request #311988 from jlian/fix/proxy-and-gateway-cleanup
Fix duplicated steps in proxy guide and step ordering in gateway guide
2 parents fd3d499 + 17ae4c7 commit 3f611a9

2 files changed

Lines changed: 3 additions & 31 deletions

File tree

articles/iot-edge/how-to-configure-proxy-support.md

Lines changed: 1 addition & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -231,34 +231,6 @@ This step takes place once on the IoT Edge device during initial device setup.
231231
https_proxy = "<proxy URL>"
232232
```
233233

234-
3. Add the **https_proxy** parameter to the environment variables section, and set your proxy URL as its value.
235-
236-
```toml
237-
[agent]
238-
name = "edgeAgent"
239-
type = "docker"
240-
241-
[agent.config]
242-
image = "mcr.microsoft.com/azureiotedge-agent:1.5"
243-
244-
[agent.env]
245-
# RuntimeLogLevel = "debug"
246-
# UpstreamProtocol = "AmqpWs"
247-
https_proxy = "<proxy URL>"
248-
```
249-
250-
4. The IoT Edge runtime uses AMQP by default to talk to IoT Hub. Some proxy servers block AMQP ports. If that's the case, then you also need to configure edgeAgent to use AMQP over WebSocket. Uncomment the `UpstreamProtocol` parameter.
251-
252-
```toml
253-
[agent.config]
254-
image = "mcr.microsoft.com/azureiotedge-agent:1.5"
255-
256-
[agent.env]
257-
# RuntimeLogLevel = "debug"
258-
UpstreamProtocol = "AmqpWs"
259-
https_proxy = "<proxy URL>"
260-
```
261-
262234
5. Save the changes and close the editor. Apply the changes.
263235

264236
```bash
@@ -328,7 +300,7 @@ With the environment variables included, the module definition looks like the fo
328300
}
329301
```
330302

331-
If you included the **UpstreamProtocol** environment variable in the config.yaml file on your IoT Edge device, add that to the IoT Edge agent module definition too.
303+
If you included the **UpstreamProtocol** environment variable in the config.toml file on your IoT Edge device, add that to the IoT Edge agent module definition too.
332304

333305
```json
334306
"env": {

articles/iot-edge/how-to-create-transparent-gateway.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,6 @@ If you don't have your own certificate authority and want to use demo certificat
8888

8989
1. Check the certificate meets [format requirements](how-to-manage-device-certificates.md#format-requirements).
9090
1. If you created the certificates on a different machine, copy them to your IoT Edge device. Use a USB drive, a service like [Azure Key Vault](/azure/key-vault/general/overview), or a command like [Secure file copy](https://www.ssh.com/ssh/scp/).
91-
1. Move the files to the preferred directory for certificates and keys: `/var/aziot/certs` for certificates and `/var/aziot/secrets` for keys.
9291
1. Create the certificates and keys directories and set permissions. Store your certificates and keys in the preferred `/var/aziot` directory: `/var/aziot/certs` for certificates and `/var/aziot/secrets` for keys.
9392

9493
```bash
@@ -101,6 +100,7 @@ If you don't have your own certificate authority and want to use demo certificat
101100
sudo chown aziotks:aziotks /var/aziot/secrets
102101
sudo chmod 700 /var/aziot/secrets
103102
```
103+
1. Move the files to the preferred directory for certificates and keys: `/var/aziot/certs` for certificates and `/var/aziot/secrets` for keys.
104104
1. Change the ownership and permissions for the certificates and keys.
105105

106106
```bash
@@ -112,7 +112,7 @@ If you don't have your own certificate authority and want to use demo certificat
112112
# Give aziotks ownership to private keys
113113
# Read and write for aziotks, no permission for others
114114
sudo chown -R aziotks:aziotks /var/aziot/secrets
115-
sudo find /var/aziot/secrets -type f -name "*.*" -exec chmod 600 {} \;
115+
sudo find /var/aziot/secrets -type f -name "*.*" -exec chmod 600 {} \;
116116
```
117117

118118
# [IoT Edge for Linux on Windows](#tab/eflow)

0 commit comments

Comments
 (0)