You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Reference article for azdata bdc rotate commands.
5
+
author: WilliamDAssafMSFT
6
+
ms.author: wiassaf
7
+
ms.reviewer: cloudmelon
8
+
ms.date: 10/05/2021
9
+
ms.topic: reference
10
+
ms.prod: sql
11
+
ms.technology: big-data-cluster
12
+
---
13
+
14
+
# azdata bdc rotate
15
+
16
+
Applies to [!INCLUDE [azure-data-cli-azdata](../../includes/azure-data-cli-azdata.md)]
17
+
18
+
This command rotates the passwords of autogenerated AD accounts in a big data cluster. For more information, see [AD password rotation overview](..\..\big-data-cluster\active-directory-password-rotation.md). Autorotation of passwords for autogenerated AD objects was introduced with SQL Server Big Data Clusters CU13.
19
+
20
+
> [!NOTE]
21
+
> The `azdata bdc rotate` command rotates passwords for autogenerated AD objects only. `azdata bdc rotate` does not rotate the password for the AD for big data cluster domain service account (DSA) created manually while performing a big data cluster AD-integrated deployment. For more information, see [big data cluster AD integrated deployment](..\..\big-data-cluster\active-directory-prerequisites.md).
22
+
23
+
The following article provides reference for the **sql** commands in the **azdata** tool. For more information about other **azdata** commands, see [azdata reference](reference-azdata.md)
24
+
25
+
## azdata bdc rotate
26
+
27
+
```bash
28
+
azdata bdc rotate [--name -n]
29
+
```
30
+
31
+
### Mandatory parameters
32
+
33
+
#### `--name -n`
34
+
The name of your big data cluster.
35
+
36
+
### Examples
37
+
38
+
```bash
39
+
azdata bdc rotate -n mybdcclustername
40
+
```
41
+
42
+
## Next steps
43
+
44
+
For more information about other **azdata** commands, see [azdata reference](reference-azdata.md).
45
+
46
+
For more information about how to install the **azdata** tool, see [Install azdata](..\install\deploy-install-azdata.md).
[azdata bdc settings](reference-azdata-bdc-settings.md) | Big Data Clusters settings commands.
39
39
[azdata bdc spark](reference-azdata-bdc-spark.md) | The Spark commands allow the user to interact with the Spark system by creating and managing sessions, statements, and batches.
40
+
[azdata bdc rotate](reference-azdata-bdc-rotate.md) | This command rotates the passwords of autogenerated AD accounts in a big data cluster. For more information, see [AD password rotation overview](..\..\big-data-cluster\active-directory-password-rotation.md).
41
+
40
42
## azdata bdc create
41
43
Create a SQL Server Big Data Cluster - Kubernetes configuration is required on your system along with the following environment variables ['AZDATA_USERNAME', 'AZDATA_PASSWORD'].
42
44
```bash
@@ -50,19 +52,19 @@ azdata bdc create [--name -n]
50
52
[--force -f]
51
53
```
52
54
### Examples
53
-
Guided BDC deployment experience - you will receive prompts for needed values.
55
+
Guided SQL Server Big Data Clusters deployment experience - you will receive prompts for needed values.
54
56
```bash
55
57
azdata bdc create
56
58
```
57
-
BDC deployment with arguments and custom config profile that was initialized via `azdata bdc config init`.
59
+
Big Data Clusters deployment with arguments and custom config profile that was initialized via `azdata bdc config init`.
BDC upgrade to a new image tag "cu2" from the same repository.
138
+
Big Data Clusters upgrade to a new image tag "cu2" from the same repository.
137
139
```bash
138
140
azdata bdc upgrade -t cu2
139
141
```
140
-
BDC upgrade to a new images with tag "cu2" from a new repository "foo/bar/baz".
142
+
Big Data Clusters upgrade to a new images with tag "cu2" from a new repository "foo/bar/baz".
141
143
```bash
142
144
azdata bdc upgrade -t cu2 -r foo/bar/baz
143
145
```
144
-
BDC upgrade to a new images with tag "cu2" from the same repository.The upgrade will wait 30 minutes for the controller to upgrade and 30 minutes for the controller db to upgrade. It will then wait for the controller and controller db to run for three minutes without crashing upgrading the rest of the cluster. Each subsequent phase of the upgrade will have forty minutes to complete.
146
+
Big Data Clusters upgrade to a new images with tag "cu2" from the same repository.The upgrade will wait 30 minutes for the controller to upgrade and 30 minutes for the controller db to upgrade. It will then wait for the controller and controller db to run for three minutes without crashing upgrading the rest of the cluster. Each subsequent phase of the upgrade will have forty minutes to complete.
-`security.activeDirectory.enableAES Optional parameter`**Optional parameter**: Boolean value indicating whether AES 128 and AES 256 should be enabled on the automatically generated AD accounts. Default value is false. When this parameter is set to true, the following flags ‘This account supports Kerberos AES 128 bit encryption’ and ‘This account supports Kerberos AES 256 bit encryption’ will be checked on the auto-generated AD objects during BDC deployment.
129
+
-`security.activeDirectory.enableAES Optional parameter`**Optional parameter**: Boolean value indicating whether AES 128 and AES 256 should be enabled on the automatically generated AD accounts. Default value is false. When this parameter is set to true, the following flags 'This account supports Kerberos AES 128 bit encryption' and 'This account supports Kerberos AES 256 bit encryption' will be checked on the auto-generated AD objects during big data cluster deployment.
130
130
131
131
> [!NOTE]
132
-
> This feature is only available starting from SQL Server BDC CU13 release, please make sure your upgraded to at least CU13. If the big data cluster is a version prior to SQL BDC CU13, the following steps are required:
133
-
> 1. Run the `azdata bdc rotate -n <your-cluster-name>` command, this command will rotate the keytabs in the cluster which is necessary to ensure that the AES entries in keytabs are correct. Besides that, the same command will also rotatethe passwords of the AD objects that were auto-generated during the initial deployment in the OU that you specified.
134
-
> 2. Set the the following flags ‘This account supports Kerberos AES 128 bit encryption’ and ‘This account supports Kerberos AES 256 bit encryption’ on each of auto-generated AD objects in the OU that you provided during the initial BDC deployment. This can be achieved by executing the following PowerShell script `Get-ADUser -Filter * -SearchBase ‘<OU Path>’ | Set-ADUser -replace @{ ‘msDS-SupportedEncryptionTypes’ = ‘24’ }` on your domain controller which sets the AES fields on each account in the OU given in `<OU Path>` parameter.
132
+
> This feature is only available starting from SQL Server Big Data Clusters CU13 release, please make sure your upgraded to at least CU13. If the big data cluster is a version prior to CU13, the following steps are required:
133
+
> 1. Run the `azdata bdc rotate -n <your-cluster-name>` command, this command will rotate the keytabs in the cluster which is necessary to ensure that the AES entries in keytabs are correct. For more information, see [azdata bdc](/sql/azdata/reference/reference-azdata-bdc). Additionally, `azdata bdc rotate` will rotate the passwords of the AD objects that were auto-generated during the initial deployment in the specified OU.
134
+
> 2. Set the the following flags 'This account supports Kerberos AES 128 bit encryption' and 'This account supports Kerberos AES 256 bit encryption' on each of auto-generated AD objects in the OU that you provided during the initial big data cluster deployment. This can be achieved by executing the following PowerShell script `Get-ADUser -Filter * -SearchBase '<OU Path>' | Set-ADUser -replace @{ 'msDS-SupportedEncryptionTypes' = '24' }` on your domain controller which sets the AES fields on each account in the OU given in `<OU Path>` parameter.
135
135
136
136
>[!IMPORTANT]
137
137
>Create the groups provided for the settings below in AD before deployment begins. If the scope for any of these AD groups is domain local deployment fails.
0 commit comments