{"id":546,"date":"2026-02-10T11:36:36","date_gmt":"2026-02-10T10:36:36","guid":{"rendered":"https:\/\/blog.xoupix.fr\/?p=546"},"modified":"2026-02-18T09:16:00","modified_gmt":"2026-02-18T08:16:00","slug":"sinequa-for-azure-managing-azure-data","status":"publish","type":"post","link":"https:\/\/blog.xoupix.fr\/index.php\/2026\/02\/10\/sinequa-for-azure-managing-azure-data\/","title":{"rendered":"Sinequa For Azure &#8211; Managing Azure data"},"content":{"rendered":"\n<p>Usefull Sinequa commands in this post !<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\">Updating Sinequa license<\/h2>\n\n\n\n<p>For this task, you will need:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>the sinequa.license.txt file<\/li>\n\n\n\n<li>a workstation with Azure PowerShell<\/li>\n<\/ul>\n\n\n\n<p>How to do:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>go into the sinequa.license.txt directory and open a PowerShell<\/li>\n\n\n\n<li>set the appropriate values related to your environment:\n<ul class=\"wp-block-list\">\n<li>Azure KeyVault: $AzureKeyVault = &#8220;&lt;your Azure KeyVault name&gt;&#8221;<\/li>\n\n\n\n<li>Azure Service Principal (if used): $AzureServicePrincipal = &#8220;&lt;your Azure Service Principal name&gt;&#8221;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>log-in to your Azure subscription\n<ul class=\"wp-block-list\">\n<li>if using your own credentials: Connect-AzAccount<\/li>\n\n\n\n<li>if using a Service Principal: Connect-AzAccount -Identity -AccountId &#8220;${AzureServicePrincipal}&#8221;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>check if the connection is ok. For this, I will retrieve the actual license\n<ul class=\"wp-block-list\">\n<li>Get-AzKeyVaultSecret -VaultName &#8220;${AzureKeyVault}&#8221; -Name &#8220;sinequa-license&#8221; -AsPlainText<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>configure the new license\n<ul class=\"wp-block-list\">\n<li>reading the new sinequa.license.txt file: $RawSecret =&nbsp; Get-Content &#8220;sinequa.license.txt&#8221; -Raw<\/li>\n\n\n\n<li>convert license to secure string: $SecureSecret = ConvertTo-SecureString -String $RawSecret -AsPlainText -Force<\/li>\n\n\n\n<li>setting the new license on KeyVault: Set-AzKeyVaultSecret -VaultName &#8220;${AzureKeyVault}&#8221; -Name &#8220;sinequa-license&#8221; -SecretValue $SecureSecret<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Securing Sinequa grid<\/h2>\n\n\n\n<p>For this task, you will need:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>the all 3 certificates generated by sinequa when securing a platform:\n<ol class=\"wp-block-list\">\n<li>the my-ca certificate file<\/li>\n\n\n\n<li>the my-server certificate file<\/li>\n\n\n\n<li>the my-server key file<\/li>\n\n\n\n<li>a workstation with Azure PowerShell<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<p>How to do:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>go into the certificates directory and open a PowerShell<\/li>\n\n\n\n<li>set the appropriate values related to your environment:\n<ul class=\"wp-block-list\">\n<li>Azure KeyVault: $AzureKeyVault = &#8220;&lt;your Azure KeyVault name&gt;&#8221;<\/li>\n\n\n\n<li>Azure Service Principal (if used): $AzureServicePrincipal = &#8220;&lt;your Azure Service Principal name&gt;&#8221;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>log-in to your Azure subscription\n<ul class=\"wp-block-list\">\n<li>if using your own credentials: Connect-AzAccount<\/li>\n\n\n\n<li>if using a Service Principal: Connect-AzAccount -Identity -AccountId &#8220;${AzureServicePrincipal}&#8221;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>configure the security secrets\n<ul class=\"wp-block-list\">\n<li>Set-AzKeyVaultSecret -VaultName &#8220;${AzureKeyVault}&#8221; -Name &#8220;sinequa-ssl-force&#8221; &#8211;value &#8220;true&#8221;<\/li>\n\n\n\n<li>Set-AzKeyVaultSecret -VaultName &#8220;${AzureKeyVault}&#8221; -Name &#8220;sinequa-ssl-server-ca-crt&#8221; &#8211;file &#8220;my-ca.crt.txt&#8221;<\/li>\n\n\n\n<li>Set-AzKeyVaultSecret -VaultName &#8220;${AzureKeyVault}&#8221; -Name &#8220;sinequa-ssl-server-crt&#8221; &#8211;file &#8220;my-server.crt.txt&#8221;<\/li>\n\n\n\n<li>Set-AzKeyVaultSecret -VaultName &#8220;${AzureKeyVault}&#8221; -Name &#8220;sinequa-ssl-server-key&#8221; &#8211;file &#8220;my-server.key.txt&#8221;<\/li>\n\n\n\n<li>Set-AzKeyVaultSecret -VaultName &#8220;${AzureKeyVault}&#8221; -Name &#8220;sinequa-ssl-client-certificate-check&#8221; &#8211;value &#8220;RequireVerify&#8221;<\/li>\n\n\n\n<li>Set-AzKeyVaultSecret -VaultName &#8220;${AzureKeyVault}&#8221; -Name &#8220;sinequa-ssl-client-ca-crt&#8221; &#8211;file &#8220;my-ca.crt.txt&#8221;<\/li>\n\n\n\n<li>Set-AzKeyVaultSecret -VaultName &#8220;${AzureKeyVault}&#8221; -Name &#8220;sinequa-ssl-client-crt&#8221; &#8211;file &#8220;my-server.crt.txt&#8221;<\/li>\n\n\n\n<li>Set-AzKeyVaultSecret -VaultName &#8220;${AzureKeyVault}&#8221; -Name &#8220;sinequa-ssl-client-key&#8221; &#8211;file &#8220;my-server.key.txt&#8221;<\/li>\n\n\n\n<li>Set-AzKeyVaultSecret -VaultName &#8220;${AzureKeyVault}&#8221; -Name &#8220;sinequa-ssl-client-override-host-name&#8221; &#8211;value &#8220;autossl&#8221;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Restart your grid. During the start, you should be able to see, in logs :\n<ul class=\"wp-block-list\">\n<li>[2024-07-11 15:50:31.005][50][info][Srpc.Server] Sinequa server listening on [::]:10301<strong>(ssl)<\/strong>&nbsp;( cq = 10 * 1 , th = 10 , ma = 10 )<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<p>If you are using remote nodes, you will may have to modify the sinequa.xml file to add your certificates manually.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Usefull Sinequa commands in this post !<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[33],"class_list":["post-546","post","type-post","status-publish","format-standard","hentry","category-non-classe","tag-sinequa"],"_links":{"self":[{"href":"https:\/\/blog.xoupix.fr\/index.php\/wp-json\/wp\/v2\/posts\/546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.xoupix.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.xoupix.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.xoupix.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.xoupix.fr\/index.php\/wp-json\/wp\/v2\/comments?post=546"}],"version-history":[{"count":3,"href":"https:\/\/blog.xoupix.fr\/index.php\/wp-json\/wp\/v2\/posts\/546\/revisions"}],"predecessor-version":[{"id":551,"href":"https:\/\/blog.xoupix.fr\/index.php\/wp-json\/wp\/v2\/posts\/546\/revisions\/551"}],"wp:attachment":[{"href":"https:\/\/blog.xoupix.fr\/index.php\/wp-json\/wp\/v2\/media?parent=546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.xoupix.fr\/index.php\/wp-json\/wp\/v2\/categories?post=546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.xoupix.fr\/index.php\/wp-json\/wp\/v2\/tags?post=546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}