diff --git a/src/Compute/Compute/help/Get-AzGallery.md b/src/Compute/Compute/help/Get-AzGallery.md index 8e57000837e1..4a299a4b541d 100644 --- a/src/Compute/Compute/help/Get-AzGallery.md +++ b/src/Compute/Compute/help/Get-AzGallery.md @@ -171,8 +171,7 @@ Get all galleries in subscription that start with "gallery". ### Example 5 ```powershell -PS C:\> Get-AzGallery -Name galleryName -ResourceGroupName rg -Expand SharingProfile/Groups - +Get-AzGallery -Name galleryName -ResourceGroupName rg -Expand SharingProfile/Groups ``` Get a gallery's sharing profile. diff --git a/src/Compute/Compute/help/Invoke-AzVMInstallPatch.md b/src/Compute/Compute/help/Invoke-AzVMInstallPatch.md index c81e898332af..b69a18db6fd5 100644 --- a/src/Compute/Compute/help/Invoke-AzVMInstallPatch.md +++ b/src/Compute/Compute/help/Invoke-AzVMInstallPatch.md @@ -75,7 +75,7 @@ This example installs critical patches on the VM. ### Example 2 ```powershell $myVM = Get-AzVM -ResourceGroupName 'MyRG' -Name 'MyVM' -Invoke-AzVmInstallPatch -VM $myVM -MaximumDuration "PT90M" -RebootSetting "Always" -Windows -ClassificationToIncludeForWindows "Security" -KBNumberToInclude ["KB1234567", "KB123567"] -KBNumberToExclude ["KB1234702", "KB1234802"] -ExcludeKBsRequiringReboot +Invoke-AzVmInstallPatch -VM $myVM -MaximumDuration "PT90M" -RebootSetting "Always" -Windows -ClassificationToIncludeForWindows "Security" -KBNumberToInclude "KB1234567", "KB123567" -KBNumberToExclude "KB1234702", "KB1234802" -ExcludeKBsRequiringReboot ``` This example passes a PSVirtualMachine object to '-VM' parameter. It also installs security patches while including and excluding certain KBs by using '-KBNumberToExclude' and '-KBNumberToInclude'. It also excludes KBs that require reboot by using '-ExcludeKBsRequiringReboot'. @@ -83,7 +83,7 @@ This example passes a PSVirtualMachine object to '-VM' parameter. It also instal ### Example 3 ```powershell $myLinuxVM = Get-AzVM -ResourceGroupName 'MyRG' -Name 'MyLinuxVM' -Invoke-AzVMInstallPatch -ResourceId $myLinuxVM.id -MaximumDuration "PT90M" -RebootSetting "Always" -Linux -ClassificationToIncludeForLinux "Security" -PackageNameMaskToInclude ["package123"] -PackageNameMaskToExclude ["package567"] +Invoke-AzVMInstallPatch -ResourceId $myLinuxVM.id -MaximumDuration "PT90M" -RebootSetting "Always" -Linux -ClassificationToIncludeForLinux "Security" -PackageNameMaskToInclude "package123" -PackageNameMaskToExclude "package567" ``` This example installs certain packages to the Linux VM provided by Resource ID. diff --git a/src/Compute/Compute/help/New-AzDisk.md b/src/Compute/Compute/help/New-AzDisk.md index 039e4f6794ed..2684faf25df5 100644 --- a/src/Compute/Compute/help/New-AzDisk.md +++ b/src/Compute/Compute/help/New-AzDisk.md @@ -28,9 +28,9 @@ The **New-AzDisk** cmdlet creates a managed disk. ```powershell $diskconfig = New-AzDiskConfig -Location 'Central US' -DiskSizeGB 5 -SkuName Standard_LRS -OsType Windows -CreateOption Empty -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $diskconfig = Set-AzDiskDiskEncryptionKey -Disk $diskconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $diskconfig = Set-AzDiskKeyEncryptionKey -Disk $diskconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/New-AzDiskConfig.md b/src/Compute/Compute/help/New-AzDiskConfig.md index 3dfd57364ab9..5f5f4cb65ea8 100644 --- a/src/Compute/Compute/help/New-AzDiskConfig.md +++ b/src/Compute/Compute/help/New-AzDiskConfig.md @@ -36,9 +36,9 @@ The **New-AzDiskConfig** cmdlet creates a configurable disk object. ### Example 1 ```powershell $diskconfig = New-AzDiskConfig -Location 'Central US' -DiskSizeGB 5 -SkuName Standard_LRS -OsType Windows -CreateOption Empty -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $diskconfig = Set-AzDiskDiskEncryptionKey -Disk $diskconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $diskconfig = Set-AzDiskKeyEncryptionKey -Disk $diskconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/New-AzDiskUpdateConfig.md b/src/Compute/Compute/help/New-AzDiskUpdateConfig.md index 2354cee75e65..83b2a270a927 100644 --- a/src/Compute/Compute/help/New-AzDiskUpdateConfig.md +++ b/src/Compute/Compute/help/New-AzDiskUpdateConfig.md @@ -32,9 +32,9 @@ The **New-AzDiskUpdateConfig** cmdlet creates a configurable disk update object. ### Example 1 ```powershell $diskupdateconfig = New-AzDiskUpdateConfig -DiskSizeGB 10 -SkuName Premium_LRS -OsType Windows -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $diskupdateconfig = Set-AzDiskUpdateDiskEncryptionKey -DiskUpdate $diskupdateconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $diskupdateconfig = Set-AzDiskUpdateKeyEncryptionKey -DiskUpdate $diskupdateconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/New-AzGallery.md b/src/Compute/Compute/help/New-AzGallery.md index 5ac246398cd6..da69e56cce5c 100644 --- a/src/Compute/Compute/help/New-AzGallery.md +++ b/src/Compute/Compute/help/New-AzGallery.md @@ -32,7 +32,7 @@ Create a gallery. ### Example 2 ```powershell -PS C:\> New-AzGallery -ResourceGroupName $rgname -Name $galleryName -Location $location -Description $galleryDescription -Permission Groups +New-AzGallery -ResourceGroupName $rgname -Name $galleryName -Location $location -Description $galleryDescription -Permission Groups ``` Create a gallery with Direct Sharing enabled. diff --git a/src/Compute/Compute/help/New-AzGalleryImageVersion.md b/src/Compute/Compute/help/New-AzGalleryImageVersion.md index ce94af78c80f..89053dd8dc30 100644 --- a/src/Compute/Compute/help/New-AzGalleryImageVersion.md +++ b/src/Compute/Compute/help/New-AzGalleryImageVersion.md @@ -157,10 +157,10 @@ $location = "eastus" $sourceImageId = "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myVMRG/providers/Microsoft.Compute/virtualMachines/myVM" $replicaCount = 1 $storageAccountType = "Standard_ZRS" -$region_eastus = @{Name = 'East US';ReplicaCount = 3;StorageAccountType = Standard_LRS} +$region_eastus = @{Name = 'East US';ReplicaCount = 3;StorageAccountType = 'Standard_LRS'} $region_westus = @{Name = 'West US'} $region_ukwest = @{Name = 'UK West';ReplicaCount = 2} -$region_southcentralus = @{Name = 'South Central US';StorageAccountType = Standard_LRS} +$region_southcentralus = @{Name = 'South Central US';StorageAccountType = 'Standard_LRS'} $targetRegions = @($region_eastus, $region_westus, $region_ukwest, $region_southcentralus) New-AzGalleryImageVersion -ResourceGroupName $rgName -GalleryName $galleryName -GalleryImageDefinitionName $galleryImageDefinitionName -Name $galleryImageVersionName -Location $location -SourceImageId $sourceImageId -ReplicaCount 1 -StorageAccountType $storageAccountType -TargetRegion $targetRegions ``` @@ -185,7 +185,7 @@ $encryption_eastus_os = @{DiskEncryptionSetId = $eastUSdes } $encryption_eastus_dd0 = @{DiskEncryptionSetId = $eastUSdes; Lun = 0 } $encryption_eastus_dd = @($encryption_eastus_dd0) $eastus_encryption = @{OSDiskImage = $eastus_encryption_os; DataDiskImages = $eastus_encryption_dd } -$region_eastus = @{Name = 'East US';ReplicaCount = 3;StorageAccountType = Standard_LRS; Encryption = $encryption_eastus} +$region_eastus = @{Name = 'East US';ReplicaCount = 3;StorageAccountType = 'Standard_LRS'; Encryption = $encryption_eastus} # West US regional settings $westUS2des = "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myDESrg/providers/Microsoft.Compute/diskEncryptionSets/myWestUSDES" @@ -193,7 +193,7 @@ $encryption_westus_os = @{DiskEncryptionSetId = $westUSdes } $encryption_westus_dd0 = @{DiskEncryptionSetId = $westUSdes; Lun = 0 } $encryption_westus_dd = @($encryption_westus_dd0) $westus_encryption = @{OSDiskImage = $encryption_westus_os; DataDiskImages = $encryption_westus_dd } -$region_westus = @{Name = 'West US'; Encryption = $westus_encryption}} +$region_westus = @{Name = 'West US'; Encryption = $westus_encryption} # Create images $targetRegions = @($region_eastus, $region_westus) diff --git a/src/Compute/Compute/help/New-AzSnapshot.md b/src/Compute/Compute/help/New-AzSnapshot.md index 113185386975..a4d706145c7b 100644 --- a/src/Compute/Compute/help/New-AzSnapshot.md +++ b/src/Compute/Compute/help/New-AzSnapshot.md @@ -25,9 +25,9 @@ The **New-AzSnapshot** cmdlet creates a snapshot. ### Example 1 ```powershell $snapshotconfig = New-AzSnapshotConfig -Location 'Central US' -DiskSizeGB 5 -AccountType StandardLRS -OsType Windows -CreateOption Empty -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $snapshotconfig = Set-AzSnapshotDiskEncryptionKey -Snapshot $snapshotconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $snapshotconfig = Set-AzSnapshotKeyEncryptionKey -Snapshot $snapshotconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/New-AzSnapshotConfig.md b/src/Compute/Compute/help/New-AzSnapshotConfig.md index 77a98ed57202..e3dad97d9a58 100644 --- a/src/Compute/Compute/help/New-AzSnapshotConfig.md +++ b/src/Compute/Compute/help/New-AzSnapshotConfig.md @@ -33,9 +33,9 @@ The **New-AzSnapshotConfig** cmdlet creates a configurable snapshot object. ### Example 1 ```powershell $snapshotconfig = New-AzSnapshotConfig -Location 'Central US' -DiskSizeGB 5 -AccountType StandardLRS -OsType Windows -CreateOption Empty -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $snapshotconfig = Set-AzSnapshotDiskEncryptionKey -Snapshot $snapshotconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $snapshotconfig = Set-AzSnapshotKeyEncryptionKey -Snapshot $snapshotconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/New-AzSnapshotUpdateConfig.md b/src/Compute/Compute/help/New-AzSnapshotUpdateConfig.md index a78ceff59f43..cebf6d9e5e72 100644 --- a/src/Compute/Compute/help/New-AzSnapshotUpdateConfig.md +++ b/src/Compute/Compute/help/New-AzSnapshotUpdateConfig.md @@ -29,9 +29,9 @@ The **New-AzSnapshotUpdateConfig** cmdlet creates a configurable snapshot update ### Example 1 ```powershell $snapshotupdateconfig = New-AzSnapshotUpdateConfig -DiskSizeGB 10 -AccountType PremiumLRS -OsType Windows -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $snapshotupdateconfig = Set-AzSnapshotUpdateDiskEncryptionKey -SnapshotUpdate $snapshotupdateconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $snapshotupdateconfig = Set-AzSnapshotUpdateKeyEncryptionKey -SnapshotUpdate $snapshotupdateconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/New-AzVmss.md b/src/Compute/Compute/help/New-AzVmss.md index 31b6b2c7174a..1b54a4531eb6 100644 --- a/src/Compute/Compute/help/New-AzVmss.md +++ b/src/Compute/Compute/help/New-AzVmss.md @@ -45,11 +45,11 @@ Use the simple parameter set (`SimpleParameterSet`) to quickly create a pre-set ### Example 1: Create a VMSS using the SimpleParameterSet ```powershell -$vmssName = +$vmssName = 'VMSSNAME' # Create credentials, I am using one way to create credentials, there are others as well. # Pick one that makes the most sense according to your use case. -$vmPassword = ConvertTo-SecureString -AsPlainText -Force -$vmCred = New-Object System.Management.Automation.PSCredential(, $vmPassword) +$vmPassword = ConvertTo-SecureString "PASSWORD" -AsPlainText -Force +$vmCred = New-Object System.Management.Automation.PSCredential('USERNAME', $vmPassword) #Create a VMSS using the default settings New-AzVmss -Credential $vmCred -VMScaleSetName $vmssName @@ -149,13 +149,13 @@ New-AzVmss -ResourceGroupName $RGName -Name $VMSSName -VirtualMachineScaleSet $V ### Example 3: Create a VMSS with a UserData value ```powershell -$ResourceGroupName = ''; -$vmssName = ; +$ResourceGroupName = 'RESOURCE GROUP NAME'; +$vmssName = 'VMSSNAME'; $domainNameLabel = "dnl" + $ResourceGroupName; # Create credentials, I am using one way to create credentials, there are others as well. # Pick one that makes the most sense according to your use case. -$vmPassword = ConvertTo-SecureString -AsPlainText -Force; -$vmCred = New-Object System.Management.Automation.PSCredential(, $vmPassword); +$vmPassword = ConvertTo-SecureString 'PASSWORD' -AsPlainText -Force; +$vmCred = New-Object System.Management.Automation.PSCredential('USERNAME', $vmPassword); $text = "UserData value to encode"; $bytes = [System.Text.Encoding]::Unicode.GetBytes($text); diff --git a/src/Compute/Compute/help/Remove-AzGalleryApplicationVersion.md b/src/Compute/Compute/help/Remove-AzGalleryApplicationVersion.md index 88022baffc81..4aa319aeb0d2 100644 --- a/src/Compute/Compute/help/Remove-AzGalleryApplicationVersion.md +++ b/src/Compute/Compute/help/Remove-AzGalleryApplicationVersion.md @@ -32,8 +32,7 @@ Delete a gallery Application Version. ### Example 1: Remove a Gallery Application Version ```powershell -Remove-AzGalleryApplication -ResourceGroupName $rgNmae -GalleryName $galleryName -GalleryApplicationName $galleryApplicationName -Name $name - +Remove-AzGalleryApplicationVersion -ResourceGroupName $rgNmae -GalleryName $galleryName -GalleryApplicationName $galleryApplicationName -Name $name ``` Delete a gallery application version. diff --git a/src/Compute/Compute/help/Restart-AzHost.md b/src/Compute/Compute/help/Restart-AzHost.md index 003ad1ee50c9..5b88be143f62 100644 --- a/src/Compute/Compute/help/Restart-AzHost.md +++ b/src/Compute/Compute/help/Restart-AzHost.md @@ -37,7 +37,7 @@ Restart the dedicated host. The operation will complete successfully once the de ### Example 1 ```powershell -$Location = ; +$Location = 'Location'; $ResourceGroupName = New-AzResourceGroup -Name $rgname -Location $Location -Force; $hostGroupName = $ResourceGroupName + 'hostgroup' diff --git a/src/Compute/Compute/help/Save-AzVhd.md b/src/Compute/Compute/help/Save-AzVhd.md index 17e4de3ea93b..fc39e2c79cb1 100644 --- a/src/Compute/Compute/help/Save-AzVhd.md +++ b/src/Compute/Compute/help/Save-AzVhd.md @@ -61,7 +61,7 @@ Therefore, the cmdlet uses 32 threads for this action. ### Example 4: Download an image and specify the storage key ```powershell -Save-AzVhd -SourceUri "http://contosoaccount.blob.core.windows.net/vhdstore/win7baseimage.vhd" -LocalFilePath "C:\vhd\Win7Image.vhd" -StorageKey "zNvcH0r5vAGmC5AbwEtpcyWCMyBd3eMDbdaa4ua6kwxq6vTZH3Y+sw==" -ResourceGroupName "rgname" +Save-AzVhd -SourceUri "http://contosoaccount.blob.core.windows.net/vhdstore/win7baseimage.vhd" -LocalFilePath "C:\vhd\Win7Image.vhd" -StorageKey "zNvcH0r5vAGmC5AbwEtpcyWCMyBd3eMDbdaa4ua6kwxq6vTZH3Y+sw==" ``` This command downloads a .vhd file and specifies the storage key. diff --git a/src/Compute/Compute/help/Set-AzDiskDiskEncryptionKey.md b/src/Compute/Compute/help/Set-AzDiskDiskEncryptionKey.md index 955bcdb93c0f..181a3db524f2 100644 --- a/src/Compute/Compute/help/Set-AzDiskDiskEncryptionKey.md +++ b/src/Compute/Compute/help/Set-AzDiskDiskEncryptionKey.md @@ -25,9 +25,9 @@ The **Set-AzDiskDiskEncryptionKey** cmdlet sets the disk encryption key properti ### Example 1 ```powershell $diskconfig = New-AzDiskConfig -Location 'Central US' -DiskSizeGB 5 -SkuName StandardLRS -OsType Windows -CreateOption Empty -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $diskconfig = Set-AzDiskDiskEncryptionKey -Disk $diskconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $diskconfig = Set-AzDiskKeyEncryptionKey -Disk $diskconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/Set-AzDiskKeyEncryptionKey.md b/src/Compute/Compute/help/Set-AzDiskKeyEncryptionKey.md index c572465115c5..31f8d4a87247 100644 --- a/src/Compute/Compute/help/Set-AzDiskKeyEncryptionKey.md +++ b/src/Compute/Compute/help/Set-AzDiskKeyEncryptionKey.md @@ -25,9 +25,9 @@ The **Set-AzDiskKeyEncryptionKey** cmdlet sets the key encryption key properties ### Example 1 ```powershell $diskconfig = New-AzDiskConfig -Location 'Central US' -DiskSizeGB 5 -SkuName StandardLRS -OsType Windows -CreateOption Empty -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $diskconfig = Set-AzDiskDiskEncryptionKey -Disk $diskconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $diskconfig = Set-AzDiskKeyEncryptionKey -Disk $diskconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/Set-AzDiskUpdateDiskEncryptionKey.md b/src/Compute/Compute/help/Set-AzDiskUpdateDiskEncryptionKey.md index c9ab6ec236d0..58f897667f05 100644 --- a/src/Compute/Compute/help/Set-AzDiskUpdateDiskEncryptionKey.md +++ b/src/Compute/Compute/help/Set-AzDiskUpdateDiskEncryptionKey.md @@ -26,9 +26,9 @@ The **Set-AzDiskUpdateDiskEncryptionKey** cmdlet sets the disk encryption key pr ### Example 1 ```powershell $diskupdateconfig = New-AzDiskUpdateConfig -DiskSizeGB 10 -SkuName Premium_LRS -OsType Windows -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $diskupdateconfig = Set-AzDiskUpdateDiskEncryptionKey -DiskUpdate $diskupdateconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $diskupdateconfig = Set-AzDiskUpdateKeyEncryptionKey -DiskUpdate $diskupdateconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/Set-AzDiskUpdateKeyEncryptionKey.md b/src/Compute/Compute/help/Set-AzDiskUpdateKeyEncryptionKey.md index f3231ede5c7e..60be4dee701b 100644 --- a/src/Compute/Compute/help/Set-AzDiskUpdateKeyEncryptionKey.md +++ b/src/Compute/Compute/help/Set-AzDiskUpdateKeyEncryptionKey.md @@ -25,9 +25,9 @@ The **Set-AzDiskUpdateKeyEncryptionKey** cmdlet sets the key encryption key prop ### Example 1 ```powershell $diskupdateconfig = New-AzDiskUpdateConfig -DiskSizeGB 10 -SkuName Premium_LRS -OsType Windows -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $diskupdateconfig = Set-AzDiskUpdateDiskEncryptionKey -DiskUpdate $diskupdateconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $diskupdateconfig = Set-AzDiskUpdateKeyEncryptionKey -DiskUpdate $diskupdateconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/Set-AzSnapshotDiskEncryptionKey.md b/src/Compute/Compute/help/Set-AzSnapshotDiskEncryptionKey.md index da984d02dc50..a9c591487eb8 100644 --- a/src/Compute/Compute/help/Set-AzSnapshotDiskEncryptionKey.md +++ b/src/Compute/Compute/help/Set-AzSnapshotDiskEncryptionKey.md @@ -25,9 +25,9 @@ The **Set-AzSnapshotDiskEncryptionKey** cmdlet sets the disk encryption key prop ### Example 1 ```powershell $snapshotconfig = New-AzSnapshotConfig -Location 'Central US' -DiskSizeGB 5 -AccountType StandardLRS -OsType Windows -CreateOption Empty -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $snapshotconfig = Set-AzSnapshotDiskEncryptionKey -Snapshot $snapshotconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $snapshotconfig = Set-AzSnapshotKeyEncryptionKey -Snapshot $snapshotconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/Set-AzSnapshotKeyEncryptionKey.md b/src/Compute/Compute/help/Set-AzSnapshotKeyEncryptionKey.md index f839b9a96bb3..909946f96e76 100644 --- a/src/Compute/Compute/help/Set-AzSnapshotKeyEncryptionKey.md +++ b/src/Compute/Compute/help/Set-AzSnapshotKeyEncryptionKey.md @@ -25,9 +25,9 @@ The **Set-AzSnapshotKeyEncryptionKey** cmdlet sets the key encryption key proper ### Example 1 ```powershell $snapshotconfig = New-AzSnapshotConfig -Location 'Central US' -DiskSizeGB 5 -AccountType StandardLRS -OsType Windows -CreateOption Empty -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $snapshotconfig = Set-AzSnapshotDiskEncryptionKey -Snapshot $snapshotconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $snapshotconfig = Set-AzSnapshotKeyEncryptionKey -Snapshot $snapshotconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/Set-AzSnapshotUpdateDiskEncryptionKey.md b/src/Compute/Compute/help/Set-AzSnapshotUpdateDiskEncryptionKey.md index 274281440fb9..5e5af898668b 100644 --- a/src/Compute/Compute/help/Set-AzSnapshotUpdateDiskEncryptionKey.md +++ b/src/Compute/Compute/help/Set-AzSnapshotUpdateDiskEncryptionKey.md @@ -26,9 +26,9 @@ The **Set-AzSnapshotUpdateDiskEncryptionKey** cmdlet sets the disk encryption ke ### Example 1 ```powershell $snapshotupdateconfig = New-AzSnapshotUpdateConfig -DiskSizeGB 10 -AccountType PremiumLRS -OsType Windows -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $snapshotupdateconfig = Set-AzSnapshotUpdateDiskEncryptionKey -SnapshotUpdate $snapshotupdateconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $snapshotupdateconfig = Set-AzSnapshotUpdateKeyEncryptionKey -SnapshotUpdate $snapshotupdateconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/Set-AzSnapshotUpdateKeyEncryptionKey.md b/src/Compute/Compute/help/Set-AzSnapshotUpdateKeyEncryptionKey.md index ee0946a72e91..7b0870f82e74 100644 --- a/src/Compute/Compute/help/Set-AzSnapshotUpdateKeyEncryptionKey.md +++ b/src/Compute/Compute/help/Set-AzSnapshotUpdateKeyEncryptionKey.md @@ -26,9 +26,9 @@ The **Set-AzSnapshotUpdateKeyEncryptionKey** cmdlet sets the key encryption key ### Example 1 ```powershell $snapshotupdateconfig = New-AzSnapshotUpdateConfig -DiskSizeGB 10 -AccountType PremiumLRS -OsType Windows -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $snapshotupdateconfig = Set-AzSnapshotUpdateDiskEncryptionKey -SnapshotUpdate $snapshotupdateconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $snapshotupdateconfig = Set-AzSnapshotUpdateKeyEncryptionKey -SnapshotUpdate $snapshotupdateconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/Set-AzVMDiskEncryptionExtension.md b/src/Compute/Compute/help/Set-AzVMDiskEncryptionExtension.md index ea3a2730c005..d4633e962731 100644 --- a/src/Compute/Compute/help/Set-AzVMDiskEncryptionExtension.md +++ b/src/Compute/Compute/help/Set-AzVMDiskEncryptionExtension.md @@ -140,7 +140,7 @@ $aadClientCertThumbprint= $cert.Thumbprint #Upload pfx to KeyVault $KeyVaultSecretName = "MyAADCert" -$FileContentBytes = get-content $CertPath -Encoding Byte +$FileContentBytes = Get-Content $CertPath -Encoding Byte $FileContentEncoded = [System.Convert]::ToBase64String($fileContentBytes) $JSONObject = @" { @@ -219,7 +219,7 @@ $AADClientCertThumbprint= $Cert.Thumbprint #Upload pfx to KeyVault $KeyVaultSecretName = "MyAADCert" -$FileContentBytes = get-content $CertPath -Encoding Byte +$FileContentBytes = Get-Content $CertPath -Encoding Byte $FileContentEncoded = [System.Convert]::ToBase64String($FileContentBytes) $JSONObject = @" { diff --git a/src/Compute/Compute/help/Set-AzVmssRollingUpgradePolicy.md b/src/Compute/Compute/help/Set-AzVmssRollingUpgradePolicy.md index ea175f62bda4..cc0b49b00ef4 100644 --- a/src/Compute/Compute/help/Set-AzVmssRollingUpgradePolicy.md +++ b/src/Compute/Compute/help/Set-AzVmssRollingUpgradePolicy.md @@ -27,7 +27,7 @@ Sets the VMSS rolling upgrade policy properties. ### Example 1 ```powershell -Set-AzVmssRollingUpgradePolicy -VirtualMachineScaleSet $vmss -VirtualMachineScaleSet $vmss -MaxBatchInstancePercent 40 -MaxUnhealthyInstancePercent 35 -MaxUnhealthyUpgradedInstancePercent 30 -PauseTimeBetweenBatches "PT30S" +Set-AzVmssRollingUpgradePolicy -VirtualMachineScaleSet $vmss -MaxBatchInstancePercent 40 -MaxUnhealthyInstancePercent 35 -MaxUnhealthyUpgradedInstancePercent 30 -PauseTimeBetweenBatches "PT30S" ``` This command sets 40 percent for MaxBatchInstance, 35 percent for MaxUnhealthyInstance, 30 percent for MaxUnhealthyUpgradedInstance and 30 second pause time between batches for VMSS local object $vmss. diff --git a/src/Compute/Compute/help/Update-AzDisk.md b/src/Compute/Compute/help/Update-AzDisk.md index c836e20b9e65..84289a9e770c 100644 --- a/src/Compute/Compute/help/Update-AzDisk.md +++ b/src/Compute/Compute/help/Update-AzDisk.md @@ -32,9 +32,9 @@ The **Update-AzDisk** cmdlet updates a disk. ### Example 1 ```powershell $diskupdateconfig = New-AzDiskUpdateConfig -DiskSizeGB 10 -SkuName Premium_LRS -OsType Windows -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $diskupdateconfig = Set-AzDiskUpdateDiskEncryptionKey -DiskUpdate $diskupdateconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $diskupdateconfig = Set-AzDiskUpdateKeyEncryptionKey -DiskUpdate $diskupdateconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/Update-AzGallery.md b/src/Compute/Compute/help/Update-AzGallery.md index 95d8a11af4c4..6456f4580a7d 100644 --- a/src/Compute/Compute/help/Update-AzGallery.md +++ b/src/Compute/Compute/help/Update-AzGallery.md @@ -50,7 +50,7 @@ Update a gallery. ### Example 2 ```powershell -PS C:\> Update-AzGallery -ResourceGroupName $rgname -Name $galleryName -Permission Groups -Share -Tenant xxxxxxxx-xxx-xxxxxxx,zzzzzz-zzzzzzz-zzzzzz +Update-AzGallery -ResourceGroupName $rgname -Name $galleryName -Permission Groups -Share -Tenant xxxxxxxx-xxx-xxxxxxx,zzzzzz-zzzzzzz-zzzzzz ``` Update a gallery to be shared and add two subscriptions it is to be shared with. diff --git a/src/Compute/Compute/help/Update-AzImage.md b/src/Compute/Compute/help/Update-AzImage.md index 27782fec8854..e900455366e5 100644 --- a/src/Compute/Compute/help/Update-AzImage.md +++ b/src/Compute/Compute/help/Update-AzImage.md @@ -41,7 +41,7 @@ Currently, only the Tags can be updated. $image = Get-AzImage -ResourceGroupName 'ResourceGroup01' -ImageName 'Image01' $image.Tags = New-Object "System.Collections.Generic.Dictionary``2[System.String,System.String]" $image.Tags.Add("key1", "val1") -Update-AzImage -ResourceGroupName 'ResourceGroup01' -ImageName 'Image01' -Image $image +Update-AzImage -Image $image ``` This command updates the Tag value of the existing image 'Image01' in the resource group 'ResourceGroup01'. diff --git a/src/Compute/Compute/help/Update-AzSnapshot.md b/src/Compute/Compute/help/Update-AzSnapshot.md index 25456d0210fa..9074684ccef3 100644 --- a/src/Compute/Compute/help/Update-AzSnapshot.md +++ b/src/Compute/Compute/help/Update-AzSnapshot.md @@ -32,9 +32,9 @@ The **Update-AzSnapshot** cmdlet updates a snapshot. ### Example 1 ```powershell $snapshotupdateconfig = New-AzSnapshotUpdateConfig -DiskSizeGB 10 -AccountType PremiumLRS -OsType Windows -EncryptionSettingsEnabled $true; -$secretUrl = https://myvault.vault-int.azure-int.net/secrets/123/; +$secretUrl = 'https://myvault.vault-int.azure-int.net/secrets/123/'; $secretId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault123'; -$keyUrl = https://myvault.vault-int.azure-int.net/keys/456; +$keyUrl = 'https://myvault.vault-int.azure-int.net/keys/456'; $keyId = '/subscriptions/0000000-0000-0000-0000-000000000000/resourceGroups/ResourceGroup01/providers/Microsoft.KeyVault/vaults/TestVault456'; $snapshotupdateconfig = Set-AzSnapshotUpdateDiskEncryptionKey -SnapshotUpdate $snapshotupdateconfig -SecretUrl $secretUrl -SourceVaultId $secretId; $snapshotupdateconfig = Set-AzSnapshotUpdateKeyEncryptionKey -SnapshotUpdate $snapshotupdateconfig -KeyUrl $keyUrl -SourceVaultId $keyId; diff --git a/src/Compute/Compute/help/Update-AzVM.md b/src/Compute/Compute/help/Update-AzVM.md index 69154a9040fa..96b019f22294 100644 --- a/src/Compute/Compute/help/Update-AzVM.md +++ b/src/Compute/Compute/help/Update-AzVM.md @@ -58,8 +58,8 @@ To obtain a virtual machine object, use the **Get-AzVM** cmdlet. ### Example 2: Update a virtual machine to disable hyperthreading. ```powershell -$resourceGroupName = ; -$vmname = ; +$resourceGroupName = 'Resource Group Name>' +$vmname = 'Virtual Machine Name'; $domainNameLabel = "d1" + $rgname; $vCPUsCoreInitial = 2; $vCPUsAvailableInitial = 4; @@ -67,13 +67,13 @@ $vCPUsCore1 = 1; $vCPUsAvailable1 = 1; $vmSize = 'Standard_D4s_v4'; -$securePassword = | ConvertTo-SecureString -AsPlainText -Force; +$securePassword = 'Password' | ConvertTo-SecureString -AsPlainText -Force; $user = "user"; $cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword); -$vm = New-AzVM -ResourceGroupName $rgname -Name $vmname -Credential $cred -DomainNameLabel $domainNameLabel -Size $vmSize -vCPUsPerCore $vCPUsCoreInitial -vCPUsAvailable $vCPUsAvailableInitial; +$vm = New-AzVM -ResourceGroupName $rgname -Name $vmname -Credential $cred -DomainNameLabel $domainNameLabel -Size $vmSize -vCPUCountPerCore $vCPUsCoreInitial -vCPUCountAvailable $vCPUsAvailableInitial; # The $vm.HardwareProfile.VmSizeProperties.VCPUsPerCore property is 2, and the $vm.HardwareProfile.VmSizeProperties.VCPUsAvailable property is 4. -Update-AzVm -ResourceGroupName $rgname -VM $vm -vCPUsAvailable $vCPUsAvailable1 -vCPUsPerCore $vCPUsCore1; +Update-AzVm -ResourceGroupName $rgname -VM $vm -vCPUCountAvailable $vCPUsAvailable1 -vCPUCountPerCore $vCPUsCore1; # The $vm.HardwareProfile.VmSizeProperties.VCPUsPerCore property is 1, and the $vm.HardwareProfile.VmSizeProperties.VCPUsAvailable property is 1. # Hyperthreading is now disabled for this VM. ```