Skip to content

Commit b080768

Browse files
status (#4051)
Co-authored-by: OpenPublishing.Build <opbuild@microsoft.com>
1 parent ae91040 commit b080768

File tree

9 files changed

+34
-38
lines changed

9 files changed

+34
-38
lines changed

azps-15.4.0/Az.Purview/Update-AzPurviewAccount.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -65,12 +65,12 @@ FriendlyName : test-pa
6565
Id : /subscriptions/xxxxxxxx-1bf0-4dda-aec3-cb9272f09590/resourceGroups/bez-rg/providers/Microsoft.Purview/a
6666
ccounts/bez-pa
6767
Identity : {
68-
"principalId": "xxxxxxxx-7956-4978-87e8-9ddd82cfe2b7",
69-
"tenantId": "xxxxxxxx-38d6-4fb2-bad9-b7b93a3e9c5a",
68+
"principalId": "aaaaaaaa-bbbb-cccc-1111-222222222222",
69+
"tenantId": "aaaabbbb-0000-cccc-1111-dddd2222eeee",
7070
"type": "SystemAssigned"
7171
}
72-
IdentityPrincipalId : xxxxxxxx-7956-4978-87e8-9ddd82cfe2b7
73-
IdentityTenantId : xxxxxxxx-38d6-4fb2-bad9-b7b93a3e9c5a
72+
IdentityPrincipalId : aaaaaaaa-bbbb-cccc-1111-222222222222
73+
IdentityTenantId : aaaabbbb-0000-cccc-1111-dddd2222eeee
7474
IdentityType : SystemAssigned
7575
Location : eastus
7676
ManagedResourceEventHubNamespace : /subscriptions/xxxxxxxx-1bf0-4dda-aec3-cb9272f09590/resourceGroups/managed-rg-bbcpgdj/providers/Microso
@@ -126,12 +126,12 @@ FriendlyName : test-pa
126126
Id : /subscriptions/xxxxxxxx-1bf0-4dda-aec3-cb9272f09590/resourceGroups/bez-rg/providers/Microsoft.Purview/a
127127
ccounts/bez-pa
128128
Identity : {
129-
"principalId": "xxxxxxxx-7956-4978-87e8-9ddd82cfe2b7",
130-
"tenantId": "xxxxxxxx-38d6-4fb2-bad9-b7b93a3e9c5a",
129+
"principalId": "aaaaaaaa-bbbb-cccc-1111-222222222222",
130+
"tenantId": "aaaabbbb-0000-cccc-1111-dddd2222eeee",
131131
"type": "SystemAssigned"
132132
}
133-
IdentityPrincipalId : xxxxxxxx-7956-4978-87e8-9ddd82cfe2b7
134-
IdentityTenantId : xxxxxxxx-38d6-4fb2-bad9-b7b93a3e9c5a
133+
IdentityPrincipalId : aaaaaaaa-bbbb-cccc-1111-222222222222
134+
IdentityTenantId : aaaabbbb-0000-cccc-1111-dddd2222eeee
135135
IdentityType : SystemAssigned
136136
Location : eastus
137137
ManagedResourceEventHubNamespace : /subscriptions/xxxxxxxx-1bf0-4dda-aec3-cb9272f09590/resourceGroups/managed-rg-bbcpgdj/providers/Microso
@@ -382,4 +382,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
382382
## NOTES
383383
384384
## RELATED LINKS
385-

azps-15.4.0/Az.Qumulo/Get-AzQumuloFileSystem.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Get a file system resource
4646

4747
### Example 1: List by subscription
4848
```powershell
49-
Get-AzQumuloFileSystem -SubscriptionId fc35d936-3b89-41f8-8110-a24b56826c37
49+
Get-AzQumuloFileSystem -SubscriptionId aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e
5050
```
5151

5252
```output
@@ -184,4 +184,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
184184
## NOTES
185185
186186
## RELATED LINKS
187-

azps-15.4.0/Az.RedisCache/New-AzRedisCacheAccessPolicyAssignment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Create an access policy assignment (redis user) for a Redis Cache.
3737

3838
### Example 1
3939
```powershell
40-
New-AzRedisCacheAccessPolicyAssignment -Name "testCache" -AccessPolicyAssignmentName "testAccessPolicyAssignmentName" -AccessPolicyName "testAccessPolicyName" -ObjectId "69d700c5-ca77-4335-947e-xxxxxxxxxxxx" -ObjectIdAlias "testAlias"
40+
New-AzRedisCacheAccessPolicyAssignment -Name "testCache" -AccessPolicyAssignmentName "testAccessPolicyAssignmentName" -AccessPolicyName "testAccessPolicyName" -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" -ObjectIdAlias "testAlias"
4141
```
4242

4343
This command creates access policy assignment (redis user) named testAccessPolicyAssignmentName on Redis Cache named testCache.

azps-15.4.0/Az.RedisEnterpriseCache/New-AzRedisEnterpriseCacheAccessPolicyAssignment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Creates/Updates a particular access policy assignment for a database
5151

5252
### Example 1: Add new access policy assignment.
5353
```powershell
54-
New-AzRedisEnterpriseCacheAccessPolicyAssignment -AccessPolicyAssignmentName "testAccessPolicyAssignmentName" -ClusterName "MyCache" -DatabaseName "default" -ResourceGroupName "MyGroup" -UserObjectId "5fb3eb10-a8a2-4db7-8bb4-e377180e7427" -AccessPolicyName "default"
54+
New-AzRedisEnterpriseCacheAccessPolicyAssignment -AccessPolicyAssignmentName "testAccessPolicyAssignmentName" -ClusterName "MyCache" -DatabaseName "default" -ResourceGroupName "MyGroup" -UserObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" -AccessPolicyName "default"
5555
```
5656

5757
```output

azps-15.4.0/Az.Reservations/Get-AzReservationCatalog.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Get the regions and skus that are available for RI purchase for the specified Az
3838

3939
### Example 1: Get the list of reserved resource type skus with location
4040
```powershell
41-
Get-AzReservationCatalog -SubscriptionId "10000000-aaaa-bbbb-cccc-100000000001" -Location "westus" -ReservedResourceType "VirtualMachine"
41+
Get-AzReservationCatalog -SubscriptionId "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e" -Location "westus" -ReservedResourceType "VirtualMachine"
4242
```
4343

4444
```output
@@ -59,7 +59,7 @@ This command gets a catlog of reserved resource type skus with location
5959

6060
### Example 2: Get the list of reserved resource type skus without location
6161
```powershell
62-
Get-AzReservationCatalog -SubscriptionId "10000000-aaaa-bbbb-cccc-100000000001" -ReservedResourceType "SuseLinux"
62+
Get-AzReservationCatalog -SubscriptionId "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e" -ReservedResourceType "SuseLinux"
6363
```
6464

6565
```output
@@ -87,7 +87,7 @@ This command gets a catlog of reserved resource type skus without location
8787

8888
### Example 3: Get the list of eligible 3pp reserved resource type skus with publisher id, offer id, plan id
8989
```powershell
90-
Get-AzReservationCatalog -SubscriptionId "10000000-aaaa-bbbb-cccc-100000000001" -ReservedResourceType "VirtualMachineSoftware" -PublisherId canonical -OfferId 0001-com-ubuntu-pro-xenial -PlanId pro-16_04-lts
90+
Get-AzReservationCatalog -SubscriptionId "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e" -ReservedResourceType "VirtualMachineSoftware" -PublisherId canonical -OfferId 0001-com-ubuntu-pro-xenial -PlanId pro-16_04-lts
9191
```
9292

9393
```output
@@ -292,4 +292,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
292292
## NOTES
293293
294294
## RELATED LINKS
295-

azps-15.4.0/Az.Reservations/Get-AzReservationOrderId.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,11 +34,11 @@ Get applicable `Reservation`s that are applied to this subscription or a resourc
3434

3535
### Example 1: Get list of applicable ReservationOrder Ids.
3636
```powershell
37-
Get-AzReservationOrderId -SubscriptionId '10000000-aaaa-bbbb-cccc-100000000005'
37+
Get-AzReservationOrderId -SubscriptionId 'aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e'
3838
```
3939

4040
```output
41-
Id : /subscriptions/10000000-aaaa-bbbb-cccc-100000000005/providers/microsoft.capacity/AppliedReservations/default
41+
Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/providers/microsoft.capacity/AppliedReservations/default
4242
Name : default
4343
ReservationOrderIdNextLink :
4444
ReservationOrderIdValue : {/providers/Microsoft.Capacity/reservationorders/7c6192be-7543-40c3-93e1-3d7f0b15203f,
@@ -113,4 +113,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
113113
## NOTES
114114
115115
## RELATED LINKS
116-

azps-15.4.0/Az.ResourceGraph/Search-AzGraph.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -46,19 +46,19 @@ Search-AzGraph "project id, name, type, location, tags" -First 3
4646
```
4747

4848
```output
49-
id : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt
49+
id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt
5050
name : nt
5151
type : microsoft.compute/virtualmachinescalesets
5252
location : eastus
5353
tags : @{resourceType=Service Fabric; clusterName=gov-art-int-nt-a}
54-
ResourceId : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt
54+
ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt
5555
56-
id : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
56+
id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
5757
name : egtopic-1
5858
type : microsoft.eventgrid/topics
5959
location : westus2
6060
tags :
61-
ResourceId : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
61+
ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
6262
```
6363

6464
Simple resources query requesting a subset of resource fields.
@@ -85,17 +85,17 @@ Search-AzGraph -Query "project id, name, type, location" -SkipToken $response.Sk
8585
```
8686

8787
```output
88-
id : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/test/providers/Microsoft.Network/networkInterfaces/17ni
88+
id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/test/providers/Microsoft.Network/networkInterfaces/17ni
8989
name : 17ni
9090
type : microsoft.network/networkinterfaces
9191
location : westeurope
92-
ResourceId : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/test/providers/Microsoft.Network/networkInterfaces/17ni
92+
ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/test/providers/Microsoft.Network/networkInterfaces/17ni
9393
94-
id : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/test/providers/Microsoft.Network/networkSecurityGroups/17nsg
94+
id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/test/providers/Microsoft.Network/networkSecurityGroups/17nsg
9595
name : 17nsg
9696
type : microsoft.network/networksecuritygroups
9797
location : westeurope
98-
ResourceId : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/test/providers/Microsoft.Network/networkSecurityGroups/17nsg
98+
ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/test/providers/Microsoft.Network/networkSecurityGroups/17nsg
9999
```
100100

101101
A query with the skip token passed from the previous query results. Please note that keeping id in the results is mandatory to get back a skip token.
@@ -106,19 +106,19 @@ Search-AzGraph -Query "project id, name, type, location, tags" -First 2 -Managem
106106
```
107107

108108
```output
109-
id : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt
109+
id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt
110110
name : nt
111111
type : microsoft.compute/virtualmachinescalesets
112112
location : eastus
113113
tags : @{resourceType=Service Fabric; clusterName=gov-art-int-nt-a}
114-
ResourceId : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt
114+
ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt
115115
116-
id : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
116+
id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
117117
name : egtopic-1
118118
type : microsoft.eventgrid/topics
119119
location : westus2
120120
tags :
121-
ResourceId : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
121+
ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
122122
```
123123

124124
A query scoped to the management group that allows the query to succeed with partial scope result if MyManagementGroupId has more than N subscriptions underneath.

azps-15.4.0/Az.Resources/Add-AzADAppPermission.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,17 +43,17 @@ User needs to grant consent via Azure Portal if the permission requires admin co
4343

4444
### Example 1: Add API Permission
4545
```powershell
46-
Add-AzADAppPermission -ObjectId 9cc74d5e-1162-4b90-8696-65f3d6a3f7d0 -ApiId 00000003-0000-0000-c000-000000000000 -PermissionId 5f8c59db-677d-491f-a6b8-5f174b11ec1d
46+
Add-AzADAppPermission -ObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb -ApiId 00000003-0000-0000-c000-000000000000 -PermissionId 5f8c59db-677d-491f-a6b8-5f174b11ec1d
4747
```
4848

49-
Add delegated permission "Group.Read.All" of Microsoft Graph API to AD Application (9cc74d5e-1162-4b90-8696-65f3d6a3f7d0)
49+
Add delegated permission "Group.Read.All" of Microsoft Graph API to AD Application (aaaabbbb-0000-cccc-1111-dddd2222eeee)
5050

5151
### Example 2: Add API Permission
5252
```powershell
53-
Add-AzADAppPermission -ObjectId 9cc74d5e-1162-4b90-8696-65f3d6a3f7d0 -ApiId 00000003-0000-0000-c000-000000000000 -PermissionId 1138cb37-bd11-4084-a2b7-9f71582aeddb -Type Role
53+
Add-AzADAppPermission -ObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb -ApiId 00000003-0000-0000-c000-000000000000 -PermissionId 1138cb37-bd11-4084-a2b7-9f71582aeddb -Type Role
5454
```
5555

56-
Add application permission "Device.ReadWrite.All" of Microsoft Graph API to AD Application (9cc74d5e-1162-4b90-8696-65f3d6a3f7d0)
56+
Add application permission "Device.ReadWrite.All" of Microsoft Graph API to AD Application (aaaabbbb-0000-cccc-1111-dddd2222eeee)
5757

5858
## PARAMETERS
5959

azps-15.4.0/Az.Resources/Get-AzADAppPermission.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Lists API permissions the application has requested.
3333

3434
### Example 1: Get API permission
3535
```powershell
36-
Get-AzADAppPermission -ObjectId 18797549-86a9-4906-b2a9-54f08cd3c427
36+
Get-AzADAppPermission -ObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb
3737
```
3838

3939
```output
@@ -43,7 +43,7 @@ ApiId Id Type
4343
00000003-0000-0000-c000-000000000000 5b567255-7703-4780-807c-7be8301ae99b Scope
4444
```
4545

46-
Fetches all API permissions of Azure AD object 18797549-86a9-4906-b2a9-54f08cd3c427
46+
Fetches all API permissions of Azure AD object aaaabbbb-0000-cccc-1111-dddd2222eeee
4747

4848
## PARAMETERS
4949

0 commit comments

Comments
 (0)