Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
17 changes: 8 additions & 9 deletions azps-15.4.0/Az.Purview/Update-AzPurviewAccount.md
Original file line number Diff line number Diff line change
Expand Up @@ -65,12 +65,12 @@ FriendlyName : test-pa
Id : /subscriptions/xxxxxxxx-1bf0-4dda-aec3-cb9272f09590/resourceGroups/bez-rg/providers/Microsoft.Purview/a
ccounts/bez-pa
Identity : {
"principalId": "xxxxxxxx-7956-4978-87e8-9ddd82cfe2b7",
"tenantId": "xxxxxxxx-38d6-4fb2-bad9-b7b93a3e9c5a",
"principalId": "aaaaaaaa-bbbb-cccc-1111-222222222222",
"tenantId": "aaaabbbb-0000-cccc-1111-dddd2222eeee",
"type": "SystemAssigned"
}
IdentityPrincipalId : xxxxxxxx-7956-4978-87e8-9ddd82cfe2b7
IdentityTenantId : xxxxxxxx-38d6-4fb2-bad9-b7b93a3e9c5a
IdentityPrincipalId : aaaaaaaa-bbbb-cccc-1111-222222222222
IdentityTenantId : aaaabbbb-0000-cccc-1111-dddd2222eeee
IdentityType : SystemAssigned
Location : eastus
ManagedResourceEventHubNamespace : /subscriptions/xxxxxxxx-1bf0-4dda-aec3-cb9272f09590/resourceGroups/managed-rg-bbcpgdj/providers/Microso
Expand Down Expand Up @@ -126,12 +126,12 @@ FriendlyName : test-pa
Id : /subscriptions/xxxxxxxx-1bf0-4dda-aec3-cb9272f09590/resourceGroups/bez-rg/providers/Microsoft.Purview/a
ccounts/bez-pa
Identity : {
"principalId": "xxxxxxxx-7956-4978-87e8-9ddd82cfe2b7",
"tenantId": "xxxxxxxx-38d6-4fb2-bad9-b7b93a3e9c5a",
"principalId": "aaaaaaaa-bbbb-cccc-1111-222222222222",
"tenantId": "aaaabbbb-0000-cccc-1111-dddd2222eeee",
"type": "SystemAssigned"
}
IdentityPrincipalId : xxxxxxxx-7956-4978-87e8-9ddd82cfe2b7
IdentityTenantId : xxxxxxxx-38d6-4fb2-bad9-b7b93a3e9c5a
IdentityPrincipalId : aaaaaaaa-bbbb-cccc-1111-222222222222
IdentityTenantId : aaaabbbb-0000-cccc-1111-dddd2222eeee
IdentityType : SystemAssigned
Location : eastus
ManagedResourceEventHubNamespace : /subscriptions/xxxxxxxx-1bf0-4dda-aec3-cb9272f09590/resourceGroups/managed-rg-bbcpgdj/providers/Microso
Expand Down Expand Up @@ -382,4 +382,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
## NOTES

## RELATED LINKS

3 changes: 1 addition & 2 deletions azps-15.4.0/Az.Qumulo/Get-AzQumuloFileSystem.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ Get a file system resource

### Example 1: List by subscription
```powershell
Get-AzQumuloFileSystem -SubscriptionId fc35d936-3b89-41f8-8110-a24b56826c37
Get-AzQumuloFileSystem -SubscriptionId aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e
```

```output
Expand Down Expand Up @@ -184,4 +184,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
## NOTES

## RELATED LINKS

Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ Create an access policy assignment (redis user) for a Redis Cache.

### Example 1
```powershell
New-AzRedisCacheAccessPolicyAssignment -Name "testCache" -AccessPolicyAssignmentName "testAccessPolicyAssignmentName" -AccessPolicyName "testAccessPolicyName" -ObjectId "69d700c5-ca77-4335-947e-xxxxxxxxxxxx" -ObjectIdAlias "testAlias"
New-AzRedisCacheAccessPolicyAssignment -Name "testCache" -AccessPolicyAssignmentName "testAccessPolicyAssignmentName" -AccessPolicyName "testAccessPolicyName" -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" -ObjectIdAlias "testAlias"
```

This command creates access policy assignment (redis user) named testAccessPolicyAssignmentName on Redis Cache named testCache.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ Creates/Updates a particular access policy assignment for a database

### Example 1: Add new access policy assignment.
```powershell
New-AzRedisEnterpriseCacheAccessPolicyAssignment -AccessPolicyAssignmentName "testAccessPolicyAssignmentName" -ClusterName "MyCache" -DatabaseName "default" -ResourceGroupName "MyGroup" -UserObjectId "5fb3eb10-a8a2-4db7-8bb4-e377180e7427" -AccessPolicyName "default"
New-AzRedisEnterpriseCacheAccessPolicyAssignment -AccessPolicyAssignmentName "testAccessPolicyAssignmentName" -ClusterName "MyCache" -DatabaseName "default" -ResourceGroupName "MyGroup" -UserObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" -AccessPolicyName "default"
```

```output
Expand Down
7 changes: 3 additions & 4 deletions azps-15.4.0/Az.Reservations/Get-AzReservationCatalog.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ Get the regions and skus that are available for RI purchase for the specified Az

### Example 1: Get the list of reserved resource type skus with location
```powershell
Get-AzReservationCatalog -SubscriptionId "10000000-aaaa-bbbb-cccc-100000000001" -Location "westus" -ReservedResourceType "VirtualMachine"
Get-AzReservationCatalog -SubscriptionId "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e" -Location "westus" -ReservedResourceType "VirtualMachine"
```

```output
Expand All @@ -59,7 +59,7 @@ This command gets a catlog of reserved resource type skus with location

### Example 2: Get the list of reserved resource type skus without location
```powershell
Get-AzReservationCatalog -SubscriptionId "10000000-aaaa-bbbb-cccc-100000000001" -ReservedResourceType "SuseLinux"
Get-AzReservationCatalog -SubscriptionId "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e" -ReservedResourceType "SuseLinux"
```

```output
Expand Down Expand Up @@ -87,7 +87,7 @@ This command gets a catlog of reserved resource type skus without location

### Example 3: Get the list of eligible 3pp reserved resource type skus with publisher id, offer id, plan id
```powershell
Get-AzReservationCatalog -SubscriptionId "10000000-aaaa-bbbb-cccc-100000000001" -ReservedResourceType "VirtualMachineSoftware" -PublisherId canonical -OfferId 0001-com-ubuntu-pro-xenial -PlanId pro-16_04-lts
Get-AzReservationCatalog -SubscriptionId "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e" -ReservedResourceType "VirtualMachineSoftware" -PublisherId canonical -OfferId 0001-com-ubuntu-pro-xenial -PlanId pro-16_04-lts
```

```output
Expand Down Expand Up @@ -292,4 +292,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
## NOTES

## RELATED LINKS

5 changes: 2 additions & 3 deletions azps-15.4.0/Az.Reservations/Get-AzReservationOrderId.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,11 +34,11 @@ Get applicable `Reservation`s that are applied to this subscription or a resourc

### Example 1: Get list of applicable ReservationOrder Ids.
```powershell
Get-AzReservationOrderId -SubscriptionId '10000000-aaaa-bbbb-cccc-100000000005'
Get-AzReservationOrderId -SubscriptionId 'aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e'
```

```output
Id : /subscriptions/10000000-aaaa-bbbb-cccc-100000000005/providers/microsoft.capacity/AppliedReservations/default
Id : /subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/providers/microsoft.capacity/AppliedReservations/default
Name : default
ReservationOrderIdNextLink :
ReservationOrderIdValue : {/providers/Microsoft.Capacity/reservationorders/7c6192be-7543-40c3-93e1-3d7f0b15203f,
Expand Down Expand Up @@ -113,4 +113,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
## NOTES

## RELATED LINKS

24 changes: 12 additions & 12 deletions azps-15.4.0/Az.ResourceGraph/Search-AzGraph.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,19 +46,19 @@ Search-AzGraph "project id, name, type, location, tags" -First 3
```

```output
id : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt
id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt
name : nt
type : microsoft.compute/virtualmachinescalesets
location : eastus
tags : @{resourceType=Service Fabric; clusterName=gov-art-int-nt-a}
ResourceId : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt
ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt

id : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
name : egtopic-1
type : microsoft.eventgrid/topics
location : westus2
tags :
ResourceId : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
```

Simple resources query requesting a subset of resource fields.
Expand All @@ -85,17 +85,17 @@ Search-AzGraph -Query "project id, name, type, location" -SkipToken $response.Sk
```

```output
id : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/test/providers/Microsoft.Network/networkInterfaces/17ni
id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/test/providers/Microsoft.Network/networkInterfaces/17ni
name : 17ni
type : microsoft.network/networkinterfaces
location : westeurope
ResourceId : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/test/providers/Microsoft.Network/networkInterfaces/17ni
ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/test/providers/Microsoft.Network/networkInterfaces/17ni

id : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/test/providers/Microsoft.Network/networkSecurityGroups/17nsg
id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/test/providers/Microsoft.Network/networkSecurityGroups/17nsg
name : 17nsg
type : microsoft.network/networksecuritygroups
location : westeurope
ResourceId : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/test/providers/Microsoft.Network/networkSecurityGroups/17nsg
ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/test/providers/Microsoft.Network/networkSecurityGroups/17nsg
```

A query with the skip token passed from the previous query results. Please note that keeping id in the results is mandatory to get back a skip token.
Expand All @@ -106,19 +106,19 @@ Search-AzGraph -Query "project id, name, type, location, tags" -First 2 -Managem
```

```output
id : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt
id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt
name : nt
type : microsoft.compute/virtualmachinescalesets
location : eastus
tags : @{resourceType=Service Fabric; clusterName=gov-art-int-nt-a}
ResourceId : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt
ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.Compute/virtualMachineScaleSets/nt

id : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
name : egtopic-1
type : microsoft.eventgrid/topics
location : westus2
tags :
ResourceId : /subscriptions/1ef51df4-f8a9-4b69-9919-1ef51df4eff6/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/Service-INT-a/providers/Microsoft.EventGrid/topics/egtopic-1
```

A query scoped to the management group that allows the query to succeed with partial scope result if MyManagementGroupId has more than N subscriptions underneath.
Expand Down
8 changes: 4 additions & 4 deletions azps-15.4.0/Az.Resources/Add-AzADAppPermission.md
Original file line number Diff line number Diff line change
Expand Up @@ -43,17 +43,17 @@ User needs to grant consent via Azure Portal if the permission requires admin co

### Example 1: Add API Permission
```powershell
Add-AzADAppPermission -ObjectId 9cc74d5e-1162-4b90-8696-65f3d6a3f7d0 -ApiId 00000003-0000-0000-c000-000000000000 -PermissionId 5f8c59db-677d-491f-a6b8-5f174b11ec1d
Add-AzADAppPermission -ObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb -ApiId 00000003-0000-0000-c000-000000000000 -PermissionId 5f8c59db-677d-491f-a6b8-5f174b11ec1d
```

Add delegated permission "Group.Read.All" of Microsoft Graph API to AD Application (9cc74d5e-1162-4b90-8696-65f3d6a3f7d0)
Add delegated permission "Group.Read.All" of Microsoft Graph API to AD Application (aaaabbbb-0000-cccc-1111-dddd2222eeee)

### Example 2: Add API Permission
```powershell
Add-AzADAppPermission -ObjectId 9cc74d5e-1162-4b90-8696-65f3d6a3f7d0 -ApiId 00000003-0000-0000-c000-000000000000 -PermissionId 1138cb37-bd11-4084-a2b7-9f71582aeddb -Type Role
Add-AzADAppPermission -ObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb -ApiId 00000003-0000-0000-c000-000000000000 -PermissionId 1138cb37-bd11-4084-a2b7-9f71582aeddb -Type Role
```

Add application permission "Device.ReadWrite.All" of Microsoft Graph API to AD Application (9cc74d5e-1162-4b90-8696-65f3d6a3f7d0)
Add application permission "Device.ReadWrite.All" of Microsoft Graph API to AD Application (aaaabbbb-0000-cccc-1111-dddd2222eeee)

## PARAMETERS

Expand Down
4 changes: 2 additions & 2 deletions azps-15.4.0/Az.Resources/Get-AzADAppPermission.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ Lists API permissions the application has requested.

### Example 1: Get API permission
```powershell
Get-AzADAppPermission -ObjectId 18797549-86a9-4906-b2a9-54f08cd3c427
Get-AzADAppPermission -ObjectId aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb
```

```output
Expand All @@ -43,7 +43,7 @@ ApiId Id Type
00000003-0000-0000-c000-000000000000 5b567255-7703-4780-807c-7be8301ae99b Scope
```

Fetches all API permissions of Azure AD object 18797549-86a9-4906-b2a9-54f08cd3c427
Fetches all API permissions of Azure AD object aaaabbbb-0000-cccc-1111-dddd2222eeee

## PARAMETERS

Expand Down