diff --git a/azps-15.4.0/Az.Sql/Set-AzSqlDatabaseAudit.md b/azps-15.4.0/Az.Sql/Set-AzSqlDatabaseAudit.md index 1a2a1c0dad..4f77271714 100644 --- a/azps-15.4.0/Az.Sql/Set-AzSqlDatabaseAudit.md +++ b/azps-15.4.0/Az.Sql/Set-AzSqlDatabaseAudit.md @@ -75,7 +75,7 @@ Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server0 ### Example 7: Enable the log analytics auditing policy of an Azure SQL Database ```powershell -Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" +Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" ``` ### Example 8: Disable the log analytics auditing policy of an Azure SQL Database @@ -90,12 +90,12 @@ Get-AzSqlDatabase -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -D ### Example 10: Disable sending audit records of an Azure SQL Database to blob storage, and enable sending them to log analytics. ```powershell -Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" -BlobStorageTargetState Disabled +Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" -BlobStorageTargetState Disabled ``` ### Example 11: Enable sending audit records of an Azure SQL Database to blob storage, event hub and log analytics. ```powershell -Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage" -EventHubTargetState Enabled -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" +Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage" -EventHubTargetState Enabled -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" ``` ## PARAMETERS @@ -398,7 +398,7 @@ Accept wildcard characters: False ``` ### -WorkspaceResourceId -The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Audit Logs. Example: /subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2 +The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Audit Logs. Example: /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2 ```yaml Type: System.String diff --git a/azps-15.4.0/Az.Sql/Set-AzSqlDatabaseLongTermRetentionBackupLegalHold.md b/azps-15.4.0/Az.Sql/Set-AzSqlDatabaseLongTermRetentionBackupLegalHold.md index 3fe65a866f..c5e0be8eaa 100644 --- a/azps-15.4.0/Az.Sql/Set-AzSqlDatabaseLongTermRetentionBackupLegalHold.md +++ b/azps-15.4.0/Az.Sql/Set-AzSqlDatabaseLongTermRetentionBackupLegalHold.md @@ -43,17 +43,17 @@ The **Set-AzSqlDatabaseLongTermRetentionBackupLegalHold** sets a legal hold on t ### Example 1: Set legal hold on a single backup ```powershell -Set-AzSqlDatabaseLongTermRetentionBackupLegalHold -Location northeurope -ServerName server01 -DatabaseName testdb -BackupName "601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000" -PassThru +Set-AzSqlDatabaseLongTermRetentionBackupLegalHold -Location northeurope -ServerName server01 -DatabaseName testdb -BackupName "b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000" -PassThru ``` ```output BackupExpirationTime : 8/5/2025 8:08:27 PM -BackupName : 601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +BackupName : b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 BackupTime : 7/29/2025 8:08:27 PM DatabaseName : testdb DatabaseDeletionTime : Location : northeurope -ResourceId : /subscriptions/b75889fa-6661-44e0-a844-cd96ec938991/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/testdb/longTermRetentionBackups/601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/testdb/longTermRetentionBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 ServerName : server01 ServerCreateTime : 7/29/2025 7:28:46 PM ResourceGroupName : resourcegroup01 @@ -63,7 +63,7 @@ TimeBasedImmutabilityMode : Unlocked LegalHoldImmutability : Enabled ``` -This sets legal hold on the backup 601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +This sets legal hold on the backup b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 ## PARAMETERS diff --git a/azps-15.4.0/Az.Sql/Set-AzSqlInstanceActiveDirectoryAdministrator.md b/azps-15.4.0/Az.Sql/Set-AzSqlInstanceActiveDirectoryAdministrator.md index b1b34f91f4..4bc4a01681 100644 --- a/azps-15.4.0/Az.Sql/Set-AzSqlInstanceActiveDirectoryAdministrator.md +++ b/azps-15.4.0/Az.Sql/Set-AzSqlInstanceActiveDirectoryAdministrator.md @@ -50,13 +50,13 @@ We recommend that you provision a dedicated Microsoft Entra group as an administ ### Example 1: Provision an administrator group for a managed instance associated with resource group ```powershell -Set-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName "ResourceGroup01" -InstanceName "ManagedInstance01" -DisplayName "DBAs" -ObjectId "40b79501-b343-44ed-9ce7-da4c8cc7353b" +Set-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName "ResourceGroup01" -InstanceName "ManagedInstance01" -DisplayName "DBAs" -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" ``` ```output ResourceGroupName InstanceName DisplayName ObjectId ----------------- ----------------- ----------- -------- -ResourceGroup01 ManagedInstance01 DBAs 40b79501-b343-44ed-9ce7-da4c8cc7353b +ResourceGroup01 ManagedInstance01 DBAs aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb ``` This command provisions a Microsoft Entra administrator group named DBAs for the managed instance named ManagedInstance01. @@ -64,26 +64,26 @@ This server is associated with resource group ResourceGroup01. ### Example 2: Provision an administrator user using managed instance object ```powershell -Get-AzSqlInstance -ResourceGroupName "ResourceGroup01" -InstanceName "ManagedInstance01" | Set-AzSqlInstanceActiveDirectoryAdministrator -DisplayName "David Chew" -ObjectId "11E95548-B179-4FE1-9AF4-ACA49D13ABB9" +Get-AzSqlInstance -ResourceGroupName "ResourceGroup01" -InstanceName "ManagedInstance01" | Set-AzSqlInstanceActiveDirectoryAdministrator -DisplayName "David Chew" -ObjectId "bbbbbbbb-1111-2222-3333-cccccccccccc" ``` ```output ResourceGroupName InstanceName DisplayName ObjectId ----------------- ----------------- ----------- -------- -Resourcegroup01 ManagedInstance01 David Chew 11E95548-B179-4FE1-9AF4-ACA49D13ABB9 +Resourcegroup01 ManagedInstance01 David Chew bbbbbbbb-1111-2222-3333-cccccccccccc ``` This command provisions a Microsoft Entra user as an administrator from the managed instance object. ### Example 3: Provision an administrator using managed instance resource identifier ```powershell -Get-AzSqlInstance -ResourceId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/ResourceGroup01/providers/Microsoft.Sql/managedInstances/ManagedInstance01" | Set-AzSqlInstanceActiveDirectoryAdministrator -DisplayName "David Chew" -ObjectId "11E95548-B179-4FE1-9AF4-ACA49D13ABB9" +Get-AzSqlInstance -ResourceId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/ResourceGroup01/providers/Microsoft.Sql/managedInstances/ManagedInstance01" | Set-AzSqlInstanceActiveDirectoryAdministrator -DisplayName "David Chew" -ObjectId "bbbbbbbb-1111-2222-3333-cccccccccccc" ``` ```output ResourceGroupName InstanceName DisplayName ObjectId ----------------- ----------------- ----------- -------- -Resourcegroup01 ManagedInstance01 David Chew 11E95548-B179-4FE1-9AF4-ACA49D13ABB9 +Resourcegroup01 ManagedInstance01 David Chew bbbbbbbb-1111-2222-3333-cccccccccccc ``` This command provisions a Microsoft Entra user as an administrator using managed instance resource identifier. diff --git a/azps-15.4.0/Az.Sql/Set-AzSqlServerActiveDirectoryAdministrator.md b/azps-15.4.0/Az.Sql/Set-AzSqlServerActiveDirectoryAdministrator.md index 41e90fe395..4bb42b220d 100644 --- a/azps-15.4.0/Az.Sql/Set-AzSqlServerActiveDirectoryAdministrator.md +++ b/azps-15.4.0/Az.Sql/Set-AzSqlServerActiveDirectoryAdministrator.md @@ -43,7 +43,7 @@ Set-AzSqlServerActiveDirectoryAdministrator -ResourceGroupName "ResourceGroup01" ```output ResourceGroupName ServerName DisplayName ObjectId IsAzureADOnlyAuthentication ----------------- ---------- ----------- -------- --------------------------- -ResourceGroup01 Server01 DBAs 40b79501-b343-44ed-9ce7-da4c8cc7353b False +ResourceGroup01 Server01 DBAs aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb False ``` This command provisions a Microsoft Entra administrator group named DBAs for the server named Server01. @@ -64,13 +64,13 @@ This command provisions a Microsoft Entra user as an administrator for the serve ### Example 3: Provision an administrator group by specifying its ID ```powershell -Set-AzSqlServerActiveDirectoryAdministrator -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DisplayName "DBAs" -ObjectId "40b79501-b343-44ed-9ce7-da4c8cc7353b" +Set-AzSqlServerActiveDirectoryAdministrator -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DisplayName "DBAs" -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" ``` ```output ResourceGroupName ServerName DisplayName ObjectId IsAzureADOnlyAuthentication ----------------- ---------- ----------- -------- -ResourceGroup01 Server01 DBAs 40b79501-b343-44ed-9ce7-da4c8cc7353b False +ResourceGroup01 Server01 DBAs aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb False ``` This command provisions a Microsoft Entra administrator group named DBAs for the server named Server01. diff --git a/azps-15.4.0/Az.Sql/Set-AzSqlServerAudit.md b/azps-15.4.0/Az.Sql/Set-AzSqlServerAudit.md index bab4d57123..e7c56285d0 100644 --- a/azps-15.4.0/Az.Sql/Set-AzSqlServerAudit.md +++ b/azps-15.4.0/Az.Sql/Set-AzSqlServerAudit.md @@ -75,7 +75,7 @@ Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" ### Example 7: Enable the log analytics auditing policy of an Azure SQL server ```powershell -Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" +Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" ``` ### Example 8: Disable the log analytics auditing policy of an Azure SQL server @@ -90,12 +90,12 @@ Get-AzSqlServer -ResourceGroupName "ResourceGroup01" -ServerName "Server01" | Se ### Example 10: Disable sending audit records of an Azure SQL server to blob storage, and enable sending them to log analytics. ```powershell -Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" -BlobStorageTargetState Disabled +Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" -BlobStorageTargetState Disabled ``` ### Example 11: Enable sending audit records of an Azure SQL server to blob storage, event hub and log analytics. ```powershell -Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage" -EventHubTargetState Enabled -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" +Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage" -EventHubTargetState Enabled -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" ``` ## PARAMETERS @@ -367,7 +367,7 @@ Accept wildcard characters: False ``` ### -WorkspaceResourceId -The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Audit Logs. Example: /subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2 +The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Audit Logs. Example: /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2 ```yaml Type: System.String diff --git a/azps-15.4.0/Az.Sql/Set-AzSqlServerMSSupportAudit.md b/azps-15.4.0/Az.Sql/Set-AzSqlServerMSSupportAudit.md index 66628d6457..1bd126e9d4 100644 --- a/azps-15.4.0/Az.Sql/Set-AzSqlServerMSSupportAudit.md +++ b/azps-15.4.0/Az.Sql/Set-AzSqlServerMSSupportAudit.md @@ -62,7 +62,7 @@ Set-AzSqlServerMSSupportAudit -ResourceGroupName "ResourceGroup01" -ServerName " ### Example 5: Enable the log analytics Microsoft support operations auditing policy of an Azure SQL server ```powershell -Set-AzSqlServerMSSupportAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" +Set-AzSqlServerMSSupportAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" ``` ### Example 6: Disable the log analytics Microsoft support operations auditing policy of an Azure SQL server @@ -77,12 +77,12 @@ Get-AzSqlServer -ResourceGroupName "ResourceGroup01" -ServerName "Server01" | Se ### Example 8: Disable sending Microsoft support operations audit records of an Azure SQL server to blob storage, and enable sending them to log analytics. ```powershell -Set-AzSqlServerMSSupportAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" -BlobStorageTargetState Disabled +Set-AzSqlServerMSSupportAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" -BlobStorageTargetState Disabled ``` ### Example 9: Enable sending Microsoft support operations audit records of an Azure SQL server to blob storage, event hub and log analytics. ```powershell -Set-AzSqlServerMSSupportAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage" -EventHubTargetState Enabled -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" +Set-AzSqlServerMSSupportAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage" -EventHubTargetState Enabled -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" ``` ## PARAMETERS @@ -286,7 +286,7 @@ Accept wildcard characters: False ``` ### -WorkspaceResourceId -The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Microsoft support operations Audit Logs. Example: /subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2 +The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Microsoft support operations Audit Logs. Example: /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2 ```yaml Type: System.String diff --git a/azps-15.4.0/Az.Sql/Update-AzSqlDatabaseLongTermRetentionBackup.md b/azps-15.4.0/Az.Sql/Update-AzSqlDatabaseLongTermRetentionBackup.md index e08d3611b0..b8456c0f90 100644 --- a/azps-15.4.0/Az.Sql/Update-AzSqlDatabaseLongTermRetentionBackup.md +++ b/azps-15.4.0/Az.Sql/Update-AzSqlDatabaseLongTermRetentionBackup.md @@ -43,17 +43,17 @@ Updates the properties of a long term retention backup. ### Example 1: Update Backup Storage Redundancy of a long term retention backup. ```powershell -Update-AzSqlDatabaseLongTermRetentionBackup -Location southeastasia -ServerName ayang-stage-seas -DatabaseName ltr3 -BackupName 'e5c20f43-494c-4925-89d1-58e0f4569fb3;132579992320000000' -ResourceGroupName testrg -BackupStorageRedundancy Geo +Update-AzSqlDatabaseLongTermRetentionBackup -Location southeastasia -ServerName ayang-stage-seas -DatabaseName ltr3 -BackupName 'b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;132579992320000000' -ResourceGroupName testrg -BackupStorageRedundancy Geo ``` ```output BackupExpirationTime : 3/19/2021 1:33:52 AM -BackupName : e5c20f43-494c-4925-89d1-58e0f4569fb3;132579992320000000 +BackupName : b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;132579992320000000 BackupTime : 2/17/2021 1:33:52 AM DatabaseName : ltr3 DatabaseDeletionTime : 3/16/2021 6:28:11 AM Location : southeastasia -ResourceId : /subscriptions/01c4ec88-e179-44f7-9eb0-e9719a5087ab/resourceGroups/testrg/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionServers/ayang-stage-seas/longTermRetentionDatabases/ltr3/longTermRetentionBackups/e5c20f43-494c-4925-89d1-58e0f4569fb3;132579992320000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/testrg/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionServers/ayang-stage-seas/longTermRetentionDatabases/ltr3/longTermRetentionBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;132579992320000000 ServerName : ayang-stage-seas ServerCreateTime : 4/22/2020 9:58:33 PM ResourceGroupName : testrg @@ -64,17 +64,17 @@ This command sets the Backup Storage Redundancy of the specified backup using lo ### Example 2: Update Backup Storage Redundancy of a long term retention backup (using Resource Id). ```powershell -Update-AzSqlDatabaseLongTermRetentionBackup -ResourceId '/subscriptions/01c4ec88-e179-44f7-9eb0-e9719a5087ab/resourceGroups/testrg/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionServers/ayang-stage-seas/longTermRetentionDatabases/ltr3/longTermRetentionBackups/e5c20f43-494c-4925-89d1-58e0f4569fb3;132579992320000000' -BackupStorageRedundancy Geo +Update-AzSqlDatabaseLongTermRetentionBackup -ResourceId '/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/testrg/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionServers/ayang-stage-seas/longTermRetentionDatabases/ltr3/longTermRetentionBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;132579992320000000' -BackupStorageRedundancy Geo ``` ```output BackupExpirationTime : 3/19/2021 1:33:52 AM -BackupName : e5c20f43-494c-4925-89d1-58e0f4569fb3;132579992320000000 +BackupName : b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;132579992320000000 BackupTime : 2/17/2021 1:33:52 AM DatabaseName : ltr3 DatabaseDeletionTime : 3/16/2021 6:28:11 AM Location : southeastasia -ResourceId : /subscriptions/01c4ec88-e179-44f7-9eb0-e9719a5087ab/resourceGroups/testrg/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionServers/ayang-stage-seas/longTermRetentionDatabases/ltr3/longTermRetentionBackups/e5c20f43-494c-4925-89d1-58e0f4569fb3;132579992320000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/testrg/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionServers/ayang-stage-seas/longTermRetentionDatabases/ltr3/longTermRetentionBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;132579992320000000 ServerName : ayang-stage-seas ServerCreateTime : 4/22/2020 9:58:33 PM ResourceGroupName : testrg @@ -293,4 +293,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Set-AzSqlDatabaseBackupLongTermRetentionPolicy](./Set-AzSqlDatabaseBackupLongTermRetentionPolicy.md) -[SQL Database Documentation](https://learn.microsoft.com/azure/sql-database/) \ No newline at end of file +[SQL Database Documentation](https://learn.microsoft.com/azure/sql-database/) diff --git a/azps-15.4.0/Az.StackHCI/Register-AzStackHCI.md b/azps-15.4.0/Az.StackHCI/Register-AzStackHCI.md index 4e0fabe83b..d919821222 100644 --- a/azps-15.4.0/Az.StackHCI/Register-AzStackHCI.md +++ b/azps-15.4.0/Az.StackHCI/Register-AzStackHCI.md @@ -31,56 +31,56 @@ Register-AzStackHCI creates a Microsoft.AzureStackHCI cloud resource representin ### Example 1: ```powershell -Register-AzStackHCI -SubscriptionId "12a0f531-56cb-4340-9501-257726d741fd" -Region "eastus" +Register-AzStackHCI -SubscriptionId "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e" -Region "eastus" ``` ```output Result: Success -ResourceId: /subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCICluster1-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster1 -PortalResourceURL: https://portal.azure.com/#@c31c0dbb-ce27-4c78-ad26-a5f717c14557/resource/subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCICluster1-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster1/overview -PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/980be58d-578c-4cff-b4cd-43e9c3a77826/isMSAApp/ +ResourceId: /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/DemoHCICluster1-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster1 +PortalResourceURL: https://portal.azure.com/#@aaaabbbb-0000-cccc-1111-dddd2222eeee/resource/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/DemoHCICluster1-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster1/overview +PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/00001111-aaaa-2222-bbbb-3333cccc4444/isMSAApp/ ``` Invoking on one of the cluster node. ### Example 2: ```powershell -Register-AzStackHCI -SubscriptionId "12a0f531-56cb-4340-9501-257726d741fd" -ComputerName ClusterNode1 -Region "eastus" +Register-AzStackHCI -SubscriptionId "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e" -ComputerName ClusterNode1 -Region "eastus" ``` ```output Result: Success -ResourceId: /subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCICluster2-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster2 -PortalResourceURL: https://portal.azure.com/#@c31c0dbb-ce27-4c78-ad26-a5f717c14557/resource/subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCICluster2-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster2/overview -PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/950be58d-578c-4cff-b4cd-43e9c3a77866/isMSAApp/ +ResourceId: /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/DemoHCICluster2-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster2 +PortalResourceURL: https://portal.azure.com/#@aaaabbbb-0000-cccc-1111-dddd2222eeee/resource/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/DemoHCICluster2-rg/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster2/overview +PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/11112222-bbbb-3333-cccc-4444dddd5555/isMSAApp/ ``` Invoking from the management node. ### Example 3: ```powershell -Register-AzStackHCI -SubscriptionId "12a0f531-56cb-4340-9501-257726d741fd" -ArmAccessToken etyer..ere= -AccountId user1@corp1.com -Region westus -ResourceName DemoHCICluster3 -ResourceGroupName DemoHCIRG +Register-AzStackHCI -SubscriptionId "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e" -ArmAccessToken etyer..ere= -AccountId user1@corp1.com -Region westus -ResourceName DemoHCICluster3 -ResourceGroupName DemoHCIRG ``` ```output Result: PendingForAdminConsent -ResourceId: /subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCIRG/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster3 -PortalResourceURL: https://portal.azure.com/#@c31c0dbb-ce27-4c78-ad26-a5f717c14557/resource/subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/DemoHCIRG/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster3/overview -PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/980be58d-578c-4cff-b4cd-43e9c3a77866/isMSAApp/ +ResourceId: /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/DemoHCIRG/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster3 +PortalResourceURL: https://portal.azure.com/#@aaaabbbb-0000-cccc-1111-dddd2222eeee/resource/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/DemoHCIRG/providers/Microsoft.AzureStackHCI/clusters/DemoHCICluster3/overview +PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/22223333-cccc-4444-dddd-5555eeee6666/isMSAApp/ ``` Invoking from WAC. ### Example 4: ```powershell -Register-AzStackHCI -SubscriptionId "12a0f531-56cb-4340-9501-257726d741fd" -Region westus -ResourceName HciCluster1 -TenantId "c31c0dbb-ce27-4c78-ad26-a5f717c14557" -ResourceGroupName HciRG -ArcServerResourceGroupName HciRG -ArmAccessToken eerrer..ere= -AccountId user1@corp1.com -EnvironmentName AzureCloud -ComputerName node1hci -Credential Get-Credential +Register-AzStackHCI -SubscriptionId "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e" -Region westus -ResourceName HciCluster1 -TenantId "aaaabbbb-0000-cccc-1111-dddd2222eeee" -ResourceGroupName HciRG -ArcServerResourceGroupName HciRG -ArmAccessToken eerrer..ere= -AccountId user1@corp1.com -EnvironmentName AzureCloud -ComputerName node1hci -Credential Get-Credential ``` ```output Result: Success -ResourceId: /subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/HciRG/providers/Microsoft.AzureStackHCI/clusters/HciCluster1 -PortalResourceURL: https://portal.azure.com/#@c31c0dbb-ce27-4c78-ad26-a5f717c14557/resource/subscriptions/12a0f531-56cb-4340-9501-257726d741fd/resourceGroups/HciRG/providers/Microsoft.AzureStackHCI/clusters/HciCluster1/overview -PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/990be58d-578c-4cff-b4cd-43e9c3a77866/isMSAApp/ +ResourceId: /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/HciRG/providers/Microsoft.AzureStackHCI/clusters/HciCluster1 +PortalResourceURL: https://portal.azure.com/#@aaaabbbb-0000-cccc-1111-dddd2222eeee/resource/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/HciRG/providers/Microsoft.AzureStackHCI/clusters/HciCluster1/overview +PortalAADAppPermissionsURL: https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/CallAnAPI/appId/33334444-dddd-5555-eeee-6666ffff7777/isMSAApp/ ``` Invoking with all the parameters. diff --git a/azps-15.4.0/Az.StackHCI/Unregister-AzStackHCI.md b/azps-15.4.0/Az.StackHCI/Unregister-AzStackHCI.md index cd68ba05d7..0e3aaed783 100644 --- a/azps-15.4.0/Az.StackHCI/Unregister-AzStackHCI.md +++ b/azps-15.4.0/Az.StackHCI/Unregister-AzStackHCI.md @@ -53,7 +53,7 @@ Invoking from the management node ### Example 3: ```powershell -Unregister-AzStackHCI -SubscriptionId "12a0f531-56cb-4340-9501-257726d741fd" -ArmAccessToken etyer..ere= -AccountId user1@corp1.com -ResourceName DemoHCICluster3 -ResourceGroupName DemoHCIRG -Confirm:$False +Unregister-AzStackHCI -SubscriptionId "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e" -ArmAccessToken etyer..ere= -AccountId user1@corp1.com -ResourceName DemoHCICluster3 -ResourceGroupName DemoHCIRG -Confirm:$False ``` ```output @@ -64,7 +64,7 @@ Invoking from WAC ### Example 4: ```powershell -Unregister-AzStackHCI -SubscriptionId "12a0f531-56cb-4340-9501-257726d741fd" -ResourceName HciCluster1 -TenantId "c31c0dbb-ce27-4c78-ad26-a5f717c14557" -ResourceGroupName HciClusterRG -ArmAccessToken eerrer..ere= -AccountId user1@corp1.com -EnvironmentName AzureCloud -ComputerName node1hci -Credential Get-Credential +Unregister-AzStackHCI -SubscriptionId "aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e" -ResourceName HciCluster1 -TenantId "aaaabbbb-0000-cccc-1111-dddd2222eeee" -ResourceGroupName HciClusterRG -ArmAccessToken eerrer..ere= -AccountId user1@corp1.com -EnvironmentName AzureCloud -ComputerName node1hci -Credential Get-Credential ``` ```output