|
16 | 16 | helps['network front-door create'] = """ |
17 | 17 | type: command |
18 | 18 | short-summary: Create a Front Door. |
| 19 | + examples: |
| 20 | + - name: Create a Front Door. |
| 21 | + text: az network front-door create -g rg -n frontdoor --backend-address 202.120.2.3 |
19 | 22 | """ |
20 | 23 |
|
21 | 24 | helps['network front-door list'] = """ |
|
69 | 72 | Since a backend pool must contain a backend, this command |
70 | 73 | also creates the first backend. To add additional backends, |
71 | 74 | use the `az network front-door backend-pool backend add` command. |
| 75 | + examples: |
| 76 | + - name: Create a Front Door backend pool. |
| 77 | + text: az network front-door backend-pool create -f frontdoor -g rg -n bkp1 --address 202.120.2.3 --load-balancing DefaultLoadBalancingSettings --probe DefaultProbeSettings |
72 | 78 | """ |
73 | 79 |
|
74 | 80 | helps['network front-door backend-pool list'] = """ |
|
96 | 102 | helps['network front-door backend-pool backend add'] = """ |
97 | 103 | type: command |
98 | 104 | short-summary: Add a backend to a Front Door backend pool. |
| 105 | + examples: |
| 106 | + - name: Add a backend to a Front Door backend pool. |
| 107 | + text: az network front-door backend-pool backend add -g rg --front-door-name myfrontdoor --pool-name pool --address 202.120.2.3 --backend-host-header "" --disabled true --http-port 80 --https-port 443 --priority 2 --weight 1 |
99 | 108 | """ |
100 | 109 |
|
101 | 110 | helps['network front-door backend-pool backend update'] = """ |
|
123 | 132 | helps['network front-door frontend-endpoint create'] = """ |
124 | 133 | type: command |
125 | 134 | short-summary: Create a Front Door frontend endpoint. |
| 135 | + examples: |
| 136 | + - name: Create a Front Door frontend endpoint. |
| 137 | + text: az network front-door frontend-endpoint create -g rg -f frontdoor -n endpoint --host-name www.contoso.com --session-affinity-enabled |
126 | 138 | """ |
127 | 139 |
|
128 | 140 | helps['network front-door frontend-endpoint list'] = """ |
|
171 | 183 | helps['network front-door load-balancing create'] = """ |
172 | 184 | type: command |
173 | 185 | short-summary: Create Front Door load-balancing settings. |
| 186 | + examples: |
| 187 | + - name: Create Front Door load-balancing settings. |
| 188 | + text: az network front-door load-balancing create -f frontdoor -g rg -n lb --sample-size 5 --successful-samples-required 1 --additional-latency 100 |
174 | 189 | """ |
175 | 190 |
|
176 | 191 | helps['network front-door load-balancing list'] = """ |
|
203 | 218 | helps['network front-door probe create'] = """ |
204 | 219 | type: command |
205 | 220 | short-summary: Create Front Door health probe settings. |
| 221 | + examples: |
| 222 | + - name: Create Front Door health probe settings. |
| 223 | + text: az network front-door probe create -f frontdoor -g rg -n pb --interval 100 --path /abc --enabled Disabled --probeMethod GET --protocol Http |
206 | 224 | """ |
207 | 225 |
|
208 | 226 | helps['network front-door probe list'] = """ |
|
289 | 307 | This command allows creating Rules Engine configuration with Header |
290 | 308 | action type. To add additional actions like Route overrides, |
291 | 309 | use the `az network front-door rules-engine rule action add` command. |
| 310 | + examples: |
| 311 | + - name: Create a Rules Engine rule for a Front Door. |
| 312 | + text: az network front-door rules-engine rule create -f frontdoor -g rg --rules-engine-name rulesengine --name rule --priority 2 --action-type ResponseHeader --header-action Append --header-name Security --header-value Strict --match-variable RequestPath --operator Contains --match-values private |
292 | 313 | """ |
293 | 314 |
|
294 | 315 | helps['network front-door rules-engine rule update'] = """ |
|
319 | 340 | helps['network front-door rules-engine rule action add'] = """ |
320 | 341 | type: command |
321 | 342 | short-summary: Add an action to a Rules Engine rule. |
| 343 | + examples: |
| 344 | + - name: Add an action to a Rules Engine rule. |
| 345 | + text: az network front-door rules-engine rule action add -f frontdoor -g rg -r rulesengine --name rule1 --action-type RedirectRouteOverride --custom-path /redirect |
322 | 346 | """ |
323 | 347 |
|
324 | 348 | helps['network front-door rules-engine rule action list'] = """ |
|
339 | 363 | helps['network front-door rules-engine rule condition add'] = """ |
340 | 364 | type: command |
341 | 365 | short-summary: Add a match condition to a Rules Engine rule. |
| 366 | + examples: |
| 367 | + - name: Add a match condition to a Rules Engine rule. |
| 368 | + text: az network front-door rules-engine rule condition add -f frontdoor -g rg -r rulesengine --name rule1 --match-variable RequestPath --operator Any |
342 | 369 | """ |
343 | 370 |
|
344 | 371 | helps['network front-door rules-engine rule condition list'] = """ |
|
361 | 388 | helps['network front-door waf-policy create'] = """ |
362 | 389 | type: command |
363 | 390 | short-summary: Create a WAF policy. |
| 391 | + examples: |
| 392 | + - name: Create a WAF policy. |
| 393 | + text: az network front-door waf-policy create -g rg -n policy --mode prevention |
364 | 394 | """ |
365 | 395 |
|
366 | 396 | helps['network front-door waf-policy list'] = """ |
|
409 | 439 | Variable allowed values: {variables} |
410 | 440 |
|
411 | 441 | Operator allowed values: {operators} |
| 442 | + examples: |
| 443 | + - name: Add a match-condition to a WAF policy custom rule. |
| 444 | + text: az network front-door waf-policy rule match-condition add -g rg --policy-name policy -n custom1 --match-variable RequestBody --operator RegEx --values "hello" |
412 | 445 | """.format( |
413 | 446 | variables=', '.join([x.value for x in MatchVariable]), |
414 | 447 | operators=', '.join([x.value for x in Operator]) |
|
459 | 492 | short-summary: Add a managed rule set to a WAF policy. |
460 | 493 | long-summary: > |
461 | 494 | Use 'az network front-door waf-policy managed-rule-definition list' to see the available managed rulesets. |
| 495 | + examples: |
| 496 | + - name: Add a managed rule set to a WAF policy. |
| 497 | + text: az network front-door waf-policy managed-rules add -g rg --policy-name policy1 --type DefaultRuleSet --version 1.0 |
462 | 498 | """ |
463 | 499 |
|
464 | 500 | helps['network front-door waf-policy managed-rules remove'] = """ |
|
471 | 507 | short-summary: Add an override on a managed rule within a managed rule set. |
472 | 508 | long-summary: > |
473 | 509 | Use 'az network front-door waf-policy managed-rule-definition list' to see the available rules. |
| 510 | + example: |
| 511 | + - name: Add an override on a managed rule within a managed rule set. |
| 512 | + text: az network front-door waf-policy managed-rules override add -g rg --policy-name policy1 --type DefaultRuleSet --rule-group-id SQLI --rule-id id --action Block --disabled |
474 | 513 | """ |
475 | 514 |
|
476 | 515 | helps['network front-door waf-policy managed-rules override remove'] = """ |
|
499 | 538 | long-summary: > |
500 | 539 | Prevents the rule set, rule group, or rule from being applied to the content of the specified variable. |
501 | 540 | Use 'az network front-door waf-policy managed-rule-definition list' to see the available rules. |
| 541 | + examples: |
| 542 | + - name: Add an exclusion on a managed rule set, rule group, or rule within a managed rule set. |
| 543 | + text: az network front-door waf-policy managed-rules exclusion add -g rg --policy-name policy1 --type DefaultRuleSet --match-variable RequestHeaderNames --operator Contains --value ignoreme |
502 | 544 | """ |
503 | 545 |
|
504 | 546 | helps['network front-door waf-policy managed-rules exclusion remove'] = """ |
|
0 commit comments