Skip to content

Commit 06592fd

Browse files
authored
Merge pull request #105213 from dksimpson/DKS-US1669724-3
Fix tags in Azure CLI code blocks - batch 3
2 parents fff1a0c + 1531515 commit 06592fd

File tree

5 files changed

+13
-13
lines changed

5 files changed

+13
-13
lines changed

articles/active-directory/managed-identities-azure-resources/tutorial-linux-vm-access-cosmos-db.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -63,14 +63,14 @@ Next, add a data collection in the Cosmos DB account that you can query in later
6363

6464
## Retrieve the `principalID` of the Linux VM's system-assigned managed identity
6565

66-
To gain access to the Cosmos DB account access keys from the Resource Manager in the following section, you need to retrieve the `principalID` of the Linux VM's system-assigned managed identity. Be sure to replace the `<SUBSCRIPTION ID>`, `<RESOURCE GROUP>` (resource group in which you VM resides), and `<VM NAME>` parameter values with your own values.
66+
To gain access to the Cosmos DB account access keys from the Resource Manager in the following section, you need to retrieve the `principalID` of the Linux VM's system-assigned managed identity. Be sure to replace the `<SUBSCRIPTION ID>`, `<RESOURCE GROUP>` (resource group in which your VM resides), and `<VM NAME>` parameter values with your own values.
6767

6868
```azurecli-interactive
6969
az resource show --id /subscriptions/<SUBSCRIPTION ID>/resourceGroups/<RESOURCE GROUP>/providers/Microsoft.Compute/virtualMachines/<VM NAMe> --api-version 2017-12-01
7070
```
7171
The response includes the details of the system-assigned managed identity (note the principalID as it is used in the next section):
7272

73-
```bash
73+
```output
7474
{
7575
"id": "/subscriptions/<SUBSCRIPTION ID>/<RESOURCE GROUP>/providers/Microsoft.Compute/virtualMachines/<VM NAMe>",
7676
"identity": {
@@ -92,7 +92,7 @@ az role assignment create --assignee <MI PRINCIPALID> --role '<ROLE NAME>' --sco
9292

9393
The response includes the details for the role assignment created:
9494

95-
```
95+
```output
9696
{
9797
"id": "/subscriptions/<SUBSCRIPTION ID>/resourceGroups/<RESOURCE GROUP>/providers/Microsoft.DocumentDB/databaseAccounts/<COSMOS DB ACCOUNT>/providers/Microsoft.Authorization/roleAssignments/5b44e628-394e-4e7b-bbc3-d6cd4f28f15b",
9898
"name": "5b44e628-394e-4e7b-bbc3-d6cd4f28f15b",
@@ -155,13 +155,13 @@ The CURL response gives you the list of Keys. For example, if you get the read-
155155

156156
Now that you have the access key for the Cosmos DB account you can pass it to a Cosmos DB SDK and make calls to access the account. For a quick example, you can pass the access key to the Azure CLI. You can get the `<COSMOS DB CONNECTION URL>` from the **Overview** tab on the Cosmos DB account blade in the Azure portal. Replace the `<ACCESS KEY>` with the value you obtained above:
157157

158-
```bash
158+
```azurecli
159159
az cosmosdb collection show -c <COLLECTION ID> -d <DATABASE ID> --url-connection "<COSMOS DB CONNECTION URL>" --key <ACCESS KEY>
160160
```
161161

162162
This CLI command returns details about the collection:
163163

164-
```bash
164+
```output
165165
{
166166
"collection": {
167167
"_conflicts": "conflicts/",

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-cosmos-db.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,13 +123,13 @@ The response give you the list of Keys. For example, if you get read-only keys:
123123
```
124124
Now that you have the access key for the Cosmos DB account you can pass it to a Cosmos DB SDK and make calls to access the account. For a quick example, you can pass the access key to the Azure CLI. You can get the `<COSMOS DB CONNECTION URL>` from the **Overview** tab on the Cosmos DB account blade in the Azure portal. Replace the `<ACCESS KEY>` with the value you obtained above:
125125

126-
```bash
126+
```azurecli
127127
az cosmosdb collection show -c <COLLECTION ID> -d <DATABASE ID> --url-connection "<COSMOS DB CONNECTION URL>" --key <ACCESS KEY>
128128
```
129129

130130
This CLI command returns details about the collection:
131131

132-
```bash
132+
```output
133133
{
134134
"collection": {
135135
"_conflicts": "conflicts/",

articles/application-gateway/application-gateway-create-url-route-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ done
214214

215215
To get the public IP address of the application gateway, you can use [az network public-ip show](/cli/azure/network/public-ip). Copy the public IP address, and then paste it into the address bar of your browser. Such as, `http://40.121.222.19`, `http://40.121.222.19:8080/images/test.htm`, or `http://40.121.222.19:8080/video/test.htm`.
216216

217-
```azurepowershell-interactive
217+
```azurecli-interactive
218218
az network public-ip show \
219219
--resource-group myResourceGroupAG \
220220
--name myAGPublicIPAddress \

articles/application-gateway/redirect-http-to-https-cli.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,13 +33,13 @@ If you choose to install and use the CLI locally, this quickstart requires that
3333

3434
For production use, you should import a valid certificate signed by a trusted provider. For this tutorial, you create a self-signed certificate and pfx file using the openssl command.
3535

36-
```azurecli-interactive
36+
```console
3737
openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:2048 -keyout privateKey.key -out appgwcert.crt
3838
```
3939

4040
Enter values that make sense for your certificate. You can accept the default values.
4141

42-
```azurecli-interactive
42+
```console
4343
openssl pkcs12 -export -out appgwcert.pfx -inkey privateKey.key -in appgwcert.crt
4444
```
4545

@@ -203,7 +203,7 @@ az vmss extension set \
203203

204204
To get the public IP address of the application gateway, you can use [az network public-ip show](/cli/azure/network/public-ip). Copy the public IP address, and then paste it into the address bar of your browser.
205205

206-
```azurepowershell-interactive
206+
```azurecli-interactive
207207
az network public-ip show \
208208
--resource-group myResourceGroupAG \
209209
--name myAGPublicIPAddress \

articles/application-gateway/tutorial-ssl-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,13 +34,13 @@ If you choose to install and use the CLI locally, this article requires you to r
3434

3535
For production use, you should import a valid certificate signed by trusted provider. For this article, you create a self-signed certificate and pfx file using the openssl command.
3636

37-
```azurecli-interactive
37+
```console
3838
openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:2048 -keyout privateKey.key -out appgwcert.crt
3939
```
4040

4141
Enter values that make sense for your certificate. You can accept the default values.
4242

43-
```azurecli-interactive
43+
```console
4444
openssl pkcs12 -export -out appgwcert.pfx -inkey privateKey.key -in appgwcert.crt
4545
```
4646

0 commit comments

Comments
 (0)