Skip to content

Commit 2e19d67

Browse files
Merge pull request #186954 from dksimpson/azure-docs-pr-20220126-validation-2
Validation bulk update: Fix code tags for Azure CLI code blocks - batch 1
2 parents 5b0a506 + f1fd2e0 commit 2e19d67

10 files changed

+26
-19
lines changed

articles/aks/api-server-authorized-ip-ranges.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -155,6 +155,9 @@ Add another IP address to the approved ranges with the following command.
155155
```bash
156156
# Retrieve your IP address
157157
CURRENT_IP=$(dig +short "myip.opendns.com" "@resolver1.opendns.com")
158+
````
159+
160+
```azurelci
158161
# Add to AKS approved list
159162
az aks update -g $RG -n $AKSNAME --api-server-authorized-ip-ranges $CURRENT_IP/32
160163
```

articles/aks/certificate-rotation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,12 +41,12 @@ curl https://{apiserver-fqdn} -k -v 2>&1 |grep expire
4141
```
4242
4343
* Check expiration date of certificate on VMAS agent node
44-
```console
44+
```azurecli
4545
az vm run-command invoke -g MC_rg_myAKSCluster_region -n vm-name --command-id RunShellScript --query 'value[0].message' -otsv --scripts "openssl x509 -in /etc/kubernetes/certs/apiserver.crt -noout -enddate"
4646
```
4747

4848
* Check expiration date of certificate on one VMSS agent node
49-
```console
49+
```azurecli
5050
az vmss run-command invoke -g MC_rg_myAKSCluster_region -n vmss-name --instance-id 0 --command-id RunShellScript --query 'value[0].message' -otsv --scripts "openssl x509 -in /etc/kubernetes/certs/apiserver.crt -noout -enddate"
5151
```
5252

articles/aks/ingress-tls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -247,7 +247,7 @@ Note that this sample is for a Bash shell.
247247

248248
### [Azure CLI](#tab/azure-cli)
249249

250-
```bash
250+
```azurecli
251251
# Public IP address of your ingress controller
252252
IP="MY_EXTERNAL_IP"
253253

articles/aks/kubernetes-portal.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,13 +74,15 @@ For existing clusters, you may need to enable the Kubernetes resource view. To e
7474

7575
> [!TIP]
7676
> The AKS feature for [**API server authorized IP ranges**](api-server-authorized-ip-ranges.md) can be added to limit API server access to only the firewall's public endpoint. Another option for such clusters is updating `--api-server-authorized-ip-ranges` to include access for a local client computer or IP address range (from which portal is being browsed). To allow this access, you need the computer's public IPv4 address. You can find this address with below command or by searching "what is my IP address" in an internet browser.
77+
7778
```bash
7879
# Retrieve your IP address
7980
CURRENT_IP=$(dig +short myip.opendns.com @resolver1.opendns.com)
81+
```
8082

83+
```azurecli
8184
# Add to AKS approved list
8285
az aks update -g $RG -n $AKSNAME --api-server-authorized-ip-ranges $CURRENT_IP/32
83-
8486
```
8587

8688
## Next steps

articles/aks/limit-egress-traffic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -365,7 +365,7 @@ az network firewall ip-config create -g $RG -f $FWNAME -n $FWIPCONFIG_NAME --pub
365365

366366
When the previous command has succeeded, save the firewall frontend IP address for configuration later.
367367

368-
```bash
368+
```azurecli
369369
# Capture Firewall IP Address for Later Use
370370
371371
FWPUBLIC_IP=$(az network public-ip show -g $RG -n $FWPUBLICIP_NAME --query "ipAddress" -o tsv)

articles/aks/manage-azure-rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ AKS provides the following four built-in roles:
9898

9999
Roles assignments scoped to the **entire AKS cluster** can be done either on the Access Control (IAM) blade of the cluster resource on Azure portal or by using Azure CLI commands as shown below:
100100

101-
```bash
101+
```azurecli
102102
# Get your AKS Resource ID
103103
AKS_ID=$(az aks show -g MyResourceGroup -n MyManagedCluster --query id -o tsv)
104104
```

articles/aks/quickstart-event-grid.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,6 @@ az eventgrid event-subscription list --source-resource-id $SOURCE_RESOURCE_ID
8686
The following example output shows you're subscribed to events from the *MyAKS* cluster and those events are delivered to the *MyEventGridHub* event hub:
8787

8888
```output
89-
$ az eventgrid event-subscription list --source-resource-id $SOURCE_RESOURCE_ID
9089
[
9190
{
9291
"deadLetterDestination": null,

articles/aks/use-multiple-node-pools.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -455,9 +455,11 @@ az aks nodepool add \
455455

456456
The following example output from the [az aks nodepool list][az-aks-nodepool-list] command shows that *taintnp* is *Creating* nodes with the specified *nodeTaints*:
457457

458-
```console
459-
$ az aks nodepool list -g myResourceGroup --cluster-name myAKSCluster
458+
```azurecli
459+
az aks nodepool list -g myResourceGroup --cluster-name myAKSCluster
460+
```
460461

462+
```output
461463
[
462464
{
463465
...
@@ -561,9 +563,10 @@ az aks nodepool add \
561563

562564
The following example output from the [az aks nodepool list][az-aks-nodepool-list] command shows that *labelnp* is *Creating* nodes with the specified *nodeLabels*:
563565

564-
```console
565-
$ az aks nodepool list -g myResourceGroup --cluster-name myAKSCluster
566+
```azurecli
567+
az aks nodepool list -g myResourceGroup --cluster-name myAKSCluster
566568
569+
```output
567570
[
568571
{
569572
...

articles/app-service/configure-language-java.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -478,13 +478,13 @@ To enable via the Azure CLI, you will need to create an Application Insights res
478478
479479
1. Enable the Applications Insights extension
480480
481-
```bash
481+
```azurecli
482482
az extension add -n application-insights
483483
```
484484
485485
2. Create an Application Insights resource using the CLI command below. Replace the placeholders with your desired resource name and group.
486486
487-
```bash
487+
```azurecli
488488
az monitor app-insights component create --app <resource-name> -g <resource-group> --location westus2 --kind web --application-type web
489489
```
490490
@@ -496,7 +496,7 @@ To enable via the Azure CLI, you will need to create an Application Insights res
496496
497497
3. Set the instrumentation key, connection string, and monitoring agent version as app settings on the web app. Replace `<instrumentationKey>` and `<connectionString>` with the values from the previous step.
498498
499-
```bash
499+
```azurecli
500500
az webapp config appsettings set -n <webapp-name> -g <resource-group> --settings "APPINSIGHTS_INSTRUMENTATIONKEY=<instrumentationKey>" "APPLICATIONINSIGHTS_CONNECTION_STRING=<connectionString>" "ApplicationInsightsAgent_EXTENSION_VERSION=~3" "XDT_MicrosoftApplicationInsights_Mode=default" "XDT_MicrosoftApplicationInsights_Java=1"
501501
```
502502
@@ -505,7 +505,7 @@ To enable via the Azure CLI, you will need to create an Application Insights res
505505
506506
3. Set the instrumentation key, connection string, and monitoring agent version as app settings on the web app. Replace `<instrumentationKey>` and `<connectionString>` with the values from the previous step.
507507
508-
```bash
508+
```azurecli
509509
az webapp config appsettings set -n <webapp-name> -g <resource-group> --settings "APPINSIGHTS_INSTRUMENTATIONKEY=<instrumentationKey>" "APPLICATIONINSIGHTS_CONNECTION_STRING=<connectionString>" "ApplicationInsightsAgent_EXTENSION_VERSION=~3" "XDT_MicrosoftApplicationInsights_Mode=default"
510510
```
511511
@@ -799,7 +799,7 @@ The platform also needs to know where your custom version of Tomcat is installed
799799
800800
You can use the Azure CLI to change this setting:
801801
802-
```powershell
802+
```azurecli
803803
az webapp config appsettings set -g $MyResourceGroup -n $MyUniqueApp --settings CATALINA_BASE="%LOCAL_EXPANDED%\tomcat"
804804
```
805805

articles/app-service/deploy-zip.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -173,19 +173,19 @@ The CLI command uses the [Kudu publish API](#kudu-publish-api-reference) to depl
173173

174174
### Deploy a startup script
175175

176-
```bash
176+
```azurecli
177177
az webapp deploy --resource-group <group-name> --name <app-name> --src-path scripts/startup.sh --type=startup
178178
```
179179

180180
### Deploy a library file
181181

182-
```bash
182+
```azurecli
183183
az webapp deploy --resource-group <group-name> --name <app-name> --src-path driver.jar --type=lib
184184
```
185185

186186
### Deploy a static file
187187

188-
```bash
188+
```azurecli
189189
az webapp deploy --resource-group <group-name> --name <app-name> --src-path config.json --type=static
190190
```
191191

0 commit comments

Comments
 (0)