Skip to content

Commit 514e890

Browse files
committed
fixed issues
1 parent 80927ab commit 514e890

File tree

1 file changed

+5
-8
lines changed

1 file changed

+5
-8
lines changed

articles/azure-resource-manager/templates/deploy-python.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,6 @@ This article explains how to use Python with Azure Resource Manager templates (A
2121
* The following Azure library packages for Python installed in your virtual environment. To install any of the packages, use `pip install {package-name}`
2222
* azure-identity
2323
* azure-mgmt-resource
24-
* azure-mgmt-storage
2524

2625
If you have older versions of these packages already installed in your virtual environment, you may need to update them with `pip install --upgrade {package-name}`
2726

@@ -98,7 +97,7 @@ subscription_id = os.environ["AZURE_SUBSCRIPTION_ID"]
9897
resource_client = ResourceManagementClient(credential, subscription_id)
9998

10099
rg_result = resource_client.resource_groups.create_or_update(
101-
"ExampleGroup",
100+
"exampleGroup",
102101
{
103102
"location": "Central US"
104103
}
@@ -160,7 +159,7 @@ subscription_id = os.environ["AZURE_SUBSCRIPTION_ID"]
160159
resource_client = ResourceManagementClient(credential, subscription_id)
161160

162161
rg_result = resource_client.resource_groups.create_or_update(
163-
"ExampleGroup",
162+
"exampleGroup",
164163
{
165164
"location": "Central US"
166165
}
@@ -205,9 +204,7 @@ rg_deployment_result = resource_client.deployments.begin_create_or_update(
205204
)
206205
```
207206

208-
The preceding example requires a publicly accessible URI for the template, which works for most scenarios because your template shouldn't include sensitive data. If you need to specify sensitive data (like an admin password), pass that value as a secure parameter. However, if you want to manage access to the template, consider using [template specs](#deploy-template-spec).
209-
210-
To deploy a protected, remote template, add a SAS token.
207+
The preceding example requires a publicly accessible URI for the template, which works for most scenarios because your template shouldn't include sensitive data. If you need to specify sensitive data (like an admin password), pass that value as a secure parameter. If you keep your templates in a storage account that doesn't allow anonymous access, you need to provide a SAS token.
211208

212209
```python
213210
import os
@@ -248,7 +245,7 @@ For more information, see [Use relative path for linked templates](./linked-temp
248245

249246
## Deploy template spec
250247

251-
Instead of deploying a local or remote template, you can create a [template spec](template-specs.md). The template spec is a resource in your Azure subscription that contains an ARM template. It makes it easy to securely share the template with users in your organization. You use Azure role-based access control (Azure RBAC) to grant access to the template spec. This feature is currently in preview.
248+
Instead of deploying a local or remote template, you can create a [template spec](template-specs.md). The template spec is a resource in your Azure subscription that contains an ARM template. It makes it easy to securely share the template with users in your organization. You use Azure role-based access control (Azure RBAC) to grant access to the template spec.
252249

253250
The following examples show how to create and deploy a template spec.
254251

@@ -277,7 +274,7 @@ template_specs_client.template_specs.create_or_update(
277274
template_spec
278275
)
279276

280-
with open("c:/bicep/storage.json", "r") as template_file:
277+
with open("storage.json", "r") as template_file:
281278
template_body = json.load(template_file)
282279

283280
version = TemplateSpecVersion(

0 commit comments

Comments
 (0)