Skip to content

Commit 703e22c

Browse files
Merge pull request #268156 from alexbuckgit/alexbuckgit/docutune-autopr-20240305-201911-3642454-ignore-build
[BULK] DocuTune - Fix code block formatting issues (part 8)
2 parents 7439ce6 + 995d6a6 commit 703e22c

File tree

6 files changed

+43
-45
lines changed

6 files changed

+43
-45
lines changed

articles/azure-resource-manager/templates/quickstart-create-template-specs.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -443,11 +443,11 @@ Rather than creating a new template spec for the revised template, add a new ver
443443
1. Deploy that version. Provide a prefix for the storage account name.
444444

445445
```azurecli
446-
az deployment group create \
446+
az deployment group create \
447447
--resource-group storageRG \
448448
--template-spec $id \
449449
--parameters namePrefix='demoaccount'
450-
```
450+
```
451451

452452
# [Portal](#tab/azure-portal)
453453

@@ -478,7 +478,7 @@ Rather than creating a new template spec for the revised template, add a new ver
478478

479479
1. Again, you must make some changes to your local template to make it work with template specs. Copy the following template and save it locally as azuredeploy.json.
480480

481-
```json
481+
```json
482482
{
483483
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
484484
"contentVersion": "1.0.0.0",

articles/backup/azure-kubernetes-service-cluster-backup-using-cli.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -197,15 +197,13 @@ Once the vault and policy creation are complete, you need to perform the followi
197197

198198
```azurecli
199199
az k8s-extension create --name azure-aks-backup --extension-type microsoft.dataprotection.kubernetes --scope cluster --cluster-type managedClusters --cluster-name $akscluster --resource-group $aksclusterresourcegroup --release-train stable --configuration-settings blobContainer=$blobcontainer storageAccount=$storageaccount storageAccountResourceGroup=$storageaccountresourcegroup storageAccountSubscriptionId=$subscriptionId
200-
201200
```
202201

203202
As part of extension installation, a user identity is created in the AKS cluster's Node Pool Resource Group. For the extension to access the storage account, you need to provide this identity the **Storage Blob Data Contributor** role. To assign the required role, run the following command:
204203

205204
```azurecli
206205
az role assignment create --assignee-object-id $(az k8s-extension show --name azure-aks-backup --cluster-name $akscluster --resource-group $aksclusterresourcegroup --cluster-type managedClusters --query aksAssignedIdentity.principalId --output tsv) --role 'Storage Blob Data Contributor' --scope /subscriptions/$subscriptionId/resourceGroups/$storageaccountresourcegroup/providers/Microsoft.Storage/storageAccounts/$storageaccount
207206
```
208-
209207

210208
3. **Enable Trusted Access**
211209

articles/backup/backup-azure-arm-restore-vms.md

Lines changed: 18 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -320,22 +320,23 @@ If you choose to select system-assigned or user-assigned managed identities, che
320320

321321
```json
322322
"permissions": [
323-
{
324-
"actions": [
325-
"Microsoft.Authorization/*/read",
326-
"Microsoft.Storage/storageAccounts/blobServices/containers/delete",
327-
"Microsoft.Storage/storageAccounts/blobServices/containers/read",
328-
"Microsoft.Storage/storageAccounts/blobServices/containers/write"
329-
],
330-
"notActions": [],
331-
"dataActions": [
332-
"Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete",
333-
"Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read",
334-
"Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write",
335-
"Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action"
336-
],
337-
"notDataActions": []
338-
}
323+
{
324+
"actions": [
325+
"Microsoft.Authorization/*/read",
326+
"Microsoft.Storage/storageAccounts/blobServices/containers/delete",
327+
"Microsoft.Storage/storageAccounts/blobServices/containers/read",
328+
"Microsoft.Storage/storageAccounts/blobServices/containers/write"
329+
],
330+
"notActions": [],
331+
"dataActions": [
332+
"Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete",
333+
"Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read",
334+
"Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write",
335+
"Microsoft.Storage/storageAccounts/blobServices/containers/blobs/add/action"
336+
],
337+
"notDataActions": []
338+
}
339+
]
339340
```
340341

341342
Or, add the role assignment on the staging location (Storage Account) to have [Storage account Backup Contributor](./blob-backup-configure-manage.md#grant-permissions-to-the-backup-vault-on-storage-accounts) and [Storage Blob data Contributor](../role-based-access-control/built-in-roles.md#storage-blob-data-contributor) for the successful restore operation.
@@ -384,7 +385,7 @@ There are a few things to note after restoring a VM:
384385
- Manually install VM agent if Azure Agent is found to be unresponsive by following this [link](/troubleshoot/azure/virtual-machines/install-vm-agent-offline).
385386
- Enable Serial Console access on VM to allow command-line access to VM
386387

387-
```cmd
388+
```cmd
388389
bcdedit /store <drive letter>:\boot\bcd /enum
389390
bcdedit /store <VOLUME LETTER WHERE THE BCD FOLDER IS>:\boot\bcd /set {bootmgr} displaybootmenu yes
390391
bcdedit /store <VOLUME LETTER WHERE THE BCD FOLDER IS>:\boot\bcd /set {bootmgr} timeout 5

articles/backup/backup-azure-sql-database.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -166,14 +166,13 @@ To configure simultaneous backups, follow these steps:
166166

167167
The final JSON should appear as:
168168

169-
```JSON
169+
```json
170170
{
171-
"EnableLocalDiskBackupForBackupTypes": ["Log"],
172-
"LocalDiskBackupFolderPath": "E:\\LocalBackup",
171+
"EnableLocalDiskBackupForBackupTypes": ["Log"],
172+
"LocalDiskBackupFolderPath": "E:\\LocalBackup",
173173
}
174-
175-
```
176-
174+
```
175+
177176
If there are other pre-populated entries in the JSON file, add the above two entries at the bottom of the JSON file *just before the closing curly bracket*.
178177

179178
3. For the changes to take effect immediately instead of regular one hour, go to **TaskManager** > **Services**, right-click **AzureWLbackupPluginSvc** and select **Stop**.
@@ -197,15 +196,14 @@ To configure simultaneous backups, follow these steps:
197196
```azurepowershell
198197
$cred = Get-Credential
199198
New-SmbGlobalMapping -RemotePath <FileSharePath> -Credential $cred -LocalPath <LocalDrive>: -FullAccess @("<Comma Separated list of accounts>") -Persistent $true
200-
201199
```
202200

203201
**Example**:
204202

205203
```azurepowershell
206204
$cred = Get-Credential
207205
New-SmbGlobalMapping -RemotePath \\i00601p1imsa01.file.core.windows.net\rsvshare -Credential $cred -LocalPath Y: -FullAccess @("NT AUTHORITY\SYSTEM","NT Service\AzureWLBackupPluginSvc") -Persistent $true
208-
```
206+
```
209207

210208
## Next steps
211209

articles/batch/account-move.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -57,16 +57,16 @@ Load and modify the template so you can create a new Batch account in the target
5757

5858
1. In the uploaded **template.json** file, name the target Batch account by entering a new **defaultValue** for the Batch account name. This example sets the **defaultValue** of the Batch account name to `mytargetaccount` and replaces the string in **defaultValue** with the resource ID for `mytargetstorageaccount`.
5959

60-
```json
61-
{
62-
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
63-
"contentVersion": "1.0.0.0",
64-
"parameters": {
65-
"batchAccounts_mysourceaccount_name": {
66-
"defaultValue": "mytargetaccount",
67-
"type": "String"
68-
}
69-
},
60+
```json
61+
{
62+
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
63+
"contentVersion": "1.0.0.0",
64+
"parameters": {
65+
"batchAccounts_mysourceaccount_name": {
66+
"defaultValue": "mytargetaccount",
67+
"type": "String"
68+
}
69+
},
7070
```
7171

7272
1. Next, update the **defaultValue** of the storage account with your migrated storage account's resource ID. To get this value, navigate to the storage account in the Azure portal, select **JSON View** near the top fo the screen, and then copy the value shown under **Resource ID**. This example uses the resource ID for a storage account named `mytargetstorageaccount` in the resource group `mytargetresourcegroup`.

articles/batch/batch-js-get-started.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -262,8 +262,8 @@ var jobPrepTaskConfig = {id:"installprereq",commandLine:"sudo sh startup_prereq.
262262

263263
If there are no prerequisites to be installed for your tasks to run, you can skip the preparation tasks. Following code creates a job with display name "process csv files."
264264

265-
```javascript
266-
// Setting Batch Pool ID
265+
```javascript
266+
// Setting Batch Pool ID
267267
const poolInfo = { poolId: poolId };
268268
// Batch job configuration object
269269
const jobId = "processcsvjob";
@@ -273,13 +273,14 @@ const jobConfig = {
273273
jobPreparationTask: jobPrepTaskConfig,
274274
poolInfo: poolInfo
275275
};
276-
// Adding Azure batch job to the pool
277-
const job = batchClient.job.add(jobConfig, function (error, result) {
276+
// Adding Azure batch job to the pool
277+
const job = batchClient.job.add(jobConfig, function (error, result) {
278278
if (error !== null) {
279279
console.log("An error occurred while creating the job...");
280280
console.log(error.response);
281281
}
282-
});
282+
}
283+
);
283284
```
284285

285286
### Step 5: Submit Azure Batch tasks for a job

0 commit comments

Comments
 (0)