Skip to content

Commit 79c282e

Browse files
committed
remove the AzureRM note
1 parent ede4e33 commit 79c282e

7 files changed

+0
-19
lines changed

articles/network-watcher/diagnose-vm-network-routing-problem-powershell.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,6 @@ In this article, you deploy a virtual machine (VM), and then check communication
1919

2020
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
2121

22-
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
23-
2422
[!INCLUDE [cloud-shell-try-it.md](../../includes/cloud-shell-try-it.md)]
2523

2624
If you choose to install and use PowerShell locally, this article requires the Azure PowerShell `Az` module. To find the installed version, run `Get-Module -ListAvailable Az`. If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-azure-powershell). If you are running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.

articles/network-watcher/network-watcher-connectivity-powershell.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,6 @@ ms.custom: devx-track-azurepowershell
2121
2222
Learn how to use connection troubleshoot to verify whether a direct TCP connection from a virtual machine to a given endpoint can be established.
2323

24-
25-
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
26-
2724
## Before you begin
2825

2926
* An instance of Network Watcher in the region you want to troubleshoot a connection.

articles/network-watcher/network-watcher-nsg-auditing-powershell.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,6 @@ Customers are often faced with the challenge of verifying the security posture o
2020

2121
To learn more about network security groups, see [Network security groups overview](../virtual-network/network-security-groups-overview.md).
2222

23-
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
24-
2523
## Prerequisites
2624

2725
- If you don't have an Azure account with an active subscription, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).

articles/network-watcher/network-watcher-packet-capture-manage-powershell-vmss.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,6 @@ This article takes you through the different management tasks that are currently
2727
- [**Delete a packet capture**](#delete-a-packet-capture)
2828
- [**Download a packet capture**](#download-a-packet-capture)
2929

30-
31-
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
32-
3330
## Before you begin
3431

3532
This article assumes you have the following resources:

articles/network-watcher/network-watcher-read-nsg-flow-logs.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,6 @@ Learn how to read NSG flow logs entries with PowerShell.
1616

1717
NSG flow logs are stored in a storage account in [block blobs](/rest/api/storageservices/understanding-block-blobs--append-blobs--and-page-blobs). Block blobs are made up of smaller blocks. Each log is a separate block blob that is generated every hour. New logs are generated every hour, the logs are updated with new entries every few minutes with the latest data. In this article you learn how to read portions of the flow logs.
1818

19-
20-
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
21-
2219
## Scenario
2320

2421
In the following scenario, you have an example flow log that is stored in a storage account. You learn how to selectively read the latest events in NSG flow logs. In this article you use PowerShell, however, the concepts discussed in the article are not limited to the programming language, and are applicable to all languages supported by the Azure Storage APIs.

articles/network-watcher/network-watcher-security-group-view-powershell.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,6 @@ ms.custom: devx-track-azurepowershell, engagement-fy23
1818
1919
Security group view returns configured and effective network security rules that are applied to a virtual machine. This capability is useful to audit and diagnose Network Security Groups and rules that are configured on a VM to ensure traffic is being correctly allowed or denied. In this article, we show you how to retrieve the configured and effective security rules to a virtual machine using PowerShell
2020

21-
22-
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
23-
2421
## Before you begin
2522

2623
In this scenario, you run the `Get-AzNetworkWatcherSecurityGroupView` cmdlet to retrieve the security rule information.

articles/network-watcher/view-relative-latencies.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,6 @@ ms.custom: devx-track-azurepowershell, engagement-fy23
2020
2121
In this tutorial, learn how to use the Azure [Network Watcher](network-watcher-monitoring-overview.md) service to help you decide what Azure region to deploy your application or service in, based on your user demographic. Additionally, you can use it to help evaluate service providers' connections to Azure.
2222

23-
24-
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
25-
2623
## Create a network watcher
2724

2825
If you already have a network watcher in at least one Azure [region](https://azure.microsoft.com/regions), you can skip the tasks in this section. Create a resource group for the network watcher. In this example, the resource group is created in the East US region, but you can create the resource group in any Azure region.

0 commit comments

Comments
 (0)