Skip to content

Commit cecb1af

Browse files
committed
some code block changes
1 parent be57aa6 commit cecb1af

File tree

5 files changed

+24
-18
lines changed

5 files changed

+24
-18
lines changed

articles/app-service/containers/quickstart-python.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ The Azure CLI provides you with many convenient commands that you use from a loc
8686

8787
To run Azure commands in the Azure CLI, you must first sign in using the `az login` command. This command opens a browser to gather your credentials.
8888

89-
```terminal
89+
```azurecli
9090
az login
9191
```
9292

@@ -97,7 +97,7 @@ The [`az webapp up`](/cli/azure/webapp#az-webapp-up) command creates the web app
9797
In the *python-docs-hello-world* folder that contains the sample code, run the following `az webapp up` command. Replace `<app-name>` with a globally unique app name (*valid characters are `a-z`, `0-9`, and `-`*). Also replace `<location-name>` with an Azure region such as **centralus**, **eastasia**, **westeurope**, **koreasouth**, **brazilsouth**, **centralindia**, and so on. (You can retrieve a list of allowable regions for your Azure account by running the [`az account list-locations`](/cli/azure/appservice?view=azure-cli-latest.md#az-appservice-list-locations) command.)
9898

9999

100-
```terminal
100+
```azurecli
101101
az webapp up --sku F1 -n <app-name> -l <location-name>
102102
```
103103

@@ -153,7 +153,7 @@ Save your changes and exit the editor.
153153

154154
Redeploy the app using the following `az webapp up` command, using the same command you used to deploy the app the first time, replacing `<app-name>` and `<location-name>` with the same names you used before.
155155

156-
```terminal
156+
```azurecli
157157
az webapp up --sku F1 -n <app-name> -l <location-name>
158158
```
159159

@@ -170,13 +170,13 @@ You can access the console logs generated from inside the app and the container
170170

171171
First, turn on container logging by running the following command in a terminal, replacing `<app-name>` with the name of your app and `<resource-group-name>` with the name of the resource group shown in the output of the `az webapp up` command you used (such as "appsvc_rg_Linux_centralus"):
172172

173-
```terminal
173+
```azurecli
174174
az webapp log config --name <app-name> --resource-group <resource-group-name> --docker-container-logging filesystem
175175
```
176176

177177
Once container logging is turned on, run the following command to show the log stream:
178178

179-
```terminal
179+
```azurecli
180180
az webapp log tail --name <app-name> --resource-group <resource-group-name>
181181
```
182182

@@ -213,7 +213,7 @@ In the preceding steps, you created Azure resources in a resource group. The res
213213

214214
If you don't expect to need these resources in the future, delete the resource group by running the following command, replacing `<resource-group-name>` with the resource group shown in the output of the `az webapp up` command, such as "appsvc_rg_Linux_centralus". The command may take a minute to complete.
215215

216-
```terminal
216+
```azurecli
217217
az group delete -n <resource-group-name>
218218
```
219219

articles/dev-spaces/how-to/ingress-https-nginx.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,14 +24,14 @@ This article shows you how to configure Azure Dev Spaces to use a custom NGINX i
2424

2525
Connect to your cluster using [kubectl][kubectl], the Kubernetes command-line client. To configure `kubectl` to connect to your Kubernetes cluster, use the [az aks get-credentials][az-aks-get-credentials] command. This command downloads credentials and configures the Kubernetes CLI to use them.
2626

27-
```azurecli-interactive
27+
```azurecli
2828
az aks get-credentials --resource-group myResourceGroup --name myAKS
2929
```
3030

3131
To verify the connection to your cluster, use the [kubectl get][kubectl-get] command to return a list of the cluster nodes.
3232

3333
```console
34-
$ kubectl get nodes
34+
kubectl get nodes
3535
NAME STATUS ROLES AGE VERSION
3636
aks-nodepool1-12345678-vmssfedcba Ready agent 13m v1.14.1
3737
```
@@ -74,7 +74,7 @@ nginx-nginx-ingress-controller LoadBalancer 10.0.19.39 MY_EXTERNAL_
7474

7575
Add an *A* record to your DNS zone with the external IP address of the NGINX service using [az network dns record-set a add-record][az-network-dns-record-set-a-add-record].
7676

77-
```console
77+
```azurecli
7878
az network dns record-set a add-record \
7979
--resource-group myResourceGroup \
8080
--zone-name MY_CUSTOM_DOMAIN \

articles/dev-spaces/how-to/ingress-https-traefik.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,14 +24,14 @@ This article shows you how to configure Azure Dev Spaces to use a custom traefik
2424

2525
Connect to your cluster using [kubectl][kubectl], the Kubernetes command-line client. To configure `kubectl` to connect to your Kubernetes cluster, use the [az aks get-credentials][az-aks-get-credentials] command. This command downloads credentials and configures the Kubernetes CLI to use them.
2626

27-
```azurecli-interactive
27+
```azurecli
2828
az aks get-credentials --resource-group myResourceGroup --name myAKS
2929
```
3030

3131
To verify the connection to your cluster, use the [kubectl get][kubectl-get] command to return a list of the cluster nodes.
3232

3333
```console
34-
$ kubectl get nodes
34+
kubectl get nodes
3535
NAME STATUS ROLES AGE VERSION
3636
aks-nodepool1-12345678-vmssfedcba Ready agent 13m v1.14.1
3737
```
@@ -76,7 +76,7 @@ traefik LoadBalancer 10.0.205.78 MY_EXTERNAL_IP 80:32484/TCP,443:30620/T
7676

7777
Add an *A* record to your DNS zone with the external IP address of the traefik service using [az network dns record-set a add-record][az-network-dns-record-set-a-add-record].
7878

79-
```console
79+
```azurecli
8080
az network dns record-set a add-record \
8181
--resource-group myResourceGroup \
8282
--zone-name MY_CUSTOM_DOMAIN \

articles/dev-spaces/troubleshooting.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ This timeout occurs when you attempt to use Dev Spaces to run a service that is
120120
If you run `azds up` with the `--verbose` switch, or enable verbose logging in Visual Studio, you see additional detail:
121121

122122
```cmd
123-
$ azds up --verbose
123+
azds up --verbose
124124
125125
Installed chart in 2s
126126
Waiting for container image build...
@@ -351,10 +351,13 @@ kubectl get pods --all-namespaces --include-uninitialized
351351

352352
This issue can impact pods in *all namespaces* in the cluster including namespaces where Azure Dev Spaces is not enabled.
353353

354-
To fix this issue, [update the Dev Spaces CLI to the latest version](./how-to/upgrade-tools.md#update-the-dev-spaces-cli-extension-and-command-line-tools) and then deleting the *azds InitializerConfiguration* from the Azure Dev Spaces controller:
354+
To fix this issue, [update the Dev Spaces CLI to the latest version](./how-to/upgrade-tools.md#update-the-dev-spaces-cli-extension-and-command-line-tools) and then delete the *azds InitializerConfiguration* from the Azure Dev Spaces controller:
355355

356356
```azurecli
357357
az aks get-credentials --resource-group <resource group name> --name <cluster name>
358+
```
359+
360+
```bash
358361
kubectl delete InitializerConfiguration azds
359362
```
360363

@@ -489,5 +492,8 @@ To fix this issue, ensure your *kubeconfig* has the updated certificates using `
489492

490493
```azurecli
491494
az aks get-credentials -g <resource group name> -n <cluster name>
495+
```
496+
497+
```console
492498
azds controller refresh-credentials -g <resource group name> -n <cluster name>
493499
```

articles/service-fabric/service-fabric-diagnostics-oms-agent.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,17 +29,17 @@ The best way to add the Log Analytics agent to your cluster is via the virtual m
2929

3030
3. Click on **Windows Servers** if you are standing up a Windows cluster, and **Linux Servers** if you are creating a Linux cluster. This page will show you your `workspace ID` and `workspace key` (listed as Primary Key in the portal). You will need both for the next step.
3131

32-
4. Run the command to install the Log Analytics agent onto your cluster, using the `vmss extension set` API in your Cloud Shell:
32+
4. Run the command to install the Log Analytics agent onto your cluster, using the `vmss extension set` API:
3333

3434
For a Windows cluster:
3535

36-
```sh
36+
```azurecli
3737
az vmss extension set --name MicrosoftMonitoringAgent --publisher Microsoft.EnterpriseCloud.Monitoring --resource-group <nameOfResourceGroup> --vmss-name <nameOfNodeType> --settings "{'workspaceId':'<Log AnalyticsworkspaceId>'}" --protected-settings "{'workspaceKey':'<Log AnalyticsworkspaceKey>'}"
3838
```
3939
4040
For a Linux cluster:
4141
42-
```sh
42+
```azurecli
4343
az vmss extension set --name OmsAgentForLinux --publisher Microsoft.EnterpriseCloud.Monitoring --resource-group <nameOfResourceGroup> --vmss-name <nameOfNodeType> --settings "{'workspaceId':'<Log AnalyticsworkspaceId>'}" --protected-settings "{'workspaceKey':'<Log AnalyticsworkspaceKey>'}"
4444
```
4545
@@ -49,7 +49,7 @@ The best way to add the Log Analytics agent to your cluster is via the virtual m
4949
5050
5. This should take less than 15 min to successfully add the agent to your nodes. You can verify that the agents have been added by using the `az vmss extension list` API:
5151
52-
```sh
52+
```azurecli
5353
az vmss extension list --resource-group <nameOfResourceGroup> --vmss-name <nameOfNodeType>
5454
```
5555

0 commit comments

Comments
 (0)