Skip to content

Commit e0dcabd

Browse files
Merge pull request #107777 from WilliamAntonRohm/azurecli-batch-two
updating tags for azurecli and others
2 parents acdd2b9 + e8fb039 commit e0dcabd

9 files changed

+27
-27
lines changed

articles/sql-database/sql-database-always-encrypted-azure-key-vault.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Set-AzKeyVaultAccessPolicy -VaultName $vaultName -ResourceGroupName $resourceG
7777

7878
# [Azure CLI](#tab/azure-cli)
7979

80-
```powershell
80+
```azurecli
8181
$subscriptionName = '<subscriptionName>'
8282
$userPrincipalName = '<[email protected]>'
8383
$applicationId = '<applicationId from AAD application>'

articles/sql-database/sql-database-implement-geo-distributed-database.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ Get-AzSqlDatabase -ResourceGroupName $resourceGroup -ServerName $server -Databas
8989
> [!IMPORTANT]
9090
> Run `az login` to sign in to Azure.
9191
92-
```powershell
92+
```azurecli
9393
$admin = "<adminName>"
9494
$password = "<password>"
9595
$resourceGroup = "<resourceGroupName>"

articles/sql-database/sql-database-single-database-scale.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Next, click on the button labeled **Cancel this operation**.
7171

7272
From a PowerShell command prompt, set the `$resourceGroupName`, `$serverName`, and `$databaseName`, and then run the following command:
7373

74-
```powershell
74+
```azurecli
7575
$operationName = (az sql db op list --resource-group $resourceGroupName --server $serverName --database $databaseName --query "[?state=='InProgress'].name" --out tsv)
7676
if (-not [string]::IsNullOrEmpty($operationName)) {
7777
(az sql db op cancel --resource-group $resourceGroupName --server $serverName --database $databaseName --name $operationName)

articles/sql-database/transparent-data-encryption-byok-azure-sql-configure.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ For specifics on Key Vault, see [Manage Key Vault using CLI 2.0](../key-vault/ke
122122

123123
## Assign an Azure AD identity to your server
124124

125-
```powershell
125+
```azurecli
126126
# create server (with identity) and database
127127
az sql server create --name <servername> --resource-group <rgname> --location <location> --admin-user <user> --admin-password <password> --assign-identity
128128
az sql db create --name <dbname> --server <servername> --resource-group <rgname>
@@ -133,7 +133,7 @@ az sql db create --name <dbname> --server <servername> --resource-group <rgname>
133133
134134
## Grant Key Vault permissions to your server
135135

136-
```powershell
136+
```azurecli
137137
# create key vault, key and grant permission
138138
az keyvault create --name <kvname> --resource-group <rgname> --location <location> --enable-soft-delete true
139139
az keyvault key create --name <keyname> --vault-name <kvname> --protection software
@@ -145,7 +145,7 @@ az keyvault set-policy --name <kvname> --object-id <objectid> --resource-group
145145
146146
## Add the Key Vault key to the server and set the TDE Protector
147147

148-
```powershell
148+
```azurecli
149149
# add server key and update encryption protector
150150
az sql server key create --server <servername> --resource-group <rgname> --kid <keyID>
151151
az sql server tde-key set --server <servername> --server-key-type AzureKeyVault --resource-group <rgname> --kid <keyID>
@@ -156,7 +156,7 @@ az sql server tde-key set --server <servername> --server-key-type AzureKeyVault
156156
157157
## Turn on TDE
158158

159-
```powershell
159+
```azurecli
160160
# enable encryption
161161
az sql db tde set --database <dbname> --server <servername> --resource-group <rgname> --status Enabled
162162
```
@@ -165,7 +165,7 @@ Now the database or data warehouse has TDE enabled with a customer-managed encry
165165

166166
## Check the encryption state and encryption activity
167167

168-
```powershell
168+
```azurecli
169169
# get encryption scan progress
170170
az sql db tde list-activity --database <dbname> --server <servername> --resource-group <rgname>
171171
@@ -183,7 +183,7 @@ az sql db tde show --database <dbname> --server <servername> --resource-group <r
183183

184184
```powershell
185185
Set-AzSqlDatabaseTransparentDataEncryption -ServerName <LogicalServerName> -ResourceGroupName <SQLDatabaseResourceGroupName> `
186-
-DatabaseName <DatabaseName> -State "Disabled
186+
-DatabaseName <DatabaseName> -State "Disabled"
187187
```
188188

189189
- Use the [Get-AzSqlServerKeyVaultKey](/powershell/module/az.sql/get-azsqlserverkeyvaultkey) cmdlet to return the list of Key Vault keys added to the server.

articles/sql-database/transparent-data-encryption-byok-azure-sql-key-rotation.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.date: 03/12/2019
1414
---
1515
# Rotate the Transparent Data Encryption (TDE) protector using PowerShell
1616

17-
This article describes key rotation for an Azure SQL server using a TDE protector from Azure Key Vault. Rotating an Azure SQL servers TDE protector means switching to a new asymmetric key that protects the databases on the server. Key rotation is an online operation and should only take a few seconds to complete, because this only decrypts and re-encrypts the databases data encryption key, not the entire database.
17+
This article describes key rotation for an Azure SQL server using a TDE protector from Azure Key Vault. Rotating an Azure SQL server's TDE protector means switching to a new asymmetric key that protects the databases on the server. Key rotation is an online operation and should only take a few seconds to complete, because this only decrypts and re-encrypts the database's data encryption key, not the entire database.
1818

1919
This guide discusses two options to rotate the TDE protector on the server.
2020

@@ -70,7 +70,7 @@ Set-AzSqlServerTransparentDataEncryptionProtector -Type AzureKeyVault -KeyId <ke
7070

7171
Use the [az keyvault key create](/cli/azure/keyvault/key#az-keyvault-key-create), [az sql server key create](/cli/azure/sql/server/key#az-sql-server-key-create), and [az sql server tde-key set](/cli/azure/sql/server/tde-key#az-sql-server-tde-key-set) commands.
7272

73-
```azure-cli
73+
```azurecli
7474
# add a new key to Key Vault
7575
az keyvault key create --name <keyVaultKeyName> --vault-name <keyVaultName> --protection <hsmOrSoftware>
7676
@@ -107,13 +107,13 @@ The following examples use [az sql server tde-key set](/powershell/module/az.sql
107107

108108
- To switch the TDE protector from Microsoft-managed to BYOK mode,
109109

110-
```azure-cli
110+
```azurecli
111111
az sql server tde-key set --server-key-type AzureKeyVault --kid <keyVaultKeyId> --resource-group <SQLDatabaseResourceGroupName> --server <logicalServerName>
112112
```
113113

114114
- To switch the TDE protector from BYOK mode to Microsoft-managed,
115115

116-
```azure-cli
116+
```azurecli
117117
az sql server tde-key set --server-key-type ServiceManaged --resource-group <SQLDatabaseResourceGroupName> --server <logicalServerName>
118118
```
119119

articles/sql-database/transparent-data-encryption-byok-azure-sql-remove-tde-protector.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ This how-to guide describes how to respond to a potentially compromised TDE prot
3939

4040
The following procedures should only be done in extreme cases or in test environments. Review the how-to guide carefully, as deleting actively used TDE protectors from Azure Key Vault will result in **database unavailability**.
4141

42-
If a key is ever suspected to be compromised, such that a service or user had unauthorized access to the key, its best to delete the key.
42+
If a key is ever suspected to be compromised, such that a service or user had unauthorized access to the key, it's best to delete the key.
4343

4444
Keep in mind that once the TDE protector is deleted in Key Vault, in up to 10 minutes all encrypted databases will start denying all connections with the corresponding error message and change its state to [Inaccessible](https://docs.microsoft.com/azure/sql-database/transparent-data-encryption-byok-azure-sql#inaccessible-tde-protector).
4545

@@ -81,7 +81,7 @@ This how-to guide goes over two approaches depending on the desired result after
8181

8282
1. Create a [new key in Key Vault](/powershell/module/az.keyvault/add-azkeyvaultkey). Make sure this new key is created in a separate key vault from the potentially compromised TDE protector, since access control is provisioned on a vault level.
8383

84-
2. Add the new key to the server using the [Add-AzSqlServerKeyVaultKey](/powershell/module/az.sql/add-azsqlserverkeyvaultkey) and [Set-AzSqlServerTransparentDataEncryptionProtector](/powershell/module/az.sql/set-azsqlservertransparentdataencryptionprotector) cmdlets and update it as the servers new TDE protector.
84+
2. Add the new key to the server using the [Add-AzSqlServerKeyVaultKey](/powershell/module/az.sql/add-azsqlserverkeyvaultkey) and [Set-AzSqlServerTransparentDataEncryptionProtector](/powershell/module/az.sql/set-azsqlservertransparentdataencryptionprotector) cmdlets and update it as the server's new TDE protector.
8585

8686
```powershell
8787
# add the key from Key Vault to the server
@@ -126,9 +126,9 @@ For command reference, see the [Azure CLI keyvault](/cli/azure/keyvault/key).
126126

127127
1. Create a [new key in Key Vault](/cli/azure/keyvault/key#az-keyvault-key-create). Make sure this new key is created in a separate key vault from the potentially compromised TDE protector, since access control is provisioned on a vault level.
128128

129-
2. Add the new key to the server and update it as the servers new TDE protector.
129+
2. Add the new key to the server and update it as the server's new TDE protector.
130130

131-
```powershell
131+
```azurecli
132132
# add the key from Key Vault to the server
133133
az sql server key create --kid <KeyVaultKeyId> --resource-group <SQLDatabaseResourceGroupName> --server <LogicalServerName>
134134
@@ -141,26 +141,26 @@ For command reference, see the [Azure CLI keyvault](/cli/azure/keyvault/key).
141141
> [!NOTE]
142142
> It may take a few minutes for the new TDE protector to propagate to all databases and secondary databases under the server.
143143
144-
```powershell
144+
```azurecli
145145
az sql server tde-key show --resource-group <SQLDatabaseResourceGroupName> --server <LogicalServerName>
146146
```
147147

148148
4. Take a backup of the new key in Key Vault.
149149

150-
```powershell
150+
```azurecli
151151
# --file parameter is optional; if removed, a file name is automatically generated.
152152
az keyvault key backup --file <DesiredBackupFilePath> --name <KeyVaultKeyName> --vault-name <KeyVaultName>
153153
```
154154

155155
5. Delete the compromised key from Key Vault.
156156

157-
```powershell
157+
```azurecli
158158
az keyvault key delete --name <KeyVaultKeyName> --vault-name <KeyVaultName>
159159
```
160160

161161
6. To restore a key to Key Vault in the future.
162162

163-
```powershell
163+
```azurecli
164164
az keyvault key restore --file <BackupFilePath> --vault-name <KeyVaultName>
165165
```
166166

articles/storage/common/storage-account-upgrade.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ To upgrade a general-purpose v1 account to a general-purpose v2 account using Az
4848

4949
Next, call the following command to upgrade the account, substituting your resource group name, storage account name, and desired account access tier.
5050

51-
```cli
51+
```azurecli
5252
az storage account update -g <resource-group> -n <storage-account> --set kind=StorageV2 --access-tier=<Hot/Cool>
5353
```
5454

articles/storage/files/storage-files-how-to-create-large-file-share.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ First, [install the latest version of PowerShell](https://docs.microsoft.com/pow
7474

7575
To create a storage account with large file shares enabled, use the following command. Replace `<yourStorageAccountName>`, `<yourResourceGroup>`, and `<yourDesiredRegion>` with your information.
7676

77-
```PowerShell
77+
```powershell
7878
## This command creates a large file share–enabled account. It will not support GZRS, GRS, or RA-GRS.
7979
New-AzStorageAccount -ResourceGroupName <yourResourceGroup> -Name <yourStorageAccountName> -Location <yourDesiredRegion> -SkuName Standard_LRS -EnableLargeFileShare;
8080
```
@@ -108,7 +108,7 @@ az storage account update --name <yourStorageAccountName> -g <yourResourceGroup>
108108

109109
To enable large file shares on your existing account, use the following command. Replace `<yourStorageAccountName>` and `<yourResourceGroup>` with your information.
110110

111-
```PowerShell
111+
```powershell
112112
Set-AzStorageAccount -ResourceGroupName <yourResourceGroup> -Name <yourStorageAccountName> -EnableLargeFileShare
113113
```
114114

@@ -138,7 +138,7 @@ az storage share create --account-name <yourStorageAccountName> --account-key <y
138138

139139
To create a large file share, use the following command. Replace `<YourStorageAccountName>`, `<YourStorageAccountKey>`, and `<YourStorageAccountFileShareName>` with your information.
140140

141-
```PowerShell
141+
```powershell
142142
##Config
143143
$storageAccountName = "<YourStorageAccountName>"
144144
$storageAccountKey = "<YourStorageAccountKey>"
@@ -171,7 +171,7 @@ az storage share update --account-name <yourStorageAccountName> --account-key <y
171171

172172
To set the quota to the maximum size, use the following command. Replace `<YourStorageAccountName>`, `<YourStorageAccountKey>`, and `<YourStorageAccountFileShareName>` with your information.
173173

174-
```PowerShell
174+
```powershell
175175
##Config
176176
$storageAccountName = "<YourStorageAccountName>"
177177
$storageAccountKey = "<YourStorageAccountKey>"

articles/storage/files/storage-how-to-use-files-linux.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -221,7 +221,7 @@ sudo modinfo -p cifs | grep disable_legacy_dialects
221221
222222
This command should output the following message:
223223
224-
```Output
224+
```output
225225
disable_legacy_dialects: To improve security it may be helpful to restrict the ability to override the default dialects (SMB2.1, SMB3 and SMB3.02) on mount with old dialects (CIFS/SMB1 and SMB2) since vers=1.0 (CIFS/SMB1) and vers=2.0 are weaker and less secure. Default: n/N/0 (bool)
226226
```
227227

0 commit comments

Comments
 (0)