diff --git a/src/Sql/Sql/help/Clear-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md b/src/Sql/Sql/help/Clear-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md index 8a59c9dbcba5..9dac0823050a 100644 --- a/src/Sql/Sql/help/Clear-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md +++ b/src/Sql/Sql/help/Clear-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md @@ -41,7 +41,7 @@ Get-AzSqlDatabase ` -DatabaseName "Database01" ` | Clear-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline ` -RuleId "VA2108" ` - -AppliesToMaster + -RuleAppliesToMaster ``` ## PARAMETERS diff --git a/src/Sql/Sql/help/Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md b/src/Sql/Sql/help/Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md index 5a0a5eb21f29..1be943730b97 100644 --- a/src/Sql/Sql/help/Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md +++ b/src/Sql/Sql/help/Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md @@ -49,7 +49,7 @@ Get-AzSqlInstanceDatabase ` -Name "Database01" ` | Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline ` -RuleId "VA2108" ` - -AppliesToMaster + -RuleAppliesToMaster ``` ## PARAMETERS diff --git a/src/Sql/Sql/help/Convert-AzSqlDatabaseVulnerabilityAssessmentScan.md b/src/Sql/Sql/help/Convert-AzSqlDatabaseVulnerabilityAssessmentScan.md index e6fb95ef56ed..53d1b8e8f6da 100644 --- a/src/Sql/Sql/help/Convert-AzSqlDatabaseVulnerabilityAssessmentScan.md +++ b/src/Sql/Sql/help/Convert-AzSqlDatabaseVulnerabilityAssessmentScan.md @@ -26,7 +26,7 @@ Note that you need to run *Enable-AzSqlServerAdvancedDataSecurity* and *Update-A ### Example 1: Converts vulnerability assessment scan results and saves them to local disk ```powershell -Set-AzSqlServerVulnerabilityAssessmentSettings ` +Update-AzSqlServerVulnerabilityAssessmentSetting ` -ResourceGroupName "ResourceGroup01" ` -ServerName "Server01" ` -StorageAccountName "mystorage" @@ -37,7 +37,7 @@ Start-AzSqlDatabaseVulnerabilityAssessmentScan ` -DatabaseName "Database01" ` -ScanId "myScan" -$convert_scan_results = Convert-AzSqlDatabaseVulnerabilityAssessmentScan` +$convert_scan_results = Convert-AzSqlDatabaseVulnerabilityAssessmentScan ` -ResourceGroupName "ResourceGroup01" ` -ServerName "Server01" ` -DatabaseName "Database01" ` diff --git a/src/Sql/Sql/help/Convert-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md b/src/Sql/Sql/help/Convert-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md index 31885235b7bd..93fb172d29e3 100644 --- a/src/Sql/Sql/help/Convert-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md +++ b/src/Sql/Sql/help/Convert-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md @@ -45,7 +45,7 @@ Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan ` -DatabaseName "Database01" ` -ScanId "myScan" -$convert_scan_results = Convert-AzSqlInstanceDatabaseVulnerabilityAssessmentScan` +$convert_scan_results = Convert-AzSqlInstanceDatabaseVulnerabilityAssessmentScan ` -ResourceGroupName "ResourceGroup01" ` -InstanceName "ManagedInstance01" ` -DatabaseName "Database01" ` diff --git a/src/Sql/Sql/help/Get-AzSqlDatabaseLongTermRetentionBackup.md b/src/Sql/Sql/help/Get-AzSqlDatabaseLongTermRetentionBackup.md index 3c221d871459..eba366db583d 100644 --- a/src/Sql/Sql/help/Get-AzSqlDatabaseLongTermRetentionBackup.md +++ b/src/Sql/Sql/help/Get-AzSqlDatabaseLongTermRetentionBackup.md @@ -97,7 +97,7 @@ This command gets all long term retention backups for all databases (which may b ### Example 2: Get all backups for a location under a resource group ```powershell -Get-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ResourceGroup resourceGroup01 +Get-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ResourceGroupName resourceGroup01 ``` ```output diff --git a/src/Sql/Sql/help/Get-AzSqlInstance.md b/src/Sql/Sql/help/Get-AzSqlInstance.md index 40fece6e1c7d..afa40a527267 100644 --- a/src/Sql/Sql/help/Get-AzSqlInstance.md +++ b/src/Sql/Sql/help/Get-AzSqlInstance.md @@ -252,7 +252,7 @@ This command gets information about all instances within the instance pool "inst ### Example 6: Get all instances within an instance pool using instance pool resource identifier ```powershell -Get-AzSqlInstance -InstancePoolResourceIdentifier "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/resourcegroup01/providers/Microsoft.Sql/instancePools/instancePool0" +Get-AzSqlInstance -InstancePoolResourceId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/resourcegroup01/providers/Microsoft.Sql/instancePools/instancePool0" ``` ```output @@ -297,7 +297,7 @@ This command gets information about all instances within the instance pool "inst ### Example 7: Get a managed instance using its resource identifier ```powershell -Get-AzSqlInstance -ResourceIdentifier "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/resourcegroup01/providers/Microsoft.Sql/managedInstances/managedInstance1" +Get-AzSqlInstance -ResourceId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/resourcegroup01/providers/Microsoft.Sql/managedInstances/managedInstance1" ``` ```output diff --git a/src/Sql/Sql/help/Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md b/src/Sql/Sql/help/Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md index 4a44211483d1..e827647a0383 100644 --- a/src/Sql/Sql/help/Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md +++ b/src/Sql/Sql/help/Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md @@ -54,7 +54,7 @@ This command gets the short term retention policy for database01. ### Example 2 ```powershell -Get-AzSqlInstanceDatabase -ResourceGroupName resourcegroup01 -InstanceName instance01 -DatabaseName database01 | Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy +Get-AzSqlInstanceDatabase -ResourceGroupName resourcegroup01 -InstanceName instance01 -Name database01 | Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy ``` ```output diff --git a/src/Sql/Sql/help/Get-AzSqlInstanceKeyVaultKey.md b/src/Sql/Sql/help/Get-AzSqlInstanceKeyVaultKey.md index c31b658bc6ae..09e670d84c70 100644 --- a/src/Sql/Sql/help/Get-AzSqlInstanceKeyVaultKey.md +++ b/src/Sql/Sql/help/Get-AzSqlInstanceKeyVaultKey.md @@ -72,7 +72,7 @@ This command gets the Key Vault key with Id 'https://contoso.vault.azure.net/key ### Example 3: Using instance object ```powershell $managedInstance = Get-AzSqlInstance -Name 'ContosoManagedInstanceName' -ResourceGroupName 'ContosoResourceGroup' -Get-AzSqlInstanceKeyVaultKey -ManagedInstance $managedInstance -KeyId 'https://contoso.vault.azure.net/keys/contosokey/01234567890123456789012345678901' +Get-AzSqlInstanceKeyVaultKey -Instance $managedInstance -KeyId 'https://contoso.vault.azure.net/keys/contosokey/01234567890123456789012345678901' ``` ```output diff --git a/src/Sql/Sql/help/Get-AzSqlInstanceTransparentDataEncryptionProtector.md b/src/Sql/Sql/help/Get-AzSqlInstanceTransparentDataEncryptionProtector.md index 50fa8c95c0dc..9c02270ce8a2 100644 --- a/src/Sql/Sql/help/Get-AzSqlInstanceTransparentDataEncryptionProtector.md +++ b/src/Sql/Sql/help/Get-AzSqlInstanceTransparentDataEncryptionProtector.md @@ -53,7 +53,7 @@ This command gets the TDE protector for the managed instance named ContosoManage ### Example 2: Using managed instance object ```powershell $managedInstance = Get-AzSqlInstance -Name 'ContosoManagedInstanceName' -ResourceGroupName 'ContosoResourceGroup' -Get-AzSqlInstanceTransparentDataEncryptionProtector -Instance $managedInstance 'ContosoManagedInstanceName' +Get-AzSqlInstanceTransparentDataEncryptionProtector -Instance $managedInstance ``` ```output diff --git a/src/Sql/Sql/help/Get-AzSqlServerTransparentDataEncryptionProtector.md b/src/Sql/Sql/help/Get-AzSqlServerTransparentDataEncryptionProtector.md index 0d3ddb69d0c6..f379fc513b09 100644 --- a/src/Sql/Sql/help/Get-AzSqlServerTransparentDataEncryptionProtector.md +++ b/src/Sql/Sql/help/Get-AzSqlServerTransparentDataEncryptionProtector.md @@ -24,7 +24,7 @@ The Get-AzSqlServerTransparentDataEncryptionProtector cmdlet gets information ab ### Example 1: Get the Transparent Data Encryption (TDE) protector ```powershell -Get-AzSqlServerTransparentDataEncryptionProtector -ServerName 'ContosoServer' -ResourceGroup 'ContosoResourceGroup' +Get-AzSqlServerTransparentDataEncryptionProtector -ServerName 'ContosoServer' -ResourceGroupName 'ContosoResourceGroup' ``` ```output diff --git a/src/Sql/Sql/help/Get-AzSqlSyncSchema.md b/src/Sql/Sql/help/Get-AzSqlSyncSchema.md index eab50fa181fe..afe14b628a21 100644 --- a/src/Sql/Sql/help/Get-AzSqlSyncSchema.md +++ b/src/Sql/Sql/help/Get-AzSqlSyncSchema.md @@ -38,7 +38,7 @@ This command gets the sync schema for the hub database in the sync group syncGro ### Example 2: Get the sync schema for a hub database, and expand Tables ```powershell -Get-AzSqlSyncSchema -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "database01" -SyncGroupName "syncGroup01" | select -ExpandProperty Tables +Get-AzSqlSyncSchema -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "database01" -SyncGroupName "syncGroup01" | Select-Object -ExpandProperty Tables ``` ```output diff --git a/src/Sql/Sql/help/Remove-AzSqlDatabaseLongTermRetentionBackup.md b/src/Sql/Sql/help/Remove-AzSqlDatabaseLongTermRetentionBackup.md index ebaf3b40a7b8..16c8dd4c2381 100644 --- a/src/Sql/Sql/help/Remove-AzSqlDatabaseLongTermRetentionBackup.md +++ b/src/Sql/Sql/help/Remove-AzSqlDatabaseLongTermRetentionBackup.md @@ -38,7 +38,7 @@ The **Remove-AzSqlDatabaseLongTermRetentionBackup** cmdlet deletes the backup sp ### Example 1: Delete a single backup with resource group ```powershell -Remove-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ServerName server01 -DatabaseName database01 -BackupName "601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000" -ResourceGrouName resourcegroup01 +Remove-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ServerName server01 -DatabaseName database01 -BackupName "601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000" -ResourceGroupName resourcegroup01 ``` ```output diff --git a/src/Sql/Sql/help/Remove-AzSqlInstancePool.md b/src/Sql/Sql/help/Remove-AzSqlInstancePool.md index 116febb39350..d3732a6e2fe9 100644 --- a/src/Sql/Sql/help/Remove-AzSqlInstancePool.md +++ b/src/Sql/Sql/help/Remove-AzSqlInstancePool.md @@ -37,7 +37,7 @@ The **Remove-AzSqlInstancePool** cmdlet removes an Azure SQL Instance pool. ### Example 1: Remove an instance pool ```powershell -Remove-AzSqlInstancePool -ResourceGroup resourcegroup01 -Name instancePool0 +Remove-AzSqlInstancePool -ResourceGroupName resourcegroup01 -Name instancePool0 ``` ### Example 2: Remove an instance pool by its resource identifier @@ -47,7 +47,7 @@ Remove-AzSqlInstancePool -ResourceId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxx ### Example 3: Remove an instance pool by an instance pool object ```powershell -Get-AzSqlInstancePool -ResourceGroup resourcegroup01 -Name instancePool0 +Get-AzSqlInstancePool -ResourceGroupName resourcegroup01 -Name instancePool0 Remove-AzSqlInstancePool -InputObject $instancePool ``` diff --git a/src/Sql/Sql/help/Set-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md b/src/Sql/Sql/help/Set-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md index 04ff033765db..9121027b1494 100644 --- a/src/Sql/Sql/help/Set-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md +++ b/src/Sql/Sql/help/Set-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md @@ -107,7 +107,7 @@ BaselineResult : @( 'Principal1', 'db_ddladmin', 'SQL_USER', 'None') , @( ```powershell Get-AzSqlDatabase -ResourceGroupName "ResourceGroup01" ` -ServerName "Server01" ` - | where {$_.DatabaseName -ne "master"} ` + | Where-Object {$_.DatabaseName -ne "master"} ` | Set-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline ` -RuleId "VA2108" ` -BaselineResult @( 'Principal1', 'db_ddladmin', 'SQL_USER', 'None') , @( 'Principal2', 'db_ddladmin', 'SQL_USER', 'None') diff --git a/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md b/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md index 8ec3c00b4c5e..3f5fcbc7d154 100644 --- a/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md +++ b/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md @@ -54,7 +54,7 @@ This command sets the short term retention policy for database01 to 35 days. ### Example 2 ```powershell -Get-AzSqlInstanceDatabase -ResourceGroupName resourcegroup01 -InstanceName server01 -DatabaseName database01 | Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy -RetentionDays 35 +Get-AzSqlInstanceDatabase -ResourceGroupName resourcegroup01 -InstanceName server01 -Name database01 | Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy -RetentionDays 35 ``` ```output @@ -69,7 +69,7 @@ This command sets the short term retention policy for database01 to 35 days via ### Example 3 ```powershell -Set-AzSqlDeletedInstanceDatabaseBackup -ResourceGroupName "ContosoResourceGroup" -InstanceName "ContosoServer" -DatabaseName "DB1" | Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy -RetentionDays 8 +Get-AzSqlDeletedInstanceDatabaseBackup -ResourceGroupName "ContosoResourceGroup" -InstanceName "ContosoServer" -DatabaseName "DB1" | Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy -RetentionDays 8 ``` ```output diff --git a/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseSensitivityClassification.md b/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseSensitivityClassification.md index 79f7648f919d..4b53d8e3b1f0 100644 --- a/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseSensitivityClassification.md +++ b/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseSensitivityClassification.md @@ -52,7 +52,7 @@ Get-AzSqlInstanceDatabaseSensitivityRecommendation -ResourceGroupName resourceGr ### Example 3: Set information type and sensitivity label of a column in an Azure SQL Managed Instance database, using piping. ```powershell -Get-AzSqlInstanceDatabase -ResourceGroupName resourceGroup -InstanceName managedInstance -DatabaseName database | Set-AzSqlInstanceDatabaseSensitivityClassification -SchemaName schema -TableName table -ColumnName column -InformationType informationType -SensitivityLabel label +Get-AzSqlInstanceDatabase -ResourceGroupName resourceGroup -InstanceName managedInstance -Name database | Set-AzSqlInstanceDatabaseSensitivityClassification -SchemaName schema -TableName table -ColumnName column -InformationType informationType -SensitivityLabel label ``` ## PARAMETERS diff --git a/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md b/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md index acb7a2cea96b..9f3771c0b80a 100644 --- a/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md +++ b/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md @@ -90,7 +90,7 @@ BaselineResult : @( 'Principal1', 'db_ddladmin', 'SQL_USER', 'None') , @( ```powershell Get-AzSqlInstanceDatabase -ResourceGroupName "ResourceGroup01" ` -InstanceName "ManagedInstance01" ` - | where {$_.Name -ne "master"} ` + | Where-Object {$_.Name -ne "master"} ` | Set-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline ` -RuleId "VA2108" ` -BaselineResult @( 'Principal1', 'db_ddladmin', 'SQL_USER', 'None') , @( 'Principal2', 'db_ddladmin', 'SQL_USER', 'None') diff --git a/src/Sql/Sql/help/Set-AzSqlServerTransparentDataEncryptionProtector.md b/src/Sql/Sql/help/Set-AzSqlServerTransparentDataEncryptionProtector.md index c0bca19e82c7..ad7121d8e541 100644 --- a/src/Sql/Sql/help/Set-AzSqlServerTransparentDataEncryptionProtector.md +++ b/src/Sql/Sql/help/Set-AzSqlServerTransparentDataEncryptionProtector.md @@ -26,7 +26,7 @@ Changing the TDE protector type will rotate the protector. ### Example 1: Set the Transparent Data Encryption (TDE) protector type to ServiceManaged ```powershell -Set-AzSqlServerTransparentDataEncryptionProtector -Type ServiceManaged -ServerName 'ContosoServer' -ResourceGroup 'ContosoResourceGroup' +Set-AzSqlServerTransparentDataEncryptionProtector -Type ServiceManaged -ServerName 'ContosoServer' -ResourceGroupName 'ContosoResourceGroup' ``` ```output @@ -39,7 +39,7 @@ This command updates a server's TDE protector type to Service Managed. ### Example 2: Set the Transparent Data Encryption protector type to Azure Key Vault ```powershell -Set-AzSqlServerTransparentDataEncryptionProtector -Type AzureKeyVault -KeyId 'https://contoso.vault.azure.net/keys/contosokey/01234567890123456789012345678901' -ServerName 'ContosoServer' -ResourceGroup 'ContosoResourceGroup' +Set-AzSqlServerTransparentDataEncryptionProtector -Type AzureKeyVault -KeyId 'https://contoso.vault.azure.net/keys/contosokey/01234567890123456789012345678901' -ServerName 'ContosoServer' -ResourceGroupName 'ContosoResourceGroup' ``` ```output diff --git a/src/Sql/Sql/help/Start-AzSqlDatabaseExecuteIndexRecommendation.md b/src/Sql/Sql/help/Start-AzSqlDatabaseExecuteIndexRecommendation.md index 7148878078e0..901000141962 100644 --- a/src/Sql/Sql/help/Start-AzSqlDatabaseExecuteIndexRecommendation.md +++ b/src/Sql/Sql/help/Start-AzSqlDatabaseExecuteIndexRecommendation.md @@ -26,7 +26,7 @@ The **Start-AzSqlDatabaseExecuteIndexRecommendation** cmdlet starts the workflow ### Example 1: Run an index recommendation ```powershell -Start-AzSqlDatabaseExecuteIndexRecommendation -ResourceGroup "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -IndexRecommendationName "INDEX_NAME" +Start-AzSqlDatabaseExecuteIndexRecommendation -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -IndexRecommendationName "INDEX_NAME" ``` This command runs an index recommendation. diff --git a/src/Sql/Sql/help/Start-AzSqlDatabaseVulnerabilityAssessmentScan.md b/src/Sql/Sql/help/Start-AzSqlDatabaseVulnerabilityAssessmentScan.md index ee1ce266a50b..eca0f497d523 100644 --- a/src/Sql/Sql/help/Start-AzSqlDatabaseVulnerabilityAssessmentScan.md +++ b/src/Sql/Sql/help/Start-AzSqlDatabaseVulnerabilityAssessmentScan.md @@ -131,8 +131,8 @@ NumberOfFailedSecurityChecks : 9 Get-AzSqlDatabase ` -ResourceGroupName "ResourceGroup01" ` -ServerName "Server01" ` - | where {$_.DatabaseName -ne "master"} ` - | Start-AzSqlDatabaseVulnerabilityAssessmentScan + | Where-Object {$_.DatabaseName -ne "master"} ` + | Start-AzSqlDatabaseVulnerabilityAssessmentScan ``` ```output diff --git a/src/Sql/Sql/help/Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md b/src/Sql/Sql/help/Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md index 6b3e94827087..0043992f3a2d 100644 --- a/src/Sql/Sql/help/Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md +++ b/src/Sql/Sql/help/Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md @@ -139,8 +139,8 @@ NumberOfFailedSecurityChecks : 9 Get-AzSqlInstanceDatabase ` -ResourceGroupName "ResourceGroup01" ` -InstanceName "ManagedInstance01" ` - | where {$_.Name -ne "master"} ` - | Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan + | Where-Object {$_.Name -ne "master"} ` + | Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan ``` ```output diff --git a/src/Sql/Sql/help/Start-AzSqlSyncGroupSync.md b/src/Sql/Sql/help/Start-AzSqlSyncGroupSync.md index b50e53bf5945..303e546f9ad9 100644 --- a/src/Sql/Sql/help/Start-AzSqlSyncGroupSync.md +++ b/src/Sql/Sql/help/Start-AzSqlSyncGroupSync.md @@ -25,7 +25,7 @@ The **Start-AzSqlSyncGroupSync** cmdlet starts a sync group synchronization. ### Example 1 ```powershell -Start-AzSqlSyncGroupSync -SyncGroupName mysg [-ServerName] mysrv [-DatabaseName] mydb [-ResourceGroupName] myrg +Start-AzSqlSyncGroupSync -SyncGroupName mysg -ServerName mysrv -DatabaseName mydb -ResourceGroupName myrg ``` This command starts a round of synchronization for the sync group mysg. diff --git a/src/Sql/Sql/help/Stop-AzSqlDatabaseExecuteIndexRecommendation.md b/src/Sql/Sql/help/Stop-AzSqlDatabaseExecuteIndexRecommendation.md index 5f986747d997..148fe18516fd 100644 --- a/src/Sql/Sql/help/Stop-AzSqlDatabaseExecuteIndexRecommendation.md +++ b/src/Sql/Sql/help/Stop-AzSqlDatabaseExecuteIndexRecommendation.md @@ -26,7 +26,7 @@ The **Stop-AzSqlDatabaseExecuteIndexRecommendation** cmdlet stops the workflow t ### Example 1: Stop running an index recommendation ```powershell -Stop-AzSqlDatabaseExecuteIndexRecommendation -ResourceGroup "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -IndexRecommendationName "INDEX_NAME" +Stop-AzSqlDatabaseExecuteIndexRecommendation -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -IndexRecommendationName "INDEX_NAME" ``` This command stops running an index recommendation. diff --git a/src/Sql/Sql/help/Stop-AzSqlSyncGroupSync.md b/src/Sql/Sql/help/Stop-AzSqlSyncGroupSync.md index 7f0133643198..3c81333640f5 100644 --- a/src/Sql/Sql/help/Stop-AzSqlSyncGroupSync.md +++ b/src/Sql/Sql/help/Stop-AzSqlSyncGroupSync.md @@ -25,7 +25,7 @@ The **Stop-AzSqlSyncGroupSync** cmdlet stops a sync group synchronization. ### Example 1 ```powershell -Stop-AzSqlSyncGroupSync -SyncGroupName mysg [-ServerName] mysrv [-DatabaseName] mydb [-ResourceGroupName] myrg +Stop-AzSqlSyncGroupSync -SyncGroupName mysg -ServerName mysrv -DatabaseName mydb -ResourceGroupName myrg ``` This command stops the synchronization which is ongoing for the sync group mysg. diff --git a/src/Sql/Sql/help/Update-AzSqlDatabaseVulnerabilityAssessmentSetting.md b/src/Sql/Sql/help/Update-AzSqlDatabaseVulnerabilityAssessmentSetting.md index 4975c0538dbc..d1b8531c6d21 100644 --- a/src/Sql/Sql/help/Update-AzSqlDatabaseVulnerabilityAssessmentSetting.md +++ b/src/Sql/Sql/help/Update-AzSqlDatabaseVulnerabilityAssessmentSetting.md @@ -129,7 +129,7 @@ This command updated the Vulnerability Assessment settings on Database02 from th ```powershell Get-AzSqlDatabase -ResourceGroupName "ResourceGroup01" ` -ServerName $"Server01" ` - | where {$_.DatabaseName -ne "master"} ` + | Where-Object {$_.DatabaseName -ne "master"} ` | Update-AzSqlDatabaseVulnerabilityAssessmentSetting ` -StorageAccountName "mystorage" ` -ScanResultsContainerName "vulnerability-assessment" ` diff --git a/src/Sql/Sql/help/Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting.md b/src/Sql/Sql/help/Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting.md index 7ec9fa5470b3..c2a3e8544423 100644 --- a/src/Sql/Sql/help/Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting.md +++ b/src/Sql/Sql/help/Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting.md @@ -129,7 +129,7 @@ This command updated the Vulnerability Assessment settings on Database02 from th ```powershell Get-AzSqlInstanceDatabase -ResourceGroupName "ResourceGroup01" ` -InstanceName $"ManagedInstance01" ` - | where {$_.Name -ne "master"} ` + | Where-Object {$_.Name -ne "master"} ` | Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting ` -StorageAccountName "mystorage" ` -ScanResultsContainerName "vulnerability-assessment" ` diff --git a/src/Sql/Sql/help/Update-AzSqlInstanceVulnerabilityAssessmentSetting.md b/src/Sql/Sql/help/Update-AzSqlInstanceVulnerabilityAssessmentSetting.md index 5b906c390feb..e3bd89ff660d 100644 --- a/src/Sql/Sql/help/Update-AzSqlInstanceVulnerabilityAssessmentSetting.md +++ b/src/Sql/Sql/help/Update-AzSqlInstanceVulnerabilityAssessmentSetting.md @@ -100,7 +100,7 @@ Get-AzSqlInstanceVulnerabilityAssessmentSetting ` -InstanceName "ManagedInstance01" ` | Update-AzSqlInstanceVulnerabilityAssessmentSetting ` -ResourceGroupName "ResourceGroup02" ` - -ManagedInstanceName "ManagedInstance02" ` + -InstanceName "ManagedInstance02" ` ``` ```output