From 958fe1293e87d26afdafb880e57692b5b0b63d18 Mon Sep 17 00:00:00 2001 From: "v-yuzhichen@microsoft.com" Date: Fri, 15 Apr 2022 14:24:11 +0800 Subject: [PATCH 1/2] Fix Az.Sql Syntax Errors --- .../Clear-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md | 2 +- ...zSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md | 2 +- .../help/Convert-AzSqlDatabaseVulnerabilityAssessmentScan.md | 4 ++-- ...onvert-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md | 2 +- src/Sql/Sql/help/Get-AzSqlDatabaseLongTermRetentionBackup.md | 2 +- src/Sql/Sql/help/Get-AzSqlInstance.md | 4 ++-- ...Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md | 2 +- src/Sql/Sql/help/Get-AzSqlInstanceKeyVaultKey.md | 2 +- .../Get-AzSqlInstanceTransparentDataEncryptionProtector.md | 2 +- .../help/Get-AzSqlServerTransparentDataEncryptionProtector.md | 2 +- src/Sql/Sql/help/Get-AzSqlSyncSchema.md | 2 +- .../Sql/help/Remove-AzSqlDatabaseLongTermRetentionBackup.md | 2 +- src/Sql/Sql/help/Remove-AzSqlInstancePool.md | 4 ++-- .../Set-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md | 2 +- ...Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md | 4 ++-- .../Set-AzSqlInstanceDatabaseSensitivityClassification.md | 2 +- ...zSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md | 2 +- .../help/Set-AzSqlServerTransparentDataEncryptionProtector.md | 4 ++-- .../Sql/help/Start-AzSqlDatabaseExecuteIndexRecommendation.md | 2 +- .../help/Start-AzSqlDatabaseVulnerabilityAssessmentScan.md | 2 +- .../Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md | 2 +- src/Sql/Sql/help/Start-AzSqlSyncGroupSync.md | 2 +- .../Sql/help/Stop-AzSqlDatabaseExecuteIndexRecommendation.md | 2 +- src/Sql/Sql/help/Stop-AzSqlSyncGroupSync.md | 2 +- .../Update-AzSqlDatabaseVulnerabilityAssessmentSetting.md | 2 +- ...ate-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting.md | 2 +- .../Update-AzSqlInstanceVulnerabilityAssessmentSetting.md | 2 +- 27 files changed, 32 insertions(+), 32 deletions(-) diff --git a/src/Sql/Sql/help/Clear-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md b/src/Sql/Sql/help/Clear-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md index 8a59c9dbcba5..9dac0823050a 100644 --- a/src/Sql/Sql/help/Clear-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md +++ b/src/Sql/Sql/help/Clear-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md @@ -41,7 +41,7 @@ Get-AzSqlDatabase ` -DatabaseName "Database01" ` | Clear-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline ` -RuleId "VA2108" ` - -AppliesToMaster + -RuleAppliesToMaster ``` ## PARAMETERS diff --git a/src/Sql/Sql/help/Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md b/src/Sql/Sql/help/Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md index 5a0a5eb21f29..1be943730b97 100644 --- a/src/Sql/Sql/help/Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md +++ b/src/Sql/Sql/help/Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md @@ -49,7 +49,7 @@ Get-AzSqlInstanceDatabase ` -Name "Database01" ` | Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline ` -RuleId "VA2108" ` - -AppliesToMaster + -RuleAppliesToMaster ``` ## PARAMETERS diff --git a/src/Sql/Sql/help/Convert-AzSqlDatabaseVulnerabilityAssessmentScan.md b/src/Sql/Sql/help/Convert-AzSqlDatabaseVulnerabilityAssessmentScan.md index e6fb95ef56ed..53d1b8e8f6da 100644 --- a/src/Sql/Sql/help/Convert-AzSqlDatabaseVulnerabilityAssessmentScan.md +++ b/src/Sql/Sql/help/Convert-AzSqlDatabaseVulnerabilityAssessmentScan.md @@ -26,7 +26,7 @@ Note that you need to run *Enable-AzSqlServerAdvancedDataSecurity* and *Update-A ### Example 1: Converts vulnerability assessment scan results and saves them to local disk ```powershell -Set-AzSqlServerVulnerabilityAssessmentSettings ` +Update-AzSqlServerVulnerabilityAssessmentSetting ` -ResourceGroupName "ResourceGroup01" ` -ServerName "Server01" ` -StorageAccountName "mystorage" @@ -37,7 +37,7 @@ Start-AzSqlDatabaseVulnerabilityAssessmentScan ` -DatabaseName "Database01" ` -ScanId "myScan" -$convert_scan_results = Convert-AzSqlDatabaseVulnerabilityAssessmentScan` +$convert_scan_results = Convert-AzSqlDatabaseVulnerabilityAssessmentScan ` -ResourceGroupName "ResourceGroup01" ` -ServerName "Server01" ` -DatabaseName "Database01" ` diff --git a/src/Sql/Sql/help/Convert-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md b/src/Sql/Sql/help/Convert-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md index 31885235b7bd..93fb172d29e3 100644 --- a/src/Sql/Sql/help/Convert-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md +++ b/src/Sql/Sql/help/Convert-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md @@ -45,7 +45,7 @@ Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan ` -DatabaseName "Database01" ` -ScanId "myScan" -$convert_scan_results = Convert-AzSqlInstanceDatabaseVulnerabilityAssessmentScan` +$convert_scan_results = Convert-AzSqlInstanceDatabaseVulnerabilityAssessmentScan ` -ResourceGroupName "ResourceGroup01" ` -InstanceName "ManagedInstance01" ` -DatabaseName "Database01" ` diff --git a/src/Sql/Sql/help/Get-AzSqlDatabaseLongTermRetentionBackup.md b/src/Sql/Sql/help/Get-AzSqlDatabaseLongTermRetentionBackup.md index 3c221d871459..eba366db583d 100644 --- a/src/Sql/Sql/help/Get-AzSqlDatabaseLongTermRetentionBackup.md +++ b/src/Sql/Sql/help/Get-AzSqlDatabaseLongTermRetentionBackup.md @@ -97,7 +97,7 @@ This command gets all long term retention backups for all databases (which may b ### Example 2: Get all backups for a location under a resource group ```powershell -Get-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ResourceGroup resourceGroup01 +Get-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ResourceGroupName resourceGroup01 ``` ```output diff --git a/src/Sql/Sql/help/Get-AzSqlInstance.md b/src/Sql/Sql/help/Get-AzSqlInstance.md index affb2825bb6a..0dab3504483c 100644 --- a/src/Sql/Sql/help/Get-AzSqlInstance.md +++ b/src/Sql/Sql/help/Get-AzSqlInstance.md @@ -252,7 +252,7 @@ This command gets information about all instances within the instance pool "inst ### Example 6: Get all instances within an instance pool using instance pool resource identifier ```powershell -Get-AzSqlInstance -InstancePoolResourceIdentifier "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/resourcegroup01/providers/Microsoft.Sql/instancePools/instancePool0" +Get-AzSqlInstance -InstancePoolResourceId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/resourcegroup01/providers/Microsoft.Sql/instancePools/instancePool0" ``` ```output @@ -297,7 +297,7 @@ This command gets information about all instances within the instance pool "inst ### Example 7: Get a managed instance using its resource identifier ```powershell -Get-AzSqlInstance -ResourceIdentifier "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/resourcegroup01/providers/Microsoft.Sql/managedInstances/managedInstance1" +Get-AzSqlInstance -ResourceId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/resourcegroup01/providers/Microsoft.Sql/managedInstances/managedInstance1" ``` ```output diff --git a/src/Sql/Sql/help/Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md b/src/Sql/Sql/help/Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md index 4a44211483d1..e827647a0383 100644 --- a/src/Sql/Sql/help/Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md +++ b/src/Sql/Sql/help/Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md @@ -54,7 +54,7 @@ This command gets the short term retention policy for database01. ### Example 2 ```powershell -Get-AzSqlInstanceDatabase -ResourceGroupName resourcegroup01 -InstanceName instance01 -DatabaseName database01 | Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy +Get-AzSqlInstanceDatabase -ResourceGroupName resourcegroup01 -InstanceName instance01 -Name database01 | Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy ``` ```output diff --git a/src/Sql/Sql/help/Get-AzSqlInstanceKeyVaultKey.md b/src/Sql/Sql/help/Get-AzSqlInstanceKeyVaultKey.md index c31b658bc6ae..09e670d84c70 100644 --- a/src/Sql/Sql/help/Get-AzSqlInstanceKeyVaultKey.md +++ b/src/Sql/Sql/help/Get-AzSqlInstanceKeyVaultKey.md @@ -72,7 +72,7 @@ This command gets the Key Vault key with Id 'https://contoso.vault.azure.net/key ### Example 3: Using instance object ```powershell $managedInstance = Get-AzSqlInstance -Name 'ContosoManagedInstanceName' -ResourceGroupName 'ContosoResourceGroup' -Get-AzSqlInstanceKeyVaultKey -ManagedInstance $managedInstance -KeyId 'https://contoso.vault.azure.net/keys/contosokey/01234567890123456789012345678901' +Get-AzSqlInstanceKeyVaultKey -Instance $managedInstance -KeyId 'https://contoso.vault.azure.net/keys/contosokey/01234567890123456789012345678901' ``` ```output diff --git a/src/Sql/Sql/help/Get-AzSqlInstanceTransparentDataEncryptionProtector.md b/src/Sql/Sql/help/Get-AzSqlInstanceTransparentDataEncryptionProtector.md index 50fa8c95c0dc..f41b1bb28ce3 100644 --- a/src/Sql/Sql/help/Get-AzSqlInstanceTransparentDataEncryptionProtector.md +++ b/src/Sql/Sql/help/Get-AzSqlInstanceTransparentDataEncryptionProtector.md @@ -53,7 +53,7 @@ This command gets the TDE protector for the managed instance named ContosoManage ### Example 2: Using managed instance object ```powershell $managedInstance = Get-AzSqlInstance -Name 'ContosoManagedInstanceName' -ResourceGroupName 'ContosoResourceGroup' -Get-AzSqlInstanceTransparentDataEncryptionProtector -Instance $managedInstance 'ContosoManagedInstanceName' +Get-AzSqlInstanceTransparentDataEncryptionProtector -Instance $managedInstance -InstanceName 'ContosoManagedInstanceName' ``` ```output diff --git a/src/Sql/Sql/help/Get-AzSqlServerTransparentDataEncryptionProtector.md b/src/Sql/Sql/help/Get-AzSqlServerTransparentDataEncryptionProtector.md index dbad76021146..515cbe7bace7 100644 --- a/src/Sql/Sql/help/Get-AzSqlServerTransparentDataEncryptionProtector.md +++ b/src/Sql/Sql/help/Get-AzSqlServerTransparentDataEncryptionProtector.md @@ -24,7 +24,7 @@ The Get-AzSqlServerTransparentDataEncryptionProtector cmdlet gets information ab ### Example 1: Get the Transparent Data Encryption (TDE) protector ```powershell -Get-AzSqlServerTransparentDataEncryptionProtector -ServerName 'ContosoServer' -ResourceGroup 'ContosoResourceGroup' +Get-AzSqlServerTransparentDataEncryptionProtector -ServerName 'ContosoServer' -ResourceGroupName 'ContosoResourceGroup' ``` ```output diff --git a/src/Sql/Sql/help/Get-AzSqlSyncSchema.md b/src/Sql/Sql/help/Get-AzSqlSyncSchema.md index eab50fa181fe..afe14b628a21 100644 --- a/src/Sql/Sql/help/Get-AzSqlSyncSchema.md +++ b/src/Sql/Sql/help/Get-AzSqlSyncSchema.md @@ -38,7 +38,7 @@ This command gets the sync schema for the hub database in the sync group syncGro ### Example 2: Get the sync schema for a hub database, and expand Tables ```powershell -Get-AzSqlSyncSchema -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "database01" -SyncGroupName "syncGroup01" | select -ExpandProperty Tables +Get-AzSqlSyncSchema -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "database01" -SyncGroupName "syncGroup01" | Select-Object -ExpandProperty Tables ``` ```output diff --git a/src/Sql/Sql/help/Remove-AzSqlDatabaseLongTermRetentionBackup.md b/src/Sql/Sql/help/Remove-AzSqlDatabaseLongTermRetentionBackup.md index ebaf3b40a7b8..16c8dd4c2381 100644 --- a/src/Sql/Sql/help/Remove-AzSqlDatabaseLongTermRetentionBackup.md +++ b/src/Sql/Sql/help/Remove-AzSqlDatabaseLongTermRetentionBackup.md @@ -38,7 +38,7 @@ The **Remove-AzSqlDatabaseLongTermRetentionBackup** cmdlet deletes the backup sp ### Example 1: Delete a single backup with resource group ```powershell -Remove-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ServerName server01 -DatabaseName database01 -BackupName "601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000" -ResourceGrouName resourcegroup01 +Remove-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ServerName server01 -DatabaseName database01 -BackupName "601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000" -ResourceGroupName resourcegroup01 ``` ```output diff --git a/src/Sql/Sql/help/Remove-AzSqlInstancePool.md b/src/Sql/Sql/help/Remove-AzSqlInstancePool.md index 116febb39350..d3732a6e2fe9 100644 --- a/src/Sql/Sql/help/Remove-AzSqlInstancePool.md +++ b/src/Sql/Sql/help/Remove-AzSqlInstancePool.md @@ -37,7 +37,7 @@ The **Remove-AzSqlInstancePool** cmdlet removes an Azure SQL Instance pool. ### Example 1: Remove an instance pool ```powershell -Remove-AzSqlInstancePool -ResourceGroup resourcegroup01 -Name instancePool0 +Remove-AzSqlInstancePool -ResourceGroupName resourcegroup01 -Name instancePool0 ``` ### Example 2: Remove an instance pool by its resource identifier @@ -47,7 +47,7 @@ Remove-AzSqlInstancePool -ResourceId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxx ### Example 3: Remove an instance pool by an instance pool object ```powershell -Get-AzSqlInstancePool -ResourceGroup resourcegroup01 -Name instancePool0 +Get-AzSqlInstancePool -ResourceGroupName resourcegroup01 -Name instancePool0 Remove-AzSqlInstancePool -InputObject $instancePool ``` diff --git a/src/Sql/Sql/help/Set-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md b/src/Sql/Sql/help/Set-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md index 04ff033765db..9121027b1494 100644 --- a/src/Sql/Sql/help/Set-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md +++ b/src/Sql/Sql/help/Set-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline.md @@ -107,7 +107,7 @@ BaselineResult : @( 'Principal1', 'db_ddladmin', 'SQL_USER', 'None') , @( ```powershell Get-AzSqlDatabase -ResourceGroupName "ResourceGroup01" ` -ServerName "Server01" ` - | where {$_.DatabaseName -ne "master"} ` + | Where-Object {$_.DatabaseName -ne "master"} ` | Set-AzSqlDatabaseVulnerabilityAssessmentRuleBaseline ` -RuleId "VA2108" ` -BaselineResult @( 'Principal1', 'db_ddladmin', 'SQL_USER', 'None') , @( 'Principal2', 'db_ddladmin', 'SQL_USER', 'None') diff --git a/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md b/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md index 8ec3c00b4c5e..6146a11aeb58 100644 --- a/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md +++ b/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md @@ -54,7 +54,7 @@ This command sets the short term retention policy for database01 to 35 days. ### Example 2 ```powershell -Get-AzSqlInstanceDatabase -ResourceGroupName resourcegroup01 -InstanceName server01 -DatabaseName database01 | Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy -RetentionDays 35 +Get-AzSqlInstanceDatabase -ResourceGroupName resourcegroup01 -InstanceName server01 -Name database01 | Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy -RetentionDays 35 ``` ```output @@ -69,7 +69,7 @@ This command sets the short term retention policy for database01 to 35 days via ### Example 3 ```powershell -Set-AzSqlDeletedInstanceDatabaseBackup -ResourceGroupName "ContosoResourceGroup" -InstanceName "ContosoServer" -DatabaseName "DB1" | Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy -RetentionDays 8 +Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy -ResourceGroupName "ContosoResourceGroup" -InstanceName "ContosoServer" -DatabaseName "DB1" | Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy -RetentionDays 8 ``` ```output diff --git a/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseSensitivityClassification.md b/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseSensitivityClassification.md index 79f7648f919d..4b53d8e3b1f0 100644 --- a/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseSensitivityClassification.md +++ b/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseSensitivityClassification.md @@ -52,7 +52,7 @@ Get-AzSqlInstanceDatabaseSensitivityRecommendation -ResourceGroupName resourceGr ### Example 3: Set information type and sensitivity label of a column in an Azure SQL Managed Instance database, using piping. ```powershell -Get-AzSqlInstanceDatabase -ResourceGroupName resourceGroup -InstanceName managedInstance -DatabaseName database | Set-AzSqlInstanceDatabaseSensitivityClassification -SchemaName schema -TableName table -ColumnName column -InformationType informationType -SensitivityLabel label +Get-AzSqlInstanceDatabase -ResourceGroupName resourceGroup -InstanceName managedInstance -Name database | Set-AzSqlInstanceDatabaseSensitivityClassification -SchemaName schema -TableName table -ColumnName column -InformationType informationType -SensitivityLabel label ``` ## PARAMETERS diff --git a/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md b/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md index acb7a2cea96b..9f3771c0b80a 100644 --- a/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md +++ b/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline.md @@ -90,7 +90,7 @@ BaselineResult : @( 'Principal1', 'db_ddladmin', 'SQL_USER', 'None') , @( ```powershell Get-AzSqlInstanceDatabase -ResourceGroupName "ResourceGroup01" ` -InstanceName "ManagedInstance01" ` - | where {$_.Name -ne "master"} ` + | Where-Object {$_.Name -ne "master"} ` | Set-AzSqlInstanceDatabaseVulnerabilityAssessmentRuleBaseline ` -RuleId "VA2108" ` -BaselineResult @( 'Principal1', 'db_ddladmin', 'SQL_USER', 'None') , @( 'Principal2', 'db_ddladmin', 'SQL_USER', 'None') diff --git a/src/Sql/Sql/help/Set-AzSqlServerTransparentDataEncryptionProtector.md b/src/Sql/Sql/help/Set-AzSqlServerTransparentDataEncryptionProtector.md index 682da8924fe2..315d87606efb 100644 --- a/src/Sql/Sql/help/Set-AzSqlServerTransparentDataEncryptionProtector.md +++ b/src/Sql/Sql/help/Set-AzSqlServerTransparentDataEncryptionProtector.md @@ -26,7 +26,7 @@ Changing the TDE protector type will rotate the protector. ### Example 1: Set the Transparent Data Encryption (TDE) protector type to ServiceManaged ```powershell -Set-AzSqlServerTransparentDataEncryptionProtector -Type ServiceManaged -ServerName 'ContosoServer' -ResourceGroup 'ContosoResourceGroup' +Set-AzSqlServerTransparentDataEncryptionProtector -Type ServiceManaged -ServerName 'ContosoServer' -ResourceGroupName 'ContosoResourceGroup' ``` ```output @@ -37,7 +37,7 @@ ContosoResourceGroup ContosoServer ServiceManaged ServiceManaged This command updates a server's TDE protector type to Service Managed. ### Example 2: Set the Transparent Data Encryption protector type to Azure Key Vault ```powershell -Set-AzSqlServerTransparentDataEncryptionProtector -Type AzureKeyVault -KeyId 'https://contoso.vault.azure.net/keys/contosokey/01234567890123456789012345678901' -ServerName 'ContosoServer' -ResourceGroup 'ContosoResourceGroup' +Set-AzSqlServerTransparentDataEncryptionProtector -Type AzureKeyVault -KeyId 'https://contoso.vault.azure.net/keys/contosokey/01234567890123456789012345678901' -ServerName 'ContosoServer' -ResourceGroupName 'ContosoResourceGroup' ``` ```output diff --git a/src/Sql/Sql/help/Start-AzSqlDatabaseExecuteIndexRecommendation.md b/src/Sql/Sql/help/Start-AzSqlDatabaseExecuteIndexRecommendation.md index 7148878078e0..901000141962 100644 --- a/src/Sql/Sql/help/Start-AzSqlDatabaseExecuteIndexRecommendation.md +++ b/src/Sql/Sql/help/Start-AzSqlDatabaseExecuteIndexRecommendation.md @@ -26,7 +26,7 @@ The **Start-AzSqlDatabaseExecuteIndexRecommendation** cmdlet starts the workflow ### Example 1: Run an index recommendation ```powershell -Start-AzSqlDatabaseExecuteIndexRecommendation -ResourceGroup "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -IndexRecommendationName "INDEX_NAME" +Start-AzSqlDatabaseExecuteIndexRecommendation -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -IndexRecommendationName "INDEX_NAME" ``` This command runs an index recommendation. diff --git a/src/Sql/Sql/help/Start-AzSqlDatabaseVulnerabilityAssessmentScan.md b/src/Sql/Sql/help/Start-AzSqlDatabaseVulnerabilityAssessmentScan.md index 25de1c390b64..877437d9a6e2 100644 --- a/src/Sql/Sql/help/Start-AzSqlDatabaseVulnerabilityAssessmentScan.md +++ b/src/Sql/Sql/help/Start-AzSqlDatabaseVulnerabilityAssessmentScan.md @@ -131,7 +131,7 @@ NumberOfFailedSecurityChecks : 9 Get-AzSqlDatabase ` -ResourceGroupName "ResourceGroup01" ` -ServerName "Server01" ` - | where {$_.DatabaseName -ne "master"} ` + | Where-Object {$_.DatabaseName -ne "master"} ` | Start-AzSqlDatabaseVulnerabilityAssessmentScan ``` diff --git a/src/Sql/Sql/help/Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md b/src/Sql/Sql/help/Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md index c80c1d54090e..1d2faf825487 100644 --- a/src/Sql/Sql/help/Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md +++ b/src/Sql/Sql/help/Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan.md @@ -139,7 +139,7 @@ NumberOfFailedSecurityChecks : 9 Get-AzSqlInstanceDatabase ` -ResourceGroupName "ResourceGroup01" ` -InstanceName "ManagedInstance01" ` - | where {$_.Name -ne "master"} ` + | Where-Object {$_.Name -ne "master"} ` | Start-AzSqlInstanceDatabaseVulnerabilityAssessmentScan ``` diff --git a/src/Sql/Sql/help/Start-AzSqlSyncGroupSync.md b/src/Sql/Sql/help/Start-AzSqlSyncGroupSync.md index b50e53bf5945..303e546f9ad9 100644 --- a/src/Sql/Sql/help/Start-AzSqlSyncGroupSync.md +++ b/src/Sql/Sql/help/Start-AzSqlSyncGroupSync.md @@ -25,7 +25,7 @@ The **Start-AzSqlSyncGroupSync** cmdlet starts a sync group synchronization. ### Example 1 ```powershell -Start-AzSqlSyncGroupSync -SyncGroupName mysg [-ServerName] mysrv [-DatabaseName] mydb [-ResourceGroupName] myrg +Start-AzSqlSyncGroupSync -SyncGroupName mysg -ServerName mysrv -DatabaseName mydb -ResourceGroupName myrg ``` This command starts a round of synchronization for the sync group mysg. diff --git a/src/Sql/Sql/help/Stop-AzSqlDatabaseExecuteIndexRecommendation.md b/src/Sql/Sql/help/Stop-AzSqlDatabaseExecuteIndexRecommendation.md index 5f986747d997..148fe18516fd 100644 --- a/src/Sql/Sql/help/Stop-AzSqlDatabaseExecuteIndexRecommendation.md +++ b/src/Sql/Sql/help/Stop-AzSqlDatabaseExecuteIndexRecommendation.md @@ -26,7 +26,7 @@ The **Stop-AzSqlDatabaseExecuteIndexRecommendation** cmdlet stops the workflow t ### Example 1: Stop running an index recommendation ```powershell -Stop-AzSqlDatabaseExecuteIndexRecommendation -ResourceGroup "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -IndexRecommendationName "INDEX_NAME" +Stop-AzSqlDatabaseExecuteIndexRecommendation -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -IndexRecommendationName "INDEX_NAME" ``` This command stops running an index recommendation. diff --git a/src/Sql/Sql/help/Stop-AzSqlSyncGroupSync.md b/src/Sql/Sql/help/Stop-AzSqlSyncGroupSync.md index 7f0133643198..3c81333640f5 100644 --- a/src/Sql/Sql/help/Stop-AzSqlSyncGroupSync.md +++ b/src/Sql/Sql/help/Stop-AzSqlSyncGroupSync.md @@ -25,7 +25,7 @@ The **Stop-AzSqlSyncGroupSync** cmdlet stops a sync group synchronization. ### Example 1 ```powershell -Stop-AzSqlSyncGroupSync -SyncGroupName mysg [-ServerName] mysrv [-DatabaseName] mydb [-ResourceGroupName] myrg +Stop-AzSqlSyncGroupSync -SyncGroupName mysg -ServerName mysrv -DatabaseName mydb -ResourceGroupName myrg ``` This command stops the synchronization which is ongoing for the sync group mysg. diff --git a/src/Sql/Sql/help/Update-AzSqlDatabaseVulnerabilityAssessmentSetting.md b/src/Sql/Sql/help/Update-AzSqlDatabaseVulnerabilityAssessmentSetting.md index 4975c0538dbc..d1b8531c6d21 100644 --- a/src/Sql/Sql/help/Update-AzSqlDatabaseVulnerabilityAssessmentSetting.md +++ b/src/Sql/Sql/help/Update-AzSqlDatabaseVulnerabilityAssessmentSetting.md @@ -129,7 +129,7 @@ This command updated the Vulnerability Assessment settings on Database02 from th ```powershell Get-AzSqlDatabase -ResourceGroupName "ResourceGroup01" ` -ServerName $"Server01" ` - | where {$_.DatabaseName -ne "master"} ` + | Where-Object {$_.DatabaseName -ne "master"} ` | Update-AzSqlDatabaseVulnerabilityAssessmentSetting ` -StorageAccountName "mystorage" ` -ScanResultsContainerName "vulnerability-assessment" ` diff --git a/src/Sql/Sql/help/Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting.md b/src/Sql/Sql/help/Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting.md index c4721da85af5..bc4d42f03937 100644 --- a/src/Sql/Sql/help/Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting.md +++ b/src/Sql/Sql/help/Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting.md @@ -129,7 +129,7 @@ This command updated the Vulnerability Assessment settings on Database02 from th ```powershell Get-AzSqlInstanceDatabase -ResourceGroupName "ResourceGroup01" ` -InstanceName $"ManagedInstance01" ` - | where {$_.Name -ne "master"} ` + | Where-Object {$_.Name -ne "master"} ` | Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting ` -StorageAccountName "mystorage" ` -ScanResultsContainerName "vulnerability-assessment" ` diff --git a/src/Sql/Sql/help/Update-AzSqlInstanceVulnerabilityAssessmentSetting.md b/src/Sql/Sql/help/Update-AzSqlInstanceVulnerabilityAssessmentSetting.md index 5b906c390feb..e3bd89ff660d 100644 --- a/src/Sql/Sql/help/Update-AzSqlInstanceVulnerabilityAssessmentSetting.md +++ b/src/Sql/Sql/help/Update-AzSqlInstanceVulnerabilityAssessmentSetting.md @@ -100,7 +100,7 @@ Get-AzSqlInstanceVulnerabilityAssessmentSetting ` -InstanceName "ManagedInstance01" ` | Update-AzSqlInstanceVulnerabilityAssessmentSetting ` -ResourceGroupName "ResourceGroup02" ` - -ManagedInstanceName "ManagedInstance02" ` + -InstanceName "ManagedInstance02" ` ``` ```output From b59db65ab5c29027f048b934af320df6e54abdc2 Mon Sep 17 00:00:00 2001 From: "v-yuzhichen@microsoft.com" Date: Thu, 21 Apr 2022 16:56:58 +0800 Subject: [PATCH 2/2] Fix Az.Sql Syntax Errors --- .../help/Get-AzSqlInstanceTransparentDataEncryptionProtector.md | 2 +- .../Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/src/Sql/Sql/help/Get-AzSqlInstanceTransparentDataEncryptionProtector.md b/src/Sql/Sql/help/Get-AzSqlInstanceTransparentDataEncryptionProtector.md index f41b1bb28ce3..9c02270ce8a2 100644 --- a/src/Sql/Sql/help/Get-AzSqlInstanceTransparentDataEncryptionProtector.md +++ b/src/Sql/Sql/help/Get-AzSqlInstanceTransparentDataEncryptionProtector.md @@ -53,7 +53,7 @@ This command gets the TDE protector for the managed instance named ContosoManage ### Example 2: Using managed instance object ```powershell $managedInstance = Get-AzSqlInstance -Name 'ContosoManagedInstanceName' -ResourceGroupName 'ContosoResourceGroup' -Get-AzSqlInstanceTransparentDataEncryptionProtector -Instance $managedInstance -InstanceName 'ContosoManagedInstanceName' +Get-AzSqlInstanceTransparentDataEncryptionProtector -Instance $managedInstance ``` ```output diff --git a/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md b/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md index 6146a11aeb58..3f5fcbc7d154 100644 --- a/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md +++ b/src/Sql/Sql/help/Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy.md @@ -69,7 +69,7 @@ This command sets the short term retention policy for database01 to 35 days via ### Example 3 ```powershell -Get-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy -ResourceGroupName "ContosoResourceGroup" -InstanceName "ContosoServer" -DatabaseName "DB1" | Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy -RetentionDays 8 +Get-AzSqlDeletedInstanceDatabaseBackup -ResourceGroupName "ContosoResourceGroup" -InstanceName "ContosoServer" -DatabaseName "DB1" | Set-AzSqlInstanceDatabaseBackupShortTermRetentionPolicy -RetentionDays 8 ``` ```output