Cursos
Certificación
Microsoft Certified: Azure Administrator Associate - Certifications
Demostrar aptitudes clave para configurar, proteger y administrar funciones profesionales clave en Microsoft Azure.
Este explorador ya no se admite.
Actualice a Microsoft Edge para aprovechar las características y actualizaciones de seguridad más recientes, y disponer de soporte técnico.
DisableErrorRecordsPersistence
will be deprecated, a new parameter EnableErrorRecordsPersistence
will be added instead. Writing error records to file system will become opt-in instead of opt-out. This change will happen around May 2024Clear-AzConfig -DisableErrorRecordsPersistence
error record will be disabled by default. New parameter 'EnableErrorRecordsPersistence' added to enable erro record.
DisableErrorRecordsPersistence
will be deprecated, a new parameter EnableErrorRecordsPersistence
will be added instead. Writing error records to file system will become opt-in instead of opt-out. This change will happen around May 2024Get-AzConfig -DisableErrorRecordsPersistence
error record will be disabled by default. New parameter 'EnableErrorRecordsPersistence' added to enable erro record.
DisableErrorRecordsPersistence
will be deprecated, a new parameter EnableErrorRecordsPersistence
will be added instead. Writing error records to file system will become opt-in instead of opt-out. This change will happen around May 2024Update-AzConfig -DisableErrorRecordsPersistence
error record will be disabled by default. New parameter 'EnableErrorRecordsPersistence' added to enable erro record.
Get-AzVmss -ResourceGroupName ""
# Returned an empty list.
Get-AzVmss -ResourceGroupName ""
# Will return an error from empty string validation in the parameter.
New-AzGalleryImageDefinition -ResourceGroupName $rgName -GalleryName $galleryName -Name $galleryImageDefinitionName -Location $location -Publisher $publisherName -Offer $offerName -Sku $skuName -OsState "Specialized" -OsType "Linux"
# Defaulted to HyperVGeneration: Gen1 and SecurityType: Standard in the service side .
New-AzGalleryImageDefinition -ResourceGroupName $rgName -GalleryName $galleryName -Name $galleryImageDefinitionName -Location $location -Publisher $publisherName -Offer $offerName -Sku $skuName -OsState "Specialized" -OsType "Linux"
# Defaults to HyperVGeneration: Gen2 and SecurityType: TrustedLaunchSupported at the PowerShell level.
$vm = New-AzVM -ResourceGroupName $rgname -Name $vmname -Credential $cred -SecurityType "Standard" -DomainNameLabel $domainNameLabel
# Creates a VM with the image Windows 2016 Datacenter.
$vm = New-AzVM -ResourceGroupName $rgname -Name $vmname -Credential $cred -SecurityType "Standard" -DomainNameLabel $domainNameLabel
# Now generates with the Windows 2022 Azure Edition image.
$vmss = New-AzVmss -ResourceGroupName $rgname -Credential $cred -VMScaleSetName $vmssName -SecurityType "Standard" -DomainNameLabel $domainNameLabel1
# would create a VMSS with a Windows 2016 Datacenter image.
$vmss = New-AzVmss -ResourceGroupName $rgname -Credential $cred -VMScaleSetName $vmssName -SecurityType "Standard" -DomainNameLabel $domainNameLabel1
# Now it will generate with a Windows 2022 Azure Edition image.
-NextLink
-ODataQuery
Get-AzEventGridChannel -ResourceGroup MyResourceGroupName -PartnerNamespaceName PartnerNamespace1 -Name Channel1
Get-AzEventGridChannel -ResourceGroupName azps_test_group_eventgrid -PartnerNamespaceName azps-partnernamespace
-NextLink
-ODataQuery
-ResourceId
Get-AzEventGridDomain -ResourceGroup MyResourceGroupName -Name Domain1
Get-AzEventGridDomain -ResourceGroupName azps_test_group_eventgrid -Name azps-domain
-NextLink
-ODataQuery
-ResourceId
Get-AzEventGridDomainTopic -ResourceGroup MyResourceGroupName -DomainName Domain1 -DomainTopicName DomainTopic1
Get-AzEventGridDomainTopic -DomainName azps-domain -ResourceGroupName azps_test_group_eventgrid -Name azps-domaintopics
-ResourceId
Get-AzEventGridFullUrlForPartnerTopicEventSubscription -ResourceGroupName MyResourceGroupName -PartnerTopicName Topic1 -EventSubscriptionName EventSubscription1
Get-AzEventGridFullUrlForPartnerTopicEventSubscription -ResourceGroupName azps_test_group_eventgrid -PartnerTopicName default -EventSubscriptionName azps-eventsubname
-NextLink
-ODataQuery
Get-AzEventGridPartnerConfiguration -ResourceGroupName ResourceGroup1
Get-AzEventGridPartnerConfiguration -ResourceGroupName azps_test_group_eventgrid
-NextLink
-ODataQuery
Get-AzEventGridPartnerNamespace -ResourceGroup MyResourceGroupName -Name PartnerNamespace1
Get-AzEventGridPartnerNamespace -ResourceGroupName azps_test_group_eventgrid -Name azps-partnernamespace
-NextLink
-ODataQuery
Get-AzEventGridPartnerRegistration -ResourceGroupName MyResourceGroupName -Name PartnerRegistration1
Get-AzEventGridPartnerRegistration -ResourceGroupName azps_test_group_eventgrid -Name azps-registration
-NextLink
-ODataQuery
Get-AzEventGridPartnerTopic -ResourceGroupName MyResourceGroupName -Name PartnerTopic1
Get-AzEventGridPartnerTopic -Name default -ResourceGroupName azps_test_group_eventgrid
-IncludeFullEndpointUrl
-NextLink
-ODataQuery
-ResourceId
Get-AzEventGridPartnerTopicEventSubscription -ResourceGroupName MyResourceGroupName -PartnerTopicName Topic1 -EventSubscriptionName EventSubscription1 -IncludeFullEndpointUrl
Get-AzEventGridPartnerTopicEventSubscription -ResourceGroupName azps_test_group_eventgrid -PartnerTopicName default -EventSubscriptionName azps-eventsubname
-IncludeFullEndpointUrl
-Location
-NextLink
-ODataQuery
-ResourceId
-TopicTypeName
Get-AzEventGridSubscription -ResourceId "/subscriptions/$subscriptionId/resourceGroups/$resourceGroupName/providers/Microsoft.EventHub/namespaces/$namespaceName"
Get-AzEventGridSubscription -Name azps-eventsub -Scope "/subscriptions/{subId}/resourceGroups/azps_test_group_eventgrid/providers/Microsoft.EventGrid/topics/azps-topic"
-NextLink
-ODataQuery
Get-AzEventGridSystemTopic -ResourceGroup MyResourceGroupName -Name Topic1
Get-AzEventGridSystemTopic -ResourceGroupName azps_test_group_eventgrid -Name azps-systopic
-IncludeFullEndpointUrl
-NextLink
-ODataQuery
Get-AzEventGridSystemTopicEventSubscription -ResourceGroupName MyResourceGroupName -SystemTopicName Topic1 -EventSubscriptionName EventSubscription1 -IncludeFullEndpointUrl
Get-AzEventGridSystemTopicEventSubscription -ResourceGroupName azps_test_group_eventgrid -SystemTopicName azps-systopic -EventSubscriptionName azps-evnetsub
-NextLink
-ODataQuery
-ResourceId
Get-AzEventGridTopic -ResourceGroup MyResourceGroupName -Name Topic1
Get-AzEventGridTopic -ResourceGroupName azps_test_group_eventgrid -Name azps-topic
-IncludeEventTypeData
Get-AzEventGridTopicType -Name "Microsoft.Storage.StorageAccounts"
Get-AzEventGridTopicType -Name Microsoft.EventGrid.Namespaces
-NextLink
-ODataQuery
Get-AzEventGridVerifiedPartner -Name VerifiedPartner1
Get-AzEventGridVerifiedPartner -Name MicrosoftGraphAPI
-IdentityType
-InboundIpRule
-InputMappingDefaultValue
-InputMappingField
New-AzEventGridDomain -ResourceGroupName MyResourceGroupName -Name Domain1 -Location westus2 -Tag @{ Department="Finance"; Environment="Test" }
$inboundIpRule = New-AzEventGridInboundIPRuleObject -Action Allow -IPMask "12.18.176.1"
New-AzEventGridDomain -Name azps-domain -ResourceGroupName azps_test_group_eventgrid -Location westus2 -PublicNetworkAccess Enabled -InboundIPRule $inboundIpRule
-AuthorizedPartner
New-AzEventGridPartnerConfiguration -ResourceGroupName MyResourceGroupName -MaxExpirationTimeInDays 14
$partnerRegistration = Get-AzEventGridPartnerRegistration -ResourceGroupName azps_test_group_eventgrid -Name azps-registration
$partner = New-AzEventGridPartnerObject -AuthorizationExpirationTimeInUtc "2023-11-19T09:31:42.521Z" -RegistrationImmutableId $partnerRegistration.ImmutableId
New-AzEventGridPartnerConfiguration -ResourceGroupName azps_test_group_eventgrid -Location global -PartnerAuthorizationDefaultMaximumExpirationTimeInDay 10 -PartnerAuthorizationAuthorizedPartnersList $partner
-Endpoint
-InboundIpRule
-PrivateEndpointConnection
New-AzEventGridPartnerNamespace -ResourceGroupName MyResourceGroupName -Name PartnerNamespace1 -Location westus2 -PartnerRegistrationFullyQualifiedId 23e0092b-f336-4833-9ab3-9353a15650fc
New-AzEventGridPartnerNamespace -Name azps-partnernamespace -ResourceGroupName azps_test_group_eventgrid -Location eastus -PartnerTopicRoutingMode ChannelNameHeader -PartnerRegistrationFullyQualifiedId "/subscriptions/{subId}/resourceGroups/azps_test_group_eventgrid/providers/Microsoft.EventGrid/partnerRegistrations/azps-registration"
<String>
New-AzEventGridPartnerRegistration -ResourceGroupName MyResourceGroupName -Name PartnerRegistration1
New-AzEventGridPartnerRegistration -Name azps-registration -ResourceGroupName azps_test_group_eventgrid -Location global
-IdentityType
New-AzEventGridPartnerTopic -ResourceGroupName MyResourceGroupName -Name PartnerTopic1 -Source ContosoCorp.Accounts.User1 -Location westus2 -PartnerRegistrationImmutableId 23e0092b-f336-4833-9ab3-9353a15650fc
$partnerRegistration = Get-AzEventGridPartnerRegistration -ResourceGroupName azps_test_group_eventgrid -Name azps-registration
New-AzEventGridPartnerTopic -Name default -ResourceGroupName azps_test_group_eventgrid -Location eastus -partnerRegistrationImmutableId $partnerRegistration.ImmutableId -Source "ContosoCorp.Accounts.User1" -ExpirationTimeIfNotActivatedUtc "2023-11-17T11:06:13.109Z" -PartnerTopicFriendlyDescription "Example description" -MessageForActivation "Example message for activation"
-AdvancedFilter
-AzureActiveDirectoryApplicationIdOrUri
-AzureActiveDirectoryTenantId
-DeadLetterEndpoint
-DeliveryAttributeMapping
-Endpoint
-EndpointType
-MaxEventsPerBatch
-PreferredBatchSizeInKiloByte
-StorageQueueMessageTtl
$includedEventTypes = "Microsoft.Resources.ResourceWriteFailure", "Microsoft.Resources.ResourceWriteSuccess"
$labels = "Finance", "HR"
New-AzEventGridPartnerTopicEventSubscription -ResourceGroup MyResourceGroup -PartnerTopicName Topic1 -EventSubscriptionName EventSubscription1 -Endpoint https://requestb.in/19qlscd1 -SubjectBeginsWith "TestPrefix" -SubjectEndsWith "TestSuffix" -IncludedEventType $includedEventTypes -Label $labels
$obj = New-AzEventGridWebHookEventSubscriptionDestinationObject -EndpointUrl "https://azpsweb.azurewebsites.net"
New-AzEventGridPartnerTopicEventSubscription -EventSubscriptionName azps-eventsub -ResourceGroupName azps_test_group_eventgrid -PartnerTopicName default -FilterIsSubjectCaseSensitive:$false -FilterSubjectBeginsWith "ExamplePrefix" -FilterSubjectEndsWith "ExampleSuffix" -EventDeliverySchema CloudEventSchemaV1_0 -Destination $obj
-AzureActiveDirectoryApplicationIdOrUri
-AzureActiveDirectoryTenantId
-DeadLetterEndpoint
-DeliveryAttributeMapping
-MaxEventsPerBatch
-PreferredBatchSizeInKiloByte
-StorageQueueMessageTtl
$includedEventTypes = "Microsoft.Resources.ResourceWriteFailure", "Microsoft.Resources.ResourceWriteSuccess"
$labels = "Finance", "HR"
New-AzEventGridSubscription -Endpoint https://requestb.in/19qlscd1 -EventSubscriptionName EventSubscription1 -SubjectBeginsWith "TestPrefix" -SubjectEndsWith "TestSuffix" -IncludedEventType $includedEventTypes -Label $labels
$obj = New-AzEventGridWebHookEventSubscriptionDestinationObject -EndpointUrl "https://azpsweb.azurewebsites.net/api/updates"
$topic = Get-AzEventGridTopic -ResourceGroupName azps_test_group_eventgrid -Name azps-topic
New-AzEventGridSubscription -Name azps-eventsub -Scope $topic.Id -Destination $obj -FilterIsSubjectCaseSensitive:$false -FilterSubjectBeginsWith "ExamplePrefix" -FilterSubjectEndsWith "ExampleSuffix"
-IdentityType
New-AzEventGridSystemTopic -ResourceGroupName MyResourceGroupName -Name Topic1 -Source ServiceBusNamespaceResourceId -TopicType 'Microsoft.ServiceBus.Namespaces' -Location westus2 -Tag @{ Department="Finance"; Environment="Test" }
New-AzEventGridSystemTopic -Name azps-systopic -ResourceGroupName azps_test_group_eventgrid -Location eastus -Source "/subscriptions/{subId}/resourcegroups/azps_test_group_eventgrid/providers/Microsoft.Storage/storageAccounts/azpssa" -TopicType "microsoft.storage.storageaccounts"
-AzureActiveDirectoryApplicationIdOrUri
-AzureActiveDirectoryTenantId
-DeadLetterEndpoint
-DeliveryAttributeMapping
-Endpoint
-EndpointType
-MaxEventsPerBatch
-PreferredBatchSizeInKiloByte
-StorageQueueMessageTtl
$includedEventTypes = "Microsoft.Resources.ResourceWriteFailure", "Microsoft.Resources.ResourceWriteSuccess"
$labels = "Finance", "HR"
New-AzEventGridSystemTopicEventSubscription -ResourceGroupName MyResourceGroup -SystemTopicName Topic1 -EventSubscriptionName EventSubscription1 -Endpoint https://requestb.in/19qlscd1 -SubjectBeginsWith "TestPrefix" -SubjectEndsWith "TestSuffix" -IncludedEventType $includedEventTypes -Label $labels
$obj = New-AzEventGridWebHookEventSubscriptionDestinationObject -EndpointUrl "https://azpsweb.azurewebsites.net"
New-AzEventGridSystemTopicEventSubscription -EventSubscriptionName azps-evnetsub -ResourceGroupName azps_test_group_eventgrid -SystemTopicName azps-systopic -FilterIsSubjectCaseSensitive:$false -FilterSubjectBeginsWith "ExamplePrefix" -FilterSubjectEndsWith "ExampleSuffix" -Destination $obj
-IdentityType
-InboundIpRule
-InputMappingDefaultValue
-InputMappingField
New-AzEventGridTopic -ResourceGroupName MyResourceGroupName -Name Topic1 -Location westus2 -Tag @{ Department="Finance"; Environment="Test" }
$inboundIpRule = New-AzEventGridInboundIPRuleObject -Action Allow -IPMask "12.18.176.1"
New-AzEventGridTopic -Name azps-topic -ResourceGroupName azps_test_group_eventgrid -Location eastus -PublicNetworkAccess Enabled -InboundIPRule $inboundIpRule
-DomainInputObject
-DomainName
-DomainTopicInputObject
-DomainTopicName
-ResourceGroupName
-ResourceId
-TopicName
Remove-AzEventGridSubscription -ResourceGroup MyResourceGroup -TopicName Topic1 -EventSubscriptionName EventSubscription1
Remove-AzEventGridSubscription -Name azps-eventsub -Scope "subscriptions/XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX"
Set-AzEventGridTopic -ResourceGroup MyResourceGroupName -Name Topic1 -Tag @{ Department="Finance"; Environment="Test" }
Cmdlet breaking-change will happen to all parameter sets
Parameter breaking-change will happen to all parameter sets
-IdentityType
Update-AzEventGridPartnerTopic -ResourceGroup MyResourceGroupName -Name Topic1 -IdentityType "SystemAssigned"
Update-AzEventGridPartnerTopic -Name default -ResourceGroupName azps_test_group_eventgrid -UserAssignedIdentity "/subscriptions/{subId}/resourcegroups/azps_test_group_eventgrid/providers/Microsoft.ManagedIdentity/userAssignedIdentities/uami"
-DeadLetterEndpoint
-DeliveryAttributeMapping
-Endpoint
-EndpointType
-StorageQueueMessageTtl
Update-AzEventGridPartnerTopicEventSubscription -EventSubscriptionName ES1 -PartnerTopicName Topic1 -ResourceGroup MyResourceGroupName -Endpoint https://requestb.in/1kxxoui1 -SubjectEndsWith "jpg"
$obj = New-AzEventGridWebHookEventSubscriptionDestinationObject -EndpointUrl "https://azpsweb.azurewebsites.net/api/updates"
Update-AzEventGridPartnerTopicEventSubscription -EventSubscriptionName azps-eventsubname -ResourceGroupName azps_test_group_eventgrid -PartnerTopicName default -FilterIsSubjectCaseSensitive:$false -FilterSubjectBeginsWith "ExamplePrefix" -FilterSubjectEndsWith "ExampleSuffix" -EventDeliverySchema CloudEventSchemaV1_0 -Destination $obj
-AzureActiveDirectoryApplicationIdOrUri
-AzureActiveDirectoryTenantId
-DeadLetterEndpoint
-DeliveryAttributeMapping
-Endpoint
-EndpointType
-MaxEventsPerBatch
-PreferredBatchSizeInKiloByte
Update-AzEventGridSubscription -EventSubscriptionName ES1 -TopicName Topic1 -ResourceGroup MyResourceGroupName -Endpoint https://requestb.in/1kxxoui1
$obj = New-AzEventGridWebHookEventSubscriptionDestinationObject -EndpointUrl "https://azpsweb.azurewebsites.net/api/updates"
Update-AzEventGridSubscription -Name azps-eventsub -Scope "subscriptions/XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX" -Destination $obj -FilterIsSubjectCaseSensitive:$false
-DeadLetterEndpoint
-DeliveryAttributeMapping
-Endpoint
-EndpointType
-StorageQueueMessageTtl
Update-AzEventGridSystemTopicEventSubscription -EventSubscriptionName ES1 -SystemTopicName Topic1 -ResourceGroupName MyResourceGroupName -Endpoint https://requestb.in/1kxxoui1 -SubjectEndsWith "jpg"
$obj = New-AzEventGridWebHookEventSubscriptionDestinationObject -EndpointUrl "https://azpsweb.azurewebsites.net/api/updates"
Update-AzEventGridSystemTopicEventSubscription -EventSubscriptionName azps-evnetsub -ResourceGroupName azps_test_group_eventgrid -SystemTopicName azps-systopic -FilterIsSubjectCaseSensitive:$false -FilterSubjectBeginsWith "ExamplePrefix" -FilterSubjectEndsWith "ExampleSuffix" -Destination $obj
-CleanupPolicy
-Encoding
-IdentityType
-Status
New-AzEventHub -Name $env.eventHub9 -ResourceGroupName $env.resourceGroup -NamespaceName $eventHubNamespace.Name -PartitionCount 2 -CleanupPolicy Delete -IdentityType UserAssigned
(CleanupPolicy type is CleanupPolicyRetentionDescription),
(Status type is EntityStatus),
(IdentityType type is CaptureIdentiType),
(EncodingType type is EncodingCaptureDescription)
New-AzEventHub -Name $env.eventHub9 -ResourceGroupName $env.resourceGroup -NamespaceName $eventHubNamespace.Name -PartitionCount 2 -CleanupPolicy Delete -IdentityType UserAssigned
(CleanupPolicy type is String),
(Status type is String),
(IdentityType type is String),
(EncodingType type is String)
-Rights
New-AzEventHubAuthorizationRule -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -Name $env.authRule2 -Rights @("Manage", "Send", "Listen")
(Rights is of type AccessRights[])
New-AzEventHubAuthorizationRule -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -Name $env.authRule2 -Rights @("Manage", "Send", "Listen")
(Rights is of type System.String[])
-Action
(Action is of type NetworkRuleIPAction )
(Action is of type String)
-KeyType
New-AzEventHubKey -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -Name $env.authRule -KeyType PrimaryKey
(KeyType is of type KeyType)
New-AzEventHubKey -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -Name $env.authRule -KeyType PrimaryKey
(KeyType is of type String)
-IdentityType
-PublicNetworkAccess
-SkuName
New-AzEventHubNamespace -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -SkuName Premium -Location eastus -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is ManagedServiceIdentityType),
(PublicNetworkAccess is of type PublicNetworkAccess),
( SkuName is of type SkuName)
New-AzEventHubNamespace -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -SkuName Premium -Location eastus -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is String),
(PublicNetworkAccess is of type String),
( SkuName is of type String)
-IdentityType
-PublicNetworkAccess
-SkuName
New-AzEventHubNamespaceV2 -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -SkuName Premium -Location eastus -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is ManagedServiceIdentityType),
(PublicNetworkAccess is of type PublicNetworkAccess),
( SkuName is of type SkuName)
New-AzEventHubNamespaceV2 -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -SkuName Premium -Location eastus -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is String),
(PublicNetworkAccess is of type String),
( SkuName is of type String)
-SchemaCompatibility
-SchemaType
New-AzEventHubSchemaGroup -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -Name $env.schemaGroup2 -SchemaCompatibility Forward -SchemaType Avro -GroupProperty @{a='b'; c='d'}
(SchemaCompatibility is of type SchemaCompatibility)
(SchemaType is of type SchemaType)
New-AzEventHubSchemaGroup -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -Name $env.schemaGroup2 -SchemaCompatibility Forward -SchemaType Avro -GroupProperty @{a='b'; c='d'}
(SchemaCompatibility is of type String),
(SchemaType is of type String)
-MetricId
(MetricId is of type MetricId)
(MetricId is of type String)
-Encoding
-IdentityType
-Status
Set-AzEventHub -Name $env.eventHub9 -ResourceGroupName $env.resourceGroup -NamespaceName $eventHubNamespace.Name -IdentityType UserAssigned
(Status type is EntityStatus),
(IdentityType type is CaptureIdentiType),
(Encoding type is EncodingCaptureDescription)
Set-AzEventHub -Name $env.eventHub9 -ResourceGroupName $env.resourceGroup -NamespaceName $eventHubNamespace.Name -IdentityType UserAssigned
(Status type is String),
(IdentityType type is String),
(Encoding type is String)
-Rights
Set-AzEventHubAuthorizationRule -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -Name $env.authRule2 -Rights @("Manage", "Send", "Listen")
(Rights is of type AccessRights[])
Set-AzEventHubAuthorizationRule -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -Name $env.authRule2 -Rights @("Manage", "Send", "Listen")
(Rights is of type System.String[])
-IdentityType
-PublicNetworkAccess
Set-AzEventHubNamespace -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is of type ManagedServiceIdentityType),
(PublicNetworkAccess is of type PublicNetworkAccess)
Set-AzEventHubNamespace -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is of type String),
(PublicNetworkAccess is of type String)
-IdentityType
-PublicNetworkAccess
Set-AzEventHubNamespaceV2 -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is of type ManagedServiceIdentityType),
(PublicNetworkAccess is of type PublicNetworkAccess)
Set-AzEventHubNamespaceV2 -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is of type String),
(PublicNetworkAccess is of type String)
-DefaultAction
-PublicNetworkAccess
Set-AzEventHubNetworkRuleSet -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -PublicNetworkAccess Disabled -DefaultAction deny
( DefaultAction is of type DefaultAction),
( PublicNetworkAccess is of type PublicNetworkAccess)
Set-AzEventHubNetworkRuleSet -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -PublicNetworkAccess Disabled -DefaultAction deny
( DefaultAction is of type String),
( PublicNetworkAccess is of type String)
-UseDefaultCVMPolicy
Remove parameter Value from Invoke-AzKeyVaultKeyOperation and property Result from the output type PSKeyOperationResult
$encryptedData = Invoke-AzKeyVaultKeyOperation -Operation Encrypt -Algorithm RSA1_5 -VaultName test-kv -Name test-key -Value (ConvertTo-SecureString -String "test" -AsPlainText -Force)
"$plainText = ""test""
$byteArray = [system.Text.Encoding]::UTF8.GetBytes($plainText)
$encryptedData = Invoke-AzKeyVaultKeyOperation -Operation Encrypt -Algorithm RSA1_5 -VaultName test-kv -Name test-key -ByteArrayValue $byteArray"
Replaced parameter EnableRbacAuthorization by DisableRbacAuthorization in New-AzKeyVault and Update-AzKeyVault, RbacAuthorization will be enabled by default
New-AzKeyVault -VaultName 'Contoso03Vault' -ResourceGroupName 'Group14' -Location 'East US' -DisableRbacAuthorization
New-AzKeyVault -VaultName 'Contoso03Vault' -ResourceGroupName 'Group14' -Location 'East US'
Replaced parameter EnableRbacAuthorization by DisableRbacAuthorization in Update-AzKeyVault
Get-AzKeyVault -VaultName $keyVaultName -ResourceGroupName $resourceGroupName | Update-AzKeyVault -EnableRbacAuthorization $true
Get-AzKeyVault -VaultName $keyVaultName -ResourceGroupName $resourceGroupName | Update-AzKeyVault -DisableRbacAuthorization $false
$VaultSettings = Get-AzRecoveryServicesAsrVaultContext
$ResourceType = $VaultSettings.ResouceType
$VaultSettings = Get-AzRecoveryServicesAsrVaultContext
$ResourceType = $VaultSettings.ResourceType
$VaultSettings = Import-AzRecoveryServicesAsrVaultSettingsFile -Path $FilePath
$ResourceType = $VaultSettings.ResouceType
$VaultSettings = Import-AzRecoveryServicesAsrVaultSettingsFile -Path $FilePath
$ResourceType = $VaultSettings.ResourceType
$vaultSettings = Set-AzRecoveryServicesAsrVaultContext -Vault $RecoveryServicesVault
$ResourceType = $VaultSettings.ResouceType
$vaultSettings = Set-AzRecoveryServicesAsrVaultContext -Vault $RecoveryServicesVault
$ResourceType = $VaultSettings.ResourceType
$policyAssignment = Get-AzPolicyAssignment -Name MyAssignment
$description = $policyAssignment.Properties.Description
$principalId = $policyAssignment.Identity.PrincipalId
$policyAssignment = Get-AzPolicyAssignment -Name MyAssignment
$description = $policyAssignment.Description
$principalId = $policyAssignment.PrincipalId
Compatible option:
$policyAssignment = Get-AzPolicyAssignment -Name MyAssignment -BackwardCompatible
$description = $policyAssignment.Properties.Description
$principalId = $policyAssignment.Identity.PrincipalId
$policyDefinition = Get-AzPolicyDefinition -Builtin | select -First 1
$policyRule = $policyDefinition.Properties.PolicyRule
$policyDefinition = Get-AzPolicyDefinition -Builtin | select -First 1
$policyRule = $policyDefinition.PolicyRule
Compatible option:
$policyDefinition = Get-AzPolicyDefinition -Builtin -BackwardCompatible | select -First 1
$policyRule = $policyDefinition.Properties.PolicyRule
$policyExemption = Get-AzPolicyExemption -Scope /providers/Microsoft.Management/managementGroups/myManagementGroup -Name MyExemption
$expiresOn = $policyExemption.Properties.ExpiresOn
$policyExemption = Get-AzPolicyExemption -Scope /providers/Microsoft.Management/managementGroups/myManagementGroup -Name MyExemption
$expiresOn = $policyExemption.ExpiresOn
Compatible option:
$policyExemption = Get-AzPolicyExemption -Scope /providers/Microsoft.Management/managementGroups/myManagementGroup -Name MyExemption -BackwardCompatible
$expiresOn = $policyExemption.Properties.ExpiresOn
$policySetDefinition = Get-AzPolicySetDefinition -Builtin | select -First 1
$policySetParameters = $policySetDefinition.Properties.Parameters
$policySetDefinition = Get-AzPolicySetDefinition -Builtin | select -First 1
$policySetParameters = $policySetDefinition.Parameter
Compatible option:
$policySetDefinition = Get-AzPolicySetDefinition -Builtin -BackwardCompatible | select -First 1
$policySetParameters = $policySetDefinition.Properties.Parameters
$policyAssignment = New-AzPolicyAssignment -Name MyAssignment -PolicyDefinition MyPolicyDefinition
$enforcementMode = $policyAssignment.Properties.EnforcementMode
$principalId = $policyAssignment.Identity.PrincipalId
$policyAssignment = New-AzPolicyAssignment -Name MyAssignment -PolicyDefinition MyPolicyDefinition
$enforcementMode = $policyAssignment.EnforcementMode
$principalId = $policyAssignment.PrincipalId
Compatible option:
$policyAssignment = New-AzPolicyAssignment -Name MyAssignment -PolicyDefinition MyPolicyDefinition -BackwardCompatible
$enforcementMode = $policyAssignment.Properties.EnforcementMode
$principalId = $policyAssignment.Identity.PrincipalId
$policyRule = '{ "if": { "field": "type", "like": "Microsoft.DesktopVirtualization/*" }, "then": { "effect": "deny" } }'
$policyDefinition = New-AzPolicyDefinition -Name MyDefinition -Policy $policyRule
$policyType = $policyDefinition.Properties.PolicyType
$policyRule = '{ "if": { "field": "type", "like": "Microsoft.DesktopVirtualization/*" }, "then": { "effect": "deny" } }'
$policyDefinition = New-AzPolicyDefinition -Name MyDefinition -Policy $policyRule
$policyType = $policyDefinition.PolicyType
Compatible option:
$policyDefinition = New-AzPolicyDefinition -Name MyDefinition -Policy $policyRule -BackwardCompatible
$policyType = $policyDefinition.Properties.PolicyType
$policyExemption = Get-AzPolicyAssignment -Name MyAssignment | New-AzPolicyExemption -Name MyExemption -ExemptionCategory Mitigated
$policyDefinitionId = $policyExemption.Properties.PolicyAssignmentId
$policyExemption = Get-AzPolicyAssignment -Name MyAssignment | New-AzPolicyExemption -Name MyExemption -ExemptionCategory Mitigated
$policyDefinitionId = $policyExemption.PolicyAssignmentId
Compatible option:
$policyExemption = Get-AzPolicyAssignment -Name MyAssignment | New-AzPolicyExemption -Name MyExemption -ExemptionCategory Mitigated -BackwardCompatible
$policyDefinitionId = $policyExemption.Properties.PolicyAssignmentId
$policyDefinitionReferences = ('[{ "policyDefinitionId": "' + (Get-AzPolicyDefinition -Name MyDefinition).ResourceId + '"}]')
$policySetDefinition = New-AzPolicySetDefinition -Name MySetDefinition -PolicyDefinition $policyDefinitionReferences
$policyDefinitionReferenceId = $policySetDefinition.Properties.PolicyDefinitions[0].policyDefinitionReferenceId
$policyDefinitionReferences = ('[{ "policyDefinitionId": "' + (Get-AzPolicyDefinition -Name MyDefinition).ResourceId + '"}]')
$policySetDefinition = New-AzPolicySetDefinition -Name MySetDefinition -PolicyDefinition $policyDefinitionReferences
$policyDefinitionReferenceId = $policySetDefinition.PolicyDefinition[0].policyDefinitionReferenceId
Compatible option:
$policySetDefinition = New-AzPolicySetDefinition -Name MySetDefinition -PolicyDefinition $policyDefinitionReferences
$policyDefinitionReferenceId = $policySetDefinition.Properties.PolicyDefinitions[0].policyDefinitionReferenceId
$policyAssignment = Set-AzPolicyAssignment -Name MyAssignment -DisplayName 'My cool assignment'
$displayName = $policyAssignment.Properties.DisplayName
$principalId = $policyAssignment.Identity.PrincipalId
$policyAssignment = Update-AzPolicyAssignment -Name MyAssignment -DisplayName 'My cool assignment'
$displayName = $policyAssignment.DisplayName
$principalId = $policyAssignment.PrincipalId
Compatible option:
$policyAssignment = Set-AzPolicyAssignment -Name MyAssignment -DisplayName 'My cool assignment' -BackwardCompatible
$displayName = $policyAssignment.Properties.DisplayName
$principalId = $policyAssignment.Identity.PrincipalId
$policyDefinition = Set-AzPolicyDefinition -Name MyDefinition -Description 'A much better policy definition'
$description = $policyDefinition.Properties.Description
$policyDefinition = Update-AzPolicyDefinition -Name MyDefinition -Description 'A much better policy definition'
$description = $policyDefinition.Description
Compatible option:
$policyDefinition = Set-AzPolicyDefinition -Name MyDefinition -Description 'A much better policy definition' -BackwardCompatible
$description = $policyDefinition.Properties.Description
$policyExemption = Set-AzPolicyExemption -Name MyExemption -ExemptionCategory Waiver
$exemptionCategory = $policyExemption.Properties.ExemptionCategory
$policyExemption = Update-AzPolicyExemption -Name MyExemption -ExemptionCategory Waiver
$exemptionCategory = $policyExemption.ExemptionCategory
Compatbile option:
$policyExemption = Update-AzPolicyExemption -Name MyExemption -ExemptionCategory Waiver -BackwardCompatible
$exemptionCategory = $policyExemption.Properties.ExemptionCategory
$policySetDefinition = Set-AzPolicySetDefinition -Name MySetDefinition -Metadata '{ "MyThing": "A really good thing" }'
$myThing = $policySetDefinition.Properties.Metadata.MyThing
$policySetDefinition = Update-AzPolicySetDefinition -Name MySetDefinition -Metadata '{ "MyThing": "A really good thing" }'
$myThing = $policySetDefinition.Metadata.MyThing
Compatible option:
$policySetDefinition = Set-AzPolicySetDefinition -Name MySetDefinition -Metadata '{ "MyThing": "A really good thing" }' -BackwardCompatible
$myThing = $policySetDefinition.Properties.Metadata.MyThing
-Rights
New-AzServiceBusAuthorizationRule -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -Name $env.authRule2 -Rights @("Manage", "Send", "Listen")
(Rights is of type AccessRights[])
New-AzServiceBusAuthorizationRule -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -Name $env.authRule2 -Rights @("Manage", "Send", "Listen")
(Rights is of type System.String[])
-Action
(Action is of type NetworkRuleIPAction )
(Action is of type String )
-KeyType
New-AzServiceBusKey -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -Name $env.authRule -KeyType PrimaryKey
(KeyType is of type KeyType)
New-AzServiceBusKey -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -Name $env.authRule -KeyType PrimaryKey
(KeyType is of type String)
-IdentityType
-PublicNetworkAccess
-SkuName
New-ServiceBusNamespace -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -SkuName Premium -Location eastus -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is ManagedServiceIdentityType),
(PublicNetworkAccess is of type PublicNetworkAccess),
( SkuName is of type SkuName)
New-ServiceBusNamespace -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -SkuName Premium -Location eastus -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is String),
(PublicNetworkAccess is of type String),
( SkuName is of type String)
-IdentityType
-PublicNetworkAccess
-SkuName
New-ServiceBusNamespaceV2 -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -SkuName Premium -Location eastus -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is ManagedServiceIdentityType),
(PublicNetworkAccess is of type PublicNetworkAccess),
( SkuName is of type SkuName)
New-ServiceBusNamespaceV2 -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -SkuName Premium -Location eastus -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is String),
(PublicNetworkAccess is of type String),
( SkuName is of type String)
-Status
(Status is of type EntityStatus)
(Status is of type String)
-Status
(Status is of type EntityStatus)
(Status is of type String)
-Status
(Status is of type EntityStatus)
(Status is of type String)
-Rights
Set-AzServiceBusAuthorizationRule -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -Name $env.authRule2 -Rights @("Manage", "Send", "Listen")
(Rights is of type AccessRights[])
Set-AzServiceBusAuthorizationRule -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -Name $env.authRule2 -Rights @("Manage", "Send", "Listen")
(Rights is of type System.String[])
-IdentityType
-PublicNetworkAccess
-SkuName
Set-AzServiceBusNamespace -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is of type ManagedServiceIdentityType),
(PublicNetworkAccess is of type PublicNetworkAccess),
(SkuName is of type SkuName)
Set-AzServiceBusNamespace -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is of type String),
(PublicNetworkAccess is of type String),
(SkuName is of type String)
-IdentityType
-PublicNetworkAccess
-SkuName
Set-AzServiceBusNamespaceV2 -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is of type ManagedServiceIdentityType),
(PublicNetworkAccess is of type PublicNetworkAccess),
(SkuName is of type SkuName)
Set-AzServiceBusNamespaceV2 -ResourceGroupName $env.resourceGroup -Name $env.namespaceV4 -IdentityType SystemAssigned -PublicNetworkAccess Disabled
( IdentityType is of type String),
(PublicNetworkAccess is of type String),
(SkuName is of type String)
-DefaultAction
-PublicNetworkAccess
Set-AzServiceBusNetworkRuleSet -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -PublicNetworkAccess Disabled -DefaultAction deny
( DefaultAction is of type DefaultAction),
( PublicNetworkAccess is of type PublicNetworkAccess)
Set-AzServiceBusNetworkRuleSet -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -PublicNetworkAccess Disabled -DefaultAction deny
( DefaultAction is of type String),
( PublicNetworkAccess is of type String)
-Status
(Status is of type EntityStatus)
(Status is of type String.)
-FilterType
Set-AzServiceBusRule -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -TopicName topic1 -SubscriptionName subscription1 -Name sqlRule2 -FilterType SqlFilter -SqlExpression x=y
( FilterType is of type FilterType)
Set-AzServiceBusRule -ResourceGroupName $env.resourceGroup -NamespaceName $env.namespace -TopicName topic1 -SubscriptionName subscription1 -Name sqlRule2 -FilterType SqlFilter -SqlExpression x=y
( FilterType is of type String)
-Status
(Status is of type EntityStatus)
(Status is of type String)
-Status
(Status is of type EntityStatus)
(Status is of type String)
New-AzSqlDatabaseFailoverGroup -ServerName example-primary-server -ResourceGroupName example-rg -PartnerServerName example-secondary-server -FailoverGroupName example-fg (FailoverPolicy defaults to Automatic)
New-AzSqlDatabaseFailoverGroup -ServerName example-primary-server -ResourceGroupName example-rg -PartnerServerName example-secondary-server -FailoverGroupName example-fg (FailoverPolicy defaults to Manual)
Get-Help Set-AzSqlDatabaseFailoverGroup -Parameter FailoverPolicy (Output shows default value = Automatic)
Get-Help Set-AzSqlDatabaseFailoverGroup -Parameter FailoverPolicy (Output shows default value = Manual)
PS C:\WINDOWS\system32> $queue = Get-AzStorageQueue -Context $ctx-Name myqueue
PS C:\WINDOWS\system32> $queue | fl
CloudQueue : Microsoft.Azure.Storage.Queue.CloudQueue
Uri : https://mystorageaccount.queue.core.windows.net/myqueue
ApproximateMessageCount : 0
EncodeMessage : True
QueueClient : Azure.Storage.Queues.QueueClient
QueueProperties : Azure.Storage.Queues.Models.QueueProperties
Context : Microsoft.WindowsAzure.Commands.Storage.AzureStorageContext
Name : myqueue
PS C:\WINDOWS\system32> $queueMessage = [Microsoft.Azure.Storage.Queue.CloudQueueMessage]::new("This is message 1")
PS C:\WINDOWS\system32> $queue.CloudQueue.AddMessageAsync($queueMessage)
PS C:\WINDOWS\system32> $queue = Get-AzStorageQueue -Context $ctx-Name myqueue
PS C:\WINDOWS\system32> $queue | fl
QueueClient : Azure.Storage.Queues.QueueClient
Uri : https://mystorageaccount.queue.core.windows.net/myqueue
ApproximateMessageCount : 0
QueueProperties : Azure.Storage.Queues.Models.QueueProperties
Context : Microsoft.WindowsAzure.Commands.Storage.AzureStorageContext
Name : myqueue
PS C:\WINDOWS\system32> $queueMessage = "This is message 1"
PS C:\WINDOWS\system32> $queue.QueueClient.SendMessage($queueMessage)
PS C:\WINDOWS\system32> $queue = New-AzStorageQueue -Name myqueue -Context $ctx
PS C:\WINDOWS\system32> $queue | fl
CloudQueue : Microsoft.Azure.Storage.Queue.CloudQueue
Uri : https://mystorageaccount.queue.core.windows.net/myqueue
ApproximateMessageCount : 0
EncodeMessage : True
QueueClient : Azure.Storage.Queues.QueueClient
QueueProperties : Azure.Storage.Queues.Models.QueueProperties
Context :
Name : myqueue
PS C:\WINDOWS\system32> $queue = New-AzStorageQueue -Name myqueue -Context $ctx
PS C:\WINDOWS\system32> $queue | fl
QueueClient : Azure.Storage.Queues.QueueClient
Uri : https://mystorageaccount.queue.core.windows.net/myqueue
ApproximateMessageCount : 0
QueueProperties : Azure.Storage.Queues.Models.QueueProperties
Context : Microsoft.WindowsAzure.Commands.Storage.AzureStorageContext
Name : myqueue
-Protocol
New-AzStorageQueueSASToken -Name testq1 -Permission ruap -Protocol HttpsOnly -Context $ctx
(The parameter Protocol is of type SharedAccessProtocol)
New-AzStorageQueueSASToken -Name testq1 -Permission ruap -Protocol HttpsOnly -Context $ctx
(The parameter Protocol is of type string)
-UpgradeToStorageV2
No prompt when upgrading to StorageV2:
Set-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -UpgradeToStorageV2
Add -Force to skip the prompt when upgrading to StorageV2
Set-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -UpgradeToStorageV2 -Force
-Path
When uploading Azure File using SAS token without Read permission, the Path parameter will be taken as parent directory path, and will take source file name as destination file name.
$ctxsas = New-AzStorageContext -StorageAccountName $accountName -SasToken $writeOnlySasToken
Set-AzStorageFileContent -ShareName $sharename -Path dir1/dir2 -Source C:\temp\test.txt -Context $ctxsas
When uploading Azure File using SAS token without Read permission, the Path parameter need be whole path of destination file, include file name
$ctxsas = New-AzStorageContext -StorageAccountName $accountName -SasToken $writeOnlySasToken
Set-AzStorageFileContent -ShareName $sharename -Path dir1/dir2/test.txt -Source C:\temp\test.txt -Context $ctxsas
Cmdlet breaking-change will happen to all parameter sets
Parameter breaking-change will happen to all parameter sets
-Id
-ServiceId
Get-AzSupportProblemClassification -ServiceId b452a42b-3779-64de-532c-8a32738357a6 -Id 3400570d-442f-a892-48e2-ff4ad710b38f
Get-AzSupportProblemClassification -ServiceName b452a42b-3779-64de-532c-8a32738357a6 -Name 3400570d-442f-a892-48e2-ff4ad710b38f
Cmdlet breaking-change will happen to all parameter sets
Parameter breaking-change will happen to all parameter sets
-Id
"Get-AzSupportService -Id b452a42b-3779-64de-532c-8a32738357a6
Id : /providers/Microsoft.Support/services/b452a42b-3779-64de-532c-8a32738357a6
Name : b452a42b-3779-64de-532c-8a32738357a6
Type : Microsoft.Support/services
DisplayName : Web App (Linux)
ResourceTypes : {MICROSOFT.WEB/SITES}"
Get-AzSupportService -Name b452a42b-3779-64de-532c-8a32738357a6
DisplayName : Web App (Linux)
Id : /providers/Microsoft.Support/services/b452a42b-3779-64de-532c-8a32738357a6
Name : b452a42b-3779-64de-532c-8a32738357a6
ResourceGroupName :
ResourceType : {MICROSOFT.WEB/SITES}
Type : Microsoft.Support/services
Get-AzSupportTicket -First 1
Id : /subscriptions/86cb77fa-8b17-4eab-9493-b65dace99813/providers/Microsoft
.Support/supportTickets/06bfd9d3-22f96a7f-496854d2-6b34-4c48-a4a9-69a6f
599407a
Name : 06bfd9d3-22f96a7f-496854d2-6b34-4c48-a4a9-69a6f599407a
Type : Microsoft.Support/supportTickets
Title : Quota request for Storage: Azure NetApp Files limits
SupportTicketId : 3505060040007427
Description : Question: Quota type
Answer: Regional Capacity Quota per Subscription (TiB)
Question: Region requested
Answer: Australia Central 2
Question: Quota State
Answer: Current:25, Default:25
Question: Enter value for new limit
Answer: 22
ProblemClassificationId : /providers/Microsoft.Support/services/06bfd9d3-516b-d5c6-5802-169c800de
c89/problemClassifications/22f96a7f-37b3-1504-0258-909e9f5ab3ac
ProblemClassificationDisplayName : Storage: Azure NetApp Files limits
Severity : Minimal
EnrollmentId :
Require24X7Response : False
ContactDetail : Microsoft.Azure.Commands.Support.Models.PSContactProfile
ServiceLevelAgreement : Microsoft.Azure.Commands.Support.Models.PSServiceLevelAgreement
SupportEngineer : Microsoft.Azure.Commands.Support.Models.PSSupportEngineer
SupportPlanType : Azure Internal
ProblemStartTime :
ServiceId : /providers/Microsoft.Support/services/06bfd9d3-516b-d5c6-5802-169c800de
c89
ServiceDisplayName : Service and subscription limits (quotas)
Status : Open
CreatedDate : 5/6/2024 3:42:35 PM
ModifiedDate : 5/6/2024 3:42:46 PM
TechnicalTicketResourceId :
QuotaTicketDetail : Microsoft.Azure.Commands.Support.Models.PSQuotaTicketDetail
Get-AzSupportTicket -Top 1
AdvancedDiagnosticConsent : Yes
ContactDetailAdditionalEmailAddress :
ContactDetailCountry : USA
ContactDetailFirstName : First
ContactDetailLastName : Last
ContactDetailPhoneNumber :
ContactDetailPreferredContactMethod : Email
ContactDetailPreferredSupportLanguage : en-US
ContactDetailPreferredTimeZone : Pacific Standard Time
ContactDetailPrimaryEmailAddress : test@test.com
CreatedDate : 5/6/2024 3:42:35 PM
Description : Question: Quota type
Answer: Regional Capacity Quota per Subscription (TiB)
Question: Region requested
Answer: Australia Central 2
Question: Quota State
Answer: Current:25, Default:25
Question: Enter value for new limit
Answer: 22
EnrollmentId :
FileWorkspaceName : 2405060040007416
Id : /subscriptions/86cb77fa-8b17-4eab-9493-b65dace99813/providers/Microsoft.Support/supportTickets/06bfd9
d3-22f96a7f-496854d2-6b34-4c48-a4a9-69a6f599407a
IsTemporaryTicket : No
ModifiedDate : 5/6/2024 3:42:46 PM
Name : 06bfd9d3-22f96a7f-496854d2-6b34-4c48-a4a9-69a6f599407a
ProblemClassificationDisplayName : Storage: Azure NetApp Files limits
ProblemClassificationId : /providers/Microsoft.Support/services/06bfd9d3-516b-d5c6-5802-169c800dec89/problemClassifications/22f
96a7f-37b3-1504-0258-909e9f5ab3ac
ProblemStartTime :
QuotaTicketDetailQuotaChangeRequest : {{
"region": "australiacentral2",
"payload": "{\"QuotaBucket\":\"tib_per_subscription\",\"tib_per_subscription_text\":\"Current:25,
Default:25\",\"NewLimit\":22}"
}}
QuotaTicketDetailQuotaChangeRequestSubType :
QuotaTicketDetailQuotaChangeRequestVersion : 0.0
Require24X7Response : False
ResourceGroupName :
SecondaryConsent :
ServiceDisplayName : Service and subscription limits (quotas)
ServiceId : /providers/Microsoft.Support/services/06bfd9d3-516b-d5c6-5802-169c800dec89
ServiceLevelAgreementExpirationTime : 5/6/2024 11:42:35 PM
ServiceLevelAgreementSlaMinute : 480
ServiceLevelAgreementStartTime : 5/6/2024 3:42:35 PM
Severity : Minimal
Status : Open
SupportEngineerEmailAddress :
SupportPlanDisplayName : support plan
SupportPlanId : test
SupportPlanType : test
SupportTicketId : 3505060040007427
TechnicalTicketDetailResourceId :
Title : Quota request for Storage: Azure NetApp Files limits
Type : Microsoft.Support/supportTickets
Get-AzSupportTicketCommunication -SupportTicketName 48cf91d7-69575ec1-65697697-e20c-4bfc-bc46-b69f0ef6d0a0 -First 5
Get-AzSupportCommunication -SupportTicketName 48cf91d7-69575ec1-65697697-e20c-4bfc-bc46-b69f0ef6d0a0 -Top 5
Cmdlet breaking-change will happen to all parameter sets
Parameter breaking-change will happen to all parameter sets
-AdditionalEmailAddress
-CSPHomeTenantId
-CustomerContactDetail
-CustomerCountry
-CustomerFirstName
-CustomerLastName
-CustomerPhoneNumber
-CustomerPreferredSupportLanguage
-CustomerPreferredTimeZone
-CustomerPrimaryEmailAddress
-PreferredContactMethod
-QuotaTicketDetail
-TechnicalTicketResourceId
New-AzSupportTicket -Name "test1" -Title "Test" -Description "Test" -Severity "minimal" -ProblemClassificationId "/providers/Microsoft.Support/services/{vm_windows_service_guid}/problemClassifications/{problemClassification_guid}" -TechnicalTicketResourceId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/testRG/providers/Microsoft.Compute/virtualMachines/testVM" -CustomerContactDetail @{FirstName = "first" ; LastName = "last" ; PreferredTimeZone = "pacific standard time" ; PreferredSupportLanguage = "en-us" ; Country = "USA" ; PreferredContactMethod = "Email" ; PrimaryEmailAddress = "test@test.com"}
New-AzSupportTicket -Name "test1" -Title "Test" -Description "Test" -Severity "minimal" -ProblemClassificationId "/providers/Microsoft.Support/services/{quota_service_guid}/problemClassifications/{cores_problemClassification_guid}" -QuotaTicketDetail @{QuotaChangeRequestVersion = "1.0" ; QuotaChangeRequests = (@{Region = "westus"; Payload = "{`"VMFamily`":`"Dv2 Series`",`"NewLimit`":350}"})} -CustomerContactDetail @{FirstName = "first" ; LastName = "last" ; PreferredTimeZone = "pacific standard time" ; PreferredSupportLanguage = "en-us" ; Country = "USA" ; PreferredContactMethod = "Email" ; PrimaryEmailAddress = "test@test.com"}
Id : /subscriptions/{subscription}/providers/Microsoft
.Support/supportTickets/test_1
Name : test_1
Type : Microsoft.Support/supportTickets
Title : test
SupportTicketId : 3505060040008586
Description : test ticket please ignore and close
ProblemClassificationId : /providers/Microsoft.Support/services/{service_id}/problemClassifications/{problemClassification_guid}
ProblemClassificationDisplayName : Compute-VM (cores-vCPUs) subscription limit increases
Severity : Minimal
EnrollmentId :
Require24X7Response : False
ContactDetail : Microsoft.Azure.Commands.Support.Models.PSContactProfile
ServiceLevelAgreement : Microsoft.Azure.Commands.Support.Models.PSServiceLevelAgreement
SupportEngineer : Microsoft.Azure.Commands.Support.Models.PSSupportEngineer
SupportPlanType : Azure Internal
ProblemStartTime :
ServiceId : /providers/Microsoft.Support/services/{service_id}
ServiceDisplayName : Service and subscription limits (quotas)
Status : Open
CreatedDate : 5/6/2024 4:44:24 PM
ModifiedDate : 5/6/2024 4:44:34 PM
TechnicalTicketResourceId :
QuotaTicketDetail : Microsoft.Azure.Commands.Support.Models.PSQuotaTicketDetail
New-AzSupportTicket -Name "test1" -AdvancedDiagnosticConsent "Yes" -ContactDetailCountry "USA" -ContactDetailFirstName "first" -ContactDetailLastName "last" -ContactDetailPreferredContactMethod "email" -ContactDetailPreferredSupportLanguage "en-US" -ContactDetailPreferredTimeZone "Pacific Standard Time" -ContactDetailPrimaryEmailAddress "test@test.com" -Description "test ticket" -ProblemClassificationId "/providers/microsoft.support/services/{vm_windows_service_guid}/problemclassifications/{problemClassigication_guid}" -ServiceId "/providers/microsoft.support/services/{vm_windows_service_guid}" -Severity "minimal" -Title "test" -TechnicalTicketDetailResourceId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/testRG/providers/Microsoft.Compute/virtualMachines/testVM"
New-AzSupportTicket -Name "test1" -AdvancedDiagnosticConsent "Yes" -ContactDetailCountry "USA" -ContactDetailFirstName "firstName" -ContactDetailLastName "lastName" -ContactDetailPreferredContactMethod "email" -ContactDetailPreferredSupportLanguage "en-US" -ContactDetailPreferredTimeZone "Pacific Standard Time" -ContactDetailPrimaryEmailAddress "test@test.com" -Description "test ticket please ignore and close" -ProblemClassificationId "/providers/microsoft.support/services/{quota_service_guid}/problemclassifications/{cores_problemClassification_guid}" -ServiceId "/providers/microsoft.support/services/{quota_service_guid}" -Severity "minimal" -Title "test" -QuotaTicketDetailQuotaChangeRequest @(@{ Payload = "{`"VMFamily`":`"DV2 Series`",`"NewLimit`":`"350`",`"DeploymentStack`":`"ARM`",`"Type`":`"Regional`",`"EdgeZone`":`"`"}"; Region = "EASTUS"}) -QuotaTicketDetailQuotaChangeRequestVersion "1.0"
AdvancedDiagnosticConsent : Yes
ContactDetailAdditionalEmailAddress :
ContactDetailCountry : USA
ContactDetailFirstName : firstName
ContactDetailLastName : lastName
ContactDetailPhoneNumber :
ContactDetailPreferredContactMethod : Email
ContactDetailPreferredSupportLanguage : en-US
ContactDetailPreferredTimeZone : Pacific Standard Time
ContactDetailPrimaryEmailAddress : test@test.com
CreatedDate : 5/6/2024 4:44:24 PM
Description : test ticket please ignore and close
EnrollmentId :
FileWorkspaceName : 3505060040008586
Id : /subscriptions/{subscription_id}/providers/Microsoft.Support/supportTickets/test1
IsTemporaryTicket : No
ModifiedDate : 5/6/2024 4:44:36 PM
Name : test_grace_2
ProblemClassificationDisplayName : Compute-VM (cores-vCPUs) subscription limit increases
ProblemClassificationId : /providers/Microsoft.Support/services/{service_id}/problemClassifications/{problemClassification_guid}
ProblemScopingQuestion :
ProblemStartTime :
QuotaTicketDetailQuotaChangeRequest : {{
"region": "EASTUS",
"payload": "{\"VMFamily\":\"DV2
Series\",\"NewLimit\":\"350\",\"DeploymentStack\":\"ARM\",\"Type\":\"Regional\",\"EdgeZone\":\"\"}"
}}
QuotaTicketDetailQuotaChangeRequestSubType :
QuotaTicketDetailQuotaChangeRequestVersion : 1.0
Require24X7Response : False
ResourceGroupName :
SecondaryConsent :
ServiceDisplayName : Service and subscription limits (quotas)
ServiceId : /providers/Microsoft.Support/services/{service_id}
ServiceLevelAgreementExpirationTime : 5/7/2024 12:44:24 AM
ServiceLevelAgreementSlaMinute : 480
ServiceLevelAgreementStartTime : 5/6/2024 4:44:24 PM
Severity : Minimal
Status : Open
SupportEngineerEmailAddress :
SupportPlanDisplayName : suppport plan
SupportPlanId : test
SupportPlanType : support plan
SupportTicketId : 3505060040008586
TechnicalTicketDetailResourceId :
Title : test
Type : Microsoft.Support/supportTickets
New-AzSupportTicketCommunication -SupportTicketName 48cf91d7-69575ec1-65697697-e20c-4bfc-bc46-b69f0ef6d0a0 -Name "testcomm1" -Subject "test" -Body "test"
New-AzSupportCommunication -SupportTicketName 48cf91d7-69575ec1-65697697-e20c-4bfc-bc46-b69f0ef6d0a0 -Name "testcomm1" -Subject "test" -Body "test"
Cmdlet breaking-change will happen to all parameter sets
Parameter breaking-change will happen to all parameter sets
-AdditionalEmailAddress
-CustomerContactDetail
-CustomerCountry
-CustomerFirstName
-CustomerLastName
-CustomerPhoneNumber
-CustomerPreferredSupportLanguage
-CustomerPreferredTimeZone
-CustomerPrimaryEmailAddress
-PreferredContactMethod
$contactDetail = New-Object Microsoft.Azure.Commands.Support.Models.PSContactProfile
$contactDetail.FirstName = "first name updated"
$contactDetail.LastName = "last name updated"
Update-AzSupportTicket -Name "test1" -CustomerContactDetail $contactDetail -CustomerCountry "USA"
Id : /subscriptions/{subscription}/providers/Microsoft
.Support/supportTickets/test_1
Name : test_1
Type : Microsoft.Support/supportTickets
Title : test
SupportTicketId : 3505060040008586
Description : test ticket please ignore and close
ProblemClassificationId : /providers/Microsoft.Support/services/{service_id}/problemClassifications/{problemClassification_guid}
ProblemClassificationDisplayName : Compute-VM (cores-vCPUs) subscription limit increases
Severity : Minimal
EnrollmentId :
Require24X7Response : False
ContactDetail : Microsoft.Azure.Commands.Support.Models.PSContactProfile
ServiceLevelAgreement : Microsoft.Azure.Commands.Support.Models.PSServiceLevelAgreement
SupportEngineer : Microsoft.Azure.Commands.Support.Models.PSSupportEngineer
SupportPlanType : Azure Internal
ProblemStartTime :
ServiceId : /providers/Microsoft.Support/services/{service_id}
ServiceDisplayName : Service and subscription limits (quotas)
Status : Open
CreatedDate : 5/6/2024 4:44:24 PM
ModifiedDate : 5/6/2024 4:44:34 PM
TechnicalTicketResourceId :
QuotaTicketDetail : Microsoft.Azure.Commands.Support.Models.PSQuotaTicketDetail
Update-SupportTicket -Name "test1" -ContactDetailFirstName "first name updated" -ContactDetailLastName "last name updated" -ContactDetailCountry "USA"
AdvancedDiagnosticConsent : Yes
ContactDetailAdditionalEmailAddress :
ContactDetailCountry : USA
ContactDetailFirstName : first name updated
ContactDetailLastName : last name updated
ContactDetailPhoneNumber :
ContactDetailPreferredContactMethod : Email
ContactDetailPreferredSupportLanguage : en-US
ContactDetailPreferredTimeZone : Pacific Standard Time
ContactDetailPrimaryEmailAddress : test@test.com
CreatedDate : 5/6/2024 4:44:24 PM
Description : test ticket please ignore and close
EnrollmentId :
FileWorkspaceName : 3505060040008586
Id : /subscriptions/{subscription_id}/providers/Microsoft.Support/supportTickets/test1
IsTemporaryTicket : No
ModifiedDate : 5/6/2024 4:44:36 PM
Name : test_grace_2
ProblemClassificationDisplayName : Compute-VM (cores-vCPUs) subscription limit increases
ProblemClassificationId : /providers/Microsoft.Support/services/{service_id}/problemClassifications/{problemClassification_guid}
ProblemScopingQuestion :
ProblemStartTime :
QuotaTicketDetailQuotaChangeRequest : {{
"region": "EASTUS",
"payload": "{\"VMFamily\":\"DV2
Series\",\"NewLimit\":\"350\",\"DeploymentStack\":\"ARM\",\"Type\":\"Regional\",\"EdgeZone\":\"\"}"
}}
QuotaTicketDetailQuotaChangeRequestSubType :
QuotaTicketDetailQuotaChangeRequestVersion : 1.0
Require24X7Response : False
ResourceGroupName :
SecondaryConsent :
ServiceDisplayName : Service and subscription limits (quotas)
ServiceId : /providers/Microsoft.Support/services/{service_id}
ServiceLevelAgreementExpirationTime : 5/7/2024 12:44:24 AM
ServiceLevelAgreementSlaMinute : 480
ServiceLevelAgreementStartTime : 5/6/2024 4:44:24 PM
Severity : Minimal
Status : Open
SupportEngineerEmailAddress :
SupportPlanDisplayName : suppport plan
SupportPlanId : test
SupportPlanType : support plan
SupportTicketId : 3505060040008586
TechnicalTicketDetailResourceId :
Title : test
Type : Microsoft.Support/supportTickets
Comentarios de Azure PowerShell
Azure PowerShell es un proyecto de código abierto. Seleccione un vínculo para proporcionar comentarios:
Cursos
Certificación
Microsoft Certified: Azure Administrator Associate - Certifications
Demostrar aptitudes clave para configurar, proteger y administrar funciones profesionales clave en Microsoft Azure.