Skip to content

Commit 3b81057

Browse files
authored
Merge pull request #21127 from TimShererWithAquent/us1907184c
Validation Code tag cleanup sql
2 parents fd58649 + f6bbee2 commit 3b81057

8 files changed

Lines changed: 11 additions & 11 deletions

docs/big-data-cluster/active-directory-deployment-aks-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Before deploying a SQL Server big data cluster, you need to:
3939

4040
1. Create the AKS subnet
4141

42-
```console
42+
```azurecli
4343
SUBNET_ID=$(az network vnet subnet show \
4444
--resource-group $RESOURCE_GROUP \
4545
--vnet-name $VNet_NAME \

docs/big-data-cluster/cluster-troubleshooting-commands.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -201,7 +201,7 @@ You can launch the Kubernetes dashboard for additional information about the clu
201201

202202
To launch the Kubernetes dashboard run:
203203

204-
```bash
204+
```azurecli
205205
az aks browse --resource-group <azure_resource_group> --name <aks_cluster_name>
206206
```
207207

docs/big-data-cluster/private-deploy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ This section shows you deploy a big data cluster in Azure Kubernetes Service (AK
3333

3434
## Create a private AKS cluster with advanced networking
3535

36-
```bash
36+
```azurecli
3737
3838
export REGION_NAME=<your Azure region >
3939
export RESOURCE_GROUP=< your resource group name >
@@ -67,7 +67,7 @@ echo $SUBNET_ID
6767

6868
To be able to get to next step, you need to provision an AKS cluster with Standard Load Balancer with private cluster feature enabled. Your command will look like as follows:
6969

70-
```bash
70+
```azurecli
7171
az aks create \
7272
--resource-group $RESOURCE_GROUP \
7373
--name $AKS_NAME \

docs/big-data-cluster/private-restrict-egress-traffic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ The following steps provide details.
9090

9191
1. Define a set of environment variables for creating resources.
9292

93-
```console
93+
```azurecli
9494
export FWNAME=bdcaksazfw
9595
export FWPUBIP=$FWNAME-ip
9696
export FWIPCONFIG_NAME=$FWNAME-config

docs/connect/odbc/linux-mac/connecting-with-bcp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Specifies the password for the login ID. When used with the -G option without -U
9999

100100
Access tokens can be obtained via various methods. It's important to ensure the access token is correct byte-for-byte, as it will be sent as-is. Below is an example command that obtains an access token. The command uses the Azure CLI and Linux commands and saves it to a file in the proper format. If your system or terminal's default encoding isn't ASCII or UTF-8, you may need to adjust the `iconv` options. Be sure to carefully secure the resulting file and delete it when it's no longer required.
101101

102-
```bash
102+
```azurecli
103103
az account get-access-token --resource https://database.windows.net --output tsv | cut -f 1 | tr -d '\n' | iconv -f ascii -t UTF-16LE > /tmp/tokenFile
104104
```
105105

docs/connect/odbc/linux-mac/connecting-with-sqlcmd.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ Specify a user password. When used with the -G option without -U, specifies a fi
115115

116116
Access tokens can be obtained via various methods. It's important to ensure the access token is correct byte-for-byte, as it will be sent as-is. Below is an example command that obtains an access token. The command uses the Azure CLI and Linux commands and saves it to a file in the proper format. If your system or terminal's default encoding isn't ASCII or UTF-8, you may need to adjust the `iconv` options. Be sure to carefully secure the resulting file and delete it when it's no longer required.
117117

118-
```bash
118+
```azurecli
119119
az account get-access-token --resource https://database.windows.net --output tsv | cut -f 1 | tr -d '\n' | iconv -f ascii -t UTF-16LE > /tmp/tokenFile
120120
```
121121

docs/linux/tutorial-sql-server-containers-kubernetes-dh2i.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ $docker push <registry-name>.azurecr.io/sqlimage:latest
106106

107107
This ensures that the custom image has been pushed to Azure Container Registry (ACR) and that you can now integrate your Azure Kubernetes Service (AKS) with ACR by running the following command. For more information, see this [Integrate ACR with an AKS cluster](/azure/aks/cluster-container-registry-integration).
108108

109-
```bash
109+
```azurecli
110110
az aks update -n myAKSCluster -g <myResourceGroup> --attach-acr <registry-name>
111111
```
112112

docs/sql-server/azure-arc/connect.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -185,21 +185,21 @@ If you disconnected your SQL Server instance by mistake, you can restore its __S
185185

186186
1. If you also uninstalled the SQL Server extension by mistake, reinstall it.
187187

188-
```console
188+
```azurecli
189189
az connectedmachine extension create --machine-name "{your machine name}" --location {"azure region"} --name "WindowsAgent.SqlServer" --resource-group "{your resource group name}" --type "WindowsAgent.SqlServer" --publisher "Microsoft.AzureData" --settings '{\"SqlManagement\":{\"IsEnabled\":true}, \"excludedSqlInstances\":[]}'
190190
```
191191
> [!NOTE]
192192
> The location property must match the location of the **Server - Azure Arc** resource for the server specified by the *--machine-name* parameter.
193193
194194
2. Check to make sure your instance is in the exclusion list (see the value of the _excludedSqlInstances_ property).
195195

196-
```console
196+
```azurecli
197197
az connectedmachine extension show --machine-name "{your machine name}" --resource-group "{your resource group name}" -n WindowsAgent.SqlServer
198198
```
199199

200200
3. Make sure to remove your instance from the exclusion list and update the extension settings.
201201

202-
```console
202+
```azurecli
203203
az connectedmachine extension create --machine-name "{your machine name}" --location {"azure region"} --name "WindowsAgent.SqlServer" --resource-group "{your resource group name}" --type "WindowsAgent.SqlServer" --publisher "Microsoft.AzureData" --settings '{\"SqlManagement\":{\"IsEnabled\":true}, \"excludedSqlInstances\":[\"{named instance 1}\",\"{named instance 3}}\"]}'
204204
```
205205
The instance will be restored after the next sync with the agent. For information on how to manage vm extensions using Portal or PowerShell, see [virtual machine extension management](/azure/azure-arc/servers/manage-vm-extensions).

0 commit comments

Comments
 (0)