Skip to content

Commit c465133

Browse files
committed
Bulk fix to change az API links from using underscore to dash
1 parent 4e0d591 commit c465133

3 files changed

Lines changed: 5 additions & 5 deletions

File tree

docs/big-data-cluster/deploy-on-aks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ Choose the latest available version for your cluster. Record the version number.
146146

147147
## Connect to the cluster
148148

149-
1. To configure kubectl to connect to your Kubernetes cluster, run the [az aks get-credentials](/cli/azure/aks#az_aks_get_credentials) command. This step downloads credentials and configures the kubectl CLI to use them.
149+
1. To configure kubectl to connect to your Kubernetes cluster, run the [az aks get-credentials](/cli/azure/aks#az-aks-get-credentials) command. This step downloads credentials and configures the kubectl CLI to use them.
150150

151151
```azurecli
152152
az aks get-credentials --resource-group=sqlbdcgroup --name kubcluster

docs/relational-databases/security/encryption/troubleshoot-tde.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -64,15 +64,15 @@ Use the following cmdlet or command to ensure that an identity has been assigned
6464

6565
- Azure PowerShell: [Get-AzSqlServer](/powershell/module/Az.Sql/Get-AzSqlServer)
6666

67-
- Azure CLI: [az-sql-server-show](/cli/azure/sql/server#az_sql_server_show)
67+
- Azure CLI: [az-sql-server-show](/cli/azure/sql/server#az-sql-server-show)
6868

6969
**Mitigation**
7070

7171
Use the following cmdlet or command to configure an Azure AD identity for the server:
7272

7373
- Azure PowerShell: [Set-AzSqlServer](/powershell/module/az.sql/set-azsqlserver) with the `-AssignIdentity` option.
7474

75-
- Azure CLI: [az sql server update](/cli/azure/sql/server#az_sql_server_update) with the `--assign_identity` option.
75+
- Azure CLI: [az sql server update](/cli/azure/sql/server#az-sql-server-update) with the `--assign_identity` option.
7676

7777
In the Azure portal, go to the key vault, and then go to **Access policies**. Complete these steps:
7878

@@ -99,7 +99,7 @@ To identify the key URI and the key vault:
9999

100100
- Azure PowerShell: [Get-AzSqlServerKeyVaultKey](/powershell/module/az.sql/get-azsqlserverkeyvaultkey)
101101

102-
- Azure CLI: [az-sql-server-tde-key-show](/cli/azure/sql/server/tde-key#az_sql_server_tdekey_show)
102+
- Azure CLI: [az-sql-server-tde-key-show](/cli/azure/sql/server/tde-key#az-sql-server-tdekey-show)
103103

104104
1. Use the key URI to identify the key vault:
105105

docs/sql-server/azure-arc/connect-at-scale.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Each machine must have [Azure PowerShell](/powershell/azure/install-az-ps) insta
8787

8888
Each target machine must have the [Azure CLI installed](/cli/azure/install-azure-cli). The registration script will automatically sign in to Azure with the service principal credentials if they're provided and no other user is already signed in. Use the following steps to connect SQL Server instances on multiple Linux machines.
8989

90-
1. Create the service principal using the ['az ad sp create-for-rbac'](/cli/azure/ad/sp#az_ad_sp_create_for_rbac) command.
90+
1. Create the service principal using the ['az ad sp create-for-rbac'](/cli/azure/ad/sp#az-ad-sp-create-for-rbac) command.
9191

9292
```azurecli-interactive
9393
az ad sp create-for-rbac --name <your service principal name> --role <your custom role name>

0 commit comments

Comments
 (0)