diff --git a/src/FrontDoor/FrontDoor/help/Disable-AzFrontDoorCustomDomainHttps.md b/src/FrontDoor/FrontDoor/help/Disable-AzFrontDoorCustomDomainHttps.md index 117bdb86e671..d9ca608da1d5 100644 --- a/src/FrontDoor/FrontDoor/help/Disable-AzFrontDoorCustomDomainHttps.md +++ b/src/FrontDoor/FrontDoor/help/Disable-AzFrontDoorCustomDomainHttps.md @@ -38,8 +38,10 @@ The **Disable-AzFrontDoorCustomDomainHttps** disables HTTPS for a custom domain. ### Example 1: Disable HTTPS for a custom domain with FrontDoorName and ResourceGroupName. ```powershell -PS C:\> Disable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" +Disable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" +``` +```output HostName : frontendpointname1.custom.xyz SessionAffinityEnabledState : Disabled SessionAffinityTtlSeconds : 0 @@ -64,8 +66,10 @@ Disable HTTPS for a custom domain "frontendpointname1-custom-xyz" with FrontDoor ### Example 2: Disable HTTPS for a custom domain with PSFrontendEndpoint object. ```powershell -PS C:\> Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" | Disable-AzFrontDoorCustomDomainHttps -InputObject $frontendEndpointObj +Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" | Disable-AzFrontDoorCustomDomainHttps -InputObject $frontendEndpointObj +``` +```output HostName : frontendpointname1.custom.xyz SessionAffinityEnabledState : Disabled SessionAffinityTtlSeconds : 0 @@ -90,8 +94,10 @@ Disable HTTPS for a custom domain with PSFrontendEndpoint object. ### Example 3: Disable HTTPS for a custom domain with ResourceId. ```powershell -PS C:\> Disable-AzFrontDoorCustomDomainHttps -ResourceId $resourceId +Disable-AzFrontDoorCustomDomainHttps -ResourceId $resourceId +``` +```output HostName : frontendpointname1.custom.xyz SessionAffinityEnabledState : Disabled SessionAffinityTtlSeconds : 0 diff --git a/src/FrontDoor/FrontDoor/help/Enable-AzFrontDoorCustomDomainHttps.md b/src/FrontDoor/FrontDoor/help/Enable-AzFrontDoorCustomDomainHttps.md index 1b98b842f3ea..891f56314cae 100644 --- a/src/FrontDoor/FrontDoor/help/Enable-AzFrontDoorCustomDomainHttps.md +++ b/src/FrontDoor/FrontDoor/help/Enable-AzFrontDoorCustomDomainHttps.md @@ -60,9 +60,10 @@ The **Enable-AzFrontDoorCustomDomainHttps** enables HTTPS for a custom domain. ### Example 1: Enable HTTPS for a custom domain with FrontDoorName and ResourceGroupName using Front Door managed certificate. ```powershell -PS C:\> Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -MinimumTlsVersion "1.2" - +Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -MinimumTlsVersion "1.2" +``` +```output HostName : frontendpointname1.custom.xyz SessionAffinityEnabledState : Disabled SessionAffinityTtlSeconds : 0 @@ -88,10 +89,11 @@ Enable HTTPS for a custom domain "frontendpointname1-custom-xyz" that is part of ### Example 2: Enable HTTPS for a custom domain with FrontDoorName and ResourceGroupName using customer's own certificate in Key Vault with the specific version. ```powershell -PS C:\> $vaultId = (Get-AzKeyVault -VaultName $vaultName).ResourceId -PS C:\> Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -Vault $vaultId -secretName $secretName -SecretVersion $secretVersion -MinimumTlsVersion "1.0" - +$vaultId = (Get-AzKeyVault -VaultName $vaultName).ResourceId +Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -Vault $vaultId -secretName $secretName -SecretVersion $secretVersion -MinimumTlsVersion "1.0" +``` +```output HostName : frontendpointname1.custom.xyz SessionAffinityEnabledState : Disabled SessionAffinityTtlSeconds : 0 @@ -117,9 +119,10 @@ Enable HTTPS for a custom domain "frontendpointname1-custom-xyz" that is part of ### Example 3: Enable HTTPS for a custom domain with PSFrontendEndpoint object using Front Door managed certificate. ```powershell -PS C:\> Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -Name "frontendpointname1-custom-xyz" | Enable-AzFrontDoorCustomDomainHttps - +Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -Name "frontendpointname1-custom-xyz" | Enable-AzFrontDoorCustomDomainHttps +``` +```output HostName : frontendpointname1.custom.xyz SessionAffinityEnabledState : Disabled SessionAffinityTtlSeconds : 0 @@ -145,9 +148,10 @@ Enable HTTPS for a custom domain with PSFrontendEndpoint object using Front Door ### Example 4: Enable HTTPS for a custom domain with resource id using Front Door managed certificate. ```powershell -PS C:\> Enable-AzFrontDoorCustomDomainHttps -ResourceId $resourceId - +Enable-AzFrontDoorCustomDomainHttps -ResourceId $resourceId +``` +```output HostName : frontendpointname1.custom.xyz SessionAffinityEnabledState : Disabled SessionAffinityTtlSeconds : 0 @@ -173,10 +177,11 @@ Enable HTTPS for a custom domain "frontendpointname1-custom-xyz" with resource i ### Example 5: Enable HTTPS for a custom domain with FrontDoorName and ResourceGroupName using customer's own certificate in Key Vault with the latest version to enable certificate auto-rotation. ```powershell -PS C:\> $vaultId = (Get-AzKeyVault -VaultName $vaultName).ResourceId -PS C:\> Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -Vault $vaultId -secretName $secretName -MinimumTlsVersion "1.0" - +$vaultId = (Get-AzKeyVault -VaultName $vaultName).ResourceId +Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -Vault $vaultId -secretName $secretName -MinimumTlsVersion "1.0" +``` +```output HostName : frontendpointname1.custom.xyz SessionAffinityEnabledState : Disabled SessionAffinityTtlSeconds : 0 diff --git a/src/FrontDoor/FrontDoor/help/Get-AzFrontDoor.md b/src/FrontDoor/FrontDoor/help/Get-AzFrontDoor.md index 60be248f57cf..83fca1db64b9 100644 --- a/src/FrontDoor/FrontDoor/help/Get-AzFrontDoor.md +++ b/src/FrontDoor/FrontDoor/help/Get-AzFrontDoor.md @@ -24,8 +24,10 @@ The **Get-AzFrontDoor** cmdletGet gets all existing Front Doors in the current s ### Example 1: Get all FrontDoors in the current subscription. ```powershell -PS C:\> Get-AzFrontDoor +Get-AzFrontDoor +``` +```output FriendlyName : frontdoor1 FrontDoorId : {guid} RoutingRules : {routingrule1} @@ -65,8 +67,10 @@ Get all FrontDoors in the current subscription. ### Example 2: Get all FrontDoors in resource group "rg1" in the current subscription. ```powershell -PS C:\> Get-AzFrontDoor -ResourceGroupName "rg1" +Get-AzFrontDoor -ResourceGroupName "rg1" +``` +```output FriendlyName : frontdoor1 FrontDoorId : {guid} RoutingRules : {routingrule1} @@ -106,8 +110,10 @@ Get all FrontDoors in resource group "rg1" in the current subscription. ### Example 3: Get the FrontDoors in resource group "rg1" with name "frontDoor1" in the current subscription. ```powershell -PS C:\> Get-AzFrontDoor -ResourceGroupName "rg1" -Name "frontDoor1" +Get-AzFrontDoor -ResourceGroupName "rg1" -Name "frontDoor1" +``` +```output FriendlyName : frontdoor1 FrontDoorId : {guid} RoutingRules : {routingrule1} diff --git a/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorFrontendEndpoint.md b/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorFrontendEndpoint.md index 3841903a1034..313095c1130a 100644 --- a/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorFrontendEndpoint.md +++ b/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorFrontendEndpoint.md @@ -37,9 +37,10 @@ The **Get-AzFrontDoorFrontendEndpoint** cmdlet gets all existing frontend endpoi ### Example 1: Get all frontend endpoints in Front Door "frontdoor1" which is part of resource group "rg1". ```powershell -PS C:\> Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "rg1" -FrontDoorName "frontdoor1" - +Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "rg1" -FrontDoorName "frontdoor1" +``` +```output HostName : frontdoor1.azurefd.net SessionAffinityEnabledState : Disabled SessionAffinityTtlSeconds : 0 @@ -83,9 +84,10 @@ Get all frontend endpoints in Front Door "frontdoor1" which is part of resource ### Example 2: Get frontend endpoint with name "frontdoor1-azurefd-net" in Front Door "frontdoor1" which is part of resource group "rg1" ```powershell -PS C:\> Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "rg1" -FrontDoorName "frontdoor1" -Name "frontdoor1-azurefd-net" - +Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "rg1" -FrontDoorName "frontdoor1" -Name "frontdoor1-azurefd-net" +``` +```output HostName : frontdoor1.azurefd.net SessionAffinityEnabledState : Disabled SessionAffinityTtlSeconds : 0 diff --git a/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorRulesEngine.md b/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorRulesEngine.md index 104dba9cd6bf..2520211825cd 100644 --- a/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorRulesEngine.md +++ b/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorRulesEngine.md @@ -24,8 +24,10 @@ The **Get-AzFrontDoorRulesEngine** cmdlet gets a specific rules engine configura ### Example 1 ```powershell -PS C:\> Get-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName -Name rulesengine3 +Get-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName -Name rulesengine3 +``` +```output Name RulesEngineRules ---- ---------------- rulesEngine3 {rules1} @@ -36,8 +38,10 @@ Get specific rules engine configuration. ### Example 2 ```powershell -PS C:\> Get-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName +Get-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName +``` +```output Name RulesEngineRules ---- ---------------- rulesEngine1 {Rule1} @@ -50,7 +54,10 @@ Get all rules engine configurations in a front door. ### Example 3 ```powershell -PS C:\> Get-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName -Name nonexistent +Get-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName -Name nonexistent +``` + +```output Get-AzFrontDoorRulesEngine : Rules Engine with name 'nonexistent' in Front Door 'frontDoorName' is not found. At line:1 char:1 + Get-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontD ... diff --git a/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorWafManagedRuleSetDefinition.md b/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorWafManagedRuleSetDefinition.md index fbb0669f02bc..f66228437ed2 100644 --- a/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorWafManagedRuleSetDefinition.md +++ b/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorWafManagedRuleSetDefinition.md @@ -23,8 +23,10 @@ Gets the list of WAF managed rule set definitions to use as reference ### Example 1 ```powershell -PS C:> Get-AzFrontDoorWafManagedRuleSetDefinition +Get-AzFrontDoorWafManagedRuleSetDefinition +``` +```output ProvisioningState RuleSetType RuleSetVersion RuleGroups ----------------- ----------- -------------- ---------- Succeeded DefaultRuleSet 1.0 {PROTOCOL-ATTACK, LFI, RFI, RCE...} diff --git a/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorWafPolicy.md b/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorWafPolicy.md index 59f623c43c16..8462d4710026 100644 --- a/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorWafPolicy.md +++ b/src/FrontDoor/FrontDoor/help/Get-AzFrontDoorWafPolicy.md @@ -24,8 +24,10 @@ The **Get-AzFrontDoorWafPolicy** cmdletGet gets WAF policy in a resource group u ### Example 1 ```powershell -PS C:\> Get-AzFrontDoorWafPolicy -Name $policyName -ResourceGroupName $resourceGroupName +Get-AzFrontDoorWafPolicy -Name $policyName -ResourceGroupName $resourceGroupName +``` +```output Name PolicyMode PolicyEnabledState CustomBlockResponseStatusCode RedirectUrl ---- ---------- ------------------ ----------------------------- ----------- {policyName} Prevention Enabled 403 https://www.bing.com/ @@ -35,8 +37,10 @@ Get a WAF policy called $policyName in $resourceGroupName ### Example 2 ```powershell -PS C:\> Get-AzFrontDoorWafPolicy -ResourceGroupName $resourceGroupName +Get-AzFrontDoorWafPolicy -ResourceGroupName $resourceGroupName +``` +```output Name PolicyMode PolicyEnabledState CustomBlockResponseStatusCode RedirectUrl ---- ---------- ------------------ ----------------------------- ----------- {policyName} Prevention Disabled diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoor.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoor.md index f7d735d0cb9e..629d3ce6b6fa 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoor.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoor.md @@ -37,8 +37,10 @@ The **New-AzFrontDoor** cmdlet creates a new Azure Front Door load balancer in t ### Example 1: Create a Front Door based on given parameters. ```powershell -PS C:\> New-AzFrontDoor -Name "frontDoor1" -ResourceGroupName "rg1" -RoutingRule $routingrule1 -BackendPool $backendpool1 -FrontendEndpoint $frontendEndpoint1 -LoadBalancingSetting $loadBalancingSetting1 -HealthProbeSetting $healthProbeSetting1 -BackendPoolsSetting $backendPoolsSetting1 +New-AzFrontDoor -Name "frontDoor1" -ResourceGroupName "rg1" -RoutingRule $routingrule1 -BackendPool $backendpool1 -FrontendEndpoint $frontendEndpoint1 -LoadBalancingSetting $loadBalancingSetting1 -HealthProbeSetting $healthProbeSetting1 -BackendPoolsSetting $backendPoolsSetting1 +``` +```output FriendlyName : frontdoor1 RoutingRules : {routingrule1} BackendPools : {backendpool1} diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendObject.md index 4f63630202a2..6008913dd590 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendObject.md @@ -26,9 +26,10 @@ Create a PSBackend object for Front Door creation ### Example 1 ```powershell -PS C:\>New-AzFrontDoorBackendObject -Address "contoso1.azurewebsites.net" - +New-AzFrontDoorBackendObject -Address "contoso1.azurewebsites.net" +``` +```output Address : contoso1.azurewebsites.net HttpPort : 80 HttpsPort : 443 diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendPoolObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendPoolObject.md index 23acf619ee46..c2f4172f5f36 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendPoolObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendPoolObject.md @@ -25,10 +25,11 @@ Create a PSBackendPool object for Front Door creation ### Example 1 ```powershell -PS C:\> New-AzFrontDoorBackendPoolObject -Name "backendpool1" -FrontDoorName $Name -ResourceGroupName $resourceGroupName -Backend $backend1 -He +New-AzFrontDoorBackendPoolObject -Name "backendpool1" -FrontDoorName $Name -ResourceGroupName $resourceGroupName -Backend $backend1 -He althProbeSettingsName "healthProbeSetting1" -LoadBalancingSettingsName "loadBalancingSetting1" +``` - +```output Backends : {Microsoft.Azure.Commands.FrontDoor.Models.PSBackend} LoadBalancingSettingRef : /subscriptions/{subid}/resourceGroups/{resourceGroupName}/providers /Microsoft.Network/frontDoors/frontdoor5/LoadBalancingSettings/loadBalancingSetting1 diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendPoolsSettingObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendPoolsSettingObject.md index 5fac33415b1d..de173a7f0fd6 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendPoolsSettingObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendPoolsSettingObject.md @@ -24,9 +24,10 @@ The **New-AzFrontDoorBackendpoolsSettingObject** cmdlet creates a new PSBackendP ### Example 1: Create BackendPoolsSettings object using defaults ```powershell -PS C:\> New-AzFrontDoorBackendpoolsSettingObject - +New-AzFrontDoorBackendpoolsSettingObject +``` +```output EnforceCertificateNameCheck : Enabled SendRecvTimeoutInSeconds : 30 Id : @@ -36,9 +37,10 @@ Type : ### Example 2: Create BackendPoolsSettings object with user specified values ```powershell -PS C:\> New-AzFrontDoorBackendpoolsSettingObject -SendRecvTimeoutInSeconds 60 -EnforceCertificateNameCheck Enabled - +New-AzFrontDoorBackendpoolsSettingObject -SendRecvTimeoutInSeconds 60 -EnforceCertificateNameCheck Enabled +``` +```output EnforceCertificateNameCheck : Enabled SendRecvTimeoutInSeconds : 60 Id : diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorFrontendEndpointObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorFrontendEndpointObject.md index 652fbfabfd74..ccbb1f65ff6c 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorFrontendEndpointObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorFrontendEndpointObject.md @@ -27,9 +27,10 @@ Create a PSFrontendEndpoint Object for Front Door creation ### Example 1 ```powershell -PS C:\> New-AzFrontDoorFrontendEndpointObject -Name "frontendendpoint1" -HostName "frontendendpoint1" - +New-AzFrontDoorFrontendEndpointObject -Name "frontendendpoint1" -HostName "frontendendpoint1" +``` +```output HostName : frontendendpoint1 SessionAffinityEnabledState : Disabled SessionAffinityTtlSeconds : 0 diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorHeaderActionObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorHeaderActionObject.md index e2d6b27dd615..a61ef497ba1a 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorHeaderActionObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorHeaderActionObject.md @@ -24,8 +24,10 @@ Creates PSHeaderAction object for the creation of PSRulesEngineAction object. ### Example 1 ```powershell -PS C:\> New-AzFrontDoorHeaderActionObject -HeaderName headername -HeaderActionType Append +New-AzFrontDoorHeaderActionObject -HeaderName headername -HeaderActionType Append +``` +```output HeaderName HeaderActionType Value ---------- ---------------- ----- headername Append diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorHealthProbeSettingObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorHealthProbeSettingObject.md index 3c8922370fa5..874c794a918c 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorHealthProbeSettingObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorHealthProbeSettingObject.md @@ -25,9 +25,10 @@ Create a PSHealthProbeSetting object for Front Door creation ### Example 1 ```powershell -PS C:\> New-AzFrontDoorHealthProbeSettingObject -Name "healthProbeSetting1" - +New-AzFrontDoorHealthProbeSettingObject -Name "healthProbeSetting1" +``` +```output Path : / Protocol : Http IntervalInSeconds : 30 diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorLoadBalancingSettingObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorLoadBalancingSettingObject.md index e80bdcea3ffe..948604714bbb 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorLoadBalancingSettingObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorLoadBalancingSettingObject.md @@ -25,9 +25,10 @@ Create a PSLoadBalancingSetting object for Front Door creation ### Example 1 ```powershell -PS C:\> New-AzFrontDoorLoadBalancingSettingObject -Name "loadbalancingsetting1" - +New-AzFrontDoorLoadBalancingSettingObject -Name "loadbalancingsetting1" +``` +```output SampleSize : 4 AdditionalLatencyMilliseconds : 0 SuccessfulSamplesRequired : 2 diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRoutingRuleObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRoutingRuleObject.md index 583a7c22842d..4b8bf45d0bce 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRoutingRuleObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRoutingRuleObject.md @@ -38,8 +38,10 @@ Create a PSRoutingRuleObject for Front Door creation ### Example 1: Create a PSRoutingRuleObject for Front Door creation with a forwarding rule ```powershell -PS C:\> New-AzFrontDoorRoutingRuleObject -Name $routingRuleName -FrontDoorName $frontDoorName -ResourceGroupName $rgname -FrontendEndpointName "frontendEndpoint1" -BackendPoolName "backendPool1" +New-AzFrontDoorRoutingRuleObject -Name $routingRuleName -FrontDoorName $frontDoorName -ResourceGroupName $rgname -FrontendEndpointName "frontendEndpoint1" -BackendPoolName "backendPool1" +``` +```output FrontendEndpointIds : {/subscriptions/{subid}/resourceGroups/{rgname}/pro viders/Microsoft.Network/frontDoors/{frontdoorname}/FrontendEndpoints/frontendEndpoint1} AcceptedProtocols : {Http, Https} @@ -55,12 +57,14 @@ Type : ### Example 2: Create a PSRoutingRuleObject for Front Door creation with a redirect rule ```powershell -PS C:\> $customHost = "www.contoso.com" -PS C:\> $customPath = "/images/contoso.png" -PS C:\> $queryString = "field1=value1&field2=value2" -PS C:\> $destinationFragment = "section-header-2" -PS C:\> New-AzFrontDoorRoutingRuleObject -Name $routingRuleName -FrontDoorName $frontDoorName -ResourceGroupName $rgname -FrontendEndpointName "frontendEndpoint1" -CustomHost $customHost -CustomPath $customPath -CustomQueryString $queryString -CustomFragment $destinationFragment +$customHost = "www.contoso.com" +$customPath = "/images/contoso.png" +$queryString = "field1=value1&field2=value2" +$destinationFragment = "section-header-2" +New-AzFrontDoorRoutingRuleObject -Name $routingRuleName -FrontDoorName $frontDoorName -ResourceGroupName $rgname -FrontendEndpointName "frontendEndpoint1" -CustomHost $customHost -CustomPath $customPath -CustomQueryString $queryString -CustomFragment $destinationFragment +``` +```output FrontendEndpointIds : {/subscriptions/{subid}/resourceGroups/{rgname}/pro viders/Microsoft.Network/frontDoors/{frontdoorname}/FrontendEndpoints/frontendEndpoint1} AcceptedProtocols : {Http, Https} diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngine.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngine.md index e8ca12cd476a..3f69fe989db2 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngine.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngine.md @@ -27,8 +27,10 @@ Use cmdlet "New-AzFrontDoorRulesEngineRule" to construct rules engine rules to p ### Example 1 ```powershell -PS C:\> New-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName -Name myRulesEngine -Rule $rulesEngineRule1 +New-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName -Name myRulesEngine -Rule $rulesEngineRule1 +``` +```output Name RulesEngineRules ---- ---------------- myRulesEngine {rules1} diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngineActionObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngineActionObject.md index a03b9ca7ab2d..66c0275efde4 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngineActionObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngineActionObject.md @@ -50,15 +50,15 @@ Use cmdlet "New-AzFrontDoorHeaderActionObject" to create PSHeaderObjects to pass ### Example 1 ```powershell -PS C:\> $headerActions = New-AzFrontDoorHeaderActionObject -HeaderActionType "Append" -HeaderName "X-Content-Type-Options" -Value "nosniff" -PS C:\> $headerActions +$headerActions = New-AzFrontDoorHeaderActionObject -HeaderActionType "Append" -HeaderName "X-Content-Type-Options" -Value "nosniff" +$headerActions HeaderName HeaderActionType Value ---------- ---------------- ----- X-Content-Type-Options Append nosniff -PS C:\> $rulesEngineAction = New-AzFrontDoorRulesEngineActionObject -ResponseHeaderAction $headerActions -PS C:\> $rulesEngineAction +$rulesEngineAction = New-AzFrontDoorRulesEngineActionObject -ResponseHeaderAction $headerActions +$rulesEngineAction RequestHeaderActions ResponseHeaderActions RouteConfigurationOverride -------------------- --------------------- -------------------------- @@ -70,22 +70,22 @@ Create a rules engine action that append response header value and show how to v ### Example 2 ```powershell -PS C:\> $rulesEngineAction = New-AzFrontDoorRulesEngineActionObject -RequestHeaderAction $headerActions -ForwardingProtocol HttpsOnly -BackendPoolName mybackendpool -ResourceGroupName Jessicl-Test-RG -FrontDoorName jessicl-test-myappfrontend -QueryParameterStripDirective StripNone -DynamicCompression Disabled -EnableCaching $true -PS C:\> $rulesEngineAction +$rulesEngineAction = New-AzFrontDoorRulesEngineActionObject -RequestHeaderAction $headerActions -ForwardingProtocol HttpsOnly -BackendPoolName mybackendpool -ResourceGroupName Jessicl-Test-RG -FrontDoorName jessicl-test-myappfrontend -QueryParameterStripDirective StripNone -DynamicCompression Disabled -EnableCaching $true +$rulesEngineAction RequestHeaderAction ResponseHeaderAction RouteConfigurationOverride ------------------- -------------------- -------------------------- {headeraction1, headeraction2} {} Microsoft.Azure.Commands.FrontDoor.Models.PSForwardingConfiguration -PS C:\> $rulesEngineAction.RequestHeaderAction +$rulesEngineAction.RequestHeaderAction HeaderName HeaderActionType Value ---------- ---------------- ----- headeraction1 Overwrite headeraction2 Append -PS C:\> $rulesEngineAction.ResponseHeaderAction -PS C:\> $rulesEngineAction.RouteConfigurationOverride +$rulesEngineAction.ResponseHeaderAction +$rulesEngineAction.RouteConfigurationOverride CustomForwardingPath : ForwardingProtocol : HttpsOnly @@ -100,14 +100,14 @@ Create a rules engine action that forwards the requests to a speicific backend p ### Example 3 ```powershell -PS C:\> $rulesEngineAction = New-AzFrontDoorRulesEngineActionObject -RedirectType Moved -RedirectProtocol MatchRequest -CustomHost www.contoso.com -PS C:\> $rulesEngineAction +$rulesEngineAction = New-AzFrontDoorRulesEngineActionObject -RedirectType Moved -RedirectProtocol MatchRequest -CustomHost www.contoso.com +$rulesEngineAction RequestHeaderActions ResponseHeaderActions RouteConfigurationOverride -------------------- --------------------- -------------------------- {} {} Microsoft.Azure.Commands.FrontDoor.Models.PSRedirectConfiguration -PS C:\> $rulesEngineAction.RouteConfigurationOverride +$rulesEngineAction.RouteConfigurationOverride RedirectType : Moved RedirectProtocol : MatchRequest diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngineMatchConditionObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngineMatchConditionObject.md index 4b2c4db487b2..738bb3c77f1b 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngineMatchConditionObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngineMatchConditionObject.md @@ -25,8 +25,10 @@ Create a PSRulesEngineMatchCondition object for creating a rules engine rule. ### Example 1 ```powershell -PS C:\> New-AzFrontDoorRulesEngineMatchConditionObject -MatchVariable RequestHeader -Operator Equal -MatchValue allowoverride -Transform "LowerCase", "UpperCase"-Selector Rules-Engine-Route-Forward -NegateCondition $false +New-AzFrontDoorRulesEngineMatchConditionObject -MatchVariable RequestHeader -Operator Equal -MatchValue allowoverride -Transform "LowerCase", "UpperCase"-Selector Rules-Engine-Route-Forward -NegateCondition $false +``` +```output RulesEngineMatchVariable : RequestHeader RulesEngineMatchValue : {allowoverride} Selector : Rules-Engine-Route-Forward diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngineRuleObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngineRuleObject.md index 995dd5d3cd4e..28052297463f 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngineRuleObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngineRuleObject.md @@ -28,7 +28,7 @@ Use cmdlet "New-AzFrontDoorRulesEngineMatchConditionObject" to create PSRulesEng ### Example 1 ```powershell -PS C:\> New-AzFrontDoorRulesEngineRuleObject -Name rules1 -Priority 0 -Action $rulesEngineAction -MatchProcessingBehavior Stop -MatchCondition $rulesEngineMatchCondition +New-AzFrontDoorRulesEngineRuleObject -Name rules1 -Priority 0 -Action $rulesEngineAction -MatchProcessingBehavior Stop -MatchCondition $rulesEngineMatchCondition Name : rules1 Priority : 0 @@ -37,13 +37,13 @@ MatchCondition : {Microsoft.Azure.Commands.FrontDoor.Models.PSRulesEngi Action : Microsoft.Azure.Commands.FrontDoor.Models.PSRulesEngineAction -PS C:\> $rulesEngineRule1.Action +$rulesEngineRule1.Action RequestHeaderActions ResponseHeaderActions RouteConfigurationOverride -------------------- --------------------- -------------------------- -{headeraction1, headeraction2} {} Microsoft.Azure.Commands.FrontDoor.Models.PSForwardingConfigurati� +{headeraction1, headeraction2} {} Microsoft.Azure.Commands.FrontDoor.Models.PSForwardingConfiguration -PS C:\> $rulesEngineRule1.MatchCondition[0] +$rulesEngineRule1.MatchCondition[0] RulesEngineMatchVariable : RequestHeader RulesEngineMatchValue : {allowoverride} @@ -57,7 +57,10 @@ Create new PSRulesEngineRule object and demonstrate how to see the subfields. ### Example 2 ```powershell -PS C:\> New-AzFrontDoorRulesEngineRuleObject -Name rules1 -Priority -1 +New-AzFrontDoorRulesEngineRuleObject -Name rules1 -Priority -1 +``` + +```output New-AzFrontDoorRulesEngineRuleObject : Cannot validate argument on parameter 'Priority'. The -1 argument is less than the minimum allowed range of 0. Supply an argument that is greater than or equal to 0 and then try the command again. At line:1 char:81 + ... ule1 = New-AzFrontDoorRulesEngineRuleObject -Name rules1 -Priority -1 diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafCustomRuleObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafCustomRuleObject.md index 8419c7807bbd..e5042c4fed6f 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafCustomRuleObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafCustomRuleObject.md @@ -25,8 +25,10 @@ Create CustomRule Object for WAF policy creation ### Example 1 ```powershell -PS C:\> New-AzFrontDoorWafCustomRuleObject -Name "Rule1" -RuleType MatchRule -MatchCondition $matchCondition1 -Action Block -Priority 2 +New-AzFrontDoorWafCustomRuleObject -Name "Rule1" -RuleType MatchRule -MatchCondition $matchCondition1 -Action Block -Priority 2 +``` +```output Name RuleType Action Priority RateLimitDurationInMinutes ---- -------- ------ -------- -------------------------- Rule1 MatchRule Block 2 1 diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafManagedRuleExclusionObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafManagedRuleExclusionObject.md index da897871e07e..991895f79f18 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafManagedRuleExclusionObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafManagedRuleExclusionObject.md @@ -24,8 +24,10 @@ Create managed rule exclusion object for WAF managed rule sets, groups, or rules ### Example 1 ```powershell -PS C:> New-AzFrontDoorWafManagedRuleExclusionObject -Variable QueryStringArgNames -Operator Equals -Selector "ParameterName" +New-AzFrontDoorWafManagedRuleExclusionObject -Variable QueryStringArgNames -Operator Equals -Selector "ParameterName" +``` +```output MatchVariable SelectorMatchOperator Selector ------------- --------------------- -------- QueryStringArgNames Equals ParameterName diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafManagedRuleObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafManagedRuleObject.md index 8de892210873..56337caa1998 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafManagedRuleObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafManagedRuleObject.md @@ -25,15 +25,17 @@ Create ManagedRule Object for WAF policy creation ### Example 1 ```powershell -PS C:\> $ruleOverride1 = New-AzFrontDoorWafManagedRuleOverrideObject -RuleId "942250" -Action Log -PS C:\> $ruleOverride2 = New-AzFrontDoorWafManagedRuleOverrideObject -RuleId "942251" -Action Log -PS C:\> $override1 = New-AzFrontDoorWafRuleGroupOverrideObject -RuleGroupName SQLI -ManagedRuleOverride $ruleOverride1,$ruleOverride2 +$ruleOverride1 = New-AzFrontDoorWafManagedRuleOverrideObject -RuleId "942250" -Action Log +$ruleOverride2 = New-AzFrontDoorWafManagedRuleOverrideObject -RuleId "942251" -Action Log +$override1 = New-AzFrontDoorWafRuleGroupOverrideObject -RuleGroupName SQLI -ManagedRuleOverride $ruleOverride1,$ruleOverride2 -PS C:\> $ruleOverride3 = New-AzFrontDoorWafManagedRuleOverrideObject -RuleId "941280" -Action Log -PS C:\> $override2 = New-AzFrontDoorWafRuleGroupOverrideObject -RuleGroupName XSS -ManagedRuleOverride $ruleOverride3 +$ruleOverride3 = New-AzFrontDoorWafManagedRuleOverrideObject -RuleId "941280" -Action Log +$override2 = New-AzFrontDoorWafRuleGroupOverrideObject -RuleGroupName XSS -ManagedRuleOverride $ruleOverride3 -PS C:\> New-AzFrontDoorWafManagedRuleObject -Type DefaultRuleSet -Version "preview-0.1" -RuleGroupOverride $override1,$override2 +New-AzFrontDoorWafManagedRuleObject -Type DefaultRuleSet -Version "preview-0.1" -RuleGroupOverride $override1,$override2 +``` +```output RuleGroupOverrides RuleSetType RuleSetVersion ------------------ ----------- -------------- {SQLI, XSS} DefaultRuleSet preview-0.1 diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafManagedRuleOverrideObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafManagedRuleOverrideObject.md index 6f66ade8f21d..3079b2bbf567 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafManagedRuleOverrideObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafManagedRuleOverrideObject.md @@ -26,8 +26,10 @@ Create PSAzureManagedRuleOverride Object for managed WAF rule group override obj Create a managed rule override object for rule 942250 (which is in SQLI group). ```powershell -PS C:\> New-AzFrontDoorWafManagedRuleOverrideObject -RuleId "942250" -Action Log +New-AzFrontDoorWafManagedRuleOverrideObject -RuleId "942250" -Action Log +``` +```output RuleId EnabledState Action ------ ------------ ------ 942250 Enabled Log diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafMatchConditionObject.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafMatchConditionObject.md index 1d3ef737aaef..bd442bc22ee7 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafMatchConditionObject.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafMatchConditionObject.md @@ -25,9 +25,10 @@ Create MatchCondition Object for WAF policy creation ### Example 1 ```powershell -PS C:\> New-AzFrontDoorWafMatchConditionObject -MatchVariable RequestHeader -OperatorProperty Contains -Selector "User-Agent" -MatchValue "Windows" - +New-AzFrontDoorWafMatchConditionObject -MatchVariable RequestHeader -OperatorProperty Contains -Selector "User-Agent" -MatchValue "Windows" +``` +```output MatchVariable OperatorProperty MatchValue Selector NegateCondition Transform ------------- ---------------- ---------- -------- --------------- --------- RequestHeader Contains {Windows} User-Agent False @@ -35,9 +36,10 @@ RequestHeader Contains {Windows} User-Agent False ### Example 2 ```powershell -PS C:\> New-AzFrontDoorWafMatchConditionObject -MatchVariable RequestHeader -OperatorProperty Contains -Selector "User-Agent" -MatchValue "WINDOWS" -Transform Uppercase - +New-AzFrontDoorWafMatchConditionObject -MatchVariable RequestHeader -OperatorProperty Contains -Selector "User-Agent" -MatchValue "WINDOWS" -Transform Uppercase +``` +```output MatchVariable OperatorProperty MatchValue Selector NegateCondition Transform ------------- ---------------- ---------- -------- --------------- --------- RequestHeader Contains {WINDOWS} User-Agent False {Uppercase} diff --git a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafPolicy.md b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafPolicy.md index e2f9a3f06343..301907ab81e7 100644 --- a/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafPolicy.md +++ b/src/FrontDoor/FrontDoor/help/New-AzFrontDoorWafPolicy.md @@ -26,8 +26,10 @@ The **New-AzFrontDoorWafPolicy** cmdlet creates a new Azure WAF policy in the sp ### Example 1: Create WAF policy ```powershell -PS C:\> New-AzFrontDoorWafPolicy -Name $policyName -ResourceGroupName $resourceGroupName -Customrule $customRule1,$customRule2 -ManagedRule $managedRule1 -EnabledState Enabled -Mode Prevention -RedirectUrl "https://www.bing.com/" -CustomBlockResponseStatusCode 405 -CustomBlockResponseBody "