About This Page
This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.
Bias Analysis
Bias Types:
⚠️
windows_first
⚠️
missing_linux_example
⚠️
windows_tools
Summary:
The documentation page exclusively discusses the Key Vault VM extension for Windows, with all examples and explanations tailored to Windows environments. There is no mention of Linux support, Linux certificate stores, or Linux-specific configuration steps. The documentation references Windows certificate stores and uses Windows-centric terminology and file paths, indicating a strong Windows bias.
Recommendations:
- Clarify in the introduction whether the Key Vault VM extension is available for Linux VMs in Azure Cloud Services (extended support). If not, explicitly state this limitation.
- If Linux support exists, provide equivalent instructions and examples for Linux, including details on certificate storage locations and configuration steps.
- Include Linux-specific code snippets or configuration samples (e.g., for cloud-init or Linux VM extensions).
- Mention Linux tools and patterns (such as OpenSSL, Linux certificate stores, etc.) alongside Windows tools.
- Ensure parity in documentation structure and depth for both Windows and Linux platforms, or clearly indicate platform-specific limitations.
Create pull request
Flagged Code Snippets
{
"osProfile":
{
"secrets":
[
{
"sourceVault":
{
"id": "[parameters('sourceVaultValue')]"
},
"vaultCertificates":
[
{
"certificateUrl": "[parameters('bootstrpCertificateUrlValue')]"
}
]
}
]
},
"extensionProfile":
{
"extensions":
[
{
"name": "KVVMExtensionForPaaS",
"properties":
{
"type": "KeyVaultForPaaS",
"autoUpgradeMinorVersion": true,
"typeHandlerVersion": "1.0",
"publisher": "Microsoft.Azure.KeyVault",
"settings":
{
"secretsManagementSettings":
{
"pollingIntervalInS": "3600",
"certificateStoreName": "My",
"certificateStoreLocation": "LocalMachine",
"linkOnRenewal": false,
"requireInitialSync": false,
"observedCertificates": "[parameters('keyVaultObservedCertificates']"
},
"authenticationSettings":
{
"clientId": "Your AAD app ID",
"clientCertificateSubjectName": "Your boot strap certificate subject name [Do not include the 'CN=' in the subject name]"
}
}
}
}
]
}
}
<Certificates>
<Certificate name="bootstrapcert" storeLocation="LocalMachine" storeName="My" />
</Certificates>