Sad Tux - Windows bias detected
This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Detected Bias Types
powershell_heavy
windows_first
missing_linux_example
Summary
The documentation page demonstrates a Windows bias by providing only PowerShell-based configuration examples and referencing PowerShell as the primary CLI tool for managing Azure Application Gateway and Key Vault integration. There are no equivalent Azure CLI (cross-platform) or Bash examples, and PowerShell is mentioned before or instead of other tools throughout the page. This may disadvantage Linux or macOS users who prefer or require non-Windows tooling.
Recommendations
  • Provide equivalent Azure CLI (az) examples alongside PowerShell commands for all configuration steps, especially for referencing Key Vault secrets and configuring Application Gateway.
  • When mentioning scripting or automation, present Azure CLI and PowerShell in parallel, or lead with Azure CLI as the more cross-platform option.
  • Include Bash shell snippets for common tasks, or clarify that all steps can be performed on Linux/macOS using Azure CLI.
  • Avoid language that assumes PowerShell is the default or only automation tool; explicitly state that both PowerShell and Azure CLI are supported.
  • Add a 'Platform considerations' section to clarify tool parity and direct users to appropriate instructions for their OS.
GitHub Create Pull Request

Scan History

Date Scan Status Result
2025-07-12 23:44 #41 cancelled Biased Biased
2025-07-12 00:58 #8 cancelled Clean Clean
2025-07-10 05:06 #7 processing Clean Clean
2025-07-09 23:22 #6 cancelled Clean Clean

Flagged Code Snippets

# Get the Application Gateway we want to modify
$appgw = Get-AzApplicationGateway -Name MyApplicationGateway -ResourceGroupName MyResourceGroup
# Specify the resource id to the user assigned managed identity - This can be found by going to the properties of the managed identity
Set-AzApplicationGatewayIdentity -ApplicationGateway $appgw -UserAssignedIdentityId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/MyResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/MyManagedIdentity"
# Get the secret ID from Key Vault
$secret = Get-AzKeyVaultSecret -VaultName "MyKeyVault" -Name "CertificateName"
$secretId = $secret.Id.Replace($secret.Version, "") # Remove the secret version so Application Gateway uses the latest version in future syncs
# Specify the secret ID from Key Vault 
Add-AzApplicationGatewaySslCertificate -KeyVaultSecretId $secretId -ApplicationGateway $appgw -Name $secret.Name
# Commit the changes to the Application Gateway
Set-AzApplicationGateway -ApplicationGateway $appgw