This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Bias Types:
⚠️ powershell_heavy
⚠️ windows_first
⚠️ windows_tools
⚠️ missing_linux_example
Summary:
The documentation demonstrates a Windows bias in several ways: PowerShell is used as the only scripting example for deploying ARM templates and enabling encryption at host, with no equivalent Bash or Linux shell examples. Windows/PowerShell tooling (e.g., Undo-AzKeyVaultKeyRemoval) is mentioned before or instead of Linux/CLI alternatives. There is a lack of Linux-native command-line examples (e.g., Bash scripts) for ARM template deployment and key recovery. The documentation assumes familiarity with Windows tools and workflows, which may disadvantage Linux users.
Recommendations:
  • Provide Bash or Azure CLI script examples for all operations currently shown only in PowerShell, especially for ARM template deployment and enabling encryption at host.
  • When referencing tools or commands for key recovery or management, include both PowerShell and Azure CLI (or Bash) equivalents, and list them in parallel or alternate order.
  • Avoid assuming the user's platform; clarify when steps are platform-agnostic and when they are not.
  • Add explicit Linux/Bash examples for common workflows, such as deploying ARM templates (e.g., using 'az deployment group create') and managing resources.
  • Ensure that screenshots and UI walkthroughs are not specific to Windows unless unavoidable, and note any platform-specific differences.
GitHub Create pull request

Scan History

Date Scan ID Status Bias Status
2025-09-16 00:00 #113 completed ✅ Clean
2025-09-15 00:00 #112 completed ✅ Clean
2025-09-14 00:00 #111 completed ✅ Clean
2025-09-13 00:00 #110 completed ✅ Clean
2025-09-12 00:00 #109 completed ✅ Clean
2025-09-11 00:00 #108 completed ✅ Clean
2025-09-10 00:00 #107 completed ✅ Clean
2025-09-06 00:00 #103 completed ✅ Clean
2025-08-17 00:01 #83 in_progress ✅ Clean
2025-07-13 21:37 #48 completed ❌ Biased
2025-07-12 23:44 #41 in_progress ❌ Biased
2025-07-09 13:09 #3 cancelled ✅ Clean
2025-07-08 04:23 #2 cancelled ❌ Biased

Flagged Code Snippets

$storageAccountResourceGroupName = "Group" $storageAccountName = "yourstorageacct001" $storageAccountKey = Get-AzStorageAccountKey ` -ResourceGroupName $storageAccountResourceGroupName ` -Name $storageAccountName | %{ $_.Key1 } $storageContainer = "container002" # Cluster configuration info $location = "East US 2" $clusterResourceGroupName = "Group" $clusterName = "your-hadoop-002" $clusterCreds = Get-Credential # If the cluster's resource group doesn't exist yet, run: # New-AzResourceGroup -Name $clusterResourceGroupName -Location $location # Create the cluster New-AzHDInsightCluster ` -ClusterType Hadoop ` -ClusterSizeInNodes 4 ` -ResourceGroupName $clusterResourceGroupName ` -ClusterName $clusterName ` -HttpCredential $clusterCreds ` -Location $location ` -DefaultStorageAccountName "$storageAccountName.blob.core.contoso.net" ` -DefaultStorageAccountKey $storageAccountKey ` -DefaultStorageContainer $storageContainer ` -SshCredential $clusterCreds ` -EncryptionAtHost $true `
$templateFile = "azuredeploy.json" $ResourceGroupName = "MyResourceGroup" $clusterName = "MyCluster" $password = ConvertTo-SecureString 'HttpPassword1234!' -AsPlainText -Force $diskEncryptionVaultUri = "https://MyKeyVault.vault.azure.net" $diskEncryptionKeyName = "SparkClusterKey" $diskEncryptionKeyVersion = "00000000000000000000000000000000" $managedIdentityName = "MyMSI" New-AzResourceGroupDeployment ` -Name mySpark ` -TemplateFile $templateFile ` -ResourceGroupName $ResourceGroupName ` -clusterName $clusterName ` -clusterLoginPassword $password ` ` -sshPassword $password ` -diskEncryptionVaultUri $diskEncryptionVaultUri ` -diskEncryptionKeyName $diskEncryptionKeyName ` -diskEncryptionKeyVersion $diskEncryptionKeyVersion ` -managedIdentityName $managedIdentityName