About This Page
This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.
Bias Analysis
Bias Types:
⚠️
powershell_heavy
⚠️
windows_first
⚠️
missing_linux_example
Summary:
The documentation provides detailed configuration steps and code samples for Azure PowerShell and Azure CLI, but the PowerShell examples are presented first and in greater depth. There are no explicit Linux shell or Bash examples, and the CLI examples do not clarify cross-platform usage or show Linux-specific command-line patterns. The documentation assumes familiarity with PowerShell, which is traditionally a Windows-centric tool, and does not address Linux users' needs or mention differences in experience between platforms.
Recommendations:
- Present Azure CLI (which is cross-platform) examples before or alongside PowerShell examples to avoid implying a Windows-first workflow.
- Include explicit Bash/shell command examples where appropriate, especially for steps that might differ on Linux (e.g., environment variable syntax, file paths).
- Clarify that Azure CLI commands work on Linux, macOS, and Windows, and provide any necessary notes about platform-specific prerequisites or behaviors.
- Where PowerShell is used, mention that PowerShell Core is available cross-platform, or provide equivalent Bash commands if possible.
- Add a section or callout for Linux users, highlighting any differences or confirming parity in the experience.
Create pull request
Flagged Code Snippets
$azFw = @{
Name = '<fw-name>'
ResourceGroupName = '<resourcegroup-name>'
Location = '<location>'
VirtualNetworkName = '<vnet-name>'
PublicIpName = '<public-ip-name>'
PrivateRange = @("IANAPrivateRanges", "192.168.1.0/24", "192.168.1.10")
}
New-AzFirewall @azFw
$azfw = Get-AzFirewall -Name '<fw-name>' -ResourceGroupName '<resourcegroup-name>'
$azfw.PrivateRange = @("IANAPrivateRanges", "192.168.1.0/24", "192.168.1.10")
Set-AzFirewall -AzureFirewall $azfw
### Configure using Azure PowerShell
- Create a new firewall with a RouteServerId.