About This Page
This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.
Bias Analysis
Bias Types:
⚠️
powershell_heavy
⚠️
windows_first
⚠️
windows_tools
⚠️
missing_linux_example
Summary:
The documentation page demonstrates a Windows bias in several ways: PowerShell is used for ARM template deployment and for enabling encryption at host, with no equivalent Bash or Linux shell examples. PowerShell is mentioned before Azure CLI in some sections, and Windows-centric tools and patterns (such as PowerShell cmdlets and references to Undo-AzKeyVaultKeyRemoval) are used without always providing Linux or cross-platform alternatives. There are no explicit Linux shell script examples for common tasks, and the documentation assumes familiarity with Windows tooling.
Recommendations:
- Provide Bash or Linux shell script equivalents for all PowerShell examples, especially for ARM template deployments and enabling encryption at host.
- When listing command-line options, present Azure CLI and Bash examples before or alongside PowerShell to ensure Linux parity.
- Include references to Linux-native tools or commands where possible, and avoid assuming the user is on Windows.
- For recovery operations (e.g., key recovery), provide both PowerShell and Azure CLI commands, and clarify which are cross-platform.
- Explicitly state that all features and procedures are supported on Linux-based clusters and environments, and provide guidance for Linux users where workflows may differ.
Create pull request
Flagged Code Snippets
$templateFile = "azuredeploy.json"
$ResourceGroupName = "MyResourceGroup"
$clusterName = "MyCluster"
$password = ConvertTo-SecureString 'HttpPassword1234!' -AsPlainText -Force
$diskEncryptionVaultUri = "https://MyKeyVault.vault.azure.net"
$diskEncryptionKeyName = "SparkClusterKey"
$diskEncryptionKeyVersion = "00000000000000000000000000000000"
$managedIdentityName = "MyMSI"
New-AzResourceGroupDeployment `
-Name mySpark `
-TemplateFile $templateFile `
-ResourceGroupName $ResourceGroupName `
-clusterName $clusterName `
-clusterLoginPassword $password `
` -sshPassword $password `
-diskEncryptionVaultUri $diskEncryptionVaultUri `
-diskEncryptionKeyName $diskEncryptionKeyName `
-diskEncryptionKeyVersion $diskEncryptionKeyVersion `
-managedIdentityName $managedIdentityName
$storageAccountResourceGroupName = "Group"
$storageAccountName = "yourstorageacct001"
$storageAccountKey = Get-AzStorageAccountKey `
-ResourceGroupName $storageAccountResourceGroupName `
-Name $storageAccountName | %{ $_.Key1 }
$storageContainer = "container002"
# Cluster configuration info
$location = "East US 2"
$clusterResourceGroupName = "Group"
$clusterName = "your-hadoop-002"
$clusterCreds = Get-Credential
# If the cluster's resource group doesn't exist yet, run:
# New-AzResourceGroup -Name $clusterResourceGroupName -Location $location
# Create the cluster
New-AzHDInsightCluster `
-ClusterType Hadoop `
-ClusterSizeInNodes 4 `
-ResourceGroupName $clusterResourceGroupName `
-ClusterName $clusterName `
-HttpCredential $clusterCreds `
-Location $location `
-DefaultStorageAccountName "$storageAccountName.blob.core.contoso.net" `
-DefaultStorageAccountKey $storageAccountKey `
-DefaultStorageContainer $storageContainer `
-SshCredential $clusterCreds `
-EncryptionAtHost $true `