Sad Tux - Windows bias detected
This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Detected Bias Types
powershell_heavy
windows_first
windows_tools
Summary
The documentation demonstrates a moderate Windows bias. PowerShell is presented as a primary scripting example, and the PowerShell section precedes the Azure CLI section. There are no explicit Linux shell or Bash examples, and the CLI example, while cross-platform, is presented after PowerShell. The documentation references Windows-centric tools (PowerShell) and patterns, which may make Linux users feel secondary.
Recommendations
  • Present Azure CLI examples before PowerShell, as CLI is cross-platform and more familiar to Linux users.
  • Explicitly mention that Azure CLI commands work on Linux, macOS, and Windows, and provide Bash-specific variable syntax where appropriate.
  • Add Bash shell script examples or notes for Linux users, especially for environment variable usage and command chaining.
  • Clarify that PowerShell is available cross-platform, but also provide guidance for users who may not have PowerShell installed.
  • Balance the order and prominence of examples so that Linux and Windows users are equally supported.
GitHub Create Pull Request

Scan History

Date Scan Status Result
2026-01-14 00:00 #250 in_progress Biased Biased
2026-01-13 00:00 #246 completed Clean Clean
2026-01-11 00:00 #240 completed Biased Biased
2026-01-10 00:00 #237 completed Biased Biased
2026-01-09 00:34 #234 completed Biased Biased
2026-01-08 00:53 #231 completed Biased Biased
2026-01-06 18:15 #225 cancelled Clean Clean
2025-08-19 00:01 #85 completed Clean Clean
2025-07-13 21:37 #48 completed Clean Clean
2025-07-12 23:44 #41 cancelled Biased Biased

Flagged Code Snippets

$accountName = "<account-name>"
$kvUri = "<key-vault-uri>"
$keyName = "<keyName>"
$location = "<location>"
$multiTenantAppId = "<application-id>" # appId value from multi-tenant app

$userIdentity = Get-AzUserAssignedIdentity -Name <user-assigned-identity> -ResourceGroupName $rgName

New-AzStorageAccount -ResourceGroupName $rgName `
    -Name $accountName `
    -Kind StorageV2 `
    -SkuName Standard_LRS `
    -Location $location `
    -AllowBlobPublicAccess $false `
    -UserAssignedIdentityId $userIdentity.Id `
    -IdentityType SystemAssignedUserAssigned `
    -KeyName $keyName `
    -KeyVaultUri $kvUri `
    -KeyVaultUserAssignedIdentityId $userIdentity.Id `
    -KeyVaultFederatedClientId $multiTenantAppId