Sad Tux - Windows bias detected
This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Detected Bias Types
powershell_heavy
windows_tools
missing_linux_example
windows_first
Summary
The documentation page demonstrates a strong Windows bias by exclusively providing Azure PowerShell scripts and instructions for migration tasks, with no mention of Azure CLI, Bash, or cross-platform alternatives. All code samples and tooling references are PowerShell-centric, which is most commonly associated with Windows environments. There are no Linux-specific or cross-platform migration examples, and PowerShell is presented as the default and only automation method.
Recommendations
  • Provide equivalent Azure CLI (az) commands and scripts for all migration steps, as Azure CLI is cross-platform and widely used on Linux and macOS.
  • Explicitly mention that PowerShell Core is available on Linux and macOS, if PowerShell must be used, and provide installation instructions for those platforms.
  • Include Bash script examples or guidance for users who prefer shell scripting on Linux.
  • Reorder sections or add notes to clarify that all steps can be performed from any OS, not just Windows, and avoid implying PowerShell is the only or primary method.
  • Where possible, use neutral language such as 'using Azure PowerShell or Azure CLI' instead of only referencing PowerShell.
  • Add a table or section comparing migration steps using both PowerShell and CLI to improve parity and user choice.
GitHub Create Pull Request

Scan History

Date Scan Status Result
2025-08-17 00:01 #83 cancelled Clean Clean
2025-07-13 21:37 #48 completed Biased Biased
2025-07-09 13:09 #3 cancelled Clean Clean
2025-07-08 04:23 #2 cancelled Biased Biased

Flagged Code Snippets

   $azfw = Get-AzFirewall -Name "FW Name" -ResourceGroupName "RG Name"
   $azfw.Sku.Tier="Premium"
   $vnet = Get-AzVirtualNetwork -ResourceGroupName "RG Name" -Name "VNet Name"
   $publicip1 = Get-AzPublicIpAddress -Name "Public IP1 Name" -ResourceGroupName "RG Name"
   $publicip2 = Get-AzPublicIpAddress -Name "Public IP2 Name" -ResourceGroupName "RG Name"
   $azfw.Allocate($vnet,@($publicip1,$publicip2))
   Set-AzFirewall -AzureFirewall $azfw