This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Bias Types:
⚠️ powershell_heavy
⚠️ windows_first
⚠️ missing_linux_example
⚠️ windows_tools
Summary:
The documentation page demonstrates a Windows bias by providing only PowerShell examples for enabling diagnostic logging, with no equivalent Azure CLI, Bash, or Linux-native instructions. The 'Enable logging' section exclusively features a PowerShell cmdlet, and there is no mention of cross-platform tools or Linux command-line alternatives. Additionally, the workflow and screenshots are oriented toward tools and patterns more familiar to Windows users, such as PowerShell and Excel, and the page references Visual Studio and C# for log conversion, further reinforcing a Windows-centric approach.
Recommendations:
  • Add equivalent Azure CLI examples for enabling diagnostic logging, as Azure CLI is cross-platform and widely used on Linux and macOS.
  • Include Bash or shell script examples where appropriate, especially for log retrieval and processing.
  • Mention and provide examples for viewing and analyzing logs using Linux-native tools (e.g., jq, grep, awk) in addition to Excel and Power BI.
  • Reference cross-platform editors and tools (such as VS Code) instead of, or alongside, Visual Studio.
  • Ensure that all step-by-step instructions and screenshots are applicable to users on both Windows and Linux platforms.
  • Explicitly state that all operations can be performed from Linux, macOS, or Windows, and provide links to relevant cross-platform documentation.
GitHub Create pull request

Scan History

Date Scan ID Status Bias Status
2025-08-17 00:01 #83 in_progress ✅ Clean
2025-07-13 21:37 #48 completed ❌ Biased
2025-07-09 13:09 #3 cancelled ✅ Clean
2025-07-08 04:23 #2 cancelled ❌ Biased

Flagged Code Snippets

Set-AzDiagnosticSetting -ResourceId /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.Network/applicationGateways/<applicationGatewayName> -StorageAccountId /subscriptions/<subscriptionId>/resourceGroups/<resourceGroupName>/providers/Microsoft.Storage/storageAccounts/<storageAccountName> -Enabled $true