This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Bias Types:
⚠️ powershell_heavy
⚠️ windows_first
⚠️ missing_linux_example
Summary:
The documentation demonstrates a Windows bias by providing only Azure PowerShell examples for command-line operations, referencing PowerShell steps before mentioning the Azure CLI, and omitting explicit Linux/bash examples. The 'Next steps' section also directs users to a PowerShell-specific guide, reinforcing the Windows-centric approach. While Azure CLI is mentioned as a supported method, no CLI or bash examples are provided, and the only detailed command-line walkthrough uses PowerShell.
Recommendations:
  • Add equivalent Azure CLI (az) command examples alongside PowerShell for all command-line instructions, especially in sections where PowerShell is currently the only example.
  • When referencing command-line tools, mention Azure CLI and PowerShell together, or list Azure CLI first to balance platform representation.
  • Include bash shell snippets for ARM template deployments and secret referencing, demonstrating cross-platform usage.
  • In the 'Next steps' section, provide links to both PowerShell and Azure CLI/Linux guides for configuring TLS termination with Key Vault certificates.
  • Explicitly state that all operations can be performed from Linux/macOS using Azure CLI, and provide relevant instructions or links.
GitHub Create pull request

Scan History

Date Scan ID Status Bias Status
2025-09-12 00:00 #109 completed ✅ Clean
2025-08-12 00:00 #78 in_progress ❌ Biased
2025-08-11 00:00 #77 completed ❌ Biased
2025-08-10 00:00 #76 completed ❌ Biased
2025-08-09 00:00 #75 completed ❌ Biased
2025-08-08 00:00 #74 completed ❌ Biased
2025-08-07 00:00 #73 completed ❌ Biased
2025-08-06 00:00 #72 completed ❌ Biased
2025-08-05 00:00 #71 completed ❌ Biased
2025-08-04 00:00 #70 in_progress ❌ Biased
2025-08-03 00:00 #69 completed ❌ Biased
2025-08-02 00:00 #68 in_progress ❌ Biased
2025-08-01 00:00 #67 completed ❌ Biased
2025-07-31 00:00 #66 completed ✅ Clean
2025-07-30 00:00 #65 completed ✅ Clean
2025-07-29 00:01 #64 completed ✅ Clean
2025-07-28 00:00 #63 completed ✅ Clean
2025-07-27 00:00 #62 completed ✅ Clean
2025-07-26 00:01 #61 completed ✅ Clean
2025-07-25 00:00 #60 completed ✅ Clean
2025-07-24 00:00 #59 completed ✅ Clean
2025-07-23 00:00 #58 completed ✅ Clean
2025-07-22 00:01 #57 completed ✅ Clean
2025-07-21 00:00 #56 completed ❌ Biased
2025-07-19 13:51 #54 completed ✅ Clean
2025-07-17 00:00 #53 completed ❌ Biased
2025-07-16 00:00 #52 completed ❌ Biased
2025-07-13 21:37 #48 completed ❌ Biased
2025-07-09 13:09 #3 cancelled ✅ Clean
2025-07-08 04:23 #2 cancelled ❌ Biased

Flagged Code Snippets

# Get the Application Gateway we want to modify $appgw = Get-AzApplicationGateway -Name MyApplicationGateway -ResourceGroupName MyResourceGroup # Specify the resource id to the user assigned managed identity - This can be found by going to the properties of the managed identity Set-AzApplicationGatewayIdentity -ApplicationGateway $appgw -UserAssignedIdentityId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/MyResourceGroup/providers/Microsoft.ManagedIdentity/userAssignedIdentities/MyManagedIdentity" # Get the secret ID from Key Vault $secret = Get-AzKeyVaultSecret -VaultName "MyKeyVault" -Name "CertificateName" $secretId = $secret.Id.Replace($secret.Version, "") # Remove the secret version so Application Gateway uses the latest version in future syncs # Specify the secret ID from Key Vault Add-AzApplicationGatewaySslCertificate -KeyVaultSecretId $secretId -ApplicationGateway $appgw -Name $secret.Name # Commit the changes to the Application Gateway Set-AzApplicationGateway -ApplicationGateway $appgw