Skip to content

Spelling Fixes #27920

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 5 commits into from
Jun 11, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions src/EventHub/EventHub/help/New-AzEventHub.md
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ Type : Microsoft.EventHub/namespaces/eventhubs
UpdatedAt : 4/25/2023 3:55:46 AM
```

Creates a new eventhub entity `myEventHub` on namespace `myNamespace` with CleaupPolicy `Delete`.
Creates a new eventhub entity `myEventHub` on namespace `myNamespace` with CleanupPolicy `Delete`.

### Example 2: Create EventHub with Capture Enabled
```powershell
Expand Down Expand Up @@ -159,7 +159,7 @@ Type : Microsoft.EventHub/namespaces/eventhubs
UpdatedAt : 4/25/2023 4:05:58 AM
```

Creates a new eventhub entity `myEventHub` on namespace `myNamespace` with CleaupPolicy `Compact`.
Creates a new eventhub entity `myEventHub` on namespace `myNamespace` with CleanupPolicy `Compact`.

## PARAMETERS

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ New-AzEventHubAuthorizationRuleSASToken [-AuthorizationRuleId] <String> [-KeyTyp
```

## DESCRIPTION
The New-AzEventHubAuthorizationRuleSASToken cmdlet generates a Shared Access Signature (SAS) token for an Azure Eventhub Namesapce or Azure Eventhub
The New-AzEventHubAuthorizationRuleSASToken cmdlet generates a Shared Access Signature (SAS) token for an Azure Eventhub Namespace or Azure Eventhub

## EXAMPLES

Expand All @@ -30,7 +30,7 @@ $EndTime = $StartTime.AddHours(2.0)
$SasToken = New-AzEventHubAuthorizationRuleSASToken -AuthorizationRuleId $updatedAuthRule.Id -KeyType Primary -ExpiryTime $EndTime -StartTime $StartTime
```

Generate SAS token for the given authorixation rule for Namespace with start and expiry time..
Generate SAS token for the given authorization rule for Namespace with start and expiry time..

### Example 2
```powershell
Expand All @@ -39,12 +39,12 @@ $EndTime = $StartTime.AddHours(2.0)
$SasToken = New-AzEventHubAuthorizationRuleSASToken -AuthorizationRuleId $updatedAuthRule.Id -KeyType Primary -ExpiryTime $EndTime
```

Generate SAS token for the given authorixation rule for Namespace with expiry time.
Generate SAS token for the given authorization rule for Namespace with expiry time.

## PARAMETERS

### -AuthorizationRuleId
ARM ResourceId of the Authoraization Rule
ARM ResourceId of the Authorization Rule

```yaml
Type: System.String
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@ ResourceGroupName : myResourceGroup
```

`-Policy` takes an array of Policy objects.
It represents the entire set of throttling policies defined on the appplication group and not just the one.
It represents the entire set of throttling policies defined on the application group and not just the one.
If you want to add or remove throttling policies, the right way to do it is to get the application group and query the Policy data member of the object returned as shown above.

### Example 2: Update application group using InputObject parameter set
Expand Down
2 changes: 1 addition & 1 deletion src/EventHub/EventHub/help/Set-AzEventHubNamespace.md
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ ZoneRedundant : True

The output type of New and Set cmdlets `IEhNamespace` has a property named `UserAssignedIdentity` which is a hashtable.
The keys
of this hastable are the resource ID's of the managed identities the namespace is part of.
of this hashtable are the resource ID's of the managed identities the namespace is part of.
To add or remove an IdentityId, extract the
keys from the hashtable, which would result in an array of strings which can then be queried and fed as input to set cmdlet as shown above.

Expand Down
2 changes: 1 addition & 1 deletion src/EventHub/EventHub/help/Test-AzEventHubName.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ Message
The specified name is not available. For more information visit https://aka.ms/eventhubsarmexceptions. False NameInUse
```

Checks the availability of alias name `myAlias` on namespace `myNamepace`.
Checks the availability of alias name `myAlias` on namespace `myNamespace`.

## PARAMETERS

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -98,7 +98,7 @@ DynamicCompression : Disabled
EnableCaching : True
```

Create a rules engine action that forwards the requests to a speicific backend pool and show how to view the properties of the rules engine action created.
Create a rules engine action that forwards the requests to a specific backend pool and show how to view the properties of the rules engine action created.

### Example 3
<!-- Skip: Output cannot be splitted from code -->
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ NegateCondition : False
Transform : {Lowercase, Uppercase}
```

Greate a new PSRulesEngineMatchCondition object.
Create a new PSRulesEngineMatchCondition object.

## PARAMETERS

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ Create LogScrubbingRule object for LogScrubbingSetting
New-AzFrontDoorWafLogScrubbingRuleObject -MatchVariable "RequestHeaderNames" -SelectorMatchOperator "EqualsAny" -State "Enabled"
```

This obejct is a parameter for LogscrubbingSetting
This object is a parameter for LogscrubbingSetting

## PARAMETERS

Expand Down
2 changes: 1 addition & 1 deletion src/FrontDoor/FrontDoor/help/Set-AzFrontDoor.md
Original file line number Diff line number Diff line change
Expand Up @@ -175,7 +175,7 @@ Type : Microsoft.Network/frontdoor1
update an existing FrontDoor.

### Example 4: update BackendPoolSetting property EnforceCertificateNameCheck of an existing Front Door with -DisableCertificateNameCheck switch parameter
Front Door to be updated can be identified using FrontoorName and ResourceGroupName, PSFrontDoor object, or ResourceId. (See above 3 examples for example)
Front Door to be updated can be identified using FrontDoorName and ResourceGroupName, PSFrontDoor object, or ResourceId. (See above 3 examples for example)
The below example uses PSFrontDoor object.

```powershell
Expand Down
6 changes: 3 additions & 3 deletions src/HDInsight/HDInsight/help/New-AzHDInsightCluster.md
Original file line number Diff line number Diff line change
Expand Up @@ -432,7 +432,7 @@ $clusterCreds = Get-Credential
# New-AzResourceGroup -Name $clusterResourceGroupName -Location $location

# ESP configuration
$domainResourceId = "your Azure AD Domin Service resource id"
$domainResourceId = "your Azure AD Domain Service resource id"
$domainUser = "yourdomainuser"
$domainPassword = ConvertTo-SecureString -String "****" -AsPlainText -Force
$domainCredential = New-Object System.Management.Automation.PSCredential($domainUser, $domainPassword)
Expand All @@ -442,7 +442,7 @@ $ldapUrls = "ldaps://{your domain name}:636"
$clusterTier = "Premium"
$vnetId = "yourvnetid"
$subnetName = "yoursubnetname"
$assignedIdentity = "your user managed assigned identity resourcee id"
$assignedIdentity = "your user managed assigned identity resource id"

#Create security profile
$config= New-AzHDInsightClusterConfig|Add-AzHDInsightSecurityProfile -DomainResourceId $domainResourceId -DomainUserCredential $domainCredential -LdapsUrls $ldapUrls -ClusterUsersGroupDNs $clusterUserGroupDns
Expand Down Expand Up @@ -640,7 +640,7 @@ $clusterCreds = Get-Credential
# If the cluster's resource group doesn't exist yet, run:
# New-AzResourceGroup -Name $clusterResourceGroupName -Location $location
# ESP configuration
$domainResourceId = "your Azure AD Domin Service resource id"
$domainResourceId = "your Azure AD Domain Service resource id"
$domainUser = "yourdomainuser"
$domainPassword = ConvertTo-SecureString -String "****" -AsPlainText -Force
$domainCredential = New-Object System.Management.Automation.PSCredential($domainUser, $domainPassword)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ New-AzHDInsightIPConfiguration [-Name <String>] [-Primary] [-PrivateIPAddress <S
```

## DESCRIPTION
This cmdlet **New-AzHDInsightIPConfiguration** creates the ip configuration in memeory.
This cmdlet **New-AzHDInsightIPConfiguration** creates the ip configuration in memory.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ New-AzHDInsightPrivateLinkConfiguration [-Name <String>] [-GroupId <String>]
```

## DESCRIPTION
This cmdlet **New-AzHDInsightPrivateLinkConfiguration** creates the private link configuration in memeory
This cmdlet **New-AzHDInsightPrivateLinkConfiguration** creates the private link configuration in memory

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -62,7 +62,7 @@ ExactVersion ImageVersionId

This command creates a shared image source.

### Example 3: Create a platfrom image source.
### Example 3: Create a platform image source.
```powershell
New-AzImageBuilderTemplateSourceObject -Publisher 'Canonical' -Offer 'UbuntuServer' -Sku '18.04-LTS' -Version 'latest'
```
Expand All @@ -73,7 +73,7 @@ ExactVersion Offer Publisher Sku Version
UbuntuServer Canonical 18.04-LTS latest
```

This command creates a platfrom image source.
This command creates a platform image source.

## PARAMETERS

Expand Down
2 changes: 1 addition & 1 deletion src/IotHub/IotHub/help/Add-AzIotHubConfiguration.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Add-AzIotHubConfiguration [-ResourceId] <String> -Name <String> [-DeviceContent
```

## DESCRIPTION
Configuration content is json and slighty varies based on device or module intent.
Configuration content is json and slightly varies based on device or module intent.
Device configurations are in the form of {"deviceContent":{...}}
Module configurations are in the form of {"moduleContent":{...}}
Configurations can be defined with user provided metrics for on demand evaluation.
Expand Down
2 changes: 1 addition & 1 deletion src/KeyVault/KeyVault/help/Add-AzKeyVaultKey.md
Original file line number Diff line number Diff line change
Expand Up @@ -512,7 +512,7 @@ Accept wildcard characters: False
```

### -Expires
Specifies the expiration time of the key in UTC, as a **DateTime** object, for the key that this cmdlet adds. If not specified, key will not expire. To obtain a **DateTime** object, use the **Get-Date** cmdlet. For more information, type `Get-Help Get-Date`. Please notice that expirys is ignored for Key Exchange Key used in BYOK process.
Specifies the expiration time of the key in UTC, as a **DateTime** object, for the key that this cmdlet adds. If not specified, key will not expire. To obtain a **DateTime** object, use the **Get-Date** cmdlet. For more information, type `Get-Help Get-Date`. Please notice that expires is ignored for Key Exchange Key used in BYOK process.

```yaml
Type: System.Nullable`1[System.DateTime]
Expand Down
2 changes: 1 addition & 1 deletion src/KeyVault/KeyVault/help/Backup-AzKeyVault.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,7 @@ The cmdlet will create a folder (typically named `mhsm-{name}-{timestamp}`) in t

### Example 2 Backup an HSM to Storage Container via User Assigned Managed Identity Authentication
```powershell
# Make sure an identity is assigend to the Hsm
# Make sure an identity is assigned to the Hsm
Update-AzKeyVaultManagedHsm -UserAssignedIdentity "/subscriptions/{sub-id}/resourceGroups/{rg-name}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identity-name}"
Backup-AzKeyVault -HsmName myHsm -StorageContainerUri "https://{accountName}.blob.core.windows.net/{containerName}" -UseUserManagedIdentity
```
Expand Down
2 changes: 1 addition & 1 deletion src/KeyVault/KeyVault/help/Get-AzKeyVaultRandomNumber.md
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ This command gets 10 random bytes as base-64 string from managed HSM "testmhsm"

### Example 3: Get random number by resource id
```powershell
Get-AzKeyVaultRandomNumber -ResourceId /subscriptions/0b1fxxxx-xxxx-xxxx-aec3-xxxx72f09590/resourceGroups/test-rg/provders/Microsoft.KeyVault/managedHSMs/testhsm -Count 10
Get-AzKeyVaultRandomNumber -ResourceId /subscriptions/0b1fxxxx-xxxx-xxxx-aec3-xxxx72f09590/resourceGroups/test-rg/providers/Microsoft.KeyVault/managedHSMs/testhsm -Count 10
```

```output
Expand Down
6 changes: 3 additions & 3 deletions src/KeyVault/KeyVault/help/Import-AzKeyVaultCertificate.md
Original file line number Diff line number Diff line change
Expand Up @@ -80,7 +80,7 @@ Updated : 2/8/2016 11:50:43 PM

The first command uses the ConvertTo-SecureString cmdlet to create a secure password, and then
stores it in the $Password variable.
The second command imports the certificate named ImportCert01 into the CosotosoKV01 key vault.
The second command imports the certificate named ImportCert01 into the ContosoKV01 key vault.

### Example 2: Import a key vault certificate by CertificateString
```powershell
Expand Down Expand Up @@ -119,7 +119,7 @@ Updated : 2/8/2016 11:50:43 PM
The first command uses the ConvertTo-SecureString cmdlet to create a secure password, and then
stores it in the $Password variable.
The second command reads a certificate as a Base64 encoded representation.
The third command imports the certificate named ImportCert01 into the CosotosoKV01 key vault.
The third command imports the certificate named ImportCert01 into the ContosoKV01 key vault.

### Example 3: Import a key vault certificate with PolicyFile
```powershell
Expand Down Expand Up @@ -171,7 +171,7 @@ Id : https://ContosoKV01.vault.azure.net/certificates/ImportCert01/XX

The first command uses the ConvertTo-SecureString cmdlet to create a secure password, and then
stores it in the $Password variable.
The second command imports the certificate named ImportCert01 into the CosotosoKV01 key vault with
The second command imports the certificate named ImportCert01 into the ContosoKV01 key vault with
a policy defined by file.

## PARAMETERS
Expand Down
2 changes: 1 addition & 1 deletion src/KeyVault/KeyVault/help/Restore-AzKeyVault.md
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@ The example restores a backup stored in a folder named "mhsm-myHsm-2020101308504

### Example 2 Restore a Key Vault via User Assigned Managed Identity Authentication
```powershell
# Make sure an identity is assigend to the Hsm
# Make sure an identity is assigned to the Hsm
Update-AzKeyVaultManagedHsm -UserAssignedIdentity "/subscriptions/{sub-id}/resourceGroups/{rg-name}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identity-name}"
Restore-AzKeyVault -HsmName myHsm -StorageContainerUri "https://{accountName}.blob.core.windows.net/{containerName}" -BackupFolder "mhsm-myHsm-2020101308504935" -UseUserManagedIdentity
```
Expand Down
2 changes: 1 addition & 1 deletion src/KeyVault/KeyVault/help/Update-AzKeyVaultCertificate.md
Original file line number Diff line number Diff line change
Expand Up @@ -164,7 +164,7 @@ Accept wildcard characters: False

### -Tag
A hashtable representing certificate tags.
If not specified, the existing tags of the sertificate remain unchanged.
If not specified, the existing tags of the certificate remain unchanged.
Remove a tag by specifying an empty Hashtable.

```yaml
Expand Down
6 changes: 3 additions & 3 deletions src/KeyVault/KeyVault/help/Update-AzKeyVaultKey.md
Original file line number Diff line number Diff line change
Expand Up @@ -110,7 +110,7 @@ Accept wildcard characters: False
```

### -Enable
Value of true enables the key and a value of false disabless the key.
Value of true enables the key and a value of false disables the key.
If not specified, the existing enabled/disabled state remains unchanged.

```yaml
Expand All @@ -128,7 +128,7 @@ Accept wildcard characters: False
### -Expires
The expiration time of a key in UTC time.
If not specified, the existing expiration time of the key remains unchanged.
Please notice that expirys is ignored for Key Exchange Key used in BYOK process.
Please notice that expires is ignored for Key Exchange Key used in BYOK process.

```yaml
Type: System.Nullable`1[System.DateTime]
Expand Down Expand Up @@ -268,7 +268,7 @@ Accept wildcard characters: False

### -Tag
A hashtable represents key tags.
If not specified, the existings tags of the key remain unchanged.
If not specified, the existing tags of the key remain unchanged.

```yaml
Type: System.Collections.Hashtable
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ azpstestk8s http://github.com/xxxx azps_test_group

This command creates a configuration for Kubernetes Cluster.

### Example 2: Create a configuration for Kubernetes Cluster with specify paramter OperatorNamespace
### Example 2: Create a configuration for Kubernetes Cluster with specify parameter OperatorNamespace
```powershell
New-AzConnectedKubernetes -ClusterName azpstest_cluster_arc -ResourceGroupName azps_test_group -Location eastus -KubeConfig $HOME\.kube\config -KubeContext azps_aks_t01
New-AzKubernetesConfiguration -ResourceGroupName azps_test_group -ClusterName azpstest_cluster_arc -Name azpstestk8s-operator -RepositoryUrl http://github.com/xxxx -OperatorScope 'cluster' -ClusterType ConnectedClusters
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -30,19 +30,19 @@ This will delete the YAML file used to set up the Source control configuration,

## EXAMPLES

### Example 1: Remove a configuation of Kubernetes Cluster by name
### Example 1: Remove a configuration of Kubernetes Cluster by name
```powershell
Remove-AzKubernetesConfiguration -ResourceGroupName azps_test_group -ClusterName azpstest_cluster_arc -Name azpstestk8s -ClusterType ConnectedClusters
```

This command removes a configuation of Kubernetes Cluster by name.
This command removes a configuration of Kubernetes Cluster by name.

### Example 2: Remove a configuation of Kubernetes Cluster by object
### Example 2: Remove a configuration of Kubernetes Cluster by object
```powershell
Get-AzKubernetesConfiguration -ClusterName azpstest_cluster_arc -ClusterType ConnectedClusters -ResourceGroupName azps_test_group -Name azpstestk8s-operator | Remove-AzKubernetesConfiguration
```

This command removes a configuation of Kubernetes Cluster by object.
This command removes a configuration of Kubernetes Cluster by object.

## PARAMETERS

Expand Down
4 changes: 2 additions & 2 deletions src/Kusto/Kusto/help/Get-AzKustoSandboxCustomImage.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ Get-AzKustoSandboxCustomImage -ClusterName "myCluster" -ResourceGroupName "myRes
```output
Name
----
myCluser/myImage
myCluster/myImage
```

The above command returns all Kusto sandbox custom images in cluster "myCluster" and resource group "myResourceGroup".
Expand All @@ -57,7 +57,7 @@ Get-AzKustoSandboxCustomImage -ClusterName "myCluster" -Name "myImage" -Resource
```output
Name
----
myCluser/myImage
myCluster/myImage
```

The above command returns a Kusto sandbox custom image named "myImage" in cluster "myCluster" and resource group "myResourceGroup".
Expand Down
2 changes: 1 addition & 1 deletion src/Kusto/Kusto/help/New-AzKustoDatabase.md
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ Kind Location Name Type
ReadWrite East US testnewkustocluster/mykustodatabase Microsoft.Kusto/Clusters/Databases
```

The above command creates a new datebase named "mykustodatabase" in the resource group "testrg".
The above command creates a new database named "mykustodatabase" in the resource group "testrg".

## PARAMETERS

Expand Down
2 changes: 1 addition & 1 deletion src/Kusto/Kusto/help/New-AzKustoScript.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ Name Type
testnewkustocluster/mykustodatabase/newkustoscript Microsoft.Kusto/Clusters/Databases/Scripts
```

The above command creates a Kusto database script named "newkustocript" in the resource group "testrg".
The above command creates a Kusto database script named "newkustoscript" in the resource group "testrg".

This script contains database scoped commands and the permissions of the script executor will be removed upon completion

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ Accept wildcard characters: False
```

### -Email
The name of the user that uniqely identifies it within containing lab.
The name of the user that uniquely identifies it within containing lab.
Used in resource URIs.

```yaml
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ Accept wildcard characters: False
```

### -Email
The name of the user that uniqely identifies it within containing lab.
The name of the user that uniquely identifies it within containing lab.
Used in resource URIs.

```yaml
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ Accept wildcard characters: False
```

### -Email
The name of the user that uniqely identifies it within containing lab.
The name of the user that uniquely identifies it within containing lab.
Used in resource URIs.

```yaml
Expand Down