Skip to content

Spelling Fixes #28068

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jul 1, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion src/Nginx/Nginx.Autorest/docs/New-AzNginxCertificate.md
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ Location Name
cert-test
```

This commond creates a certificate for a NGINX deployment.
This command creates a certificate for a NGINX deployment.

## PARAMETERS

Expand Down
8 changes: 4 additions & 4 deletions src/Nginx/Nginx.Autorest/docs/Update-AzNginxDeployment.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ Update the NGINX deployment

## EXAMPLES

### Example 1: Enable the diagnotics support for a NGINX deployment
### Example 1: Enable the diagnosticss support for a NGINX deployment
Copy link
Preview

Copilot AI Jun 30, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fix the typo 'diagnosticss' to 'diagnostics'.

Suggested change
### Example 1: Enable the diagnosticss support for a NGINX deployment
### Example 1: Enable the diagnostics support for a NGINX deployment

Copilot uses AI. Check for mistakes.

```powershell
Update-AzNginxDeployment -Name nginx-test -ResourceGroupName nginx-test-rg -EnableDiagnosticsSupport
```
Expand All @@ -49,9 +49,9 @@ Location Name
westcentralus nginx-test
```

This command enables the diagnotics support for a NGINX deployment.
This command enables the diagnostics support for a NGINX deployment.

### Example 2: Disable the diagnotics support for a NGINX deployment
### Example 2: Disable the diagnostics support for a NGINX deployment
```powershell
Update-AzNginxDeployment -Name nginx-test -ResourceGroupName nginx-test-rg -EnableDiagnosticsSupport:$false
```
Expand All @@ -62,7 +62,7 @@ Location Name
westcentralus nginx-test
```

This command disables the diagnotics support for a NGINX deployment.
This command disables the diagnostics support for a NGINX deployment.

## PARAMETERS

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,4 +9,4 @@ Location Name
cert-test
```

This commond creates a certificate for a NGINX deployment.
This command creates a certificate for a NGINX deployment.
8 changes: 4 additions & 4 deletions src/Nginx/Nginx.Autorest/examples/Update-AzNginxDeployment.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
### Example 1: Enable the diagnotics support for a NGINX deployment
### Example 1: Enable the diagnostics support for a NGINX deployment
```powershell
Update-AzNginxDeployment -Name nginx-test -ResourceGroupName nginx-test-rg -EnableDiagnosticsSupport
```
Expand All @@ -9,9 +9,9 @@ Location Name
westcentralus nginx-test
```

This command enables the diagnotics support for a NGINX deployment.
This command enables the diagnostics support for a NGINX deployment.

### Example 2: Disable the diagnotics support for a NGINX deployment
### Example 2: Disable the diagnostics support for a NGINX deployment
```powershell
Update-AzNginxDeployment -Name nginx-test -ResourceGroupName nginx-test-rg -EnableDiagnosticsSupport:$false
```
Expand All @@ -22,4 +22,4 @@ Location Name
westcentralus nginx-test
```

This command disables the diagnotics support for a NGINX deployment.
This command disables the diagnostics support for a NGINX deployment.
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ function Test-SearchGetSearchResultsAndUpdate
Assert-NotNull $searchResult.Value
Assert-AreEqual $searchResult.Value.Count $top

# Makesure we return each doc as string for backward compatiable.
# Make sure we return each doc as string for backward compatible.
$stringType = "string".GetType()
$valueType = $searchResult.Value.GetType()
$valueIsString = $valueType.GenericTypeArguments.Contains($stringType)
Expand Down
2 changes: 1 addition & 1 deletion src/OperationalInsights/OperationalInsights/ChangeLog.md
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@
- `Get-AzOperationalInsightsSearchResult` (alias `Get-AzOperationalInsightsSearchResults`)
- `Get-AzOperationalInsightsLinkTarget` (alias `Get-AzOperationalInsightsLinkTargets`)
* Added parameters for `Set-AzOperationalInsightsWorkspace` and `New-AzOperationalInsightsWorkspace`
* Created cmdlets for Linked Stoarge Account
* Created cmdlets for Linked Storage Account
* Created cmdlets for Clusters and Linked Service

## Version 1.3.4
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -99,7 +99,7 @@ public virtual PSDataExport UpdateDataExport(string resourceGroupName, CreatePSD
}
catch (RestException)
{
throw new PSArgumentException($"Data export {parameters.DataExportName} under resourceGroup {resourceGroupName} worspace:{parameters.WorkspaceName} does not exist, please use 'New-AzOperationalInsightsDataExport' instead.");
throw new PSArgumentException($"Data export {parameters.DataExportName} under resourceGroup {resourceGroupName} workspace:{parameters.WorkspaceName} does not exist, please use 'New-AzOperationalInsightsDataExport' instead.");
}

//validate user input parameters were not null - if they were then use existing values so they wont be ran over by null values
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ public virtual PSLinkedStorageAccountsResource CreateLinkedStorageAccount(string

if (existingResource != null)
{
throw new PSInvalidOperationException(string.Format("Linked Storage Accounts for workpsace: '{0}' under resource group: '{1}' already exists. Please use Update-AzOperationalInsightsLinkedStorageAccount for updating.", workspaceName, resourceGroupName));
throw new PSInvalidOperationException(string.Format("Linked Storage Accounts for workspace: '{0}' under resource group: '{1}' already exists. Please use Update-AzOperationalInsightsLinkedStorageAccount for updating.", workspaceName, resourceGroupName));
}

return new PSLinkedStorageAccountsResource(CreateOrUpdateLinkedStorageAccount(resourceGroupName, workspaceName, dataSourceType, storageAccountIds));
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ public PSTable UpdatePSTable(PSTable parameters)
{
PSTable existingTable = this.GetTable(parameters.ResourceGroupName, parameters.WorkspaceName, parameters.Name);

parameters.TotalRetentionInDays = parameters.TotalRetentionInDays ?? existingTable.TotalRetentionInDays;//dabenham TODO - test scenario where paln is changed from Analytics to Basic - see if total retention stays high to protect data loss from customers
parameters.TotalRetentionInDays = parameters.TotalRetentionInDays ?? existingTable.TotalRetentionInDays;//dabenham TODO - test scenario where plan is changed from Analytics to Basic - see if total retention stays high to protect data loss from customers
var response = OperationalInsightsManagementClient.Tables.Update(
resourceGroupName: parameters.ResourceGroupName,
workspaceName: parameters.WorkspaceName,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -161,7 +161,7 @@ public virtual PSWorkspace UpdatePSWorkspace(UpdatePSWorkspaceParameters paramet
}
catch (RestException)
{
//worksace not found - use New-AzOperationalInsightsWorkspace command instead
//workspace not found - use New-AzOperationalInsightsWorkspace command instead
throw new PSArgumentException($"Workspace {parameters?.WorkspaceName} under resourceGroup {parameters?.ResourceGroupName} was not found, please use New-AzOperationalInsightsWorkspace.");
}

Expand Down Expand Up @@ -301,7 +301,7 @@ public virtual PSIntelligencePack SetIntelligencePack(string resourceGroupName,
var existingIp = GetIntelligencePackList(resourceGroupName, workspaceName).FirstOrDefault(ip => ip.Name.Equals(intelligencePackName));
if (existingIp == null || existingIp == default(PSIntelligencePack))
{
throw new PSArgumentException($"Intelligence Pack {intelligencePackName} under resourceGroup {resourceGroupName} worspace:{workspaceName} does not exist");
throw new PSArgumentException($"Intelligence Pack {intelligencePackName} under resourceGroup {resourceGroupName} workspace:{workspaceName} does not exist");
}

existingIp.Enabled = enabled;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ public class GetAzureOperationalInsightsDataSourceCommand : OperationalInsightsB
const string ByWorkspaceNameByName = "ByWorkspaceNameByName";

[Parameter(Position = 0, ParameterSetName = ByWorkspaceObjectByName, Mandatory = true, ValueFromPipeline = true,
HelpMessage = "The workspace that containts the datasource(s).")]
HelpMessage = "The workspace that contains the datasource(s).")]
[Parameter(ParameterSetName = ByWorkspaceObjectByKind)]
[ValidateNotNull]
public PSWorkspace Workspace { get; set; }
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -123,7 +123,7 @@ public class RegexDelimiter
public int MatchIndex { get; set; }

/// <summary>
/// Gets or sets the numberd group.
/// Gets or sets the numbered group.
/// </summary>
[JsonProperty(PropertyName = "numberdGroup")]
public string NumberdGroup { get; set; }
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ private PSKeyVaultProperties(string keyVaultUri, string keyName, string keyVersi
}

/// <summary>
/// Creates an instance of PSKeyVaultProperties taht serves the response from the SDK only
/// Creates an instance of PSKeyVaultProperties that serves the response from the SDK only
/// KeyRsaSize property can be set with a value only from the SDK response - not user configurable
/// </summary>
/// <param name="kv"></param>
Expand Down Expand Up @@ -56,7 +56,7 @@ public static PSKeyVaultProperties CreateKVProperties(string keyVaultUri = null,
}

/// <summary>
/// Creates an instance of PSKeyVaultProperties taht serves the response from the SDK only
/// Creates an instance of PSKeyVaultProperties that serves the response from the SDK only
/// </summary>
/// <returns>An instance of PSKeyVaultProperties</returns>
public static PSKeyVaultProperties GetKVPropertiesFromSDK(KeyVaultProperties kv)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -79,7 +79,7 @@ private void ValidateSKU()

if ((this.Capacity != null || this.Capacity != 0) && serviceTrier.Equals(AllowedWorkspaceServiceTiers.CapacityReservation))
{
throw new PSArgumentException($"Failed to set Capacity for SKU: {serviceTrier}, Capacity is only supportted for {AllowedWorkspaceServiceTiers.CapacityReservation} SKU");
throw new PSArgumentException($"Failed to set Capacity for SKU: {serviceTrier}, Capacity is only supported for {AllowedWorkspaceServiceTiers.CapacityReservation} SKU");
}

if (this.Capacity != null && this.Capacity < 1000)
Expand Down

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Original file line number Diff line number Diff line change
Expand Up @@ -153,7 +153,7 @@ Are you sure you want to continue?</value>
<value>We've hit a internal error, please contact support with workspaceId. SingletonDataSourceHaveMultipleValues.</value>
</data>
<data name="DataSourceSyslogNoSeveritySelected" xml:space="preserve">
<value>Please atleast have one severity level to enable log collection.</value>
<value>Please at least have one severity level to enable log collection.</value>
</data>
<data name="DataSourceUpdateCannotModifyKind" xml:space="preserve">
<value>Cannot modify Kind while updating data source.</value>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -133,7 +133,7 @@ public override void ExecuteCmdlet()
}
else if (ParameterSetName == ParamSetNameByWorkspaceObject)
{
// This seems like a weird mapping, but rest assurured, CustomerId is what we want here
// This seems like a weird mapping, but rest assured, CustomerId is what we want here
OperationalInsightsDataClient.WorkspaceId = Workspace.CustomerId.ToString();
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ namespace Microsoft.Azure.Commands.OperationalInsights
public class GetAzureOperationalInsightsStorageInsightCommand : OperationalInsightsBaseCmdlet
{
[Parameter(Position = 0, ParameterSetName = ByWorkspaceObject, Mandatory = true, ValueFromPipeline = true,
HelpMessage = "The workspace that containts the storage insight(s).")]
HelpMessage = "The workspace that contains the storage insight(s).")]
[ValidateNotNull]
public PSWorkspace Workspace { get; set; }

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ namespace Microsoft.Azure.Commands.OperationalInsights
public class RemoveAzureOperationalInsightsStorageInsightCommand : OperationalInsightsBaseCmdlet
{
[Parameter(Position = 0, ParameterSetName = ByWorkspaceObject, Mandatory = true, ValueFromPipeline = true,
HelpMessage = "The workspace that containts the storage insight.")]
HelpMessage = "The workspace that contains the storage insight.")]
[ValidateNotNull]
public PSWorkspace Workspace { get; set; }

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ function setupEnv() {
$managedIdentityId = "/subscriptions/$($env.SubscriptionId)/resourcegroups/$($env.resourceGroup)/providers/Microsoft.ManagedIdentity/userAssignedIdentities/uami0524"
$env.Add("managedIdentityId", $managedIdentityId)

# Use mock environment, so we donnot run this cmdlet.
# Use mock environment, so we do not run this cmdlet.
New-AzResourceGroup -Name $env.resourceGroup -Location $env.location

# For any resources you created for test, you should add it to $env here.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
# This makes things a lot easier, since the tests require specific policies to be present in various scopes
# as well as large number of non-compliant resources in order to test things like paging.
# Both the tests and this script use the resource details defined in the common.ps1 script.
# Before running env setup, make sure you have access to the MG and Subscription defined in common.ps1 (or change them to MG\subscription you do have acess to)
# Before running env setup, make sure you have access to the MG and Subscription defined in common.ps1 (or change them to MG\subscription you do have access to)
. "..\ScenarioTests\Common.ps1"

# Note: Once the script is finished, wait for full compliance results before running the tests.
Expand Down Expand Up @@ -102,19 +102,19 @@ foreach ($resourceGroupName in @($resourceGroup3)) {
}
}

# Create Subscription targetting manual policy
# Create Subscription targeting manual policy
$manualPolicySubcriptionDefinition = New-AzPolicyDefinition -Name $(Get-TestManualPolicyDefinitonNameSub) -Policy "$PSScriptRoot/ManualPolicySubDefinition.json" -DisplayName "PS cmdlet tests: Subscription Manual Policy" -Mode All

# Create RG targetting manual policy
# Create RG targeting manual policy
$manualPolicyRGDefinition = New-AzPolicyDefinition -Name $(Get-TestManualPolicyDefinitonNameRG) -Policy "$PSScriptRoot/ManualPolicyRGDefinition.json" -DisplayName "PS cmdlet tests: RG Manual Policy" -Mode All

# Create Resource targetting manual policy
# Create Resource targeting manual policy
$manualPolicyResourceDefinition = New-AzPolicyDefinition -Name $(Get-TestManualPolicyDefinitonNameResource) -Policy "$PSScriptRoot/ManualPolicyResourceDefinition.json" -DisplayName "PS cmdlet tests: Resource Manual Policy" -Mode All

# Create a network security group for testing resource level attestations.
New-AzResourceGroupDeployment -ResourceGroupName $resourceGroup3 -TemplateFile "$PSScriptRoot/CreateNSGsTemplate.json" -resourceCount 1 -resourceNamePrefix $(Get-TestResourceNamePrefix)

# Assign the manual policies targetting each of Subscription, Resource Groups and Resource Types to the subscription
# Assign the manual policies targeting each of Subscription, Resource Groups and Resource Types to the subscription
$manualPolicySubAssignment = New-AzPolicyAssignment -Name $(Get-TestAttestationSubscriptionPolicyAssignmentName) -Scope "/subscriptions/$subscriptionId" -DisplayName "PS cmdlet tests: Subscription Manual Policy" -PolicyDefinition $manualPolicySubcriptionDefinition

$manualPolicyRGAssignment = New-AzPolicyAssignment -Name $(Get-TestAttestationRGPolicyAssignmentName) -Scope "/subscriptions/$subscriptionId" -DisplayName "PS cmdlet tests: RG Manual Policy" -PolicyDefinition $manualPolicyRGDefinition
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -405,53 +405,53 @@ function Assert-NotNullOrEmpty {

<#
.SYNOPSIS
Gets test manual policy definition name targetted at subcriptions.
Gets test manual policy definition name targeted at subscriptions.
#>
function Get-TestManualPolicyDefinitonNameSub{
"PSTestAttestationSub"
}

<#
.SYNOPSIS
Gets test manual policy definition name targetted at resource groups.
Gets test manual policy definition name targeted at resource groups.
#>
function Get-TestManualPolicyDefinitonNameRG{
"PSTestAttestationRG"
}

<#
.SYNOPSIS
Gets test manual policy definition name targetted at resources.
Gets test manual policy definition name targeted at resources.
#>
function Get-TestManualPolicyDefinitonNameResource{
"PSTestAttestationResource"
}

<#
.SYNOPSIS
Gets test manual policy initiative name targetted at subcriptions.
Gets test manual policy initiative name targeted at subscriptions.
#>
function Get-TestManualPolicyInitiativeNameSub{
"PSTestAttestationInitiativeSub"
}

<#
.SYNOPSIS
Gets test manual policy initiative name targetted at resource groups.
Gets test manual policy initiative name targeted at resource groups.
#>
function Get-TestManualPolicyInitiativeNameRG{
"PSTestAttestationInitiativeRG"
}

<#
.SYNOPSIS
Gets test manual policy initiative name targetted at resource.
Gets test manual policy initiative name targeted at resource.
#>
function Get-TestManualPolicyInitiativeNameResource{
"PSTestAttestationInitiativeResource"
}

#region Attestation Subsciption Scope
#region Attestation Subscription Scope

<#
.SYNOPSIS
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ function Get-AzureRmPolicyEvent-ManagementGroupScope-Paging {
$managementGroupName = Get-TestManagementGroupName
$from = Get-TestQueryIntervalStart

# Apply filters\selection to recude the session recording size
# Apply filters\selection to reduce the session recording size
$policyEvents = Get-AzPolicyEvent -ManagementGroupName $managementGroupName -From $from -Top 1001 -Select "Timestamp" -Filter "PolicyDefinitionAction eq 'modify'"
Assert-True { $policyEvents.Count -eq 1001 }

Expand All @@ -58,7 +58,7 @@ Get multiple pages of policy events at subscription scope
function Get-AzureRmPolicyEvent-SubscriptionScope-Paging {
$from = Get-TestQueryIntervalStart

# Apply filters\selection to recude the session recording size
# Apply filters\selection to reduce the session recording size
$policyEvents = Get-AzPolicyEvent -Top 1001 -From $from -Select "Timestamp" -Filter "PolicyDefinitionAction eq 'modify'"
Assert-True { $policyEvents.Count -eq 1001 }

Expand Down
Loading