From 8a073977fc493f71ea9978d38dde7561e4782086 Mon Sep 17 00:00:00 2001 From: ZelinWang Date: Wed, 6 Dec 2023 15:10:51 +0800 Subject: [PATCH] ignore tested_command.txt to fix security issue (#427) --- .gitignore | 1 + azdev/operations/cmdcov/tested_command.txt | 15665 ------------------- 2 files changed, 1 insertion(+), 15665 deletions(-) delete mode 100644 azdev/operations/cmdcov/tested_command.txt diff --git a/.gitignore b/.gitignore index 2ea1687..aa26c7d 100644 --- a/.gitignore +++ b/.gitignore @@ -13,3 +13,4 @@ pip-wheel-metadata/* build/ dist/ cmd_coverage +tested_command.txt diff --git a/azdev/operations/cmdcov/tested_command.txt b/azdev/operations/cmdcov/tested_command.txt deleted file mode 100644 index 3a5bb4a..0000000 --- a/azdev/operations/cmdcov/tested_command.txt +++ /dev/null @@ -1,15665 +0,0 @@ -acr create -n {registry_name} -g {rg} -l {rg_loc} --sku {sku} -acr create -n {registry_name} -g {rg} -l {rg_loc} --sku {sku} -acr replication create -n {replication_name} -r {registry_name} -l {replication_loc} -acr replication list -r {registry_name} -acr replication show -n {replication_name} -r {registry_name} -acr replication update -n {replication_name} -r {registry_name} --tags {tags} --region-endpoint-enabled false -acr replication delete -n {replication_name} -r {registry_name} -acr replication create -n {replication_name} -r {registry_name} -l {replication_loc} --region-endpoint-enabled false -acr replication delete -n {replication_name} -r {registry_name} -acr delete -n {registry_name} -g {rg} -y -acr create -n {registry_name} -g {rg} -l {rg_loc} --sku {sku} -acr webhook create -n {webhook_name} -r {registry_name} --uri {uri} --actions {actions} -acr webhook list -r {registry_name} -acr webhook show -n {webhook_name} -r {registry_name} -acr webhook update -n {webhook_name} -r {registry_name} --headers {headers} --scope {webhook_scope} -acr webhook get-config -n {webhook_name} -r {registry_name} -acr webhook ping -n {webhook_name} -r {registry_name} -acr webhook list-events -n {webhook_name} -r {registry_name} -acr show-usage -n {registry_name} -g {rg} -acr webhook delete -n {webhook_name} -r {registry_name} -acr delete -n {registry_name} -g {rg} -y -monitor log-analytics workspace create -g {rg} -n {workspace} -acr create -n {registry_name} -g {rg} --sku {sku} --workspace {workspace} -monitor diagnostic-settings show -g {rg} --resource {registry_id} -n {diagnostic-settings} -acr create -n {registry_name} -g {rg} -l {rg_loc} --sku {sku} -acr check-name -n clireg000002 -acr list -g clitest.rg000001 -acr show -n clireg000002 -g clitest.rg000001 -acr show-usage -n clireg000002 -g clitest.rg000001 -acr update -n clireg000002 -g clitest.rg000001 --tags foo=bar cat --admin-enabled true -acr config retention update -r clireg000002 --status enabled --days 30 --type UntaggedManifests -acr config retention show -r clireg000002 -acr config content-trust update -n clireg000002 --status enabled -acr config content-trust show -n clireg000002 -acr credential show -n clireg000002 -g clitest.rg000001 -acr credential renew -n clireg000002 -g clitest.rg000001 --password-name password -acr credential renew -n clireg000002 -g clitest.rg000001 --password-name password2 -acr delete -n clireg000002 -g clitest.rg000001 -y -keyvault update --name {key_vault} --enable-soft-delete --enable-purge-protection -keyvault key create --name {key_name} --vault-name {key_vault} -identity create --name {identity_name} -g {rg} -keyvault set-policy --object-id {principal_id} --name {key_vault} --key-permissions {identity_permissions} -acr create --name {registry_name} --resource-group {rg} --sku premium --identity {identity_id} --key-encryption-key {key_id} -keyvault key create --name {rotate_key_name} --vault-name {key_vault} -acr encryption rotate-key --name {registry_name} --identity {identity_id} --key-encryption-key {rotate_key_id} -g {rg} -acr encryption show --name {registry_name} -g {rg} -acr create -n {registry_1} -g {rg} --sku {sku} --public-network-enabled false --allow-exports -acr create -n {registry_1} -g {rg} --sku {sku} --public-network-enabled false --allow-exports true -acr create -n {registry_1} -g {rg} --sku {sku} --public-network-enabled false --allow-exports false -acr create -n {registry_1} -g {rg} --sku {sku} --public-network-enabled false -acr update -n {registry_1} -g {rg} --sku {sku} --allow-exports true -acr update -n {registry_1} -g {rg} --sku {sku} --allow-exports false -acr update -n {registry_1} -g {rg} --sku {sku} -acr create --name {registry_name} --resource-group {rg} --sku premium -identity create --name {identity_name} -g {rg} -identity create --name {second_identity_name} -g {rg} -acr identity assign --name {registry_name} --identities "{system_identity}" "{identity_id}" -acr identity show --name {registry_name} -acr identity remove --name {registry_name} --identities "{system_identity}" "{identity_id}" -acr identity assign --name {registry_name} --identities {system_identity} -acr identity remove --name {registry_name} --identities {system_identity} -acr identity assign --name {registry_name} --identities {identity_id} -acr identity remove --name {registry_name} --identities {identity_id} -acr identity assign --name {registry_name} --identities "{system_identity}" "{identity_id}" -acr identity assign --name {registry_name} --identities {second_identity_id} -acr identity remove --name {registry_name} --identities {second_identity_id} -acr identity remove --name {registry_name} --identities {identity_id} -acr identity remove --name {registry_name} --identities {system_identity} -account get-access-token -keyvault secret show --id https://cliimportkv73021.vault.azure.net/secrets/SPusername -keyvault secret show --id https://cliimportkv73021.vault.azure.net/secrets/SPpassword -group create -n {source_registry_rg} -l {source_loc} -acr create -n {source_registry_name} -g {source_registry_rg} -l {source_loc} --sku {sku} -acr import -n {source_registry_name} -r {resource_id} --source {source_image} -acr create -n {registry_name} -g {rg} -l {rg_loc} --sku {sku} -acr import -n {registry_name} --source {source_image} -r {source_registry_name} -t {tag_same_sub} -acr import -n {registry_name} --source {source_image} -r {source_registry_name} -acr import -n {registry_name} --source {source_image} -r {source_registry_name} -t {tag_multitag1} -t {tag_multitag2} -acr import -n {registry_name} --source {source_image_same_registry} -t {tag_same_registry} -acr import -n {registry_name} --source {source_image_by_digest} -t {tag_by_digest} -acr import -n {registry_name} --source {source_image_public_registry_dockerhub} -acr import -n {registry_name} --source {resource_imageV1} -u {application_ID} -p {service_principal_password} -acr import -n {registry_name} --source {resource_imageV2} -p {token} -group create -n {source_registry_rg} -l {source_loc} -acr create -n {source_registry_name} -g {source_registry_rg} -l {source_loc} --sku {sku} -acr import -n {source_registry_name} -r {resource_id} --source {source_image} --no-wait -acr create --name {registry_name} --resource-group {rg} --sku premium -l eastus -acr update --name {registry_name} --resource-group {rg} --anonymous-pull-enabled true -acr update --name {registry_name} --resource-group {rg} --anonymous-pull-enabled false -acr create --name {registry_name} --resource-group {rg} --sku premium -acr show-endpoints --name {registry_name} --resource-group {rg} -acr update --name {registry_name} --resource-group {rg} --data-endpoint-enabled -acr show-endpoints --name {registry_name} --resource-group {rg} -acr replication create -r {registry_name} -l {replication_loc} -acr show-endpoints --name {registry_name} --resource-group {rg} -acr update --name {registry_name} --resource-group {rg} --data-endpoint-enabled false -acr show-endpoints --name {registry_name} --resource-group {rg} -network vnet create -g {rg} -n {vnet_name} --subnet-name {subnet_name} -network vnet subnet update -g {rg} --vnet-name {vnet_name} --name {subnet_name} --disable-private-endpoint-network-policies true -acr create --name {registry_name} --resource-group {rg} --sku premium -network private-endpoint create -n {endpoint_name} -g {rg} --subnet {subnet_name} --vnet-name {vnet_name} --private-connection-resource-id {registry_id} --group-ids registry --connection-name {endpoint_conn_name} --manual-request -acr private-endpoint-connection list -g {rg} --registry-name {registry_name} -acr private-endpoint-connection approve -g {rg} --registry-name {registry_name} -n {endpoint_request} --description {description_msg} -network private-endpoint create -n {second_endpoint_name} -g {rg} --subnet {subnet_name} --vnet-name {vnet_name} --private-connection-resource-id {registry_id} --group-ids registry --connection-name {second_endpoint_conn_name} --manual-request -acr private-endpoint-connection list -g {rg} -r {registry_name} -acr private-endpoint-connection reject -g {rg} -r {registry_name} -n {second_endpoint_request} --description {description_msg} -acr private-endpoint-connection list -g {rg} -r {registry_name} -acr private-endpoint-connection delete -g {rg} --registry-name {registry_name} -n {second_endpoint_request} -acr private-endpoint-connection show -g {rg} -r {registry_name} -n {endpoint_request} -acr private-endpoint-connection delete -g {rg} --registry-name {registry_name} -n {endpoint_request} -acr private-endpoint-connection list -g {rg} -r {registry_name} -acr create --name {registry_name} --resource-group {rg} --sku premium -acr update --name {registry_name} --resource-group {rg} --public-network-enabled false --allow-trusted-services false -acr update --name {registry_name} --resource-group {rg} --allow-trusted-services true -acr create --name {registry_2_name} --resource-group {rg} --sku premium --public-network-enabled false --allow-trusted-services false -acr create --name {registry_1} --resource-group {rg} --sku premium -acr create --name {registry_2} --resource-group {rg} --sku premium --zone-redundancy Enabled -acr replication show --name {home_location} --registry {registry_2} --resource-group {rg} -acr replication create --registry {registry_1} -g {rg} --location {location_2} --zone-redundancy Enabled -acr replication create --registry {registry_2} -g {rg} --location {location_2} -acr replication create --registry {registry_2} -g {rg} --location {location_3} --zone-redundancy Disabled -acr check-name -n {name} -acr create -n {registry_name} -g {rg} -l {rg_loc} --sku {sku} -acr update -n {registry_name} --data-endpoint-enabled true -acr connected-registry create -n {cr_name} -r {registry_name} --repository {repo_1} {repo_2} {repo_3} -acr token create -r {registry_name} -n {syncToken} --repository {repo_1} content/read metadata/read --gateway {root_name} config/read config/write message/read message/write --no-passwords -acr token create -r {registry_name} -n {clientToken} --repository {repo_1} content/read --no-passwords -acr connected-registry create -n {root_name} -r {registry_name} --sync-token {syncToken} -m ReadOnly --log-level Warning -s "{syncSchedule}" -w PT4H --client-tokens {clientToken} -acr connected-registry create -n {child_name} -p {root_name} -r {registry_name} --repository {repo_2} -m ReadOnly -acr connected-registry create -n {grandchild_name} -p {child_name} -r {registry_name} --repository {repo_2} -m ReadOnly -acr connected-registry list -r {registry_name} -acr connected-registry list-client-tokens -n {root_name} -r {registry_name} -acr token create -r {registry_name} -n {clientToken2} --repository {repo_2} metadata/read --no-passwords -acr connected-registry update -n {root_name} -r {registry_name} --log-level Information -s "{defaultSyncSchedule}" --remove-client-tokens {clientToken} --add-client-tokens {clientToken2} -acr connected-registry list-client-tokens -n {root_name} -r {registry_name} -acr connected-registry show -n {cr_name} -r {registry_name} -acr connected-registry get-settings -n {root_name} -r {registry_name} --parent-protocol https --generate-password 2 -y -acr token show -n {syncToken} -r {registry_name} -acr connected-registry delete -n {grandchild_name} -r {registry_name} --cleanup -y -acr connected-registry delete -n {child_name} -r {registry_name} -y -acr delete -n {registry_name} -g {rg} -y -network vnet create -g {rg} -n {vnet_name} --subnet-name {subnet} -network vnet subnet update -g {rg} --vnet-name {vnet_name} -n {subnet} --service-endpoints {acr_provider} -acr create -n {registry_name} -g {rg} -l {rg_loc} --sku {sku} --default-action {deny_action} -acr network-rule add -g {rg} -n {registry_name} --vnet-name {vnet_name} --subnet {subnet} -acr network-rule add -g {rg} -n {registry_name} --ip-address {ip_address} -acr network-rule list -g {rg} -n {registry_name} -acr update -n {registry_name} -g {rg} --default-action {allow_action} -acr network-rule remove -g {rg} -n {registry_name} --vnet-name {vnet_name} --subnet {subnet} -acr network-rule remove -g {rg} -n {registry_name} --ip-address {ip_address} -acr network-rule list -g {rg} -n {registry_name} -acr delete -g {rg} -n {registry_name} -y -network vnet delete -g {rg} -n {vnet_name} -acr create -n {registry_name} -g {rg} -l {rg_loc} --sku {sku} -acr task create -n {task_name} -r {registry_name} --context {context} --image {image} -f {file} --commit-trigger-enabled {trigger_enabled} --pull-request-trigger-enabled {trigger_enabled} --assign-identity {identity} -acr task create -n {task_no_context} -r {registry_name} --cmd {existing_image} -c {no_context} -acr task list -r {registry_name} -acr task run -n {task_no_context} -r {registry_name} --no-logs -acr task run -n {task_name} -r {registry_name} --no-logs -acr task list-runs -n {task_name} -r {registry_name} -acr task show -n {task_name} -r {registry_name} -acr task update -n {task_name} -r {registry_name} --platform linux/arm -acr task update-run -r {registry_name} --run-id {run_id} --no-archive false -acr task credential add -n {task_name} -r {registry_name} --login-server {loginServer} -u testuser -p random --use-identity {identity} -acr task credential update -n {task_name} -r {registry_name} --login-server {loginServer} -u testuser -p random -acr task delete -n {task_name} -r {registry_name} -y -acr delete -n {registry_name} -g {rg} -y -acr create -n {registry_name} -g {rg} -l {rg_loc} --sku {sku} -group deployment create --resource-group {rg} --template-file "{tf}" --parameters registryName={registry_name} --parameters taskRunName={taskrun_name} --parameters sourceLocation={sourceLocation} --parameters dockerFilePath={dockerFilePath} --parameters image={image} -acr taskrun list -r {registry_name} -g {rg} -acr taskrun show -r {registry_name} -n {taskrun_name} -g {rg} -acr taskrun delete -r {registry_name} -n {taskrun_name} -g {rg} -y -acr create -g {rg} -n {registry} --sku premium -acr token create -r {registry} -n {token} --repository foo content/read -acr scope-map show -r {registry} -n {token}-scope-map -acr scope-map create -r {registry} -n {scope_map} --repository foo content/read metadata/read -acr token create -r {registry} --scope-map {scope_map} -n {token2} --no-passwords -acr token credential generate -r {registry} -n {token2} --password1 --password2 -acr token create -r {registry} -n {token_short_lived} --repository foo content/read --expiration-in-days 1 -acr token create -r {registry} -n {token_long_lived} --repository foo content/read --expiration 2100-12-31T12:59:59Z -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=3 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --zones {zones} -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --node-count=3 --zones {zones} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=3 --ssh-key-value={ssh_key_value} --zones {zones} -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --node-count=3 --zones {zones} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} -aks browse --resource-group={resource_group} --name={name} --listen-address=127.0.0.1 --listen-port=8080 --disable-browser -aks delete -g {resource_group} -n {name} --yes --no-wait -identity create -g clitest000001 -n cli000003 -network vnet create -n clivnet000004 -g clitest000001 --address-prefix 192.168.0.0/16 --subnet-name clisubnet000005 --subnet-prefix 192.168.0.0/24 -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --enable-managed-identity --assign-identity={identity_resource_id} --vnet-subnet-id={vnet_subnet_id} -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks get-credentials -g {resource_group} -n {name} -f - -aks get-credentials -g {resource_group} -n {name} -f "{file}" -aks scale -g {resource_group} -n {name} --node-count 3 -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --vm-set-type VirtualMachineScaleSets --node-count=1 --ssh-key-value={ssh_key_value} --aad-server-app-id 00000000-0000-0000-0000-000000000001 --aad-server-app-secret fake-secret --aad-client-app-id 00000000-0000-0000-0000-000000000002 --aad-tenant-id d5b55040-0c14-48cc-a028-91457fc190d9 -o json -aks update --resource-group={resource_group} --name={name} --enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000003 --aad-tenant-id 00000000-0000-0000-0000-000000000004 -o json -aks create --resource-group={resource_group} --name={name} --vm-set-type VirtualMachineScaleSets --node-count=1 --ssh-key-value={ssh_key_value} --aad-server-app-id 00000000-0000-0000-0000-000000000001 --aad-server-app-secret fake-secret --aad-client-app-id 00000000-0000-0000-0000-000000000002 --aad-tenant-id d5b55040-0c14-48cc-a028-91457fc190d9 -o json -aks update --resource-group={resource_group} --name={name} --enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000003 --aad-tenant-id 00000000-0000-0000-0000-000000000004 -o json -aks create --resource-group={resource_group} --name={name} -a azure-keyvault-secrets-provider --enable-secret-rotation --rotation-poll-interval 30m --ssh-key-value={ssh_key_value} -o json -aks delete --resource-group={resource_group} --name={name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --tags {tags} --ssh-key-value={ssh_key_value} --enable-cluster-autoscaler --min-count 1 --max-count 3 --cluster-autoscaler-profile scan-interval=30s expander=least-waste -aks update --resource-group={resource_group} --name={name} --tags {tags} --disable-cluster-autoscaler -aks update --resource-group={resource_group} --name={name} --tags {tags} --enable-cluster-autoscaler --min-count 2 --max-count 5 -aks update --resource-group={resource_group} --name={name} --cluster-autoscaler-profile="" -aks update --resource-group={resource_group} --name={name} --update-cluster-autoscaler --min-count 3 --max-count 3 -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --load-balancer-sku=basic --vm-set-type=availabilityset --no-wait -aks wait -g {resource_group} -n {name} --created -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --load-balancer-sku=basic --vm-set-type=availabilityset --no-wait -aks wait -g {resource_group} -n {name} --created -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --api-server-authorized-ip-ranges=1.2.3.4/32 --no-wait -aks wait -g {resource_group} -n {name} --created -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks update -g {resource_group} -n {name} --api-server-authorized-ip-ranges="" -aks scale -g {resource_group} -n {name} --node-count 3 -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --api-server-authorized-ip-ranges=1.2.3.4/32 --no-wait -aks wait -g {resource_group} -n {name} --created -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks update -g {resource_group} -n {name} --api-server-authorized-ip-ranges="" -aks scale -g {resource_group} -n {name} --node-count 3 -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --tags {tags} --nodepool-labels {nodepool_labels} --nodepool-tags {nodepool_tags} --max-pods=100 --enable-rbac --admin-username=adminuser -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks get-credentials -g {resource_group} -n {name} -f - -aks scale -g {resource_group} -n {name} --node-count 3 -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --tags {tags} --nodepool-labels {nodepool_labels} -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks get-credentials -g {resource_group} -n {name} -f - -aks scale -g {resource_group} -n {name} --node-count 3 -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -network vnet create -n clivnet000004 -g clitest000001 --address-prefix 192.168.0.0/16 --subnet-name clisubnet000005 --subnet-prefix 192.168.0.0/24 -aks create --resource-group={resource_group} --name={name} --location={location} --node-count=1 --service-principal={service_principal} --client-secret={client_secret} --vnet-subnet-id={vnet_subnet_id} --skip-subnet-role-assignment --no-ssh-key -role assignment list --scope={vnet_subnet_id} -network vnet create -n clivnet000003 -g clitest000001 --address-prefix 192.168.0.0/16 --subnet-name clisubnet000004 --subnet-prefix 192.168.0.0/24 -aks create --resource-group={resource_group} --name={name} --location={location} --node-count=1 --vnet-subnet-id={vnet_subnet_id} --skip-subnet-role-assignment --no-ssh-key -role assignment list --scope={vnet_subnet_id} -network vnet subnet show --resource-group {rg} --vnet-name {vnet} --name default -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --enable-addons virtual-node --aci-subnet-name default --vnet-subnet-id "{subnet_id}" --network-plugin azure -aks show -g {resource_group} -n {name} -aks disable-addons -a virtual-node -g {resource_group} -n {name} -aks show -g {resource_group} -n {name} -aks enable-addons -a virtual-node -g {resource_group} -n {name} --subnet-name default -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -network vnet create -n clivnet000004 -g clitest000001 --address-prefix 192.168.0.0/16 --subnet-name clisubnet000005 --subnet-prefix 192.168.0.0/24 -aks create --resource-group={resource_group} --name={name} --location={location} --node-count=1 --service-principal={service_principal} --client-secret={client_secret} --vnet-subnet-id={vnet_subnet_id} --no-ssh-key -role assignment list --scope={vnet_subnet_id} -aks create --resource-group={resource_group} --name={name} --location={location} --node-count=1 --service-principal={service_principal} --client-secret={client_secret} --vnet-subnet-id={vnet_subnet_id} --no-ssh-key -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --no-wait -aks wait -g {resource_group} -n {name} --created -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks get-credentials -g {resource_group} -n {name} -f - -aks get-credentials -g {resource_group} -n {name} -f "{file}" -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --no-wait -aks wait -g {resource_group} -n {name} --created -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks get-credentials -g {resource_group} -n {name} -f - -aks get-credentials -g {resource_group} -n {name} -f "{file}" -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} --disable-rbac -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --kubernetes-version {kubernetes_version} --edge-zone {edge_zone} -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} --enable-aad --enable-azure-rbac -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} --enable-encryption-at-host -aks delete -g {resource_group} -n {name} --yes --no-wait -network private-dns zone create --resource-group={resource_group} --name="privatelink.{location}.azmk8s.io" -identity create --resource-group={resource_group} --name={identity_name} -role assignment create --assignee-object-id={identity_id} --role "Private DNS Zone Contributor" --scope={zone_id} --assignee-principal-type ServicePrincipal -aks create --resource-group={resource_group} --name={name} --node-count=1 --fqdn-subdomain={subdomain_name} --load-balancer-sku=standard --enable-private-cluster --private-dns-zone={zone_id} --enable-managed-identity --assign-identity {identity_resource_id} --ssh-key-value={ssh_key_value} -aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} --load-balancer-sku=standard --load-balancer-managed-outbound-ip-count 2 --load-balancer-outbound-ports 2048 --load-balancer-idle-timeout 5 -aks update --resource-group={resource_group} --name={name} --load-balancer-outbound-ports 1024 --load-balancer-idle-timeout 10 -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} --pod-cidr 10.244.0.0/16 --service-cidr 10.0.0.0/16 --docker-bridge-address 172.17.0.1/16 --dns-service-ip 10.0.2.10 --network-plugin kubenet --network-policy calico -aks delete -g {resource_group} -n {name} --yes --no-wait -network public-ip prefix create -g {rg} -n {ipprefix_name} --location {location} --length 29 -aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} --enable-node-public-ip --node-public-ip-prefix-id {ipprefix_id} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --vm-set-type VirtualMachineScaleSets --node-count=1 --ssh-key-value={ssh_key_value} -o json -aks update --resource-group={resource_group} --name={name} --enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 --aad-tenant-id 00000000-0000-0000-0000-000000000002 -o json -aks create --resource-group={resource_group} --name={name} --vm-set-type VirtualMachineScaleSets --node-count=1 --ssh-key-value={ssh_key_value} -o json -aks update --resource-group={resource_group} --name={name} --enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 --aad-tenant-id 00000000-0000-0000-0000-000000000002 -o json -aks create --resource-group={resource_group} --name={name} --enable-private-cluster --disable-public-fqdn --node-count=1 --ssh-key-value={ssh_key_value} -aks update --resource-group={resource_group} --name={name} --enable-public-fqdn -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --enable-private-cluster --node-count=1 --ssh-key-value={ssh_key_value} -aks update --resource-group={resource_group} --name={name} --disable-public-fqdn -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --enable-private-cluster --no-wait -aks wait -g {resource_group} -n {name} --created -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks update -g {resource_group} -n {name} --api-server-authorized-ip-ranges=1.2.3.4/32 -aks scale -g {resource_group} -n {name} --node-count 3 -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --enable-private-cluster --no-wait -aks wait -g {resource_group} -n {name} --created -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks update -g {resource_group} -n {name} --api-server-authorized-ip-ranges=1.2.3.4/32 -aks scale -g {resource_group} -n {name} --node-count 3 -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks get-versions -l westus2 --query 'orchestrators[].orchestratorVersion' -aks create -g {resource_group} -n {name} -p {dns_name_prefix} --nodepool-name {nodepool_name} -l {location} --service-principal {service_principal} --client-secret {client_secret} -k {k8s_version} --ssh-key-value {ssh_key_value} --tags scenario_test -c 1 -aks list -g {resource_group} -aks show -g {resource_group} -n {name} -aks scale -g {resource_group} -n {name} --nodepool-name {nodepool_name} --node-count 3 -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes -aks show -g {resource_group} -n {name} -aks get-versions -l westus2 --query 'orchestrators[].orchestratorVersion' -aks create -g {resource_group} -n {name} -p {dns_name_prefix} --nodepool-name {nodepool_name} -l {location} -k {k8s_version} --ssh-key-value {ssh_key_value} --tags scenario_test -c 1 -aks list -g {resource_group} -aks show -g {resource_group} -n {name} -aks scale -g {resource_group} -n {name} --nodepool-name {nodepool_name} --node-count 3 -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes -aks show -g {resource_group} -n {name} -aks get-versions -l westus2 --query 'orchestrators[].orchestratorVersion' -aks create -g {resource_group} -n {name} -p {dns_name_prefix} --ssh-key-value {ssh_key_value} -l {location} --service-principal {service_principal} --client-secret {client_secret} -k {k8s_version} --node-vm-size {vm_size} --tags scenario_test -c 1 --no-wait -aks wait -g {resource_group} -n {name} --created -aks show -g {resource_group} -n {name} -aks get-versions -l {location} -aks get-versions -l {location} -o table -aks get-upgrades -g {resource_group} -n {name} -aks get-upgrades -g {resource_group} -n {name} --output table -aks enable-addons -g {resource_group} -n {name} --addons http_application_routing -aks delete -g {resource_group} -n {name} --yes -aks show -g {resource_group} -n {name} -aks get-versions -l westus2 --query 'orchestrators[].orchestratorVersion' -aks create -g {resource_group} -n {name} -p {dns_name_prefix} --ssh-key-value {ssh_key_value} -l {location} -k {k8s_version} --node-vm-size {vm_size} --tags scenario_test -c 1 --no-wait -aks wait -g {resource_group} -n {name} --created -aks show -g {resource_group} -n {name} -aks get-versions -l {location} -aks get-versions -l {location} -o table -aks get-upgrades -g {resource_group} -n {name} -aks get-upgrades -g {resource_group} -n {name} --output table -aks enable-addons -g {resource_group} -n {name} --addons http_application_routing -aks delete -g {resource_group} -n {name} --yes -aks show -g {resource_group} -n {name} -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --no-wait -aks wait -g {resource_group} -n {name} --created -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks update -g {resource_group} -n {name} --load-balancer-managed-outbound-ip-count 2 -aks show -g {resource_group} -n {name} -aks scale -g {resource_group} -n {name} --node-count 3 -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --no-wait -aks wait -g {resource_group} -n {name} --created -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks update -g {resource_group} -n {name} --load-balancer-managed-outbound-ip-count 2 -aks show -g {resource_group} -n {name} -aks scale -g {resource_group} -n {name} --node-count 3 -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -network public-ip prefix create -g {rg} -n {ipprefix1_name} --location {location} --length 29 -network public-ip prefix create -g {rg} -n {ipprefix2_name} --location {location} --length 29 -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --load-balancer-outbound-ip-prefixes {ipprefix1_id} -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks update -g {resource_group} -n {name} --load-balancer-outbound-ip-prefixes {ipprefix1_id},{ipprefix2_id} -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -network public-ip prefix create -g {rg} -n {ipprefix1_name} --location {location} --length 29 -network public-ip prefix create -g {rg} -n {ipprefix2_name} --location {location} --length 29 -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --load-balancer-outbound-ip-prefixes {ipprefix1_id} -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks update -g {resource_group} -n {name} --load-balancer-outbound-ip-prefixes {ipprefix1_id},{ipprefix2_id} -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -network public-ip create -g {rg} -n {ip1_name} --location {location} --sku Standard -network public-ip create -g {rg} -n {ip2_name} --location {location} --sku Standard -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --load-balancer-outbound-ips {ip1_id} -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks update -g {resource_group} -n {name} --load-balancer-outbound-ips {ip1_id},{ip2_id} -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -network public-ip create -g {rg} -n {ip1_name} --location {location} --sku Standard -network public-ip create -g {rg} -n {ip2_name} --location {location} --sku Standard -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --load-balancer-outbound-ips {ip1_id} -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks update -g {resource_group} -n {name} --load-balancer-outbound-ips {ip1_id},{ip2_id} -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --vm-set-type VirtualMachineScaleSets --node-count=1 --ssh-key-value={ssh_key_value} -o json -aks nodepool add --resource-group={resource_group} --cluster-name={name} -n {spot_node_pool_name} --priority Spot --spot-max-price {spot_max_price} -c 1 -aks create --resource-group={resource_group} --name={name} --vm-set-type VirtualMachineScaleSets --node-count=1 --ssh-key-value={ssh_key_value} -o json -aks nodepool add --resource-group={resource_group} --cluster-name={name} -n {spot_node_pool_name} --priority Spot --spot-max-price {spot_max_price} -c 1 -aks create --resource-group={resource_group} --name={name} --service-principal={service_principal} --client-secret={client_secret} --ssh-key-value={ssh_key_value} -identity create -g clitest000001 -n cli000004 -aks update --resource-group={resource_group} --name={name} --enable-managed-identity --assign-identity={identity_resource_id} --yes -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} --load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure --enable-ahub -aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1 -aks update --resource-group={resource_group} --name={name} --disable-ahub -aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --enable-managed-identity --auto-upgrade-channel rapid --ssh-key-value={ssh_key_value} -aks update --resource-group={resource_group} --name={name} --auto-upgrade-channel stable -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} -a azure-keyvault-secrets-provider --ssh-key-value={ssh_key_value} -o json -aks delete --resource-group={resource_group} --name={name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --enable-managed-identity -a confcom --ssh-key-value={ssh_key_value} -o json -aks create --resource-group={resource_group} --name={name} --enable-managed-identity -a confcom --enable-sgxquotehelper --ssh-key-value={ssh_key_value} -o json -monitor log-analytics workspace create -g {resource_group} -n {workspace_name} -aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} -a monitoring --workspace-resource-id {workspace_id} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --vm-set-type VirtualMachineScaleSets -c 1 --node-osdisk-type=Ephemeral --node-osdisk-size 60 --ssh-key-value={ssh_key_value} -aks create --resource-group={resource_group} --name={name} --enable-managed-identity -a ingress-appgw --appgw-subnet-cidr 10.2.0.0/16 --ssh-key-value={ssh_key_value} -o json -aks create --resource-group={resource_group} --name={name} --vm-set-type VirtualMachineScaleSets -c 1 --node-osdisk-type=Managed --ssh-key-value={ssh_key_value} -aks create --resource-group={resource_group} --name={name} --enable-managed-identity -a open-service-mesh --ssh-key-value={ssh_key_value} -o json -aks create --resource-group={resource_group} --name={name} --vm-set-type VirtualMachineScaleSets -c 1 --os-sku Ubuntu --ssh-key-value={ssh_key_value} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --uptime-sla -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --uptime-sla -aks update --resource-group={resource_group} --name={name} --no-uptime-sla -aks update --resource-group={resource_group} --name={name} --uptime-sla --no-wait -aks delete -g {resource_group} -n {name} --yes --no-wait -ppg create -n clippg000004 -g clitest000001 --location westus2 -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --ppg={ppg} -aks nodepool add --resource-group={resource_group} --cluster-name={name} -n {node_pool_name} --ppg={ppg} -ppg create -n clippg000004 -g clitest000001 --location westus2 -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --ppg={ppg} -aks nodepool add --resource-group={resource_group} --cluster-name={name} -n {node_pool_name} --ppg={ppg} -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} --load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure -aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1 -aks update --resource-group={resource_group} --name={name} --enable-ahub -aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} --load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure -aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1 -aks update --resource-group={resource_group} --name={name} --enable-ahub -aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --ssh-key-value={ssh_key_value} --auto-upgrade-channel rapid --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AutoUpgradePreview -aks update --resource-group={resource_group} --name={name} --auto-upgrade-channel stable --aks-custom-headers AKSHTTPCustomFeatures=Microsoft.ContainerService/AutoUpgradePreview -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --enable-managed-identity -a confcom --ssh-key-value={ssh_key_value} -o json -aks disable-addons --addons confcom --resource-group={resource_group} --name={name} -o json -aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} --enable-managed-identity --disable-local-accounts -aks update --resource-group={resource_group} --name={name} --enable-local-accounts -aks update --resource-group={resource_group} --name={name} --disable-local-accounts -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --enable-managed-identity -a open-service-mesh --ssh-key-value={ssh_key_value} -o json -aks disable-addons --addons open-service-mesh --resource-group={resource_group} --name={name} -o json -aks create --resource-group={resource_group} --name={name} --ssh-key-value={ssh_key_value} -aks enable-addons --addons azure-keyvault-secrets-provider --resource-group={resource_group} --name={name} -o json -aks update --resource-group={resource_group} --name={name} --enable-secret-rotation --rotation-poll-interval 120s -o json -aks update --resource-group={resource_group} --name={name} --disable-secret-rotation -o json -aks disable-addons --addons azure-keyvault-secrets-provider --resource-group={resource_group} --name={name} -o json -aks enable-addons --addons azure-keyvault-secrets-provider --enable-secret-rotation --rotation-poll-interval 1h --resource-group={resource_group} --name={name} -o json -aks delete --resource-group={resource_group} --name={name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} -o json -aks enable-addons --addons confcom --resource-group={resource_group} --name={name} -o json -aks create --resource-group={resource_group} --name={name} --enable-managed-identity --ssh-key-value={ssh_key_value} -o json -aks enable-addons --addons open-service-mesh --resource-group={resource_group} --name={name} -o json -aks create --resource-group={resource_group} --name={name} --node-vm-size Standard_D2s_v3 --zones 1 2 3 --enable-ultra-ssd --ssh-key-value={ssh_key_value} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --vm-set-type VirtualMachineScaleSets --node-count=1 --ssh-key-value={ssh_key_value} --enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 -o json -aks update --resource-group={resource_group} --name={name} --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000002 --aad-tenant-id 00000000-0000-0000-0000-000000000003 -o json -aks create --resource-group={resource_group} --name={name} --vm-set-type VirtualMachineScaleSets --node-count=1 --ssh-key-value={ssh_key_value} --enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 -o json -aks update --resource-group={resource_group} --name={name} --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000002 --aad-tenant-id 00000000-0000-0000-0000-000000000003 -o json -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} --enable-managed-identity -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks scale -g {resource_group} -n {name} --node-count 3 -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --enable-managed-identity -aks list -g {resource_group} -aks list -g {resource_group} -o table -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks get-credentials -g {resource_group} -n {name} -f - -aks get-credentials -g {resource_group} -n {name} -f "{file}" -aks scale -g {resource_group} -n {name} --node-count 3 -aks show -g {resource_group} -n {name} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --nodepool-name {node_pool_name} -c 1 --ssh-key-value={ssh_key_value} -aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={node_pool_name_second} --os-sku CBLMariner -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --labels {labels} --node-count=1 --tags {tags} -aks nodepool list --resource-group={resource_group} --cluster-name={name} -aks nodepool list --resource-group={resource_group} --cluster-name={name} -o table -aks nodepool scale --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --node-count=3 -aks nodepool show --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} -aks nodepool get-upgrades --resource-group={resource_group} --cluster-name={name} --nodepool-name={nodepool1_name} -aks nodepool get-upgrades --resource-group={resource_group} --cluster-name={name} --nodepool-name={nodepool2_name} -aks nodepool update --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --tags {new_tags} -aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --labels {labels} --node-count=1 --tags {tags} -aks nodepool list --resource-group={resource_group} --cluster-name={name} -aks nodepool list --resource-group={resource_group} --cluster-name={name} -o table -aks nodepool scale --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --node-count=3 -aks nodepool show --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} -aks nodepool get-upgrades --resource-group={resource_group} --cluster-name={name} --nodepool-name={nodepool1_name} -aks nodepool get-upgrades --resource-group={resource_group} --cluster-name={name} --nodepool-name={nodepool2_name} -aks nodepool update --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --tags {new_tags} -aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} --service-principal={service_principal} --client-secret={client_secret} -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --labels {labels} --node-count=1 --tags {tags} -aks nodepool list --resource-group={resource_group} --cluster-name={name} -aks nodepool list --resource-group={resource_group} --cluster-name={name} -o table -aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool3_name} --labels {labels} --node-count=1 --tags {tags} --mode system -aks nodepool show --resource-group={resource_group} --cluster-name={name} --name={nodepool3_name} -aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} --no-wait -aks nodepool update --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --mode System -aks nodepool show --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --labels {labels} --node-count=1 --tags {tags} -aks nodepool list --resource-group={resource_group} --cluster-name={name} -aks nodepool list --resource-group={resource_group} --cluster-name={name} -o table -aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool3_name} --labels {labels} --node-count=1 --tags {tags} --mode system -aks nodepool show --resource-group={resource_group} --cluster-name={name} --name={nodepool3_name} -aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} --no-wait -aks nodepool update --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --mode System -aks nodepool show --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --ssh-key-value={ssh_key_value} -aks show -g {resource_group} -n {name} -aks get-credentials -g {resource_group} -n {name} --file "{file}" -aks nodepool update --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} --labels {labels} -aks nodepool list --resource-group={resource_group} --cluster-name={name} -aks nodepool update --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} --labels label1=value2 -aks nodepool show --resource-group={resource_group} --cluster-name={name} --name={nodepool1_name} -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --generate-ssh-keys -aks stop --resource-group={resource_group} --name={name} -aks start --resource-group={resource_group} --name={name} -aks create --resource-group={resource_group} --name={name} --service-principal={service_principal} --client-secret={client_secret} --ssh-key-value={ssh_key_value} -aks update --resource-group={resource_group} --name={name} --nodepool-labels {nodepool_labels} -aks update --resource-group={resource_group} --name={name} --nodepool-labels label1=value11 -aks create --resource-group={resource_group} --name={name} --service-principal={service_principal} --client-secret={client_secret} --ssh-key-value={ssh_key_value} -aks update --resource-group={resource_group} --name={name} --enable-managed-identity --yes -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --location={location} --dns-name-prefix={dns_name_prefix} --node-count=1 --windows-admin-username={windows_admin_username} --windows-admin-password={windows_admin_password} --load-balancer-sku=standard --vm-set-type=virtualmachinescalesets --network-plugin=azure --ssh-key-value={ssh_key_value} -aks nodepool add --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --os-type Windows --node-count=1 -aks update --resource-group={resource_group} --name={name} --windows-admin-password {new_windows_admin_password} -aks nodepool delete --resource-group={resource_group} --cluster-name={name} --name={nodepool2_name} --no-wait -aks delete -g {resource_group} -n {name} --yes --no-wait -aks create --resource-group={resource_group} --name={name} --nodepool-name {node_pool_name} --vm-set-type VirtualMachineScaleSets --node-count=1 --ssh-key-value={ssh_key_value} -o json -aks upgrade -g {resource_group} -n {name} --node-image-only --yes -aks create --resource-group={resource_group} --name={name} --nodepool-name {node_pool_name} --vm-set-type VirtualMachineScaleSets --node-count=1 --ssh-key-value={ssh_key_value} -o json -aks upgrade -g {resource_group} -n {name} --node-image-only --yes -aks create --resource-group={resource_group} --name={name} --nodepool-name {node_pool_name} --vm-set-type VirtualMachineScaleSets --node-count=1 --ssh-key-value={ssh_key_value} -o json -aks nodepool upgrade --resource-group={resource_group} --cluster-name={name} -n {node_pool_name} --node-image-only --no-wait -aks nodepool show --resource-group={resource_group} --cluster-name={name} -n {node_pool_name} -aks create --resource-group={resource_group} --name={name} --nodepool-name {node_pool_name} --vm-set-type VirtualMachineScaleSets --node-count=1 --ssh-key-value={ssh_key_value} -o json -aks nodepool upgrade --resource-group={resource_group} --cluster-name={name} -n {node_pool_name} --node-image-only --no-wait -aks nodepool show --resource-group={resource_group} --cluster-name={name} -n {node_pool_name} -aks create --resource-group={resource_group} --name={name} --vm-set-type VirtualMachineScaleSets --node-count=1 --ssh-key-value={ssh_key_value} --enable-aad --aad-admin-group-object-ids 00000000-0000-0000-0000-000000000001 -o json -aks update --resource-group={resource_group} --name={name} --enable-azure-rbac -o json -aks update --resource-group={resource_group} --name={name} --disable-azure-rbac -o json -aks create --resource-group={resource_group} --name={name} --nodepool-name {node_pool_name} --generate-ssh-keys --vm-set-type VirtualMachineScaleSets --node-count=1 -o json -aks command invoke -g {resource_group} -n {name} -o json -c "kubectl get pods -A" -advisor configuration show -g {rg} -advisor configuration update --exclude -g {rg} -advisor configuration show -g {rg} -advisor configuration update --include -g {rg} -advisor configuration show -g {rg} -advisor configuration show -advisor configuration update --low-cpu-threshold 15 --exclude -advisor configuration show -advisor configuration update --low-cpu-threshold 5 --include -advisor configuration show -advisor configuration list -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} --mi-system-assigned -keyvault key create --name {keyName} --vault-name {keyVault} -keyvault set-policy --object-id {principalId} --name {keyVault} --key-permissions {identityPermissions} -ams account encryption set -a {amsname} -g {rg} --key-type {keySource} --key-identifier {keyVaultId} -ams account encryption show -a {amsname} -g {rg} -ams account delete -n {amsname} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams account-filter create -a {amsname} -g {rg} -n {filterName} --first-quality {firstQuality} --end-timestamp {endTimestamp} --live-backoff-duration {liveBackoffDuration} --presentation-window-duration {presentationWindowDuration} --start-timestamp {startTimestamp} --timescale {timescale} --tracks "{tracks}" -ams account-filter show -a {amsname} -g {rg} -n {filterName} -ams account-filter show -a {amsname} -g {rg} -n {nonexits_filter_name} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams account-filter list -a {amsname} -g {rg} -ams account-filter create -a {amsname} -g {rg} -n {filterName1} --bitrate {bitrate1} --end-timestamp {endTimestamp} --live-backoff-duration {liveBackoffDuration} --presentation-window-duration {presentationWindowDuration} --start-timestamp {startTimestamp} --timescale {timescale} --tracks "{tracks}" -ams account-filter list -a {amsname} -g {rg} -ams account-filter create -a {amsname} -g {rg} -n {filterName2} --first-quality {bitrate2} --end-timestamp {endTimestamp} --live-backoff-duration {liveBackoffDuration} --presentation-window-duration {presentationWindowDuration} --start-timestamp {startTimestamp} --timescale {timescale} --tracks "{tracks}" -ams account-filter list -a {amsname} -g {rg} -ams account-filter delete -a {amsname} -g {rg} -n {filterName2} -ams account-filter list -a {amsname} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams account-filter create -a {amsname} -g {rg} -n {filterName} --first-quality {firstQuality} --end-timestamp {endTimestamp} --live-backoff-duration {liveBackoffDuration} --presentation-window-duration {presentationWindowDuration} --start-timestamp {startTimestamp} --timescale {timescale} --tracks "{tracks}" -ams account-filter update -a {amsname} -g {rg} -n {filterName} --bitrate {newBitrate} --start-timestamp {newStartTimestamp} --end-timestamp {newEndTimestamp} --set tracks[1].trackSelections[0].operation={newTrackOperation} tracks[1].trackSelections[0].property={newTrackProperty} tracks[1].trackSelections[0].value={newTrackValue} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams account check-name --location {location} -n {amsname} -ams account check-name --location {location} -n {amsname2} -ams account check-name --location {location} -n {amsname3} -ams account delete -n {amsname} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} --mi-system-assigned -ams account update -n {amsname} -g {rg} --tags key=value -ams account list -g clitest.rg000001 -ams account show -n {amsname} -g {rg} -ams account delete -n {amsname} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams account storage add -a {amsname} -g {rg} -n {storageAccount} -ams account storage remove -a {amsname} -g {rg} -n {storageAccount} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams account storage sync-storage-keys -g {rg} -a {amsname} --storage-account-id "{storageId}" -ams account delete -n {amsname} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams account storage add -a {amsname} -g {rg} -n {storageAccount} -ams asset create -a {amsname} -n {asset_name} -g {rg} --description {description} --alternate-id {alternate_id} --storage-account {storageAccount} --container {container} -ams asset-filter create -a {amsname} --asset-name {asset_name} -g {rg} -n {filter_name} --first-quality {firstQuality} --end-timestamp {endTimestamp} --live-backoff-duration {liveBackoffDuration} --presentation-window-duration {presentationWindowDuration} --start-timestamp {startTimestamp} --timescale {timescale} --tracks "{tracks}" -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams account storage add -a {amsname} -g {rg} -n {storageAccount} -ams asset create -a {amsname} -n {asset_name} -g {rg} --description {description} --alternate-id {alternate_id} --storage-account {storageAccount} --container {container} -ams asset-filter list -a {amsname} --asset-name {asset_name} -g {rg} -ams asset-filter create -a {amsname} --asset-name {asset_name} -g {rg} -n {filter_name1} --first-quality {bitrate1} -ams asset-filter list -a {amsname} --asset-name {asset_name} -g {rg} -ams asset-filter create -a {amsname} --asset-name {asset_name} -g {rg} -n {filter_name2} --bitrate {bitrate2} -ams asset-filter list -a {amsname} --asset-name {asset_name} -g {rg} -ams asset-filter delete -a {amsname} --asset-name {asset_name} -g {rg} -n {filter_name2} -ams asset-filter list -a {amsname} --asset-name {asset_name} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams account storage add -a {amsname} -g {rg} -n {storageAccount} -ams asset create -a {amsname} -n {asset_name} -g {rg} --description {description} --alternate-id {alternate_id} --storage-account {storageAccount} --container {container} -ams asset-filter create -a {amsname} --asset-name {asset_name} -g {rg} -n {filter_name} --first-quality {bitrate} --end-timestamp {endTimestamp} --live-backoff-duration {liveBackoffDuration} --presentation-window-duration {presentationWindowDuration} --start-timestamp {startTimestamp} --timescale {timescale} --tracks "{tracks}" -ams asset-filter show -a {amsname} --asset-name {asset_name} -g {rg} -n {filter_name} -ams asset-filter show -a {amsname} --asset-name {asset_name} -g {rg} -n {nonexits_asset_filter_name} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams account storage add -a {amsname} -g {rg} -n {storageAccount} -ams asset create -a {amsname} -n {asset_name} -g {rg} --description {description} --alternate-id {alternate_id} --storage-account {storageAccount} --container {container} -ams asset-filter create -a {amsname} --asset-name {asset_name} -g {rg} -n {filter_name} --first-quality {bitrate} --end-timestamp {endTimestamp} --live-backoff-duration {liveBackoffDuration} --presentation-window-duration {presentationWindowDuration} --start-timestamp {startTimestamp} --timescale {timescale} --tracks "{tracks}" -ams asset-filter update -a {amsname} --asset-name {asset_name} -g {rg} -n {filter_name} --bitrate {newBitrate} --start-timestamp {newStartTimestamp} --end-timestamp {newEndTimestamp} --set tracks[1].trackSelections[0].operation={newTrackOperation} tracks[1].trackSelections[0].property={newTrackProperty} tracks[1].trackSelections[0].value={newTrackValue} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams account storage add -a {amsname} -g {rg} -n {storageAccountForAsset} -ams asset create -a {amsname} -n {assetName} -g {rg} --description {description} --alternate-id {alternateId} --storage-account {storageAccountForAsset} --container {container} -ams asset update -a {amsname} -n {assetName} -g {rg} --set description=mydesc alternateId=myaid -ams asset show -a {amsname} -n {assetName} -g {rg} -ams asset show -a {amsname} -g {rg} -n {nonexits_asset_name} -ams asset list -a {amsname} -g {rg} -ams asset delete -n {assetName} -a {amsname} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams asset create -a {amsname} -n {assetName} -g {rg} --description {description} --alternate-id {alternateId} -ams asset get-encryption-key -a {amsname} -n {assetName} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams asset create -a {amsname} -n {assetName} -g {rg} --description {description} --alternate-id {alternateId} -ams asset get-sas-urls -a {amsname} -n {assetName} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams asset create -a {amsname} -n {assetName} -g {rg} -ams streaming-locator create -n {streamingLocatorName} -a {amsname} -g {rg} --streaming-policy-name {streamingPolicyName} --asset-name {assetName} -ams asset list-streaming-locators -a {amsname} -n {assetName} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams content-key-policy create -a {amsname} -n {contentKeyPolicyName} -g {rg} --description {description} --clear-key-configuration --open-restriction --policy-option-name {policyOptionName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams content-key-policy create -a {amsname} -n {contentKeyPolicyName} -g {rg} --open-restriction --description {description} --ask {ask} --fair-play-pfx "{fairPlayPfx}" --fair-play-pfx-password {fairPlayPfxPassword} --rental-and-lease-key-type {rentalAndLeaseKeyType} --rental-duration {rentalDuration} --policy-option-name {policyOptionName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams content-key-policy create -a {amsname} -n {contentKeyPolicyName} -g {rg} --open-restriction --description {description} --ask {ask} --fair-play-pfx "{fairPlayPfx}" --fair-play-pfx-password {fairPlayPfxPassword} --rental-and-lease-key-type {rentalAndLeaseKeyType} --fp-playback-duration-seconds {fairPlayPlaybackDurationSeconds} --fp-storage-duration-seconds {fairPlayStorageDurationSeconds} --rental-duration {rentalDuration} --policy-option-name {policyOptionName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams content-key-policy create -a {amsname} -n {contentKeyPolicyName} -g {rg} --open-restriction --play-ready-template "{playReadyPath}" --description {description} --policy-option-name {policyOptionName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams content-key-policy create -a {amsname} -n {contentKeyPolicyName} -g {rg} --open-restriction --play-ready-template "{playReadyPath}" --description {description} --policy-option-name {policyOptionName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams content-key-policy create -a {amsname} -n {contentKeyPolicyName} -g {rg} --description {description} --issuer {issuer} --audience {audience} --token-key "{tokenKey}" --token-key-type {tokenType} --token-type {restrictionTokenType} --widevine-template "{jsonFile}" --token-claims {tokenClaims} --open-id-connect-discovery-document {openIDConnectDiscoveryDocument} --policy-option-name {policyOptionName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams content-key-policy create -a {amsname} -n {contentKeyPolicyName} -g {rg} --description {description} --widevine-template "{jsonFile}" --open-restriction --policy-option-name {policyOptionName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams content-key-policy create -a {amsname} -n {contentKeyPolicyName} -g {rg} --description {description} --clear-key-configuration --open-restriction --policy-option-name {policyOptionName} -ams content-key-policy list -a {amsname} -g {rg} -ams content-key-policy delete -a {amsname} -g {rg} -n {contentKeyPolicyName} -ams content-key-policy list -a {amsname} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams content-key-policy create -a {amsname} -n {contentKeyPolicyName} -g {rg} --description {description} --clear-key-configuration --open-restriction --policy-option-name {policyOptionName} -ams content-key-policy show -a {amsname} -n {contentKeyPolicyName} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams content-key-policy create -a {amsname} -g {rg} -n {contentKeyPolicyName} --clear-key-configuration --policy-option-name {policyOptionName} --token-key "{tokenKey}" --token-key-type {tokenType} --issuer {issuer} --audience {audience} --token-type {restrictionTokenType} -ams content-key-policy show -a {amsname} -n {contentKeyPolicyName} -g {rg} -ams content-key-policy show -a {amsname} -n {contentKeyPolicyName} -g {rg} --with-secrets -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams content-key-policy create -a {amsname} -n {contentKeyPolicyName} -g {rg} --description {description} --clear-key-configuration --issuer {issuer} --audience {audience} --token-key "{tokenKey}" --token-key-type {tokenType} --token-type {restrictionTokenType} --token-claims {tokenClaims} --open-id-connect-discovery-document {openIDConnectDiscoveryDocument} --policy-option-name {policyOptionName} -ams content-key-policy update -a {amsname} -n {contentKeyPolicyName} -g {rg} --description {description} --set options[0].restriction.issuer={issuer} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams asset create -a {amsname} -n {inputAssetName} -g {rg} -ams asset create -a {amsname} -n {outputAssetName} -g {rg} -ams transform create -a {amsname} -n {transformName} -g {rg} --preset {presetName} -ams job start -t {transformName} -a {amsname} -g {rg} -n {jobName} --input-asset-name {inputAssetName} --output-assets {outputAssetName}={outputLabel} --priority {priority} --label {label} --correlation-data {correlationData} -ams job show -a {amsname} -n {jobName} -g {rg} -t {transformName} -ams job show -a {amsname} -n{nonexits_job_name} -g {rg} -t {transformName} -ams job list -a {amsname} -g {rg} -t {transformName} -ams job update -a {amsname} -n {jobName} -g {rg} -t {transformName} --description {description} --priority {priority} -ams job cancel -n {jobName} -a {amsname} -g {rg} -t {transformName} -ams job show -a {amsname} -n {jobName} -g {rg} -t {transformName} -ams job delete -n {jobName} -a {amsname} -g {rg} -t {transformName} -ams job delete -n {jobName} -a {amsname} -g {rg} -t {transformName} -ams job delete -n {jobName} -a {amsname} -g {rg} -t {transformName} -ams job delete -n {jobName} -a {amsname} -g {rg} -t {transformName} -ams job delete -n {jobName} -a {amsname} -g {rg} -t {transformName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams live-event create -a {amsname} -n {liveEventName} -g {rg} --auto-start --transcription-lang {liveTranscriptionLanguage} --streaming-protocol {streamingProtocol} --encoding-type {encodingType} --key-frame-interval {keyFrameInterval} --tags {tags} --stream-options Default LowLatency --preview-locator {previewLocator} --ips 1.2.3.4 5.6.7.8 192.168.0.0/28 --preview-ips 192.168.0.0/28 0.0.0.0 --access-token {accessToken} --description {description} --client-access-policy "{clientAccessPolicy}" --cross-domain-policy "{crossDomainPolicy}" --use-static-hostname --hostname-prefix {customHostnamePrefix} --stretch-mode {stretchMode} -ams live-event stop -a {amsname} -n {liveEventName} -g {rg} -ams live-event delete -a {amsname} -n {liveEventName} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams live-event create -a {amsname} -n {liveEventName} -g {rg} --streaming-protocol {streamingProtocol} --encoding-type {encodingType} --ips AllowAll --tags key=value -ams live-event list -a {amsname} -g {rg} -ams live-event create -a {amsname} -n {liveEventName2} -g {rg} --streaming-protocol {streamingProtocol} --encoding-type {encodingType} --ips AllowAll --tags key=value -ams live-event list -a {amsname} -g {rg} -ams live-event delete -a {amsname} -g {rg} -n {liveEventName2} -ams live-event list -a {amsname} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams live-event create -a {amsname} -n {liveEventName} -g {rg} --streaming-protocol {streamingProtocol} --encoding-type {encodingType} --ips AllowAll --tags key=value -ams live-event list -a {amsname} -g {rg} -ams live-event create -a {amsname} -n {liveEventName2} -g {rg} --streaming-protocol {streamingProtocol} --encoding-type {encodingType} --ips AllowAll --tags key=value -ams live-event list -a {amsname} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams live-event create -a {amsname} -n {liveEventName} -g {rg} --streaming-protocol {streamingProtocol} --encoding-type {encodingType} --ips AllowAll --auto-start -ams live-event reset -a {amsname} -n {liveEventName} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams live-event create -a {amsname} -n {liveEventName} -g {rg} --streaming-protocol {streamingProtocol} --encoding-type {encodingType} --tags {tags} --stream-options Default LowLatency --preview-locator {previewLocator} --ips 1.2.3.4 5.6.7.8 9.10.11.12 --preview-ips 1.1.1.1 0.0.0.0 --access-token {accessToken} --description {description} --client-access-policy "{clientAccessPolicy}" --cross-domain-policy "{crossDomainPolicy}" -ams live-event show -a {amsname} -n {liveEventName} -g {rg} -ams live-event show -a {amsname} -n {nonexits_live_event_name} -g {rg} -ams live-event delete -a {amsname} -n {liveEventName} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams live-event create -a {amsname} -n {liveEventName} -g {rg} --streaming-protocol {streamingProtocol} --encoding-type {encodingType} --access-token {accessToken} --tags key=value --ips AllowAll -ams live-event standby -a {amsname} --name {liveEventName} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams live-event create -a {amsname} -n {liveEventName} -g {rg} --streaming-protocol {streamingProtocol} --encoding-type {encodingType} --tags key=value --ips AllowAll -ams live-event start -a {amsname} --name {liveEventName} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams live-event create -a {amsname} -n {liveEventName} -g {rg} --streaming-protocol {streamingProtocol} --encoding-type {encodingType} --tags key=value --ips AllowAll --auto-start -ams live-event stop -a {amsname} -n {liveEventName} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams live-event create -a {amsname} -n {liveEventName} -g {rg} --streaming-protocol {streamingProtocol} --encoding-type {encodingType} --tags key=value --ips AllowAll --auto-start -ams asset create -a {amsname} -n {assetName} -g {rg} -ams live-output create -a {amsname} -n {liveOutputName1} -g {rg} --asset-name {assetName} --live-event-name {liveEventName} --archive-window-length {archiveWindowLength} --manifest-name {manifestName1} -ams live-output create -a {amsname} -n {liveOutputName2} -g {rg} --asset-name {assetName} --live-event-name {liveEventName} --archive-window-length {archiveWindowLength} --manifest-name {manifestName2} -ams live-output list -a {amsname} -g {rg} --live-event-name {liveEventName} -ams live-event stop -a {amsname} -n {liveEventName} -g {rg} --remove-outputs-on-stop -ams live-output list -a {amsname} -g {rg} --live-event-name {liveEventName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams live-event create -a {amsname} -n {liveEventName} -g {rg} --ips AllowAll --streaming-protocol {streamingProtocol} -ams live-event update -a {amsname} -n {liveEventName} -g {rg} --ips 1.2.3.4 5.6.7.8 9.10.11.12 --preview-ips 1.1.1.1 0.0.0.0 --key-frame-interval-duration {keyFrameIntervalDuration} --description {description} --client-access-policy "{clientAccessPolicy}" --cross-domain-policy "{crossDomainPolicy}" --tags {tags} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams live-event create -a {amsname} -n {liveEventName} -g {rg} --ips AllowAll --streaming-protocol {streaming_protocol} -ams asset create -a {amsname} -n {assetName} -g {rg} -ams live-output create -a {amsname} -n {liveOutputName} -g {rg} --asset-name {assetName} --live-event-name {liveEventName} --archive-window-length {archiveWindowLength} --manifest-name {manifestName} --description {description} --fragments-per-ts-segment {fragments} --output-snap-time {outputSnapTime} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams live-event create -a {amsname} -n {liveEventName} -g {rg} --ips AllowAll --streaming-protocol {streaming_protocol} -ams asset create -a {amsname} -n {assetName} -g {rg} -ams live-output create -a {amsname} -n {liveOutputName1} -g {rg} --asset-name {assetName} --live-event-name {liveEventName} --archive-window-length {archiveWindowLength} --manifest-name {manifestName1} -ams live-output create -a {amsname} -n {liveOutputName2} -g {rg} --asset-name {assetName} --live-event-name {liveEventName} --archive-window-length {archiveWindowLength} --manifest-name {manifestName2} -ams live-output list -a {amsname} -g {rg} --live-event-name {liveEventName} -ams live-output delete -a {amsname} -g {rg} -n {liveOutputName2} --live-event-name {liveEventName} -ams live-output list -a {amsname} -g {rg} --live-event-name {liveEventName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams live-event create -a {amsname} -n {liveEventName} -g {rg} --ips AllowAll --streaming-protocol {streaming_protocol} -ams asset create -a {amsname} -n {assetName} -g {rg} -ams live-output create -a {amsname} -n {liveOutputName} -g {rg} --asset-name {assetName} --live-event-name {liveEventName} --archive-window-length {archiveWindowLength} --manifest-name {manifestName} -ams live-output list -a {amsname} -g {rg} --live-event-name {liveEventName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams live-event create -a {amsname} -n {liveEventName} -g {rg} --ips AllowAll --streaming-protocol {streamingProtocol} -ams asset create -a {amsname} -n {assetName} -g {rg} -ams live-output create -a {amsname} -n {liveOutputName} -g {rg} --asset-name {assetName} --live-event-name {liveEventName} --archive-window-length {archiveWindowLength} --manifest-name {manifestName} -ams live-output show -a {amsname} -n {liveOutputName} -g {rg} --live-event-name {liveEventName} -ams live-output show -a {amsname} -n {liveOutputName} -g {rg} --live-event-name {nonexits_live_output_name} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams account sp create -a {amsname} -n {spName} -g {rg} -p {spPassword} --role {role} -ams account sp reset-credentials -a {amsname} -g {rg} -n {appId} -p {spNewPassword} -ad app delete --id {appId} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-endpoint create -g {rg} -a {amsname} -n {streamingEndpointName} --cdn-provider {cdnProvider} --cdn-profile {cdnProfile} --description "{description}" --max-cache-age {maxCacheAge} --scale-units {scaleUnits} --tags "{tags}" --client-access-policy @"{clientAccessPolicy}" --cross-domain-policy @"{crossDomainPolicy}" -ams streaming-endpoint delete -g {rg} -a {amsname} -n {streamingEndpointName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-endpoint create -g {rg} -a {amsname} -n {streamingEndpointName} --ips {ips} --description "{description}" --max-cache-age {maxCacheAge} --scale-units {scaleUnits} --tags "{tags}" --client-access-policy @"{clientAccessPolicy}" --cross-domain-policy @"{crossDomainPolicy}" -ams streaming-endpoint akamai add -g {rg} -a {amsname} -n {streamingEndpointName} --identifier {identifier} --expiration {expiration} --base64-key {base64Key} -ams streaming-endpoint akamai remove -g {rg} -a {amsname} -n {streamingEndpointName} --identifier {identifier} -ams streaming-endpoint delete -g {rg} -a {amsname} -n {streamingEndpointName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-endpoint create -g {rg} -a {amsname} -n {streamingEndpointName} --scale-units {scaleUnits} -ams streaming-endpoint akamai add -g {rg} -a {amsname} -n {streamingEndpointName} --identifier {identifier} --expiration {expiration} --base64-key {base64Key} -ams streaming-endpoint akamai remove -g {rg} -a {amsname} -n {streamingEndpointName} --identifier {identifier} -ams streaming-endpoint delete -g {rg} -a {amsname} -n {streamingEndpointName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-endpoint create -g {rg} -a {amsname} -n {streamingEndpointName1} --cdn-provider {cdnProvider} --cdn-profile {cdnProfile} --description "{description}" --max-cache-age {maxCacheAge} --scale-units {scaleUnits} --tags "{tags}" --client-access-policy @"{clientAccessPolicy}" --cross-domain-policy @"{crossDomainPolicy}" -ams streaming-endpoint list -g {rg} -a {amsname} -ams streaming-endpoint delete -g {rg} -a {amsname} -n {streamingEndpointName1} -ams streaming-endpoint list -g {rg} -a {amsname} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-endpoint create -g {rg} -a {amsname} -n {streamingEndpointName} --scale-units {scaleUnits} -ams streaming-endpoint list -g {rg} -a {amsname} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-endpoint create -g {rg} -a {amsname} -n {streamingEndpointName} --cdn-provider {cdnProvider} --cdn-profile {cdnProfile} --description "{description}" --max-cache-age {maxCacheAge} --scale-units {scaleUnits} --tags "{tags}" --client-access-policy @"{clientAccessPolicy}" --cross-domain-policy @"{crossDomainPolicy}" -ams streaming-endpoint scale -g {rg} -a {amsname} -n {streamingEndpointName} --scale-unit {scaleUnits2} -ams streaming-endpoint show -g {rg} -a {amsname} -n {streamingEndpointName} -ams streaming-endpoint delete -g {rg} -a {amsname} -n {streamingEndpointName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-endpoint create -g {rg} -a {amsname} -n {streamingEndpointName} --cdn-provider {cdnProvider} --cdn-profile {cdnProfile} --description "{description}" --max-cache-age {maxCacheAge} --scale-units {scaleUnits} --tags "{tags}" --client-access-policy @"{clientAccessPolicy}" --cross-domain-policy @"{crossDomainPolicy}" -ams streaming-endpoint show -g {rg} -a {amsname} -n {streamingEndpointName} -ams streaming-endpoint show -g {rg} -a {amsname} -n {nonexits_streaming_endpoint_name} -ams streaming-endpoint delete -g {rg} -a {amsname} -n {streamingEndpointName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-endpoint create -g {rg} -a {amsname} -n {streamingEndpointName} --scale-units {scaleUnits} -ams streaming-endpoint start -g {rg} -a {amsname} -n {streamingEndpointName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-endpoint create -g {rg} -a {amsname} -n {streamingEndpointName} --scale-units {scaleUnits} -ams streaming-endpoint start -g {rg} -a {amsname} -n {streamingEndpointName} --no-wait -ams streaming-endpoint show -g {rg} -a {amsname} -n {streamingEndpointName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-endpoint create -g {rg} -a {amsname} -n {streamingEndpointName} --scale-units {scaleUnits} --auto-start -ams streaming-endpoint stop -g {rg} -a {amsname} -n {streamingEndpointName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-endpoint create -g {rg} -a {amsname} -n {streamingEndpointName} --scale-units {scaleUnits} --auto-start -ams streaming-endpoint stop -g {rg} -a {amsname} -n {streamingEndpointName} --no-wait -ams streaming-endpoint show -g {rg} -a {amsname} -n {streamingEndpointName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-endpoint create -g {rg} -a {amsname} -n {streamingEndpointName} --cdn-provider {cdnProvider} --cdn-profile {cdnProfile} --description "{description}" --max-cache-age {maxCacheAge} --scale-units {scaleUnits} --tags "{tags}" --client-access-policy @"{clientAccessPolicy}" --cross-domain-policy @"{crossDomainPolicy}" -ams streaming-endpoint update -g {rg} -a {amsname} -n {streamingEndpointName} --add access_control.ip.allow {ip} -ams streaming-endpoint update -g {rg} -a {amsname} -n {streamingEndpointName} --cdn-provider {cdnProvider} --cdn-profile {cdnProfile} --description "{description}" --max-cache-age {maxCacheAge} --tags {tags} --client-access-policy @"{clientAccessPolicy}" --cross-domain-policy @"{crossDomainPolicy}" -ams streaming-endpoint update -g {rg} -a {amsname} -n {streamingEndpointName} --ips {ips} --disable-cdn -ams streaming-endpoint show -g {rg} -a {amsname} -n {streamingEndpointName} -ams streaming-endpoint delete -g {rg} -a {amsname} -n {streamingEndpointName} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams asset create -a {amsname} -n {assetName} -g {rg} -ams streaming-policy create -a {amsname} -n {streamingPolicyName} -g {rg} --no-encryption-protocols Download -ams streaming-locator create -n {streamingLocatorName} -a {amsname} -g {rg} --streaming-policy-name {streamingPolicyName} --asset-name {assetName} --start-time {startTime} --end-time {endTime} --streaming-locator-id {streamingLocatorId} --alternative-media-id {alternativeMediaId} -ams streaming-locator show -a {amsname} -n {streamingLocatorName} -g {rg} -ams streaming-locator show -a {amsname} -n {nonexits_streaming_locator_name} -g {rg} -ams streaming-locator list -a {amsname} -g {rg} -ams streaming-locator get-paths -a {amsname} -n {streamingLocatorName} -g {rg} -ams streaming-locator delete -n {streamingLocatorName} -a {amsname} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams asset create -a {amsname} -n {assetName} -g {rg} -ams content-key-policy create -a {amsname} -n {contentKeyPolicyName} -g {rg} --clear-key-configuration --open-restriction --policy-option-name testOption -ams streaming-locator create -n {streamingLocatorName} -a {amsname} -g {rg} --content-key-policy-name {contentKeyPolicyName} --streaming-policy-name {streamingPolicyName} --asset-name {assetName} -ams streaming-locator list-content-keys -a {amsname} -n {streamingLocatorName} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams asset create -a {amsname} -n {assetName} -g {rg} -ams streaming-policy create -a {amsname} -n {streamingPolicyName} -g {rg} --cbcs-default-key-label {CBCSDefaultKeyLabel} --cenc-default-key-label {CENCDefaultKeyLabel} --cbcs-protocols {protocol} --cenc-protocols {protocol} --cbcs-fair-play-template {urlTemplate} --cenc-play-ready-template {urlTemplate} --cenc-widevine-template {urlTemplate} -ams streaming-locator create -n {streamingLocatorName} -a {amsname} -g {rg} --streaming-policy-name {streamingPolicyName} --asset-name {assetName} --start-time {startTime} --end-time {endTime} --streaming-locator-id {streamingLocatorId} --alternative-media-id {alternativeMediaId} --content-keys "{contentKeys}" -ams streaming-locator show -a {amsname} -n {streamingLocatorName} -g {rg} -ams streaming-locator list -a {amsname} -g {rg} -ams streaming-locator get-paths -a {amsname} -n {streamingLocatorName} -g {rg} -ams streaming-locator delete -n {streamingLocatorName} -a {amsname} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams asset create -a {amsname} -n {assetName} -g {rg} -ams asset-filter create -a {amsname} --asset-name {assetName} -g {rg} -n {filter_name} --first-quality {bitrate} -ams streaming-policy create -a {amsname} -n {streamingPolicyName} -g {rg} --no-encryption-protocols Download -ams streaming-locator create -n {streamingLocatorName} -a {amsname} -g {rg} --streaming-policy-name {streamingPolicyName} --asset-name {assetName} --start-time {startTime} --end-time {endTime} --streaming-locator-id {streamingLocatorId} --alternative-media-id {alternativeMediaId} --filters {filters} -ams streaming-locator show -a {amsname} -n {streamingLocatorName} -g {rg} -ams streaming-locator list -a {amsname} -g {rg} -ams streaming-locator get-paths -a {amsname} -n {streamingLocatorName} -g {rg} -ams streaming-locator delete -n {streamingLocatorName} -a {amsname} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-policy create -a {amsname} -n {streamingPolicyName} -g {rg} --no-encryption-protocols {protocols} -ams streaming-policy show -a {amsname} -n {streamingPolicyName} -g {rg} -ams streaming-policy list -a {amsname} -g {rg} -ams streaming-policy delete -n {streamingPolicyName} -a {amsname} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-policy create -a {amsname} -n {streamingPolicyName} -g {rg} --cbcs-protocols {protocols} --cbcs-fair-play-template {urlTemplate} --cbcs-default-key-label {label} --cbcs-fair-play-allow-persistent-license -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-policy create -a {amsname} -n {streamingPolicyName} -g {rg} --cbcs-protocols {protocols} --cbcs-default-key-label {label} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams content-key-policy create -a {amsname} -n {policyNameFromKeyToTrackMappings1} -g {rg} --description {description} --open-restriction --play-ready-template "{playReadyPath}" --policy-option-name {policyOptionName1} -ams content-key-policy create -a {amsname} -n {policyNameFromKeyToTrackMappings2} -g {rg} --description {description} --open-restriction --clear-key-configuration --policy-option-name {policyOptionName2} -ams streaming-policy create -a {amsname} -n {streamingPolicyName} -g {rg} --cenc-protocols {protocols} --cenc-clear-tracks "{clearTracks}" --cenc-key-to-track-mappings "{keyToTrackMappings}" --cenc-default-key-label {label} --cenc-default-key-policy-name {policyNameFromKeyToTrackMappings1} --cenc-play-ready-template {playReadyUrlTemplate} --cenc-play-ready-attributes {playReadyAttributes} --cenc-widevine-template {widevineUrlTemplate} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams content-key-policy create -a {amsname} -n {policyNameFromKeyToTrackMappings1} -g {rg} --description {description} --open-restriction --play-ready-template "{playReadyPath}" --policy-option-name {policyOptionName1} -ams content-key-policy create -a {amsname} -n {policyNameFromKeyToTrackMappings2} -g {rg} --description {description} --open-restriction --clear-key-configuration --policy-option-name {policyOptionName2} -ams streaming-policy create -a {amsname} -n {streamingPolicyName} -g {rg} --cenc-protocols {protocols} --cenc-clear-tracks "{clearTracks}" --cenc-key-to-track-mappings "{keyToTrackMappings}" --cenc-default-key-label {label} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams content-key-policy create -a {amsname} -n {policyNameFromKeyToTrackMappings1} -g {rg} --description {description} --open-restriction --play-ready-template "{playReadyPath}" --policy-option-name {policyOptionName1} -ams content-key-policy create -a {amsname} -n {policyNameFromKeyToTrackMappings2} -g {rg} --description {description} --open-restriction --clear-key-configuration --policy-option-name {policyOptionName2} -ams streaming-policy create -a {amsname} -n {streamingPolicyName} -g {rg} --cenc-protocols {protocols} --cenc-clear-tracks "{clearTracks}" --cenc-key-to-track-mappings "{keyToTrackMappings}" --cenc-default-key-label {label} --cenc-disable-widevine -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams streaming-policy create -a {amsname} -n {streamingPolicyName} -g {rg} --envelope-protocols {protocols} --envelope-template {urlTemplate} --envelope-default-key-label {label} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams transform create -a {amsname} -n {transformName} -g {rg} --preset {presetName} -ams transform show -a {amsname} -n {transformName} -g {rg} -ams transform show -a {amsname} -n {nonexits_transform_name} -g {rg} -ams transform update --description mydesc -a {amsname} -n {transformName} -g {rg} -ams transform output add --preset "{presetPath}" -a {amsname} -n {transformName} -g {rg} -ams transform output remove --output-index 0 -a {amsname} -n {transformName} -g {rg} -ams transform list -a {amsname} -g {rg} -ams transform delete -n {transformName} -a {amsname} -g {rg} -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams transform create -a {amsname} -n {transformName} -g {rg} --preset "{presetPath}" -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams transform create -a {amsname} -n {transformName} -g {rg} --preset "{invalidPresetPath}" -ams account create -n {amsname} -g {rg} --storage-account {storageAccount} -l {location} -ams transform create -a {amsname} -n {transformName} -g {rg} --preset {presetName} -ams transform output add -a {amsname} -n {transformName} -g {rg} --preset "{presetPath}" --on-error {onError} --relative-priority {relativePriority} -ams transform output add -a {amsname} -n {transformName} -g {rg} --preset {presetName} --audio-language {audioLanguage} --audio-analysis-mode {audioAnalysisMode} -ams transform output add -a {amsname} -n {transformName} -g {rg} --preset {presetName2} --audio-language {audioLanguage2} --insights-to-extract {insightsToExtract} --video-analysis-mode {videoAnalysisMode} -ams transform output add -a {amsname} -n {transformName} -g {rg} --preset {presetName3} --resolution {resolution} -apim check-name -n {service_name} -o json -apim create --name {service_name} -g {rg} -l {rg_loc} --sku-name {sku_name} --publisher-email {publisher_email} --publisher-name {publisher_name} --enable-client-certificate {enable_cert} --enable-managed-identity {enable_managed_identity} -apim wait -g {rg} -n {service_name} --created -apim check-name -n {service_name} -apim update -n {service_name} -g {rg} --publisher-name {publisher_name} --set publisherEmail={publisher_email} -apim show -g {rg} -n {service_name} -storage account keys list -n clitest000002 -g cli_test_apim-000001 --query "[0].value" -o tsv -storage container create -n backups --account-name clitest000002 --account-key veryFakedStorageAccountKey== -apim backup -g {rg} -n {service_name} --backup-name {backup_name} --storage-account-name {storage_account_name} --storage-account-container {storage_account_container} --storage-account-key {storage_account_key} -apim api versionset list -g "{rg}" -n "{service_name}" -apim api versionset create -g "{rg}" -n "{service_name}" --display-name "{versionset_name}" --version-set-id "{vs_id}" --versioning-scheme "{version_schema}" --description "{vs_description}" --version-query-name "{version_query_name}" -apim api versionset show -g "{rg}" -n "{service_name}" --version-set-id "{vs_id}" -apim api versionset update -g "{rg}" -n "{service_name}" --version-set-id "{vs_id}" --display-name "{new_vs_name}" -apim api create -g "{rg}" --service-name "{service_name}" --display-name "{display_name}" --path "{path}" --api-id "{api_id}" --protocols "{protocol}" --service-url "{service_url}" --subscription-key-header-name "{subscription_key_header_name}" --subscription-key-query-param-name "{subscription_key_query_param_name}" -apim api wait -g "{rg}" -n "{service_name}" --api-id "{api_id}" --created -apim api import -g "{rg}" --service-name "{service_name}" --path "{path2}" --api-id "{api_id2}" --specification-url "{specification_url}" --specification-format "{specification_format}" --api-version-set-id {vs_id} --api-version {api_version} -apim api show -g {rg} --service-name {service_name} --api-id {api_id} -apim api update -g "{rg}" --service-name "{service_name}" --api-id "{api_id}" --description "{description}" --protocols {protocol} -apim api list -g "{rg}" -n "{service_name}" -apim product list -g "{rg}" -n "{service_name}" -apim product create -g "{rg}" -n "{service_name}" --product-id "{product_id1}" --product-name "{product_name1}" --description "{product_description}" --legal-terms "{legal_terms}" --subscription-required true --approval-required true --subscriptions-limit {subscription_limit} --state {state} -apim product list -g {rg} -n {service_name} -apim product show -g {rg} -n {service_name} --product-id {product_id1} -apim product update -g {rg} -n {service_name} --product-id {product_id1} --product-name {product_name2} --description "{new_product_description}" --legal-terms "{new_legal_terms}" --state {new_state} --subscriptions-limit {new_subscription_limit} -apim api operation list -g "{rg}" -n "{service_name}" --api-id "{api_id}" -apim api operation create -g "{rg}" -n "{service_name}" --api-id "{api_id}" --operation-id "{operation_id}" --url-template "{url_template}" --method "{method}" --display-name {operation_name} --template-parameters {template_parameter1} --template-parameters {template_parameter2} --description "{operation_description}" -apim api operation list -g "{rg}" -n "{service_name}" --api-id "{api_id}" -apim api operation show -g "{rg}" -n "{service_name}" --api-id "{api_id}" --operation-id "{operation_id}" -apim api operation update -g "{rg}" -n "{service_name}" --api-id "{api_id}" --operation-id "{operation_id}" --description "{new_operation_description}" --method "{new_method}" --display-name {new_operation_name} -apim api operation delete -g "{rg}" -n "{service_name}" --api-id "{api_id}" --operation-id "{operation_id}" -apim api operation list -g "{rg}" -n "{service_name}" --api-id "{api_id}" -apim api revision list -g "{rg}" -n "{service_name}" --api-id "{api_id}" -apim api revision create -g "{rg}" -n "{service_name}" --api-id "{api_id}" --api-revision "{api_revision}" --api-revision-description "{api_revision_description}" -apim api release list -g "{rg}" -n "{service_name}" --api-id "{api_id}" -apim api release create -g "{rg}" -n "{service_name}" --api-id "{api_id}" --release-id "{release_id}" --api-revision "{api_revision}" --notes "{release_notes}" -apim api release show -g "{rg}" -n "{service_name}" --api-id "{api_id}" --release-id "{release_id}" -apim api release update -g "{rg}" -n "{service_name}" --api-id "{api_id}" --release-id "{release_id}" --notes "{new_release_notes}" -apim api release delete -g "{rg}" -n "{service_name}" --api-id "{api_id}" --release-id "{release_id}" -apim api release list -g "{rg}" -n "{service_name}" --api-id "{api_id}" -apim product api list -g {rg} -n {service_name} --product-id {product_id1} -apim product api add -g {rg} -n {service_name} --product-id {product_id1} --api-id {api_id} -apim product api list -g {rg} -n {service_name} --product-id {product_id1} -apim product api check -g {rg} -n {service_name} --product-id {product_id1} --api-id {api_id} -apim product api delete -g {rg} -n {service_name} --product-id {product_id1} --api-id {api_id} -apim product api list -g {rg} -n {service_name} --product-id {product_id1} -apim product delete -g {rg} -n {service_name} --product-id {product_id1} --delete-subscriptions true -y -apim product list -g {rg} -n {service_name} -apim api delete -g {rg} --service-name {service_name} --api-id {api_id} --delete-revisions true -y -apim api list -g {rg} -n {service_name} -apim api delete -g {rg} --service-name {service_name} --api-id {api_id2} --delete-revisions true -y -apim api list -g {rg} -n {service_name} -apim list -apim nv create -g "{rg}" --service-name "{service_name}" --display-name "{display_name}" --value "{value}" --named-value-id "{nv_id}" --secret "{secret}" --tags "{tag}" -apim nv show-secret -g "{rg}" --service-name "{service_name}" --named-value-id "{nv_id}" -apim nv show -g {rg} --service-name {service_name} --named-value-id {nv_id} -apim nv update -g "{rg}" --service-name "{service_name}" --named-value-id "{nv_id}" --value "{updatedtestvalue}" -apim nv show-secret -g "{rg}" --service-name "{service_name}" --named-value-id "{nv_id}" -apim nv list -g {rg} --service-name {service_name} -apim nv delete -g {rg} --service-name {service_name} --named-value-id {nv_id} -y -apim nv list -g {rg} --service-name {service_name} -apim api versionset delete -g "{rg}" -n "{service_name}" --version-set-id "{vs_id}" -apim api versionset list -g "{rg}" -n "{service_name}" -apim delete -g {rg} -n {service_name} -y -apim list -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} --disable-local-auth {disable_local_auth} -appconfig kv set --key {key} -n {config_store_name} -y -appconfig update -n {config_store_name} -g {rg} --disable-local-auth {disable_local_auth} -appconfig kv set --key {key} -n {config_store_name} -y -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} --tags {tags} --assign-identity {identity} -appconfig list -g {rg} -appconfig show -n {config_store_name} -g {rg} -appconfig update -n {config_store_name} -g {rg} --tags {updated_tag} --sku {update_sku} -keyvault create -n {keyvault_name} -g {rg} -l {rg_loc} --enable-purge-protection --enable-soft-delete -keyvault key create --vault-name {keyvault_name} -n {encryption_key} -keyvault set-policy -n {keyvault_name} --key-permissions get wrapKey unwrapKey --object-id {identity_id} -appconfig update -n {config_store_name} -g {rg} --encryption-key-name {encryption_key} --encryption-key-vault {keyvault_uri} -appconfig update -n {config_store_name} -g {rg} --tags {updated_tag} -appconfig delete -n {config_store_name} -g {rg} -y -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} --enable-public-network {enable_public_network} -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -appconfig update -n {config_store_name} -g {rg} --enable-public-network -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -appconfig credential list -n {config_store_name} -g {rg} -appconfig credential regenerate -n {config_store_name} -g {rg} --id {id} -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -identity create -n {identity_name} -g {rg} -appconfig identity assign -n {config_store_name} -g {rg} -appconfig identity assign -n {config_store_name} -g {rg} --identities {identity_id} -appconfig identity remove -n {config_store_name} -g {rg} --identities {identity_id} -appconfig identity show -n {config_store_name} -g {rg} -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -appconfig kv set -n {config_store_name} --key {key} --label {label} -y -appconfig kv set -n {config_store_name} --key {key} --value {value} --content-type {content_type} --label {label} -y -appconfig kv set -n {config_store_name} --key {key} --value {value} --content-type {content_type} --label {label} -y -appconfig kv show -n {config_store_name} --key {key} --label {label} -appconfig kv list -n {config_store_name} -appconfig revision list -n {config_store_name} --key {key} --label * -appconfig kv delete -n {config_store_name} --key {key} --label {label} -y -appconfig credential list -n {config_store_name} -g {rg} -appconfig kv set --connection-string {connection_string} --key {key} --value {value} --content-type {content_type} --label {label} -y -appconfig kv restore -n {config_store_name} --key {key} --label {label} --datetime {timestamp} -y -appconfig kv list -n {config_store_name} --key {key} --label {label} -appconfig kv set-keyvault --connection-string {connection_string} --key {key} --secret-identifier {secret_identifier} -y -appconfig kv set-keyvault --connection-string {connection_string} --key {key} --label {label} --secret-identifier {secret_identifier} -y -appconfig kv delete --connection-string {connection_string} --key {key} --label {label} -y -appconfig kv set --connection-string {connection_string} --key {key} -y -appconfig kv list --connection-string {connection_string} --label "{null_label}" -appconfig kv list --connection-string {connection_string} --label "{multi_labels}" -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -appconfig kv import -n {config_store_name} -s {import_source} --path "{imported_file_path}" --format {imported_format} --separator {separator} -y -appconfig kv export -n {config_store_name} -d {import_source} --path "{exported_file_path}" --format {imported_format} --separator {separator} -y -appconfig kv set-keyvault -n {config_store_name} --key {key} --secret-identifier {secret_identifier} -y -appconfig kv export -n {config_store_name} -d {import_source} --path "{exported_file_path}" --format {imported_format} --separator {separator} --skip-keyvault -y -appconfig kv import -n {config_store_name} -s {import_source} --path "{imported_file_path}" --format {imported_format} --label {label} -y -appconfig kv export -n {config_store_name} -d {import_source} --path "{exported_file_path}" --format {imported_format} --label {label} -y -appconfig kv export -n {config_store_name} -d {import_source} --path "{exported_file_path}" --format {imported_format} --label {label} --skip-features -y -appconfig kv import -n {config_store_name} -s {import_source} --path "{imported_file_path}" --format {imported_format} --label {label} --skip-features -y -appconfig kv export -n {config_store_name} -d {import_source} --path "{exported_file_path}" --format {imported_format} --label {label} -y -appconfig kv import -n {config_store_name} -s {import_source} --path "{imported_file_path}" --format {imported_format} --label {label} --prefix {prefix} -y -appconfig kv export -n {config_store_name} -d {import_source} --path "{exported_file_path}" --format {imported_format} --label {label} -y -appconfig kv export -n {config_store_name} -d {import_source} --path "{exported_file_path}" --format {imported_format} --label {label} --prefix {prefix} -y -appconfig kv export -n {config_store_name} -d {import_source} --path "{exported_file_path}" --format {imported_format} --label {label} --key {key} -y -appconfig kv import -n {config_store_name} -s {import_source} --path "{imported_file_path}" --format {imported_format} --label {label} --separator {separator} -y -appconfig kv export -n {config_store_name} -d {import_source} --path "{exported_file_path}" --format {imported_format} --label {label} --separator {separator} -y -appconfig kv import -n {config_store_name} -s {import_source} --path "{imported_file_path}" --format {imported_format} --label {label} --separator {separator} -y -appconfig kv export -n {config_store_name} -d {import_source} --path "{exported_file_path}" --format {imported_format} --label {label} --separator {separator} -y -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -appconfig kv import -n {config_store_name} -s {import_source} --path "{imported_file_path}" --format {imported_format} --profile {profile} -y -appconfig kv export -n {config_store_name} -d {import_source} --label * --key * --path "{exported_file_path}" --format {imported_format} --profile {profile} -y -appconfig kv import -n {config_store_name} -s {import_source} --path "{imported_file_path}" --format {imported_format} --profile {profile} -y -appconfig kv export -n {config_store_name} -d {import_source} --label * --key * --path "{exported_file_path}" --format {imported_format} --profile {profile} --skip-features -y -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -appconfig kv import -n {config_store_name} -s {import_source} --path "{imported_file_path}" --format {imported_format} --label {label} -y -appconfig kv export -n {config_store_name} -d {import_source} --path "{exported_file_path}" --format {imported_format} --label {label} --naming-convention {naming_convention} -y -appconfig kv import -n {config_store_name} -s {import_source} --path "{imported_file_path}" --format {imported_format} --label {label} -y -appconfig kv import -n {config_store_name} -s {import_source} --path "{imported_file_path}" --format {imported_format} --label {label} -y -appconfig kv import -n {config_store_name} -s {import_source} --path "{imported_file_path}" --format {imported_format} --label {label} -y -appconfig kv export -n {config_store_name} -d {import_source} --path "{exported_file_path}" --format {imported_format} --label {label} --naming-convention {naming_convention} -y -appconfig kv import -n {config_store_name} -s {import_source} --path "{imported_file_path}" --format {imported_format} --label {label} -y -appconfig kv export -n {config_store_name} -d {import_source} --path "{exported_file_path}" --format {imported_format} --label {label} -y -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -appconfig credential list -n {config_store_name} -g {rg} -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -appconfig credential list -n {config_store_name} -g {rg} -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --label {label} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --label {label} -y -appconfig feature set --connection-string {src_connection_string} --feature {feature} --label {label} -y -appconfig feature set --connection-string {src_connection_string} --feature {feature} --label {label} -y -appconfig kv import --connection-string {dest_connection_string} -s {import_source} --src-connection-string {src_connection_string} --src-label {src_label} --label {label} -y -appconfig kv delete --connection-string {dest_connection_string} --key {key} --label {label} -y -appconfig kv import --connection-string {dest_connection_string} -s {import_source} --src-connection-string {src_connection_string} --src-label {src_label} -y -appconfig kv delete --connection-string {dest_connection_string} --key {key} --label {label} -y -appconfig kv import --connection-string {dest_connection_string} -s {import_source} --src-connection-string {src_connection_string} --src-label {src_label} --preserve-labels -y -appconfig kv delete --connection-string {dest_connection_string} --key {key} --label {label} -y -appconfig kv import --connection-string {dest_connection_string} -s {import_source} --src-connection-string {src_connection_string} --src-label {src_label} --label {label} --preserve-labels -y -appconfig kv export --connection-string {src_connection_string} -d {import_source} --dest-connection-string {dest_connection_string} --label {src_label} --dest-label {label} -y -appconfig kv delete --connection-string {dest_connection_string} --key {key} --label {label} -y -appconfig kv export --connection-string {src_connection_string} -d {import_source} --dest-connection-string {dest_connection_string} --label {src_label} -y -appconfig kv delete --connection-string {dest_connection_string} --key {key} --label {label} -y -appconfig kv export --connection-string {src_connection_string} -d {import_source} --dest-connection-string {dest_connection_string} --label {src_label} --preserve-labels -y -appconfig kv delete --connection-string {dest_connection_string} --key {key} --label {label} -y -appconfig kv export --connection-string {src_connection_string} -d {import_source} --dest-connection-string {dest_connection_string} --label {src_label} --dest-label {label} --preserve-labels -y -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -appconfig credential list -n {config_store_name} -g {rg} -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -appconfig credential list -n {config_store_name} -g {rg} -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} --content-type {content_type} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --value {value} -y -appconfig kv set --connection-string {src_connection_string} --key {key} --content-type {content_type} -y -appconfig feature set --connection-string {src_connection_string} --feature {feature} -y -appconfig kv set-keyvault --connection-string {src_connection_string} --key {key} --secret-identifier {secret_identifier} -y -appconfig kv import --connection-string {dest_connection_string} -s {import_source} --src-connection-string {src_connection_string} --content-type {content_type} -y -appconfig kv export --connection-string {src_connection_string} -d {export_dest} --path "{exported_file_path}" --format {export_format} --separator {separator} -y -appconfig kv export --connection-string {dest_connection_string} -d {export_dest} --path "{exported_file_path}" --format {export_format} --separator {separator} -y -appconfig kv delete --connection-string {dest_connection_string} --key {key} --label {label} -y -appconfig kv export --connection-string {src_connection_string} -d {import_source} --dest-connection-string {dest_connection_string} -y -appconfig kv export --connection-string {src_connection_string} -d {export_dest} --path "{exported_file_path}" --format {export_format} --separator {separator} -y -appconfig kv export --connection-string {dest_connection_string} -d {export_dest} --path "{exported_file_path}" --format {export_format} --separator {separator} -y -appconfig kv delete --connection-string {src_connection_string} --key {key} --label {label} -y -appconfig kv delete --connection-string {dest_connection_string} --key {key} --label {label} -y -appconfig kv import --connection-string {src_connection_string} -s {import_source} --path "{imported_file_path}" --format {imported_format} --separator {separator} --content-type {content_type} -y -appconfig kv export --connection-string {src_connection_string} -d {import_source} --path "{exported_file_path}" --format {imported_format} --separator {separator} -y -appconfig kv import --connection-string {src_connection_string} -s {import_source} --path "{imported_file_path}" --format {imported_format} --separator {separator} --content-type {content_type} -y -appconfig kv export --connection-string {src_connection_string} -d {import_source} --path "{exported_file_path}" --format {imported_format} --separator {separator} -y -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -appconfig feature set -n {config_store_name} --feature {feature} --label {label} -y -appconfig feature set -n {config_store_name} --feature {feature} --label {label} --description "{description}" -y -appconfig feature set -n {config_store_name} --feature {feature} --label {label} -y -appconfig credential list -n {config_store_name} -g {rg} -appconfig feature set --connection-string {connection_string} --feature {feature} --label {label} --description "{description}" -y -appconfig feature show -n {config_store_name} --feature {feature} --label {label} -appconfig feature show -n {config_store_name} --feature {feature} --label {label} --fields key label state locked -appconfig feature list -n {config_store_name} --label "{label}" -appconfig feature list -n {config_store_name} --label {label} --fields key name label state locked -appconfig feature list -n {config_store_name} -appconfig feature set -n {config_store_name} --feature {feature} -y -appconfig feature set -n {config_store_name} --feature {feature} -y -appconfig feature set -n {config_store_name} --feature {feature} -y -appconfig feature list -n {config_store_name} --feature {feature} --label {label} -appconfig feature list -n {config_store_name} --feature {feature} --label {label} -appconfig feature list -n {config_store_name} --feature {feature} --label "{label}" -appconfig feature list -n {config_store_name} --feature {feature} -appconfig feature list -n {config_store_name} --feature {feature} -appconfig feature list -n {config_store_name} --feature {feature} -appconfig feature list -n {config_store_name} --feature {feature} -appconfig feature delete --connection-string {connection_string} --feature {feature} --label {label} -y -appconfig feature lock -n {config_store_name} --feature {feature} -y -appconfig feature unlock -n {config_store_name} --feature {feature} -y -appconfig feature enable -n {config_store_name} --feature {feature} -y -appconfig feature disable -n {config_store_name} --feature {feature} -y -appconfig feature list -n {config_store_name} --feature {feature} --label {label} -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -appconfig feature set -n {config_store_name} --feature {feature} --key {key} --label {label} -y -appconfig feature enable -n {config_store_name} --key {key} --label {label} -y -appconfig feature set -n {config_store_name} --key {key} --label {label} -y -appconfig feature list -n {config_store_name} --key {key} --label {label} -appconfig feature set -n {config_store_name} --key {key} -appconfig feature delete -n {config_store_name} -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -appconfig feature set -n {config_store_name} --feature {feature} --label {label} -y -appconfig feature filter add -n {config_store_name} --feature {feature} --label {label} --filter-name {filter_name} --filter-parameters {filter_parameters} -y -appconfig feature filter add -n {config_store_name} --feature {feature} --label {label} --filter-name {filter_name} --filter-parameters {filter_parameters} -y -appconfig feature filter add -n {config_store_name} --feature {feature} --label {label} --filter-name {filter_name} --filter-parameters {filter_parameters} -y -appconfig feature filter show -n {config_store_name} --feature {feature} --label {label} --filter-name {filter_name} -appconfig feature filter show -n {config_store_name} --feature {feature} --label {label} --filter-name {filter_name} --index 2 -appconfig feature filter list -n {config_store_name} --feature {feature} --label {label} -appconfig feature show -n {config_store_name} --feature {feature} --label {label} -appconfig feature enable -n {config_store_name} --feature {feature} --label {label} -y -appconfig feature filter delete -n {config_store_name} --feature {feature} --label {label} --filter-name {filter_name} -y -appconfig feature filter delete -n {config_store_name} --feature {feature} --label {label} --filter-name {filter_name} --index 2 -y -appconfig feature filter delete -n {config_store_name} --feature {feature} --label {label} --all -y -appconfig feature filter delete -n {config_store_name} --feature {feature} --label {label} --all -y -appconfig feature filter list -n {config_store_name} --feature {feature} --label {label} -appconfig feature filter add -n {config_store_name} --feature {feature} --label {label} --filter-name {filter_name} --filter-parameters {filter_parameters} -y -appconfig feature filter add -n {config_store_name} --feature {feature} --label {label} --filter-name {filter_name} --filter-parameters {filter_parameters} -y -appconfig feature filter add -n {config_store_name} --feature {feature} --label {label} --filter-name {filter_name} --filter-parameters {filter_parameters} -y -appconfig feature filter add -n {config_store_name} --feature {feature} --label {label} --filter-name {filter_name} --filter-parameters {filter_parameters} -y -appconfig feature filter add -n {config_store_name} --feature {feature} --label {label} --filter-name {filter_name} --filter-parameters {filter_parameters} -y -appconfig create -n {config_store_name} -g {rg} -l {rg_loc} --sku {sku} -appconfig credential list -n {config_store_name} -g {rg} -appconfig kv set --connection-string {connection_string} --key {key} --value {value} -y -appconfig kv set --connection-string {connection_string} --key "{key}" --value {value} -y -appconfig kv set --connection-string {connection_string} --key {key} --value {value} -y -appconfig kv set-keyvault --connection-string {connection_string} --key {key} --secret-identifier {secret_identifier} -y -appconfig feature set --connection-string {connection_string} --feature {feature} -y -appconfig feature set --connection-string {connection_string} --feature "{feature}" -y -appconfig kv import -n {config_store_name} -s {import_source} --path "{imported_file_path}" --format {imported_format} -y -appconfig kv export -n {config_store_name} -d {import_source} --path "{exported_file_path}" --format {imported_format} -y -functionapp create -g {rg} -n {app_name} --consumption-plan-location {loc} -s {sa} -functionapp config access-restriction add -g {rg} -n {app_name} --rule-name developers --action Allow --ip-address 130.220.0.0/27 --priority 200 -functionapp create -g {rg} -n {app_name} --consumption-plan-location {loc} -s {sa} -functionapp config access-restriction add -g {rg} -n {app_name} --rule-name ipv4 --action Allow --ip-address 130.220.0.0 --priority 200 -functionapp config access-restriction add -g {rg} -n {app_name} --rule-name ipv6 --action Allow --ip-address 2004::1000 --priority 200 -functionapp create -g {rg} -n {app_name} --consumption-plan-location {loc} -s {sa} -functionapp config access-restriction add -g {rg} -n {app_name} --rule-name developers --action Allow --ip-address 130.220.0.0/27 --priority 200 --scm-site -appservice plan create -g {rg} -n {plan_name} -functionapp create -g {rg} -n {app_name} --plan {plan_name} -s {sa} -network vnet create -g {rg} -n {vnet_name} --address-prefixes 10.0.0.0/16 --subnet-name endpoint-subnet --subnet-prefixes 10.0.0.0/24 -functionapp config access-restriction add -g {rg} -n {app_name} --rule-name vnet-integration --action Allow --vnet-name {vnet_name} --subnet endpoint-subnet --priority 150 -functionapp create -g {rg} -n {app_name} --consumption-plan-location {loc} -s {sa} -functionapp config access-restriction add -g {rg} -n {app_name} --rule-name developers --action Allow --ip-address 130.220.0.0/27 --priority 200 -functionapp config access-restriction remove -g {rg} -n {app_name} --rule-name developers -functionapp create -g {rg} -n {app_name} --consumption-plan-location {loc} -s {sa} -functionapp config access-restriction add -g {rg} -n {app_name} --rule-name developers --action Allow --ip-address 130.220.0.0/27 --priority 200 --scm-site -functionapp config access-restriction remove -g {rg} -n {app_name} --rule-name developers --scm-site -functionapp create -g {rg} -n {app_name} --consumption-plan-location {loc} -s {sa} -functionapp config access-restriction set -g {rg} -n {app_name} --use-same-restrictions-for-scm-site -functionapp config access-restriction set -g {rg} -n {app_name} --use-same-restrictions-for-scm-site false -functionapp create -g {rg} -n {app_name} --consumption-plan-location {loc} -s {sa} -functionapp config access-restriction set -g {rg} -n {app_name} --use-same-restrictions-for-scm-site true -functionapp create -g {rg} -n {app_name} --consumption-plan-location {loc} -s {sa} -functionapp config access-restriction show -g {rg} -n {app_name} -acr create --admin-enabled -g clitest.rg000001 -n functionappacrtest000004 --sku Basic -appservice plan create -g clitest.rg000001 -n acrtestplanfunction000003 --sku S1 --is-linux -functionapp create -g clitest.rg000001 -n functionappacrtest000004 -s clitest000002 --plan acrtestplanfunction000003 --functions-version 3 --runtime node -acr credential show -n functionappacrtest000004 -g clitest.rg000001 -functionapp config container set -g clitest.rg000001 -n functionappacrtest000004 --docker-custom-image-name functionappacrtest000004.azurecr.io/image-name:latest --docker-registry-server-url https://functionappacrtest000004.azurecr.io -functionapp config container show -g clitest.rg000001 -n functionappacrtest000004 -functionapp config appsettings list -g clitest.rg000001 -n functionappacrtest000004 -functionapp config container delete -g clitest.rg000001 -n functionappacrtest000004 -functionapp config appsettings list -g clitest.rg000001 -n functionappacrtest000004 -functionapp delete -g clitest.rg000001 -n functionappacrtest000004 -acr create --admin-enabled -g clitest.rg000001 -n functionappacrtest000004 --sku Basic -acr credential show -n functionappacrtest000004 -g clitest.rg000001 -functionapp plan create -g clitest.rg000001 -n acrtestplanfunction000003 --sku S1 --is-linux -functionapp create -g clitest.rg000001 -n functionappacrtest000004 -s clitestacr000002 --plan acrtestplanfunction000003 --functions-version 3 --runtime node --deployment-container-image-name functionappacrtest000004.azurecr.io/image-name:latest --docker-registry-server-user functionappacrtest000004 --docker-registry-server-password gKw9/36p+CaHm9hAj6C3AIK06fm=WIKt -functionapp config container show -g clitest.rg000001 -n functionappacrtest000004 -functionapp config appsettings list -g clitest.rg000001 -n functionappacrtest000004 -functionapp config show -g clitest.rg000001 -n functionappacrtest000004 -functionapp config container delete -g clitest.rg000001 -n functionappacrtest000004 -functionapp config appsettings list -g clitest.rg000001 -n functionappacrtest000004 -acr create --admin-enabled -g clitest.rg000001 -n functionappacrtest000004 --sku Basic -appservice plan create -g clitest.rg000001 -n acrtestplanfunction000003 --sku S1 --is-linux -functionapp create -g clitest.rg000001 -n functionappacrtest000004 -s clitestacrdeploy000002 --plan acrtestplanfunction000003 --functions-version 3 --runtime node -acr credential show -g clitest.rg000001 -n functionappacrtest000004 -functionapp config container set -g clitest.rg000001 -n functionappacrtest000004 --docker-custom-image-name functionappacrtest000004.azurecr.io/image-name:latest --docker-registry-server-url https://functionappacrtest000004.azurecr.io -functionapp deployment container config -g clitest.rg000001 -n functionappacrtest000004 --enable-cd true -functionapp deployment container show-cd-url -g clitest.rg000001 -n functionappacrtest000004 -functionapp delete -g clitest.rg000001 -n functionappacrtest000004 -functionapp create -g clitest.rg000001 -n functionappwithreservedinstance000003 -c francecentral -s clitest000002 --os-type Windows -functionapp config set -g clitest.rg000001 -n functionappwithreservedinstance000003 --prewarmed-instance-count 4 -functionapp delete -g clitest.rg000001 -n functionappwithreservedinstance000003 -appservice plan create -g clitest.rg000001 -n func-e2e-plan000005 -appservice plan list -g clitest.rg000001 -storage account create --name functionappplanstorage -g clitest.rg000001 -l francecentral --sku Standard_LRS -storage account create --name functionappplanstorage2 -g clitest.rg000002 -l francecentral --sku Standard_LRS -functionapp create -g clitest.rg000001 -n func-e2e000003 -p func-e2e-plan000005 -s functionappplanstorage -functionapp create -g clitest.rg000002 -n func-e2e000004 -p /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Web/serverfarms/func-e2e-plan000005 -s /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Storage/storageAccounts/functionappplanstorage2 -functionapp delete -g clitest.rg000001 -n func-e2e000003 -functionapp plan create -g clitest.rg000001 -n funcapplinplan000003 --sku S1 --is-linux -functionapp create -g clitest.rg000001 -n functionapp-linux000004 --plan funcapplinplan000003 -s clitest000002 --runtime dotnet-isolated --functions-version 3 -functionapp list -g clitest.rg000001 -functionapp config appsettings list -g clitest.rg000001 -n functionapp-linux000004 -functionapp config show -g clitest.rg000001 -n functionapp-linux000004 -functionapp plan create -g clitest.rg000001 -n funcapplinplan000003 --sku S1 --is-linux -functionapp create -g clitest.rg000001 -n functionapp-linux000004 --plan funcapplinplan000003 -s clitest000002 --runtime java --functions-version 3 -functionapp list -g clitest.rg000001 -functionapp config show -g clitest.rg000001 -n functionapp-linux000004 -functionapp plan create -g clitest.rg000001 -n funcapplinplan000003 --sku S1 --is-linux -functionapp create -g clitest.rg000001 -n functionapp-linux000004 --plan funcapplinplan000003 -s clitest000002 --runtime java --runtime-version 11 --functions-version 3 -functionapp list -g clitest.rg000001 -functionapp config show -g clitest.rg000001 -n functionapp-linux000004 -functionapp plan create -g clitest.rg000001 -n funcapplinplan000003 --sku S1 --is-linux -functionapp create -g clitest.rg000001 -n functionapp-linux000004 --plan funcapplinplan000003 -s clitest000002 --runtime powershell --functions-version 4 -functionapp list -g clitest.rg000001 -functionapp config show -g clitest.rg000001 -n functionapp-linux000004 -functionapp plan create -g clitest.rg000001 -n funcapplinplan000003 --sku S1 --is-linux -functionapp create -g clitest.rg000001 -n functionapp-linux000004 --plan funcapplinplan000003 -s clitest000002 --runtime powershell --runtime-version 7.0 --functions-version 4 -functionapp list -g clitest.rg000001 -functionapp config show -g clitest.rg000001 -n functionapp-linux000004 -functionapp plan create -g clitest.rg000001 -n somerandomplan000004 --sku EP1 -functionapp plan create -g clitest.rg000001 -n secondplan000005 --sku EP1 -functionapp plan create -g clitest.rg000001 -n ab1planname000006 --sku S1 -functionapp create -g clitest.rg000001 -n functionappelastic000003 --plan secondplan000005 -s clitest000002 -functionapp update -g clitest.rg000001 -n functionappelastic000003 --plan somerandomplan000004 -functionapp update -g clitest.rg000001 -n functionappelastic000003 --plan ab1planname000006 -functionapp create -g azurecli-functionapp-c-e2e000001 -n functionappconsumption000003 -c francecentral -s clitest000002 -functionapp list -g azurecli-functionapp-c-e2e000001 -functionapp show -g azurecli-functionapp-c-e2e000001 -n functionappconsumption000003 -functionapp update -g azurecli-functionapp-c-e2e000001 -n functionappconsumption000003 --set clientCertMode=Optional -functionapp delete -g azurecli-functionapp-c-e2e000001 -n functionappconsumption000003 -functionapp create -g azurecli-functionapp-c-e2e-ragrs000001 -n functionappconsumption000003 -c francecentral -s clitest000002 -functionapp show -g azurecli-functionapp-c-e2e-ragrs000001 -n functionappconsumption000003 -functionapp create -g azurecli-functionapp-linux000001 -n functionapplinuxconsumption000003 -c ukwest -s clitest000002 --os-type Linux --functions-version 3 --runtime node -functionapp config appsettings list -g azurecli-functionapp-linux000001 -n functionapplinuxconsumption000003 -functionapp create -g azurecli-functionapp-linux000001 -n functionapplinuxconsumption000003 -c ukwest -s clitest000002 --os-type Linux --runtime dotnet-isolated --functions-version 3 -functionapp config appsettings list -g azurecli-functionapp-linux000001 -n functionapplinuxconsumption000003 -functionapp config show -g azurecli-functionapp-linux000001 -n functionapplinuxconsumption000003 -functionapp create -g azurecli-functionapp-linux000001 -n functionapplinuxconsumption000003 -c ukwest -s clitest000002 --os-type Linux --runtime java --functions-version 3 -functionapp config appsettings list -g azurecli-functionapp-linux000001 -n functionapplinuxconsumption000003 -functionapp create -g azurecli-functionapp-linux000001 -n functionapplinuxconsumption000003 -c ukwest -s clitest000002 --os-type Linux --runtime powershell --functions-version 4 -functionapp config appsettings list -g azurecli-functionapp-linux000001 -n functionapplinuxconsumption000003 -functionapp config show -g azurecli-functionapp-linux000001 -n functionapplinuxconsumption000003 -functionapp create -g clitest.rg000001 -n functionappwindowsruntime000003 -c francecentral -s clitest000002 --os-type Windows --functions-version 3 --runtime node -functionapp config appsettings list -g clitest.rg000001 -n functionappwindowsruntime000003 -functionapp create -g clitest.rg000001 -n functionappwindowsruntime000003 -c francecentral -s clitest000002 --functions-version 3 --os-type Windows --runtime custom -functionapp config appsettings list -g clitest.rg000001 -n functionappwindowsruntime000003 -functionapp create -g clitest.rg000001 -n functionappwindowsruntime000003 -c francecentral -s clitest000002 --os-type Windows --runtime dotnet-isolated --functions-version 3 -functionapp config appsettings list -g clitest.rg000001 -n functionappwindowsruntime000003 -functionapp config show -g clitest.rg000001 -n functionappwindowsruntime000003 -functionapp create -g clitest.rg000001 -n functionappwindowsruntime000003 -c francecentral -s clitest000002 --functions-version 3 --os-type Windows --runtime node -functionapp config appsettings list -g clitest.rg000001 -n functionappwindowsruntime000003 -functionapp create -g clitest.rg000001 -n functionappwindowsruntime000003 -c francecentral -s clitest000002 --os-type Windows --runtime java -functionapp config appsettings list -g clitest.rg000001 -n functionappwindowsruntime000003 -functionapp config show -g clitest.rg000001 -n functionappwindowsruntime000003 -functionapp create -g clitest.rg000001 -n functionappwindowsruntime000003 -c francecentral -s clitest000002 --os-type Windows --runtime powershell -functionapp config appsettings list -g clitest.rg000001 -n functionappwindowsruntime000003 -functionapp config show -g clitest.rg000001 -n functionappwindowsruntime000003 -functionapp create -g clitest.rg000001 -n functionappwindowsruntime000003 -c francecentral -s clitest000002 --os-type Windows --functions-version 3 --runtime node --runtime-version 14 -functionapp config appsettings list -g clitest.rg000001 -n functionappwindowsruntime000003 -functionapp delete -g clitest.rg000001 -n functionappwindowsruntime000003 -functionapp create -g clitest.rg000001 -n functionappwindowsruntime000003 -c francecentral -s clitest000002 --os-type Windows --runtime node --runtime-version 8.2 -functionapp create -g clitest.rg000001 -n functionappwindowswithoutruntime000003 -c francecentral -s clitest000002 --os-type Windows -functionapp delete -g clitest.rg000001 -n functionappwindowswithoutruntime000003 -functionapp create -g clitest.rg000001 -n functionappwithappinsights000003 -c francecentral -s clitest000002 --os-type Windows --app-insights-key 00000000-0000-0000-0000-123456789123 -functionapp config appsettings list -g clitest.rg000001 -n functionappwithappinsights000003 -functionapp delete -g clitest.rg000001 -n functionappwithappinsights000003 -functionapp plan create -g clitest.rg000001 -n plan000002 -l eastus2 -z --sku P1V2 -appservice plan show -g clitest.rg000001 -n plan000002 -functionapp plan create -g clitest.rg000001 -n plan000003 -l eastus2 -z --sku FREE -functionapp plan create -g clitest.rg000001 -n plan000003 -l japanwest -z --sku P1V3 -functionapp plan create -g clitest.rg000001 -n plan000004 -l eastus2 --sku FREE -appservice plan show -g clitest.rg000001 -n plan000004 -functionapp create -g clitest.rg000001 -n functionappwithappinsights000003 -c francecentral -s clitest000002 --os-type Windows -functionapp config appsettings list -g clitest.rg000001 -n functionappwithappinsights000003 -functionapp create -g clitest.rg000001 -n functionappwithappinsights000003 -c francecentral -s clitest000002 --os-type Windows --disable-app-insights -functionapp config appsettings list -g clitest.rg000001 -n functionappwithappinsights000003 -appservice plan create -g clitest.rg000001 -n funcapplinplan000003 --sku S1 --is-linux -functionapp create -g clitest.rg000001 -n functionapp-linux000004 --plan funcapplinplan000003 -s clitest000002 --functions-version 3 --runtime node -functionapp list -g clitest.rg000001 -functionapp config show -g clitest.rg000001 -n functionapp-linux000004 -functionapp delete -g clitest.rg000001 -n functionapp-linux000004 -functionapp create -g clitest.rg000001 -n functionapp-linux000003 -c ukwest -s clitest000002 --os-type linux --runtime python --functions-version 3 --runtime-version 3.9 -functionapp config show -g clitest.rg000001 -n functionapp-linux000003 -appservice plan create -g clitest.rg000001 -n funcapplinplan000003 --sku S1 --is-linux -functionapp create -g clitest.rg000001 -n functionapp-linux000004 --plan funcapplinplan000003 -s clitest000002 --functions-version 3 --runtime custom -functionapp config appsettings list -g clitest.rg000001 -n functionapp-linux000004 -functionapp create -g clitest.rg000001 -n functionapp-linux000003 -c ukwest -s clitest000002 --functions-version 3 --runtime dotnet --os-type linux -functionapp config show -g clitest.rg000001 -n functionapp-linux000003 -functionapp config appsettings list -g clitest.rg000001 -n functionapp-linux000003 -appservice plan create -g clitest.rg000001 -n funcapplinplan000003 --sku S1 --is-linux -functionapp create -g clitest.rg000001 -n functionapp-linux000004 --plan funcapplinplan000003 -s clitest000002 --functions-version 3 --runtime node -functionapp config show -g clitest.rg000001 -n functionapp-linux000004 -functionapp config appsettings list -g clitest.rg000001 -n functionapp-linux000004 -functionapp create -g clitest.rg000001 -n functionapp-linux000003 -c ukwest -s clitest000002 --functions-version 3 --runtime node --os-type linux -functionapp config show -g clitest.rg000001 -n functionapp-linux000003 -functionapp config appsettings list -g clitest.rg000001 -n functionapp-linux000003 -functionapp plan create -g clitest.rg000001 -n funcapplinplan000003 --sku S1 --is-linux -functionapp create -g clitest.rg000001 -n functionapp-linux000004 --plan funcapplinplan000003 -s clitest000002 --functions-version 3 --runtime node --runtime-version 14 -functionapp list -g clitest.rg000001 -functionapp config show -g clitest.rg000001 -n functionapp-linux000004 -functionapp create -g clitest.rg000001 -n functionapp-linux000003 -c ukwest -s clitest000002 --os-type linux --runtime python --runtime-version 3.7 -functionapp config show -g clitest.rg000001 -n functionapp-linux000003 -functionapp plan create -g clitest.rg000001 -n funcapplinplan000003 --sku S1 --is-linux -functionapp create -g clitest.rg000001 -n functionapp-linux000004 --plan funcapplinplan000003 -s clitest000002 --runtime python --runtime-version 4.8 -functionapp plan create -g clitest.rg000001 -n funcappplan000002 --sku S1 -functionapp plan create -g clitest.rg000001 -n funcappplan000002 --sku EP1 --min-instances 4 --max-burst 12 -functionapp plan update -g clitest.rg000001 -n funcappplan000002 --min-instances 5 --max-burst 11 -functionapp plan show -g clitest.rg000001 -n funcappplan000002 -functionapp delete -g clitest.rg000001 -n funcappplan000002 -functionapp plan create -g clitest.rg000001 -n funcappplan000002 --sku S1 --is-linux -functionapp plan create -g clitest.rg000001 -n funcappplan000003 --sku S1 -functionapp create -g clitest.rg000001 -n functionapp-slot000004 --plan funcappplan000003 -s clitest000002 --functions-version 3 --runtime node -functionapp deployment slot create -g clitest.rg000001 -n functionapp-slot000004 --slot slotname000005 -functionapp config appsettings set -g clitest.rg000001 -n functionapp-slot000004 --slot slotname000005 --slot-settings FOO=BAR -functionapp config appsettings list -g clitest.rg000001 -n functionapp-slot000004 --slot slotname000005 -functionapp delete -g clitest.rg000001 -n functionapp-slot000004 -functionapp plan create -g clitest.rg000001 -n funcappplan000003 --sku S1 -functionapp create -g clitest.rg000001 -n functionapp-slot000004 --plan funcappplan000003 -s clitest000002 --functions-version 3 --runtime node -functionapp deployment slot create -g clitest.rg000001 -n functionapp-slot000004 --slot slotname000005 -functionapp config appsettings set -g clitest.rg000001 -n functionapp-slot000004 --slot slotname000005 --settings FOO=BAR -functionapp deployment slot swap -g clitest.rg000001 -n functionapp-slot000004 --slot slotname000005 --action swap -functionapp config appsettings list -g clitest.rg000001 -n functionapp-slot000004 -functionapp delete -g clitest.rg000001 -n functionapp-slot000004 -functionapp create -g clitest.rg000001 -n functionappkeys000003 -c francecentral -s clitest000002 -functionapp keys set -g clitest.rg000001 -n functionappkeys000003 --key-name keyname1 --key-value keyvalue1 --key-type functionKeys -functionapp keys delete -g clitest.rg000001 -n functionappkeys000003 --key-name keyname1 --key-type functionKeys -functionapp keys list -g clitest.rg000001 -n functionappkeys000003 -functionapp create -g clitest.rg000001 -n functionappkeys000003 -c francecentral -s clitest000002 -functionapp keys set -g clitest.rg000001 -n functionappkeys000003 --key-name keyname1 --key-value keyvalue1 --key-type functionKeys -functionapp keys list -g clitest.rg000001 -n functionappkeys000003 -functionapp create -g clitest.rg000001 -n functionappkeys000003 -c francecentral -s clitest000002 --functions-version 3 -functionapp keys set -g clitest.rg000001 -n functionappkeys000003 --key-name keyname1 --key-value keyvalue1 --key-type functionKeys -functionapp keys set -g clitest.rg000001 -n functionappkeys000003 --key-name keyname1 --key-value keyvalue1_changed --key-type functionKeys -functionapp create -g clitest.rg000001 -n functionappkeys000003 -c francecentral -s clitest000002 -functionapp deployment slot create -g clitest.rg000001 -n functionappkeys000003 --slot slotname000004 -functionapp keys set -g clitest.rg000001 -n functionappkeys000003 -s slotname000004 --key-name keyname1 --key-value keyvalue1 --key-type functionKeys -functionapp keys set -g clitest.rg000001 -n functionappkeys000003 -s slotname000004 --key-name keyname1 --key-value keyvalue1_changed --key-type functionKeys -local-context on -functionapp plan create -g {rg} -n {plan_name} --sku B2 -functionapp plan show -functionapp plan delete -functionapp create -n {functionapp_name} --storage-account {storage_account} -functionapp show -functionapp delete -functionapp delete -n {functionapp_name} -functionapp plan delete -n {plan_name} -y -local-context off -local-context delete --all --purge -y -functionapp plan create -g clitest.rg000001 -n func-msi-plan000003 --sku S1 -functionapp create -g clitest.rg000001 -n func-msi000004 --plan func-msi-plan000003 -s clitest000002 -functionapp identity assign -g clitest.rg000001 -n func-msi000004 --role Reader --scope /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001 -functionapp identity show -g clitest.rg000001 -n func-msi000004 -role assignment list -g clitest.rg000001 --assignee 8cbfcf60-8676-45ca-87cf-8e4dc904c68b -functionapp identity show -g clitest.rg000001 -n func-msi000004 -functionapp identity remove -g clitest.rg000001 -n func-msi000004 -functionapp identity show -g clitest.rg000001 -n func-msi000004 -identity create -g clitest.rg000001 -n id1000005 -functionapp plan create -g clitest.rg000001 -n func-msi-plan000003 --sku S1 -functionapp create -g clitest.rg000001 -n func-msi000004 --plan func-msi-plan000003 -s clitest000002 -functionapp identity assign -g clitest.rg000001 -n func-msi000004 -functionapp identity assign -g clitest.rg000001 -n func-msi000004 --identities /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/id1000005 -functionapp identity show -g clitest.rg000001 -n func-msi000004 -functionapp identity remove -g clitest.rg000001 -n func-msi000004 --identities /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/id1000005 -functionapp identity show -g clitest.rg000001 -n func-msi000004 -identity create -g clitest.rg000001 -n id1000005 -identity create -g clitest.rg000001 -n id1000006 -functionapp plan create -g clitest.rg000001 -n func-msi-plan000003 --sku S1 -functionapp create -g clitest.rg000001 -n func-msi000004 --plan func-msi-plan000003 -s clitest000002 -functionapp identity assign -g clitest.rg000001 -n func-msi000004 --identities [system] /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/id1000005 /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/id1000006 -functionapp identity remove -g clitest.rg000001 -n func-msi000004 --identities /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/id1000006 -functionapp identity show -g clitest.rg000001 -n func-msi000004 -functionapp identity remove -g clitest.rg000001 -n func-msi000004 -functionapp identity show -g clitest.rg000001 -n func-msi000004 -functionapp identity remove -g clitest.rg000001 -n func-msi000004 --identities [system] /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/id1000005 -functionapp identity show -g clitest.rg000001 -n func-msi000004 -network vnet create -g clitest.rg000001 -n vnet000006 --address-prefix 10.0.0.0/16 --subnet-name subnet000005 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n vnetplan000004 --sku P1V2 -functionapp create -g clitest.rg000001 -n vnetfunctionapp000003 --plan vnetplan000004 --vnet vnet000006 --subnet subnet000005 -s clitest000002 -functionapp vnet-integration list -g clitest.rg000001 -n vnetfunctionapp000003 -functionapp vnet-integration remove -g clitest.rg000001 -n vnetfunctionapp000003 -functionapp vnet-integration list -g clitest.rg000001 -n vnetfunctionapp000003 -network vnet create -g clitest.rg000002 -n vnet000007 --address-prefix 10.0.0.0/16 --subnet-name subnet000006 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n vnetplan000005 --sku P1V2 -functionapp create -g clitest.rg000001 -n vnetfunctionapp000004 --plan vnetplan000005 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnet000007/subnets/subnet000006 -s clitest000003 -functionapp vnet-integration list -g clitest.rg000001 -n vnetfunctionapp000004 -functionapp vnet-integration remove -g clitest.rg000001 -n vnetfunctionapp000004 -functionapp vnet-integration list -g clitest.rg000001 -n vnetfunctionapp000004 -network vnet create -g clitest.rg000002 -n vnet000007 --address-prefix 10.0.0.0/16 --subnet-name subnet000006 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n vnetplan000005 --sku P1V2 -functionapp create -g clitest.rg000001 -n vnetfunctionapp000004 --plan vnetplan000005 --vnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnet000007 --subnet subnet000006 -s clitest000003 -functionapp vnet-integration list -g clitest.rg000001 -n vnetfunctionapp000004 -functionapp vnet-integration remove -g clitest.rg000001 -n vnetfunctionapp000004 -functionapp vnet-integration list -g clitest.rg000001 -n vnetfunctionapp000004 -network vnet create -g clitest.rg000001 -n vnet000006 --address-prefix 10.0.0.0/16 --subnet-name subnet000005 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n vnetplan000004 --sku P1V2 -functionapp create -g clitest.rg000001 -n vnetfunctionapp000003 --plan vnetplan000004 --vnet vnet000006 -s subnet000005 -appservice plan create -g clitest.rg000001 -n vnetplan000004 --sku P1V2 -functionapp create -g clitest.rg000001 -n vnetfunctionapp000003 --plan vnetplan000004 --vnet vnet000006 --subnet subnet000005 -s clitest000002 -network vnet create -g clitest.rg000002 -n vnet000007 --address-prefix 10.0.0.0/16 --subnet-name subnet000006 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n vnetplan000005 --sku P1V2 -functionapp create -g clitest.rg000001 -n vnetfunctionapp000004 --plan vnetplan000005 --vnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnet000007 --subnet subnet000006 -s clitest000003 -network vnet create -g clitest.rg000002 -n vnet000007 --address-prefix 10.0.0.0/16 --subnet-name subnet000006 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n vnetplan000005 --sku P1V2 -functionapp create -g clitest.rg000001 -n vnetfunctionapp000004 --plan vnetplan000005 --vnet vnet000007 --subnet subnet000006 -s clitest000003 -network vnet create -g clitest.rg000001 -n vnet000006 --address-prefix 10.0.0.0/16 --subnet-name subnet000005 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n vnetplan000004 --sku FREE -functionapp create -g clitest.rg000001 -n vnetfunctionapp000003 --plan vnetplan000004 --vnet vnet000006 --subnet subnet000005 -s clitest000002 -network vnet create -g clitest.rg000001 -n swiftname000006 --address-prefix 10.0.0.0/16 --subnet-name swiftsubnet000005 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n swiftplan000004 --sku P1V2 -functionapp create -g clitest.rg000001 -n swiftfunctionapp000003 --plan swiftplan000004 -s clitest000002 -functionapp vnet-integration add -g clitest.rg000001 -n swiftfunctionapp000003 --vnet swiftname000006 --subnet swiftsubnet000005 -functionapp vnet-integration list -g clitest.rg000001 -n swiftfunctionapp000003 -functionapp deployment slot create -g clitest.rg000001 -n swiftfunctionapp000003 --slot swiftfunctionapp000003-stage -functionapp vnet-integration add -g clitest.rg000001 -n swiftfunctionapp000003 --vnet swiftname000006 --subnet swiftsubnet000005 --slot swiftfunctionapp000003-stage -functionapp vnet-integration list -g clitest.rg000001 -n swiftfunctionapp000003 --slot swiftfunctionapp000003-stage -functionapp vnet-integration remove -g clitest.rg000001 -n swiftfunctionapp000003 -functionapp vnet-integration list -g clitest.rg000001 -n swiftfunctionapp000003 -functionapp vnet-integration remove -g clitest.rg000001 -n swiftfunctionapp000003 --slot swiftfunctionapp000003-stage -functionapp vnet-integration list -g clitest.rg000001 -n swiftfunctionapp000003 --slot swiftfunctionapp000003-stage -appservice plan create -g clitest.rg000001 -n logic-e2e-plan000003 -appservice plan list -g clitest.rg000001 -storage account create --name logicpplanstorage1 -g clitest.rg000001 -l westus --sku Standard_LRS -logicapp create -g clitest.rg000001 -n logic-e2e000002 -p logic-e2e-plan000003 -s logicpplanstorage1 -logicapp show -g clitest.rg000001 -n logic-e2e000002 -logicapp list -g clitest.rg000001 -logicapp restart -g clitest.rg000001 -n logic-e2e000002 -logicapp show -g clitest.rg000001 -n logic-e2e000002 -logicapp stop -g clitest.rg000001 -n logic-e2e000002 -logicapp show -g clitest.rg000001 -n logic-e2e000002 -logicapp stop -g clitest.rg000001 -n logic-e2e000002 -logicapp show -g clitest.rg000001 -n logic-e2e000002 -logicapp restart -g clitest.rg000001 -n logic-e2e000002 -logicapp show -g clitest.rg000001 -n logic-e2e000002 -logicapp start -g clitest.rg000001 -n logic-e2e000002 -logicapp show -g clitest.rg000001 -n logic-e2e000002 -logicapp start -g clitest.rg000001 -n logic-e2e000002 -logicapp show -g clitest.rg000001 -n logic-e2e000002 -logicapp delete -g clitest.rg000001 -n logic-e2e000002 -y -logicapp list -g clitest.rg000001 -logicapp create -g clitest.rg000001 -n logicappwindowsruntime000003 -c francecentral -s clitest000002 --os-type Windows -logicapp delete -g clitest.rg000001 -n logicappwindowsruntime000003 -y -appservice plan create -g clitest.rg000001 -n funcapplinplan000003 --sku S1 --is-linux -logicapp create -g clitest.rg000001 -n logicapp-linux000004 --plan funcapplinplan000003 -s clitest000002 -logicapp list -g clitest.rg000001 -logicapp delete -g clitest.rg000001 -n logicapp-linux000004 -y -appservice plan create -g {rg} -n {plan_name} -webapp create -g {rg} -n {app_name} --plan {plan_name} -webapp config access-restriction add -g {rg} -n {app_name} --rule-name developers --action Allow --ip-address 130.220.0.0/27 --priority 200 -appservice plan create -g {rg} -n {plan_name} --is-linux -webapp create -g {rg} -n {app_name} --plan {plan_name} --runtime "DOTNETCORE|3.1" -webapp config access-restriction add -g {rg} -n {app_name} --rule-name afd --action Allow --service-tag AzureFrontDoor.Backend --priority 200 --http-header x-azure-fdid=12345678-abcd-1234-abcd-12345678910a -webapp config access-restriction remove -g {rg} -n {app_name} --service-tag AzureFrontDoor.Backend -webapp config access-restriction add -g {rg} -n {app_name} --rule-name afd-extended --action Allow --service-tag AzureFrontDoor.Backend --priority 200 --http-header x-azure-fdid=12345678-abcd-1234-abcd-12345678910a x-azure-FDID=next-id x-forwarded-host=contoso.com -appservice plan create -g {rg} -n {plan_name} -webapp create -g {rg} -n {app_name} --plan {plan_name} -webapp config access-restriction add -g {rg} -n {app_name} --rule-name ipv4 --action Allow --ip-address 130.220.0.0 --priority 200 -webapp config access-restriction add -g {rg} -n {app_name} --rule-name ipv6 --action Allow --ip-address 2004::1000 --priority 200 -webapp config access-restriction add -g {rg} -n {app_name} --rule-name multi-source --action Allow --ip-address "2004::1000/120,192.168.0.0/24" --priority 200 -appservice plan create -g {rg} -n {plan_name} -webapp create -g {rg} -n {app_name} --plan {plan_name} -webapp config access-restriction add -g {rg} -n {app_name} --rule-name developers --action Allow --ip-address 130.220.0.0/27 --priority 200 --scm-site -appservice plan create -g {rg} -n {plan_name} -webapp create -g {rg} -n {app_name} --plan {plan_name} -network vnet create -g {rg} -n {vnet_name} --address-prefixes 10.0.0.0/16 --subnet-name endpoint-subnet --subnet-prefixes 10.0.0.0/24 -webapp config access-restriction add -g {rg} -n {app_name} --rule-name vnet-integration --action Allow --vnet-name {vnet_name} --subnet endpoint-subnet --priority 150 -appservice plan create -g {rg} -n {plan_name} -webapp create -g {rg} -n {app_name} --plan {plan_name} -webapp config access-restriction add -g {rg} -n {app_name} --rule-name afd --action Allow --service-tag AzureFrontDoor.Backend --priority 200 -webapp config access-restriction add -g {rg} -n {app_name} --rule-name europe --action Allow --service-tag "AzureCloud.WestEurope,AzureCloud.NorthEurope" --priority 300 -appservice plan create -g {rg} -n {plan_name} -webapp create -g {rg} -n {app_name} --plan {plan_name} -network vnet create -g {rg} -n {vnet_name} --address-prefixes 10.0.0.0/16 --subnet-name endpoint-subnet --subnet-prefixes 10.0.0.0/24 -webapp config access-restriction add -g {rg} -n {app_name} --rule-name developers --action Allow --ip-address {ip_address} --priority 100 -webapp config access-restriction add -g {rg} -n {app_name} --rule-name vnet-integration --action Allow --vnet-name {vnet_name} --subnet endpoint-subnet --priority 150 -webapp config access-restriction add -g {rg} -n {app_name} --rule-name afd --action Allow --service-tag {service_tag} --priority 200 --http-header x-azure-fdid=12345678-abcd-1234-abcd-12345678910a -webapp config access-restriction remove -g {rg} -n {app_name} --vnet-name {vnet_name} --subnet endpoint-subnet -webapp config access-restriction remove -g {rg} -n {app_name} --ip-address {ip_address} -webapp config access-restriction remove -g {rg} -n {app_name} --service-tag {service_tag} -appservice plan create -g {rg} -n {plan_name} -webapp create -g {rg} -n {app_name} --plan {plan_name} -webapp config access-restriction add -g {rg} -n {app_name} --rule-name developers --action Allow --ip-address 130.220.0.0/27 --priority 200 -webapp config access-restriction remove -g {rg} -n {app_name} --rule-name developers -appservice plan create -g {rg} -n {plan_name} -webapp create -g {rg} -n {app_name} --plan {plan_name} -webapp config access-restriction add -g {rg} -n {app_name} --rule-name developers --action Allow --ip-address 130.220.0.0/27 --priority 200 --scm-site -webapp config access-restriction remove -g {rg} -n {app_name} --rule-name developers --scm-site -appservice plan create -g {rg} -n {plan_name} -webapp create -g {rg} -n {app_name} --plan {plan_name} -webapp config access-restriction set -g {rg} -n {app_name} --use-same-restrictions-for-scm-site -webapp config access-restriction set -g {rg} -n {app_name} --use-same-restrictions-for-scm-site false -appservice plan create -g {rg} -n {plan_name} -webapp create -g {rg} -n {app_name} --plan {plan_name} -webapp config access-restriction set -g {rg} -n {app_name} --use-same-restrictions-for-scm-site true -appservice plan create -g {rg} -n {plan_name} -webapp create -g {rg} -n {app_name} --plan {plan_name} -webapp config access-restriction show -g {rg} -n {app_name} -appservice plan create -g {rg} -n {plan_name} --sku S1 -webapp create -g {rg} -n {app_name} --plan {plan_name} -webapp deployment slot create -g {rg} -n {app_name} --slot {slot_name} -webapp config access-restriction show -g {rg} -n {app_name} --slot {slot_name} -webapp config access-restriction add -g {rg} -n {app_name} --rule-name developers --action Allow --ip-address 130.220.0.0/27 --priority 200 --slot {slot_name} -appservice plan create -g clitest.rg000001 -n webapp-e2e-plan000003 -appservice plan list -g clitest.rg000001 -appservice plan create -g clitest.rg000001 -n webapp-e2e-plan000003 --per-site-scaling -appservice plan list -g clitest.rg000001 -appservice plan list -g clitest.rg000001 -appservice plan show -g clitest.rg000001 -n webapp-e2e-plan000003 -webapp create -g clitest.rg000001 -n webapp-e2e000002 --plan webapp-e2e-plan000003 -webapp create -g clitest.rg000001 -n webapp-e2e000002 --plan webapp-e2e-plan000003 -webapp list -g clitest.rg000001 -webapp show -g clitest.rg000001 -n webapp-e2e000002 -webapp deployment source config-local-git -g clitest.rg000001 -n webapp-e2e000002 -webapp deployment source show -g clitest.rg000001 -n webapp-e2e000002 -webapp log config -g clitest.rg000001 -n webapp-e2e000002 --level verbose --application-logging filesystem --detailed-error-messages true --failed-request-tracing true --web-server-logging filesystem -webapp log show -g clitest.rg000001 -n webapp-e2e000002 -webapp config show -g clitest.rg000001 -n webapp-e2e000002 -webapp deployment list-publishing-profiles -g clitest.rg000001 -n webapp-e2e000002 -webapp stop -g clitest.rg000001 -n webapp-e2e000002 -webapp show -g clitest.rg000001 -n webapp-e2e000002 -webapp start -g clitest.rg000001 -n webapp-e2e000002 -webapp show -g clitest.rg000001 -n webapp-e2e000002 -webapp deployment list-publishing-credentials -g clitest.rg000001 -n webapp-e2e000002 -webapp show -g clitest.rg000001 -n webapp-e2e000002 -webapp create -g clitest.rg000001 -n webapp-e2e000002 --plan webapp-e2e-plan000003 -r "php|7.3" -webapp config show -g clitest.rg000001 -n webapp-e2e000002 -webapp list-runtimes -group create -n clitest.rg000002 -l japanwest -appservice plan create -g clitest.rg000001 -n planInOneRG000003 -webapp create -g clitest.rg000002 -n webInOtherRG000004 --plan /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Web/serverfarms/planInOneRG000003 -appservice plan create -g clitest.rg000001 -n plan-linux-multi000003 --is-linux -webapp create -g clitest.rg000001 -n webapp-linux-multi000002 --plan plan-linux-multi000003 --multicontainer-config-file "c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\appservice\tests\latest\sample-compose.yml" --multicontainer-config-type COMPOSE -webapp show -g clitest.rg000001 -n webapp-linux-multi000002 -appservice plan create -g clitest.rg000001 -n plan-quick-linux000003 --is-linux -webapp create -g clitest.rg000001 -n webapp-quick-linux000002 --plan plan-quick-linux000003 -i patle/ruby-hello -webapp config appsettings list -g clitest.rg000001 -n webapp-quick-linux000002 -appservice plan create -g clitest.rg000001 -n plan-quick-linux-cd --is-linux -webapp create -g clitest.rg000001 -n webapp-linux-cd000002 --plan plan-quick-linux-cd -u https://github.com/yugangw-msft/azure-site-test.git -r "NODE|14-lts" -appservice plan create -g clitest.rg000001 -n plan-quick000003 -webapp create -g clitest.rg000001 -n webapp-quick000002 --plan plan-quick000003 --deployment-local-git -webapp config appsettings list -g clitest.rg000001 -n webapp-quick000002 -appservice plan create -g clitest.rg000001 -n plan-quick000003 -webapp create -g clitest.rg000001 -n webapp-quick-cd000002 --plan plan-quick000003 --deployment-source-url https://github.com/yugangw-msft/azure-site-test.git -r "node|10.14" -appservice plan create -g clitest000001 -n plan-quick000004 -webapp create -g clitest000001 -n webapp-quick000002 --plan plan-quick000004 --deployment-local-git -r "node|10.14" -webapp config appsettings list -g clitest000001 -n webapp-quick000002 -webapp create -g clitest000001 -n webapp-quick000003 --plan plan-quick000004 --deployment-local-git -r "DOTNETCORE|3.1" -appservice plan create -g clitest.rg000001 -n plan-backup000002 --sku S1 -webapp create -g clitest.rg000001 -n backup-webapp000003 --plan plan-backup000002 -storage account create -n backup000004 -g clitest.rg000001 --location japanwest -storage container create --account-name backup000004 --name backupcontainer000005 -storage container generate-sas --account-name backup000004 --name backupcontainer000005 --expiry "2021-12-05T12:09Z" --permissions rwdl -webapp config backup create -g clitest.rg000001 --webapp-name backup-webapp000003 --backup-name backup-name000006 --container-url "https://backup000004.blob.core.windows.net/backupcontainer000005?" -webapp config backup list -g clitest.rg000001 --webapp-name backup-webapp000003 -appservice plan create -g clitest.rg000001 -n win-log000003 -webapp create -g clitest.rg000001 -n webapp-win-log000002 --plan win-log000003 --deployment-source-url https://github.com/yugangw-msft/azure-site-test.git -r "node|10.14" -webapp log download -g clitest.rg000001 -n webapp-win-log000002 --log-file "C:\Users\ZELINW~1\AppData\Local\Temp\tmpua2nopfy" -appservice plan create -g clitest.rg000001 -n web-del-plan000003 -l japanwest -appservice plan update -g clitest.rg000001 -n web-del-plan000003 --sku S1 -webapp create -g clitest.rg000001 -n web-del-test000002 --plan web-del-plan000003 -webapp delete -g clitest.rg000001 -n web-del-test000002 -appservice plan list -g clitest.rg000001 -appservice plan create -g clitest.rg000001 -n web-plan000003 -webapp create -g clitest.rg000001 -n web000002 --plan web-plan000003 -webapp delete -g clitest.rg000001 -n web000002 --keep-dns-registration --keep-empty-plan --keep-metrics -appservice plan list -g clitest.rg000001 -appservice plan create -g clitest.rg000001 -n plan000002 -l eastus2 -z --sku P1V3 -appservice plan show -g clitest.rg000001 -n plan000002 -appservice plan create -g clitest.rg000001 -n plan000003 -l eastus2 -z --sku FREE -appservice plan create -g clitest.rg000001 -n plan000003 -l japanwest -z --sku P1V3 -functionapp plan create -g clitest.rg000001 -n plan000004 -l eastus2 --sku FREE -appservice plan show -g clitest.rg000001 -n plan000004 -appservice plan create -g cli_test_webapp_json000001 -n webapp-config-plan000003 --sku S1 -webapp create -g cli_test_webapp_json000001 -n webapp-config-test000002 --plan webapp-config-plan000003 -webapp deployment slot create -g cli_test_webapp_json000001 -n webapp-config-test000002 --slot staging -webapp config appsettings set -g cli_test_webapp_json000001 -n webapp-config-test000002 --settings s=value "@C:\Users\ZELINW~1\AppData\Local\Temp\tmph3aek9ay" -webapp config appsettings set -g cli_test_webapp_json000001 -n webapp-config-test000002 --settings "@C:\Users\ZELINW~1\AppData\Local\Temp\tmph3aek9ay" -webapp config appsettings set -g cli_test_webapp_json000001 -n webapp-config-test000002 --slot staging --settings "@C:\Users\ZELINW~1\AppData\Local\Temp\tmph3aek9ay" -webapp config set -g cli_test_webapp_json000001 -n webapp-config-test000002 --generic-configurations "@C:\Users\ZELINW~1\AppData\Local\Temp\tmph3aek9ay" -appservice plan create -g cli_test_webapp_config000001 -n webapp-config-plan000003 --sku S1 -webapp create -g cli_test_webapp_config000001 -n webapp-config-test000002 --plan webapp-config-plan000003 -webapp config show -g cli_test_webapp_config000001 -n webapp-config-test000002 -webapp config set -g cli_test_webapp_config000001 -n webapp-config-test000002 --always-on true --auto-heal-enabled true --php-version 7.2 --net-framework-version v3.5 --python-version 3.4 --use-32bit-worker-process=false --web-sockets-enabled=true --http20-enabled true --min-tls-version 1.0 --ftps-state Disabled -webapp config show -g cli_test_webapp_config000001 -n webapp-config-test000002 -webapp config appsettings set -g cli_test_webapp_config000001 -n webapp-config-test000002 --settings s1=foo s2=bar s3=bar2 -webapp config appsettings list -g cli_test_webapp_config000001 -n webapp-config-test000002 -webapp config appsettings delete -g cli_test_webapp_config000001 -n webapp-config-test000002 --setting-names s1 s2 -webapp config hostname list -g cli_test_webapp_config000001 --webapp-name webapp-config-test000002 -appservice plan create -g cli_test_webapp_config000001 -n webapp-linux-plan000004 -l eastus2 --sku S1 --is-linux -webapp create -g cli_test_webapp_config000001 -n webapp-linux000005 --plan webapp-linux-plan000004 --runtime NODE|14-lts -webapp config storage-account add -g cli_test_webapp_config000001 -n webapp-linux000005 --custom-id Id --storage-type AzureFiles --account-name name --share-name sharename --access-key key --mount-path /path/to/mount -webapp config storage-account list -g cli_test_webapp_config000001 -n webapp-linux000005 -webapp config storage-account update -g cli_test_webapp_config000001 -n webapp-linux000005 --custom-id Id --mount-path /different/path -webapp config storage-account list -g cli_test_webapp_config000001 -n webapp-linux000005 -webapp config storage-account list -g cli_test_webapp_config000001 -n webapp-linux000005 -webapp config storage-account delete -g cli_test_webapp_config000001 -n webapp-linux000005 --custom-id Id -webapp config connection-string set -t mysql -g cli_test_webapp_config000001 -n webapp-linux000005 --settings c1="conn1" c2=conn2 --slot-settings c3=conn3 -webapp config connection-string list -g cli_test_webapp_config000001 -n webapp-linux000005 -webapp config connection-string delete -g cli_test_webapp_config000001 -n webapp-linux000005 --setting-names c1 c3 -webapp config connection-string list -g cli_test_webapp_config000001 -n webapp-linux000005 -webapp deployment user show -appservice plan create -g cli_test_webapp_config_appsettings000001 -n webapp-config-appsettings-plan000003 --sku S1 -webapp create -g cli_test_webapp_config_appsettings000001 -n webapp-config-appsettings-test000002 --plan webapp-config-appsettings-plan000003 -webapp config appsettings set -g cli_test_webapp_config_appsettings000001 -n webapp-config-appsettings-test000002 --settings s1=foo s2=bar s3=bar2 -webapp config appsettings list -g cli_test_webapp_config_appsettings000001 -n webapp-config-appsettings-test000002 -webapp create -g cli_test_webapp_config_appsettings000001 -n webapp-config-appsettings-test000002 --plan webapp-config-appsettings-plan000003 -webapp config appsettings list -g cli_test_webapp_config_appsettings000001 -n webapp-config-appsettings-test000002 -network vnet create -g cli_test_webapp_update_site_configs_persists_ip_restrictions000001 -n testvnet000005 --address-prefix 10.0.0.0/16 --subnet-name testsubnet000004 --subnet-prefix 10.0.0.0/24 -appservice plan create -g cli_test_webapp_update_site_configs_persists_ip_restrictions000001 -n webapp-config-appsettings-persist000003 --sku S1 -webapp create -g cli_test_webapp_update_site_configs_persists_ip_restrictions000001 -n webapp-config-appsettings-persist000002 --plan webapp-config-appsettings-persist000003 -webapp config set -g cli_test_webapp_update_site_configs_persists_ip_restrictions000001 -n webapp-config-appsettings-persist000002 --always-on true -webapp config access-restriction add -g cli_test_webapp_update_site_configs_persists_ip_restrictions000001 -n webapp-config-appsettings-persist000002 --rule-name testclirule --priority 300 --subnet testsubnet000004 --vnet-name testvnet000005 -webapp config set -g cli_test_webapp_update_site_configs_persists_ip_restrictions000001 -n webapp-config-appsettings-persist000002 --always-on true -appservice plan create -g clitest.rg000001 -n scale-plan000002 --sku SHARED -appservice plan update -g clitest.rg000001 -n scale-plan000002 --sku S2 -appservice plan show -g clitest.rg000001 -n scale-plan000002 -appservice plan update -g clitest.rg000001 -n scale-plan000002 --sku B1 -appservice plan show -g clitest.rg000001 -n scale-plan000002 -appservice plan update -g clitest.rg000001 -n scale-plan000002 --number-of-workers 2 -appservice plan show -g clitest.rg000001 -n scale-plan000002 -appservice plan create -g clitest.rg000001 -n webapp-linux-plan000002 --sku S1 --is-linux -webapp create -g clitest.rg000001 -n webapp-linux000003 --plan webapp-linux-plan000002 --runtime NODE|14-lts -webapp config show -g clitest.rg000001 -n webapp-linux000003 -webapp list -g clitest.rg000001 -webapp show -g clitest.rg000001 -n webapp-linux000003 -webapp config set -g clitest.rg000001 -n webapp-linux000003 --startup-file process.json -webapp deployment container config -g clitest.rg000001 -n webapp-linux000003 --enable-cd true -webapp config container set -g clitest.rg000001 -n webapp-linux000003 --docker-custom-image-name foo-image --docker-registry-server-password foo-password --docker-registry-server-user foo-user --docker-registry-server-url foo-url --enable-app-service-storage false -webapp config container show -g clitest.rg000001 -n webapp-linux000003 -webapp config container delete -g clitest.rg000001 -n webapp-linux000003 -webapp config container show -g clitest.rg000001 -n webapp-linux000003 -appservice plan create -g clitest.rg000001 -n webapp-remote-ssh-plan000002 --sku S1 --is-linux -webapp create -g clitest.rg000001 -n webapp-remote-ssh000003 --plan webapp-remote-ssh-plan000002 --runtime node|12-lts -appservice plan create -g clitest.rg000001 -n plan-linux-multi000003 --is-linux --sku S1 -webapp create -g clitest.rg000001 -n webapp-linux-multi000002 --plan plan-linux-multi000003 --multicontainer-config-file "c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\appservice\tests\latest\sample-compose.yml" --multicontainer-config-type COMPOSE -webapp deployment slot create -g clitest.rg000001 -n webapp-linux-multi000002 --slot stage -webapp config container set -g clitest.rg000001 -n webapp-linux-multi000002 --slot stage --multicontainer-config-file "c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\appservice\tests\latest\sample-compose-slot.yml" --multicontainer-config-type COMPOSE -acr create --admin-enabled -g clitest.rg000001 -n webappacrtest000003 --sku Basic -appservice plan create -g clitest.rg000001 -n acrtestplan000002 --sku S1 --is-linux -webapp create -g clitest.rg000001 -n webappacrtest000003 --plan acrtestplan000002 --runtime NODE|14-lts -acr credential show -n webappacrtest000003 -g clitest.rg000001 -webapp config container set -g clitest.rg000001 -n webappacrtest000003 --docker-custom-image-name webappacrtest000003.azurecr.io/image-name:latest --docker-registry-server-url https://webappacrtest000003.azurecr.io -appservice plan create -g clitest.rg000001 -n webapp-git-plan5000002 --sku S1 -webapp create -g clitest.rg000001 -n web-git-test2000003 --plan webapp-git-plan5000002 -webapp deployment source config -g clitest.rg000001 -n web-git-test2000003 --repo-url https://github.com/yugangw-msft/azure-site-test --branch master --manual-integration -webapp deployment source show -g clitest.rg000001 -n web-git-test2000003 -webapp deployment source delete -g clitest.rg000001 -n web-git-test2000003 -webapp deployment source show -g clitest.rg000001 -n web-git-test2000003 -appservice plan create -g clitest.rg000001 -n slot-test-plan000002 --sku S1 -webapp create -g clitest.rg000001 -n slot-test-web000003 --plan slot-test-plan000002 -webapp config appsettings set -g clitest.rg000001 -n slot-test-web000003 --settings s1=v1 --slot-settings s2=v2 -webapp deployment slot create -g clitest.rg000001 -n slot-test-web000003 --slot staging -webapp deployment source config -g clitest.rg000001 -n slot-test-web000003 --repo-url https://github.com/yugangw-msft/azure-site-test --branch staging -s staging --manual-integration -webapp deployment slot swap -g clitest.rg000001 -n slot-test-web000003 -s staging -webapp config appsettings list -g clitest.rg000001 -n slot-test-web000003 -s staging -webapp config set -g clitest.rg000001 -n slot-test-web000003 --php-version 7.4 -webapp deployment slot create -g clitest.rg000001 -n slot-test-web000003 --slot dev --configuration-source slot-test-web000003 -webapp config show -g clitest.rg000001 -n slot-test-web000003 --slot dev -webapp config appsettings set -g clitest.rg000001 -n slot-test-web000003 --slot dev --settings s3=v3 --slot-settings s4=v4 -webapp config connection-string set -g clitest.rg000001 -n slot-test-web000003 -t mysql --slot dev --settings c1=connection1 --slot-settings c2=connection2 -webapp deployment slot swap -g clitest.rg000001 -n slot-test-web000003 --slot staging --target-slot dev -webapp config appsettings list -g clitest.rg000001 -n slot-test-web000003 --slot dev -webapp config connection-string list -g clitest.rg000001 -n slot-test-web000003 --slot dev -webapp config appsettings list -g clitest.rg000001 -n slot-test-web000003 --slot staging -webapp config connection-string list -g clitest.rg000001 -n slot-test-web000003 --slot staging -webapp deployment slot list -g clitest.rg000001 -n slot-test-web000003 -webapp deployment slot auto-swap -g clitest.rg000001 -n slot-test-web000003 -s staging -webapp deployment slot auto-swap -g clitest.rg000001 -n slot-test-web000003 -s staging --disable -webapp deployment slot delete -g clitest.rg000001 -n slot-test-web000003 --slot staging -webapp delete -g clitest.rg000001 -n slot-test-web000003 --slot dev --keep-dns-registration --keep-empty-plan --keep-metrics -appservice plan create -g clitest.rg000001 -n slot-traffic-plan000002 --sku S1 -webapp create -g clitest.rg000001 -n slot-traffic-web000003 --plan slot-traffic-plan000002 -webapp deployment slot create -g clitest.rg000001 -n slot-traffic-web000003 --slot staging -webapp traffic-routing set -g clitest.rg000001 -n slot-traffic-web000003 -d staging=15 -webapp traffic-routing show -g clitest.rg000001 -n slot-traffic-web000003 -webapp traffic-routing clear -g clitest.rg000001 -n slot-traffic-web000003 -appservice plan create -g {rg} -n {plan} --sku S1 -storage account create --name {storage} -g {rg} --sku Standard_LRS -functionapp create -g {rg} -n {function} --plan {plan} -s {storage} -functionapp cors add -g {rg} -n {function} --allowed-origins https://msdn.com https://msn.com -functionapp cors show -g {rg} -n {function} -appservice plan create -g {rg} -n {plan} --sku S1 -webapp create -g {rg} -n {web} --plan {plan} -webapp cors add -g {rg} -n {web} --allowed-origins https://msdn.com https://msn.com -webapp cors show -g {rg} -n {web} -webapp cors remove -g {rg} -n {web} --allowed-origins https://msn.com -webapp cors show -g {rg} -n {web} -webapp deployment slot create -g {rg} -n {web} --slot {slot} -webapp cors add -g {rg} -n {web} --slot {slot} --allowed-origins https://foo.com -webapp cors show -g {rg} -n {web} --slot {slot} -webapp cors remove -g {rg} -n {web} --slot {slot} --allowed-origins https://foo.com -webapp cors show -g {rg} -n {web} --slot {slot} -appservice plan create -g clitest.rg000001 -n slot-swap-plan000002 --sku S1 -webapp create -g clitest.rg000001 -n slot-swap-web000003 --plan slot-swap-plan000002 -webapp config appsettings set -g clitest.rg000001 -n slot-swap-web000003 --slot-settings s1=prod -webapp deployment slot create -g clitest.rg000001 -n slot-swap-web000003 --slot staging -webapp config appsettings set -g clitest.rg000001 -n slot-swap-web000003 --slot-settings s1=slot --slot staging -webapp deployment slot swap -g clitest.rg000001 -n slot-swap-web000003 -s staging --action preview -webapp config appsettings list -g clitest.rg000001 -n slot-swap-web000003 --slot staging -webapp deployment slot swap -g clitest.rg000001 -n slot-swap-web000003 -s staging -webapp config appsettings list -g clitest.rg000001 -n slot-swap-web000003 --slot staging -webapp deployment slot swap -g clitest.rg000001 -n slot-swap-web000003 -s staging --action reset -webapp config appsettings list -g clitest.rg000001 -n slot-swap-web000003 --slot staging -appservice plan create -g clitest.rg000001 -n ssl-test-plan000002 --sku S1 --tags plan=plan1 -appservice plan show -g clitest.rg000001 -n ssl-test-plan000002 -webapp create -g clitest.rg000001 -n web-ssl-test000003 --plan ssl-test-plan000002 --tags web=web1 -webapp config ssl upload -g clitest.rg000001 -n web-ssl-test000003 --certificate-file "c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\appservice\tests\latest\server.pfx" --certificate-password test -webapp show -g clitest.rg000001 -n web-ssl-test000003 -webapp config ssl bind -g clitest.rg000001 -n web-ssl-test000003 --certificate-thumbprint 9E9735C45C792B03B3FFCCA614852B32EE71AD6B --ssl-type SNI -webapp show -g clitest.rg000001 -n web-ssl-test000003 -webapp config ssl unbind -g clitest.rg000001 -n web-ssl-test000003 --certificate-thumbprint 9E9735C45C792B03B3FFCCA614852B32EE71AD6B -webapp show -g clitest.rg000001 -n web-ssl-test000003 -webapp config ssl delete -g clitest.rg000001 --certificate-thumbprint 9E9735C45C792B03B3FFCCA614852B32EE71AD6B -webapp show -g clitest.rg000001 -n web-ssl-test000003 -webapp deployment slot create -g clitest.rg000001 -n web-ssl-test000003 --slot slot-ssl-test000004 -webapp config ssl upload -g clitest.rg000001 -n web-ssl-test000003 --certificate-file "c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\appservice\tests\latest\server.pfx" --certificate-password test -s slot-ssl-test000004 -webapp show -g clitest.rg000001 -n web-ssl-test000003 -s slot-ssl-test000004 -webapp config ssl bind -g clitest.rg000001 -n web-ssl-test000003 --certificate-thumbprint 9E9735C45C792B03B3FFCCA614852B32EE71AD6B --ssl-type SNI -s slot-ssl-test000004 -webapp show -g clitest.rg000001 -n web-ssl-test000003 -s slot-ssl-test000004 -webapp config ssl unbind -g clitest.rg000001 -n web-ssl-test000003 --certificate-thumbprint 9E9735C45C792B03B3FFCCA614852B32EE71AD6B -s slot-ssl-test000004 -webapp show -g clitest.rg000001 -n web-ssl-test000003 -s slot-ssl-test000004 -webapp config ssl delete -g clitest.rg000001 --certificate-thumbprint 9E9735C45C792B03B3FFCCA614852B32EE71AD6B -webapp show -g clitest.rg000001 -n web-ssl-test000003 -s slot-ssl-test000004 -webapp delete -g clitest.rg000001 -n web-ssl-test000003 -appservice plan create -g clitest.rg000001 -n ssl-test-plan000003 --sku B1 -webapp create -g clitest.rg000001 -n web-ssl-test000004 --plan ssl-test-plan000003 -keyvault set-policy -g clitest.rg000001 --name kv-ssl-test000002 --spn Microsoft.Azure.WebSites --secret-permissions get -keyvault certificate import --name test-cert --vault-name kv-ssl-test000002 --file "c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\appservice\tests\latest\server.pfx" --password test -webapp config ssl import --resource-group clitest.rg000001 --name web-ssl-test000004 --key-vault kv-ssl-test000002 --key-vault-certificate-name test-cert -webapp config ssl bind -g clitest.rg000001 -n web-ssl-test000004 --certificate-thumbprint 9E9735C45C792B03B3FFCCA614852B32EE71AD6B --ssl-type SNI -appservice plan create -g clitest.rg000002 -n ssl-test-plan000003 --sku B1 -webapp create -g clitest.rg000002 -n web-ssl-test000004 --plan ssl-test-plan000003 -keyvault create -g clitest.rg000001 -n kv-ssl-test000005 -keyvault set-policy -g clitest.rg000001 --name kv-ssl-test000005 --spn Microsoft.Azure.WebSites --secret-permissions get -keyvault certificate import --name test-cert --vault-name kv-ssl-test000005 --file "c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\appservice\tests\latest\server.pfx" --password test -webapp config ssl import --resource-group clitest.rg000002 --name web-ssl-test000004 --key-vault /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.KeyVault/vaults/kv-ssl-test000005 --key-vault-certificate-name test-cert -webapp config ssl bind -g clitest.rg000002 -n web-ssl-test000004 --certificate-thumbprint 9E9735C45C792B03B3FFCCA614852B32EE71AD6B --ssl-type SNI -appservice plan create -g clitest.rg000001 -n delete-me-plan000002 --sku B1 --tags plan=plan1 -webapp create -g clitest.rg000001 -n delete-me-web000003 --plan delete-me-plan000002 -webapp delete -g clitest.rg000001 -n delete-me-web000003 -webapp deleted list -g clitest.rg000001 -appservice plan create -g cli_test_webapp_authentication000001 -n webapp-authentication-plan000003 --sku S1 -webapp create -g cli_test_webapp_authentication000001 -n webapp-authentication-test000002 --plan webapp-authentication-plan000003 -webapp auth show -g cli_test_webapp_authentication000001 -n webapp-authentication-test000002 -webapp auth update -g cli_test_webapp_authentication000001 -n webapp-authentication-test000002 --enabled true --action LoginWithFacebook --token-store false --token-refresh-extension-hours 7.2 --runtime-version 1.2.8 --aad-client-id aad_client_id --aad-client-secret aad_secret --aad-client-secret-certificate-thumbprint aad_thumbprint --aad-allowed-token-audiences https://audience1 --aad-token-issuer-url https://issuer_url --facebook-app-id facebook_id --facebook-app-secret facebook_secret --facebook-oauth-scopes public_profile email -appservice plan create -g clitest.rg000001 -n webapp-update-plan000003 --sku S1 -webapp create -g clitest.rg000001 -n webapp-update-test000002 --plan webapp-update-plan000003 -webapp update -g clitest.rg000001 -n webapp-update-test000002 --client-affinity-enabled false --set tags.foo=bar -webapp deployment slot create -g clitest.rg000001 -n webapp-update-test000002 -s s1 -webapp update -g clitest.rg000001 -n webapp-update-test000002 -s s1 --client-affinity-enabled true -appservice plan create -g cli_test_webapp_zipDeploy000001 -n webapp-zipDeploy-plan000003 --sku S1 -webapp create -g cli_test_webapp_zipDeploy000001 -n webapp-zipDeploy-test000002 --plan webapp-zipDeploy-plan000003 -webapp deployment source config-zip -g cli_test_webapp_zipDeploy000001 -n webapp-zipDeploy-test000002 --src "c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\appservice\tests\latest\test.zip" -appservice plan create -g clitest.rg000001 -n web-msi-plan000002 -webapp create -g clitest.rg000001 -n web-msi000003 --plan web-msi-plan000002 -webapp identity assign -g clitest.rg000001 -n web-msi000003 --role Reader --scope /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001 -webapp identity show -g clitest.rg000001 -n web-msi000003 -role assignment list -g clitest.rg000001 --assignee dd93ea65-525b-4cbf-ac7c-81b6ef473b10 -webapp identity show -g clitest.rg000001 -n web-msi000003 -webapp identity remove -g clitest.rg000001 -n web-msi000003 -webapp identity show -g clitest.rg000001 -n web-msi000003 -appservice list-locations --sku F1 -appservice list-locations --sku Free -appservice plan create --is-linux -n webapp-plan000003 -g cli_test000001 -l westus2 -webapp create -n webapp-container000002 -g cli_test000001 -p webapp-plan000003 -i nginx -appservice plan create --hyper-v -n webapp-hyperv-plan000003 -g cli_test000001 --sku p1v3 -l westus2 -webapp create -n webapp-container-e2e000002 -g cli_test000001 -p webapp-hyperv-plan000003 -i mcr.microsoft.com/azure-app-service/windows/parkingpage:latest -network vnet create -g clitest.rg000001 -n vnet000005 --address-prefix 10.0.0.0/16 --subnet-name subnet000004 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n vnetplan000003 --sku P1V2 -webapp create -g clitest.rg000001 -n vnetwebapp000002 --plan vnetplan000003 --vnet vnet000005 --subnet subnet000004 -webapp vnet-integration list -g clitest.rg000001 -n vnetwebapp000002 -webapp vnet-integration remove -g clitest.rg000001 -n vnetwebapp000002 -webapp vnet-integration list -g clitest.rg000001 -n vnetwebapp000002 -network vnet create -g clitest.rg000002 -n vnet000006 --address-prefix 10.0.0.0/16 --subnet-name subnet000005 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n vnetplan000004 --sku P1V2 -webapp create -g clitest.rg000001 -n vnetwebapp000003 --plan vnetplan000004 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnet000006/subnets/subnet000005 -webapp vnet-integration list -g clitest.rg000001 -n vnetwebapp000003 -webapp vnet-integration remove -g clitest.rg000001 -n vnetwebapp000003 -webapp vnet-integration list -g clitest.rg000001 -n vnetwebapp000003 -network vnet create -g clitest.rg000002 -n vnet000006 --address-prefix 10.0.0.0/16 --subnet-name subnet000005 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n vnetplan000004 --sku P1V2 -webapp create -g clitest.rg000001 -n vnetwebapp000003 --plan vnetplan000004 --vnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnet000006 --subnet subnet000005 -webapp vnet-integration list -g clitest.rg000001 -n vnetwebapp000003 -webapp vnet-integration remove -g clitest.rg000001 -n vnetwebapp000003 -webapp vnet-integration list -g clitest.rg000001 -n vnetwebapp000003 -network vnet create -g clitest.rg000001 -n vnet000005 --address-prefix 10.0.0.0/16 --subnet-name subnet000004 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n vnetplan000003 --sku P1V2 -webapp create -g clitest.rg000001 -n vnetwebapp000002 --plan vnetplan000003 --vnet vnet000005 -appservice plan create -g clitest.rg000001 -n vnetplan000003 --sku P1V2 -webapp create -g clitest.rg000001 -n vnetwebapp000002 --plan vnetplan000003 --vnet vnet000005 --subnet subnet000004 -network vnet create -g clitest.rg000002 -n vnet000006 --address-prefix 10.0.0.0/16 --subnet-name subnet000005 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n vnetplan000004 --sku P1V2 -webapp create -g clitest.rg000001 -n vnetwebapp000003 --plan vnetplan000004 --vnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnet000006 --subnet subnet000005 -network vnet create -g clitest.rg000002 -n vnet000006 --address-prefix 10.0.0.0/16 --subnet-name subnet000005 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n vnetplan000004 --sku P1V2 -webapp create -g clitest.rg000001 -n vnetwebapp000003 --plan vnetplan000004 --vnet vnet000006 --subnet subnet000005 -network vnet create -g clitest.rg000001 -n vnet000005 --address-prefix 10.0.0.0/16 --subnet-name subnet000004 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n vnetplan000003 --sku FREE -webapp create -g clitest.rg000001 -n vnetwebapp000002 --plan vnetplan000003 --vnet vnet000005 --subnet subnet000004 -appservice plan create -g clitest.rg000001 -n hcplan000003 --sku S1 -webapp create -g clitest.rg000001 -n hcwebapp000002 --plan hcplan000003 -relay namespace create -g clitest.rg000001 --name hcnamespace000004 -relay hyco create -g clitest.rg000001 --namespace-name hcnamespace000004 --name hcname000005 --user-metadata [{{\"key\":\"endpoint\",\"value\":\"vmsq1:80\"}}] -webapp hybrid-connection add -g clitest.rg000001 -n hcwebapp000002 --namespace hcnamespace000004 --hybrid-connection hcname000005 -webapp hybrid-connection list -g clitest.rg000001 -n hcwebapp000002 -webapp deployment slot create -g clitest.rg000001 -n hcwebapp000002 --slot hcwebapp000002-stage -webapp hybrid-connection add -g clitest.rg000001 -n hcwebapp000002 --namespace hcnamespace000004 --hybrid-connection hcname000005 --slot hcwebapp000002-stage -webapp hybrid-connection list -g clitest.rg000001 -n hcwebapp000002 --slot hcwebapp000002-stage -webapp hybrid-connection remove -g clitest.rg000001 -n hcwebapp000002 --namespace hcnamespace000004 --hybrid-connection hcname000005 -webapp hybrid-connection list -g clitest.rg000001 -n hcwebapp000002 -webapp hybrid-connection remove -g clitest.rg000001 -n hcwebapp000002 --namespace hcnamespace000004 --hybrid-connection hcname000005 --slot hcwebapp000002-stage -webapp hybrid-connection list -g clitest.rg000001 -n hcwebapp000002 --slot hcwebapp000002-stage -network vnet create -g clitest.rg000001 -n swiftname000005 --address-prefix 10.0.0.0/16 --subnet-name swiftsubnet000004 --subnet-prefix 10.0.0.0/24 -network vnet subnet update -g clitest.rg000001 --vnet swiftname000005 --name swiftsubnet000004 --delegations Microsoft.Web/serverfarms --service-endpoints Microsoft.Storage -appservice plan create -g clitest.rg000001 -n swiftplan000003 --sku P1V2 -webapp create -g clitest.rg000001 -n swiftwebapp000002 --plan swiftplan000003 -webapp vnet-integration add -g clitest.rg000001 -n swiftwebapp000002 --vnet swiftname000005 --subnet swiftsubnet000004 -webapp vnet-integration list -g clitest.rg000001 -n swiftwebapp000002 - network vnet subnet show -g clitest.rg000001 -n swiftsubnet000004 --vnet-name swiftname000005 -webapp vnet-integration remove -g clitest.rg000001 -n swiftwebapp000002 -webapp vnet-integration list -g clitest.rg000001 -n swiftwebapp000002 -network vnet create -g clitest.rg000001 -n swiftname000005 --address-prefix 10.0.0.0/16 --subnet-name swiftsubnet000004 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n swiftplan000003 --sku P1V2 -webapp create -g clitest.rg000001 -n swiftwebapp000002 --plan swiftplan000003 -webapp vnet-integration add -g clitest.rg000001 -n swiftwebapp000002 --vnet swiftname000005 --subnet swiftsubnet000004 -webapp vnet-integration list -g clitest.rg000001 -n swiftwebapp000002 -webapp deployment slot create -g clitest.rg000001 -n swiftwebapp000002 --slot swiftwebapp000002-stage -webapp vnet-integration add -g clitest.rg000001 -n swiftwebapp000002 --vnet swiftname000005 --subnet swiftsubnet000004 --slot swiftwebapp000002-stage -webapp vnet-integration list -g clitest.rg000001 -n swiftwebapp000002 --slot swiftwebapp000002-stage -webapp vnet-integration remove -g clitest.rg000001 -n swiftwebapp000002 -webapp vnet-integration list -g clitest.rg000001 -n swiftwebapp000002 -webapp vnet-integration remove -g clitest.rg000001 -n swiftwebapp000002 --slot swiftwebapp000002-stage -webapp vnet-integration list -g clitest.rg000001 -n swiftwebapp000002 --slot swiftwebapp000002-stage -network vnet create -g clitest.rg000001 -n swiftname000005 --address-prefix 10.0.0.0/16 --subnet-name swiftsubnet000004 --subnet-prefix 10.0.0.0/24 -network vnet subnet update -g clitest.rg000001 --vnet swiftname000005 --name swiftsubnet000004 --delegations Microsoft.Web/serverfarms -appservice plan create -g clitest.rg000001 -n swiftplan000003 --sku P1V2 -webapp create -g clitest.rg000001 -n swiftwebapp000002 --plan swiftplan000003 -webapp vnet-integration add -g clitest.rg000001 -n swiftwebapp000002 --vnet swiftname000005 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/swiftname000005/subnets/swiftsubnet000004 -webapp vnet-integration list -g clitest.rg000001 -n swiftwebapp000002 -webapp vnet-integration remove -g clitest.rg000001 -n swiftwebapp000002 -webapp vnet-integration list -g clitest.rg000001 -n swiftwebapp000002 -network vnet create -g clitest.rg000001 -n swiftname000007 --address-prefix 10.0.0.0/16 --subnet-name swiftsubnet000005 --subnet-prefix 10.0.0.0/24 -group create -n swiftwebapp000002 -l japanwest -network vnet create -g swiftwebapp000002 -n swiftname000007 --address-prefix 10.0.0.0/16 --subnet-name swiftsubnet000006 --subnet-prefix 10.0.0.0/24 -appservice plan create -g clitest.rg000001 -n swiftplan000004 --sku P1V2 -webapp create -g clitest.rg000001 -n swiftwebapp000003 --plan swiftplan000004 -webapp vnet-integration add -g clitest.rg000001 -n swiftwebapp000003 --vnet swiftname000007 --subnet swiftsubnet000005 -webapp vnet-integration list -g clitest.rg000001 -n swiftwebapp000003 -webapp vnet-integration remove -g clitest.rg000001 -n swiftwebapp000003 -webapp vnet-integration list -g clitest.rg000001 -n swiftwebapp000003 -webapp vnet-integration add -g clitest.rg000001 -n swiftwebapp000003 --vnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/swiftwebapp000002/providers/Microsoft.Network/virtualNetworks/swiftname000007 --subnet swiftsubnet000006 -webapp vnet-integration list -g clitest.rg000001 -n swiftwebapp000003 -network vnet create -g clitest.rg000001 -n swiftname000005 --address-prefix 10.0.0.0/16 --subnet-name swiftsubnet000004 --subnet-prefix 10.0.0.0/24 -network vnet subnet update -g clitest.rg000001 --vnet swiftname000005 --name swiftsubnet000004 --delegations Microsoft.Web/serverfarms -appservice plan create -g clitest.rg000001 -n swiftplan000003 --sku P1V2 -webapp create -g clitest.rg000001 -n swiftwebapp000002 --plan swiftplan000003 -webapp vnet-integration add -g clitest.rg000001 -n swiftwebapp000002 --vnet swiftname000005 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/swiftname000005/subnets/swiftsubnet000004 -webapp vnet-integration list -g clitest.rg000001 -n swiftwebapp000002 -webapp vnet-integration remove -g clitest.rg000001 -n swiftwebapp000002 -webapp vnet-integration list -g clitest.rg000001 -n swiftwebapp000002 -appservice plan create -g clitest.rg000001 -n list-deployment-plan000003 --sku S1 -webapp create -g clitest.rg000001 -n list-deployment-webapp000002 --plan list-deployment-plan000003 -webapp log deployment list -g clitest.rg000001 -n list-deployment-webapp000002 -webapp deployment source config-zip -g clitest.rg000001 -n list-deployment-webapp000002 --src "c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\appservice\tests\latest\test.zip" -webapp log deployment list -g clitest.rg000001 -n list-deployment-webapp000002 -webapp deployment source config-zip -g clitest.rg000001 -n list-deployment-webapp000002 --src "c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\appservice\tests\latest\test.zip" -webapp log deployment list -g clitest.rg000001 -n list-deployment-webapp000002 -appservice plan create -g clitest.rg000001 -n show-deployment-plan000003 --sku S1 -webapp create -g clitest.rg000001 -n show-deployment-webapp000002 --plan show-deployment-plan000003 -webapp log deployment show -g clitest.rg000001 -n show-deployment-webapp000002 -webapp deployment source config-zip -g clitest.rg000001 -n show-deployment-webapp000002 --src "c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\appservice\tests\latest\test.zip" -webapp log deployment show -g clitest.rg000001 -n show-deployment-webapp000002 -webapp log deployment show -g clitest.rg000001 -n show-deployment-webapp000002 --deployment-id=25980327bbd1479ea08484054a898361 -local-context on -appservice plan create -g {rg} -n {plan_name} -appservice plan show -appservice plan delete -webapp create -n {webapp_name} -webapp show -webapp delete -webapp delete -n {webapp_name} -appservice plan delete -n {plan_name} -y -local-context off -local-context delete --all --purge -y -appservice domain create -g clitest.rg000001 --hostname testuniquedomainname1.com --contact-info=@'c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\appservice\tests\latest\domain-contact.json' --dryrun -network vnet create -g {rg} -n dev-vnet --address-prefixes 10.0.0.0/9 -network vnet subnet create -g {rg} --vnet-name dev-vnet -n {master_subnet} --address-prefixes {master_ip_range} --service-endpoints Microsoft.ContainerRegistry -network vnet subnet create -g {rg} --vnet-name dev-vnet -n {worker_subnet} --address-prefixes {worker_ip_range} --service-endpoints Microsoft.ContainerRegistry -network vnet subnet update -g {rg} --vnet-name dev-vnet -n {master_subnet} --disable-private-link-service-network-policies true -aro create -g {rg} -n {name} --master-subnet {master_subnet_resource} --worker-subnet {worker_subnet_resource} --subscription {subscription} --tags test=create -network vnet create -g {rg} -n dev-vnet --address-prefixes 10.0.0.0/9 -network vnet subnet create -g {rg} --vnet-name dev-vnet -n {master_subnet} --address-prefixes {master_ip_range} --service-endpoints Microsoft.ContainerRegistry -network vnet subnet create -g {rg} --vnet-name dev-vnet -n {worker_subnet} --address-prefixes {worker_ip_range} --service-endpoints Microsoft.ContainerRegistry -network vnet subnet update -g {rg} --vnet-name dev-vnet -n {master_subnet} --disable-private-link-service-network-policies true -aro create -g {rg} -n {name} --master-subnet {master_subnet_resource} --worker-subnet {worker_subnet_resource} --subscription {subscription} --tags test=delete -aro delete -y -g {rg} -n {name} --subscription {subscription} -network vnet create -g {rg} -n dev-vnet --address-prefixes 10.0.0.0/9 -network vnet subnet create -g {rg} --vnet-name dev-vnet -n {master_subnet} --address-prefixes {master_ip_range} --service-endpoints Microsoft.ContainerRegistry -network vnet subnet create -g {rg} --vnet-name dev-vnet -n {worker_subnet} --address-prefixes {worker_ip_range} --service-endpoints Microsoft.ContainerRegistry -network vnet subnet update -g {rg} --vnet-name dev-vnet -n {master_subnet} --disable-private-link-service-network-policies true -aro create -g {rg} -n {name} --master-subnet {master_subnet_resource} --worker-subnet {worker_subnet_resource} --subscription {subscription} --tags test=list -aro list -g {rg} --subscription {subscription} -network vnet create -g {rg} -n dev-vnet --address-prefixes 10.0.0.0/9 -network vnet subnet create -g {rg} --vnet-name dev-vnet -n {master_subnet} --address-prefixes {master_ip_range} --service-endpoints Microsoft.ContainerRegistry -network vnet subnet create -g {rg} --vnet-name dev-vnet -n {worker_subnet} --address-prefixes {worker_ip_range} --service-endpoints Microsoft.ContainerRegistry -network vnet subnet update -g {rg} --vnet-name dev-vnet -n {master_subnet} --disable-private-link-service-network-policies true -aro create -g {rg} -n {name} --master-subnet {master_subnet_resource} --worker-subnet {worker_subnet_resource} --subscription {subscription} --tags test=list-cred -aro list-credentials -g {rg} -n {name} --subscription {subscription} -network vnet create -g {rg} -n dev-vnet --address-prefixes 10.0.0.0/9 -network vnet subnet create -g {rg} --vnet-name dev-vnet -n {master_subnet} --address-prefixes {master_ip_range} --service-endpoints Microsoft.ContainerRegistry -network vnet subnet create -g {rg} --vnet-name dev-vnet -n {worker_subnet} --address-prefixes {worker_ip_range} --service-endpoints Microsoft.ContainerRegistry -network vnet subnet update -g {rg} --vnet-name dev-vnet -n {master_subnet} --disable-private-link-service-network-policies true -aro create -g {rg} -n {name} --master-subnet {master_subnet_resource} --worker-subnet {worker_subnet_resource} --subscription {subscription} --tags test=show -aro show -g {rg} -n {name} --subscription {subscription} --output table -network vnet create -g {rg} -n dev-vnet --address-prefixes 10.0.0.0/9 -network vnet subnet create -g {rg} --vnet-name dev-vnet -n {master_subnet} --address-prefixes {master_ip_range} --service-endpoints Microsoft.ContainerRegistry -network vnet subnet create -g {rg} --vnet-name dev-vnet -n {worker_subnet} --address-prefixes {worker_ip_range} --service-endpoints Microsoft.ContainerRegistry -network vnet subnet update -g {rg} --vnet-name dev-vnet -n {master_subnet} --disable-private-link-service-network-policies true -aro create -g {rg} -n {name} --master-subnet {master_subnet_resource} --worker-subnet {worker_subnet_resource} --subscription {subscription} --tags test=update -aro update -g {rg} -n {name} --subscription {subscription} -backup container show -n {sa2} -v {vault} -g {rg} --backup-management-type {type} -backup container show -n {container_name} -v {vault} -g {rg} -backup container list -v {vault} -g {rg} --backup-management-type {type} -backup protection disable -g {rg} -v {vault} -c {sa1} -i {item1} --backup-management-type AzureStorage --delete-backup-data true --yes -backup protection disable -g {rg} -v {vault} -c {sa2} -i {item2} --backup-management-type AzureStorage --delete-backup-data true --yes -backup container unregister -g {rg} -v {vault} -c {sa1} --yes --backup-management-type AzureStorage -backup container unregister -g {rg} -v {vault} -c {sa2} --yes --backup-management-type AzureStorage -backup container show -g {rg} -v {vault} -n {container} --backup-management-type {type} --query name -backup item show -g {rg} -v {vault} -c {container1} -n {item1} -backup item show -g {rg} -v {vault} -c {container1} -n {item1_fullname} -backup item list -g {rg} -v {vault} -c {container} -backup item list -g {rg} -v {vault} -c {container} -backup item list -g {rg} -v {vault} -c {container1} -backup item set-policy -g {rg} -v {vault} -c {container1} -n {item1} -p {newpolicy} -backup item show -g {rg} -v {vault} -c {container1} -n {item1} -backup protection disable -g {rg} -v {vault} -c {container} -i {item1} --backup-management-type AzureStorage --delete-backup-data true --yes -backup protection disable -g {rg} -v {vault} -c {container} -i {item2} --backup-management-type AzureStorage --delete-backup-data true --yes -backup container unregister -g {rg} -v {vault} -c {container} --yes --backup-management-type AzureStorage -backup policy list -g {rg} -v {vault} --backup-management-type {type} -backup policy show -g {rg} -v {vault} -n {policy} -backup policy create -g {rg} -v {vault} --policy '{policy1_json}' --name {policy2} --backup-management-type {type} -backup policy show -g {rg} -v {vault} --n {policy2} -backup policy list -g {rg} -v {vault} --backup-management-type {type} -backup policy set -g {rg} -v {vault} --policy '{policy2_json}' -n {policy2} -backup policy show -g {rg} -v {vault} -n {policy2} -backup item list -g {rg} -v {vault} -c {container} --backup-management-type AzureStorage --query [0].name -backup protection disable -g {rg} -v {vault} -c {container} -i {afsitem} --backup-management-type AzureStorage --delete-backup-data true --yes -backup container unregister -g {rg} -v {vault} -c {container} --yes --backup-management-type AzureStorage -backup protection enable-for-azurefileshare -g {rg} -v {vault} --storage-account {container} --azure-file-share {item} -p {policy} -backup item list -g {rg} -v {vault} -c {container} --backup-management-type {type} -backup protection disable -g {rg} -v {vault} -c {container} -i {item} --backup-management-type {type} --yes -backup item show -g {rg} -v {vault} -c {container} -n {item} --backup-management-type {type} -backup protection disable -g {rg} -v {vault} -c {container} -i {item} --backup-management-type {type} --delete-backup-data true --yes -backup item list -g {rg} -v {vault} -c {container} --backup-management-type {type} -backup container unregister -g {rg} -v {vault} -c {container} --yes --backup-management-type AzureStorage -backup recoverypoint list -g {rg} -v {vault} -c {container} -i {item1} --backup-management-type {type} --query [].name -backup restore restore-azurefileshare -g {rg} -v {vault} -c {container} -i {item1} -r {rp1} --resolve-conflict Overwrite --restore-mode OriginalLocation -backup job wait -g {rg} -v {vault} -n {job1} -backup job show -g {rg} -v {vault} -n {job1} -backup restore restore-azurefileshare -g {rg} -v {vault} -c {container} -i {item1} -r {rp1} --resolve-conflict Overwrite --restore-mode AlternateLocation --target-storage-account {container} --target-file-share {item2} --target-folder folder1 -backup job wait -g {rg} -v {vault} -n {job2} -backup job show -g {rg} -v {vault} -n {job2} -backup restore restore-azurefiles -g {rg} -v {vault} -c {container} -i {item1} -r {rp1} --resolve-conflict Overwrite --restore-mode AlternateLocation --source-file-type File --source-file-path {file} --target-storage-account {container} --target-file-share {item2} --target-folder folder1 -backup job wait -g {rg} -v {vault} -n {job3} -backup job show -g {rg} -v {vault} -n {job3} -backup restore restore-azurefiles -g {rg} -v {vault} -c {container} -i {item1} -r {rp1} --resolve-conflict Overwrite --restore-mode OriginalLocation --source-file-type File --source-file-path {file} -backup job wait -g {rg} -v {vault} -n {job4} -backup job show -g {rg} -v {vault} -n {job4} -backup restore restore-azurefiles -g {rg} -v {vault} -c {container} -i {item1} -r {rp1} --resolve-conflict Overwrite --restore-mode AlternateLocation --source-file-type File --source-file-path {file} {file2} --target-storage-account {container} --target-file-share {item2} --target-folder folder1 -backup job wait -g {rg} -v {vault} -n {job5} -backup job show -g {rg} -v {vault} -n {job5} -backup protection disable -g {rg} -v {vault} -c {container} -i {item1} --backup-management-type AzureStorage --delete-backup-data true --yes -backup container unregister -g {rg} -v {vault} -c {container} --yes --backup-management-type AzureStorage -backup recoverypoint list -g {rg} -v {vault} -c {container} -i {item1} --backup-management-type {type} --query [].name -backup recoverypoint show -g {rg} -v {vault} -c {container} -i {item1} -n {rp1} --backup-management-type {type} -backup recoverypoint list -g {rg} -v {vault} -c {container} -i {item1} --backup-management-type {type} -backup protection backup-now -g {rg} -v {vault} -c {container} -i {item1} --retain-until {retain_date} --backup-management-type AzureStorage --query name -backup job wait -g {rg} -v {vault} -n {job} -backup recoverypoint list -g {rg} -v {vault} -c {container} -i {item1} --backup-management-type {type} -backup protection disable -g {rg} -v {vault} -c {container} -i {item1} --backup-management-type AzureStorage --delete-backup-data true --yes -backup container unregister -g {rg} -v {vault} -c {container} --yes --backup-management-type AzureStorage -backup protection enable-for-azurefileshare -g {rg} -v {vault} --storage-account {container} --azure-file-share {item} -p {policy} -backup protection backup-now -g {rg} -v {vault} -c {container} -i {item} --retain-until {retain_date} --backup-management-type AzureStorage --query name -backup job wait -g {rg} -v {vault} -n {job} -backup recoverypoint list -g {rg} -v {vault} -c {container} -i {item} --backup-management-type AzureStorage --query [0].name -backup restore restore-azurefileshare -g {rg} -v {vault} -c {container} -i {item} -r {rp} --resolve-conflict Overwrite --restore-mode OriginalLocation --query name -backup job wait -g {rg} -v {vault} -n {job} -backup protection disable -g {rg} -v {vault} -c {container} -i {item} --backup-management-type AzureStorage --delete-backup-data true --yes -backup container unregister -g {rg} -v {vault} -c {container} --yes --backup-management-type AzureStorage -backup container show -n {container} -v {vault} -g {rg} --backup-management-type {type} -backup item list -g {rg} -v {vault} -c {container} --query [0].name -backup protection disable -g {rg} -v {vault} -c {container_name} -i {item} --backup-management-type AzureStorage --delete-backup-data true --yes -backup container unregister -g {rg} -v {vault} -c {container_name} --yes -backup container list -v {vault} -g {rg} --backup-management-type {type} -backup container show -n {vm} -v {vault} -g {rg} --backup-management-type AzureIaasVM --query properties.friendlyName -backup item list -g {rg} -v {vault} -c {container} --backup-management-type AzureIaasVM --workload-type VM --query [0].properties.friendlyName -backup recoverypoint list --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {container} -i {item} -backup recoverypoint list -g {rg} -v {vault} -i {item} -c {container} --backup-management-type AzureIaasVM --is-ready-for-move {rp1_is_ready_for_move} --target-tier VaultArchive --query [0] -backup recoverypoint list -g {rg} -v {vault} -i {item} -c {container} --backup-management-type AzureIaasVM --tier {rp1_tier} --query [0] -backup recoverypoint list -g {rg} -v {vault} -i {item} -c {container} --backup-management-type AzureIaasVM --recommended-for-archive -backup container show --backup-management-type AzureIaasVM -n {vm1} -v {vault} -g {rg} -vm show -n {vm1} -g {rg} -backup container list --backup-management-type AzureIaasVM -v {vault} -g {rg} -backup vault backup-properties set -g {rg} -n {vault} --soft-delete-feature-state Disable -vm disk attach -g {rg} --vm-name {vm} --name mydisk1 --new --size-gb 10 -vm disk attach -g {rg} --vm-name {vm} --name mydisk2 --new --size-gb 10 -vm disk attach -g {rg} --vm-name {vm} --name mydisk3 --new --size-gb 10 -backup protection enable-for-vm -g {rg} -v {vault} --vm {vm} -p DefaultPolicy --disk-list-setting include --diskslist 0 1 -backup item show --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {vm} -n {vm} -backup protection update-for-vm -g {rg} -v {vault} -c {vm} -i {vm} --exclude-all-data-disks -backup protection update-for-vm -g {rg} -v {vault} -c {vm} -i {vm} --disk-list-setting exclude --diskslist 1 -backup item show --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {vm} -n {vm} -backup protection backup-now -g {rg} -v {vault} -c {vm} -i {vm} --backup-management-type AzureIaasVM --workload-type VM --retain-until {retain_date} --query name -backup job wait -g {rg} -v {vault} -n {job} -backup recoverypoint list --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {vm} -i {vm} --query [0].name -backup restore restore-disks -g {rg} -v {vault} -c {vm} -i {vm} -r {rp} -t {rg} --storage-account {sa} --restore-to-staging-storage-account --restore-only-osdisk -backup job wait -g {rg} -v {vault} -n {job} -backup job show -g {rg} -v {vault} -n {job} -backup restore restore-disks -g {rg} -v {vault} -c {vm} -i {vm} -r {rp} -t {rg} --storage-account {sa} --restore-to-staging-storage-account --diskslist 0 -backup job wait -g {rg} -v {vault} -n {job2} -backup job show -g {rg} -v {vault} -n {job2} -identity create -n {identity1} -g {rg} --query id -identity show -n {identity1} -g {rg} --query principalId -identity create -n {identity2} -g {rg} --query id -identity show -n {identity2} -g {rg} --query principalId -backup vault identity assign --user-assigned {identity1_id} {identity2_id} -g {rg} -n {vault1} -backup vault identity assign --system-assigned -g {rg} -n {vault1} -backup vault identity assign --user-assigned {identity1_id} -g {rg} -n {vault2} -backup vault identity assign --system-assigned -g {rg} -n {vault2} -keyvault update --name {key_vault} --enable-soft-delete --enable-purge-protection -keyvault key create --vault-name {key_vault} -n {key1} --kty RSA --disabled false --ops decrypt encrypt sign unwrapKey verify wrapKey --size 2048 -keyvault key create --vault-name {key_vault} -n {key2} --kty RSA --disabled false --ops decrypt encrypt sign unwrapKey verify wrapKey --size 2048 -keyvault set-policy --name {key_vault} --object-id {identity1_principalid} --key-permissions {identity_permissions} -keyvault set-policy --name {key_vault} --object-id {identity2_principalid} --key-permissions {identity_permissions} -keyvault set-policy --name {key_vault} --object-id {system1_principalid} --key-permissions {identity_permissions} -keyvault set-policy --name {key_vault} --object-id {system2_principalid} --key-permissions {identity_permissions} -backup vault encryption update --encryption-key-id {key1_id} --mi-user-assigned {identity1_id} -g {rg} -n {vault1} -backup vault encryption show -n {vault1} -g {rg} -backup vault encryption update --encryption-key-id {key1_id} --mi-user-assigned {identity2_id} -g {rg} -n {vault1} -backup vault encryption show -n {vault1} -g {rg} -backup vault encryption update --encryption-key-id {key2_id} --mi-system-assigned -g {rg} -n {vault1} -backup vault encryption show -n {vault1} -g {rg} -backup vault encryption update --encryption-key-id {key1_id} -g {rg} -n {vault1} -backup vault encryption show -n {vault1} -g {rg} -backup vault encryption update --encryption-key-id {key2_id} --mi-system-assigned --infrastructure-encryption Enabled -g {rg} -n {vault2} -backup vault encryption show -n {vault2} -g {rg} -backup vault encryption update --encryption-key-id {key1_id} --mi-user-assigned {identity1_id} -g {rg} -n {vault2} -backup vault encryption show -n {vault2} -g {rg} -identity create -n {identity1} -g {rg} --query id -identity create -n {identity2} -g {rg} --query id -identity create -n {identity3} -g {rg} --query id -backup vault identity assign --user-assigned {identity1_id} {identity2_id} -g {rg} -n {vault} -backup vault identity assign --system-assigned -g {rg} -n {vault} -backup vault identity assign --user-assigned {identity3_id} -g {rg} -n {vault} -backup vault identity remove --system-assigned --user-assigned {identity1_id} -g {rg} -n {vault} -backup vault identity assign --system-assigned --user-assigned {identity1_id} -g {rg} -n {vault} -backup vault identity remove --system-assigned --user-assigned -g {rg} -n {vault} -backup vault identity assign --system-assigned -g {rg} -n {vault} -backup vault identity assign --user-assigned {identity1_id} {identity2_id} -g {rg} -n {vault} -backup vault identity remove --system-assigned -g {rg} -n {vault} -backup vault identity remove --user-assigned -g {rg} -n {vault} -backup container show --backup-management-type AzureIaasVM -n {vm1} -v {vault} -g {rg} --query properties.friendlyName -backup container show --backup-management-type AzureIaasVM -n {vm2} -v {vault} -g {rg} --query properties.friendlyName -backup item show --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {container1} -n {vm1} -backup container show --backup-management-type AzureIaasVM -n {vm1} -v {vault} -g {rg} --query name -backup item show --workload-type VM -g {rg} -v {vault} -c {container1_fullname} -n {vm1} -backup item show --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {container1_fullname} -n {item1_fullname} -backup item list --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {container1} -backup item list --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {container1_fullname} -backup item list --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {container2} -backup item list --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -backup item set-policy --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {container1} -n {vm1} -p {policy} -backup item show --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {container1} -n {vm1} -backup recoverypoint list --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {vm} -i {vm} --query [0].name -backup restore restore-disks -g {rg} -v {vault} -c {vm} -i {vm} -r {rp} --storage-account {sa} --query name --restore-to-staging-storage-account -backup job show -g {rg} -v {vault} -n {job} -backup job list -g {rg} -v {vault} -backup job list -g {rg} -v {vault} --status InProgress -backup job list -g {rg} -v {vault} --operation Restore -backup job list -g {rg} -v {vault} --operation Restore --status InProgress -backup job stop -g {rg} -v {vault} -n {job} -backup policy show -g {rg} -v {vault} -n {policy1} -backup policy list -g {rg} -v {vault} -backup policy list-associated-items -g {rg} -v {vault} -n {default} -backup policy create --backup-management-type {backup-management-type} -g {rg} -v {vault} -n {policy5} --policy '{policy5_json}' -backup policy delete -g {rg} -v {vault} -n {policy5} -backup policy set -g {rg} -v {vault} --policy '{policy1_json}' -backup policy list -g {rg} -v {vault} -backup policy delete -g {rg} -v {vault} -n {policy3} -backup policy list -g {rg} -v {vault} -backup policy show -g {rg} -v {vault} -n {policy2} -vm show -g {rg} -n {vm} --query id -backup protection check-vm --vm-id {vm_id} -backup protection enable-for-vm -g {rg} -v {vault} --vm {vm} -p DefaultPolicy -backup vault show -g {rg} -n {vault} --query id -backup protection check-vm --vm-id {vm_id} -backup protection disable --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {vm} -i {vm} --yes -backup item show --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {vm} -n {vm} -backup protection disable --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {vm} -i {vm} --delete-backup-data true --yes -backup container list --backup-management-type AzureIaasVM -v {vault} -g {rg} -backup protection check-vm --vm-id {vm_id} -backup recoverypoint list --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {vm} -i {vm} --query [0].name -backup restore restore-disks -g {rg} -v {vault} -c {vm} -i {vm} -r {rp} --storage-account {sa} --restore-to-staging-storage-account false -backup restore restore-disks -g {rg} -v {vault} -c {vm} -i {vm} -r {rp} -t {target_rg} --storage-account {sa} --restore-to-staging-storage-account -backup job wait -g {rg} -v {vault} -n {job} -backup job show -g {rg} -v {vault} -n {job} -storage blob exists --account-name {sa} -c {container} -n {blob} -backup restore restore-disks -g {rg} -v {vault} -c {vm} -i {vm} -r {rp} --restore-as-unmanaged-disks --storage-account {sa} -backup job wait -g {rg} -v {vault} -n {job2} -backup job show -g {rg} -v {vault} -n {job2} -backup recoverypoint list --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {vm} -i {vm} --query [].name -backup recoverypoint show --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {vm} -i {vm} -n {rp1} -backup recoverypoint show --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {vm} -i {vm} -n {rp2} -backup protection enable-for-vm -g {rg} -v {vault} --vm {vm} -p DefaultPolicy -backup container show -n {vm} -v {vault} -g {rg} --backup-management-type AzureIaasVM --query properties.friendlyName -backup item list -g {rg} -v {vault} -c {container} --backup-management-type AzureIaasVM --workload-type VM --query [0].properties.friendlyName -backup protection backup-now -g {rg} -v {vault} -c {container} -i {item} --backup-management-type AzureIaasVM --workload-type VM --retain-until {retain_date} --query name -backup job wait -g {rg} -v {vault} -n {job} -backup recoverypoint list -g {rg} -v {vault} -c {container} -i {item} --backup-management-type AzureIaasVM --workload-type VM --query [0].name -backup restore restore-disks -g {rg} -v {vault} -c {container} -i {item} -r {recovery_point} --storage-account {sa} --query name --restore-to-staging-storage-account -backup job wait -g {rg} -v {vault} -n {job} -backup protection disable -g {rg} -v {vault} -c {container} -i {item} --backup-management-type AzureIaasVM --workload-type VM --yes -backup protection resume -g {rg} -v {vault} -c {container} -i {item} --policy-name DefaultPolicy --backup-management-type AzureIaasVM -backup protection disable -g {rg} -v {vault} -c {container} -i {item} --backup-management-type AzureIaasVM --workload-type VM --delete-backup-data true --yes -backup protection disable --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {vm} -i {vm} --delete-backup-data --yes -backup item show --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {vm} -n {vm} -backup protection undelete -g {rg} -v {vault} -c {vm} -i {vm} --workload-type VM --backup-management-type AzureIaasVM -backup vault backup-properties set -g {rg} -n {vault} --soft-delete-feature-state Disable -backup item show --backup-management-type AzureIaasVM --workload-type VM -g {rg} -v {vault} -c {vm} -n {vm} -backup vault create -n {vault3} -g {rg} -l {loc} -backup vault create -n {vault4} -g {rg} -l {loc} -backup vault list -backup vault list -g {rg} -backup vault backup-properties show -n {vault1} -g {rg} --query [0] -backup vault backup-properties set -n {vault1} -g {rg} --backup-storage-redundancy {model} -backup vault backup-properties show -n {vault1} -g {rg} --query [0] -backup vault backup-properties set -n {vault1} -g {rg} --backup-storage-redundancy {model} -backup vault backup-properties show -n {vault1} -g {rg} --query [0] -backup vault delete -n {vault4} -g {rg} -y -backup vault list -backup recoverypoint list --backup-management-type AzureWorkload --workload-type SAPHANA -g {rg} -v {vault} -c {container} -i {item} -backup recoverypoint list -g {rg} -v {vault} -i {item} -c {container} --backup-management-type AzureWorkload --is-ready-for-move {rp1_is_ready_for_move} --target-tier VaultArchive --query [0] -backup recoverypoint list -g {rg} -v {vault} -i {item} -c {container} --backup-management-type AzureWorkload --tier {rp1_tier} --query [0] -backup recoverypoint move -g {rg} -v {vault} -i {item} -c {container} --source-tier VaultStandard --destination-tier VaultArchive --name {rp_move} -backup recoveryconfig show --vault-name {vault} -g {rg} --restore-mode OriginalWorkloadRestore --item-name {item} --container-name {container} --rp-name {rp_restore} -backup restore restore-azurewl -g {rg} -v {vault} --recovery-config recoveryconfig_hana_archive.json --rehydration-priority High -backup container register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} --resource-id {id} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container show -n {name} -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container show -n {container_name} -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container re-register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} -y --container-name {name} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container unregister -v {vault} -g {rg} -c {name} -y -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} --resource-id {id} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup protection enable-for-azurewl -v {vault} -g {rg} -p {policy} --protectable-item-type {pit} --protectable-item-name {item} --server-name {fname} --workload-type {wt} -backup container show -n {name} -v {vault} -g {rg} --backup-management-type AzureWorkload --query name -backup item show -g {rg} -v {vault} -c {name} -n {item} --backup-management-type AzureWorkload --workload-type SAPHanaDatabase -backup container show -n {name} -v {vault} -g {rg} --backup-management-type AzureWorkload --query name -backup item show -g {rg} -v {vault} -c {container1_fullname} -n {item} --backup-management-type AzureWorkload --workload-type {wt} -backup item show -g {rg} -v {vault} -c {container1_fullname} -n {item1_fullname} --backup-management-type AzureWorkload --workload-type SAPHanaDatabase -backup item list -g {rg} -v {vault} -c {container1} --backup-management-type AzureWorkload --workload-type SAPHanaDatabase -backup item list -g {rg} -v {vault} -c {container1_fullname} --backup-management-type AzureWorkload --workload-type SAPHanaDatabase -backup item list -g {rg} -v {vault} --backup-management-type AzureWorkload --workload-type SAPHanaDatabase -backup item set-policy -g {rg} -v {vault} -c {container1} -n {item1_fullname} -p {policy} --backup-management-type AzureWorkload --workload-type SAPHanaDatabase -backup item show -g {rg} -v {vault} -c {container1} -n {item} --backup-management-type AzureWorkload --workload-type SAPHanaDatabase -backup protection disable -v {vault} -g {rg} -c {container1} --backup-management-type AzureWorkload --workload-type {wt} -i {item} -y --delete-backup-data true -backup container unregister -v {vault} -g {rg} -c {name} -y -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup policy show -g {rg} -v {vault} -n {policy} -backup policy create -g {rg} -v {vault} --policy {policy_json} --backup-management-type AzureWorkload --workload-type {wt} --name {policy_new} -backup policy list -g {rg} -v {vault} -backup policy show -g {rg} -v {vault} -n {policy_new} -backup policy delete -g {rg} -v {vault} -n {policy_new} -backup policy list -g {rg} -v {vault} -backup container register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} --resource-id {id} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container show -n {name} -v {vault} -g {rg} --query properties.friendlyName --backup-management-type AzureWorkload -backup protectable-item list -g {rg} --vault-name {vault} --workload-type {wt} -backup protectable-item show -g {rg} --vault-name {vault} --name {protectable_item_name} --workload-type {wt} --protectable-item-type {pit} --server-name {fname} -backup container unregister -v {vault} -g {rg} -c {name} -y -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} --resource-id {id} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup protection enable-for-azurewl -v {vault} -g {rg} -p {policy} --protectable-item-type {pit} --protectable-item-name {item} --server-name {fname} --workload-type {wt} -backup container show -n {name} -v {vault} -g {rg} --backup-management-type AzureWorkload --query name -backup protection backup-now -v {vault} -g {rg} -i {item} -c {name} --backup-type Full --enable-compression false -backup job wait -v {vault} -g {rg} -n {job} -backup item show -g {rg} -v {vault} -c {container1} -n {item} --backup-management-type AzureWorkload -backup protection disable -v {vault} -g {rg} -i {item} -c {name} --backup-management-type AzureWorkload -y -backup item show -g {rg} -v {vault} -c {container1} -n {item} --backup-management-type AzureWorkload -backup protection disable -v {vault} -g {rg} -c {container1} --backup-management-type AzureWorkload --workload-type {wt} -i {item} -y --delete-backup-data true -backup container unregister -v {vault} -g {rg} -c {name} -y -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} --resource-id {id} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup protection enable-for-azurewl --vault-name {vault} -g {rg} -p {policy} --protectable-item-type {pit} --protectable-item-name {item} --server-name {fname} --workload-type {wt} -backup container show -n {name} -v {vault} -g {rg} --backup-management-type AzureWorkload --query name -backup protection backup-now -v {vault} -g {rg} -c {name} -i {item} --backup-type Full --enable-compression false -backup job wait -v {vault} -g {rg} -n {job} -backup item show -g {rg} -v {vault} -c {container1} -n {item} --backup-management-type AzureWorkload -backup recoverypoint list -g {rg} -v {vault} -c {name} -i {item} --workload-type {wt} --query [0] -backup recoveryconfig show --vault-name {vault} -g {rg} --restore-mode AlternateWorkloadRestore --rp-name {rp} --item-name {item} --container-name {container1} --target-item-name {titem} --target-server-type {tpit} --target-server-name {fname} --workload-type {wt} -backup restore restore-azurewl --vault-name {vault} -g {rg} --recovery-config recoveryconfig_hana_restore.json -backup job wait -v {vault} -g {rg} -n {job} -backup recoveryconfig show --vault-name {vault} -g {rg} --restore-mode OriginalWorkloadRestore --item-name {item} --container-name {container1} --rp-name {rp} -backup restore restore-azurewl --vault-name {vault} -g {rg} --recovery-config recoveryconfig_hana_restore.json -backup job wait -v {vault} -g {rg} -n {job} -backup protection disable -v {vault} -g {rg} -c {container1} --backup-management-type AzureWorkload --workload-type SAPHanaDatabase -i {item} -y -backup item show -g {rg} -v {vault} -c {container1} -n {item} --backup-management-type AzureWorkload -backup protection disable -v {vault} -g {rg} -c {container1} --backup-management-type AzureWorkload --workload-type {wt} -i {item} -y --delete-backup-data true -backup container unregister -v {vault} -g {rg} -c {name} -y -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} --resource-id {id} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup protection enable-for-azurewl -v {vault} -g {rg} -p {policy} --protectable-item-type {pit} --protectable-item-name {item} --server-name {fname} --workload-type {wt} -backup container show -n {name} -v {vault} -g {rg} --backup-management-type AzureWorkload --query name -backup recoverypoint list -g {rg} -v {vault} -c {name} -i {item} --workload-type {wt} --query [].name -backup recoverypoint show-log-chain -g {rg} -v {vault} -c {name} -i {item} --workload-type {wt} -backup recoverypoint show-log-chain -g {rg} -v {vault} -c {name} -i {item} --workload-type {wt} -backup protection disable -v {vault} -g {rg} -c {container1} --backup-management-type AzureWorkload --workload-type {wt} -i {item} -y --delete-backup-data true -backup container unregister -v {vault} -g {rg} -c {name} -y -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup recoverypoint list --backup-management-type AzureWorkload --workload-type MSSQL -g {rg} -v {vault} -c {container} -i {item} -backup recoverypoint list -g {rg} -v {vault} -i {item} -c {container} --backup-management-type AzureWorkload --is-ready-for-move {rp1_is_ready_for_move} --target-tier VaultArchive --query [0] -backup recoverypoint list -g {rg} -v {vault} -i {item} -c {container} --backup-management-type AzureWorkload --tier {rp1_tier} --query [0] -backup recoverypoint move -g {rg} -v {vault} -i {item} -c {container} --source-tier VaultStandard --destination-tier VaultArchive --name {rp_move} -backup recoverypoint list --backup-management-type AzureWorkload --workload-type MSSQL -g {rg} -v {vault} -c {container} -i {item} --tier VaultArchive --query [0] -backup recoveryconfig show --vault-name {vault} -g {rg} --restore-mode OriginalWorkloadRestore --item-name {item} --container-name {container} --rp-name {rp_restore} -backup restore restore-azurewl -g {rg} -v {vault} --recovery-config recoveryconfig_sql_archive.json --rehydration-priority High -backup container register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} --resource-id {id} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup protection auto-enable-for-azurewl -v {vault} -g {rg} -p {policy} --protectable-item-name {item} --protectable-item-type {pit} --server-name {fname} --workload-type {wt} -backup protection auto-disable-for-azurewl -v {vault} -g {rg} --protectable-item-name {item} --protectable-item-type {pit} --server-name {fname} --workload-type {wt} -backup container unregister -v {vault} -g {rg} -c {name} -y -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} --resource-id {id} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container show -n {name} -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container show -n {container_name} -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container re-register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} -y --container-name {name} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container unregister -v {vault} -g {rg} -c {name} -y -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container show -n {name} -v {vault} -g {rg} --backup-management-type AzureWorkload --query name -backup item show -g {rg} -v {vault} -c {container1} -n {item} --backup-management-type AzureWorkload -backup recoverypoint list -g {rg} -v {vault} -c {name} -i {item} --workload-type {wt} --use-secondary-region --query [0] -backup recoveryconfig show --vault-name {vault} -g {rg} --restore-mode AlternateWorkloadRestore --rp-name {rp} --item-name {item} --container-name {container1} --target-item-name {titem} --target-server-type SQLInstance --target-server-name {tserver} --target-container-name {tcontainer} --workload-type {wt} --target-vault-name {tvault} --target-resource-group {trg} -backup restore restore-azurewl --vault-name {vault} -g {rg} --recovery-config recoveryconfig_sql_crr.json --use-secondary-region -backup job wait -v {vault} -g {rg} -n {job} --use-secondary-region -backup recoveryconfig show --vault-name {vault} -g {rg} --restore-mode restoreasfiles --rp-name {rp} --item-name {item} --container-name {container1} --target-container-name {tcontainer} --workload-type {wt} --target-vault-name {tvault} --target-resource-group {trg} --filepath "C:" -backup restore restore-azurewl --vault-name {vault} -g {rg} --recovery-config recoveryconfig_sql_crr.json --use-secondary-region -backup job wait -v {vault} -g {rg} -n {job} --use-secondary-region -backup container register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} --resource-id {id} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup protection enable-for-azurewl -v {vault} -g {rg} -p {policy} --protectable-item-type {pit} --protectable-item-name {item} --server-name {fname} --workload-type {wt} -backup container show -n {name} -v {vault} -g {rg} --backup-management-type AzureWorkload --query name -backup item show -g {rg} -v {vault} -c {name} -n {item} --backup-management-type AzureWorkload --workload-type {wt} -backup container show -n {name} -v {vault} -g {rg} --backup-management-type AzureWorkload --query name -backup item show -g {rg} -v {vault} -c {container1_fullname} -n {item} --backup-management-type AzureWorkload --workload-type {wt} -backup item show -g {rg} -v {vault} -c {container1_fullname} -n {item1_fullname} --backup-management-type AzureWorkload --workload-type SAPHanaDatabase -backup item list -g {rg} -v {vault} -c {container1} --backup-management-type AzureWorkload --workload-type SQLDataBase -backup item list -g {rg} -v {vault} -c {container1_fullname} --backup-management-type AzureWorkload --workload-type SQLDataBase -backup item list -g {rg} -v {vault} --backup-management-type AzureWorkload --workload-type SQLDataBase -backup item set-policy -g {rg} -v {vault} -c {container1} -n {item1_fullname} -p {policy} --backup-management-type AzureWorkload --workload-type SQLDataBase -backup item show -g {rg} -v {vault} -c {container1} -n {item} --backup-management-type AzureWorkload --workload-type SQLDataBase -backup protection disable -v {vault} -g {rg} -c {container1} --backup-management-type AzureWorkload --workload-type {wt} -i {item} -y --delete-backup-data true -backup container unregister -v {vault} -g {rg} -c {name} -y -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup policy show -g {rg} -v {vault} -n {policy} -backup policy create -g {rg} -v {vault} --policy {policy_json} --backup-management-type AzureWorkload --workload-type {wt} --name {policy_new} -backup policy list -g {rg} -v {vault} -backup policy set -g {rg} -v {vault} --policy {policy1_json} -n {policy_new} -backup policy set -g {rg} -v {vault} --backup-management-type AzureWorkload --fix-for-inconsistent-items -n {policy_new} -backup policy show -g {rg} -v {vault} -n {policy_new} -backup policy delete -g {rg} -v {vault} -n {policy_new} -backup policy list -g {rg} -v {vault} -backup container register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} --resource-id {id} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container show -n {name} -v {vault} -g {rg} --query properties.friendlyName --backup-management-type AzureWorkload -backup protectable-item list -g {rg} --vault-name {vault} --workload-type {wt} -backup protectable-item show -g {rg} --vault-name {vault} --name {protectable_item_name} --workload-type {wt} --protectable-item-type {pit} --server-name {fname} -backup container unregister -v {vault} -g {rg} -c {name} -y -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} --resource-id {id} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup protection enable-for-azurewl -v {vault} -g {rg} -p {policy} --protectable-item-type {pit} --protectable-item-name {item} --server-name {fname} --workload-type {wt} -backup container show -n {name} -v {vault} -g {rg} --backup-management-type AzureWorkload --query name -backup protection backup-now -v {vault} -g {rg} -i {item} -c {name} --backup-type Full --enable-compression false -backup job wait -v {vault} -g {rg} -n {job} -backup item show -g {rg} -v {vault} -c {container1} -n {item} --backup-management-type AzureWorkload -backup protection disable -v {vault} -g {rg} -i {item} -c {name} --backup-management-type AzureWorkload -y -backup item show -g {rg} -v {vault} -c {container1} -n {item} --backup-management-type AzureWorkload -backup protection disable -v {vault} -g {rg} -c {container1} --backup-management-type AzureWorkload --workload-type {wt} -i {item} -y --delete-backup-data true -backup container unregister -v {vault} -g {rg} -c {name} -y -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} --resource-id {id} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup protection enable-for-azurewl -v {vault} -g {rg} -p {policy} --protectable-item-type {pit} --protectable-item-name {item} --server-name {fname} --workload-type {wt} -backup container show -n {name} -v {vault} -g {rg} --backup-management-type AzureWorkload --query name -backup protection backup-now -v {vault} -g {rg} -i {item} -c {name} --backup-type Full --enable-compression false -backup job wait -v {vault} -g {rg} -n {job} -backup item show -g {rg} -v {vault} -c {container1} -n {item} --backup-management-type AzureWorkload -backup recoverypoint list -g {rg} -v {vault} -c {name} -i {item} --workload-type {wt} --query [0] -backup recoveryconfig show --vault-name {vault} -g {rg} --restore-mode AlternateWorkloadRestore --rp-name {rp} --item-name {item} --container-name {container1} --target-item-name {titem} --target-server-type SQLInstance --target-server-name {fname} --workload-type {wt} -backup restore restore-azurewl --vault-name {vault} -g {rg} --recovery-config recoveryconfig_sql_restore.json -backup job wait -v {vault} -g {rg} -n {job} -backup recoveryconfig show --vault-name {vault} -g {rg} --restore-mode OriginalWorkloadRestore --item-name {item} --container-name {container1} --rp-name {rp} -backup restore restore-azurewl --vault-name {vault} -g {rg} --recovery-config recoveryconfig_sql_restore.json -backup job wait -v {vault} -g {rg} -n {job} -backup protection disable -v {vault} -g {rg} -c {name} --backup-management-type AzureWorkload --workload-type {wt} -i {item} -y --delete-backup-data true -backup container unregister -v {vault} -g {rg} -c {name} -y -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} --resource-id {id} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup protection enable-for-azurewl -v {vault} -g {rg} -p {policy} --protectable-item-type {pit} --protectable-item-name {item} --server-name {fname} --workload-type {wt} -backup container show -n {name} -v {vault} -g {rg} --backup-management-type AzureWorkload --query name -backup protection backup-now -v {vault} -g {rg} -i {item} -c {name} --backup-type Full --enable-compression false -backup job wait -v {vault} -g {rg} -n {job} -backup item show -g {rg} -v {vault} -c {container1} -n {item} --backup-management-type AzureWorkload -backup recoverypoint list -g {rg} -v {vault} -c {name} -i {item} --workload-type {wt} --query [0] -backup recoveryconfig show --vault-name {vault} -g {rg} --restore-mode RestoreAsFiles --rp-name {rp} --filepath "C:" --target-container-name {container1} --item-name {item} --container-name {container1} --workload-type {wt} -backup restore restore-azurewl --vault-name {vault} -g {rg} --recovery-config recoveryconfig_sql_raf.json -backup job wait -v {vault} -g {rg} -n {job} -backup protection disable -v {vault} -g {rg} -c {name} --backup-management-type AzureWorkload --workload-type {wt} -i {item} -y --delete-backup-data true -backup container unregister -v {vault} -g {rg} -c {name} -y -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup container register -v {vault} -g {rg} --backup-management-type AzureWorkload --workload-type {wt} --resource-id {id} -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -backup protection enable-for-azurewl -v {vault} -g {rg} -p {policy} --protectable-item-type {pit} --protectable-item-name {item} --server-name {fname} --workload-type {wt} -backup container show -n {name} -v {vault} -g {rg} --backup-management-type AzureWorkload --query name -backup recoverypoint list -g {rg} -v {vault} -c {name} -i {item} --workload-type {wt} --query [].name -backup recoverypoint show-log-chain -g {rg} -v {vault} -c {name} -i {item} --workload-type {wt} -backup recoverypoint show-log-chain -g {rg} -v {vault} -c {name} -i {item} --workload-type {wt} -backup protection disable -v {vault} -g {rg} -c {container1} --backup-management-type AzureWorkload --workload-type {wt} -i {item} -y --delete-backup-data true -backup container unregister -v {vault} -g {rg} -c {name} -y -backup container list -v {vault} -g {rg} --backup-management-type AzureWorkload -batch account keys list -n clibatch000002 -g clitest.rg000001 --query "secondary" -otsv -batch account show -n clibatch000002 -g clitest.rg000001 -batch certificate create --thumbprint {cert} --certificate-file "{cert_f}" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch certificate list --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch certificate delete --thumbprint {cert} --yes --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch certificate show --thumbprint {cert} --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch account keys list -n clibatch000002 -g clitest.rg000001 --query "secondary" -otsv -batch account show -n clibatch000002 -g clitest.rg000001 -batch job-schedule create --json-file "{js_file}" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job create --json-file "{j_file}" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job list --job-schedule-id {js_id} --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job list --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job delete --job-id {j_id} --yes --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job-schedule delete --job-schedule-id {js_id} --yes --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch account keys list -n clibatch000002 -g clitest.rg000001 --query "secondary" -otsv -batch account show -n clibatch000002 -g clitest.rg000001 -batch pool create --id {p_id} --vm-size small --os-family 4 --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job create --id {j_id} --metadata test=value --job-manager-task-environment-settings a=b --job-max-task-retry-count 5 --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job create --id {j_id} --metadata test=value --job-max-task-retry-count 5 --job-manager-task-id JobManager --job-manager-task-command-line "cmd /c set AZ_BATCH_TASK_ID" --job-manager-task-environment-settings CLI_TEST_VAR=CLI_TEST_VAR_VALUE --pool-id {p_id} --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job show --job-id {j_id} --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job set --job-id {j_id} --on-all-tasks-complete badValue --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job set --job-id {j_id} --job-max-wall-clock-time P3Y6M4DT12H30M5S --on-all-tasks-complete terminatejob --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job show --job-id {j_id} --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job reset --job-id {j_id} --pool-id {p_id} --on-all-tasks-complete terminatejob --if-unmodified-since {start} --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job reset --job-id {j_id} --pool-id {p_id} --on-all-tasks-complete terminatejob --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job show --job-id {j_id} --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch account show -n clibatch000002 -g clitest.rg000001 -batch account keys list -n clibatch000002 -g clitest.rg000001 --query "secondary" -otsv -batch pool create --json-file "{c_file}" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool create --id pool_image1 --vm-size Standard_A1 --image a:b:c --node-agent-sku-id "batch.node.windows amd64" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool create --id pool_image1 --vm-size Standard_A1 --image /subscriptions/11111111-1111-1111-1111-111111111111/resourceGroups/test_rg/providers/Microsoft.Compute/images/custom_image --node-agent-sku-id "batch.node.windows amd64" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool create --id pool_image1 --vm-size Standard_A1 --image canonical:ubuntuserver:18.04-lts --node-agent-sku-id "batch.node.ubuntu 18.04" --disk-encryption-targets "TemporaryDisk" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool show --pool-id {p_id} --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool resize --pool-id {p_id} --target-dedicated-nodes 0 --target-low-priority-nodes 3 --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool show --pool-id {p_id} --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool node-counts list --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool resize --pool-id {p_id} --abort --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool show --pool-id {p_id} --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool reset --pool-id {p_id} --json-file "{u_file}" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool reset --pool-id {p_id} --start-task-command-line hostname --metadata a=b c=d --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool delete --pool-id {p_id} --yes --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch account keys list -n clibatch000002 -g clitest.rg000001 --query "secondary" -otsv -batch account show -n clibatch000002 -g clitest.rg000001 -batch pool create --id {pool_p} --vm-size small --os-family 4 --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool create --id {pool_i} --vm-size Standard_A1 --image Canonical:UbuntuServer:16.04.0-LTS --node-agent-sku-id "batch.node.ubuntu 16.04" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool create --id missing-params-test --os-family 4 --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool create --id missing-required-group-test --vm-size small --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool create --id mutually-exclusive-test --vm-size small --os-family 4 --image Canonical:UbuntuServer:16-LTS:latest --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool create --id invalid-size-test --vm-size small --image Canonical:UbuntuServer:16.04.0-LTS --node-agent-sku-id "batch.node.ubuntu 16.04" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool create --id missing-optional-test --vm-size small --os-family 4 --start-task-wait-for-success --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool create --json-file "{json}" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool show --pool-id azure-cli-test-json --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool create --json-file batch-pool-create-missing.json --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool create --json-file "{json}" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool create --json-file "{json}" --vm-size small --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool list --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool list --filter "id eq '{pool_p}'" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool resize --pool-id {pool_p} --target-dedicated-nodes 0 --target-low-priority-nodes 5 --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool show --pool-id {pool_p} --select "allocationState, targetLowPriorityNodes" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool resize --pool-id {pool_p} --abort --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool autoscale enable --pool-id {pool_i} --auto-scale-formula "$TargetLowPriorityNodes=3" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool show --pool-id {pool_i} --select "enableAutoScale" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool autoscale evaluate --pool-id {pool_i} --auto-scale-formula "$TargetLowPriorityNodes=3" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool autoscale disable --pool-id {pool_i} --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool show --pool-id {pool_i} --select "enableAutoScale" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool usage-metrics list --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool show --pool-id {pool_j} --select "startTask" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool set --pool-id {pool_j} --start-task-command-line new_value --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool show --pool-id {pool_j} --select "startTask" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool supported-images list --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool delete --pool-id {pool_i} --yes --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool create --id app_package_test --vm-size small --os-family 4 --application-package-references does-not-exist --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch pool set --pool-id {pool_p} --application-package-references does-not-exist --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch account keys list -n clibatch000002 -g clitest.rg000001 --query "secondary" -otsv -batch account show -n clibatch000002 -g clitest.rg000001 -batch job create --json-file "{j_file}" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch task create --job-id {j_id} --json-file "{t_file}" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch task show --job-id {j_id} --task-id {t_id} --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch task delete --job-id {j_id} --task-id {t_id} --yes --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch task create --job-id {j_id} --task-id aaa --command-line "ping 127.0.0.1 -n 30" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job task-counts show --job-id {j_id} --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch task delete --job-id {j_id} --task-id aaa --yes --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch task create --job-id {j_id} --json-file "{ts_file}" --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -batch job delete --job-id {j_id} --yes --account-name {acc_n} --account-key "{acc_k}" --account-endpoint {acc_u} -storage account create -g {rg} -n {str_n} -l {loc} --sku Standard_LRS -batch account create -g {rg} -n {acc} -l {loc} -batch account set -g {rg} -n {acc} --storage-account {str_n} -batch account show -g {rg} -n {acc} -batch account autostorage-keys sync -g {rg} -n {acc} -batch account keys list -g {rg} -n {acc} -batch account keys renew -g {rg} -n {acc} --key-name primary -batch account login -g {rg} -n {acc} -batch account login -g {rg} -n {acc} --shared-key-auth -batch account outbound-endpoints -g {rg} -n {acc} -batch account delete -g {rg} -n {acc} --yes -batch account list -g {rg} -batch location quotas show -l {loc} -batch location list-skus -l {loc} --query "[0:20]" -storage account create -g {rg} -n {str_n} -l {loc} --sku Standard_LRS -batch account create -g {rg} -n {acc} -l {loc} --storage-account {str_n} -batch application create -g {rg} -n {acc} --application-name {app} -batch application list -g {rg} -n {acc} -batch application package create -g {rg} -n {acc} --application-name {app} --version {app_p} --package-file "{app_f}" -batch application package activate -g {rg} -n {acc} --application-name {app} --version {app_p} --format zip -batch application package show -g {rg} -n {acc} --application-name {app} --version {app_p} -batch application set -g {rg} -n {acc} --application-name {app} --default-version {app_p} -batch application show -g {rg} -n {acc} --application-name {app} -batch application package delete -g {rg} -n {acc} --application-name {app} --version {app_p} --yes -batch application delete -g {rg} -n {acc} --application-name {app} --yes -batch application list -g {rg} -n {acc} -storage account delete -g {rg} -n {str_n} --yes -storage share create -n share -batchai workspace create -g clitest.rg000001 -n workspace -batchai cluster create -g clitest.rg000001 -w workspace -n cluster -f "C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\batchai\\tests\\latest\\data\\auto_scale_cluster_with_azure_files.json" -batchai experiment create -g clitest.rg000001 -w workspace -n experiment -batchai job create -c cluster -g clitest.rg000001 -w workspace -e experiment -n job -f "C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\batchai\\tests\\latest\\data\\custom_toolkit_job.json" -batchai job wait -g clitest.rg000001 -w workspace -e experiment -n job -batchai job show -g clitest.rg000001 -w workspace -e experiment -n job -batchai cluster show -g clitest.rg000001 -w workspace -n cluster -batchai workspace create -g clitest.rg000001 -n workspace -batchai cluster create -g clitest.rg000001 -w workspace -n cluster -i UbuntuLTS --vm-size STANDARD_D1 -t 0 -u DemoUser -k "C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\batchai\\tests\\latest\\data\\key.txt" --use-auto-storage -storage share create -n share -storage container create -n container -batchai workspace create -g clitest.rg000001 -n workspace -batchai cluster create -g clitest.rg000001 -w workspace -n cluster -f "C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\batchai\\tests\\latest\\data\\simple_cluster.json" --afs-name share --bfs-name container -u DemoUser -k "C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\batchai\\tests\\latest\\data\\key.txt" -batchai cluster show -g clitest.rg000001 -w workspace -n cluster -batchai workspace create -g clitest.rg000001 -n workspace -batchai cluster create -n cluster -g clitest.rg000001 -w workspace -s STANDARD_D1 -t 0 -u DemoUser -k "C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\batchai\\tests\\latest\\data\\key.txt" --use-auto-storage --setup-task "echo hi" --setup-task-output "$AZ_BATCHAI_MOUNT_ROOT/autoafs" -storage share create -n share -storage container create -n container -batchai workspace create -g clitest.rg000001 -n workspace -batchai cluster create -g clitest.rg000001 -w workspace -n cluster -i UbuntuLTS --vm-size STANDARD_D1 --min 1 --max 1 -u DemoUser -k "C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\batchai\\tests\\latest\\data\\key.txt" --afs-name share --bfs-name container -batchai cluster show -g clitest.rg000001 -w workspace -n cluster -storage share create -n share -storage container create -n container -batchai workspace create -g clitest.rg000001 -n workspace -batchai cluster create -g clitest.rg000001 -w workspace -n cluster -f "C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\batchai\\tests\\latest\\data\\simple_cluster.json" -u DemoUser -k "C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\batchai\\tests\\latest\\data\\key.txt" -batchai experiment create -g clitest.rg000001 -w workspace -n experiment -batchai job create -c cluster -g clitest.rg000001 -w workspace -e experiment -n job -f "C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\batchai\\tests\\latest\\data\\job_with_file_systems.json" -batchai job wait -g clitest.rg000001 -w workspace -e experiment -n job -batchai job show -g clitest.rg000001 -w workspace -e experiment -n job -batchai job file list -g clitest.rg000001 -w workspace -e experiment -j job -d stdouterr -batchai job file list -g clitest.rg000001 -w workspace -e experiment -j job -d OUTPUT -batchai job create -c cluster -g clitest.rg000001 -w workspace -e experiment -n job2 -f "C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\batchai\\tests\\latest\\data\\job_referencing_file_systems.json" --afs-name share --bfs-name container -batchai job wait -g clitest.rg000001 -w workspace -e experiment -n job2 -batchai job show -g clitest.rg000001 -w workspace -e experiment -n job2 -batchai job file list -g clitest.rg000001 -w workspace -e experiment -j job2 -d stdouterr -batchai job file list -g clitest.rg000001 -w workspace -e experiment -j job2 -d OUTPUT -storage share create -n share -batchai workspace create -g clitest.rg000001 -n workspace -batchai workspace list -g clitest.rg000001 -batchai cluster create -g clitest.rg000001 -w workspace -n cluster -f "C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\batchai\\tests\\latest\\data\\cluster_with_azure_files.json" -batchai experiment create -g clitest.rg000001 -w workspace -n experiment -batchai experiment list -g clitest.rg000001 -w workspace -batchai job create -c cluster -g clitest.rg000001 -w workspace -e experiment -n job -f "C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\batchai\\tests\\latest\\data\\custom_toolkit_job.json" -batchai job wait -g clitest.rg000001 -w workspace -e experiment -n job -batchai job show -g clitest.rg000001 -w workspace -e experiment -n job -batchai job file list -g clitest.rg000001 -w workspace -e experiment -j job -d stdouterr -batchai job file list -g clitest.rg000001 -w workspace -e experiment -j job -d=OUTPUT -batchai cluster resize -g clitest.rg000001 -w workspace -n cluster -t 0 -batchai cluster show -g clitest.rg000001 -w workspace -n cluster -batchai cluster resize -g clitest.rg000001 -w workspace -n cluster -t 1 -batchai job create -c cluster -g clitest.rg000001 -w workspace -e experiment -n job2 -f "C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\batchai\\tests\\latest\\data\\custom_toolkit_job.json" -batchai job wait -g clitest.rg000001 -w workspace -e experiment -n job2 -batchai job show -g clitest.rg000001 -w workspace -e experiment -n job2 -batchai cluster delete -g clitest.rg000001 -w workspace -n cluster -y -batchai cluster list -g clitest.rg000001 -w workspace -batchai job delete -g clitest.rg000001 -w workspace -e experiment -n job -y -batchai job delete -g clitest.rg000001 -w workspace -e experiment -n job2 -y -batchai job list -g clitest.rg000001 -w workspace -e experiment -batchai list-usages -l eastus -batchai list-usages -l eastus -o table -billing period list -billing period show -n {period_name} -billing enrollment-account list -billing enrollment-account show -n {enrollment_account_name} -billing balance show --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" -billing profile list --account-name "{myBillingAccount}" -billing profile list --expand "invoiceSections" --account-name "{myBillingAccount}" -billing profile show --account-name "{myBillingAccount}" --name "{myBillingProfile}" -billing profile show --expand "invoiceSections" --account-name "{myBillingAccount}" --name "{myBillingProfile}" -billing profile list --expand "invoiceSections" --account-name "{myBillingAccount}" -billing profile list --expand "invoiceSections" --account-name "{myBillingAccount}" -billing profile show --account-name "{myBillingAccount}" --name "{myBillingProfile}" -billing customer list --account-name "{myBillingAccount}" -billing customer list --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" -billing customer show --account-name "{myBillingAccount}" --name "{myCustomer}" -billing customer list --account-name "{myBillingAccount}" -billing policy show --account-name "{myBillingAccount}" --customer-name "{myCustomer}" -billing policy show --account-name {myBillingAccount} --profile-name {myBillingProfile} -billing policy update --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" --marketplace-purchases "OnlyFreeAllowed" --reservation-purchases "NotAllowed" --view-charges "Allowed" -billing policy show --account-name "{myBillingAccount}" --customer-name "{myCustomer}" -billing policy show --account-name {myBillingAccount} --profile-name {myBillingProfile} -billing property show -billing invoice section list --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" -billing invoice section show --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" --name "{myInvoiceSection}" -billing invoice section create --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" --name "{myInvoiceSection}" --display-name "invoiceSection1" --labels costCategory="Support" pcCode="A123456" -billing invoice section list --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" -billing invoice section show --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" --name "{myInvoiceSection}" -billing agreement list --account-name "{myBillingAccount}" -billing agreement show --name "{myAgreement}" --account-name "{myBillingAccount}" -billing permission list --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" --invoice-section-name "{myInvoiceSection}" -billing permission list --account-name "{myBillingAccount}" -billing role-assignment list --account-name "{myBillingAccount}" -billing role-assignment list --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" -billing role-assignment list --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" --invoice-section-name "{myInvoiceSection}" -billing role-definition list --account-name "{myBillingAccount}" -billing role-definition list --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" -billing role-definition list --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" --invoice-section-name "{myInvoiceSection}" -billing role-definition show --account-name "{myBillingAccount}" --name {roleDefinitionName} -billing role-definition show --account-name "{myBillingAccount}" --name {roleDefinitionName} --profile-name "{myBillingProfile}" -billing role-definition show --account-name "{myBillingAccount}" --name {roleDefinitionName} --profile-name "{myBillingProfile}" --invoice-section-name "{myInvoiceSection}" -billing instruction create --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" --name "{myInstruction}" --amount 5000 --end-date "2020-12-30T21:26:47.997Z" --start-date "2019-12-30T21:26:47.997Z" -billing instruction update --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" --name "{myInstruction}" --amount 12 -billing instruction show --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" --name "{myInstruction}" -billing instruction list --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" -billing instruction show --account-name "{myBillingAccount}" --profile-name "{myBillingProfile}" --name "{myInstruction}" -bot create -k registration -g {rg} -n {botname} -e {endpoint} --appid {app_id} -p {password} -bot authsetting create -g {rg} -n {botname} --client-id {clientid} --client-secret {secret} --provider-scope-string "scope1 scope2" --service google -c myconnname -bot authsetting show -c myconnname -g {rg} -n {botname} -bot authsetting list -n {botname} -g {rg} -bot authsetting delete -g {rg} -n {botname} -c myconnname -bot authsetting list-providers -bot authsetting list-providers --provider-name {service_provider} -bot create -k registration -g {rg} -n {botname} -d {description} -e {endpoint} --appid {app_id} -p {password} --tags key1=value1 -bot create -k registration -g {rg} -n {botname} -d {description} -e {endpoint} --appid {app_id} -p {password} --tags key1=value1 -bot delete -g {rg} -n {botname} -bot create -k registration -g {rg} -n {botname} --appid {app_id} -bot create -k webapp -g {rg} -n {botname} --appid {app_id} -p "" --lang Javascript --echo -bot create -k webapp -g {rg} -n {botname} --appid {numbers_id} -p {password} --lang Javascript --echo -bot create -k webapp -g {rg} -n {botname} --appid {short_app_id} -p {password} --lang Javascript --echo -bot create -k webapp -g {rg} -n {botname} --appid "" -p {password} --lang Javascript --echo -bot create -k webapp -g {rg} -n {botname} --appid {app_id} --lang Javascript --echo -bot create -k webapp -g {rg} -n {botname} --appid {app_id} -p {password} --lang Javascript -bot create -k webapp -g {rg} -n {botname} --appid {app_id} -p {password} --lang Javascript --echo -bot download -g {rg} -n {botname} -bot publish -g {rg} -n {botname} --code-dir {botname} -bot create -k registration -g {rg} -n {botname} -d {description} -e {endpoint} --appid {app_id} -p {password} --tags key1=value1 -bot show -g {rg} -n {botname} -bot update --description description2 -g {rg} -n {botname} -bot delete -g {rg} -n {botname} -bot create -k registration -g {rg} -n {botname} -d {description} -e {endpoint} --appid {app_id} -bot create -k registration -g {rg2} -n {botname} -d {description} -e {endpoint} --appid {app_id} -bot delete -g {rg} -n {botname} -bot create -k webapp -g {rg} -n {botname} --appid {app_id} -p {password} --lang Csharp -bot show -g {rg} -n {botname} --msbot -bot delete -g {rg} -n {botname} -bot create -k webapp -g {rg} -n {botname} --appid {app_id} -p {password} --lang Javascript -bot show -g {rg} -n {botname} --msbot -bot delete -g {rg} -n {botname} -bot create -k registration -g {rg} -n {botname} --appid {app_id} -bot update -g {rg} -n {botname} -e "{endpoint}" --description {description} --sku S1 -d {display_name} --ai-key {ai-key} --ai-api-key {ai-api-key} --ai-app-id {ai-app-id} --tags {tag}={tag-value} --icon-url https://dev.botframework.com/client/images/channels/icons/directline.png -bot delete -g {rg} -n {botname} -bot create -k webapp -g {rg} -n {botname} --appid {app_id} -p {password} --lang Csharp -bot delete -g {rg} -n {botname} -bot prepare-publish -g {rg} -n {botname} --sln-name {sln_name} --proj-name {proj_name} -v v4 -bot create -k registration -g {rg} -n {botname} -d {description} -e {endpoint} --appid {app_id} -p {password} --tags key1=value1 -bot show -g {rg} -n {botname} -bot prepare-publish -g {rg} -n {botname} --sln-name invalid.sln --proj-name invalid.csproj --code-dir . -bot prepare-publish -g {rg} -n {botname} --sln-name invalid.sln --proj-name invalid.csproj --code-dir . -bot create -k registration -g {rg} -n {botname} --appid {app_id} -bot update -g {rg} -n {botname} --cmk-off --cmk-key-vault-key-url test.url -bot create -k registration -g {rg} -n {botname} -e {endpoint} --appid {app_id} -p {password} -bot directline create -g {rg} -n {botname} -bot directline update -g {rg} -n {botname} --enable-enhanced-auth --trusted-origins {origin_url} --debug -bot create -k registration -g {rg} -n {botname} -e {endpoint} --appid {app_id} -p {password} -bot directline create -g {rg} -n {botname} -bot directline show -g {rg} -n {botname} -bot directline show -g {rg} -n {botname} --with-secrets -bot directline delete -g {rg} -n {botname} -bot create -k registration -g {rg} -n {botname} -e {endpoint} --appid {app_id} -p {password} -bot msteams create -g {rg} -n {botname} --enable-calling true --calling-web-hook https://www.google.com -bot msteams show -g {rg} -n {botname} -bot msteams show -g {rg} -n {botname} --with-secrets -bot msteams delete -g {rg} -n {botname} -bot create -k registration -g {rg} -n {botname} -e {endpoint} --appid {app_id} -p {password} -bot skype create -g {rg} -n {botname} --enable-calling true --enable-media-cards true --enable-messaging true --enable-video true --calling-web-hook https://www.google.com -bot skype show -g {rg} -n {botname} -bot skype show -g {rg} -n {botname} --with-secrets -bot skype delete -g {rg} -n {botname} -bot create -k registration -g {rg} -n {botname} -e {endpoint} --appid {app_id} -p {password} -bot webchat show -g {rg} -n {botname} -bot webchat show -g {rg} -n {botname} --with-secrets -afd custom-domain list -g clitest.rg000001 --profile-name profile000002 -afd profile create -g clitest.rg000001 --profile-name profile000002 --sku Standard_AzureFrontDoor -afd custom-domain list -g clitest.rg000001 --profile-name profile000002 -afd secret create -g clitest.rg000001 --profile-name profile000002 --secret-name secret000003 --secret-source /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/CliDevReservedGroup/providers/Microsoft.KeyVault/vaults/clibyoc-int/certificates/localdev-wild --use-latest-version True -afd custom-domain create -g clitest.rg000001 --profile-name profile000002 --custom-domain-name customdomain000004 --host-name customdomain000004.localdev.cdn.azure.cn --certificate-type CustomerCertificate --minimum-tls-version TLS12 --secret=/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Cdn/profiles/profile000002/secrets/secret000003 -afd custom-domain show -g clitest.rg000001 --profile-name profile000002 --custom-domain-name customdomain000004 -afd custom-domain list -g clitest.rg000001 --profile-name profile000002 -afd custom-domain update -g clitest.rg000001 --profile-name profile000002 --custom-domain-name customdomain000004 --certificate-type ManagedCertificate --minimum-tls-version TLS10 -afd custom-domain delete -g clitest.rg000001 --profile-name profile000002 --custom-domain-name customdomain000004 --yes -afd custom-domain list -g clitest.rg000001 --profile-name profile000002 -afd endpoint list -g clitest.rg000001 --profile-name profile123 -afd profile create -g clitest.rg000001 --profile-name profile123 --sku Standard_AzureFrontDoor -afd endpoint list -g clitest.rg000001 --profile-name profile123 -afd endpoint create -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 --origin-response-timeout-seconds 100 --enabled-state Enabled -afd endpoint list -g clitest.rg000001 --profile-name profile123 -afd endpoint update -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 --enabled-state Disabled -afd endpoint update -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 --origin-response-timeout-seconds 120 --enabled-state Enabled -afd endpoint delete -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 --yes -afd profile create -g clitest.rg000001 --profile-name profile123 --sku Standard_AzureFrontDoor -afd endpoint create -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 --origin-response-timeout-seconds 100 --enabled-state Enabled -afd endpoint purge -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 --content-paths /index.html /javascript/* -afd endpoint purge -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 --content-paths /index.html /javascript/* --domains endpoint000002.z01.azurefd.net -afd profile create -g clitest.rg000001 --profile-name profile123 --sku Standard_AzureFrontDoor -afd endpoint create -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 --origin-response-timeout-seconds 100 --enabled-state Enabled -afd log-analytic location list -g clitest.rg000001 --profile-name profile123 -afd log-analytic resource list -g clitest.rg000001 --profile-name profile123 -afd log-analytic metric list -g clitest.rg000001 --profile-name profile123 --metrics clientRequestCount --date-time-begin 2021-04-02T10:23:07+00:00 --granularity PT5M --date-time-end 2021-04-02T10:28:07+00:00 --custom-domains endpoint000002.z01.azurefd.net --protocols http --group-by cacheStatus -afd log-analytic ranking list -g clitest.rg000001 --profile-name profile123 --metrics clientRequestCount --date-time-begin 2021-04-02T10:23:07+00:00 --date-time-end 2021-04-02T10:28:07+00:00 --custom-domains endpoint000002.z01.azurefd.net --rankings referrer --max-ranking 10 -afd endpoint delete -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 --yes -afd profile create -g clitest.rg000001 --profile-name profile123 --sku Premium_AzureFrontDoor -afd endpoint create -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 --origin-response-timeout-seconds 100 --enabled-state Enabled -afd waf-log-analytic metric list -g clitest.rg000001 --profile-name profile123 --metrics clientRequestCount --date-time-begin 2021-04-02T10:23:06+00:00 --date-time-end 2021-04-02T10:28:06+00:00 --granularity PT5M --rule-types managed -afd waf-log-analytic ranking list -g clitest.rg000001 --profile-name profile123 --metrics clientRequestCount --date-time-begin 2021-04-02T10:23:06+00:00 --date-time-end 2021-04-02T10:28:06+00:00 --rankings action --max-ranking 10 -afd endpoint delete -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 --yes -afd profile create -g clitest.rg000001 --profile-name profile000002 --sku Standard_AzureFrontDoor -afd origin-group list -g clitest.rg000001 --profile-name profile000002 -afd origin-group create -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 --probe-request-type GET --probe-protocol Http --probe-interval-in-seconds 120 --probe-path /test1/azure.txt --sample-size 4 --successful-samples-required 3 --additional-latency-in-milliseconds 50 -afd origin-group list -g clitest.rg000001 --profile-name profile000002 -afd origin-group update -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 --probe-request-type GET --probe-protocol Https -afd origin-group update -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 --sample-size 5 --additional-latency-in-milliseconds 30 -afd origin-group update -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 --sample-size 4 --additional-latency-in-milliseconds 30 --probe-request-type HEAD -afd origin-group delete -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 --yes -afd origin-group list -g clitest.rg000001 --profile-name profile000002 -afd profile create -g clitest.rg000001 --profile-name profile000002 --sku Premium_AzureFrontDoor -afd origin-group create -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 --probe-request-type GET --probe-protocol Http --probe-interval-in-seconds 120 --probe-path /test1/azure.txt --sample-size 4 --successful-samples-required 3 --additional-latency-in-milliseconds 50 -afd origin create -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 --origin-name origin000004 --host-name plstestcli.blob.core.windows.net --origin-host-header plstestcli.blob.core.windows.net --priority 1 --weight 1000 --http-port 80 --https-port 443 --enabled-state Enabled -afd origin create -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 --origin-name origin000005 --host-name huaiyiztesthost1.blob.core.chinacloudapi.cn --origin-host-header huaiyiztesthost1.blob.core.chinacloudapi.cn --priority 1 --weight 666 --http-port 8080 --https-port 443 --enabled-state Enabled -afd origin list -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 -afd origin update -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 --origin-name origin000004 --weight 58 --http-port 8080 -afd origin update -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 --origin-name origin000004 --http-port 80 --enable-private-link --private-link-resource /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/CliDevReservedGroup/providers/Microsoft.Storage/storageAccounts/plstestcli --private-link-sub-resource blob --private-link-location eastus --private-link-request-message "Private link service from AFD" -afd origin update -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 --origin-name origin000004 --private-link-sub-resource table -afd origin update -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 --origin-name origin000004 --weight 99 --enable-private-link false --enabled-state Disabled -afd origin delete -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 --origin-name origin000004 --yes -afd origin delete -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 --origin-name origin000005 --yes -afd origin list -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000003 -afd profile list -g clitest.rg000001 -afd profile create -g clitest.rg000001 --profile-name profile000002 --sku Standard_AzureFrontDoor --tags tag1=value1 tag2=value2 -afd profile list -g clitest.rg000001 -afd profile show -g clitest.rg000001 --profile-name profile000002 -afd profile update -g clitest.rg000001 --profile-name profile000002 --tags tag3=value3 tag4=value4 -afd profile usage -g clitest.rg000001 --profile-name profile000002 -afd profile delete -g clitest.rg000001 --profile-name profile000002 -afd profile list -g clitest.rg000001 -afd profile create -g clitest.rg000001 --profile-name profile000002 --sku Standard_AzureFrontDoor -afd endpoint create -g clitest.rg000001 --endpoint-name endpoint000003 --profile-name profile000002 --origin-response-timeout-seconds 100 --enabled-state Enabled -afd origin-group create -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000004 --probe-request-type GET --probe-protocol Http --probe-interval-in-seconds 120 --probe-path /test1/azure.txt --sample-size 4 --successful-samples-required 3 --additional-latency-in-milliseconds 50 -afd origin create -g clitest.rg000001 --profile-name profile000002 --origin-group-name og000004 --origin-name origin000005 --host-name huaiyiztesthost1.blob.core.chinacloudapi.cn --origin-host-header huaiyiztesthost1.blob.core.chinacloudapi.cn --priority 1 --weight 1000 --http-port 80 --https-port 443 --enabled-state Enabled -afd route create -g clitest.rg000001 --profile-name profile000002 --endpoint-name endpoint000003 --route-name route000006 --origin-group og000004 --supported-protocols Https Http --link-to-default-domain Enabled --https-redirect Enabled --forwarding-protocol MatchRequest -afd route list -g clitest.rg000001 --profile-name profile000002 --endpoint-name endpoint000003 -afd route update -g clitest.rg000001 --profile-name profile000002 --route-name route000006 --endpoint-name endpoint000003 --forwarding-protocol HttpsOnly --query-string-caching-behavior IgnoreQueryString --enable-compression True --content-types-to-compress text/javascript text/plain -afd route update -g clitest.rg000001 --profile-name profile000002 --route-name route000006 --endpoint-name endpoint000003 --query-string-caching-behavior UseQueryString --content-types-to-compress text/css -afd rule-set create -g clitest.rg000001 --rule-set-name ruleset000007 --profile-name profile000002 -afd route update -g clitest.rg000001 --profile-name profile000002 --route-name route000006 --endpoint-name endpoint000003 --rule-sets ruleset000007 --enable-compression False -afd route update -g clitest.rg000001 --profile-name profile000002 --route-name route000006 --endpoint-name endpoint000003 --rule-sets --https-redirect Disabled -afd route delete -g clitest.rg000001 --profile-name profile000002 --endpoint-name endpoint000003 --route-name route000006 --yes -afd route list -g clitest.rg000001 --profile-name profile000002 --endpoint-name endpoint000003 -afd profile create -g clitest.rg000001 --profile-name profile000002 --sku Standard_AzureFrontDoor -afd rule-set create -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 -afd rule list -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 -afd rule create -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --rule-name r1 --match-variable RemoteAddress --operator GeoMatch --match-values "TH" --action-name CacheExpiration --cache-behavior BypassCache --order 1 -afd rule show -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --rule-name r1 -afd rule create -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --rule-name r2 --match-variable RequestScheme --match-values "HTTP" --action-name UrlRedirect --redirect-protocol Https --redirect-type Moved --order 2 -afd rule show -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --rule-name r2 -afd rule list -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 -afd rule delete -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --rule-name r2 --yes -afd rule list -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 -afd rule condition add -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --rule-name r1 --match-variable RemoteAddress --operator GeoMatch --match-values "TH" "US" -afd rule show -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --rule-name r1 -afd rule action add -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --rule-name r1 --action-name "UrlRewrite" --source-pattern "/abc" --destination "/def" -afd rule show -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --rule-name r1 -afd rule condition remove -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --rule-name r1 --index 0 -afd rule show -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --rule-name r1 -afd rule action remove -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --rule-name r1 --index 0 -afd rule show -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --rule-name r1 -afd rule delete -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --rule-name r1 --yes -afd rule list -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 -afd rule-set delete -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --yes -afd rule-set list -g clitest.rg000001 --profile-name profile000002 -afd profile create -g clitest.rg000001 --profile-name profile000002 --sku Standard_AzureFrontDoor -afd rule-set list -g clitest.rg000001 --profile-name profile000002 -afd rule-set create -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 -afd rule-set list -g clitest.rg000001 --profile-name profile000002 -afd rule-set show -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 -afd rule-set delete -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 --yes -afd rule-set show -g clitest.rg000001 --rule-set-name ruleset000003 --profile-name profile000002 -afd rule-set list -g clitest.rg000001 --profile-name profile000002 -afd profile create -g clitest.rg000001 --profile-name profile000002 --sku Standard_AzureFrontDoor -afd secret list -g clitest.rg000001 --profile-name profile000002 -afd secret create -g clitest.rg000001 --profile-name profile000002 --secret-name secret000003 --secret-source /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/CliDevReservedGroup/providers/Microsoft.KeyVault/vaults/clibyoc-int/certificates/localdev-multi --use-latest-version True -afd secret show -g clitest.rg000001 --profile-name profile000002 --secret-name secret000003 -afd secret delete -g clitest.rg000001 --profile-name profile000002 --secret-name secret000003 --yes -afd secret list -g clitest.rg000001 --profile-name profile000002 -afd secret list -g clitest.rg000001 --profile-name profile000002 -afd profile create -g clitest.rg000001 --profile-name profile000002 --sku Standard_AzureFrontDoor -afd secret list -g clitest.rg000001 --profile-name profile000002 -afd secret create -g clitest.rg000001 --profile-name profile000002 --secret-name secret000003 --secret-source /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/CliDevReservedGroup/providers/Microsoft.KeyVault/vaults/clibyoc-int/certificates/localdev-multi --use-latest-version False --secret-version=aab1df2865274378a04592e4f1233797 -afd secret show -g clitest.rg000001 --profile-name profile000002 --secret-name secret000003 -afd secret list -g clitest.rg000001 --profile-name profile000002 -afd secret delete -g clitest.rg000001 --profile-name profile000002 --secret-name secret000003 --yes -afd secret list -g clitest.rg000001 --profile-name profile000002 -afd security-policy list -g clitest.rg000001 --profile-name profilesecuritytest -afd profile create -g clitest.rg000001 --profile-name profilesecuritytest --sku Standard_AzureFrontDoor -afd security-policy list -g clitest.rg000001 --profile-name profilesecuritytest -afd endpoint create -g clitest.rg000001 --endpoint-name endpoint1000002 --profile-name profilesecuritytest --origin-response-timeout-seconds 100 --enabled-state Enabled -afd endpoint create -g clitest.rg000001 --endpoint-name endpoint2000003 --profile-name profilesecuritytest --origin-response-timeout-seconds 100 --enabled-state Enabled -afd security-policy create -g clitest.rg000001 --profile-name profilesecuritytest --security-policy-name security000004 --waf-policy /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/CliDevReservedGroup/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/SampleStandard --domains /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Cdn/profiles/profilesecuritytest/afdEndpoints/endpoint1000002 /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Cdn/profiles/profilesecuritytest/afdEndpoints/endpoint2000003 -afd security-policy show -g clitest.rg000001 --profile-name profilesecuritytest --security-policy-name security000004 -afd security-policy list -g clitest.rg000001 --profile-name profilesecuritytest -afd security-policy update -g clitest.rg000001 --profile-name profilesecuritytest --security-policy-name security000004 --domains /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Cdn/profiles/profilesecuritytest/afdEndpoints/endpoint2000003 --waf-policy /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/CliDevReservedGroup/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/SampleStandard -afd security-policy delete -g clitest.rg000001 --profile-name profilesecuritytest --security-policy-name security000004 --yes -afd security-policy list -g clitest.rg000001 --profile-name profilesecuritytest -cdn endpoint list -g clitest.rg000001 --profile-name profile123 -cdn profile create -g clitest.rg000001 -n profile123 --sku Standard_Microsoft -cdn endpoint create -g clitest.rg000001 -n cdn-cli-test-5 --profile-name profile123 --origin www.example.com 80 443 -cdn custom-domain create -g clitest.rg000001 -n customdomain000003 --endpoint-name cdn-cli-test-5 --profile-name profile123 --hostname=customdomain000003.cdn-cli-test-5.azfdtest.xyz -cdn custom-domain show -g clitest.rg000001 -n customdomain000003 --endpoint-name cdn-cli-test-5 --profile-name profile123 -keyvault certificate create --vault-name keyvault000002 -n cert000004 --policy "@C:\Code\azure-cli\src\azure-cli\azure\cli\command_modules\cdn\tests\latest\byoc_cert_policy.json" -cdn custom-domain enable-https -g clitest.rg000001 -n customdomain000003 --endpoint-name cdn-cli-test-5 --profile-name profile123 --user-cert-subscription-id=00000000-0000-0000-0000-000000000000 --user-cert-group-name=clitest.rg000001 --user-cert-vault-name=keyvault000002 --user-cert-secret-name=cert000004 --user-cert-protocol-type=sni -cdn endpoint list -g clitest.rg000001 --profile-name profile000002 -cdn profile create -g clitest.rg000001 -n profile000002 --sku Standard_Akamai -cdn endpoint create -g clitest.rg000001 -n cdn-cli-test --profile-name profile000002 --origin www.example.com 80 443 -cdn custom-domain list -g clitest.rg000001 --endpoint-name cdn-cli-test --profile-name profile000002 -cdn custom-domain create -g clitest.rg000001 -n customdomain000003 --endpoint-name cdn-cli-test --profile-name profile000002 --hostname=customdomain000003.cdn-cli-test.azfdtest.xyz -cdn custom-domain list -g clitest.rg000001 --endpoint-name cdn-cli-test --profile-name profile000002 -cdn custom-domain delete -g clitest.rg000001 -n customdomain000003 --endpoint-name cdn-cli-test --profile-name profile000002 -cdn custom-domain list -g clitest.rg000001 --endpoint-name cdn-cli-test --profile-name profile000002 -cdn profile create -g {rg} -n {profile} -cdn endpoint create -g {rg} --origin {origin} --profile-name {profile} -n {endpoint} -cdn custom-domain list -g {rg} --endpoint-name {endpoint} --profile-name {profile} -cdn custom-domain create -g {rg} --endpoint-name {endpoint} --hostname {hostname} --profile-name {profile} -n {name} -cdn custom-domain show -g {rg} --endpoint-name {endpoint} --profile-name {profile} -n {name} -cdn custom-domain delete -g {rg} --endpoint-name {endpoint} --profile-name {profile} -n {name} -cdn custom-domain enable-https -g {rg} --endpoint-name {endpoint} --profile-name {profile} -n {name} -cdn custom-domain disable-https -g {rg} --endpoint-name {endpoint} --profile-name {profile} -n {name} -cdn endpoint list -g clitest.rg000001 --profile-name profile123 -cdn profile create -g clitest.rg000001 -n profile123 --sku Standard_Akamai -cdn endpoint create -g clitest.rg000001 -n cdn-cli-test-2 --profile-name profile123 --origin www.example.com 80 443 -cdn custom-domain create -g clitest.rg000001 -n customdomain000002 --endpoint-name cdn-cli-test-2 --profile-name profile123 --hostname=customdomain000002.cdn-cli-test-2.azfdtest.xyz -cdn custom-domain show -g clitest.rg000001 -n customdomain000002 --endpoint-name cdn-cli-test-2 --profile-name profile123 -cdn custom-domain enable-https -g clitest.rg000001 -n customdomain000002 --endpoint-name cdn-cli-test-2 --profile-name profile123 -cdn custom-domain disable-https -g clitest.rg000001 -n customdomain000002 --endpoint-name cdn-cli-test-2 --profile-name profile123 -cdn endpoint list -g clitest.rg000001 --profile-name profile123 -cdn profile create -g clitest.rg000001 -n profile123 --sku Standard_Microsoft -cdn endpoint create -g clitest.rg000001 -n cdn-cli-test-4 --profile-name profile123 --origin www.example.com 80 443 -cdn custom-domain create -g clitest.rg000001 -n customdomain000003 --endpoint-name cdn-cli-test-4 --profile-name profile123 --hostname=customdomain000003.cdn-cli-test-4.azfdtest.xyz -cdn custom-domain create -g clitest.rg000001 -n customdomain000004 --endpoint-name cdn-cli-test-4 --profile-name profile123 --hostname=customdomain000004.cdn-cli-test-4.azfdtest.xyz -cdn custom-domain show -g clitest.rg000001 -n customdomain000003 --endpoint-name cdn-cli-test-4 --profile-name profile123 -cdn custom-domain show -g clitest.rg000001 -n customdomain000003 --endpoint-name cdn-cli-test-4 --profile-name profile123 -cdn custom-domain enable-https -g clitest.rg000001 -n customdomain000003 --endpoint-name cdn-cli-test-4 --profile-name profile123 --min-tls-version=1.0 -keyvault certificate create --vault-name keyvault000002 -n cert000005 --policy "@C:\Code\azure-cli\src\azure-cli\azure\cli\command_modules\cdn\tests\latest\byoc_cert_policy.json" -cdn endpoint list -g clitest.rg000001 --profile-name profile123 -cdn profile create -g clitest.rg000001 -n profile123 --sku Standard_Verizon -cdn endpoint create -g clitest.rg000001 -n cdn-cli-test-3 --profile-name profile123 --origin www.contoso.com 80 443 -cdn custom-domain create -g clitest.rg000001 -n customdomain000002 --endpoint-name cdn-cli-test-3 --profile-name profile123 --hostname=customdomain000002.cdn-cli-test-3.azfdtest.xyz -cdn custom-domain show -g clitest.rg000001 -n customdomain000002 --endpoint-name cdn-cli-test-3 --profile-name profile123 -cdn custom-domain enable-https -g clitest.rg000001 -n customdomain000002 --endpoint-name cdn-cli-test-3 --profile-name profile123 --min-tls-version=None -cdn custom-domain disable-https -g clitest.rg000001 -n customdomain000002 --endpoint-name cdn-cli-test-3 --profile-name profile123 -cdn profile create -g clitest.rg000001 -n akp000002 --sku Standard_Akamai -cdn endpoint create -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 --origin huaiyiztesthost1.blob.core.chinacloudapi.cn 80 443 -cdn endpoint rule add -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 --order 0 --action-name CacheExpiration --cache-behavior Override --cache-duration 00:05:00 -cdn endpoint rule add -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 --order 1 --action-name CacheExpiration --match-variable UrlPath --operator Wildcard --match-values /test2/* --cache-behavior Override --cache-duration 00:05:00 -cdn endpoint rule add -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 --order 2 --action-name CacheExpiration --match-variable UrlFileExtension --operator Any --match-values mp4 mp3 --cache-behavior Override --cache-duration 00:05:00 -cdn endpoint rule remove -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 --order 2 -cdn endpoint rule remove -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 --order 1 -cdn endpoint rule remove -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 --order 0 -cdn endpoint delete -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 -cdn endpoint list -g clitest.rg000001 --profile-name profile000002 -cdn profile create -g clitest.rg000001 -n profile000002 -cdn endpoint create -g clitest.rg000001 -n endpoint000003 --profile-name profile000002 --origin www.contoso.com 80 443 --enable-compression --content-types-to-compress text/plain text/html -cdn endpoint update -g clitest.rg000001 -n endpoint000003 --profile-name profile000002 --content-types-to-compress application/json application/xml -cdn endpoint update -g clitest.rg000001 -n endpoint000003 --profile-name profile000002 --enable-compression False -cdn endpoint update -g clitest.rg000001 -n endpoint000003 --profile-name profile000002 --enable-compression --content-types-to-compress text/javascript application/x-javascript -cdn endpoint delete -g clitest.rg000001 -n endpoint000003 --profile-name profile000002 -cdn endpoint list -g clitest.rg000001 --profile-name profile123 -cdn profile create -g clitest.rg000001 -n profile123 -cdn endpoint list -g clitest.rg000001 --profile-name profile123 -cdn endpoint create -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --origin www.example.com 80 443 -cdn endpoint list -g clitest.rg000001 --profile-name profile123 -cdn endpoint update -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --no-http --enable-compression -cdn endpoint update -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --no-http false --no-https --enable-compression false -cdn endpoint delete -g clitest.rg000001 -n endpoint000002 --profile-name profile123 -cdn profile create -g clitest.rg000001 -n Standard-Akamai-profile --sku Standard_Akamai -cdn endpoint create -g clitest.rg000001 -n endpoint000002 --profile-name Standard-Akamai-profile --origin www.contoso.com 80 443 -cdn profile create -g clitest.rg000001 -n Standard-Verizon-profile --sku Standard_Verizon -cdn endpoint create -g clitest.rg000001 -n endpoint000003 --profile-name Standard-Verizon-profile --origin www.contoso.com 80 443 -cdn profile create -g clitest.rg000001 -n Premium-Verizon-profile --sku Premium_Verizon -cdn endpoint create -g clitest.rg000001 -n endpoint000004 --profile-name Premium-Verizon-profile --origin www.contoso.com 80 443 -cdn profile create -g clitest.rg000001 -n profile123 --sku Standard_Verizon -cdn endpoint create -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --origin www.contoso.com 80 443 -cdn endpoint load -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --content-paths /index.html /javascript/app.js -cdn endpoint purge -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --content-paths /index.html /javascript/* -cdn profile create -g clitest.rg000001 -n profile123 -cdn endpoint create -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --origin www.example.com 80 443 -cdn endpoint stop -g clitest.rg000001 -n endpoint000002 --profile-name profile123 -cdn endpoint show -g clitest.rg000001 -n endpoint000002 --profile-name profile123 -cdn endpoint start -g clitest.rg000001 -n endpoint000002 --profile-name profile123 -cdn endpoint show -g clitest.rg000001 -n endpoint000002 --profile-name profile123 -cdn profile create -g clitest.rg000001 -n profile123 --sku Standard_Microsoft -cdn endpoint create -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --origin www.example.com 80 443 '/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cdn-sdk-test/providers/Microsoft.Network/privateLinkServices/cdn-sdk-pls-test' 'EastUS' 'Please approve the request' -cdn endpoint list -g clitest.rg000001 --profile-name profile123 -cdn endpoint list -g clitest.rg000001 --profile-name profile123 -cdn profile create -g clitest.rg000001 -n profile123 --sku Standard_Microsoft -cdn endpoint list -g clitest.rg000001 --profile-name profile123 -cdn endpoint create -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --origin www.example.com 80 443 -cdn endpoint list -g clitest.rg000001 --profile-name profile123 -cdn endpoint rule add -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --order 1 --rule-name r1 --match-variable RemoteAddress --operator GeoMatch --match-values "TH" --action-name CacheExpiration --cache-behavior BypassCache -cdn endpoint rule condition add -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --rule-name r1 --match-variable RemoteAddress --operator GeoMatch --match-values "TH" "US" -cdn endpoint rule action add -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --rule-name r1 --action-name "UrlRewrite" --source-pattern "/abc" --destination "/def" -cdn endpoint rule condition remove -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --rule-name r1 --index 0 -cdn endpoint rule action remove -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --rule-name r1 --index 0 -cdn endpoint rule add -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --order 2 --rule-name r2 --match-variable RemoteAddress --operator GeoMatch --match-values "TH" --action-name CacheExpiration --cache-behavior BypassCache -cdn endpoint rule add -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --order 3 --rule-name r3 --match-variable RemoteAddress --operator GeoMatch --match-values "TH" --action-name CacheExpiration --cache-behavior BypassCache -cdn endpoint rule remove -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --rule-name r1 -cdn endpoint rule remove -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --rule-name r3 -cdn endpoint delete -g clitest.rg000001 -n endpoint000002 --profile-name profile123 -cdn profile create -g clitest.rg000001 -n akp000002 --sku Standard_Verizon -cdn endpoint create -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 --origin huaiyiztesthost1.blob.core.chinacloudapi.cn 80 443 -cdn endpoint rule add -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 --order 0 --action-name CacheExpiration --cache-behavior Override --cache-duration 00:05:00 -cdn endpoint rule add -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 --order 1 --action-name CacheExpiration --match-variable UrlPath --operator Wildcard --match-values /test2/* --cache-behavior Override --cache-duration 00:05:00 -cdn endpoint rule add -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 --order 2 --action-name CacheExpiration --match-variable UrlFileExtension --operator Any --match-values mp4 mp3 --cache-behavior Override --cache-duration 00:05:00 -cdn endpoint rule remove -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 --order 2 -cdn endpoint rule remove -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 --order 1 -cdn endpoint rule remove -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 --order 0 -cdn endpoint delete -g clitest.rg000001 -n endpoint000003 --profile-name akp000002 -cdn edge-node list -cdn profile create -g clitest.rg000001 -n profile000002 --sku Standard_Microsoft -cdn endpoint create -g clitest.rg000001 -n endpoint000003 --profile-name profile000002 --origin endpoint000003.contoso.com 80 443 -cdn endpoint show -g clitest.rg000001 -n endpoint000003 --profile-name profile000002 -cdn origin show -g clitest.rg000001 -n origin-0 --endpoint-name endpoint000003 --profile-name profile000002 -cdn origin-group create -g clitest.rg000001 --endpoint-name endpoint000003 --profile-name profile000002 -n test-origin-group --origins=/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Cdn/profiles/profile000002/endpoints/endpoint000003/origins/origin-0 -cdn origin-group list -g clitest.rg000001 --endpoint-name endpoint000003 --profile-name profile000002 -cdn origin-group show -g clitest.rg000001 -n test-origin-group --endpoint-name endpoint000003 --profile-name profile000002 -cdn endpoint update -g clitest.rg000001 -n endpoint000003 --profile-name profile000002 --default-origin-group=test-origin-group -cdn origin create -g clitest.rg000001 --endpoint-name endpoint000003 --profile-name profile000002 -n origin000004 --host-name=origin000004.contoso.com --http-port=8080 --https-port=8443 --origin-host-header=origin000004.contoso.com --weight=534 --priority=3 -cdn origin list -g clitest.rg000001 --endpoint-name endpoint000003 --profile-name profile000002 -cdn origin create -g clitest.rg000001 --endpoint-name endpoint000003 --profile-name profile000002 -n origin000005 --host-name=origin000005.contoso.com --http-port=8080 --https-port=8443 --origin-host-header=origin000005.contoso.com --weight=534 --priority=3 -cdn origin list -g clitest.rg000001 --endpoint-name endpoint000003 --profile-name profile000002 -cdn origin-group create -g clitest.rg000001 --endpoint-name endpoint000003 --profile-name profile000002 -n test-origin-group-2 --origins=origin000004 --probe-method=GET '--probe-path=/healthz' --probe-protocol=Https --probe-interval=120 -cdn origin-group create -g clitest.rg000001 --endpoint-name endpoint000003 --profile-name profile000002 -n test-origin-group-3 --origins=origin000005 --probe-method=GET '--probe-path=/healthz' --probe-protocol=Https --probe-interval=120 -cdn origin-group list -g clitest.rg000001 --endpoint-name endpoint000003 --profile-name profile000002 -cdn endpoint rule add -g clitest.rg000001 -n endpoint000003 --profile-name profile000002 --order 1 --rule-name r1 --match-variable UrlPath --operator BeginsWith --match-values "/test1" --action-name OriginGroupOverride --origin-group /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Cdn/profiles/profile000002/endpoints/endpoint000003/origingroups/test-origin-group-2 -cdn endpoint rule add -g clitest.rg000001 -n endpoint000003 --profile-name profile000002 --order 2 --rule-name r2 --match-variable UrlPath --operator BeginsWith --match-values "/test2" --action-name OriginGroupOverride --origin-group test-origin-group-3 -cdn profile create -g clitest.rg000001 -n profile123 --sku Standard_Microsoft -cdn endpoint create -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --origin www.example.com 80 443 -cdn endpoint show -g clitest.rg000001 -n endpoint000002 --profile-name profile123 -cdn origin show -g clitest.rg000001 -n origin-0 --endpoint-name endpoint000002 --profile-name profile123 -cdn origin list -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 -cdn origin-group create -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 -n test-origin-group --origins=/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Cdn/profiles/profile123/endpoints/endpoint000002/origins/origin-0 -cdn origin-group list -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 -cdn origin-group show -g clitest.rg000001 -n test-origin-group --endpoint-name endpoint000002 --profile-name profile123 -cdn endpoint update -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --default-origin-group=test-origin-group -cdn endpoint update -g clitest.rg000001 -n endpoint000002 --profile-name profile123 --default-origin-group=/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Cdn/profiles/profile123/endpoints/endpoint000002/origingroups/test-origin-group -cdn origin create -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 -n origin000003 --host-name=abc.contoso.com --http-port=8080 --https-port=8443 --private-link-resource-id=/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cdn-sdk-test/providers/Microsoft.Network/privateLinkServices/cdn-sdk-pls-test --private-link-location=EastUS '--private-link-approval-message=Please approve the request' --origin-host-header=abc.contoso.com --weight=534 --priority=3 -cdn origin list -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 -cdn origin create -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 -n origin000004 --host-name=abc.contoso.com --http-port=8080 --https-port=8443 --private-link-resource-id=/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cdn-sdk-test/providers/Microsoft.Network/privateLinkServices/cdn-sdk-pls-test --private-link-location=EastUS '--private-link-approval-message=Please approve the request' --origin-host-header=abc.contoso.com --disabled --weight=534 --priority=3 -cdn origin list -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 -cdn origin-group create -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 -n test-origin-group-2 --origins=origin000003,origin000004 --probe-method=GET '--probe-path=/healthz' --probe-protocol=Https --probe-interval=120 -cdn origin-group show -g clitest.rg000001 -n test-origin-group --endpoint-name endpoint000002 --profile-name profile123 -cdn origin-group list -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 -cdn origin-group delete -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 --name test-origin-group-2 --yes -cdn origin-group list -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 -cdn origin-group update -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 -n test-origin-group --origins=/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Cdn/profiles/profile123/endpoints/endpoint000002/origins/origin-0,origin000003 --probe-method=GET --probe-path=/healthz --probe-interval=60 --probe-protocol=Https -cdn origin-group update -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 -n test-origin-group --origins=/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Cdn/profiles/profile123/endpoints/endpoint000002/origins/origin-0,origin000003 -cdn origin update -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 -n origin-0 --http-port=8080 --https-port=8443 --private-link-resource-id=/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cdn-sdk-test/providers/Microsoft.Network/privateLinkServices/cdn-sdk-pls-test --private-link-location=EastUS '--private-link-approval-message=Please approve the request' --origin-host-header=abc.contoso.com --disabled --weight=534 --priority=3 -cdn origin show -g clitest.rg000001 -n origin-0 --endpoint-name endpoint000002 --profile-name profile123 -cdn origin delete -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 --name origin000004 --yes -cdn origin list -g clitest.rg000001 --endpoint-name endpoint000002 --profile-name profile123 -cdn profile list -g clitest.rg000001 -cdn profile create -g clitest.rg000001 -n profile123 -cdn profile show -g clitest.rg000001 -n profile123 -cdn profile list -g clitest.rg000001 -cdn profile update -g clitest.rg000001 -n profile123 --tags foo=bar -cdn profile delete -g clitest.rg000001 -n profile123 -cdn profile delete -g clitest.rg000001 -n foo12345 -cdn profile create -g {rg} -n {profile} --sku {sku} -cdn waf policy show -g {resource_group} -n {policy} -cdn waf policy set -g {resource_group} --name {policy} --redirect-url "{redirect_url}" --tags="foo=bar" -cdn waf policy show -g {resource_group} -n {policy} -cdn waf policy list -g {resource_group} -cdn waf policy managed-rule-set show -g {resource_group} --policy-name {policy} --rule-set-type {rule_set_type} --rule-set-version {rule_set_version} -cdn waf policy managed-rule-set add -g {resource_group} --policy-name {policy} --rule-set-type {rule_set_type} --rule-set-version {rule_set_version} -cdn waf policy managed-rule-set show -g {resource_group} --policy-name {policy} --rule-set-type {rule_set_type} --rule-set-version {rule_set_version} -cdn waf policy managed-rule-set rule-group-override show -g {resource_group} --policy-name {policy} --rule-set-type {rule_set_type} --rule-set-version {rule_set_version} -n {rule_group} -cdn waf policy managed-rule-set rule-group-override set -g {resource_group} --policy-name {policy} --rule-set-type {rule_set_type} --rule-set-version {rule_set_version} -n {rule_group} -r id=942440 action=Redirect enabled=Enabled -r id=942120 -r id=942100 -cdn waf policy managed-rule-set rule-group-override show -g {resource_group} --policy-name {policy} --rule-set-type {rule_set_type} --rule-set-version {rule_set_version} -n {rule_group} -cdn waf policy managed-rule-set rule-group-override list -g {resource_group} --policy-name {policy} --rule-set-type {rule_set_type} --rule-set-version {rule_set_version} -cdn waf policy custom-rule show -g {resource_group} --policy-name {policy} -n {custom_rule_1} -cdn waf policy custom-rule set -g {resource_group} --policy-name {policy} -n {custom_rule_1} --action Block --priority 100 --match-condition match-variable=RequestMethod operator=Equal negate=true match-value=GET match-value=HEAD -cdn waf policy custom-rule show -g {resource_group} --policy-name {policy} -n {custom_rule_1} -cdn waf policy custom-rule set -g {resource_group} --policy-name {policy} -n {custom_rule_2} --action Redirect --priority 200 -m match-variable=RequestUri operator=Contains match-value=.. -m match-variable=QueryString operator=Contains "match-value= " -cdn waf policy custom-rule show -g {resource_group} --policy-name {policy} -n {custom_rule_2} -cdn waf policy custom-rule list -g {resource_group} --policy-name {policy} -cdn waf policy rate-limit-rule show -g {resource_group} --policy-name {policy} -n {rate_limit_rule_1} -cdn waf policy rate-limit-rule set -g {resource_group} --policy-name {policy} -n {rate_limit_rule_1} --action Block --priority 100 --duration 1 --request-threshold 100 --match-condition match-variable=RequestMethod operator=Equal negate=true match-value=GET match-value=HEAD -cdn waf policy rate-limit-rule show -g {resource_group} --policy-name {policy} -n {rate_limit_rule_1} -cdn waf policy rate-limit-rule set -g {resource_group} --policy-name {policy} -n {rate_limit_rule_2} --action Redirect --priority 200 --duration 5 --request-threshold 100 -m match-variable=RequestMethod operator=Equal match-value=PUT -m match-variable=RequestUri operator=Contains match-value=/expensive/resource/ -cdn waf policy rate-limit-rule show -g {resource_group} --policy-name {policy} -n {rate_limit_rule_2} -cdn waf policy rate-limit-rule list -g {resource_group} --policy-name {policy} -cdn waf policy set -g {resource_group} --name {policy} --sku Standard_Microsoft --mode Prevention --block-response-body {block_response_body} --block-response-status-code {block_response_status_code} --redirect-url {redirect_url} --tags="" --disabled -cdn waf policy show -g {resource_group} -n {policy} -cdn waf policy managed-rule-set rule-group-override delete -y -g {resource_group} --policy-name {policy} --rule-set-type {rule_set_type} --rule-set-version {rule_set_version} -n {rule_group} -cdn waf policy managed-rule-set rule-group-override show -g {resource_group} --policy-name {policy} --rule-set-type {rule_set_type} --rule-set-version {rule_set_version} -n {rule_group} -cdn waf policy managed-rule-set remove -y -g {resource_group} --policy-name {policy} --rule-set-type {rule_set_type} --rule-set-version {rule_set_version} -cdn waf policy managed-rule-set show -g {resource_group} --policy-name {policy} --rule-set-type {rule_set_type} --rule-set-version {rule_set_version} -cdn waf policy custom-rule delete -y -g {resource_group} --policy-name {policy} -n {custom_rule_1} -cdn waf policy custom-rule show -g {resource_group} --policy-name {policy} -n {custom_rule_1} -cdn waf policy rate-limit-rule delete -y -g {resource_group} --policy-name {policy} -n {rate_limit_rule_1} -cdn waf policy rate-limit-rule show -g {resource_group} --policy-name {policy} -n {rate_limit_rule_1} -cdn waf policy delete -y -g {resource_group} -n {policy} -cdn profile create -g {resource_group} -n {profile} --sku=Standard_Microsoft --location=westus -cdn waf policy set -g {resource_group} --name {policy} -cdn endpoint create -g {resource_group} --origin www.test.com --profile-name {profile} -n {endpoint1} -cdn endpoint waf policy show -g {resource_group} --profile-name {profile} --endpoint-name {endpoint1} -cdn endpoint waf policy set -g {resource_group} --profile-name {profile} --endpoint-name {endpoint1} --waf-policy-subscription-id {subscription_id} --waf-policy-resource-group-name {resource_group} --waf-policy-name {policy} -cdn endpoint show -g {resource_group} --profile-name {profile} -n {endpoint1} -cdn waf policy show -g {resource_group} -n {policy} -cdn endpoint create -g {resource_group} --origin www.test.com --profile-name {profile} -n {endpoint2} -cdn endpoint waf policy set -g {resource_group} --profile-name {profile} --endpoint-name {endpoint2} --waf-policy-id {policy_id} -cdn endpoint show -g {resource_group} --profile-name {profile} -n {endpoint2} -cdn waf policy show -g {resource_group} -n {policy} -cdn endpoint waf policy remove -y -g {resource_group} --profile-name {profile} --endpoint-name {endpoint1} -cdn endpoint waf policy show -g {resource_group} --profile-name {profile} --endpoint-name {endpoint1} -cdn endpoint show -g {resource_group} --profile-name {profile} -n {endpoint1} -cdn endpoint waf policy remove -y -g {resource_group} --profile-name {profile} --endpoint-name {endpoint2} -cdn endpoint waf policy show -g {resource_group} --profile-name {profile} --endpoint-name {endpoint2} -cdn endpoint show -g {resource_group} --profile-name {profile} -n {endpoint2} -cdn waf policy show -g {resource_group} -n {policy} -cdn waf policy managed-rule-set list-available -cdn waf policy managed-rule-set rule-group-override list-available --rule-set-type {rule_set_type} --rule-set-version {rule_set_version} -cloud show -cloud set -n AzureChinaCloud -cloud show -n AzureChinaCloud -cloud set -n AzureCloud -cloud show -cloud set -n AzureCloud -cloud show -n AzureCloud -cloud set -n AzureCloud -cloud show -cloud set -n AzureGermanCloud -cloud show -n AzureGermanCloud -cloud set -n AzureCloud -cloud show -cloud set -n AzureUSGovernment -cloud show -n AzureUSGovernment -cloud set -n AzureCloud -cloud show -cloud set -n azurechinacloud -cloud show -n AzureChinaCloud -cloud set -n AzureCloud -cloud show -cloud set -n azurecloud -cloud show -n AzureCloud -cloud set -n AzureCloud -cloud show -cloud set -n azuregermancloud -cloud show -n AzureGermanCloud -cloud set -n AzureCloud -cloud show -cloud set -n azureusgovernment -cloud show -n AzureUSGovernment -cloud set -n AzureCloud -cloud show -cloud set -n azCloud -cloud set -n AzureCloud -cloud list -cloud list --subscription foo -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --yes -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --yes -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --api-properties {apiProperties} --yes -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --api-properties {apiPropertiesJson} --yes -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --assign-identity --encryption {encryption} --yes -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --assign-identity --yes -cognitiveservices account update -n {sname} -g {rg} --encryption {encryption} -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --assign-identity --storage {storageIds} --yes -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --assign-identity --yes -cognitiveservices account update -n {sname} -g {rg} --storage {storageIds} -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account list-kinds -cognitiveservices account list-skus --kind {kind} -cognitiveservices account list-skus --kind {kind} --location {location} -cognitiveservices account create -n {name} -g {rg} --kind {kind} --sku {sku} -l {location} --yes -cognitiveservices account list-skus -n {name} -g {rg} -cognitiveservices account create -n {name} -g {rg} --kind {kind} --sku {sku} -l {location} -cognitiveservices account list-usage -n {name} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --yes -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account update -n {sname} -g {rg} --sku {sku} --tags {tags} -cognitiveservices account keys list -n {sname} -g {rg} -cognitiveservices account keys regenerate -n {sname} -g {rg} --key-name Key1 -cognitiveservices account list -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --custom-domain {customdomain} --yes -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account show-deleted --location {location} -n {sname} -g {rg} -cognitiveservices account recover --location {location} -n {sname} -g {rg} -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account purge --location {location} -n {sname} -g {rg} -cognitiveservices account list-deleted -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --yes -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices commitment-tier list -l centraluseuap -cognitiveservices account commitment-plan list -n {sname} -g {rg} -cognitiveservices account commitment-plan create -n {sname} -g {rg} --commitment-plan-name "plan" --hosting-model "Web" --plan-type "TA" --auto-renew false --current-tier "T1" --next-tier "T2" -cognitiveservices account commitment-plan list -n {sname} -g {rg} -cognitiveservices account commitment-plan show -n {sname} -g {rg} --commitment-plan-name plan -cognitiveservices account commitment-plan delete -n {sname} -g {rg} --commitment-plan-name plan -cognitiveservices account commitment-plan list -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --yes --custom-domain {customdomain} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --yes -cognitiveservices account update -n {sname} -g {rg} --custom-domain {customdomain} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --yes -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account deployment list -n {sname} -g {rg} -cognitiveservices account deployment create -n {sname} -g {rg} --deployment-name dpy --model-name ada --model-version "1" --model-format OpenAI --scale-settings-capacity 1 --scale-settings-scale-type "Manual" -cognitiveservices account deployment list -n {sname} -g {rg} -cognitiveservices account deployment show -n {sname} -g {rg} --deployment-name dpy -cognitiveservices account deployment delete -n {sname} -g {rg} --deployment-name dpy -cognitiveservices account deployment list -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --yes -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account identity show -n {sname} -g {rg} -cognitiveservices account identity assign -n {sname} -g {rg} -cognitiveservices account identity show -n {sname} -g {rg} -cognitiveservices account identity remove -n {sname} -g {rg} -cognitiveservices account identity show -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --assign-identity --yes -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -network vnet create --resource-group {rg} --name {vnetname} -network vnet subnet create --resource-group {rg} --name default --vnet-name {vnetname} --address-prefixes 10.0.0.0/24 -network vnet subnet create --resource-group {rg} --name subnet --vnet-name {vnetname} --address-prefixes 10.0.1.0/24 -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --custom-domain {customdomain} --yes -cognitiveservices account network-rule list -n {sname} -g {rg} -cognitiveservices account network-rule add -n {sname} -g {rg} --ip-address "200.0.0.1" -cognitiveservices account network-rule list -n {sname} -g {rg} -cognitiveservices account network-rule add -n {sname} -g {rg} --ip-address "100.0.0.0/24" -cognitiveservices account network-rule list -n {sname} -g {rg} -cognitiveservices account network-rule add -n {sname} -g {rg} --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/cs_cli_test_000002/subnets/default -cognitiveservices account network-rule list -n {sname} -g {rg} -cognitiveservices account network-rule add -n {sname} -g {rg} --subnet subnet --vnet-name {vnetname} -cognitiveservices account network-rule list -n {sname} -g {rg} -cognitiveservices account network-rule remove -n {sname} -g {rg} --ip-address "200.0.0.1" -cognitiveservices account network-rule list -n {sname} -g {rg} -cognitiveservices account network-rule remove -n {sname} -g {rg} --ip-address "100.0.0.0/24" -cognitiveservices account network-rule list -n {sname} -g {rg} -cognitiveservices account network-rule remove -n {sname} -g {rg} --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/cs_cli_test_000002/subnets/default -cognitiveservices account network-rule list -n {sname} -g {rg} -cognitiveservices account network-rule remove -n {sname} -g {rg} --subnet subnet --vnet-name {vnetname} -cognitiveservices account network-rule list -n {sname} -g {rg} -cognitiveservices account network-rule remove -n {sname} -g {rg} --subnet subnet --vnet-name {vnetname} -cognitiveservices account network-rule list -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --custom-domain {customdomain} -network private-link-resource list -g {rg} -n {sname} --type Microsoft.CognitiveServices/accounts -network vnet create --resource-group {rg} --name {vnetname} -l {location} -network vnet subnet create --resource-group {rg} --name default --vnet-name {vnetname} --address-prefixes 10.0.0.0/24 -cognitiveservices account show -n {sname} -g {rg} -network vnet subnet update --name default --resource-group {rg} --vnet-name {vnetname} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pename} --vnet-name {vnetname} --subnet default --private-connection-resource-id {accountId} --group-id account --connection-name {pename} -l {location} -cognitiveservices account show -n {sname} -g {rg} -network private-endpoint-connection show --id {pecId} -network private-endpoint delete --name {pename} --resource-group {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --custom-domain {customdomain} -network private-link-resource list -g {rg} -n {sname} --type Microsoft.CognitiveServices/accounts -network vnet create --resource-group {rg} --name {vnetname} -l {location} -network vnet subnet create --resource-group {rg} --name default --vnet-name {vnetname} --address-prefixes 10.0.0.0/24 -cognitiveservices account show -n {sname} -g {rg} -network vnet subnet update --name default --resource-group {rg} --vnet-name {vnetname} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pename} --vnet-name {vnetname} --subnet default --private-connection-resource-id {accountId} --group-id account --connection-name {pename} -l {location} -cognitiveservices account show -n {sname} -g {rg} -network private-endpoint-connection show --id {pecId} -network private-endpoint-connection approve --id {pecId} -network private-endpoint-connection reject --id {pecId} -network private-endpoint-connection list --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.CognitiveServices/accounts/cs_cli_test_000002 -network private-endpoint-connection delete --id {pecId} --yes -network private-endpoint-connection list --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.CognitiveServices/accounts/cs_cli_test_000002 -network private-endpoint delete --name {pename} --resource-group {rg} -cognitiveservices account delete -n {sname} -g {rg} -config set test_section1.test_option1=test_value1 -config set test_section2.test_option21=test_value21 test_section2.test_option22=test_value22 -config get -config get test_section1 -config get test_section2 -config get test_section1.test_option1 -config get test_section2.test_option21 -config get test_section2.test_option22 -config get test_section1.test_option22 -config unset test_section1.test_option1 -config unset test_section2.test_option21 test_section2.test_option22 -config set test_section1.test_option1=test_value1 --local -config set test_section2.test_option21=test_value21 test_section2.test_option22=test_value22 --local -config get --local -config get test_section1 --local -config get test_section2 --local -config get test_section1.test_option1 --local -config get test_section2.test_option21 --local -config get test_section2.test_option22 --local -config get test_section1.test_option22 --local -config unset test_section1.test_option1 --local -config unset test_section2.test_option21 test_section2.test_option22 --local -configure --defaults global=global1 -configure --defaults global2=global2 -configure --defaults local=local1 --scope local -configure --list-defaults --scope local -configure --defaults global="" global2="" -configure --defaults local="" --scope local -local-context on -local-context show -local-context show --name resource_group_name vnet_name -local-context delete --name resource_group_name vnet_name -local-context delete --all -y -local-context delete --all --purge -y -local-context delete --all --purge -y --recursive -local-context delete --name resource_group_name --all -local-context off -local-context delete --all --purge -y -consumption budget create --budget-name "costbudget" --category "cost" --amount 100.0 -s "2018-02-01" -e "2018-10-01" --time-grain "monthly" -consumption budget delete --budget-name "costbudget" -consumption budget show --budget-name "havTest01" -consumption budget create --budget-name usagetypebudget1 --amount 20 -s 2018-02-01 -e 2018-10-01 --time-grain annually --category usage --meter-filter 0dfadad2-6e4f-4078-85e1-90c230d4d482 -consumption marketplace list -consumption marketplace list --billing-period-name 201804-1 -consumption marketplace list --billing-period-name 201804-1 --top 1 -consumption pricesheet show -consumption pricesheet show --billing-period-name 20171001 -consumption usage list -p 201710 -t 5 -consumption usage list -p 201710 -a -m -t 5 -consumption usage list -t 5 -consumption usage list -a -m -t 5 -consumption usage list -t 5 -a -consumption reservation detail list --reservation-order-id ca69259e-bd4f-45c3-bf28-3f353f9cce9b -s "2017-12-01" -e "2017-12-07" -consumption reservation detail list --reservation-order-id ca69259e-bd4f-45c3-bf28-3f353f9cce9b --reservation-id f37f4b70-52ba-4344-a8bd-28abfd21d640 -s "2017-12-01" -e "2017-12-07" -consumption reservation summary list --grain "daily" --reservation-order-id ca69259e-bd4f-45c3-bf28-3f353f9cce9b -s "2017-12-01" -e "2017-12-07" -consumption reservation summary list --grain "daily" --reservation-order-id ca69259e-bd4f-45c3-bf28-3f353f9cce9b --reservation-id f37f4b70-52ba-4344-a8bd-28abfd21d640 -s "2017-12-01" -e "2017-12-07" -consumption reservation summary list --grain "monthly" --reservation-order-id ca69259e-bd4f-45c3-bf28-3f353f9cce9b -consumption reservation summary list --grain "monthly" --reservation-order-id ca69259e-bd4f-45c3-bf28-3f353f9cce9b --reservation-id f37f4b70-52ba-4344-a8bd-28abfd21d640 -consumption usage list -s {start_date} -e {end_date} -t 5 -container create -g {rg} -n {container_group_name} --image {image} --os-type {os_type} --ip-address {ip_address_type} --dns-name-label {dns_name_label} --ports {ports} --cpu {cpu} --memory {memory} --command-line {command} -e {env} --restart-policy {restart_policy} --secrets {secrets} --secrets-mount-path {secrets_mount_path} -container show -g {rg} -n {container_group_name} -container list -g {rg} -container logs -g {rg} -n {container_group_name} -container delete -g {rg} -n {container_group_name} -y -container create -g {rg} -n {container_group_name} --image {image} --registry-username {registry_username} --registry-password {password} -container show -g {rg} -n {container_group_name} -identity create -g {rg} -n {user_assigned_identity_name} -container create -g {rg} -n {container_group_name1} --image {image} --os-type {os_type} --ip-address {ip_address_type} --assign-identity -container create -g {rg} -n {container_group_name2} --image {image} --os-type {os_type} --ip-address {ip_address_type} --assign-identity {user_assigned_identity} -container create -g {rg} -n {container_group_name3} --image {image} --os-type {os_type} --ip-address {ip_address_type} --assign-identity {system_assigned_identity} {user_assigned_identity} -container create -g {rg} -n {container_group_name} --image nginx --vnet {vnet_name} -container create -g {rg} -n {container_group_name} --image nginx --subnet {subnet_name} -container create -g {rg} -n {container_group_name} --image nginx --vnet {vnet_name} --subnet {subnet_name} --ip-address {ip_addresss} -container create -g {rg} -n {container_group_name} --image {image} --os-type {os_type} --ip-address {ip_address_type} --cpu {cpu} --memory {memory} --zone {zone} --command-line {command} --restart-policy {restart_policy} --location {location} -container create -g {rg} -n {container_group_name} --image {image} -container export -g {rg} -n {container_group_name} -f "{output_file}" -container create -g {rg} -n {container_group_name} --image nginx --gitrepo-url {gitrepo_url} --gitrepo-dir {gitrepo_dir} --gitrepo-revision {gitrepo_revision} --gitrepo-mount-path {gitrepo_mount_path} -container show -g {rg} -n {container_group_name} -network vnet create -g {rg} -l eastus2 -n {vnet} --subnet-name {subnet} -network vnet show -g {rg} -n {vnet} -role assignment create --assignee e5007d2c-4b13-4a74-9b6a-605d99f03501 --role 4d97b98b-1d4f-4787-a291-c67834d212e7 --scope {vnet_id} -network vnet subnet show -g {rg} --vnet-name {vnet} --name {subnet} -managed-cassandra cluster create -c {c} -l eastus2 -g {rg} -s {subnet_id} -e {certs} --external-seed-nodes {seed_nodes} -managed-cassandra cluster show -c {c} -g {rg} -managed-cassandra cluster delete -c {c} -g {rg} --yes -network vnet create -g {rg} -l eastus2 -n {vnet} --subnet-name {subnet} -network vnet show -g {rg} -n {vnet} -role assignment create --assignee e5007d2c-4b13-4a74-9b6a-605d99f03501 --role 4d97b98b-1d4f-4787-a291-c67834d212e7 --scope {vnet_id} -network vnet subnet show -g {rg} --vnet-name {vnet} --name {subnet} -managed-cassandra cluster create -c {c} -l eastus2 -g {rg} -s {subnet_id} -i password -managed-cassandra cluster show -c {c} -g {rg} -managed-cassandra datacenter create -c {c} -d {d} -l eastus2 -g {rg} -n 3 -s {subnet_id} -managed-cassandra datacenter show -c {c} -d {d} -g {rg} -managed-cassandra datacenter list -c {c} -g {rg} -managed-cassandra cluster list -g {rg} -managed-cassandra cluster list -managed-cassandra cluster deallocate -c {c} -g {rg} -managed-cassandra cluster show -c {c} -g {rg} -managed-cassandra cluster start -c {c} -g {rg} -managed-cassandra cluster show -c {c} -g {rg} -managed-cassandra cluster invoke-command -c {c} -g {rg} --host {host} --command-name "nodetool" --arguments status="" -managed-cassandra cluster status -c {c} -g {rg} -managed-cassandra cluster delete -c {c} -g {rg} --yes -cosmosdb check-name-exists -n {acc} -cosmosdb create -n {acc} -g {rg} -cosmosdb check-name-exists -n {acc} -cosmosdb create -n {acc} -g {rg} --analytical-storage-schema-type FullFidelity -cosmosdb show -n {acc} -g {rg} -cosmosdb create -n {acc} -g {rg} --analytical-storage-schema-type FullFidelity -cosmosdb update -n {acc} -g {rg} --analytical-storage-schema-type WellDefined -cosmosdb show -n {acc} -g {rg} -cosmosdb create -n {acc} -g {rg} --capabilities EnableCassandra -cosmosdb cassandra keyspace exists -g {rg} -a {acc} -n {ks_name} -cosmosdb cassandra keyspace create -g {rg} -a {acc} -n {ks_name} -cosmosdb cassandra keyspace show -g {rg} -a {acc} -n {ks_name} -cosmosdb cassandra keyspace list -g {rg} -a {acc} -cosmosdb cassandra keyspace exists -g {rg} -a {acc} -n {ks_name} -cosmosdb cassandra keyspace delete -g {rg} -a {acc} -n {ks_name} --yes -cosmosdb cassandra keyspace list -g {rg} -a {acc} -cosmosdb create -n {acc} -g {rg} --capabilities EnableCassandra -cosmosdb cassandra keyspace create -g {rg} -a {acc} -n {ks_name} --throughput {tp1} -cosmosdb cassandra keyspace throughput show -g {rg} -a {acc} -n {ks_name} -cosmosdb cassandra keyspace throughput update -g {rg} -a {acc} -n {ks_name} --throughput {tp2} -cosmosdb cassandra table create -g {rg} -a {acc} -k {ks_name} -n {tb_name} --throughput {tp1} --schema {schema} -cosmosdb cassandra table throughput show -g {rg} -a {acc} -k {ks_name} -n {tb_name} -cosmosdb cassandra table throughput update -g {rg} -a {acc} -k {ks_name} -n {tb_name} --throughput {tp2} -cosmosdb create -n {acc} -g {rg} --capabilities EnableCassandra -cosmosdb cassandra keyspace create -g {rg} -a {acc} -n {ks_name} --throughput {tp1} -cosmosdb cassandra keyspace throughput show -g {rg} -a {acc} -n {ks_name} -cosmosdb cassandra keyspace throughput migrate --throughput-type {autoscale} -g {rg} -a {acc} -n {ks_name} -cosmosdb cassandra keyspace throughput show -g {rg} -a {acc} -n {ks_name} -cosmosdb cassandra keyspace throughput update -g {rg} -a {acc} -n {ks_name} --max-throughput {tp2} -cosmosdb cassandra keyspace throughput migrate --throughput-type {manual} -g {rg} -a {acc} -n {ks_name} -cosmosdb cassandra table create -g {rg} -a {acc} --keyspace-name {ks_name} -n {tb_name} --throughput {tp3} --schema {schema} -cosmosdb cassandra table throughput show -g {rg} -a {acc} --keyspace-name {ks_name} -n {tb_name} -cosmosdb cassandra table throughput migrate --throughput-type {autoscale} -g {rg} -a {acc} --keyspace-name {ks_name} -n {tb_name} -cosmosdb cassandra table throughput update -g {rg} -a {acc} --keyspace-name {ks_name} -n {tb_name} --max-throughput {tp4} -cosmosdb cassandra table throughput migrate --throughput-type {manual} -g {rg} -a {acc} --keyspace-name {ks_name} -n {tb_name} -cosmosdb create -n {acc} -g {rg} --capabilities EnableCassandra --enable-analytical-storage true -cosmosdb cassandra keyspace create -g {rg} -a {acc} -n {ks_name} -cosmosdb cassandra table exists -g {rg} -a {acc} -k {ks_name} -n {table_name} -cosmosdb cassandra table create -g {rg} -a {acc} -k {ks_name} -n {table_name} --schema {schema} --analytical-storage-ttl {ttl} -cosmosdb cassandra table update -g {rg} -a {acc} -k {ks_name} -n {table_name} --schema {new_schema} --analytical-storage-ttl {new_ttl} -cosmosdb cassandra table show -g {rg} -a {acc} -k {ks_name} -n {table_name} -cosmosdb cassandra table list -g {rg} -a {acc} -k {ks_name} -cosmosdb cassandra table exists -g {rg} -a {acc} -k {ks_name} -n {table_name} -cosmosdb cassandra table delete -g {rg} -a {acc} -k {ks_name} -n {table_name} --yes -cosmosdb cassandra table list -g {rg} -a {acc} -k {ks_name} -cosmosdb create -n {acc} -g {rg} -cosmosdb database create -g {rg} -n {acc} -d {db_name} -cosmosdb collection create -g {rg} -n {acc} -d {db_name} -c {col} --default-ttl 0 -cosmosdb collection show -g {rg} -n {acc} -d {db_name} -c {col} -cosmosdb collection exists -g {rg} -n {acc} -d {db_name} -c {col} -cosmosdb collection exists -g {rg} -n {acc} -d {db_name} -c invalid -cosmosdb collection list -g {rg} -n {acc} -d {db_name} -cosmosdb collection update --throughput {throughput} -g {rg} -n {acc} -d {db_name} -c {col} -cosmosdb collection update --default-ttl {ttl} -g {rg} -n {acc} -d {db_name} -c {col} -cosmosdb collection update --default-ttl 0 -g {rg} -n {acc} -d {db_name} -c {col} -cosmosdb collection delete -g {rg} -n {acc} -d {db_name} -c {col} --yes -cosmosdb create -n {acc} -g {rg} -cosmosdb database create -g {rg} -n {acc} -d {db_name} -cosmosdb database show -g {rg} -n {acc} -d {db_name} -cosmosdb database exists -g {rg} -n {acc} -d {db_name} -cosmosdb database exists -g {rg} -n {acc} -d invalid -cosmosdb database list -g {rg} -n {acc} -cosmosdb database delete -g {rg} -n {acc} -d {db_name} --yes -cosmosdb database exists -g {rg} -n {acc} -d {db_name} -cosmosdb create -n {acc} -g {rg} --backup-policy-type Continuous --locations regionName={loc} -cosmosdb show -n {acc} -g {rg} -cosmosdb restorable-database-account show --location {loc} --instance-id {ins_id} -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} -cosmosdb sql container create -g {rg} -a {acc} -d {db_name} -n {col} -p /pk -cosmosdb delete -n {acc} -g {rg} --yes -cosmosdb restore --account-name {acc} -g {rg} --restore-timestamp {rts} --location {loc} --target-database-account-name {restored_acc} -cosmosdb show -n {restored_acc} -g {rg} -cosmosdb create -n {acc} -g {rg} --capabilities EnableGremlin -cosmosdb gremlin database exists -g {rg} -a {acc} -n {db_name} -cosmosdb gremlin database create -g {rg} -a {acc} -n {db_name} -cosmosdb gremlin database show -g {rg} -a {acc} -n {db_name} -cosmosdb gremlin database list -g {rg} -a {acc} -cosmosdb gremlin database exists -g {rg} -a {acc} -n {db_name} -cosmosdb gremlin database delete -g {rg} -a {acc} -n {db_name} --yes -cosmosdb gremlin database list -g {rg} -a {acc} -cosmosdb create -n {acc} -g {rg} --capabilities EnableGremlin -cosmosdb gremlin database create -g {rg} -a {acc} -n {db_name} -cosmosdb gremlin graph exists -g {rg} -a {acc} -d {db_name} -n {gp_name} -cosmosdb gremlin graph create -g {rg} -a {acc} -d {db_name} -n {gp_name} -p {part} --ttl {ttl} --conflict-resolution-policy {conflict_resolution} --idx {indexing} -cosmosdb gremlin graph update -g {rg} -a {acc} -d {db_name} -n {gp_name} --ttl {nttl} -cosmosdb gremlin graph show -g {rg} -a {acc} -d {db_name} -n {gp_name} -cosmosdb gremlin graph list -g {rg} -a {acc} -d {db_name} -cosmosdb gremlin graph exists -g {rg} -a {acc} -d {db_name} -n {gp_name} -cosmosdb gremlin graph delete -g {rg} -a {acc} -d {db_name} -n {gp_name} --yes -cosmosdb gremlin graph list -g {rg} -a {acc} -d {db_name} -cosmosdb create -n {acc} -g {rg} --capabilities EnableGremlin -cosmosdb gremlin database create -g {rg} -a {acc} -n {db_name} --throughput {tp1} -cosmosdb gremlin database throughput show -g {rg} -a {acc} -n {db_name} -cosmosdb gremlin database throughput update -g {rg} -a {acc} -n {db_name} --throughput {tp2} -cosmosdb gremlin graph create -g {rg} -a {acc} -d {db_name} -n {gp_name} -p {part} --throughput {tp1} -cosmosdb gremlin graph throughput show -g {rg} -a {acc} -d {db_name} -n {gp_name} -cosmosdb gremlin graph throughput update -g {rg} -a {acc} -d {db_name} -n {gp_name} --throughput {tp2} -cosmosdb create -n {acc} -g {rg} --capabilities EnableGremlin -cosmosdb gremlin database create -g {rg} -a {acc} -n {db_name} --throughput {tp1} -cosmosdb gremlin database throughput show -g {rg} -a {acc} -n {db_name} -cosmosdb gremlin database throughput migrate --throughput-type {autoscale} -g {rg} -a {acc} -n {db_name} -cosmosdb gremlin database throughput show -g {rg} -a {acc} -n {db_name} -cosmosdb gremlin database throughput update -g {rg} -a {acc} -n {db_name} --max-throughput {tp2} -cosmosdb gremlin database throughput migrate --throughput-type {manual} -g {rg} -a {acc} -n {db_name} -cosmosdb gremlin graph create -g {rg} -a {acc} -d {db_name} -n {graph_name} -p {part} --throughput {tp3} -cosmosdb gremlin graph throughput show -g {rg} -a {acc} -d {db_name} -n {graph_name} -cosmosdb gremlin graph throughput migrate --throughput-type {autoscale} -g {rg} -a {acc} -d {db_name} -n {graph_name} -cosmosdb gremlin graph throughput update -g {rg} -a {acc} -d {db_name} -n {graph_name} --max-throughput {tp4} -cosmosdb gremlin graph throughput migrate --throughput-type {manual} -g {rg} -a {acc} -d {db_name} -n {graph_name} -keyvault set-policy -n {kv_name} -g {rg} --spn a232010e-820c-4083-83bb-3ace5fc29d0b --key-permissions get unwrapKey wrapKey -keyvault key create -n {key_name} --kty RSA --size 3072 --vault-name {kv_name} -cosmosdb create -n {acc} -g {rg} --locations regionName={location} failoverPriority=0 --key-uri {key_uri} -cosmosdb locations list -cosmosdb locations show --location {loc} -keyvault set-policy -n {kv_name} -g {rg} --spn a232010e-820c-4083-83bb-3ace5fc29d0b --key-permissions get unwrapKey wrapKey -keyvault key create -n {key_name} --kty RSA --size 3072 --vault-name {kv_name} -cosmosdb create -n {acc} -g {rg} --locations regionName={location} failoverPriority=0 --key-uri {key_uri} --assign-identity [system] --default-identity FirstPartyIdentity -cosmosdb identity remove -n {acc} -g {rg} -cosmosdb identity assign -n {acc} -g {rg} -keyvault set-policy -n {kv_name} -g {rg} --object-id {identity_principal_id} --key-permissions get unwrapKey wrapKey -cosmosdb update -n {acc} -g {rg} --default-identity SystemAssignedIdentity -cosmosdb identity remove -n {acc} -g {rg} -cosmosdb identity assign -n {acc} -g {rg} -identity create -n {id1} -g {rg} -identity create -n {id2} -g {rg} -cosmosdb identity assign -n {acc} -g {rg} --identities {id1} -cosmosdb identity assign -n {acc} -g {rg} --identities {id2} -cosmosdb identity remove -n {acc} -g {rg} -cosmosdb identity remove -n {acc} -g {rg} --identities {id2} -cosmosdb identity assign -n {acc} -g {rg} --identities {id2} -cosmosdb identity remove -n {acc} -g {rg} --identities {id1} {id2} -cosmosdb identity assign -n {acc} -g {rg} --identities {id1} {id2} [system] -cosmosdb identity remove -n {acc} -g {rg} --identities {id2} -cosmosdb identity remove -n {acc} -g {rg} --identities {id1} -cosmosdb identity assign -n {acc} -g {rg} --identities {id1} {id2} [system] -cosmosdb identity remove -n {acc} -g {rg} --identities {id1} {id2} [system] -keyvault set-policy --name {kv_name} --object-id {id1principal} --key-permissions get unwrapKey wrapKey -cosmosdb create -n {acc2} -g {rg} --locations regionName={location} failoverPriority=0 --key-uri {key_uri} --assign-identity {id1} --default-identity "UserAssignedIdentity={id1}" -cosmosdb create -n {acc} -g {rg} --kind MongoDB --enable-analytical-storage true --server-version 3.2 -cosmosdb mongodb database create -g {rg} -a {acc} -n {db_name} -cosmosdb mongodb collection exists -g {rg} -a {acc} -d {db_name} -n {col_name} -cosmosdb mongodb collection create -g {rg} -a {acc} -d {db_name} -n {col_name} --shard {shard_key} --analytical-storage-ttl {ttl} -cosmosdb mongodb collection update -g {rg} -a {acc} -d {db_name} -n {col_name} --idx {indexes} --analytical-storage-ttl {new_ttl} -cosmosdb mongodb collection show -g {rg} -a {acc} -d {db_name} -n {col_name} -cosmosdb mongodb collection list -g {rg} -a {acc} -d {db_name} -cosmosdb mongodb collection exists -g {rg} -a {acc} -d {db_name} -n {col_name} -cosmosdb mongodb collection delete -g {rg} -a {acc} -d {db_name} -n {col_name} --yes -cosmosdb mongodb collection list -g {rg} -a {acc} -d {db_name} -cosmosdb mongodb retrieve-latest-backup-time -g {rg} -a {acc} -d {db_name} -c {col} -l {loc} -cosmosdb create -n {acc} -g {rg} --backup-policy-type Continuous --locations regionName={loc} --kind MongoDB -cosmosdb show -n {acc} -g {rg} -cosmosdb mongodb retrieve-latest-backup-time -g {rg} -a {acc} -d {db_name} -c {col} -l {loc} -cosmosdb mongodb database create -g {rg} -a {acc} -n {db_name} -cosmosdb mongodb retrieve-latest-backup-time -g {rg} -a {acc} -d {db_name} -c {col} -l {loc} -cosmosdb mongodb collection create -g {rg} -a {acc} -d {db_name} -n {col} --shard {shard_key} --throughput {throughput} -cosmosdb mongodb retrieve-latest-backup-time -g {rg} -a {acc} -d {db_name} -c {col} -l {loc} -cosmosdb mongodb retrieve-latest-backup-time -g {rg} -a {acc} -d {db_name} -c {col} -l {loc} -cosmosdb mongodb retrieve-latest-backup-time -g {rg} -a {acc} -d {db_name} -c {col} -l {loc} -cosmosdb create -n {acc} -g {rg} --kind MongoDB -cosmosdb mongodb database exists -g {rg} -a {acc} -n {db_name} -cosmosdb mongodb database create -g {rg} -a {acc} -n {db_name} -cosmosdb mongodb database show -g {rg} -a {acc} -n {db_name} -cosmosdb mongodb database list -g {rg} -a {acc} -cosmosdb mongodb database exists -g {rg} -a {acc} -n {db_name} -cosmosdb mongodb database delete -g {rg} -a {acc} -n {db_name} --yes -cosmosdb mongodb database list -g {rg} -a {acc} -cosmosdb create -n {acc} -g {rg} --kind MongoDB -cosmosdb mongodb database create -g {rg} -a {acc} -n {db_name} --throughput {tp1} -cosmosdb mongodb database throughput show -g {rg} -a {acc} -n {db_name} -cosmosdb mongodb database throughput update -g {rg} -a {acc} -n {db_name} --throughput {tp2} -cosmosdb mongodb collection create -g {rg} -a {acc} -d {db_name} -n {col_name} --shard {shard_key} --throughput {tp1} -cosmosdb mongodb collection throughput show -g {rg} -a {acc} -d {db_name} -n {col_name} -cosmosdb mongodb collection throughput update -g {rg} -a {acc} -d {db_name} -n {col_name} --throughput {tp2} -cosmosdb create -n {acc} -g {rg} --kind MongoDB -cosmosdb mongodb database create -g {rg} -a {acc} -n {db_name} --throughput {tp1} -cosmosdb mongodb database throughput show -g {rg} -a {acc} -n {db_name} -cosmosdb mongodb database throughput migrate --throughput-type {autoscale} -g {rg} -a {acc} -n {db_name} -cosmosdb mongodb database throughput show -g {rg} -a {acc} -n {db_name} -cosmosdb mongodb database throughput update -g {rg} -a {acc} -n {db_name} --max-throughput {tp2} -cosmosdb mongodb database throughput migrate --throughput-type {manual} -g {rg} -a {acc} -n {db_name} -cosmosdb mongodb collection create -g {rg} -a {acc} -d {db_name} -n {col_name} --throughput {tp3} --shard {shard_key} -cosmosdb mongodb collection throughput show -g {rg} -a {acc} -d {db_name} -n {col_name} -cosmosdb mongodb collection throughput migrate --throughput-type {autoscale} -g {rg} -a {acc} -d {db_name} -n {col_name} -cosmosdb mongodb collection throughput update -g {rg} -a {acc} -d {db_name} -n {col_name} --max-throughput {tp4} -cosmosdb mongodb collection throughput migrate --throughput-type {manual} -g {rg} -a {acc} -d {db_name} -n {col_name} -cosmosdb create -n {acc} -g {rg} --backup-policy-type Continuous --locations regionName={loc} --kind MongoDB -cosmosdb show -n {acc} -g {rg} -cosmosdb mongodb database create -g {rg} -a {acc} -n {db_name} -cosmosdb mongodb collection create -g {rg} -a {acc} -d {db_name} -n {col} --shard {shard_key} --throughput {throughput} -cosmosdb restorable-database-account show --location {loc} --instance-id {ins_id} -cosmosdb mongodb restorable-database list --location {loc} --instance-id {ins_id} -cosmosdb mongodb restorable-collection list --location {loc} --instance-id {ins_id} --database-rid {db_rid} -cosmosdb mongodb restorable-resource list --restore-location {loc} -l {loc} --instance-id {ins_id} --restore-timestamp {rts} -network vnet create --name {vnet} --resource-group {rg} --subnet-name {sub} -cosmosdb create -n {acc} -g {rg} --enable-virtual-network -cosmosdb network-rule add -n {acc} -g {rg} --subnet {vnet} -cosmosdb network-rule add -n {acc} -g {rg} --virtual-network {vnet} --subnet {sub} --ignore-missing-vnet-service-endpoint -cosmosdb network-rule add -n {acc} -g {rg} --vnet-name {vnet} --subnet {sub} --ignore-missing-endpoint -network vnet create --name {vnet} --resource-group {rg} --subnet-name {sub} -network vnet subnet update -g {rg} --vnet-name {vnet} -n {sub} --service-endpoints Microsoft.AzureCosmosDB -cosmosdb create -n {acc} -g {rg} --enable-virtual-network --virtual-network-rule {subnet_id} -cosmosdb network-rule list -n {acc} -g {rg} -network vnet create --name {vnet} --resource-group {rg} --subnet-name {sub} -cosmosdb create -n {acc} -g {rg} --enable-virtual-network -cosmosdb network-rule add -n {acc} -g {rg} --subnet {subnet_id} --ignore-missing-vnet-service-endpoint -cosmosdb network-rule remove -n {acc} -g {rg} --subnet {subnet_id} -cosmosdb network-rule list -n {acc} -g {rg} -cosmosdb create -n {acc} -g {rg} -network vnet create -n {vnet} -g {rg} -l {loc} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} -l {loc} --connection-name {pe_connection} --private-connection-resource-id {acc_id} --group-ids Sql -cosmosdb private-endpoint-connection show --id {pec_id} -cosmosdb private-endpoint-connection show --account-name {acc} --name {pe_name} --resource-group {rg} -cosmosdb private-endpoint-connection show -a {acc} -n {pe_name} -g {rg} -cosmosdb private-endpoint-connection approve --account-name {acc} --resource-group {rg} --name {pe_name} --description "{approval_desc}" -cosmosdb private-endpoint-connection reject --id {pec_id} --description "{rejection_desc}" -cosmosdb private-endpoint-connection delete --id {pec_id} -cosmosdb create -n {acc} -g {rg} -cosmosdb private-link-resource list --account-name {acc} --resource-group {rg} -cosmosdb create -n {acc} -g {rg} --backup-policy-type Continuous --locations regionName={loc} -cosmosdb show -n {acc} -g {rg} -cosmosdb restorable-database-account show --location {loc} --instance-id {ins_id} -cosmosdb restore --account-name {acc} -g {rg} --restore-timestamp {invalid_restore_time} --location {loc} --target-database-account-name {restored_acc} -cosmosdb restore --account-name {acc} -g {rg} --restore-timestamp {invalid_restore_time} --location {loc} --target-database-account-name {restored_acc} -cosmosdb restore --account-name {invalid_account_name} -g {rg} --restore-timestamp {rts} --location {loc} --target-database-account-name {restored_acc} -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} -cosmosdb sql container create -g {rg} -a {acc} -d {db_name} -n {col} -p /pk -cosmosdb restore --account-name {acc} -g {rg} --restore-timestamp {rts} --location {loc} --target-database-account-name {restored_acc} -cosmosdb show -n {restored_acc} -g {rg} -cosmosdb create -n {acc} -g {rg} --backup-policy-type Continuous --locations regionName={loc} -cosmosdb show -n {acc} -g {rg} -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} -cosmosdb sql container create -g {rg} -a {acc} -d {db_name} -n {col} -p /pk -cosmosdb restorable-database-account list -l {loc} -cosmosdb create -n {restored_acc} -g {rg} --is-restore-request true --restore-source {db_id} --restore-timestamp {rts} -cosmosdb show -n {restored_acc} -g {rg} -cosmosdb create -n {acc} -g {rg} -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} -cosmosdb sql container exists -g {rg} -a {acc} -d {db_name} -n {ctn_name} -cosmosdb sql container create -g {rg} -a {acc} -d {db_name} -n {ctn_name} -p {part} --ttl {ttl} --unique-key-policy {unique_key} --conflict-resolution-policy {conflict_resolution} --idx {indexing} -cosmosdb sql container update -g {rg} -a {acc} -d {db_name} -n {ctn_name} --ttl {nttl} -cosmosdb sql container show -g {rg} -a {acc} -d {db_name} -n {ctn_name} -cosmosdb sql container list -g {rg} -a {acc} -d {db_name} -cosmosdb sql container exists -g {rg} -a {acc} -d {db_name} -n {ctn_name} -cosmosdb sql container delete -g {rg} -a {acc} -d {db_name} -n {ctn_name} --yes -cosmosdb sql container list -g {rg} -a {acc} -d {db_name} -cosmosdb create -n {acc} -g {rg} --enable-analytical-storage true -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} -cosmosdb sql container create -g {rg} -a {acc} -d {db_name} -n {ctn_name} -p {part} --analytical-storage-ttl {ttl} -cosmosdb sql container delete -g {rg} -a {acc} -d {db_name} -n {ctn_name} --yes -cosmosdb sql container list -g {rg} -a {acc} -d {db_name} -cosmosdb sql retrieve-latest-backup-time -g {rg} -a {acc} -d {db_name} -c {col} -l {loc} -cosmosdb create -n {acc} -g {rg} --backup-policy-type Continuous --locations regionName={loc} --kind GlobalDocumentDB -cosmosdb show -n {acc} -g {rg} -cosmosdb sql retrieve-latest-backup-time -g {rg} -a {acc} -d {db_name} -c {col} -l {loc} -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} -cosmosdb sql retrieve-latest-backup-time -g {rg} -a {acc} -d {db_name} -c {col} -l {loc} -cosmosdb sql container create -g {rg} -a {acc} -d {db_name} -n {col} -p /pk -cosmosdb sql retrieve-latest-backup-time -g {rg} -a {acc} -d {db_name} -c {col} -l {loc} -cosmosdb sql retrieve-latest-backup-time -g {rg} -a {acc} -d {db_name} -c {col} -l {loc} -cosmosdb sql retrieve-latest-backup-time -g {rg} -a {acc} -d {db_name} -c {col} -l {loc} -cosmosdb create -n {acc} -g {rg} -cosmosdb sql database exists -g {rg} -a {acc} -n {db_name} -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} -cosmosdb sql database show -g {rg} -a {acc} -n {db_name} -cosmosdb sql database list -g {rg} -a {acc} -cosmosdb sql database exists -g {rg} -a {acc} -n {db_name} -cosmosdb sql database delete -g {rg} -a {acc} -n {db_name} --yes -cosmosdb sql database list -g {rg} -a {acc} -cosmosdb create -n {acc} -g {rg} -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} --max-throughput {tp1} -cosmosdb sql database throughput show -g {rg} -a {acc} -n {db_name} -cosmosdb sql database throughput update -g {rg} -a {acc} -n {db_name} --max-throughput {tp2} -cosmosdb sql container create -g {rg} -a {acc} -d {db_name} -n {ctn_name} -p {part} --max-throughput {tp1} -cosmosdb sql container throughput show -g {rg} -a {acc} -d {db_name} -n {ctn_name} -cosmosdb sql container throughput update -g {rg} -a {acc} -d {db_name} -n {ctn_name} --max-throughput {tp2} -cosmosdb create -n {acc} -g {rg} -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} --throughput {tp1} -cosmosdb sql database throughput show -g {rg} -a {acc} -n {db_name} -cosmosdb sql database throughput update -g {rg} -a {acc} -n {db_name} --throughput {tp2} -cosmosdb sql container create -g {rg} -a {acc} -d {db_name} -n {ctn_name} -p {part} --throughput {tp1} -cosmosdb sql container throughput show -g {rg} -a {acc} -d {db_name} -n {ctn_name} -cosmosdb sql container throughput update -g {rg} -a {acc} -d {db_name} -n {ctn_name} --throughput {tp2} -cosmosdb create -n {acc} -g {rg} -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} --throughput {tp1} -cosmosdb sql database throughput show -g {rg} -a {acc} -n {db_name} -cosmosdb sql database throughput migrate -g {rg} -a {acc} -n {db_name} -t {autoscale} -cosmosdb sql database throughput show -g {rg} -a {acc} -n {db_name} -cosmosdb sql database throughput update -g {rg} -a {acc} -n {db_name} --max-throughput {tp2} -cosmosdb sql database throughput migrate --throughput-type {manual} -g {rg} -a {acc} -n {db_name} -cosmosdb sql container create -g {rg} -a {acc} -d {db_name} -n {ctn_name} -p {part} --throughput {tp3} -cosmosdb sql container throughput show -g {rg} -a {acc} -d {db_name} -n {ctn_name} -cosmosdb sql container throughput migrate -g {rg} -a {acc} -d {db_name} -n {ctn_name} --throughput-type {autoscale} -cosmosdb sql container throughput update -g {rg} -a {acc} -d {db_name} -n {ctn_name} --max-throughput {tp4} -cosmosdb sql container throughput migrate --throughput-type {manual} -g {rg} -a {acc} -d {db_name} -n {ctn_name} -cosmosdb create -n {acc} -g {rg} --backup-policy-type Continuous --locations regionName={loc} -cosmosdb show -n {acc} -g {rg} -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} -cosmosdb sql container create -g {rg} -a {acc} -d {db_name} -n {col} -p /pk -cosmosdb restorable-database-account show --location {loc} --instance-id {ins_id} -cosmosdb sql restorable-database list --location {loc} --instance-id {ins_id} -cosmosdb sql restorable-container list --location {loc} --instance-id {ins_id} --database-rid {db_rid} -cosmosdb sql restorable-resource list --restore-location {loc} -l {loc} --instance-id {ins_id} --restore-timestamp {rts} -cosmosdb create -n {acc} -g {rg} --locations regionName=eastus2 -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} -cosmosdb sql role definition create -g {rg} -a {acc} -b "{create_body}" -cosmosdb sql role definition exists -g {rg} -a {acc} -i {role_def_id} -cosmosdb sql role definition show -g {rg} -a {acc} -i {role_def_id} -cosmosdb sql role definition update -g {rg} -a {acc} -b "{update_body}" -cosmosdb sql role definition create -g {rg} -a {acc} -b "{create_body2}" -cosmosdb sql role definition list -g {rg} -a {acc} -cosmosdb sql role assignment create -g {rg} -a {acc} -s {scope} -p {principal_id} -d {fully_qualified_role_def_id} -i {role_assignment_id} -cosmosdb sql role assignment exists -g {rg} -a {acc} -i {role_assignment_id} -cosmosdb sql role assignment show -g {rg} -a {acc} -i {role_assignment_id} -cosmosdb sql role assignment update -g {rg} -a {acc} -d {role_def_id2} -i {fully_qualified_role_assignment_id} -cosmosdb sql role assignment create -g {rg} -a {acc} -s {scope} -p {principal_id} -n roleName2 -i {role_assignment_id2} -cosmosdb sql role assignment exists -g {rg} -a {acc} -i {role_assignment_id3} -cosmosdb sql role assignment create -g {rg} -a {acc} -s {scope} -p {principal_id} -n roleName2 -i {role_assignment_id3} --no-wait -cosmosdb sql role assignment exists -g {rg} -a {acc} -i {role_assignment_id3} -cosmosdb sql role assignment wait -g {rg} -a {acc} -i {role_assignment_id3} --exists -cosmosdb sql role assignment exists -g {rg} -a {acc} -i {role_assignment_id3} -cosmosdb sql role assignment list -g {rg} -a {acc} -cosmosdb sql role assignment delete -g {rg} -a {acc} -i {role_assignment_id} --yes -cosmosdb sql role assignment delete -g {rg} -a {acc} -i {role_assignment_id2} --yes -cosmosdb sql role assignment delete -g {rg} -a {acc} -i {role_assignment_id3} --yes -cosmosdb sql role assignment list -g {rg} -a {acc} -cosmosdb sql role definition delete -g {rg} -a {acc} -i {role_def_id} --yes -cosmosdb sql role definition delete -g {rg} -a {acc} -i {fully_qualified_role_def_id2} --yes -cosmosdb sql role definition list -g {rg} -a {acc} -cosmosdb create -n {acc} -g {rg} -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} -cosmosdb sql container create -g {rg} -a {acc} -d {db_name} -n {ctn_name} -p {part} -cosmosdb sql stored-procedure create --resource-group {rg} -a {acc} -d {db_name} -c {ctn_name} -n {sproc_name} -b {body} -cosmosdb sql stored-procedure update -g {rg} -a {acc} -d {db_name} -c {ctn_name} -n {sproc_name} -b {nbody} -cosmosdb sql stored-procedure show -g {rg} -a {acc} -d {db_name} -c {ctn_name} -n {sproc_name} -cosmosdb sql stored-procedure list -g {rg} -a {acc} -d {db_name} -c {ctn_name} -cosmosdb sql stored-procedure delete -g {rg} -a {acc} -d {db_name} -c {ctn_name} -n {sproc_name} --yes -cosmosdb sql stored-procedure list -g {rg} -a {acc} -d {db_name} -c {ctn_name} -cosmosdb create -n {acc} -g {rg} -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} -cosmosdb sql container create -g {rg} -a {acc} -d {db_name} -n {ctn_name} -p {part} -cosmosdb sql trigger create --resource-group {rg} -a {acc} -d {db_name} -c {ctn_name} -n {trigger_name} -b {body} -cosmosdb sql trigger update -g {rg} -a {acc} -d {db_name} -c {ctn_name} -n {trigger_name} -b {nbody} --operation {op} -t {type} -cosmosdb sql trigger show -g {rg} -a {acc} -d {db_name} -c {ctn_name} -n {trigger_name} -cosmosdb sql trigger list -g {rg} -a {acc} -d {db_name} -c {ctn_name} -cosmosdb sql trigger delete -g {rg} -a {acc} -d {db_name} -c {ctn_name} -n {trigger_name} --yes -cosmosdb sql trigger list -g {rg} -a {acc} -d {db_name} -c {ctn_name} -cosmosdb create -n {acc} -g {rg} -cosmosdb sql database create -g {rg} -a {acc} -n {db_name} -cosmosdb sql container create -g {rg} -a {acc} -d {db_name} -n {ctn_name} -p {part} -cosmosdb sql user-defined-function create --resource-group {rg} -a {acc} -d {db_name} -c {ctn_name} -n {udf_name} -b {body} -cosmosdb sql user-defined-function update -g {rg} -a {acc} -d {db_name} -c {ctn_name} -n {udf_name} -b {nbody} -cosmosdb sql user-defined-function show -g {rg} -a {acc} -d {db_name} -c {ctn_name} -n {udf_name} -cosmosdb sql user-defined-function list -g {rg} -a {acc} -d {db_name} -c {ctn_name} -cosmosdb sql user-defined-function delete -g {rg} -a {acc} -d {db_name} -c {ctn_name} -n {udf_name} --yes -cosmosdb sql user-defined-function list -g {rg} -a {acc} -d {db_name} -c {ctn_name} -cosmosdb create -n {acc} -g {rg} --capabilities EnableTable -cosmosdb table exists -g {rg} -a {acc} -n {table_name} -cosmosdb table create -g {rg} -a {acc} -n {table_name} -cosmosdb table show -g {rg} -a {acc} -n {table_name} -cosmosdb table list -g {rg} -a {acc} -cosmosdb table exists -g {rg} -a {acc} -n {table_name} -cosmosdb table delete -g {rg} -a {acc} -n {table_name} --yes -cosmosdb table list -g {rg} -a {acc} -cosmosdb create -n {acc} -g {rg} --capabilities EnableTable -cosmosdb table create -g {rg} -a {acc} -n {tb_name} --throughput {tp1} -cosmosdb table throughput show -g {rg} -a {acc} -n {tb_name} -cosmosdb table throughput update -g {rg} -a {acc} -n {tb_name} --throughput {tp2} -cosmosdb create -n {acc} -g {rg} --capabilities EnableTable -cosmosdb table create -g {rg} -a {acc} -n {table_name} --throughput {tp1} -cosmosdb table throughput show -g {rg} -a {acc} -n {table_name} -cosmosdb table throughput migrate --throughput-type {autoscale} -g {rg} -a {acc} -n {table_name} -cosmosdb table throughput show -g {rg} -a {acc} -n {table_name} -cosmosdb table throughput update -g {rg} -a {acc} -n {table_name} --max-throughput {tp2} -cosmosdb table throughput migrate --throughput-type {manual} -g {rg} -a {acc} -n {table_name} -cosmosdb create -n {acc} -g {rg} --enable-automatic-failover --default-consistency-level ConsistentPrefix --network-acl-bypass AzureServices --network-acl-bypass-resource-ids {network_acl_bypass_resource_id} --backup-interval 480 --backup-retention 8 -cosmosdb show -n {acc} -g {rg} -cosmosdb update -n {acc} -g {rg} --enable-automatic-failover false --default-consistency-level Session --disable-key-based-metadata-write-access --enable-public-network false --network-acl-bypass None -cosmosdb show -n {acc} -g {rg} -cosmosdb update -n {acc} -g {rg} --tags testKey=testValue --enable-public-network -cosmosdb show -n {acc} -g {rg} -cosmosdb create -n {acc} -g {rg} -cosmosdb delete -n {acc} -g {rg} --yes -cosmosdb create -n {acc} -g {rg} --enable-multiple-write-locations --default-consistency-level ConsistentPrefix -cosmosdb show -n {acc} -g {rg} -cosmosdb create -n {acc} -g {rg} -cosmosdb keys list -n {acc} -g {rg} -cosmosdb keys regenerate -n {acc} -g {rg} --key-kind primary -cosmosdb keys regenerate -n {acc} -g {rg} --key-kind primaryReadonly -cosmosdb keys regenerate -n {acc} -g {rg} --key-kind secondary -cosmosdb keys regenerate -n {acc} -g {rg} --key-kind secondaryReadonly -cosmosdb keys list -n {acc} -g {rg} -cosmosdb list-read-only-keys -n {acc} -g {rg} -cosmosdb list-keys -n {acc} -g {rg} -cosmosdb create -n {acc1} -g {rg} -cosmosdb create -n {acc2} -g {rg} -cosmosdb list -g {rg} -cosmosdb create -n {acc} -g {rg} -cosmosdb list-keys -n {acc} -g {rg} -cosmosdb show -n {acc} -g {rg} -cosmosdb database list -n {acc} -g {rg} -cosmosdb database list -n {acc} --key {primary_master_key} -cosmosdb database list --url-connection {url} --key {primary_master_key} -cosmosdb create -n {acc} -g {rg} --locations {write_location}=0 --locations regionName={read_location} failoverPriority=1 isZoneRedundant=false -cosmosdb create -n {acc} -g {rg} --locations regionName={write_location} failoverPriority=0 --locations regionName={read_location} failoverPriority=1 -cosmosdb failover-priority-change -n {acc} -g {rg} --failover-policies {read_location}=0 {write_location}=1 -cosmosdb show -n {acc} -g {rg} -cosmosdb create -n {acc} -g {rg} -cosmosdb show -n {acc} -g {rg} -cosmosdb update -n {acc} -g {rg} --backup-interval 120 --backup-retention 8 -cosmosdb update -n {acc} -g {rg} --backup-policy-type Continuous -cosmosdb create -n {acc} -g {rg} --kind MongoDB --ip-range-filter "20.10.10.10,12.12.122.122,12.22.11.11" --server-version 3.2 --enable-analytical-storage true --enable-free-tier false -cosmosdb show -n {acc} -g {rg} -cosmosdb update -n {acc} -g {rg} --capabilities EnableAggregationPipeline --server-version 3.2 -cosmosdb show -n {acc} -g {rg} -cosmosdb keys list --type connection-strings -n {acc} -g {rg} -cosmosdb update -n {acc} -g {rg} --backup-interval 120 --backup-retention 8 -cosmosdb update -n {acc} -g {rg} --backup-interval 120 --backup-retention 8 --backup-redundancy {geo} -cosmosdb update -n {acc} -g {rg} --backup-interval 120 --backup-retention 8 --backup-redundancy {lrs} -databoxedge device create -l {location} --sku {sku} --name {name} -g {rg} -databoxedge device update --name {name} -g {rg} --tags {tags} -databoxedge device list -g {rg} -databoxedge device show -n {name} -g {rg} -databoxedge device show-update-summary -n {name} -g {rg} -databoxedge alert list -d {name} -g {rg} -databoxedge list-node -g {rg} -d {name} -databoxedge device delete -n {name} -g {rg} -y -databoxedge device list -g {rg} -databoxedge bandwidth-schedule create --device-name {name} --days {days} --name {bwname} --rate-in-mbps {rate} --resource-group {rg} --start {start} --stop {stop} -databoxedge bandwidth-schedule update --device-name {name} --days {days-update} --name {bwname} --rate-in-mbps {rate-update} --resource-group {rg} --start {start-update} --stop {stop-update} -databoxedge bandwidth-schedule list -d {name} -g {rg} -databoxedge bandwidth-schedule show -d {name} -g {rg} --name {bwname} -databoxedge bandwidth-schedule delete -d {name} -g {rg} --name {bwname} -y -databoxedge bandwidth-schedule list -d {name} -g {rg} -databoxedge device create -l {location} --sku {sku} --name {name} -g {rg} -databoxedge order create --device-name {name} --company-name Microsoft --contact-person JohnMcclane --email-list john@microsoft.com --phone 426-9400 --address-line1 MicrosoftCorporation --city WA --country "United States" --postal-code 98052 --state WA --resource-group {rg} --status Untracked -databoxedge order update --device-name {name} --company-name Microsoft --contact-person JohnMcclane --email-list john@microsoft.com --phone 426-9400 --address-line1 MicrosoftCorporation --city WA --country "United States" --postal-code 98052 --state WA --resource-group {rg} --status Untracked -databoxedge order list -d {name} -g {rg} -databoxedge order show -d {name} -g {rg} -databoxedge order delete -d {name} -g {rg} -y -databoxedge order list -d {name} -g {rg} -dls account create -g {rg} -n {dls1} -l {loc} --disable-encryption -dls account create -g {rg} -n {dls2} -l {loc} --disable-encryption -storage account create -g {rg} -n {wasb} -l {loc} --sku Standard_GRS -storage account keys list -g {rg} -n {wasb} -dla account create -g {rg} -n {dla} -l {loc} --default-data-lake-store {dls1} -dla account show -n {dla} -g {rg} -dla account list -g {rg} -dla account list -dla account update -g {rg} -n {dla} --firewall-state Enabled --max-degree-of-parallelism 15 --max-job-count 2 --query-store-retention 15 --allow-azure-ips Enabled -dla account show -n {dla} -g {rg} -dla account blob-storage add -g {rg} -n {dla} --storage-account-name {wasb} --access-key {wasb_key} -dla account blob-storage show -g {rg} -n {dla} --storage-account-name {wasb} -dla account blob-storage list -g {rg} -n {dla} -dla account blob-storage delete -g {rg} -n {dla} --storage-account-name {wasb} -dla account blob-storage list -g {rg} -n {dla} -dla account data-lake-store add -g {rg} -n {dla} --data-lake-store-account-name {dls2} -dla account data-lake-store show -g {rg} -n {dla} --data-lake-store-account-name {dls2} -dla account data-lake-store list -g {rg} -n {dla} -dla account data-lake-store delete -g {rg} -n {dla} --data-lake-store-account-name {dls2} -dla account data-lake-store list -g {rg} -n {dla} -dla account compute-policy create -g {rg} -n {dla} --compute-policy-name {user_policy} --object-id {user_oid} --object-type User -dla account compute-policy create -g {rg} -n {dla} --compute-policy-name {user_policy} --object-id {user_oid} --object-type User --max-dop-per-job 2 -dla account compute-policy show -g {rg} -n {dla} --compute-policy-name {user_policy} -dla account compute-policy create -g {rg} -n {dla} --compute-policy-name {group_policy} --object-id {group_oid} --object-type Group --max-dop-per-job 2 -dla account compute-policy update -g {rg} -n {dla} --compute-policy-name {user_policy} --min-priority-per-job 2 -dla account compute-policy list -g {rg} -n {dla} -dla account compute-policy delete -g {rg} -n {dla} --compute-policy-name {user_policy} -dla account compute-policy list -g {rg} -n {dla} -dla account delete -g {rg} -n {dla} -dla account list -g {rg} -dls account create -g {rg} -n {dls} -l {loc} --disable-encryption -dla account create -g {rg} -n {dla} -l {loc} --default-data-lake-store {dls} -dla job submit -n {dla} --job-name "python cli catalog job" --script "DROP DATABASE IF EXISTS catalog_item_1; -CREATE DATABASE catalog_item_1; -CREATE TABLE catalog_item_1.dbo.catalog_item_2 ( - UserId int, - Start DateTime, - Region string, - Query string, - Duration int, - Urls string, - ClickedUrls string, - INDEX idx1 CLUSTERED (Region ASC) - PARTITIONED BY (UserId) HASH (Region)); -ALTER TABLE catalog_item_1.dbo.catalog_item_2 ADD IF NOT EXISTS PARTITION (1); -DROP FUNCTION IF EXISTS catalog_item_1.dbo.catalog_item_3; -CREATE FUNCTION catalog_item_1.dbo.catalog_item_3() - RETURNS @result TABLE ( - s_date DateTime, - s_time string, - s_sitename string, - cs_method string, - cs_uristem string, - cs_uriquery string, - s_port int, - cs_username string, - c_ip string, - cs_useragent string, - cs_cookie string, - cs_referer string, - cs_host string, - sc_status int, - sc_substatus int, - sc_win32status int, - sc_bytes int, - cs_bytes int, - s_timetaken int) AS - BEGIN - @result = EXTRACT - s_date DateTime, - s_time string, - s_sitename string, - cs_method string, - cs_uristem string, - cs_uriquery string, - s_port int, - cs_username string, - c_ip string, - cs_useragent string, - cs_cookie string, - cs_referer string, - cs_host string, - sc_status int, - sc_substatus int, - sc_win32status int, - sc_bytes int, - cs_bytes int, - s_timetaken int FROM \"@/Samples/Data/WebLog.log\" USING Extractors.Text(delimiter:' '); - RETURN; - END; -CREATE VIEW catalog_item_1.dbo.catalog_item_8 AS SELECT * FROM (VALUES(1,2),(2,4)) AS T(a, b); -CREATE PROCEDURE catalog_item_1.dbo.catalog_item_4() AS BEGIN CREATE VIEW catalog_item_1.dbo.catalog_item_8 AS SELECT * FROM (VALUES(1,2),(2,4)) AS T(a, b); END;" -dla job wait -n {dla} --job-id {job_id} -dla catalog database list -n {dla} -dla catalog database show -n {dla} --database-name {db} -dla catalog schema list -n {dla} --database-name {db} -dla catalog schema show -n {dla} --database-name {db} --schema-name dbo -dla catalog table list -n {dla} --database-name {db} --schema-name dbo -dla catalog table list -n {dla} --database-name {db} -dla catalog table show -n {dla} --database-name {db} --schema-name dbo --table-name {table} -dla catalog view list -n {dla} --database-name {db} --schema-name dbo -dla catalog view list -n {dla} --database-name {db} -dla catalog view show -n {dla} --database-name {db} --schema-name dbo --view-name {view} -dla catalog procedure list -n {dla} --database-name {db} --schema-name dbo -dla catalog procedure show -n {dla} --database-name {db} --schema-name dbo --procedure-name {proc} -dla catalog procedure list -n {dla} --database-name {db} --schema-name dbo -dla catalog procedure show -n {dla} --database-name {db} --schema-name dbo --procedure-name {proc} -dla catalog tvf list -n {dla} --database-name {db} --schema-name dbo -dla catalog tvf list -n {dla} --database-name {db} -dla catalog tvf show -n {dla} --database-name {db} --schema-name dbo --table-valued-function-name {tvf} -dla catalog credential create -n {dla} --database-name {db} --credential-name {cred} --user-name {cred_username} --password {cred_pwd} --uri "http://adl.contoso.com:443" -dla catalog credential list -n {dla} --database-name {db} -dla catalog credential show -n {dla} --database-name {db} --credential-name {cred} -dla catalog credential delete -n {dla} --database-name {db} --credential-name {cred} -dla catalog credential list -n {dla} --database-name {db} -dls account create -g {rg} -n {dls} -l {loc} --disable-encryption -dls account show -g {rg} -n {dls} -dla account create -g {rg} -n {dla} -l {loc} --default-data-lake-store {dls} -dla account show -g {rg} -n {dla} -dla job submit -n {dla} --job-name clijobtest --script "DROP DATABASE IF EXISTS FOO; CREATE DATABASE FOO;" -dla job cancel -n {dla} --job-id {job_id} -dla job show -n {dla} --job-id {job_id} -dla job submit -n {dla} --job-name clijobtest --script "DROP DATABASE IF EXISTS FOO; CREATE DATABASE FOO;" --recurrence-name {recurrence_name} -dla job submit -n {dla} --job-name clijobtest --script "DROP DATABASE IF EXISTS FOO; CREATE DATABASE FOO;" --recurrence-name {recurrence_name} --recurrence-id {recurrence_id} --pipeline-name {pipeline_name} -dla job submit -n {dla} --job-name clijobtest --script "DROP DATABASE IF EXISTS FOO; CREATE DATABASE FOO;" --recurrence-name {recurrence_name} --recurrence-id {recurrence_id} --pipeline-name {pipeline_name} --pipeline-id {pipeline_id} --pipeline-uri {pipeline_uri} --run-id {run_id} -dla job wait -n {dla} --job-id {job_id} -dla job list -n {dla} -dla job recurrence list -n {dla} -dla job recurrence show -n {dla} --recurrence-id {recurrence_id} -dla job pipeline list -n {dla} -dla job pipeline show -n {dla} --pipeline-id {pipeline_id} -dls account create -g {rg} -n {dls} -l {loc} --disable-encryption -dls account show -g {rg} -n {dls} -dls fs create -n {dls} --path "{dir}" --folder --force -dls fs show -n {dls} --path "{dir}" -dls fs access set-owner -n {dls} --path "{dir}" --group {group_id} --owner {user_id} -dls fs show -n {dls} --path "{dir}" -dls fs access set-permission -n {dls} --path "{dir}" --permission 777 -dls fs show -n {dls} --path "{dir}" -dls fs access show -n {dls} --path "{dir}" -dls fs access set -n {dls} --path "{dir}" --acl-spec {new_acl} -dls fs access show -n {dls} --path "{dir}" -dls fs access set-entry -n {dls} --path "{dir}" --acl-spec {acl_to_modify} -dls fs access show -n {dls} --path "{dir}" -dls fs access remove-entry -n {dls} --path "{dir}" --acl-spec {acl_to_remove} -dls fs access show -n {dls} --path "{dir}" -dls fs access remove-all -n {dls} --path "{dir}" --default-acl -dls fs access show -n {dls} --path "{dir}" -dls fs access remove-all -n {dls} --path "{dir}" -dls fs access show -n {dls} --path "{dir}" -dls account create -g {rg} -n {dls} -l {loc} --disable-encryption -dls account show -g {rg} -n {dls} -dls fs create -n {dls} --path "{folder1}" --folder --force -dls fs show -n {dls} --path "{folder1}" -dls fs create -n {dls} --path "{folder1}/{file}" --content {content} -dls fs show -n {dls} --path "{folder1}/{file}" -dls fs set-expiry -n {dls} --path "{folder1}/{file}" --expiration-time {time_in_milliseconds} -dls fs show -n {dls} --path "{folder1}/{file}" -dls fs remove-expiry -n {dls} --path "{folder1}/{file}" -dls fs show -n {dls} --path "{folder1}/{file}" -dls fs create -n {dls} --path "{folder2}" --folder --force -dls fs move -n {dls} --source-path "{folder1}/{file}" --destination-path "{folder2}/{file}" -dls fs show -n {dls} --path "{folder2}/{file}" -dls fs preview -n {dls} --path "{folder2}/{file}" -dls fs preview -n {dls} --path "{folder2}/{file}" --length 1 --offset 3 -dls fs list -n {dls} --path "{folder2}" -dls fs append -n {dls} --path "{folder2}/{file}" --content {content} -dls fs show -n {dls} --path "{folder2}/{file}" -dls fs upload -n {dls} --destination-path "{folder1}/{upload_file}" --source-path "{local_file}" -dls fs show -n {dls} --path "{folder1}/{upload_file}" -dls fs join -n {dls} --destination-path "{folder1}/{join_file}" --source-paths "{folder1}/{upload_file}" "{folder2}/{file}" -dls fs show -n {dls} --path "{folder1}/{join_file}" -dls fs download -n {dls} --destination-path "{dir}/{download_file}" --source-path "{folder1}/{join_file}" -dls fs delete -n {dls} --path "{folder1}/{join_file}" -dls fs list -n {dls} --path "{folder1}" -dls fs create -n {dls} --path "{folder2}" --folder -dls fs create -n {dls} --path "{folder2}/tempfile01.txt" -dls fs delete -n {dls} --path "{folder2}" --recurse -dls fs test -n {dls} --path "{folder2}" -dls fs test -n {dls} --path "{folder1}" -dls account create -g {rg} -n {dls} -l {loc} -dls account show -n {dls} -g {rg} -dls account enable-key-vault -n {dls} -g {rg} -dls account list -g {rg} -dls account list -dls account update -g {rg} -n {dls} --firewall-state Enabled --trusted-id-provider-state Enabled -dls account show -n {dls} -g {rg} -dls account firewall create -g {rg} -n {dls} --firewall-rule-name {fw} --start-ip-address {start_ip} --end-ip-address {end_ip} -dls account firewall show -g {rg} -n {dls} --firewall-rule-name {fw} -dls account firewall update -g {rg} -n {dls} --firewall-rule-name {fw} --end-ip-address {new_end_ip} -dls account firewall show -g {rg} -n {dls} --firewall-rule-name {fw} -dls account firewall list -g {rg} -n {dls} -dls account firewall delete -g {rg} -n {dls} --firewall-rule-name {fw} -dls account firewall list -g {rg} -n {dls} -network vnet subnet show -g {rg} -n default --vnet-name {vnet} -network vnet subnet create --resource-group {rg} --vnet-name {vnet} --name {updated_subnet} --address-prefixes 10.0.1.0/24 -network vnet subnet update --service-endpoints Microsoft.AzureActiveDirectory --ids "{subnet_id}" -network vnet subnet update --service-endpoints Microsoft.AzureActiveDirectory --ids "{updated_subnet_id}" -dls account network-rule create -g {rg} --account-name {dls} --name {network_rule} --subnet {subnet_id} -dls account network-rule show -g {rg} --account-name {dls} --name {network_rule} -dls account network-rule update -g {rg} --account-name {dls} --name {network_rule} --subnet {updated_subnet_id} -dls account network-rule show -g {rg} --account-name {dls} --name {network_rule} -dls account network-rule list -g {rg} --account-name {dls} -dls account network-rule delete -g {rg} --account-name {dls} --name {network_rule} -dls account network-rule list -g {rg} --account-name {dls} -dls account trusted-provider create -g {rg} -n {dls} --trusted-id-provider-name {provider} --id-provider {trusted_provider} -dls account trusted-provider show -g {rg} -n {dls} --trusted-id-provider-name {provider} -dls account trusted-provider update -g {rg} -n {dls} --trusted-id-provider-name {provider} --id-provider {new_provider} -dls account trusted-provider show -g {rg} -n {dls} --trusted-id-provider-name {provider} -dls account trusted-provider list -g {rg} -n {dls} -dls account trusted-provider delete -g {rg} -n {dls} --trusted-id-provider-name {provider} -dls account trusted-provider list -g {rg} -n {dls} -dls account delete -g {rg} -n {dls} -dls account list -g {rg} -network vnet subnet show -g {vsubnet_rg} -n {vsubnet_sn} --vnet-name {vsubnet_vn} -dms create -l {lname} -n {sname} -g {rg} --sku-name {skuname} --subnet {vnetid} --tags area=cli env=test -dms project show -g {rg} --service-name {sname} -n {pname1} -dms project create -g {rg} --service-name {sname} -l {lname} -n {pname1} --source-platform SQL --target-platform SQLDB --tags Type=test Cli -dms project show -g {rg} --service-name {sname} -n {pname1} -dms project create -g {rg} --service-name {sname} -l {lname} -n {pnamepg} --source-platform PostgreSQL --target-platform AzureDbForPostgreSQL --tags Type=test Cli -dms project show -g {rg} --service-name {sname} -n {pnamepg} -dms project create -g {rg} --service-name {sname} -l {lname} -n {pnamemysql} --source-platform MySQL --target-platform AzureDbForMySQL --tags Type=test Cli -dms project show -g {rg} --service-name {sname} -n {pnamemysql} -dms project create -g {rg} --service-name {sname} -l {lname} -n {pname2} --source-platform SQL --target-platform SQLDB -dms project list -g {rg} --service-name {sname} -dms project check-name -g {rg} --service-name {sname} -n {pname2} -dms project delete -g {rg} --service-name {sname} -n {pname2} -y -dms project check-name -g {rg} --service-name {sname} -n {pname2} -dms delete -g {rg} -n {sname} --delete-running-tasks true -y -network vnet subnet show -g {vsubnet_rg} -n {vsubnet_sn} --vnet-name {vsubnet_vn} -dms list-skus -dms show -g {rg} -n {sname} -dms create -l {lname} -n {sname} -g {rg} --sku-name {skuname} --subnet {vnetid} --tags area=cli env=test -dms show -g {rg} -n {sname} -dms list -g {rg} -dms check-status -g {rg} -n {sname} -dms stop -g {rg} -n {sname} -dms check-status -g {rg} -n {sname} -dms start -g {rg} -n {sname} -dms check-status -g {rg} -n {sname} -dms check-name -l {lname} -n {sname} -dms delete -g {rg} -n {sname} -y -dms check-name -l {lname} -n {sname} -network vnet subnet show -g {vsubnet_rg} -n {vsubnet_sn} --vnet-name {vsubnet_vn} -dms create -l {lname} -n {sname} -g {rg} --sku-name {skuname} --subnet {vnetid} --tags area=cli env=test -dms project create -g {rg} --service-name {sname} -l {lname} -n {pname} --source-platform SQL --target-platform SQLDB -dms project create -g {rg} --service-name {sname} -l {lname} -n {pnamepg} --source-platform PostgreSQL --target-platform AzureDbForPostgreSQL -dms project create -g {rg} --service-name {sname} -l {lname} -n {pnamemysql} --source-platform MySql --target-platform AzureDbForMySQL -dms project task show -g {rg} --service-name {sname} --project-name {pname} -n {tname1} -dms project task show -g {rg} --service-name {sname} --project-name {pnamepg} -n {tnamepg} -dms project task show -g {rg} --service-name {sname} --project-name {pnamemysql} -n {tnamemysql} -dms project task create --task-type OfflineMigration --database-options-json "{dboptions1}" -n {tname1} --project-name {pname} -g {rg} --service-name {sname} --source-connection-json "{sconn}" --target-connection-json "{tconn}" -dms project task show -g {rg} --service-name {sname} --project-name {pname} -n {tname1} -dms project task cancel -g {rg} --service-name {sname} --project-name {pname} -n {tname1} -dms project task create --task-type OnlineMigration --database-options-json "{dboptionspg}" -n {tnamepg} --project-name {pnamepg} -g {rg} --service-name {sname} --source-connection-json "{sconnpg}" --target-connection-json "{tconnpg}" -dms project task show -g {rg} --service-name {sname} --project-name {pnamepg} -n {tnamepg} -dms project task cancel -g {rg} --service-name {sname} --project-name {pnamepg} -n {tnamepg} -dms project task create --task-type OfflineMigration --database-options-json "{dboptionsmysql}" -n {tnamemysql} --project-name {pnamemysql} -g {rg} --service-name {sname} --source-connection-json "{sconnmysql}" --target-connection-json "{tconnmysql}" -dms project task show -g {rg} --service-name {sname} --project-name {pnamemysql} -n {tnamemysql} -dms project task cancel -g {rg} --service-name {sname} --project-name {pnamemysql} -n {tnamemysql} -dms project task create --task-type OfflineMigration --database-options-json "{dboptions2}" -n {tname2} --project-name {pname} -g {rg} --service-name {sname} --source-connection-json "{sconn}" --target-connection-json "{tconn}" -dms project task list -g {rg} --service-name {sname} --project-name {pname} --task-type "Migrate.SqlServer.SqlDb" -dms project task check-name -g {rg} --service-name {sname} --project-name {pname} -n {tname1} -dms project task delete -g {rg} --service-name {sname} --project-name {pname} -n {tname1} --delete-running-tasks true -y -dms project task check-name -g {rg} --service-name {sname} --project-name {pname} -n {tname1} -dms delete -g {rg} -n {sname} --delete-running-tasks true -y -eventgrid topic create --name {topic_name} --resource-group {rg} --location {location} -eventgrid topic show --name {topic_name} --resource-group {rg} -ojson -eventgrid event-subscription create --source-resource-id {scope} --name {event_subscription_name} --endpoint {endpoint_url} --advanced-filter eventType -eventgrid event-subscription create --source-resource-id {scope} --name {event_subscription_name} --endpoint {endpoint_url} --advanced-filter data.key2 NumberIn -eventgrid event-subscription create --source-resource-id {scope} --name {event_subscription_name} --endpoint {endpoint_url} --advanced-filter data.key2 FooNumberLessThan 2 3 -eventgrid event-subscription create --source-resource-id {scope} --name {event_subscription_name} --endpoint {endpoint_url} --advanced-filter data.key2 NumberLessThan 2 3 -eventgrid event-subscription create --source-resource-id {scope} --name {event_subscription_name} --endpoint {endpoint_url} --advanced-filter data.key2 IsNotNull 1 -eventgrid event-subscription create --source-resource-id {scope} --name {event_subscription_name} --endpoint {endpoint_url} --advanced-filter data.key2 IsNullOrUndefined 1 -eventgrid event-subscription create --source-resource-id {scope} --name {event_subscription_name} --endpoint "{endpoint_url}" --advanced-filter data.key2 NumberIn 2 3 4 100 200 -eventgrid event-subscription create --source-resource-id {scope} --name {event_subscription_name} --endpoint "{endpoint_url}" --advanced-filter data.key1 NumberIn 2 3 4 100 200 --advanced-filter data.key2 StringIn 2 3 4 100 200 -eventgrid event-subscription update --source-resource-id {scope} --name {event_subscription_name} --endpoint "{endpoint_url}" --advanced-filter data.key1 NumberIn 21 13 400 101 --advanced-filter data.key2 StringIn 122 3 214 1100 2 -eventgrid event-subscription update --source-resource-id {scope} --name {event_subscription_name} --endpoint "{endpoint_url}" --advanced-filter data.key1 IsNullOrUndefined --advanced-filter data.key2 IsNotNull -eventgrid event-subscription update --source-resource-id {scope} --name {event_subscription_name} --endpoint "{endpoint_url}" --advanced-filter data.key1 NumberInRange 1,10 --advanced-filter data.key2 NumberNotInRange 10,12 50,55 -eventgrid event-subscription update --source-resource-id {scope} --name {event_subscription_name} --endpoint "{endpoint_url}" --advanced-filter data.key1 StringNotBeginsWith Red Blue Green --advanced-filter data.key2 StringNotEndsWith Red Blue Green --advanced-filter data.key2 StringNotContains Red Blue Green -eventgrid event-subscription update --source-resource-id {scope} --name {event_subscription_name} --endpoint "{endpoint_url}" --enable-advanced-filtering-on-arrays true -eventgrid event-subscription delete --source-resource-id {scope} --name {event_subscription_name} -eventgrid topic delete --name {topic_name} --resource-group {rg} -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name} --endpoint "{endpoint_url}" -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name} -eventgrid event-subscription show --include-full-endpoint-url --source-resource-id {source_resource_id} --name {event_subscription_name} -eventgrid event-subscription update --source-resource-id {source_resource_id} --name {event_subscription_name} --endpoint "{endpoint_url}" --subject-ends-with .jpg -eventgrid event-subscription list --source-resource-id {source_resource_id} -eventgrid event-subscription list --topic-type Microsoft.Storage.StorageAccounts --location {location} -eventgrid event-subscription list --topic-type Microsoft.Storage.StorageAccounts --location {location} --resource-group {rg} -eventgrid event-subscription list --location {location} --resource-group {rg} -eventgrid event-subscription list --location {location} -eventgrid event-subscription list --source-resource-id {source_resource_id} --odata-query "CONTAINS(name,'{event_subscription_name}')" -eventgrid event-subscription list --topic-type Microsoft.Storage.StorageAccounts --location {location} --odata-query "CONTAINS(name,'{event_subscription_name}')" -eventgrid event-subscription list --topic-type Microsoft.Storage.StorageAccounts --location {location} --resource-group {rg} --odata-query "CONTAINS(name,'{event_subscription_name}')" -eventgrid event-subscription list --location {location} --resource-group {rg} --odata-query "name eq '{event_subscription_name}'" -eventgrid event-subscription list --location {location} --odata-query "name eq '{event_subscription_name}'" -eventgrid event-subscription delete --source-resource-id {source_resource_id} --name {event_subscription_name} -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name1} --endpoint-type storagequeue --endpoint {storagequeue_endpoint_id} --event-ttl 2000 --deadletter-endpoint {deadletter_endpoint_id} -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name1} --endpoint-type storagequeue --endpoint {storagequeue_endpoint_id} --max-delivery-attempts 31 --deadletter-endpoint {deadletter_endpoint_id} -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name1} --endpoint-type stoRAgequeue --endpoint {storagequeue_endpoint_id} --event-delivery-schema cloudeventschemav1_0 --deadletter-endpoint {deadletter_endpoint_id} --subject-begins-with SomeRandomText1 --subject-ends-with SomeRandomText2 -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name1} -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name2} --endpoint-type HybRidConnection --endpoint {hybridconnection_endpoint_id} --deadletter-endpoint {deadletter_endpoint_id} --max-delivery-attempts 20 --event-ttl 1000 --subject-begins-with SomeRandomText1 --subject-ends-with SomeRandomText2 -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name2} -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name3} --endpoint-type SErvIcEBusQueUE --endpoint {servicebusqueue_endpoint_id} --deadletter-endpoint {deadletter_endpoint_id} --max-delivery-attempts 10 --event-ttl 1200 --subject-begins-with SomeRandomText1 --subject-ends-with SomeRandomText2 -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name3} -eventgrid event-subscription delete --source-resource-id {source_resource_id} --name {event_subscription_name1} -eventgrid event-subscription delete --source-resource-id {source_resource_id} --name {event_subscription_name2} -eventgrid event-subscription delete --source-resource-id {source_resource_id} --name {event_subscription_name3} -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name1} --endpoint-type SErvIcEBusTOPic --endpoint {servicebustopic_endpoint_id} --subject-begins-with SomeRandomText1 --event-delivery-schema CloudEVENTSchemaV1_0 -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name1} -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name2} --endpoint-type azUREFunction --endpoint {azurefunction_endpoint_id_cloudevent} --subject-begins-with SomeRandomText1 --max-events-per-batch 10 --preferred-batch-size-in-kilobytes 128 -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name2} -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name4} --endpoint-type webhook --endpoint "{endpoint_url_for_validation}" --subject-begins-with SomeRandomText1 --max-events-per-batch 10 --preferred-batch-size-in-kilobytes 128 -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name4} -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name3} --endpoint-type webhook --endpoint "{endpoint_url_for_validation}" --subject-begins-with SomeRandomText1 --max-events-per-batch 10 --preferred-batch-size-in-kilobytes 128 --azure-active-directory-tenant-id "{azure_active_directory_tenant_id}" --azure-active-directory-application-id-or-uri "{azure_active_directory_application_id_or_uri}" -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name3} -eventgrid event-subscription update --source-resource-id {source_resource_id} --name {event_subscription_name1} --subject-begins-with SomeRandomText1234 -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name1} -eventgrid event-subscription update --source-resource-id {source_resource_id} --name {event_subscription_name2} --endpoint-type azUREFunction --endpoint {azurefunction_endpoint_id_cloudevent} --subject-begins-with SomeRandomText2234431 -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name2} -eventgrid event-subscription update --source-resource-id {source_resource_id} --name {event_subscription_name4} --endpoint-type webhook --endpoint "{endpoint_url_for_validation}" --subject-begins-with SomeRandomText112341 -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name4} -eventgrid event-subscription update --source-resource-id {source_resource_id} --name {event_subscription_name3} --endpoint "{endpoint_url_for_validation}" --subject-begins-with SomeRandomText123412 -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name3} -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name1} -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name2} -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name3} -eventgrid event-subscription delete --source-resource-id {source_resource_id} --name {event_subscription_name1} -eventgrid event-subscription delete --source-resource-id {source_resource_id} --name {event_subscription_name2} -eventgrid event-subscription delete --source-resource-id {source_resource_id} --name {event_subscription_name3} -eventgrid event-subscription delete --source-resource-id {source_resource_id} --name {event_subscription_name4} -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name} --endpoint "{endpoint_url}" --subject-ends-with {subject_ends_with} --included-event-types {event_type_1} {event_type_2} --subject-case-sensitive --labels {label_1} {label_2} -eventgrid event-subscription show --source-resource-id {source_resource_id} --name {event_subscription_name} -eventgrid event-subscription show --include-full-endpoint-url --source-resource-id {source_resource_id} --name {event_subscription_name} -eventgrid event-subscription list --source-resource-id {source_resource_id} -eventgrid event-subscription list --source-resource-id {source_resource_id} --odata-query "CONTAINS(name,'{event_subscription_name}')" -eventgrid event-subscription delete --source-resource-id {source_resource_id} --name {event_subscription_name} -eventgrid topic create --name {topic_name} --resource-group {rg} --location {location} -eventgrid topic show --name {topic_name} --resource-group {rg} -eventgrid topic create --name {topic_name2} --resource-group {rg} --location {location} --input-schema eventgridschema --input-mapping-fields topic=myTopicField -eventgrid topic create --name {topic_name2} --resource-group {rg} --location {location} --input-schema customeventschema -eventgrid topic create --name {topic_name2} --resource-group {rg} --location {location} --kind azure --extended-location-name {extended_location_name} --extended-location-type customLocation -eventgrid topic create --name {topic_name2} --resource-group {rg} --location {location} --input-schema CloudEventSchemaV1_0 -eventgrid topic create --name {topic_name4} --resource-group {rg} --location {location} --public-network-access disabled --inbound-ip-rules 19.12.43.90/12 allow --inbound-ip-rules 19.12.43.70/20 allow --sku BASic --identity systemassigned -eventgrid topic update --name {topic_name4} --resource-group {rg} --tags Dept=IT -eventgrid topic update --name {topic_name4} --resource-group {rg} --tags Dept=Finance --sku BaSIC --identity NoIDENTIty -eventgrid topic list --resource-group {rg} -eventgrid topic list --resource-group {rg} --odata-query "name eq '{topic_name}'" -eventgrid topic key list --name {topic_name} --resource-group {rg} -eventgrid topic key regenerate --name {topic_name} --resource-group {rg} --key-name key1 -eventgrid topic key regenerate --name {topic_name} --resource-group {rg} --key-name key2 -eventgrid event-subscription create --source-resource-id {scope} --name {event_subscription_name} --endpoint "{endpoint_url}" -eventgrid event-subscription show --source-resource-id {scope} --name {event_subscription_name} -eventgrid event-subscription show --source-resource-id {scope} --name {event_subscription_name} --include-full-endpoint-url -eventgrid event-subscription update --source-resource-id {scope} --name {event_subscription_name} --endpoint "{endpoint_url}" -eventgrid event-subscription list --source-resource-id {scope} -eventgrid event-subscription list --source-resource-id {scope} --odata-query "name eq '{event_subscription_name}'" -eventgrid event-subscription list --topic-type Microsoft.EventGrid.Topics --location {location} -eventgrid event-subscription list --topic-type Microsoft.EventGrid.Topics --location {location} --odata-query "CONTAINS(name,'{event_subscription_name}')" -eventgrid event-subscription delete --source-resource-id {scope} --name {event_subscription_name} -eventgrid topic delete --name {topic_name} --resource-group {rg} -group show -n clieventgrid000001 -o json -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name} --endpoint "{endpoint_url}" --delivery-attribute-mapping somestaticname1 static somestaticvalue1 --delivery-attribute-mapping somestaticname2 static somestaticvalue2 true --delivery-attribute-mapping somestaticname3 static somestaticvalue3 false --delivery-attribute-mapping somedynamicattribname1 dynamic data.key1 -eventgrid event-subscription update --source-resource-id {source_resource_id} --name {event_subscription_name} --endpoint "{endpoint_url}" --delivery-attribute-mapping somestaticname1 static somestaticvalue1 --delivery-attribute-mapping somestaticname2 static somestaticvalue2 true --delivery-attribute-mapping somedynamicattribname2 dynamic data.key2 -eventgrid event-subscription delete --source-resource-id {source_resource_id} --name {event_subscription_name} -group show -n clieventgrid000001 -o json -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name} --endpoint-type eventhub --endpoint {eventhub_id} -eventgrid event-subscription update --source-resource-id {source_resource_id} --name {event_subscription_name} --delivery-identity systemassigned --delivery-identity-endpoint-type eventhub --delivery-identity-endpoint {eventhub_id} -eventgrid event-subscription update --source-resource-id {source_resource_id} --name {event_subscription_name} --endpoint-type eventhub --endpoint {eventhub_id} -eventgrid event-subscription delete --source-resource-id {source_resource_id} --name {event_subscription_name} -group show -n clieventgrid000001 -o json -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name} --endpoint-type stoRAgequeue --endpoint {storagequeue_endpoint_id} --event-delivery-schema cloudeventschemav1_0 --storage-queue-msg-ttl 120 -eventgrid event-subscription create --source-resource-id {source_resource_id} --name {event_subscription_name} --endpoint-type stoRAgequeue --endpoint {storagequeue_endpoint_id} --storage-queue-msg-ttl 300 -eventgrid event-subscription delete --source-resource-id {source_resource_id} --name {event_subscription_name} -group show -n clitest.rg000001 -o json -eventgrid system-topic create --name {policy_system_topic_name_global} --resource-group {rg} --location global --topic-type Microsoft.PolicyInsights.PolicyStates --source /subscriptions/{subscription_id} -eventgrid system-topic delete --name {policy_system_topic_name_global} --resource-group {rg} --yes -eventgrid system-topic create --name {storage_system_topic_name_regional} --resource-group {regional_resource_group} --location {location} --topic-type Microsoft.Storage.StorageAccounts --source {storage_account} --identity noidentity -eventgrid system-topic update --name {storage_system_topic_name_regional} --resource-group {regional_resource_group} --identity systemassigned -eventgrid system-topic delete --name {storage_system_topic_name_regional} --resource-group {regional_resource_group} --yes -group create --resource-group {rg} --location {loc} -eventhubs cluster create --resource-group {rg} --name {clustername} --location {loc} --tags tag1=value1 -eventhubs cluster show --resource-group {rg} --name {clustername} -eventhubs namespace create --resource-group {rg} --name {namespacename} --location {loc} --tags {tags} --sku {sku} --cluster-arm-id {clusterid} -eventhubs cluster namespace list --resource-group {rg} --name {clustername} -eventhubs cluster update --resource-group {rg} --name {clustername} --tags tag2=value2 -eventhubs cluster list --resource-group {rg} -eventhubs namespace exists --name {namespacename} -eventhubs namespace create --resource-group {rg} --name {namespacenamekafka} --location {loc} --tags {tags} --sku {sku} --enable-auto-inflate {isautoinflateenabled} --maximum-throughput-units {maximumthroughputunits} --enable-kafka {isautoinflateenabled} -eventhubs namespace create --resource-group {rg} --name {namespacename} --location {loc} --tags {tags} --sku {sku} --enable-auto-inflate {isautoinflateenabled} --maximum-throughput-units {maximumthroughputunits} -eventhubs namespace show --resource-group {rg} --name {namespacename} -eventhubs namespace update --resource-group {rg} --name {namespacename} --tags {tags2} --maximum-throughput-units {maximumthroughputunits_update} -eventhubs namespace list -eventhubs namespace list --resource-group {rg} -eventhubs namespace authorization-rule create --resource-group {rg} --namespace-name {namespacename} --name {authoname} --rights {accessrights} -eventhubs namespace authorization-rule show --resource-group {rg} --namespace-name {namespacename} --name {authoname} -eventhubs namespace authorization-rule update --resource-group {rg} --namespace-name {namespacename} --name {authoname} --rights {accessrights1} -eventhubs namespace authorization-rule show --resource-group {rg} --namespace-name {namespacename} --name {defaultauthorizationrule} -eventhubs namespace authorization-rule keys list --resource-group {rg} --namespace-name {namespacename} --name {authoname} -eventhubs namespace authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --name {authoname} --key {primary} -eventhubs namespace authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --name {authoname} --key {secondary} -eventhubs namespace authorization-rule delete --resource-group {rg} --namespace-name {namespacename} --name {authoname} -eventhubs namespace delete --resource-group {rg} --name {namespacename} -eventhubs namespace exists --name {namespacenameprimary} -eventhubs namespace create --resource-group {rg} --name {namespacenameprimary} --location {loc_south} --tags {tags} --sku {sku} -eventhubs namespace show --resource-group {rg} --name {namespacenameprimary} -eventhubs namespace create --resource-group {rg} --name {namespacenamesecondary} --location {loc_north} --tags {tags} --sku {sku} -eventhubs namespace show --resource-group {rg} --name {namespacenamesecondary} -eventhubs namespace authorization-rule create --resource-group {rg} --namespace-name {namespacenameprimary} --name {authoname} --rights {accessrights} -eventhubs namespace authorization-rule show --resource-group {rg} --namespace-name {namespacenameprimary} --name {authoname} -eventhubs georecovery-alias exists --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias set --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} --partner-namespace {id} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenamesecondary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias authorization-rule show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} --name {authoname} -eventhubs georecovery-alias authorization-rule list --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias break-pair --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias set --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} --partner-namespace {id} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -eventhubs georecovery-alias fail-over --resource-group {rg} --namespace-name {namespacenamesecondary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenamesecondary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenamesecondary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenamesecondary} --alias {aliasname} -eventhubs georecovery-alias show --resource-group {rg} --namespace-name {namespacenamesecondary} --alias {aliasname} -eventhubs georecovery-alias delete --resource-group {rg} --namespace-name {namespacenamesecondary} --alias {aliasname} -eventhubs namespace delete --resource-group {rg} --name {namespacenameprimary} -eventhubs namespace delete --resource-group {rg} --name {namespacenamesecondary} -eventhubs namespace create --resource-group {rg} --name {namespacename} --location {loc} --tags {tags} --sku {sku} --enable-auto-inflate {isautoinflateenabled} --maximum-throughput-units {maximumthroughputunits} -eventhubs namespace show --resource-group {rg} --name {namespacename} -eventhubs eventhub create --resource-group {rg} --namespace-name {namespacename} --name {eventhubname} -eventhubs eventhub show --resource-group {rg} --namespace-name {namespacename} --name {eventhubname} -eventhubs eventhub consumer-group create --resource-group {rg} --namespace-name {namespacename} --eventhub-name {eventhubname} --name {consumergroupname} --user-metadata {usermetadata1} -eventhubs eventhub consumer-group show --resource-group {rg} --namespace-name {namespacename} --eventhub-name {eventhubname} --name {consumergroupname} -eventhubs eventhub consumer-group update --resource-group {rg} --namespace-name {namespacename} --eventhub-name {eventhubname} --name {consumergroupname} --user-metadata {usermetadata2} -eventhubs eventhub consumer-group list --resource-group {rg} --namespace-name {namespacename} --eventhub-name {eventhubname} -eventhubs eventhub consumer-group delete --resource-group {rg} --namespace-name {namespacename} --eventhub-name {eventhubname} --name {consumergroupname} -eventhubs eventhub delete --resource-group {rg} --namespace-name {namespacename} --name {eventhubname} -eventhubs namespace delete --resource-group {rg} --name {namespacename} -account show --query id -otsv -eventhubs namespace create --resource-group {rg} --name {namespacename} --location {loc} --tags {tags} --sku {sku} --enable-auto-inflate {isautoinflateenabled} --maximum-throughput-units {maximumthroughputunits} -eventhubs namespace show --resource-group {rg} --name {namespacename} -eventhubs eventhub create --resource-group {rg} --namespace-name {namespacename} --name {eventhubname} -eventhubs eventhub show --resource-group {rg} --namespace-name {namespacename} --name {eventhubname} -eventhubs eventhub update --resource-group {rg} --namespace-name {namespacename} --name {eventhubname} --partition-count {partitioncount} --message-retention {messageretentionindays} -eventhubs eventhub update --resource-group {rg} --namespace-name {namespacename} --name {eventhubname} --enable-capture {isautoinflateenabled} --skip-empty-archives {isautoinflateenabled} --capture-interval 120 --capture-size-limit 10485763 --destination-name {destinationname} --storage-account {storageaccount} --blob-container {blobcontainer} --archive-name-format {archinvenameformat} -eventhubs eventhub list --resource-group {rg} --namespace-name {namespacename} -eventhubs eventhub authorization-rule create --resource-group {rg} --namespace-name {namespacename} --eventhub-name {eventhubname} --name {authoname} --rights {accessrights} -eventhubs eventhub authorization-rule show --resource-group {rg} --namespace-name {namespacename} --eventhub-name {eventhubname} --name {authoname} -eventhubs eventhub authorization-rule update --resource-group {rg} --namespace-name {namespacename} --eventhub-name {eventhubname} --name {authoname} --rights {accessrights1} -eventhubs eventhub authorization-rule keys list --resource-group {rg} --namespace-name {namespacename} --eventhub-name {eventhubname} --name {authoname} -eventhubs eventhub authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --eventhub-name {eventhubname} --name {authoname} --key {primary} -eventhubs eventhub authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --eventhub-name {eventhubname} --name {authoname} --key {secondary} -eventhubs eventhub authorization-rule delete --resource-group {rg} --namespace-name {namespacename} --eventhub-name {eventhubname} --name {authoname} -eventhubs eventhub delete --resource-group {rg} --namespace-name {namespacename} --name {eventhubname} -eventhubs namespace delete --resource-group {rg} --name {namespacename} -eventhubs namespace exists --name {namespacename} -eventhubs namespace create --resource-group {rg} --name {namespacename} --location {loc} --tags {tags} --sku {sku} --enable-auto-inflate {isautoinflateenabled} --maximum-throughput-units {maximumthroughputunits} --cluster-arm-id {clusterarmid} --assign-identity {enableidentity} -eventhubs namespace create --resource-group {rg} --name {namespacename1} --location {loc} --tags {tags} --sku {sku} --enable-auto-inflate {isautoinflateenabled} --maximum-throughput-units {maximumthroughputunits} --cluster-arm-id {clusterarmid} -eventhubs namespace show --resource-group {rg} --name {namespacename} -keyvault set-policy -n {kv_name} -g {rg} --object-id {principal_id} --key-permissions get unwrapKey wrapKey -keyvault key create -n {key_name} --vault-name {kv_name} -eventhubs namespace update --resource-group {rg} --name {namespacename} --tags {tags2} --maximum-throughput-units {maximumthroughputunits_update} --key-source {key_source} --key-name {key_name} --key-vault-uri {key_uri} --key-version "" -eventhubs namespace update --resource-group {rg} --name {namespacename1} --tags {tags2} --maximum-throughput-units {maximumthroughputunits_update} --assign-identity {enableidentity} --key-source {key_source} --key-name {key_name} --key-vault-uri {key_uri} --key-version "" -eventhubs namespace list -eventhubs namespace list --resource-group {rg} -eventhubs namespace authorization-rule create --resource-group {rg} --namespace-name {namespacename} --name {authoname} --rights {accessrights} -eventhubs namespace authorization-rule show --resource-group {rg} --namespace-name {namespacename} --name {authoname} -eventhubs namespace authorization-rule update --resource-group {rg} --namespace-name {namespacename} --name {authoname} --rights {accessrights1} -eventhubs namespace authorization-rule show --resource-group {rg} --namespace-name {namespacename} --name {defaultauthorizationrule} -eventhubs namespace authorization-rule delete --resource-group {rg} --namespace-name {namespacename} --name {authoname} -eventhubs namespace delete --resource-group {rg} --name {namespacename} -eventhubs namespace delete --resource-group {rg} --name {namespacename1} -eventhubs namespace exists --name {namespacename} -eventhubs namespace create --resource-group {rg} --name {namespacename} --location {loc} --tags {tags} --sku {sku} --maximum-throughput-units {maximumthroughputunits} --disable-local-auth {istrue} --enable-auto-inflate {istrue} -eventhubs namespace update --resource-group {rg} --name {namespacename} --tags {tags2} --maximum-throughput-units {maximumthroughputunits} -eventhubs namespace create --resource-group {rg} --name {namespacename1} --location {loc} --tags {tags} --sku {skupremium} --disable-local-auth {isfalse} -eventhubs namespace update --resource-group {rg} --name {namespacename1} --disable-local-auth {istrue} --tags {tags2} -eventhubs namespace delete --resource-group {rg} --name {namespacename} -eventhubs namespace delete --resource-group {rg} --name {namespacename1} -network vnet create --resource-group {rg} --name {namevnet} -network vnet create --resource-group {rg} --name {namevnet1} -network vnet subnet create --resource-group {rg} --name {namesubnet1} --vnet-name {namevnet} --address-prefixes 10.0.0.0/24 -network vnet subnet create --resource-group {rg} --name {namesubnet2} --vnet-name {namevnet1} --address-prefixes 10.0.0.0/24 -eventhubs namespace exists --name {namespacename} -eventhubs namespace create --resource-group {rg} --name {namespacename} --tags {tags} --sku {sku} --default-action Allow -eventhubs namespace show --resource-group {rg} --name {namespacename} -eventhubs namespace update --resource-group {rg} --name {namespacename} --tags {tags} --default-action Deny -eventhubs namespace network-rule list --resource-group {rg} --name {namespacename} -eventhubs namespace network-rule add --resource-group {rg} --name {namespacename} --ip-address {ipmask1} --action Allow -eventhubs namespace network-rule add --resource-group {rg} --name {namespacename} --ip-address {ipmask2} --action Allow -eventhubs namespace network-rule list --resource-group {rg} --name {namespacename} -eventhubs namespace network-rule remove --resource-group {rg} --name {namespacename} --ip-address {ipmask2} -eventhubs namespace network-rule add --resource-group {rg} --name {namespacename} --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_eh_network000001/providers/Microsoft.Network/virtualNetworks/sbehvnettest1/subnets/default --ignore-missing-endpoint True -eventhubs namespace network-rule add --resource-group {rg} --name {namespacename} --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_eh_network000001/providers/Microsoft.Network/virtualNetworks/sbehvnettest2/subnets/secondvnet --ignore-missing-endpoint True -eventhubs namespace network-rule list --resource-group {rg} --name {namespacename} -eventhubs namespace network-rule remove --resource-group {rg} --name {namespacename} --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_eh_network000001/providers/Microsoft.Network/virtualNetworks/sbehvnettest2/subnets/secondvnet -eventhubs namespace delete --resource-group {rg} --name {namespacename} -network vnet create -n {vnet} -g {rg} -l {loc} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -eventhubs namespace create --resource-group {rg} --name {namespacename} --location {loc} --tags {tags} --sku {sku} -eventhubs namespace show --resource-group {rg} --name {namespacename} -eventhubs namespace private-link-resource show --namespace-name {namespacename} -g {rg} -eventhubs namespace show -n {namespacename} -g {rg} -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} -l {loc} --connection-name {pe_connection} --private-connection-resource-id {ehn_id} --group-ids {group_id} -eventhubs namespace show -n {namespacename} -g {rg} -eventhubs namespace private-endpoint-connection show --namespace-name {namespacename} -g {rg} --name {ehn_pec_name} -eventhubs namespace private-endpoint-connection approve --namespace-name {namespacename} -g {rg} --name {ehn_pec_name} -eventhubs namespace private-endpoint-connection reject --namespace-name {namespacename} -g {rg} --name {ehn_pec_name} -eventhubs namespace private-endpoint-connection show --namespace-name {namespacename} -g {rg} --name {ehn_pec_name} -eventhubs namespace private-endpoint-connection delete --id {sa_pec_id} -y -extension remove -n alias -extension show -n alias -extension add -n alias -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default --ssh-user sshuser --ssh-password Password1! -hdinsight show -n {cluster} -g {rg} -hdinsight application create -g {rg} -n {app} --cluster-name {cluster} --script-uri {script_uri} --script-action-name {script_action} --script-parameters {script_params} -hdinsight application wait --created -n {app} -g {rg} --cluster-name {cluster} -hdinsight application list -g {rg} --cluster-name {cluster} -hdinsight application show -g {rg} -n {app} --cluster-name {cluster} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default -hdinsight show -n {cluster} -g {rg} -hdinsight autoscale create --cluster-name {cluster} --resource-group {rg} --type Load --min-workernode-count 4 --max-workernode-count 5 --yes -hdinsight show --name {cluster} --resource-group {rg} -hdinsight autoscale update --cluster-name {cluster} --resource-group {rg} --min-workernode-count 3 -hdinsight show --name {cluster} --resource-group {rg} -hdinsight autoscale show --cluster-name {cluster} --resource-group {rg} -hdinsight autoscale delete --cluster-name {cluster} --resource-group {rg} --yes -hdinsight show --name {cluster} --resource-group {rg} -hdinsight autoscale create --cluster-name {cluster} --resource-group {rg} --type Schedule --timezone "China Standard Time" --days Monday --time 09:00 --workernode-count 4 --yes -hdinsight autoscale show --cluster-name {cluster} --resource-group {rg} -hdinsight autoscale condition create --cluster-name {cluster} --resource-group {rg} --days Tuesday --time 08:00 --workernode-count 5 -hdinsight autoscale show --cluster-name {cluster} --resource-group {rg} -hdinsight autoscale condition update --cluster-name {cluster} --resource-group {rg} --index 1 --workernode-count 4 -hdinsight autoscale show --cluster-name {cluster} --resource-group {rg} -hdinsight autoscale condition list --cluster-name {cluster} --resource-group {rg} -hdinsight autoscale condition delete --cluster-name {cluster} --resource-group {rg} --index 1 --yes -hdinsight autoscale condition list --cluster-name {cluster} --resource-group {rg} -resource create -g {rg} -n {ws} --resource-type Microsoft.OperationalInsights/workspaces -p @"{la_prop_path}" -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default --ssh-user sshuser --ssh-password Password1! -hdinsight show -n {cluster} -g {rg} -hdinsight azure-monitor show -g {rg} -n {cluster} -hdinsight azure-monitor enable -g {rg} -n {cluster} --workspace {ws} --no-validation-timeout -hdinsight azure-monitor show -g {rg} -n {cluster} -hdinsight azure-monitor disable -g {rg} -n {cluster} -hdinsight azure-monitor show -g {rg} -n {cluster} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default -t kafka --workernode-data-disks-per-node 4 -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default -t kafka --workernode-data-disks-per-node 4 --workernode-data-disk-storage-account-type Standard_LRS --workernode-data-disk-size 1023 -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default -t kafka --workernode-data-disks-per-node 4 --kafka-management-node-size Standard_D4_v2 --kafka-client-group-id 7bef90fa-0aa3-4bb4-b4d2-2ae7c14cfe41 --kafka-client-group-name KafakaRestProperties -v 4.0 --component-version kafka=2.1 --location "South Central US" -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default -hdinsight show -n {cluster} -g {rg} -hdinsight resize -n {cluster} -g {rg} --workernode-count 2 -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default --version 4.0 -l southcentralus --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg/providers/Microsoft.Network/virtualNetworks/vnetforcreatcluster/subnets/default --zones 1 --cluster-configurations @"c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\hdinsight\tests\latest\customallmetastores.json" -hdinsight show -n {cluster} -g {rg} -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default --cluster-configurations {{\"gateway\":{{\"restAuthCredential.username\":\"admin\"}}}} -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default -t spark --component-version spark=2.4 --version 4.0 -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default --version 3.6 -l southcentralus --enable-compute-isolation --host-sku ESv3-Type2 --workernode-size Standard_E8S_V3 --headnode-size Standard_E8S_V3 -hdinsight show -n {cluster} -g {rg} -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default --workernode-size Standard_DS14_V2 --headnode-size Standard_DS14_V2 --zookeepernode-size Standard_DS14_V2 --encryption-at-host true -hdinsight show -n {cluster} -g {rg} -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default --encryption-in-transit true -hdinsight show -n {cluster} -g {rg} -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default --version 4.0 --autoscale-type Load --autoscale-min-workernode-count 4 --autoscale-max-workernode-count 5 -hdinsight show -n {cluster} -g {rg} -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default --minimal-tls-version 1.2 -hdinsight show -n {cluster} -g {rg} -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default --version 4.0 -l southcentralus --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg/providers/Microsoft.Network/virtualNetworks/testvnet/subnets/default --resource-provider-connection Outbound --enable-private-link --private-link-configurations @"c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\hdinsight\tests\latest\privatelinkconfigurations.json" -hdinsight show -n {cluster} -g {rg} -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default --version 4.0 --autoscale-type Schedule --timezone "China Standard Time" --days Monday --time "09:00" --autoscale-workernode-count 5 -hdinsight show -n {cluster} -g {rg} -hdinsight show -n {cluster} -g {rg} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default --ssh-user sshuser --ssh-password Password1! -hdinsight show -n {cluster} -g {rg} -resource create -g {rg} -n {ws} --resource-type Microsoft.OperationalInsights/workspaces -p @"{la_prop_path}" -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default --ssh-user sshuser --ssh-password Password1! -hdinsight show -n {cluster} -g {rg} -hdinsight monitor show -g {rg} -n {cluster} -hdinsight monitor enable -g {rg} -n {cluster} --workspace {ws} --no-validation-timeout -hdinsight monitor show -g {rg} -n {cluster} -hdinsight monitor disable -g {rg} -n {cluster} -hdinsight monitor show -g {rg} -n {cluster} -hdinsight create -n {cluster} -g {rg} -l {loc} -p {http_password} -t {cluster_type} --no-validation-timeout --storage-account hdicli000002 --storage-container default --ssh-user sshuser --ssh-password Password1! -hdinsight show -n {cluster} -g {rg} -hdinsight script-action execute -g {rg} -n {script_action} --cluster-name {cluster} --script-uri {script_uri} --roles {head_node} {worker_node} --persist-on-success -hdinsight script-action list -g {rg} --cluster-name {cluster} -hdinsight script-action delete -g {rg} -n {script_action} --cluster-name {cluster} -hdinsight script-action list -g {rg} --cluster-name {cluster} -hdinsight script-action list-execution-history -g {rg} --cluster-name {cluster} -hdinsight script-action show-execution-details -g {rg} --cluster-name {cluster} --execution-id {script_execution_id} -hdinsight script-action execute -g {rg} --cluster-name {cluster} --name {script_action_1} --script-uri {script_uri} --roles {head_node} {worker_node} -hdinsight script-action list-execution-history -g {rg} --cluster-name {cluster} -hdinsight script-action promote -g {rg} --cluster-name {cluster} --execution-id {script_execution_id} -hdinsight script-action list -g {rg} --cluster-name {cluster} -hdinsight script-action list-execution-history -g {rg} --cluster-name {cluster} -hdinsight list-usage -l {loc} -iot central app create -n iotc-cli-test000002 -g clitest.rg000001 --subdomain iotc-cli-test000002 --sku ST2 -iot central app create -n iotc-cli-test000002-template -g clitest.rg000001 --subdomain iotc-cli-test000002-template --template iotc-pnp-preview@1.0.0 --display-name "My Custom App Display Name" --sku ST1 -iot central app update -n iotc-cli-test000002-template -g clitest.rg000001 --set displayName=iotc-cli-test000002update subdomain=iotc-cli-test000002update sku.name=ST2 -iot central app show -n iotc-cli-test000002 -g clitest.rg000001 -iot central app show -n iotc-cli-test000002-template -g clitest.rg000001 -iot central app delete -n iotc-cli-test000002-template -g clitest.rg000001 --yes -iot central app list -g clitest.rg000001 -iot central app delete -n iotc-cli-test000002 -g clitest.rg000001 --yes -iot hub create -n iot-hub-for-cert-test000003 -g clitest.rg000002 --sku S1 -iot hub certificate create --hub-name iot-hub-for-cert-test000003 -g clitest.rg000002 -n certificate-000004 -p testcert.cer -iot hub certificate create --hub-name iot-hub-for-cert-test000003 -g clitest.rg000002 -n verified-certificate-000005 -p testcert.cer --verified -iot hub certificate list --hub-name iot-hub-for-cert-test000003 -g clitest.rg000002 -iot hub certificate show --hub-name iot-hub-for-cert-test000003 -g clitest.rg000002 -n certificate-000004 -iot hub certificate generate-verification-code --hub-name iot-hub-for-cert-test000003 -g clitest.rg000002 -n certificate-000004 --etag IjAyMDBhYTNmLTAwMDAtMDcwMC0wMDAwLTYxMjdhZjlhMDAwMCI= -iot hub certificate verify --hub-name iot-hub-for-cert-test000003 -g clitest.rg000002 -n certificate-000004 -p verify.cer --etag IjAyMDBjNjNmLTAwMDAtMDcwMC0wMDAwLTYxMjdhZjlkMDAwMCI= -iot hub certificate delete --hub-name iot-hub-for-cert-test000003 -g clitest.rg000002 -n certificate-000004 --etag IjAyMDBjZDNmLTAwMDAtMDcwMC0wMDAwLTYxMjdhZjllMDAwMCI= -iot hub certificate delete --hub-name iot-hub-for-cert-test000003 -g clitest.rg000002 -n verified-certificate-000005 --etag IjAyMDBiNzNmLTAwMDAtMDcwMC0wMDAwLTYxMjdhZjliMDAwMCI= -storage container create --name iothubcontainer1000005 --account-name clitest000002 -storage account show-connection-string --resource-group clitest.rg000001 --name clitest000002 -identity create -n hub-user-identity000004 -g clitest.rg000001 -iot hub create -n cli-file-upload-hub000003 -g clitest.rg000001 -iot hub update -n cli-file-upload-hub000003 -g clitest.rg000001 --fc iothubcontainer1000005 --fcs DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== --fsa identityBased -iot hub update -n cli-file-upload-hub000003 -g clitest.rg000001 --fc iothubcontainer1000005 --fcs DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== --fsi /test/user/identity -iot hub update -n cli-file-upload-hub000003 -g clitest.rg000001 --fc iothubcontainer1000005 --fcs DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== --fsi [system] -iot hub update -n cli-file-upload-hub000003 -g clitest.rg000001 --fc iothubcontainer1000005 --fcs DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== -iot hub update -n cli-file-upload-hub000003 -g clitest.rg000001 --fsa keyBased -iot hub update -n cli-file-upload-hub000003 -g clitest.rg000001 --fsa identitybased -iot hub update -n cli-file-upload-hub000003 -g clitest.rg000001 --fsi [system] -iot hub update -n cli-file-upload-hub000003 -g clitest.rg000001 --fsi /test/user/identity -iot hub identity assign --system -n cli-file-upload-hub000003 -g clitest.rg000001 -storage account show -n clitest000002 -g clitest.rg000001 -role assignment create --role "Storage Blob Data Contributor" --assignee "51006a28-58e5-45c6-a7b4-c4a69f120468" --scope "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Storage/storageAccounts/clitest000002" -iot hub update -n cli-file-upload-hub000003 -g clitest.rg000001 --fsi [system] -iot hub update -n cli-file-upload-hub000003 -g clitest.rg000001 --fsa identityBased -iot hub update -n cli-file-upload-hub000003 -g clitest.rg000001 --fsi [system] -iot hub update -n cli-file-upload-hub000003 -g clitest.rg000001 --fsi /test/user/identity -role assignment create --role "Storage Blob Data Contributor" --assignee "cc21757e-59f5-4385-963f-f216fa8d23a2" --scope "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Storage/storageAccounts/clitest000002" -iot hub identity assign -n cli-file-upload-hub000003 -g clitest.rg000001 --user /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/hub-user-identity000004 -iot hub update -n cli-file-upload-hub000003 -g clitest.rg000001 --fsi /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/hub-user-identity000004 -iot hub update -n cli-file-upload-hub000003 -g clitest.rg000001 --fsa keyBased -storage container create --name iothubcontainer --account-name clitest000002 -storage account show-connection-string --resource-group clitest.rg000001 --name clitest000002 -storage account show -n clitest000002 -g clitest.rg000001 -identity create -n iot-user-identity000006 -g clitest.rg000001 -identity create -n iot-user-identity000007 -g clitest.rg000001 -identity create -n iot-user-identity000008 -g clitest.rg000001 -iot hub create -n identitytesthub000003 -g clitest.rg000001 --sku s1 --location westus2 --mintls "1.2" --mi-system-assigned --mi-user-assigned /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/iot-user-identity000006 --role "Storage Blob Data Contributor" --scopes "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Storage/storageAccounts/clitest000002" -iot hub show --name identitytesthub000003 -iot hub update -n identitytesthub000003 --fsa identityBased --fsi [system] --fcs DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== --fc iothubcontainer --fnld 15 -iot hub update -n identitytesthub000003 -g clitest.rg000001 --fsa keyBased -iot hub update -n identitytesthub000003 -g clitest.rg000001 --fsi test/user/ -iot hub update -n identitytesthub000003 -g clitest.rg000001 --fsi [system] -iot hub update -n identitytesthub000003 -g clitest.rg000001 --fsa identityBased -eventhubs namespace create --resource-group clitest.rg000001 --name ehNamespaceiothubfortest1000009 -eventhubs eventhub create --resource-group clitest.rg000001 --namespace-name ehNamespaceiothubfortest1000009 --name eventHubiothubfortest000010 -role assignment create --role "Azure Event Hubs Data Sender" --assignee "583fd422-91d7-4b19-9437-25f97e866b02" --scope "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.EventHub/namespaces/ehNamespaceiothubfortest1000009/eventhubs/eventHubiothubfortest000010" -identity show --id "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/iot-user-identity000006" -role assignment create --role "Azure Event Hubs Data Sender" --assignee "00f9fd21-9378-40c0-8d88-827c675151f5" --scope "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.EventHub/namespaces/ehNamespaceiothubfortest1000009/eventhubs/eventHubiothubfortest000010" -iot hub routing-endpoint create --hub-name identitytesthub000003 -g clitest.rg000001 -n EHSystemIdentityEndpoint000004 -t EventHub -r clitest.rg000001 -s 00000000-0000-0000-0000-000000000000 --auth-type identityBased --endpoint-uri sb://ehNamespaceiothubfortest1000009.servicebus.windows.net --entity-path eventHubiothubfortest000010 -iot hub routing-endpoint create --hub-name identitytesthub000003 -g clitest.rg000001 -n EHUserIdentityEndpoint000005 -t EventHub -r clitest.rg000001 -s 00000000-0000-0000-0000-000000000000 --auth-type identityBased --identity /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/iot-user-identity000006 --endpoint-uri sb://ehNamespaceiothubfortest1000009.servicebus.windows.net --entity-path eventHubiothubfortest000010 -iot hub routing-endpoint delete --hub-name identitytesthub000003 -g clitest.rg000001 -n EHUserIdentityEndpoint000005 -iot hub routing-endpoint delete --hub-name identitytesthub000003 -g clitest.rg000001 -n EHSystemIdentityEndpoint000004 -network vnet create -n test-iot-vnet -g clitest.rg000001 -l westus2 --subnet-name subnet1 -network vnet subnet update -n subnet1 --vnet-name test-iot-vnet -g clitest.rg000001 --disable-private-endpoint-network-policies true -network private-link-resource list --type Microsoft.Devices/IoTHubs -n identitytesthub000003 -g clitest.rg000001 -iot hub show -n identitytesthub000003 -g clitest.rg000001 -network private-endpoint create -g clitest.rg000001 -n iot-private-endpoint --vnet-name test-iot-vnet --subnet subnet1 -l westus2 --connection-name iot-private-endpoint-connection --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Devices/IotHubs/identitytesthub000003 --group-ids iotHub -iot hub show -n identitytesthub000003 -g clitest.rg000001 -network private-endpoint-connection list --type Microsoft.Devices/IoTHubs -n identitytesthub000003 -g clitest.rg000001 -network private-endpoint-connection approve --type Microsoft.Devices/IoTHubs -n identitytesthub000003.59062809-cfa0-4dd6-965f-d4c9ac6bf09f --resource-name identitytesthub000003 -g clitest.rg000001 --description "Approving endpoint connection" -network private-endpoint-connection approve --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Devices/IotHubs/identitytesthub000003/PrivateEndpointConnections/identitytesthub000003.59062809-cfa0-4dd6-965f-d4c9ac6bf09f --description "Approving endpoint connection" -network private-endpoint-connection reject --type Microsoft.Devices/IoTHubs -n identitytesthub000003.59062809-cfa0-4dd6-965f-d4c9ac6bf09f --resource-name identitytesthub000003 -g clitest.rg000001 --description "Rejecting endpoint connection" -network private-endpoint-connection show --type Microsoft.Devices/IoTHubs -n identitytesthub000003.59062809-cfa0-4dd6-965f-d4c9ac6bf09f --resource-name identitytesthub000003 -g clitest.rg000001 -network private-endpoint-connection delete --type Microsoft.Devices/IoTHubs -n identitytesthub000003.59062809-cfa0-4dd6-965f-d4c9ac6bf09f --resource-name identitytesthub000003 -g clitest.rg000001 -y -iot hub identity show -n identitytesthub000003 -g clitest.rg000001 -iot hub show --n identitytesthub000003 -g clitest.rg000001 --query="properties.state" -iot hub show --n identitytesthub000003 -g clitest.rg000001 --query="properties.state" -iot hub show --n identitytesthub000003 -g clitest.rg000001 --query="properties.state" -iot hub show --n identitytesthub000003 -g clitest.rg000001 --query="properties.state" -iot hub identity assign -n identitytesthub000003 -g clitest.rg000001 --user /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/iot-user-identity000007 /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/iot-user-identity000008 -iot hub identity remove -n identitytesthub000003 -g clitest.rg000001 --system -iot hub identity assign -n identitytesthub000003 -g clitest.rg000001 --system -iot hub identity remove -n identitytesthub000003 -g clitest.rg000001 --system-assigned -iot hub identity remove -n identitytesthub000003 -g clitest.rg000001 --user /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/iot-user-identity000007 -iot hub identity assign -n identitytesthub000003 -g clitest.rg000001 --system -iot hub identity remove -n identitytesthub000003 -g clitest.rg000001 --user-assigned -iot hub identity remove -n identitytesthub000003 -g clitest.rg000001 --system -storage container create --name iothubcontainer1000004 --account-name clitest000002 -storage account show-connection-string --resource-group clitest.rg000001 --name clitest000002 -eventhubs namespace create --resource-group clitest.rg000001 --name ehNamespaceiothubfortest1000005 -eventhubs eventhub create --resource-group clitest.rg000001 --namespace-name ehNamespaceiothubfortest1000005 --name eventHubiothubfortest000006 -eventhubs eventhub authorization-rule create --resource-group clitest.rg000001 --namespace-name ehNamespaceiothubfortest1000005 --eventhub-name eventHubiothubfortest000006 --name eventHubPolicyiothubfortest --rights Send -eventhubs eventhub authorization-rule keys list --resource-group clitest.rg000001 --namespace-name ehNamespaceiothubfortest1000005 --eventhub-name eventHubiothubfortest000006 --name eventHubPolicyiothubfortest -iot hub create -n iot-hub-for-test-11000003 -g clitest.rg000001 --sku F1 -iot hub create -n iot-hub-for-test-11000003 -g clitest.rg000001 --sku F1 --partition-count 4 -iot hub create -n iot-hub-for-test-11000003 -g clitest.rg000001 --sku S1 --fn true -iot hub create -n iot-hub-for-test-11000003 -g clitest.rg000001 --sku S1 --fn true --fc containerName -iot hub create -n iot-hub-for-test-11000003 -g clitest.rg000001 --sku S1 --mintls 2.5 -iot hub create -n iot-hub-for-test-11000003 -g clitest.rg000001 --retention-day 3 --c2d-ttl 23 --c2d-max-delivery-count 89 --feedback-ttl 29 --feedback-lock-duration 35 --feedback-max-delivery-count 40 --fileupload-notification-max-delivery-count 79 --fileupload-notification-ttl 20 --min-tls-version 1.2 --fnld 15 -iot hub show-connection-string -n iot-hub-for-test-11000003 -iot hub show-connection-string -n iot-hub-for-test-11000003 -g clitest.rg000001 -iot hub show-connection-string -n iot-hub-for-test-11000003 -g clitest.rg000001 --all -iot hub update -n iot-hub-for-test-11000003 --fnd 80 --rd 4 --ct 34 --cdd 46 --ft 43 --fld 10 --fd 76 --fn true --fnt 32 --fst 3 --fcs DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== --fc iothubcontainer1000004 --tags e=f g=h -iot hub update -n iot-hub-for-test-11000003 -g clitest.rg000001 --fsa identityBased -iot hub update -n iot-hub-for-test-11000003 -g clitest.rg000001 --fsi [system] -iot hub update -n iot-hub-for-test-11000003 -g clitest.rg000001 --fsi test/user/ -iot hub update -n iot-hub-for-test-11000003 -g clitest.rg000001 --disable-local-auth --disable-module-sas -iot hub update -n iot-hub-for-test-11000003 -g clitest.rg000001 --disable-module-sas false --disable-device-sas -iot hub update -n iot-hub-for-test-11000003 -g clitest.rg000001 --disable-local-auth false --disable-device-sas false -iot hub show -n iot-hub-for-test-11000003 -iot hub list -g clitest.rg000001 -iot hub list-skus -n iot-hub-for-test-11000003 -iot hub policy create --hub-name iot-hub-for-test-11000003 -n test_policy --permissions RegistryWrite ServiceConnect DeviceConnect -iot hub policy list --hub-name iot-hub-for-test-11000003 -iot hub policy show --hub-name iot-hub-for-test-11000003 -n test_policy -iot hub policy renew-key --hub-name iot-hub-for-test-11000003 -n test_policy --renew-key Primary -iot hub show-connection-string -n iot-hub-for-test-11000003 --policy-name test_policy -iot hub policy renew-key --hub-name iot-hub-for-test-11000003 -n test_policy --renew-key Swap -iot hub policy delete --hub-name iot-hub-for-test-11000003 -n test_policy -iot hub policy list --hub-name iot-hub-for-test-11000003 -iot hub consumer-group create --hub-name iot-hub-for-test-11000003 -n cg1 -iot hub consumer-group show --hub-name iot-hub-for-test-11000003 -n cg1 -iot hub consumer-group list --hub-name iot-hub-for-test-11000003 -iot hub consumer-group delete --hub-name iot-hub-for-test-11000003 -n cg1 -iot hub consumer-group list --hub-name iot-hub-for-test-11000003 -iot hub show-quota-metrics -n iot-hub-for-test-11000003 -iot hub show-stats -n iot-hub-for-test-11000003 -iot hub routing-endpoint create --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -n Event1 -t EventHub -r clitest.rg000001 -s 00000000-0000-0000-0000-000000000000 -c "Endpoint=sb://ehnamespaceiothubfortest1ndzpkj6.servicebus.windows.net/;SharedAccessKeyName=eventHubPolicyiothubfortest;SharedAccessKey=UdasmA/UA6OMqClEvNPZycQYEJllxdviYDY8QuGxq5o=;EntityPath=eventHubiothubfortest000006" -iot hub routing-endpoint list --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -iot hub routing-endpoint list --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -t EventHub -iot hub routing-endpoint show --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -n Event1 -iot hub routing-endpoint create --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -n Storage1 -t azurestoragecontainer -r clitest.rg000001 -s 00000000-0000-0000-0000-000000000000 -c "DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey==" --container-name iothubcontainer1000004 --encoding avro -b 100 -w 150 -iot hub route create --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -n route1 -s DeviceMessages --en Event1 -c true -e True -iot hub route list --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -iot hub route list --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -s DeviceMessages -iot hub route show --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -n route1 -iot hub route test --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -n route1 -iot hub route test --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -s DeviceMessages -iot hub route update --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -n route1 -s DeviceMessages -iot hub route update --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -n route1 -s TwinChangeEvents -iot hub route update --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -n route1 -s DeviceLifecycleEvents -iot hub route update --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -n route1 -s DeviceJobLifecycleEvents -iot hub route update --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -n route1 -s DeviceConnectionStateEvents -iot hub route delete --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -iot hub routing-endpoint delete --hub-name iot-hub-for-test-11000003 -g clitest.rg000001 -n Event1 -iot hub devicestream show -n iot-hub-for-test-11000003 -g clitest.rg000001 -iot hub message-enrichment create -n iot-hub-for-test-11000003 -g clitest.rg000001 --key key --value value --endpoints events fake_endpoint -iot hub message-enrichment create -n iot-hub-for-test-11000003 -g clitest.rg000001 --key key --value value --endpoints events -iot hub message-enrichment update -n iot-hub-for-test-11000003 -g clitest.rg000001 --key fake_key --value value --endpoints events -iot hub message-enrichment update -n iot-hub-for-test-11000003 -g clitest.rg000001 --key key --value value --endpoints events fake_endpoint -iot hub message-enrichment update -n iot-hub-for-test-11000003 -g clitest.rg000001 --key key --value value --endpoints events -iot hub message-enrichment list -n iot-hub-for-test-11000003 -g clitest.rg000001 -iot hub message-enrichment delete -n iot-hub-for-test-11000003 -g clitest.rg000001 --key fake_key -iot hub message-enrichment delete -n iot-hub-for-test-11000003 -g clitest.rg000001 --key key -iot hub manual-failover -n iot-hub-for-test-11000003 -g clitest.rg000001 -iot hub delete -n iot-hub-for-test-11000003 -iot hub create -n iot000003 -g clitest.rg000001 --sku S1 -iot dps create -g clitest.rg000001 -n dps000002 --tags key1=value1 key2=value2 -iot dps list -g clitest.rg000001 -iot dps show -g clitest.rg000001 -n dps000002 -iot dps update -g clitest.rg000001 -n dps000002 --tags key3=value3 --set properties.allocationPolicy="GeoLatency" -iot dps update -g clitest.rg000001 -n dps000002 --tags "" -iot dps access-policy create -g clitest.rg000001 --dps-name dps000002 -n policy000004 -r EnrollmentRead -iot dps access-policy list -g clitest.rg000001 --dps-name dps000002 -iot dps access-policy show -g clitest.rg000001 --dps-name dps000002 -n policy000004 -iot dps access-policy update -g clitest.rg000001 --dps-name dps000002 -n policy000004 -r EnrollmentWrite -iot dps access-policy delete -g clitest.rg000001 --dps-name dps000002 -n policy000004 -iot dps certificate create --dps-name dps000002 -g clitest.rg000001 --name certificate000005 -p testcert.cer -iot dps certificate create --dps-name dps000002 -g clitest.rg000001 --name verified-certificate-000006 -p testcert.cer --verified -iot dps certificate list --dps-name dps000002 -g clitest.rg000001 -iot dps certificate show --dps-name dps000002 -g clitest.rg000001 --name certificate000005 -iot dps certificate update --dps-name dps000002 -g clitest.rg000001 --name certificate000005 -p testcert.cer --etag IjAwMDA5YzE1LTAwMDAtMDcwMC0wMDAwLTYxMjdiMDY2MDAwMCI= -iot dps certificate generate-verification-code --dps-name dps000002 -g clitest.rg000001 -n certificate000005 --etag IjAwMDA5ZTE1LTAwMDAtMDcwMC0wMDAwLTYxMjdiMDY5MDAwMCI= -iot dps certificate verify --dps-name dps000002 -g clitest.rg000001 -n certificate000005 -p verify.cer --etag IjAwMDA5ZjE1LTAwMDAtMDcwMC0wMDAwLTYxMjdiMDZhMDAwMCI= -iot dps certificate delete --dps-name dps000002 -g clitest.rg000001 --name certificate000005 --etag IjAwMDBhMDE1LTAwMDAtMDcwMC0wMDAwLTYxMjdiMDZiMDAwMCI= -iot dps certificate delete --dps-name dps000002 -g clitest.rg000001 --name verified-certificate-000006 --etag IjAwMDA5ZDE1LTAwMDAtMDcwMC0wMDAwLTYxMjdiMDY3MDAwMCI= -iot hub policy create --hub-name iot000003 -n key000008 --permissions RegistryWrite -iot hub show-connection-string --name iot000003 -g clitest.rg000001 -iot dps linked-hub create --dps-name dps000002 -g clitest.rg000001 --connection-string HostName=iot000003.azure-devices.net;SharedAccessKeyName=iothubowner;SharedAccessKey=dyobhj9kZLUex7dbX5UlQGx6DVm6CuykfrNdlP4EPxY= -l westus -iot dps linked-hub list --dps-name dps000002 -g clitest.rg000001 -iot dps linked-hub show --dps-name dps000002 -g clitest.rg000001 --linked-hub iot000003.azure-devices.net -iot dps linked-hub update --dps-name dps000002 -g clitest.rg000001 --linked-hub iot000003.azure-devices.net --allocation-weight 10 --apply-allocation-policy True -iot dps linked-hub show --dps-name dps000002 -g clitest.rg000001 --linked-hub iot000003.azure-devices.net -iot dps linked-hub delete --dps-name dps000002 -g clitest.rg000001 --linked-hub iot000003.azure-devices.net -iot dps delete -g clitest.rg000001 -n dps000002 -keyvault private-link-resource list --vault-name {kv} -keyvault create --hsm-name {hsm} -g {rg} -l {loc} --administrators "3707fb2f-ac10-4591-a04f-8b0d786ea37d" -keyvault private-link-resource list --hsm-name {hsm} -keyvault delete --hsm-name {hsm} -g {rg} -keyvault purge --hsm-name {hsm} -l {loc} -keyvault show -n {kv} -g {rg} --query "id" -otsv -network vnet create -n {vnet} -g {rg} -l {loc} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} -l {loc} --connection-name {pe_connection} --private-connection-resource-id {kv_id} --group-id vault -keyvault show -n {kv} -keyvault private-endpoint-connection show --id {kv_pec_id} -keyvault private-endpoint-connection show --vault-name {kv} --name {kv_pec_name} -keyvault private-endpoint-connection show --vault-name {kv} -n {kv_pec_name} -keyvault set-policy -g {rg} -n {kv} --object-id {policy_id} --certificate-permissions get list -keyvault private-endpoint-connection reject --id {kv_pec_id} --description "{rejection_desc}" --no-wait -keyvault private-endpoint-connection show --id {kv_pec_id} -keyvault private-endpoint-connection wait --id {kv_pec_id} --created -keyvault private-endpoint-connection show --id {kv_pec_id} -keyvault private-endpoint-connection approve --vault-name {kv} --name {kv_pec_name} --description "{approval_desc}" -keyvault create --hsm-name {hsm} -g {rg} -l {loc} --administrators "3707fb2f-ac10-4591-a04f-8b0d786ea37d" -network vnet create -n {vnet} -g {rg} -l {loc} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} -l {loc} --connection-name {pe_connection} --private-connection-resource-id {hsm_id} --group-id managedhsm -keyvault show --hsm-name {hsm} -keyvault private-endpoint-connection show --id {hsm_pec_id} -keyvault private-endpoint-connection show --hsm-name {hsm} --name {hsm_pec_name} -keyvault private-endpoint-connection list --hsm-name {hsm} -keyvault private-endpoint-connection approve --hsm-name {hsm} --name {hsm_pec_name} --description "{approval_desc}" -keyvault private-endpoint-connection wait --id {hsm_pec_id} --created -keyvault private-endpoint-connection reject --id {hsm_pec_id} --description "{rejection_desc}" --no-wait -keyvault private-endpoint-connection wait --id {hsm_pec_id} --created -keyvault private-endpoint-connection show --id {hsm_pec_id} -keyvault private-endpoint-connection delete --hsm-name {hsm} --name {hsm_pec_name} -network private-endpoint delete -g {rg} -n {pe} -keyvault delete --hsm-name {hsm} -g {rg} -keyvault purge --hsm-name {hsm} -l {loc} -group create -g {rg} -l {loc} -keyvault create --hsm-name {hsm_name} -g {rg} -l {loc} --administrators {init_admin} -keyvault show --hsm-name {hsm_name} -keyvault show --hsm-name {hsm_name} -g {rg} -keyvault list --resource-type hsm -keyvault list --resource-type hsm -g {rg} -keyvault delete --hsm-name {hsm_name} -keyvault show-deleted --hsm-name {hsm_name} -keyvault create -g {rg} -n {kv} -l {loc} -keyvault create -g {rg} -n {kv} -l {loc} -keyvault show -n {kv} -keyvault list -g {rg} -keyvault update -g {rg} -n {kv} --set properties.sku.name=premium -keyvault update -g {rg} -n {kv} --enable-soft-delete --enabled-for-deployment --enabled-for-disk-encryption --enabled-for-template-deployment --bypass AzureServices --default-action Deny -keyvault set-policy -g {rg} -n {kv} --object-id {policy_id} --key-permissions get wrapkey wrapKey -keyvault set-policy -g {rg} -n {kv} --object-id {policy_id} --key-permissions get wrapkey wrapkey -keyvault set-policy -g {rg} -n {kv} --object-id {policy_id} --certificate-permissions get list -ad app create --display-name {kv} -keyvault set-policy -g {rg} -n {kv} --object-id {policy_id} --application-id {app_id} --key-permissions get list -keyvault delete-policy -g {rg} -n {kv} --object-id {policy_id} --application-id {app_id} -ad app delete --id {app_id} -keyvault delete-policy -g {rg} -n {kv} --object-id {policy_id} -keyvault delete -n {kv} -keyvault list -g {rg} -keyvault show-deleted -n {kv} -keyvault key create --hsm-name {hsm_name} -n {key_name} -keyvault key backup --hsm-name {hsm_name} -n {key_name} -f "{key_backup}" -keyvault security-domain download --hsm-name {hsm_name} --security-domain-file "{sdfile}" --sd-quorum 2 --sd-wrapping-keys "{cer1_path}" "{cer2_path}" "{cer3_path}" --no-wait -keyvault delete --hsm-name {hsm_name} -keyvault create --hsm-name {next_hsm_name} -l {loc} -g {rg} --administrators {init_admin} --retention-days 7 --no-wait -keyvault wait-hsm --hsm-name {next_hsm_name} --created -keyvault security-domain init-recovery --hsm-name {next_hsm_name} --sd-exchange-key "{exchange_key}" -keyvault security-domain upload --hsm-name {next_hsm_name} --sd-file "{sdfile}" --sd-exchange-key "{exchange_key}" --sd-wrapping-keys "{key1_path}" "{key2_path}" -keyvault key restore --hsm-name {next_hsm_name} -f "{key_backup}" -keyvault role definition list --hsm-name {hsm_name} -keyvault role definition create --hsm-name {hsm_name} --role-definition {role_definition} -keyvault role definition show --hsm-name {hsm_name} --name {name} -keyvault role definition update --hsm-name {hsm_name} --role-definition {updated_role_definition} -keyvault role definition show --hsm-name {hsm_name} --name {name} -keyvault role definition list --hsm-name {hsm_name} -keyvault role definition delete --hsm-name {hsm_name} --name {name} -keyvault role definition list --hsm-name {hsm_name} -keyvault show -n {kv} -g {rg} -keyvault key create --vault-name {kv} -n {key} -p software -keyvault key create --vault-name {kv} -n {key2} -keyvault set-policy -n {kv} --object-id {obj_id} --key-permissions {key_perms} -keyvault key encrypt -n {key} --vault-name {kv} -a RSA-OAEP --value "{plaintext_value}" --data-type plaintext -keyvault key encrypt -n {key} --vault-name {kv} -a RSA-OAEP --value "{base64_value}" --data-type base64 -keyvault key decrypt -n {key} --vault-name {kv} -a RSA-OAEP --value "{encryption_result1}" --data-type plaintext -keyvault key decrypt -n {key} --vault-name {kv} -a RSA-OAEP --value "{encryption_result2}" --data-type base64 -keyvault key list --vault-name {kv} -keyvault key list --vault-name {kv} --maxresults 10 -keyvault key list --vault-name {kv} --maxresults 1 -keyvault key create --vault-name {kv} -n {key} -p software --disabled --ops encrypt decrypt --tags test=foo -keyvault key list-versions --vault-name {kv} -n {key} -keyvault key list-versions --vault-name {kv} -n {key} --maxresults 10 -keyvault key list-versions --vault-name {kv} -n {key} --maxresults 1 -keyvault key list-versions --id {kid} -keyvault key list-versions --id {pkid} -keyvault key show --vault-name {kv} -n {key} -keyvault key show --vault-name {kv} -n {key} -v {version1} -keyvault key show --id {kid1} -keyvault key set-attributes --vault-name {kv} -n {key} --enabled true -keyvault key backup --vault-name {kv} -n {key} --file "{key_file}" -keyvault key delete --vault-name {kv} -n {key} -keyvault key purge --vault-name {kv} -n {key} -keyvault key delete --vault-name {kv} -n {key2} -keyvault key list --vault-name {kv} -keyvault key list --vault-name {kv} --maxresults 10 -keyvault key restore --vault-name {kv} --file "{key_file}" -keyvault key list-versions --vault-name {kv} -n {key} -keyvault key list-versions --vault-name {kv} -n {key} --maxresults 10 -keyvault key import --vault-name {kv} -n import-key-plain --pem-file "{key_plain_file}" -p software -keyvault key import --vault-name {kv} -n import-key-encrypted --pem-file "{key_enc_file}" --pem-password {key_enc_password} -p hsm -keyvault key import --vault-name {kv} -n import-key-plain --pem-string '{key_plain_string}' -p software -keyvault key import --vault-name {kv} -n import-key-encrypted --pem-string "{key_enc_string}" --pem-password {key_enc_password} -p hsm -keyvault key create --vault-name {kv} -n eckey1 --kty EC -keyvault key create --vault-name {kv} -n eckey1 --curve P-256 -keyvault key delete --vault-name {kv} -n eckey1 -keyvault key import --vault-name {kv} -n import-eckey-plain --pem-file "{key_plain_file}" -p software -keyvault key import --vault-name {kv} -n import-eckey-encrypted --pem-file "{key_enc_file}" --pem-password {key_enc_password} -keyvault key create --vault-name {kv2} --name key1 --kty RSA-HSM --size 2048 --ops import -keyvault key create --vault-name {kv2} --name key2 --kty RSA-HSM --size 3072 --ops import -keyvault key create --vault-name {kv2} --name key2 --kty RSA-HSM --size 4096 --ops import -keyvault show -n {kv} -g {rg} -keyvault set-policy -n {kv} --object-id {obj_id} --key-permissions {key_perms} -keyvault key create --vault-name {kv} -n {key} -p software -keyvault key rotation-policy update --value "{policy}" --vault-name {kv} -n {key} -keyvault key rotation-policy show --vault-name {kv} -n {key} -keyvault key rotate --vault-name {kv} -n {key} -keyvault key create --kty oct-HSM --size 256 -n {key} --hsm-name {hsm_name} --ops encrypt decrypt -keyvault key encrypt -n {key} --hsm-name {hsm_name} -a A256GCM --value "{plaintext_value}" --data-type plaintext --aad {aad} -keyvault key encrypt -n {key} --hsm-name {hsm_name} -a A256GCM --value "{base64_value}" --data-type base64 --aad {aad} -keyvault key decrypt -n oct256key-000001 --hsm-name ystesthsm -a A256GCM --value "NdkeIVHFPLL0M5oHXev9nvk=" --data-type plaintext --iv 2946f5d74f971c5438519fc8 --tag 56dbce9159956ebe9fc6670ca689ba21 --aad 101112131415161718191a1b1c1d1e1f -keyvault key decrypt -n oct256key-000001 --hsm-name ystesthsm -a A256GCM --value "brIwaH5jAQS1ogmXpATOhzw=" --data-type base64 --iv c76792d27e2cee6fca9c63a0 --tag c59ae02d7422d20192ae5e6b5422a4c7 --aad 101112131415161718191a1b1c1d1e1f -keyvault key delete -n {key} --hsm-name {hsm_name} -keyvault key purge -n {key} --hsm-name {hsm_name} -keyvault key random --count 4 --hsm-name {hsm_name} -keyvault key random --count 1 --id {hsm_url} -keyvault key import --vault-name {kv} -n ec-p256-file --pem-file "{ec-p256-file}" -keyvault key download --vault-name {kv} -n ec-p256-file -f "ec-p256-file.der" -e DER -keyvault key download --vault-name {kv} -n ec-p256-file -f "ec-p256-file.pem" -e PEM -keyvault key import --vault-name {kv} -n ec-p384-file --pem-file "{ec-p384-file}" -keyvault key download --vault-name {kv} -n ec-p384-file -f "ec-p384-file.der" -e DER -keyvault key download --vault-name {kv} -n ec-p384-file -f "ec-p384-file.pem" -e PEM -keyvault key import --vault-name {kv} -n ec-p521-file --pem-file "{ec-p521-file}" -keyvault key download --vault-name {kv} -n ec-p521-file -f "ec-p521-file.der" -e DER -keyvault key download --vault-name {kv} -n ec-p521-file -f "ec-p521-file.pem" -e PEM -keyvault key import --vault-name {kv} -n ec-p256k-file --pem-file "{ec-p256k-file}" -keyvault key download --vault-name {kv} -n ec-p256k-file -f "ec-p256k-file.der" -e DER -keyvault key download --vault-name {kv} -n ec-p256k-file -f "ec-p256k-file.pem" -e PEM -keyvault key import --vault-name {kv} -n rsa-2048-file --pem-file "{rsa-2048-file}" -keyvault key download --vault-name {kv} -n rsa-2048-file -f "rsa-2048-file.der" -e DER -keyvault key download --vault-name {kv} -n rsa-2048-file -f "rsa-2048-file.pem" -e PEM -keyvault key import --vault-name {kv} -n rsa-3072-file --pem-file "{rsa-3072-file}" -keyvault key download --vault-name {kv} -n rsa-3072-file -f "rsa-3072-file.der" -e DER -keyvault key download --vault-name {kv} -n rsa-3072-file -f "rsa-3072-file.pem" -e PEM -keyvault key import --vault-name {kv} -n rsa-4096-file --pem-file "{rsa-4096-file}" -keyvault key download --vault-name {kv} -n rsa-4096-file -f "rsa-4096-file.der" -e DER -keyvault key download --vault-name {kv} -n rsa-4096-file -f "rsa-4096-file.pem" -e PEM -keyvault show -n {kv} -keyvault secret set --vault-name {kv} -n {sec} --value ABC123 -keyvault secret delete --vault-name {kv} -n {sec} -keyvault secret list-deleted --vault-name {kv} -keyvault secret set --vault-name {kv} -n {sec} --value ABC123 -keyvault secret set --vault-name {kv} -n {sec} --value ABC123 -keyvault secret set --vault-name {kv} -n {sec} --value ABC123 -keyvault secret set --vault-name {kv} -n {sec} --value ABC123 -keyvault secret set --vault-name {kv} -n {sec} --value ABC123 -keyvault secret set --vault-name {kv} -n {sec} --value ABC123 -keyvault secret set --vault-name {kv} -n {sec} --value ABC123 -keyvault secret set --vault-name {kv} -n {sec} --value ABC123 -keyvault secret set --vault-name {kv} -n {sec} --value ABC123 -keyvault secret set --vault-name {kv} -n {sec} --value ABC123 -keyvault show -n {kv} -g {rg} -keyvault set-policy -n {kv} --object-id {obj_id} --secret-permissions {secret_perms} -keyvault secret set --vault-name {kv} -n {sec} --value ABC123 -keyvault secret set --vault-name {kv} -n {sec2} --value 123456 -keyvault secret list --vault-name {kv} -keyvault secret list --vault-name {kv} --maxresults 10 -keyvault secret list --vault-name {kv} --maxresults 1 -keyvault secret set --vault-name {kv} -n {sec} --value DEF456 --tags test=foo --description "test type" -keyvault secret list-versions --vault-name {kv} -n {sec} -keyvault secret list-versions --vault-name {kv} -n {sec} --maxresults 10 -keyvault secret list-versions --vault-name {kv} -n {sec} --maxresults 1 -keyvault secret show --vault-name {kv} -n {sec} -keyvault secret show --vault-name {kv} -n {sec} -v {ver1} -keyvault secret show --id {sid1} -keyvault secret set-attributes --vault-name {kv} -n {sec} --enabled false -keyvault secret backup --vault-name {kv} -n {sec} --file "{bak_file}" -keyvault secret delete --vault-name {kv} -n {sec} -keyvault secret purge --vault-name {kv} -n {sec} -keyvault secret delete --vault-name {kv} -n {sec2} -keyvault secret list --vault-name {kv} -keyvault secret restore --vault-name {kv} --file "{bak_file}" -keyvault secret list-versions --vault-name {kv} -n {sec} -keyvault secret delete --vault-name {kv} -n {sec} -keyvault secret list --vault-name {kv} -keyvault secret list --vault-name {kv} --maxresults 10 -keyvault secret set --vault-name {kv} -n download-{enc} --file "{src_path}" --encoding {enc} -keyvault secret download --vault-name {kv} -n download-{enc} --file "{dest_path}" -keyvault secret set --vault-name {kv} -n download-{enc} --file "{src_path}" --encoding {enc} -keyvault secret download --vault-name {kv} -n download-{enc} --file "{dest_path}" -keyvault secret set --vault-name {kv} -n download-{enc} --file "{src_path}" --encoding {enc} -keyvault secret download --vault-name {kv} -n download-{enc} --file "{dest_path}" -keyvault secret set --vault-name {kv} -n download-{enc} --file "{src_path}" --encoding {enc} -keyvault secret download --vault-name {kv} -n download-{enc} --file "{dest_path}" -keyvault secret set --vault-name {kv} -n download-{enc} --file "{src_path}" --encoding {enc} -keyvault secret download --vault-name {kv} -n download-{enc} --file "{dest_path}" -keyvault secret set --vault-name {kv} -n download-{enc} --file "{src_path}" --encoding {enc} -keyvault secret download --vault-name {kv} -n download-{enc} --file "{dest_path}" -keyvault certificate contact add --vault-name {kv} --email admin@contoso.com --name "John Doe" --phone 123-456-7890 -keyvault certificate contact add --vault-name {kv} --email other@contoso.com -keyvault certificate contact list --vault-name {kv} -keyvault certificate contact delete --vault-name {kv} --email admin@contoso.com -keyvault certificate contact list --vault-name {kv} -keyvault certificate issuer create --vault-name {kv} --issuer-name issuer1 --provider Test -keyvault certificate issuer show --vault-name {kv} --issuer-name issuer1 -keyvault certificate issuer update --vault-name {kv} --issuer-name issuer1 --organization-id TestOrg --account-id test_account -keyvault certificate issuer update --vault-name {kv} --issuer-name notexist --organization-id TestOrg --account-id test_account -keyvault certificate issuer update --vault-name {kv} --issuer-name issuer1 --account-id "" -keyvault certificate issuer list --vault-name {kv} -keyvault certificate issuer admin add --vault-name {kv} --issuer-name issuer1 --email test@test.com --first-name Test --last-name Admin --phone 123-456-7890 -keyvault certificate issuer admin add --vault-name {kv} --issuer-name issuer1 --email test2@test.com -keyvault certificate issuer admin list --vault-name {kv} --issuer-name issuer1 -keyvault certificate issuer admin delete --vault-name {kv} --issuer-name issuer1 --email test@test.com -keyvault certificate issuer admin list --vault-name {kv} --issuer-name issuer1 -keyvault certificate issuer delete --vault-name {kv} --issuer-name issuer1 -keyvault certificate issuer list --vault-name {kv} -keyvault certificate create --vault-name {kv} -n pending-cert -p @"{policy_path}" -keyvault certificate pending show --vault-name {kv} -n pending-cert -keyvault certificate list --vault-name {kv} --include-pending -keyvault certificate list --vault-name {kv} --include-pending true -keyvault certificate list --vault-name {kv} -keyvault certificate list --vault-name {kv} --include-pending false -keyvault certificate pending merge --vault-name {kv} -n pending-cert --file "{fake_cert_path}" -keyvault certificate pending delete --vault-name {kv} -n pending-cert -keyvault certificate pending show --vault-name {kv} -n pending-cert -keyvault certificate import --vault-name {kv} -n pem-cert1 --file "{pem_file}" -p @"{pem_policy_path}" -keyvault certificate download --vault-name {kv} -n pem-cert1 --file "{dest_binary}" -e DER -keyvault certificate download --vault-name {kv} -n pem-cert1 --file "{dest_string}" -e PEM -keyvault certificate delete --vault-name {kv} -n pem-cert1 -keyvault certificate get-default-policy -keyvault certificate get-default-policy --scaffold -keyvault show -n {kv} -g {rg} -keyvault certificate create --vault-name {kv} -n cert1 -p @"{policy_path}" -keyvault certificate create --vault-name {kv} -n cert2 -p @"{policy_path}" -keyvault certificate show --vault-name {kv} -n cert2 --query policy -keyvault secret download --vault-name {kv} --file "{cert_secret_path}" -n cert2 --encoding base64 -keyvault certificate import --vault-name {kv} --file "{cert_secret_path}" -n cert2 -p @"{policy3_path}" -keyvault certificate delete --vault-name {kv} -n cert2 -keyvault certificate list --vault-name {kv} -keyvault certificate list --vault-name {kv} --maxresults 10 -keyvault certificate create --vault-name {kv} -n cert1 -p @"{policy2_path}" -keyvault certificate list-versions --vault-name {kv} -n cert1 --maxresults 10 -keyvault certificate list-versions --vault-name {kv} -n cert1 -keyvault certificate show --vault-name {kv} -n cert1 -keyvault certificate show --vault-name {kv} -n cert1 -v {ver1} -keyvault certificate show --id {cert_id} -keyvault key list --vault-name {kv} -keyvault secret list --vault-name {kv} -keyvault key show --vault-name {kv} -n cert1 -keyvault secret show --vault-name {kv} -n cert1 -keyvault certificate set-attributes --vault-name {kv} -n cert1 --enabled false -p @"{policy_path}" -keyvault set-policy -n {kv} --object-id {obj_id} --certificate-permissions backup delete get restore list purge -keyvault certificate backup --vault-name {kv} -n cert1 --file {bak_file} -keyvault certificate delete --vault-name {kv} -n cert1 -keyvault certificate purge --vault-name {kv} -n cert1 -keyvault certificate list --vault-name {kv} -keyvault certificate list --vault-name {kv} --maxresults 10 -keyvault certificate restore --vault-name {kv} --file {bak_file} -keyvault certificate list --vault-name {kv} -keyvault certificate import --vault-name {kv} -n pem-cert1 --file "{pem_plain_file}" -p @"{pem_policy_path}" -keyvault certificate import --vault-name {kv} -n pem-cert2 --file "{pem_encrypted_file}" --password {pem_encrypted_password} -p @"{pem_policy_path}" -keyvault certificate import --vault-name {kv} -n pem-cert2 --file "notexist.json" -p @"{pem_policy_path}" -keyvault show -n {kv} -g {rg} -keyvault set-policy -n {kv} --object-id {obj_id} --key-permissions {key_perms} --secret-permissions {secret_perms} --certificate-permissions {cert_perms} -keyvault secret set --vault-name {kv} -n secret1 --value ABC123 -keyvault secret set --vault-name {kv} -n secret2 --value ABC123 -keyvault key create --vault-name {kv} -n key1 -p software -keyvault key create --vault-name {kv} -n key2 -p software -keyvault certificate import --vault-name {kv} -n cert1 --file "{pem_plain_file}" -p @"{pem_policy_path}" -keyvault certificate import --vault-name {kv} -n cert2 --file "{pem_plain_file}" -p @"{pem_policy_path}" -keyvault secret delete --vault-name {kv} -n secret1 -keyvault secret delete --vault-name {kv} -n secret2 -keyvault key delete --vault-name {kv} -n key1 -keyvault key delete --vault-name {kv} -n key2 -keyvault certificate delete --vault-name {kv} -n cert1 -keyvault certificate delete --vault-name {kv} -n cert2 -keyvault secret recover --vault-name {kv} -n secret1 -keyvault key recover --vault-name {kv} -n key1 -keyvault certificate recover --vault-name {kv} -n cert1 -keyvault secret purge --vault-name {kv} -n secret2 -keyvault key purge --vault-name {kv} -n key2 -keyvault certificate purge --vault-name {kv} -n cert2 -keyvault delete -n {kv} -keyvault recover -n {kv} --no-wait -network vnet create -g {rg} -n {vnet} -l {loc} -network vnet subnet create -g {rg} --vnet-name {vnet} --name {subnet} --address-prefixes 10.0.0.0/21 --service-endpoints Microsoft.KeyVault -network vnet subnet show -g {rg} --vnet-name {vnet} --name {subnet} -keyvault create -n {kv2} -l {loc} -g {rg} --network-acls "{network_acls_json_string}" -keyvault create -n {kv3} -l {loc} -g {rg} --network-acls "{network_acls_json_filename}" -network vnet create -g {rg} -n {vnet2} -l {loc} -network vnet subnet create -g {rg} --vnet-name {vnet2} --name {subnet2} --address-prefixes 10.0.0.0/21 --service-endpoints Microsoft.KeyVault -network vnet subnet show -g {rg} --vnet-name {vnet2} --name {subnet2} -network vnet create -g {rg} -n {vnet3} -l {loc} -network vnet subnet create -g {rg} --vnet-name {vnet3} --name {subnet3} --address-prefixes 10.0.0.0/21 --service-endpoints Microsoft.KeyVault -network vnet subnet show -g {rg} --vnet-name {vnet3} --name {subnet3} -keyvault create -n {kv4} -l {loc} -g {rg} --network-acls-ips {ip3} {ip4} --network-acls-vnets {subnetId2} {vnet3}/{subnet3} -keyvault create -n {kv5} -l {loc} -g {rg} --network-acls "@{network_acls_json_filename}" --network-acls-ips {ip3} {ip4} --network-acls-vnets {subnetId2} {vnet3}/{subnet3} -keyvault create -n {kv6} -l {loc} -g {rg} --network-acls "{network_acls_json_filename}" --network-acls-ips {ip3} {ip4} --network-acls-vnets {subnetId2} {vnet3}/{subnet3} -keyvault create -g {rg} -n {kv} -l {loc} --sku premium --retention-days 7 {add} -keyvault update --name {kv} --resource-group {rg} --default-action Deny -keyvault network-rule add --subnet {subnetId} --name {kv} --resource-group {rg} -keyvault network-rule add --subnet {subnetId} --name {kv} --resource-group {rg} -keyvault network-rule list --name {kv} --resource-group {rg} -keyvault network-rule remove --subnet {subnetId} --name {kv} --resource-group {rg} -keyvault network-rule add --ip-address {ip} --name {kv} --resource-group {rg} -keyvault network-rule add --ip-address {ip} --name {kv} --resource-group {rg} -keyvault network-rule add --ip-address {ip5} --name {kv} --resource-group {rg} -keyvault network-rule list --name {kv} --resource-group {rg} -keyvault network-rule remove --ip-address {ip} --name {kv} --resource-group {rg} -keyvault network-rule add --ip-address {ip} {ip2} {ip3} --name {kv} --resource-group {rg} -keyvault network-rule add --ip-address {ip} {ip5} --name {kv} --resource-group {rg} -keyvault network-rule add --ip-address {ip4} {ip5} --name {kv} --resource-group {rg} -keyvault create -g {rg} -n {kv} -l {loc} -keyvault create -g {rg} -n {kv2} -l {loc} --public-network-access Enabled -keyvault create -g {rg} -n {kv3} -l {loc} --public-network-access Disabled -keyvault update -g {rg} -n {kv3} --public-network-access Enabled -kusto cluster create -n {name} -g {rg} --sku {sku} --capacity {capacity} -kusto cluster show -n {name} -g {rg} -kusto cluster update -n {name} -g {rg} --sku {sku} --capacity {capacity} -kusto cluster delete -n {name} -g {rg} -y -kusto cluster create -n {name} -g {rg} --sku {sku} -kusto cluster stop -n {name} -g {rg} -kusto cluster show -n {name} -g {rg} -kusto cluster start -n {name} -g {rg} -kusto cluster show -n {name} -g {rg} -kusto cluster delete -n {name} -g {rg} -y -kusto cluster create -n {cluster_name} -g {rg} --sku {sku} -kusto database create --cluster-name {cluster_name} -g {rg} -n {database_name} --soft-delete-period {soft_delete_period} --hot-cache-period {hot_cache_period} -kusto database update --cluster-name {cluster_name} -g {rg} -n {database_name} --soft-delete-period {soft_delete_period} --hot-cache-period {hot_cache_period} -kusto database delete --cluster-name {cluster_name} -g {rg} -n {database_name} -y -kusto cluster delete -n {cluster_name} -g {rg} -y -managedservices definition create --name {name} --tenant-id {tenant-id} --principal-id {principal-id} --role-definition-id {role-definition-id} --definition-id {definition-id} -managedservices definition show --definition {definition-id} -managedservices assignment create --definition {registration-definition-resource-id} --assignment-id {assignment-id} -managedservices assignment show --assignment {assignment-id} -managedservices assignment delete --assignment {assignment-id} -managedservices assignment list -managedservices definition delete --definition {definition-id} -managedservices definition list -maps account create -n {name} -g {rg} --sku {sku} --accept-tos -maps account create -n {name} -g {rg} --sku {sku} --accept-tos -maps account create -n {name3} -g {rg1} --sku {skus1} --accept-tos -maps account update -n {name} -g {rg} --sku {skus1} --tags {tags} -maps account show -n {name} -g {rg} -maps account show --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Maps/accounts/cli-000005 -maps account list -g {rg} -maps account create -n {name1} -g {rg1} --sku {sku} --accept-tos -maps account create -n {name2} -g {rg} --sku {sku} --accept-tos -maps account list -g {rg} -maps account list -g {rg1} -maps account keys list -n {name} -g {rg} -maps account keys renew -n {name} -g {rg} --key {key_type_primary} -maps account keys renew -n {name} -g {rg} --key {key_type_secondary} -maps account delete -n {name} -g {rg} -maps account list -g {rg} -maps account delete -n {name1} -g {rg1} -maps account delete -n {name2} -g {rg} -maps account delete -n {name3} -g {rg1} -maps account list -g {rg} -maps account list -g {rg1} -maps account create -n {name} -g {rg} --sku {skus1} --accept-tos -maps creator create -n {name} --creator-name {creator_name} -g {rg} --storage-units {storage_units} -l westus2 -maps creator update -n {name} --creator-name {creator_name} -g {rg} --storage-units 10 --tags {tags} -maps creator show -n {name} -g {rg} --creator-name {creator_name} -maps creator list -g {rg} -n {name} -maps creator delete -n {name} --creator-name {creator_name} -g {rg} -y -maps creator list -n {name} -g {rg} -maps map list-operation -term accept --product "vsec" --plan "management" --publisher "checkpoint" -term show --product "vsec" --plan "management" --publisher "checkpoint" -monitor activity-log list --start-time 2018-01-01T00:00:00Z --end-time 2999-01-01T00:00:00Z -monitor action-group create -n cliactiongrouptest000002 -g cli_test_monitor_ag_basic000001 -ojson -monitor action-group list -g cli_test_monitor_ag_basic000001 -ojson -monitor action-group update -n cliactiongrouptest000002 -g cli_test_monitor_ag_basic000001 -ojson --short-name new_name --tag owner=alice -monitor action-group update -n cliactiongrouptest000002 -g cli_test_monitor_ag_basic000001 -ojson -a email alice alice@example.com usecommonalertsChema -a sms alice_sms 1 5551234567 -a webhook alice_web https://www.example.com/alert?name=alice useAadAuth testobjid http://iduri usecommonalertschema -a armrole alicearmrole abcde usecommonAlertSchema -a azureapppush alice_apppush alice@example.com -a itsm alice_itsm test_workspace test_conn ticket_blob eastus -a automationrunbook alice_runbook test_account test_runbook test_webhook http://example.com isglobalrunbook -a voice alice_voice 1 5551234567 -a logicapp alice_logicapp test_resource http://callback -a azurefunction azfunc test_rsrc test_func http://trigger usecommonalertSchema -monitor action-group update -n cliactiongrouptest000002 -g cli_test_monitor_ag_basic000001 -ojson -r alice_web -monitor action-group enable-receiver -n nonexist --action-group cliactiongrouptest000002 -g cli_test_monitor_ag_basic000001 -monitor action-group enable-receiver -n alice --action-group cliactiongrouptest000002 -g cli_test_monitor_ag_basic000001 -monitor action-group delete -n cliactiongrouptest000002 -g cli_test_monitor_ag_basic000001 -ojson -monitor action-group list -g cli_test_monitor_ag_basic000001 -ojson -monitor action-group create -n cliact000002 -g clitest.rg000001 --query id -otsv -monitor action-group create -n cliact000003 -g clitest.rg000001 --query id -otsv -monitor action-group create -n cliact000004 -g clitest.rg000001 --query id -otsv -group show -n clitest.rg000001 -ojson -monitor activity-log alert create -n clialert000005 -g clitest.rg000001 -ojson -monitor activity-log alert show -n clialert000005 -g clitest.rg000001 -ojson -monitor activity-log alert action-group add -n clialert000005 -g clitest.rg000001 -a /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/microsoft.insights/actionGroups/cliact000002 -ojson -monitor activity-log alert action-group add -n clialert000005 -g clitest.rg000001 -a cliact000003 --reset -ojson -monitor activity-log alert action-group add -n clialert000005 -g clitest.rg000001 -a /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/microsoft.insights/actionGroups/cliact000002 cliact000004 -ojson -monitor activity-log alert action-group add -n clialert000005 -g clitest.rg000001 -a /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/microsoft.insights/actionGroups/cliact000002 -ojson -monitor activity-log alert show -n clialert000005 -g clitest.rg000001 -ojson -monitor activity-log alert action-group add -n clialert000005 -g clitest.rg000001 -a cliact000002 -w purpose=test -ojson -monitor activity-log alert action-group add -n clialert000005 -g clitest.rg000001 -a /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/microsoft.insights/actionGroups/cliact000002 -w purpose=error-trigger --strict -ojson -monitor activity-log alert action-group remove -n clialert000005 -g clitest.rg000001 -a cliact000002 -ojson -monitor activity-log alert action-group remove -n clialert000005 -g clitest.rg000001 -a /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/microsoft.insights/actionGroups/cliact000002 -ojson -monitor activity-log alert action-group remove -n clialert000005 -g clitest.rg000001 -a cliact000003 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/microsoft.insights/actionGroups/cliact000004 -ojson -monitor activity-log alert delete -n clialert000005 -g clitest.rg000001 -monitor activity-log alert show -n clialert000005 -g clitest.rg000001 -group show -n clitest.rg000001 -ojson -monitor activity-log alert create -n clialert000002 -g clitest.rg000001 -ojson -monitor activity-log alert show -n clialert000002 -g clitest.rg000001 -ojson -monitor activity-log alert update -n clialert000002 -g clitest.rg000001 -c category=Security and level=Informational -monitor activity-log alert update -n clialert000002 -g clitest.rg000001 -c level=Error and category=Security and resourceGroup=clitest.rg000001 -group show -n clitest.rg000001 -ojson -monitor activity-log alert create -n clialert000002 -g clitest.rg000001 -ojson -monitor activity-log alert show -n clialert000002 -g clitest.rg000001 -ojson -monitor activity-log alert scope add -n clialert000002 -g clitest.rg000001 -s /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg00000 -monitor activity-log alert scope add -n clialert000002 -g clitest.rg000001 -s /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg0000 -monitor activity-log alert scope add -n clialert000002 -g clitest.rg000001 -s /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg0000 --reset -monitor activity-log alert scope add -n clialert000002 -g clitest.rg000001 -s /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg00000 /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg0000 --reset -monitor activity-log alert scope remove -n clialert000002 -g clitest.rg000001 -s /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001 -group show -n clitest.rg000001 -ojson -monitor activity-log alert create -n clialert000002 -g clitest.rg000001 -ojson -monitor activity-log alert show -n clialert000002 -g clitest.rg000001 -ojson -monitor activity-log alert create -n {name} -g {rg} -monitor activity-log alert create -n clialert000002 -g clitest.rg000001 --disable -ojson -group show -n clitest.rg000001 -ojson -monitor action-group create -n cliact000002 -g clitest.rg000001 -ojson -monitor activity-log alert create -n clialert000003 -g clitest.rg000001 -s /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001 --action cliact000002 --condition category=Security and level=Error --disable -ojson -vmss create -g {rg} -n {vmss} --image UbuntuLTS --admin-username testadmin --admin-password TestTest12#$ -vmss show -g {rg} -n {vmss} -monitor autoscale create --resource {vmss_id} --count 3 -monitor autoscale list -g {rg} -monitor autoscale show -g {rg} -n {vmss} -monitor autoscale update -g {rg} -n {vmss} --count 2 -monitor autoscale update -g {rg} -n {vmss} --min-count 1 --count 2 --max-count 4 -monitor autoscale update -g {rg} -n {vmss} --max-count 5 -monitor autoscale delete -g {rg} -n {vmss} -vmss create -g {rg} -n {vmss} --image UbuntuLTS --admin-username testadmin --admin-password TestTest12#$ -vmss show -g {rg} -n {vmss} -monitor autoscale create --resource {vmss_id} --count 3 -monitor autoscale profile create -g {rg} --autoscale-name {vmss} -n {sched} --start 2018-12-24 --end 2018-12-26 --count 5 --timezone "Pacific Standard Time" -monitor autoscale profile list -g {rg} --autoscale-name {vmss} -monitor autoscale profile delete -g {rg} --autoscale-name {vmss} -n {sched} -monitor autoscale profile list -g {rg} --autoscale-name {vmss} -vmss create -g {rg} -n {vmss} --image UbuntuLTS --admin-username testname --admin-password TestTest12#$ -vmss show -g {rg} -n {vmss} -monitor autoscale create --resource {vmss_id} --count 3 -monitor autoscale profile create -g {rg} --autoscale-name {vmss} -n weekend --recurrence week sat sun --count 1 --timezone "Pacific Standard Time" -monitor autoscale profile create -g {rg} --autoscale-name {vmss} -n weekday --recurrence week mo tu we th fr --count 4 --timezone "Pacific Standard Time" -monitor autoscale profile list -g {rg} --autoscale-name {vmss} -monitor autoscale update -g {rg} -n {vmss} --count 4 -monitor autoscale profile list -g {rg} --autoscale-name {vmss} -monitor autoscale profile delete -g {rg} --autoscale-name {vmss} -n weekend -monitor autoscale profile list -g {rg} --autoscale-name {vmss} -monitor autoscale profile delete -g {rg} --autoscale-name {vmss} -n weekday -monitor autoscale profile list -g {rg} --autoscale-name {vmss} -vmss create -g {rg} -n {vmss} --image UbuntuLTS --admin-username testadmin --admin-password TestTest12#$ --instance-count 2 -vmss show -g {rg} -n {vmss} -monitor autoscale create --resource {vmss_id} --min-count 1 --count 3 --max-count 5 -monitor autoscale rule list -g {rg} --autoscale-name {vmss} -monitor autoscale rule create -g {rg} --autoscale-name {vmss} --condition "'Mynamespace.abcd' Percentage CPU > 75 avg 5m where VMName == cliname1 or cliname2" --scale to 5 -monitor autoscale rule create -g {rg} --autoscale-name {vmss} --condition "'Mynamespace.abcd' Percentage CPU > 75 avg 5m where VMName == cliname1 or cliname2" --scale to 5 -monitor autoscale rule create -g {rg} --autoscale-name {vmss} --condition "'Mynamespace.abcd' Percentage CPU > 75 avg 5m where VMName == cliname1 or cliname2" --scale to 5 -monitor autoscale rule list -g {rg} --autoscale-name {vmss} -vmss create -g {rg} -n {vmss} --image UbuntuLTS --admin-username testadmin --admin-password TestTest12#$ -vmss show -g {rg} -n {vmss} -monitor autoscale create --resource {vmss_id} --min-count 1 --count 3 --max-count 5 -monitor autoscale rule list -g {rg} --autoscale-name {vmss} -monitor autoscale rule create -g {rg} --autoscale-name {vmss} --condition "Percentage CPU > 75 avg 5m" --scale to 5 -monitor autoscale rule create -g {rg} --autoscale-name {vmss} --timegrain "avg 5m" --condition "Percentage CPU < 30 avg 10m" --scale in 50% --cooldown 10 -monitor autoscale rule create -g {rg} --autoscale-name {vmss} --timegrain "min 1m" --condition "Percentage CPU < 10 avg 5m" --scale to 1 -monitor autoscale rule list -g {rg} --autoscale-name {vmss} -monitor autoscale rule list -g {rg} --autoscale-name {vmss} --profile-name falseprofile -monitor autoscale rule list -g {rg} --autoscale-name {vmss} -monitor autoscale profile create -g {rg} --autoscale-name {vmss} -n test2 --start 2018-03-01 --end 2018-04-01 --min-count 1 --count 3 --max-count 5 --timezone "Pacific Standard Time" -monitor autoscale profile create -g {rg} --autoscale-name {vmss} -n test3 --start 2018-05-01 --end 2018-06-01 --min-count 1 --count 2 --max-count 5 --timezone "Pacific Standard Time" -monitor autoscale profile create -g {rg} --autoscale-name {vmss} -n test1 --start 2018-01-01 --end 2018-02-01 --min-count 1 --count 2 --max-count 5 --timezone "Pacific Standard Time" --copy-rules default -monitor autoscale rule list -g {rg} --autoscale-name {vmss} --profile-name test1 -monitor autoscale rule list -g {rg} --autoscale-name {vmss} --profile-name test2 -monitor autoscale rule list -g {rg} --autoscale-name {vmss} --profile-name test3 -monitor autoscale rule copy -g {rg} --autoscale-name {vmss} --source-schedule test1 --dest-schedule test2 --index "*" -monitor autoscale rule copy -g {rg} --autoscale-name {vmss} --source-schedule test2 --dest-schedule test3 --index 0 -monitor autoscale rule list -g {rg} --autoscale-name {vmss} --profile-name test2 -monitor autoscale rule list -g {rg} --autoscale-name {vmss} --profile-name test3 -monitor autoscale rule delete -g {rg} --autoscale-name {vmss} --index 2 -monitor autoscale rule list -g {rg} --autoscale-name {vmss} -monitor autoscale rule delete -g {rg} --autoscale-name {vmss} --index "*" -monitor autoscale rule list -g {rg} --autoscale-name {vmss} -extension add -n spring-cloud -spring-cloud create -n {sc} -g {rg} -spring-cloud config-server git set -n {sc} -g {rg} --uri {gitrepo} -spring-cloud app create -n {scapp} -s {sc} -g {rg} -monitor autoscale create -g {rg} --resource {deployment_id} --min-count 1 --count 1 --max-count 3 -monitor autoscale rule list -g {rg} --autoscale-name {sc} -monitor autoscale rule create -g {rg} --autoscale-name {sc} --condition "tomcat.global.request.total.count > 0 avg 3m where AppName == {scapp} and Deployment == default" --scale out 1 -monitor autoscale rule create -g {rg} --autoscale-name {sc} --condition "tomcat.global.request.total.count > 0 avg 3m where AppName == {scapp} and Deployment == default" --scale out 1 -monitor autoscale rule create -g {rg} --autoscale-name {sc} --condition "tomcat.global.request.total.count > 0 avg 3m where AppName == {scapp} and Deployment == default" --scale out 1 -monitor autoscale rule list -g {rg} --autoscale-name {sc} -extension remove -n spring-cloud -network nsg create -n {nsg} -g {rg} -monitor log-analytics workspace create -g {rg} -n {ws} -monitor diagnostic-settings categories list -g {rg} --resource-type Microsoft.Network/networkSecurityGroups --resource {nsg} -monitor diagnostic-settings create -n test01 --resource {nsg} --resource-type Microsoft.Network/networkSecurityGroups --resource-group {rg} --storage-account {sa} --logs '{log_config}' -o json -monitor diagnostic-settings list --resource {nsg} --resource-type Microsoft.Network/networkSecurityGroups --resource-group {rg} -o json -monitor diagnostic-settings show -n test01 --resource {nsg} --resource-type Microsoft.Network/networkSecurityGroups --resource-group {rg} -o json -monitor diagnostic-settings delete -n test01 --resource {nsg} --resource-type Microsoft.Network/networkSecurityGroups --resource-group {rg} -o json -monitor diagnostic-settings list --resource {nsg} --resource-type Microsoft.Network/networkSecurityGroups --resource-group {rg} -o json -monitor diagnostic-settings create -n test02 --resource {nsg} --resource-type Microsoft.Network/networkSecurityGroups --resource-group {rg} --workspace {ws} --export-to-resource-specific --logs '{log_config}' -o json -vm create -g {rg} -n {vm1} --image UbuntuLTS --admin-password TestPassword11!! --admin-username testadmin --authentication-type password -vm create -g {rg} -n {vm2} --image UbuntuLTS --admin-password TestPassword11!! --admin-username testadmin --authentication-type password -vm create -g {rg} -n {vm3} --image UbuntuLTS --admin-password TestPassword11!! --admin-username testadmin --authentication-type password -monitor action-group create -g {rg} -n {ag1} -monitor metrics alert create -g {rg} -n {alert} --scopes {vm1_id} {vm2_id} --action {ag1} --region eastus --condition "avg Percentage CPU > 90" --description "High CPU" -monitor clone --source-resource {vm1_id} --target-resource {vm3_id} -monitor action-group create -g {rg} -n {ag1} -monitor metrics alert create -g {rg} -n {alert} --scopes {sa_id} --region westus --action {ag1} --description "Test" --condition "total transactions > 5 where ResponseType includes Success and ApiName includes GetBlob" --condition "avg SuccessE2ELatency > 250 where ApiName includes GetBlob" -monitor clone --source-resource {sa_id} --target-resource {sa_id_2} -monitor action-group create -g {rg} -n {ag1} -monitor metrics alert create -g {rg} -n {alert} --scopes {sa_id} --region westus --action {ag1} --description "Test" --condition "total transactions > 5 where ResponseType includes Success and ApiName includes GetBlob" --condition "avg SuccessE2ELatency > 250 where ApiName includes GetBlob" -monitor clone --source-resource {sa_id} --target-resource {sa_id_2} --always-clone -network public-ip create -g {rg} -n {ip1} -network public-ip create -g {rg} -n {ip2} -monitor action-group create -g {rg} -n {ag1} -monitor metrics alert create -g {rg} -n {alert} --scopes {ip1_id} --region westus --action {ag1} --description "Test" --condition "total TCPBytesForwardedDDoS > 5" -monitor metrics alert create -g {rg} -n {alert2} --scopes {ip1_id} --region westus --action {ag1} --description "Test2" --condition "max TCPBytesForwardedDDoS > 5" -monitor clone --source-resource {ip1_id} --target-resource {ip2_id} -monitor log-analytics cluster create -g {rg1} -n {new_cluster_name} --sku-capacity {sku_capacity} -monitor log-analytics cluster show -g {rg1} -n {new_cluster_name} -monitor log-analytics cluster update -g {rg1} -n {new_cluster_name} --sku-capacity {sku_capacity} -monitor log-analytics cluster show -g {rg1} -n {new_cluster_name} -monitor log-analytics cluster list -g {rg1} -monitor log-analytics cluster delete -g {rg1} -n {new_cluster_name} -y -monitor log-analytics cluster show -g {rg1} -n {new_cluster_name} -monitor log-analytics cluster update -g {rg} -n {cluster_name} --key-name {key_name} --key-vault-uri {key_vault_uri} --key-version {key_version} -monitor log-analytics cluster wait -g {rg} -n {cluster_name} --updated -monitor log-analytics cluster show -g {rg} -n {cluster_name} -monitor log-analytics workspace create -g {rg} -n {workspace_name} --quota 1 --level 100 --sku CapacityReservation -monitor log-analytics workspace data-export create -g {rg} --workspace-name {workspace_name} -n {data_export_name} --destination {sa_id_1} --enable -t {table_name} -monitor log-analytics workspace data-export create -g {rg} --workspace-name {workspace_name} -n {data_export_name_2} --destination {sa_id_1} --enable -t "SecurityEvent Heartbeat" -monitor log-analytics workspace data-export create -g {rg} --workspace-name {workspace_name} -n {data_export_name_2} --destination {sa_id_1} --enable -t {table_name} -monitor log-analytics workspace data-export create -g {rg} --workspace-name {workspace_name} -n {data_export_name_2} --destination {sa_id_1} --enable -t ABC -monitor log-analytics workspace data-export create -g {rg} --workspace-name {workspace_name} -n {data_export_name_2} --destination {sa_id_1} --enable -t AppPerformanceCounters -monitor log-analytics workspace data-export show -g {rg} --workspace-name {workspace_name} -n {data_export_name} -monitor log-analytics workspace data-export list -g {rg} --workspace-name {workspace_name} -eventhubs namespace create --resource-group {rg} --name {namespacename} -eventhubs eventhub create --resource-group {rg} --namespace-name {namespacename} --name {eventhubname} -monitor log-analytics workspace data-export update -g {rg} --workspace-name {workspace_name} -n {data_export_name} --destination {namespace_id} --enable true -t Usage Alert -eventhubs eventhub list -g {rg} --namespace-name {namespacename} -monitor log-analytics workspace data-export delete -g {rg} --workspace-name {workspace_name} -n {data_export_name} -y -monitor log-analytics workspace data-export create -g {rg} --workspace-name {workspace_name} -n {data_export_name} --destination {eventhub_id} --enable false -t {table_name} -monitor log-analytics workspace data-export delete -g {rg} --workspace-name {workspace_name} -n {data_export_name} -y -monitor log-analytics workspace data-export show -g {rg} --workspace-name {workspace_name} -n {data_export_name} -monitor log-analytics workspace create -g {rg} -n {name} --tags clitest=myron -monitor log-analytics workspace update -g {rg} -n {name} --retention-time 100 -monitor log-analytics workspace show -g {rg} -n {name} -monitor log-analytics workspace list-usages -g {rg} -n {name} -monitor log-analytics workspace list -g {rg} -monitor log-analytics workspace get-shared-keys -g {rg} -n {name} -monitor log-analytics workspace get-schema -g {rg} -n {name} -monitor log-analytics workspace pack enable -g {rg} --workspace-name {name} -n AzureSecurityOfThings -monitor log-analytics workspace pack list -g {rg} --workspace-name {name} -monitor log-analytics workspace pack disable -g {rg} --workspace-name {name} -n AzureSecurityOfThings -monitor log-analytics workspace pack list -g {rg} --workspace-name {name} -monitor log-analytics workspace delete -g {rg} -n {name} -y -monitor log-analytics workspace linked-service create -g {rg} --workspace-name {workspace_name} -n {linked_service_name} --write-access-resource-id {cluster_resource_id_1} -monitor log-analytics workspace linked-service update -g {rg} --workspace-name {workspace_name} -n {linked_service_name} --write-access-resource-id {cluster_resource_id_2} -monitor log-analytics workspace linked-service show -g {rg} --workspace-name {workspace_name} -n {linked_service_name} -monitor log-analytics workspace linked-service list -g {rg} --workspace-name {workspace_name} -monitor log-analytics workspace linked-service delete -g {rg} --workspace-name {workspace_name} -n {linked_service_name} -y -monitor log-analytics workspace linked-service list -g {rg} --workspace-name {workspace_name} -monitor log-analytics workspace create -g {rg} -n {name} --tags clitest=myron -monitor log-analytics workspace linked-storage create --type CustomLogs -g {rg} -n {name} --storage-accounts {sa_1} -monitor log-analytics workspace linked-storage add --type CustomLogs -g {rg} -n {name} --storage-accounts {sa_2} {sa_id_3} -monitor log-analytics workspace linked-storage remove --type CustomLogs -g {rg} -n {name} --storage-accounts {sa_1} -monitor log-analytics workspace linked-storage show --type CustomLogs -g {rg} -n {name} -monitor log-analytics workspace create -g {rg} -n {name_2} --tags clitest=myron -monitor log-analytics workspace linked-storage create --type AzureWatson -g {rg} -n {name} --storage-accounts {sa_1} -monitor log-analytics workspace linked-storage list -g {rg} -n {name} -monitor log-analytics workspace linked-storage delete --type AzureWatson -g {rg} -n {name} -y -monitor log-analytics workspace linked-storage list -g {rg} -n {name} -monitor log-analytics workspace create -g {rg} -n {name} --tags clitest=myron --query-access Disabled --ingestion-access Disabled -monitor log-analytics workspace update -g {rg} -n {name} --query-access Disabled --ingestion-access Enabled -monitor log-analytics workspace show -g {rg} -n {name} -monitor log-analytics workspace create -g {rg} -n {name} --quota 1 --level 100 --sku CapacityReservation -monitor log-analytics workspace update -g {rg} -n {name} --quota 2 --level 200 -monitor log-analytics workspace table list -g {rg} --workspace-name {name} -monitor log-analytics workspace table update -g {rg} --workspace-name {name} -n {table_name} --retention-time 30 --debug -monitor log-analytics workspace list-deleted-workspaces -g {rg} -monitor log-analytics workspace delete -g {rg} -n {name} -y -monitor log-analytics workspace list-deleted-workspaces -g {rg} -monitor log-analytics workspace recover -g {rg} -n {name} -monitor log-analytics workspace show -g {rg} -n {name} -monitor log-analytics workspace list-deleted-workspaces -g {rg} -monitor log-analytics workspace delete -g {rg} -n {name} --force -y -monitor log-analytics workspace show -g {rg} -n {name} -monitor log-analytics workspace create -g {rg} -n {workspace_name} --tags clitest=myron -monitor log-analytics workspace saved-search create -g {rg} --workspace-name {workspace_name} -n {saved_search_name} --category {category} --display-name {display_name} -q "{query}" --fa {function_alias} --fp "{function_param}" --tags a=b c=d -monitor log-analytics workspace saved-search show -g {rg} --workspace-name {workspace_name} -n {saved_search_name} -monitor log-analytics workspace saved-search list -g {rg} --workspace-name {workspace_name} -monitor log-analytics workspace saved-search update -g {rg} --workspace-name {workspace_name} -n {saved_search_name} --category {category_2} --display-name {display_name_2} -q "{query_2}" --fa {function_alias_2} --fp "{function_param_2}" --tags a=c f=e -monitor log-analytics workspace saved-search delete -g {rg} --workspace-name {workspace_name} -n {saved_search_name} -y -monitor log-analytics workspace saved-search show -g {rg} --workspace-name {workspace_name} -n {saved_search_name} -monitor log-profiles create --categories 'Write' --enabled false --days 1095 --location southcentralus --locations westus southcentralus --name {name} --storage-account-id {storage} -monitor log-profiles delete -n {name} -monitor action-group create -g {rg} -n {ag1} -monitor metrics alert create -g {rg} -n {alert} --scopes {vm_id} --region westus --action {ag1} --condition "avg Percentage CPU > dynamic low 2 of 4 since 2020-11-01T16:00:00.000Z" --description "High CPU" -monitor action-group create -g {rg} -n {ag1} -monitor action-group create -g {rg} -n {ag2} -monitor metrics alert create -g {rg} -n {alert} --scopes {vm_id} {vm_id_2} --action {ag1} --region westus --condition "avg Percentage CPU > dynamic low 2 of 4 since 2020-11-01T16:00:00.000Z" --description "High CPU" -monitor metrics alert update -g {rg} -n {alert} --severity 3 --description "High Or Low CPU" --add-action ag2 test=best --remove-action ag1 --remove-conditions cond0 --evaluation-frequency 5m --window-size 15m --tags foo=boo --auto-mitigate --add-condition "avg Percentage CPU >< dynamic medium 1 of 6 since 2020-10-01T10:23:00.000Z" -monitor metrics alert list -g {rg} -monitor metrics alert show -g {rg} -n {alert} -monitor metrics alert delete -g {rg} -n {alert} -monitor metrics alert list -g {rg} -monitor action-group create -g {rg} -n {ag1} -monitor metrics alert dimension create -n ResponseType --op include -v Success -monitor metrics alert dimension create -n ApiName -v GetBlob -monitor metrics alert condition create -t static --aggregation total --metric transactions --dimension ""_where_ ResponseType includes Success"" ""_where_ ApiName includes GetBlob"" --op GreaterThan --threshold 5 -monitor metrics alert condition create -t dynamic --aggregation Average --metric "Percentage Cpu" --op GreaterOrLessThan --num-periods 6 --num-violations 1 --since 2020-11-02T12:11:11Z --sensitivity medium -monitor metrics alert create -g {rg} -n {alert} --scopes {vm_id} {vm_id_2} --action {ag1} --region westus --description "High CPU" --condition "avg 'Percentage Cpu' >< dynamic medium 1 of 6 since 2020-11-02T12:11:11+00:00" -monitor action-group create -g {rg} -n {ag1} -monitor metrics alert create -g {rg} -n {alert2} --scopes {sub_id} --target-resource-type {resource_type} --target-resource-region {resource_region} --action {ag1} --condition "avg Percentage CPU > 90" --description "High CPU" -monitor metrics alert create -g {rg} -n {alert} --scopes {rg_id_1} {rg_id_2} --target-resource-type {resource_type} --target-resource-region {resource_region} --action {ag1} --condition "avg Percentage CPU > 90" --description "High CPU" -sql db create -g cli_test_metric_alert_v1_2000001 --server clitestservermatricalertA000002 --name cliautomationdb01 -monitor action-group create -g {rg} -n {ag1} -monitor metrics alert create -g {rg} -n {alert} --scopes {sql_db_1_id} --action {ag1} --condition "avg cpu_percent > 90" --description "High CPU" -monitor action-group create -g {rg} -n {ag1} -monitor metrics alert create -g {rg} -n {alert} --scopes {vm_id} {vm_id_2} --region westus --action {ag1} --condition "avg Percentage CPU > 90" --description "High CPU" -monitor action-group create -g {rg} -n {ag1} -monitor metrics alert create -g {rg} -n {alert} --scopes {vm_id} --region westus --action {ag1} --condition "avg Percentage CPU > 90" --description "High CPU" -monitor metrics alert create -g {rg} -n {alert} --scopes {sa_id} --region westus --description "Test" --condition "avg MyNs.UnemittedMetric >= 10 with skipMetricValidation" -network application-gateway create -g {rg} -n ag1 --public-ip-address ip1 -network application-gateway show -g {rg} -n ag1 -monitor metrics alert create -g {rg} -n {alert} --scopes {ag_id} --region westus --description "Test" --condition "avg UnhealthyHostCount>= 1 where BackendSettingsPool includes address-pool-dcc-blue~backendHttpSettings" -monitor action-group create -g {rg} -n {ag1} -monitor action-group create -g {rg} -n {ag2} -monitor metrics alert create -g {rg} -n {alert} --scopes {sa_id} --action {ag1} --region westus --description "Test" --condition "total transactions > 5 where ResponseType includes Success and ApiName includes GetBlob" --condition "avg SuccessE2ELatency > 250 where ApiName includes GetBlob" -monitor metrics alert update -g {rg} -n {alert} --severity 3 --description "alt desc" --add-action ag2 test=best --remove-action ag1 --remove-conditions cond0 --evaluation-frequency 5m --window-size 15m --tags foo=boo --auto-mitigate -monitor metrics alert update -g {rg} -n {alert} --enabled false -monitor metrics alert update -g {rg} -n {alert} --add-action ag2 test=best2 -monitor metrics alert list -g {rg} -monitor metrics alert show -g {rg} -n {alert} -monitor metrics alert delete -g {rg} -n {alert} -monitor metrics alert list -g {rg} -monitor metrics alert create -g {rg} -n {alert} --scopes {sa_id} --region westus --action {ag1} --description "Test2" --condition "avg SuccessE2ELatency > 250 where ApiName includes GetBlob:" -appservice plan create -g {rg} -n {plan} -webapp create -g {rg} -n {app} -p plan1 -monitor metrics alert create -g {rg} -n {alert}2 --scopes {app_id} --region "{app_location}" --action {ag1} --description "Test *" --condition "total Http4xx > 10 where Instance includes *" -storage account show -n {sa} -monitor metrics alert create -n {alert_name} -g {rg} --scopes {storage_account_id} --region {storage_location} --condition "count account.MS-ERRORCODE-SU001 > 4" --description "Cloud_lumico" -monitor metrics alert create -n {alert_name} -g {rg} --scopes {storage_account_id} --region {storage_location} --condition "count account.MS-ERRORCODE|,-SU001 > 4" --description "Cloud_lumico" -storage account show -n {sa} -g {rg} -monitor metrics list-namespaces --resource {sa_id} -monitor metrics list-definitions --resource {sa_id} --namespace {namespace} -monitor metrics list --resource {sa_id} --namespace {namespace} --metrics Ingress Egress --start-time 2018-01-01T00:00:00Z --end-time 2999-01-01T00:00:00Z -monitor metrics list --resource {sa_id} --metrics Ingress Egress --start-time 2018-01-01 00:00:00 +00:00 --offset 5000d -monitor metrics list --resource {sa_id} --metrics Ingress Egress --end-time 2025-01-01 00:00:00 +00:00 --offset 5000d -extension add -n application-insights -storage account show -n {sa} -g {rg} --query id -otsv -monitor diagnostic-settings subscription list -monitor diagnostic-settings subscription delete --name clitestfbjom3xrwnhzo -y -monitor diagnostic-settings subscription create -l southcentralus --name {name} --storage-account {storage} --logs '{log_config}' -monitor diagnostic-settings subscription show --name {name} -monitor diagnostic-settings subscription list -monitor log-analytics workspace create -n {ws} -g {rg} --query id -otsv -monitor diagnostic-settings subscription update --name {name} --workspace {ws_id} -monitor diagnostic-settings subscription delete --name {name} -y -network public-ip create -g {rg} -n {ip_addr} --location {location} --zone {zone} --sku Standard -network public-ip prefix create --length 29 --location {location} --name {ip_prefix} --resource-group {rg} --zone {zone} -network nat gateway create --resource-group {rg} --public-ip-prefixes {ip_prefix} --name {name} --location {location} --public-ip-addresses {ip_addr} --idle-timeout {idle_timeout} --zone {zone} -network nat gateway update -g {rg} --name {name} --idle-timeout {idle_timeout_updated} -network nat gateway list -g {rg} -network nat gateway show --resource-group {rg} --name {name} -network nat gateway delete --resource-group {rg} --name {name} -network nat gateway list -g {rg} -network nat gateway create --resource-group {rg} --name {name} --location {location} --idle-timeout {idle_timeout} --zone {zone} -network vnet create -n cli-vnet-backup000006 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n default --vnet-name cli-vnet-backup000006 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --vnet cli-vnet-backup000006 --subnet default --file-path cli-vol-000004 --usage-threshold 100 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_account_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled True -netappfiles volume backup create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --backup-name cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles account backup list -g {rg} -a cli-acc-000002 -netappfiles volume delete -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles account backup delete -g {rg} -a cli-acc-000002 --backup-name cli-backup-000005 -y -netappfiles account backup list -g {rg} -a cli-acc-000002 -network vnet create -n cli-vnet-backup000006 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n default --vnet-name cli-vnet-backup000006 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --vnet cli-vnet-backup000006 --subnet default --file-path cli-vol-000004 --usage-threshold 100 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_account_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled True -netappfiles volume backup create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --backup-name cli-backup-000005 -netappfiles account backup show -g {rg} -a cli-acc-000002 --backup-name cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_account_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled False -network vnet create -n cli-vnet-backup000006 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n default --vnet-name cli-vnet-backup000006 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --vnet cli-vnet-backup000006 --subnet default --file-path cli-vol-000004 --usage-threshold 100 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_account_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled True -netappfiles volume backup create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --backup-name cli-backup-000005 -netappfiles account backup list -g {rg} -a cli-acc-000002 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_account_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled False -netappfiles account create -g {rg} -a {acc_name} -l {loc} --encryption {encryption} -netappfiles account create -g {rg} -a {acc2_name} -l {loc} -netappfiles account update -g {rg} -a {acc2_name} --encryption {encryption} -netappfiles account create -g {rg} -a {acc_name} -l {loc} --tags Tag1=Value1 -netappfiles account ad add -g {rg} -n {acc_name} --username aduser --password aduser --smb-server-name SMBSERVER --dns '1.2.3.4' --domain westcentralus --ad-name {ad_name} --kdc-ip {kdc_ip} --ldap-signing {ldap} --allow-local-ldap-users {ldap_users} -netappfiles account ad list -g {rg} -n {acc_name} -netappfiles account ad remove -g {rg} -n {acc_name} --active-directory a64a2544-864d-b984-f982-6488915418f8 -netappfiles account show -g {rg} -n {acc_name} -netappfiles account create --resource-group {rg} --account-name '{acc_name}' --location {loc} --tags {tags} -netappfiles account list --resource-group {rg} -netappfiles account delete --resource-group {rg} --account-name '{acc_name}' -netappfiles account list --resource-group {rg} -netappfiles account create -g {rg} -a {acc_name} -l {loc} --tags {tags} -netappfiles account list --resource-group {rg} -netappfiles account delete --resource-group {rg} -a {acc_name} -netappfiles account list --resource-group {rg} -netappfiles account create -g {rg} -a {acc_name} -l {loc} -netappfiles account show --resource-group {rg} -a {acc_name} -netappfiles account show --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_account_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002 -netappfiles account create -g {rg} -a {acc1_name} -l {loc} --tags Tag1=Value1 -netappfiles account create -g {rg} -a {acc2_name} -l {loc} --tags Tag1=Value1 -netappfiles account list -g {rg} -netappfiles account delete -g {rg} -a {acc1_name} -netappfiles account delete -g {rg} -a {acc2_name} -netappfiles account list -g {rg} -netappfiles account create -g {rg} -a '{acc_name}' -l {loc} -netappfiles account update -g {rg} -a {acc_name} --tags {tags} -network vnet create -n cli-vnet-backup000006 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n default --vnet-name cli-vnet-backup000006 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --vnet cli-vnet-backup000006 --subnet default --file-path cli-vol-000004 --usage-threshold 100 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled True -netappfiles volume backup create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --backup-name cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup list -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles volume backup create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --backup-name cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup list -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles volume backup delete -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --backup-name cli-backup-000005 -netappfiles volume backup list -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled False -network vnet create -n cli-vnet-backup000006 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n default --vnet-name cli-vnet-backup000006 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --vnet cli-vnet-backup000006 --subnet default --file-path cli-vol-000004 --usage-threshold 100 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled True -netappfiles volume backup create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --backup-name cli-backup-000005 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled False -network vnet create -n cli-vnet-backup000006 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n default --vnet-name cli-vnet-backup000006 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --vnet cli-vnet-backup000006 --subnet default --file-path cli-vol-000004 --usage-threshold 100 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled True -netappfiles volume backup create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --backup-name cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/capacityPools/cli-pool-000003/volumes/cli-vol-000004/backups/cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled False -network vnet create -n cli-vnet-backup000006 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n default --vnet-name cli-vnet-backup000006 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --vnet cli-vnet-backup000006 --subnet default --file-path cli-vol-000004 --usage-threshold 100 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled True -netappfiles volume backup create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --backup-name cli-backup-000005 -netappfiles volume backup status -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup status -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -network vnet create -n cli-vnet-backup000006 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n default --vnet-name cli-vnet-backup000006 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --vnet cli-vnet-backup000006 --subnet default --file-path cli-vol-000004 --usage-threshold 100 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled True -netappfiles volume backup create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --backup-name cli-backup-000005 -netappfiles volume backup list -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --backup-name cli-backup-000007 -netappfiles volume backup list -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000007 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled False -network vnet create -n cli-vnet-backup000006 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n default --vnet-name cli-vnet-backup000006 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --vnet cli-vnet-backup000006 --subnet default --file-path cli-vol-000004 --usage-threshold 100 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled True -netappfiles volume backup create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --backup-name cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --backup-name cli-backup-000005 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000007 -l southcentralusstage --vnet cli-vnet-backup000006 --subnet default --file-path cli-vol-000007 --usage-threshold 100 --backup-id f315e11e-8a23-08f4-8bad-fe9045b64165 -netappfiles volume show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled False -network vnet create -n cli-vnet-backup000006 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n default --vnet-name cli-vnet-backup000006 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --vnet cli-vnet-backup000006 --subnet default --file-path cli-vol-000004 --usage-threshold 100 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled True -netappfiles volume backup create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --backup-name cli-backup-000005 -netappfiles volume backup update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --backup-name cli-backup-000005 --label label -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --backup-name cli-backup-000005 -netappfiles volume backup show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -b cli-backup-000005 -netappfiles vault list -g {rg} -a cli-acc-000002 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --vault-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/vaults/cbsvault --backup-enabled False -netappfiles account create -g {rg} -a 'cli-acc-000002' -l eastus2euap -netappfiles account backup-policy create -g {rg} -a cli-acc-000002 --backup-policy-name cli-ba-pol-000003 --location eastus2euap --daily-backups 1 --weekly-backups 2 --monthly-backups 3 --enabled True --tags Tag1=Value1 Tag2=Value2 -netappfiles account backup-policy list -g {rg} -a 'cli-acc-000002' -netappfiles account backup-policy delete -g {rg} -a cli-acc-000002 --backup-policy-name cli-ba-pol-000003 -netappfiles account backup-policy create -g {rg} -a cli-acc-000002 -b cli-ba-pol-000003 -l eastus2euap -d 1 -w 2 -m 3 -e True --tags Tag1=Value1 Tag2=Value2 -netappfiles account backup-policy delete -g {rg} -a cli-acc-000002 --backup-policy-name cli-ba-pol-000003 -netappfiles account backup-policy list -g {rg} -a 'cli-acc-000002' -netappfiles account create -g {rg} -a 'cli-acc-000002' -l eastus2euap -netappfiles account backup-policy create -g {rg} -a cli-acc-000002 --backup-policy-name cli-ba-pol-000003 -l eastus2euap --daily-backups 1 --enabled true -netappfiles account backup-policy show -g {rg} -a cli-acc-000002 --backup-policy-name cli-ba-pol-000003 -netappfiles account backup-policy show --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_backup_policy_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/backupPolicies/cli-ba-pol-000003 -netappfiles account create -g {rg} -a 'cli-acc-000002' -l eastus2euap -netappfiles account backup-policy create -g {rg} -a cli-acc-000002 --backup-policy-name cli000003 -l eastus2euap --daily-backups 1 --enabled true -netappfiles account backup-policy create -g {rg} -a cli-acc-000002 --backup-policy-name cli000004 -l eastus2euap --daily-backups 1 --enabled true -netappfiles account backup-policy create -g {rg} -a cli-acc-000002 --backup-policy-name cli000005 -l eastus2euap --daily-backups 1 --enabled true -netappfiles account backup-policy list -g {rg} -a 'cli-acc-000002' -netappfiles account backup-policy delete -g {rg} -a cli-acc-000002 --backup-policy-name cli000003 -netappfiles account backup-policy delete -g {rg} -a cli-acc-000002 --backup-policy-name cli000004 -netappfiles account backup-policy delete -g {rg} -a cli-acc-000002 --backup-policy-name cli000005 -netappfiles account backup-policy list -g {rg} -a 'cli-acc-000002' -netappfiles account create -g {rg} -a 'cli-acc-000002' -l eastus2euap -netappfiles account backup-policy create -g {rg} -a cli-acc-000002 --backup-policy-name cli-ba-pol-000003 -l eastus2euap -d 1 -w 2 -m 3 -e True --tags Tag1=Value1 -netappfiles account backup-policy update -g {rg} -a cli-acc-000002 --backup-policy-name cli-ba-pol-000003 -l eastus2euap -d 4 -w 5 -m 6 -e False --tags Tag1=Value2 -netappfiles account backup-policy show -g {rg} -a cli-acc-000002 --backup-policy-name cli-ba-pol-000003 -netappfiles account create --resource-group {rg} --account-name 'cli-acc-000002' -l southcentralusstage -netappfiles pool create --resource-group {rg} --account-name cli-acc-000002 --pool-name cli-pool-000003 -l southcentralusstage --service-level Premium --size 4 --tags Tag1=Value1 Tag2=Value2 -netappfiles pool list --resource-group {rg} --account-name cli-acc-000002 -netappfiles pool delete --resource-group {rg} --account-name 'cli-acc-000002' --pool-name 'cli-pool-000003' -netappfiles pool list --resource-group {rg} --account-name cli-acc-000002 -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 --tags Tag1=Value1 Tag2=Value2 -netappfiles pool delete --resource-group {rg} -a cli-acc-000002 -p cli-pool-000003 -netappfiles pool list --resource-group {rg} -a cli-acc-000002 -netappfiles account create --resource-group {rg} --account-name 'cli-acc-000002' -l southcentralusstage -netappfiles pool create --resource-group {rg} --account-name cli-acc-000002 --pool-name cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size a -netappfiles account create --resource-group {rg} --account-name 'cli-acc-000002' -l southcentralusstage -netappfiles pool create --resource-group {rg} --account-name cli-acc-000002 --pool-name cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 3 -netappfiles account create -g {rg} -a 'cli000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli000002 -p cli000003 -l southcentralusstage --service-level Premium --size 4 -netappfiles pool show --resource-group {rg} -a cli000002 -p cli000003 -netappfiles pool show --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_pool_000001/providers/Microsoft.NetApp/netAppAccounts/cli000002/capacityPools/cli000003 -netappfiles account create -g {rg} -a 'cli000002' -l southcentralusstage -netappfiles pool create -g {rg} -a 'cli000002' -p 'cli000003' -l southcentralusstage --service-level Premium --size 4 --tags Tag1=Value1 -netappfiles pool create -g {rg} -a 'cli000002' -p 'cli000004' -l southcentralusstage --service-level Premium --size 4 --tags Tag1=Value1 -netappfiles pool list -g {rg} -a 'cli000002' -netappfiles pool delete -g {rg} -a cli000002 -p cli000003 -netappfiles pool delete -g {rg} -a cli000002 -p cli000004 -netappfiles pool list --resource-group {rg} -a 'cli000002' -netappfiles account create -g {rg} -a 'cli000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli000002 -p cli000003 -l southcentralusstage --service-level Premium --size 4 --encryption-type Double -netappfiles pool show --resource-group {rg} -a cli000002 -p cli000003 -netappfiles account create -g {rg} -a {acc_name} -l {loc} -netappfiles pool create -g {rg} -a {acc_name} -p {pool_name} -l {loc} {pool_default} -netappfiles pool update -g {rg} -a {acc_name} -p {pool_name} --tags {tag} --qos-type {qos_type} -network vnet create -n cli-vnet-lefr-02 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n cli-subnet-lefr-02 --vnet-name cli-vnet-lefr-02 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-lefr-02 --subnet cli-subnet-lefr-02 -netappfiles snapshot create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -s cli-sn-000005 -l southcentralusstage -netappfiles snapshot list -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles snapshot delete -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -s cli-sn-000005 -netappfiles snapshot list -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -network vnet create -n cli-vnet-lefr-02 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n cli-subnet-lefr-02 --vnet-name cli-vnet-lefr-02 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-lefr-02 --subnet cli-subnet-lefr-02 -netappfiles snapshot create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -s cli-sn-000005 -l southcentralusstage -netappfiles snapshot list -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles snapshot show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -s cli-sn-000005 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-sn-2000006 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-sn-2000006 --vnet cli-vnet-lefr-02 --subnet cli-subnet-lefr-02 --snapshot-id b8aeafdd-bbb0-52ae-4b8d-298543d58259 -network vnet create -n cli-vnet-lefr-02 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n cli-subnet-lefr-02 --vnet-name cli-vnet-lefr-02 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-lefr-02 --subnet cli-subnet-lefr-02 -netappfiles snapshot create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -s cli-sn-000005 -l southcentralusstage -netappfiles snapshot show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -s cli-sn-000005 -netappfiles snapshot show --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_snapshot_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/capacityPools/cli-pool-000003/volumes/cli-vol-000004/snapshots/cli-sn-000005 -network vnet create -n cli-vnet-lefr-02 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n cli-subnet-lefr-02 --vnet-name cli-vnet-lefr-02 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-lefr-02 --subnet cli-subnet-lefr-02 -netappfiles snapshot create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -s cli-sn-000005 -l southcentralusstage -netappfiles snapshot create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -s cli-sn-000006 -l southcentralusstage -netappfiles snapshot list -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -network vnet create -n cli-vnet-lefr-02 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n cli-subnet-lefr-02 --vnet-name cli-vnet-lefr-02 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-lefr-02 --subnet cli-subnet-lefr-02 -netappfiles snapshot create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -s cli-sn-000005 -l southcentralusstage -netappfiles snapshot list -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles snapshot show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -s cli-sn-000005 -netappfiles volume revert -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -s cd282b44-b94b-f128-85a6-e61b1d9499be -netappfiles snapshot list -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -network vnet create -n cli-vnet-lefr-02 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n default --vnet-name cli-vnet-lefr-02 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --vnet cli-vnet-lefr-02 --subnet default --file-path cli-vol-000004 --service-level 'Premium' --usage-threshold 100 -netappfiles snapshot policy create -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000005 -l southcentralusstage -u 1 --hourly-minute 10 --enabled True -netappfiles snapshot policy show -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000005 -netappfiles volume update -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --snapshot-policy-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_snapshot_policy_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/snapshotPolicies/cli-sn-pol-000005 -netappfiles volume show -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles snapshot policy create -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000003 --location southcentralusstage --hourly-snapshots 1 --daily-snapshots 2 --weekly-snapshots 3 --monthly-snapshots 4 --hourly-minute 10 --daily-minute 20 --weekly-minute 30 --monthly-minute 40 --daily-hour 2 --weekly-hour 3 --monthly-hour 4 --weekly-day Monday --monthly-days 1,3,20 --enabled True --tags Tag1=Value1 -netappfiles snapshot policy list -g {rg} -a 'cli-acc-000002' -netappfiles snapshot policy delete -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000003 -netappfiles snapshot policy create -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000003 -l southcentralusstage -u 1 -d 2 -w 3 -m 4 --hourly-minute 10 --daily-minute 20 --weekly-minute 30 --monthly-minute 40 --daily-hour 2 --weekly-hour 3 --monthly-hour 4 --weekly-day Monday --monthly-days 1,3,20 --enabled True --tags Tag1=Value1 -netappfiles snapshot policy delete -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000003 -netappfiles snapshot policy list -g {rg} -a 'cli-acc-000002' -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles snapshot policy create -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000003 -l southcentralusstage -u 1 --hourly-minute 10 -netappfiles snapshot policy show -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000003 -netappfiles snapshot policy show --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_snapshot_policy_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/snapshotPolicies/cli-sn-pol-000003 -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles snapshot policy create -g {rg} -a cli-acc-000002 --snapshot-policy-name cli000003 -l southcentralusstage -u 1 --hourly-minute 10 -netappfiles snapshot policy create -g {rg} -a cli-acc-000002 --snapshot-policy-name cli000004 -l southcentralusstage -u 1 --hourly-minute 10 -netappfiles snapshot policy create -g {rg} -a cli-acc-000002 --snapshot-policy-name cli000005 -l southcentralusstage -u 1 --hourly-minute 10 -netappfiles snapshot policy list -g {rg} -a 'cli-acc-000002' -netappfiles snapshot policy delete -g {rg} -a cli-acc-000002 --snapshot-policy-name cli000003 -netappfiles snapshot policy delete -g {rg} -a cli-acc-000002 --snapshot-policy-name cli000004 -netappfiles snapshot policy delete -g {rg} -a cli-acc-000002 --snapshot-policy-name cli000005 -netappfiles snapshot policy list -g {rg} -a 'cli-acc-000002' -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles snapshot policy create -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000003 -l southcentralusstage -u 1 --hourly-minute 10 --enabled True -netappfiles snapshot policy show -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000003 -network vnet create -n cli-vnet-lefr-02 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n default --vnet-name cli-vnet-lefr-02 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000004 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000004 -v cli-vol-000005 -l southcentralusstage --vnet cli-vnet-lefr-02 --subnet default --file-path cli-vol-000005 --service-level 'Premium' --usage-threshold 100 --snapshot-policy-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_snapshot_policy_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/snapshotPolicies/cli-sn-pol-000003 -netappfiles snapshot policy volumes -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000003 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000004 -v cli-vol-000006 -l southcentralusstage --vnet cli-vnet-lefr-02 --subnet default --file-path cli-vol-000006 --service-level 'Premium' --usage-threshold 100 --snapshot-policy-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_snapshot_policy_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/snapshotPolicies/cli-sn-pol-000003 -netappfiles snapshot policy volumes -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000003 -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles snapshot policy create -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000003 -l southcentralusstage -u 1 -d 2 -w 3 -m 4 --hourly-minute 10 --daily-minute 20 --weekly-minute 30 --monthly-minute 40 --daily-hour 2 --weekly-hour 3 --monthly-hour 4 --weekly-day Monday --monthly-days 2,5,30 --enabled True --tags Tag1=Value1 -netappfiles snapshot policy update -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000003 -l southcentralusstage -u 5 -d 6 -w 7 -m 8 --hourly-minute 50 --daily-minute 0 --weekly-minute 10 --monthly-minute 20 --daily-hour 6 --weekly-hour 7 --monthly-hour 8 --weekly-day Wednesday --monthly-days 1,2,20 --enabled False -netappfiles snapshot policy show -g {rg} -a cli-acc-000002 --snapshot-policy-name cli-sn-pol-000003 -network vnet create -n {vnet} -g {rg} -l {vnet_loc} --address-prefix 10.5.0.0/16 -network vnet subnet create -n {subnet} --vnet-name {vnet} --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a {acc_name} -l {loc} -netappfiles pool create -g {rg} -a {acc_name} -p {pool_name} -l {loc} --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a {acc_name} -p {pool_name} -v {vol_name} -l {loc} --vnet {vnet} --subnet {subnet} --file-path {vol_name} --usage-threshold 100 -netappfiles vault list -g {rg} -a {acc_name} -network vnet create -n cli-vnet-000006 --resource-group {rg} -l southcentralus --address-prefix 10.0.0.0/16 -network vnet subnet create -n cli-subnet-000007 -g {rg} --vnet-name cli-vnet-000006 --address-prefixes '10.0.0.0/24' --delegations 'Microsoft.Netapp/volumes' -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create --resource-group {rg} --account-name cli-acc-000002 --pool-name cli-pool-000003 --volume-name cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-000006 --subnet cli-subnet-000007 --rule-index 1 --allowed-clients 0.0.0.0/0 -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000005 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume pool-change -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -d /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_volume_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/capacityPools/cli-pool-000005 -netappfiles volume show -g {rg} -a cli-acc-000002 -p cli-pool-000005 -v cli-vol-000004 -network vnet create -n cli-vnet-000005 --resource-group {rg} -l southcentralus --address-prefix 10.0.0.0/16 -network vnet subnet create -n cli-subnet-000006 -g {rg} --vnet-name cli-vnet-000005 --address-prefixes '10.0.0.0/24' --delegations 'Microsoft.Netapp/volumes' -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 --tags Tag1=Value1 Tag2=Value2 -netappfiles volume create --resource-group {rg} --account-name cli-acc-000002 --pool-name cli-pool-000003 --volume-name cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-000005 --subnet cli-subnet-000006 --protocol-types NFSv3 --tags Tag1=Value1 Tag2=Value2 --rule-index 1 --allowed-clients 0.0.0.0/0 -netappfiles volume list --resource-group {rg} --account-name cli-acc-000002 --pool-name cli-pool-000003 -netappfiles volume delete --resource-group {rg} --account-name cli-acc-000002 --pool-name cli-pool-000003 --volume-name cli-vol-000004 -netappfiles volume list --resource-group {rg} -a cli-acc-000002 -p cli-pool-000003 -network vnet create -n cli-vnet-000005 --resource-group {rg} -l southcentralus --address-prefix 10.0.0.0/16 -network vnet subnet create -n cli-subnet-000006 -g {rg} --vnet-name cli-vnet-000005 --address-prefixes '10.0.0.0/24' --delegations 'Microsoft.Netapp/volumes' -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-000005 --subnet cli-subnet-000006 --protocol-types NFSv4.1 --tags Tag2=Value1 --rule-index 2 --unix-read-only False --unix-read-write True --cifs False -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-000005 --subnet cli-subnet-000006 --protocol-types NFSv4.1 --tags Tag2=Value1 --unix-read-only False --unix-read-write True --cifs False --allowed-clients 1.2.3.0/24 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-000005 --subnet cli-subnet-000006 --protocol-types NFSv4.1 --tags Tag2=Value1 --rule-index 2 --unix-read-only False --unix-read-write True --cifs False --allowed-clients 1.2.3.0/24 -account show -group create -n cli-rg-subnet000007 --subscription 00000000-0000-0000-0000-000000000000 -l southcentralus -network vnet create -n cli-vnet-000005 --resource-group cli-rg-subnet000007 -l southcentralus --address-prefix 10.0.0.0/16 -network vnet subnet create -n cli-subnet-000006 -g cli-rg-subnet000007 --vnet-name cli-vnet-000005 --address-prefixes '10.0.0.0/24' --delegations 'Microsoft.Netapp/volumes' -netappfiles account create -g {rg} -a cli-acc-000002 -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create --resource-group {rg} --account-name cli-acc-000002 --pool-name cli-pool-000003 --volume-name cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-000005 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli-rg-subnet000007/providers/Microsoft.Network/virtualNetworks/cli-vnet-000005/subnets/cli-subnet-000006 -netappfiles volume delete --resource-group {rg} --account-name cli-acc-000002 --pool-name cli-pool-000003 --volume-name cli-vol-000004 -group delete --yes -n cli-rg-subnet000007 -network vnet create -n cli-vnet-000005 --resource-group {rg} -l southcentralus --address-prefix 10.0.0.0/16 -network vnet subnet create -n cli-subnet-000006 -g {rg} --vnet-name cli-vnet-000005 --address-prefixes '10.0.0.0/24' --delegations 'Microsoft.Netapp/volumes' -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create --resource-group {rg} --account-name cli-acc-000002 --pool-name cli-pool-000003 --volume-name cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-000005 --subnet cli-subnet-000006 --rule-index 1 --allowed-clients 0.0.0.0/0 -netappfiles volume export-policy add -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --allowed-clients '1.2.3.0/24' --rule-index 3 --unix-read-only true --unix-read-write false --cifs false --nfsv3 true --nfsv41 false -netappfiles volume export-policy add -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --allowed-clients '1.2.4.0/24' --rule-index 2 --unix-read-only true --unix-read-write false --cifs true --nfsv3 true --nfsv41 false -netappfiles volume export-policy list -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles volume export-policy remove -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --rule-index 3 -netappfiles volume show --resource-group {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -network vnet create -n cli-vnet-000005 --resource-group {rg} -l southcentralus --address-prefix 10.0.0.0/16 -network vnet subnet create -n cli-subnet-000006 -g {rg} --vnet-name cli-vnet-000005 --address-prefixes '10.0.0.0/24' --delegations 'Microsoft.Netapp/volumes' -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 --tags Tag2=Value1 -netappfiles volume create --resource-group {rg} --account-name cli-acc-000002 --pool-name cli-pool-000003 --volume-name cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-000005 --subnet cli-subnet-000006 --protocol-types NFSv4.1 --tags Tag2=Value1 --rule-index 1 --allowed-clients 0.0.0.0/0 -netappfiles volume show --resource-group {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles volume show --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_volume_000001/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000002/capacityPools/cli-pool-000003/volumes/cli-vol-000004 -network vnet create -n cli-vnet-000006 --resource-group {rg} -l southcentralus --address-prefix 10.0.0.0/16 -network vnet subnet create -n cli-subnet-000007 -g {rg} --vnet-name cli-vnet-000006 --address-prefixes '10.0.0.0/24' --delegations 'Microsoft.Netapp/volumes' -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 --tags Tag1=Value1 -netappfiles volume create --resource-group {rg} --account-name cli-acc-000002 --pool-name cli-pool-000003 --volume-name cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-000006 --subnet cli-subnet-000007 --tags Tag1=Value1 --rule-index 1 --allowed-clients 0.0.0.0/0 -netappfiles volume create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000005 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000005 --vnet cli-vnet-000006 --subnet cli-subnet-000007 --tags Tag1=Value1 -netappfiles volume list --resource-group {rg} -a 'cli-acc-000002' -p 'cli-pool-000003' -netappfiles volume delete -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 -netappfiles volume list -g {rg} -a 'cli-acc-000002' -p 'cli-pool-000003' -network vnet create -n cli-vnet-000005 --resource-group {rg} -l southcentralus --address-prefix 10.0.0.0/16 -network vnet subnet create -n cli-subnet-000006 -g {rg} --vnet-name cli-vnet-000005 --address-prefixes '10.0.0.0/24' --delegations 'Microsoft.Netapp/volumes' -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Standard' --size 8 -netappfiles volume create --resource-group {rg} --account-name cli-acc-000002 --pool-name cli-pool-000003 --volume-name cli-vol-000004 -l southcentralusstage --service-level 'Standard' --usage-threshold 200 --file-path cli-vol-000004 --vnet cli-vnet-000005 --subnet cli-subnet-000006 --rule-index 1 --allowed-clients 0.0.0.0/0 -netappfiles volume export-policy add -g {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --allowed-clients '1.2.3.0/24' --rule-index 3 --unix-read-only true --unix-read-write false --cifs false --nfsv3 true --nfsv41 false -network vnet create -n cli-vnet-000009 --resource-group {rg} -l southcentralus --address-prefix 10.0.0.0/16 -network vnet subnet create -n cli-subnet-000010 -g {rg} --vnet-name cli-vnet-000009 --address-prefixes '10.0.0.0/24' --delegations 'Microsoft.Netapp/volumes' -netappfiles account create -g {rg} -a 'cli-acc-000003' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000003 -p cli-pool-000005 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create --resource-group {rg} --account-name cli-acc-000003 --pool-name cli-pool-000005 --volume-name cli-vol-000007 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000007 --vnet cli-vnet-000009 --subnet cli-subnet-000010 --rule-index 1 --allowed-clients 0.0.0.0/0 -account show -network vnet create -n cli-vnet-000011 --resource-group cli_netappfiles_test_volume2_000002 -l eastus2euap --address-prefix 10.1.0.0/16 -network vnet subnet create -n cli-subnet-000012 -g cli_netappfiles_test_volume2_000002 --vnet-name cli-vnet-000011 --address-prefixes '10.1.0.0/24' --delegations 'Microsoft.Netapp/volumes' -netappfiles account create -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -l eastus2euap -netappfiles pool create -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -l eastus2euap --service-level 'Premium' --size 4 -netappfiles volume create --resource-group cli_netappfiles_test_volume2_000002 --account-name cli-acc-000004 --pool-name cli-pool-000006 --volume-name cli-vol-000008 -l eastus2euap --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000008 --vnet cli-vnet-000011 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_volume2_000002/providers/Microsoft.Network/virtualNetworks/cli-vnet-000011/subnets/cli-subnet-000012 --volume-type DataProtection --endpoint-type dst --replication-schedule _10minutely --remote-volume-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_volume2_000002/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000003/capacityPools/cli-pool-000005/volumes/cli-vol-000007 -netappfiles volume replication approve -g {rg} -a cli-acc-000003 -p cli-pool-000005 -v cli-vol-000007 --remote-volume-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_netappfiles_test_volume2_000002/providers/Microsoft.NetApp/netAppAccounts/cli-acc-000004/capacityPools/cli-pool-000006/volumes/cli-vol-000008 -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication suspend -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication resume -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication suspend -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -f True -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication status -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -netappfiles volume replication remove -g cli_netappfiles_test_volume2_000002 -a cli-acc-000004 -p cli-pool-000006 -v cli-vol-000008 -network vnet create -n cli-vnet-000005 --resource-group {rg} -l southcentralus --address-prefix 10.0.0.0/16 -network vnet subnet create -n cli-subnet-000006 -g {rg} --vnet-name cli-vnet-000005 --address-prefixes '10.0.0.0/24' --delegations 'Microsoft.Netapp/volumes' -netappfiles account create -g {rg} -a 'cli-acc-000002' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000002 -p cli-pool-000003 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create --resource-group {rg} --account-name cli-acc-000002 --pool-name cli-pool-000003 --volume-name cli-vol-000004 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000004 --vnet cli-vnet-000005 --subnet cli-subnet-000006 --rule-index 1 --allowed-clients 0.0.0.0/0 -netappfiles volume update --resource-group {rg} -a cli-acc-000002 -p cli-pool-000003 -v cli-vol-000004 --tags Tag1=Value2 --usage-threshold 200 -network vnet create -n cli-vnet-000002 --resource-group {rg} -l southcentralus --address-prefix 10.0.0.0/16 -network vnet subnet create -n cli-subnet-000003 -g {rg} --vnet-name cli-vnet-000002 --address-prefixes '10.0.0.0/24' --delegations 'Microsoft.Netapp/volumes' -netappfiles account create -g {rg} -a 'cli-acc-000004' -l southcentralusstage -netappfiles pool create -g {rg} -a cli-acc-000004 -p cli-pool-000005 -l southcentralusstage --service-level 'Premium' --size 4 -netappfiles volume create --resource-group {rg} --account-name cli-acc-000004 --pool-name cli-pool-000005 --volume-name cli-vol-000006 -l southcentralusstage --service-level 'Premium' --usage-threshold 100 --file-path cli-vol-000006 --vnet cli-vnet-000002 --subnet cli-subnet-000003 --smb-encryption False --smb-continuously-avl False --encryption-key-source Microsoft.NetApp --ldap-enabled False --is-def-quota-enabled False --avs-data-store Disabled -network dns zone import -n {zone} -g {rg} --file-name "{path}" -network dns record-set list -g {rg} -z {zone} -network dns zone export -g {rg} -n {zone} --file-name "{export}" -network dns zone delete -g {rg} -n {zone} -y -network dns zone import -n {zone} -g {rg} --file-name "{export}" -network dns record-set list -g {rg} -z {zone} -network dns zone import -n {zone} -g {rg} --file-name "{path}" -network dns record-set list -g {rg} -z {zone} -network dns zone export -g {rg} -n {zone} --file-name "{export}" -network dns zone delete -g {rg} -n {zone} -y -network dns zone import -n {zone} -g {rg} --file-name "{export}" -network dns record-set list -g {rg} -z {zone} -network dns zone import -n {zone} -g {rg} --file-name "{path}" -network dns record-set list -g {rg} -z {zone} -network dns zone export -g {rg} -n {zone} --file-name "{export}" -network dns zone delete -g {rg} -n {zone} -y -network dns zone import -n {zone} -g {rg} --file-name "{export}" -network dns record-set list -g {rg} -z {zone} -network dns zone import -n {zone} -g {rg} --file-name "{path}" -network dns record-set list -g {rg} -z {zone} -network dns zone export -g {rg} -n {zone} --file-name "{export}" -network dns zone delete -g {rg} -n {zone} -y -network dns zone import -n {zone} -g {rg} --file-name "{export}" -network dns record-set list -g {rg} -z {zone} -network dns zone import -n {zone} -g {rg} --file-name "{path}" -network dns record-set list -g {rg} -z {zone} -network dns zone export -g {rg} -n {zone} --file-name "{export}" -network dns zone delete -g {rg} -n {zone} -y -network dns zone import -n {zone} -g {rg} --file-name "{export}" -network dns record-set list -g {rg} -z {zone} -network dns zone import -n {zone} -g {rg} --file-name "{path}" -network dns record-set list -g {rg} -z {zone} -network dns zone export -g {rg} -n {zone} --file-name "{export}" -network dns zone delete -g {rg} -n {zone} -y -network dns zone import -n {zone} -g {rg} --file-name "{export}" -network dns record-set list -g {rg} -z {zone} -network dns zone import -n {zone} -g {rg} --file-name "{path}" -network dns record-set list -g {rg} -z {zone} -network dns zone export -g {rg} -n {zone} --file-name "{export}" -network dns zone delete -g {rg} -n {zone} -y -network dns zone import -n {zone} -g {rg} --file-name "{export}" -network dns record-set list -g {rg} -z {zone} -network dns zone import -n {zone} -g {rg} --file-name "{path}" -network dns record-set list -g {rg} -z {zone} -network dns zone export -g {rg} -n {zone} --file-name "{export}" -network dns zone delete -g {rg} -n {zone} -y -network dns zone import -n {zone} -g {rg} --file-name "{export}" -network dns record-set list -g {rg} -z {zone} -network dns zone import -n {zone} -g {rg} --file-name "{path}" -network dns record-set list -g {rg} -z {zone} -network dns zone export -g {rg} -n {zone} --file-name "{export}" -network dns zone delete -g {rg} -n {zone} -y -network dns zone import -n {zone} -g {rg} --file-name "{export}" -network dns record-set list -g {rg} -z {zone} -network dns zone list -network dns zone create -n {zone} -g {rg} -network dns zone list -g {rg} -network dns zone show -n {zone} -g {rg} -network dns record-set a create -n myrsa -g {rg} --zone-name {zone} -network dns record-set a add-record -g {rg} --zone-name {zone} --record-set-name myrsa --ipv4-address 10.0.0.10 -network dns record-set a add-record -g {rg} --zone-name {zone} --record-set-name myrsa --ipv4-address 10.0.0.10 -network dns record-set a add-record -g {rg} --zone-name {zone} --record-set-name myrsaalt --ipv4-address 10.0.0.10 -network dns record-set aaaa create -n myrsaaaa -g {rg} --zone-name {zone} -network dns record-set aaaa add-record -g {rg} --zone-name {zone} --record-set-name myrsaaaa --ipv6-address 2001:db8:0:1:1:1:1:1 -network dns record-set aaaa add-record -g {rg} --zone-name {zone} --record-set-name myrsaaaa --ipv6-address 2001:db8:0:1:1:1:1:1 -network dns record-set aaaa add-record -g {rg} --zone-name {zone} --record-set-name myrsaaaaalt --ipv6-address 2001:db8:0:1:1:1:1:1 -network dns record-set caa create -n myrscaa -g {rg} --zone-name {zone} -network dns record-set caa add-record -g {rg} --zone-name {zone} --record-set-name myrscaa --flags 0 --tag foo --value "my value" -network dns record-set caa add-record -g {rg} --zone-name {zone} --record-set-name myrscaa --flags 0 --tag foo --value "my value" -network dns record-set caa add-record -g {rg} --zone-name {zone} --record-set-name myrscaaalt --flags 0 --tag foo --value "my value" -network dns record-set cname create -n myrscname -g {rg} --zone-name {zone} -network dns record-set cname set-record -g {rg} --zone-name {zone} --record-set-name myrscname --cname mycname -network dns record-set cname set-record -g {rg} --zone-name {zone} --record-set-name myrscname --cname mycname -network dns record-set cname set-record -g {rg} --zone-name {zone} --record-set-name myrscnamealt --cname mycname -network dns record-set mx create -n myrsmx -g {rg} --zone-name {zone} -network dns record-set mx add-record -g {rg} --zone-name {zone} --record-set-name myrsmx --exchange 12 --preference 13 -network dns record-set mx add-record -g {rg} --zone-name {zone} --record-set-name myrsmx --exchange 12 --preference 13 -network dns record-set mx add-record -g {rg} --zone-name {zone} --record-set-name myrsmxalt --exchange 12 --preference 13 -network dns record-set ns create -n myrsns -g {rg} --zone-name {zone} -network dns record-set ns add-record -g {rg} --zone-name {zone} --record-set-name myrsns --nsdname foobar.com -network dns record-set ns add-record -g {rg} --zone-name {zone} --record-set-name myrsns --nsdname foobar.com -network dns record-set ns add-record -g {rg} --zone-name {zone} --record-set-name myrsnsalt --nsdname foobar.com -network dns record-set ptr create -n myrsptr -g {rg} --zone-name {zone} -network dns record-set ptr add-record -g {rg} --zone-name {zone} --record-set-name myrsptr --ptrdname foobar.com -network dns record-set ptr add-record -g {rg} --zone-name {zone} --record-set-name myrsptr --ptrdname foobar.com -network dns record-set ptr add-record -g {rg} --zone-name {zone} --record-set-name myrsptralt --ptrdname foobar.com -network dns record-set srv create -n myrssrv -g {rg} --zone-name {zone} -network dns record-set srv add-record -g {rg} --zone-name {zone} --record-set-name myrssrv --port 1234 --priority 1 --target target.com --weight 50 -network dns record-set srv add-record -g {rg} --zone-name {zone} --record-set-name myrssrv --port 1234 --priority 1 --target target.com --weight 50 -network dns record-set srv add-record -g {rg} --zone-name {zone} --record-set-name myrssrvalt --port 1234 --priority 1 --target target.com --weight 50 -network dns record-set txt create -n myrstxt -g {rg} --zone-name {zone} -network dns record-set txt add-record -g {rg} --zone-name {zone} --record-set-name myrstxt --value some_text -network dns record-set txt add-record -g {rg} --zone-name {zone} --record-set-name myrstxt --value some_text -network dns record-set txt add-record -g {rg} --zone-name {zone} --record-set-name myrstxtalt --value some_text -network dns record-set a add-record -g {rg} --zone-name {zone} --record-set-name myrsa --ipv4-address 10.0.0.11 -network dns record-set soa update -g {rg} --zone-name {zone} --email foo.com --expire-time 30 --minimum-ttl 20 --refresh-time 60 --retry-time 90 --serial-number 123 -network dns record-set txt add-record -g {rg} -z {zone} -n longtxt -v 01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 -network dns zone show -n {zone} -g {rg} -network dns record-set a show -n myrsa -g {rg} --zone-name {zone} -network dns record-set list -g {rg} -z {zone} -network dns record-set txt list -g {rg} -z {zone} -network dns record-set a remove-record -g {rg} --zone-name {zone} --record-set-name myrsa --ipv4-address 10.0.0.10 -network dns record-set aaaa remove-record -g {rg} --zone-name {zone} --record-set-name myrsaaaa --ipv6-address 2001:db8:0:1:1:1:1:1 -network dns record-set caa remove-record -g {rg} --zone-name {zone} --record-set-name myrscaa --flags 0 --tag foo --value "my value" -network dns record-set cname remove-record -g {rg} --zone-name {zone} --record-set-name myrscname --cname mycname -network dns record-set mx remove-record -g {rg} --zone-name {zone} --record-set-name myrsmx --exchange 12 --preference 13 -network dns record-set ns remove-record -g {rg} --zone-name {zone} --record-set-name myrsns --nsdname foobar.com -network dns record-set ptr remove-record -g {rg} --zone-name {zone} --record-set-name myrsptr --ptrdname foobar.com -network dns record-set srv remove-record -g {rg} --zone-name {zone} --record-set-name myrssrv --port 1234 --priority 1 --target target.com --weight 50 -network dns record-set txt remove-record -g {rg} --zone-name {zone} --record-set-name myrstxt --value some_text -network dns record-set a show -n myrsa -g {rg} --zone-name {zone} -network dns record-set a remove-record -g {rg} --zone-name {zone} --record-set-name myrsa --ipv4-address 10.0.0.11 -network dns record-set a show -n myrsa -g {rg} --zone-name {zone} -network dns record-set a delete -n myrsa -g {rg} --zone-name {zone} -y -network dns record-set cname delete -n myrscname -g {rg} --zone-name {zone} -y -network dns zone delete -g {rg} -n {zone} -y -network dns zone create -g {rg} -n {zone} -network traffic-manager profile create -g {rg} -n {tm} --unique-dns-name {tm_dns} --routing-method geographic -network dns record-set a create -g {rg} -z {zone} -n a1 --target-resource {tm_id} -network dns record-set a update -g {rg} -z {zone} -n a1 --target-resource "" -network dns zone create -n {parent_zone_name} -g {rg} -network dns zone show -n {parent_zone_name} -g {rg} -network dns zone create -n {child_zone_name} -g {rg} -p {parent_zone_name} -network dns zone show -n {parent_zone_name} -g {rg} -network dns record-set ns show -n {record_set_name} -g {rg} --zone-name {parent_zone_name} -network dns zone delete -g {rg} -n {parent_zone_name} -y -network dns zone delete -g {rg} -n {child_zone_name} -y -network dns zone list -network dns zone create -n {zone} -g {rg} -network dns zone list -g {rg} -network dns zone show -n {zone} -g {rg} -network dns record-set a add-record -g {rg} --zone-name {zone} --record-set-name myrsa --ipv4-address 10.0.0.10 --if-none-match -network dns record-set aaaa add-record -g {rg} --zone-name {zone} --record-set-name myrsaaaa --ipv6-address 2001:db8:0:1:1:1:1:1 --if-none-match -network dns record-set caa add-record -g {rg} --zone-name {zone} --record-set-name myrscaa --flags 0 --tag foo --value "my value" --if-none-match -network dns record-set cname set-record -g {rg} --zone-name {zone} --record-set-name myrscname --cname mycname --if-none-match -network dns record-set mx add-record -g {rg} --zone-name {zone} --record-set-name myrsmx --exchange 12 --preference 13 --if-none-match -network dns record-set ns add-record -g {rg} --zone-name {zone} --record-set-name myrsns --nsdname foobar.com --if-none-match -network dns record-set ptr add-record -g {rg} --zone-name {zone} --record-set-name myrsptr --ptrdname foobar.com --if-none-match -network dns record-set srv add-record -g {rg} --zone-name {zone} --record-set-name myrssrv --port 1234 --priority 1 --target target.com --weight 50 --if-none-match -network dns record-set txt add-record -g {rg} --zone-name {zone} --record-set-name myrstxt --value some_text --if-none-match -network dns record-set a add-record -g {rg} --zone-name {zone} --record-set-name myrsa --ipv4-address 10.0.0.11 -network dns record-set soa update -g {rg} --zone-name {zone} --email foo.com --expire-time 30 --minimum-ttl 20 --refresh-time 60 --retry-time 90 --serial-number 123 -network dns record-set txt add-record -g {rg} -z {zone} -n longtxt -v 01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 -network dns zone show -n {zone} -g {rg} -network dns record-set a show -n myrsa -g {rg} --zone-name {zone} -network dns record-set list -g {rg} -z {zone} -network dns record-set txt list -g {rg} -z {zone} -network dns record-set a remove-record -g {rg} --zone-name {zone} --record-set-name myrsa --ipv4-address 10.0.0.10 -network dns record-set aaaa remove-record -g {rg} --zone-name {zone} --record-set-name myrsaaaa --ipv6-address 2001:db8:0:1:1:1:1:1 -network dns record-set caa remove-record -g {rg} --zone-name {zone} --record-set-name myrscaa --flags 0 --tag foo --value "my value" -network dns record-set cname remove-record -g {rg} --zone-name {zone} --record-set-name myrscname --cname mycname -network dns record-set mx remove-record -g {rg} --zone-name {zone} --record-set-name myrsmx --exchange 12 --preference 13 -network dns record-set ns remove-record -g {rg} --zone-name {zone} --record-set-name myrsns --nsdname foobar.com -network dns record-set ptr remove-record -g {rg} --zone-name {zone} --record-set-name myrsptr --ptrdname foobar.com -network dns record-set srv remove-record -g {rg} --zone-name {zone} --record-set-name myrssrv --port 1234 --priority 1 --target target.com --weight 50 -network dns record-set txt remove-record -g {rg} --zone-name {zone} --record-set-name myrstxt --value some_text -network dns record-set a show -n myrsa -g {rg} --zone-name {zone} -network dns record-set a remove-record -g {rg} --zone-name {zone} --record-set-name myrsa --ipv4-address 10.0.0.11 -network dns record-set a show -n myrsa -g {rg} --zone-name {zone} -network dns record-set a delete -n myrsa -g {rg} --zone-name {zone} -y -network dns record-set cname delete -n myrscname -g {rg} --zone-name {zone} -y -network dns zone delete -g {rg} -n {zone} -y -network asg list -network asg create -g {rg} -n {asg} --tags foo=doo -network asg update -g {rg} -n {asg} --tags foo=bar -network asg list -network asg show -g {rg} -n {asg} -network asg delete -g {rg} -n {asg} -network asg list -network lb create -g {rg} -l {location} -n {lb} --sku {sku} --public-ip-address {ip} -network lb show -g {rg} -n {lb} -network public-ip show -g {rg} -n {ip} -network vnet create -n {vnet} -g {rg} -l {loc} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -storage account private-link-resource list --account-name {sa} -g {rg} -storage account show -n {sa} -g {rg} -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} -l {loc} --connection-name {pe_connection} --private-connection-resource-id {sa_id} --group-ids blob -storage account show -n {sa} -g {rg} -storage account private-endpoint-connection show --account-name {sa} -g {rg} --name {sa_pec_name} -network private-endpoint show -g {rg} -n {pe} -network private-dns zone create -n {zone_name1} -g {rg} -network private-dns zone create -n {zone_name2} -g {rg} -network private-endpoint dns-zone-group create --endpoint-name {pe} -g {rg} -n {private_dns_zone_group_name} --zone-name {private_zone_name1} --private-dns-zone {zone_name1} -network private-endpoint dns-zone-group add --endpoint-name {pe} -g {rg} -n {private_dns_zone_group_name} --zone-name {private_zone_name2} --private-dns-zone {zone_name2} -network private-endpoint dns-zone-group show --endpoint-name {pe} -g {rg} -n {private_dns_zone_group_name} -network private-endpoint dns-zone-group list --endpoint-name {pe} -g {rg} -network private-endpoint dns-zone-group remove --endpoint-name {pe} -g {rg} -n {private_dns_zone_group_name} --zone-name {private_zone_name2} -network private-endpoint dns-zone-group show --endpoint-name {pe} -g {rg} -n {private_dns_zone_group_name} -network private-endpoint dns-zone-group delete --endpoint-name {pe} -g {rg} -n {private_dns_zone_group_name} -network vnet create -g {rg} -n {vnet} --subnet-name {subnet1} -l {location} -network lb create -g {rg} -l {location} -n {lb} --public-ip-address {ip} --sku {sku} -network vnet subnet update -g {rg} -n {subnet1} --vnet-name {vnet} --disable-private-link-service-network-policies -network vnet subnet create -g {rg} -n {subnet2} --vnet-name {vnet} --address-prefixes 10.0.2.0/24 -network vnet subnet update -g {rg} -n {subnet2} --vnet-name {vnet} --disable-private-endpoint-network-policies -network private-link-service create -g {rg} -n {lks1} --vnet-name {vnet} --subnet {subnet1} --lb-name {lb} --lb-frontend-ip-configs LoadBalancerFrontEnd -l {location} -network private-endpoint list-types -l {location} -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet2} --private-connection-resource-id {pls_id} --connection-name tttt -l {location} -network private-endpoint list -network private-endpoint list -g {rg} -network private-link-service show -g {rg} -n {lks1} -network private-link-service connection update -g {rg} -n {pe_connect} --service-name {lks1} --connection-status Rejected --action-required "need action" -network private-endpoint show -g {rg} -n {pe} -network private-link-service connection delete -g {rg} -n {pe_connect} --service-name {lks1} -network private-link-service show -g {rg} -n {lks1} -network private-endpoint delete -g {rg} -n {pe} -network vnet create -g {rg} -n {vnet} --subnet-name {subnet1} -l {location} -network lb create -g {rg} -l {location} -n {lb} --public-ip-address {ip} --sku {sku} -network vnet subnet update -g {rg} -n {subnet1} --vnet-name {vnet} --disable-private-link-service-network-policies -network vnet subnet create -g {rg} -n {subnet2} --vnet-name {vnet} --address-prefixes 10.0.2.0/24 -network vnet subnet update -g {rg} -n {subnet2} --vnet-name {vnet} --disable-private-endpoint-network-policies -network private-link-service create -g {rg} -n {lks1} --vnet-name {vnet} --subnet {subnet1} --lb-name {lb} --lb-frontend-ip-configs LoadBalancerFrontEnd -l {location} --enable-proxy-protocol -network private-link-service update -g {rg} -n {lks1} --visibility {sub1} {sub1} --auto-approval {sub1} {sub1} --enable-proxy-protocol False -network private-link-service list -g {rg} -network private-link-service show -g {rg} -n {lks1} -network private-link-service delete -g {rg} -n {lks1} -network vnet subnet update -g {rg} -n {subnet1} --vnet-name {vnet} --disable-private-link-service-network-policies false -network lb create -g {rg} -l {location} -n lb --vnet-name vnet --subnet subnet --sku Standard -network lb frontend-ip create -g {rg} --lb-name lb -n LoadBalancerFrontEnd2 -z 1 2 3 --vnet-name vnet --subnet subnet -network lb create -g {rg} -l {location} -n {lb} --public-ip-zone {zone} --public-ip-address {ip} -network lb show -g {rg} -n {lb} -network public-ip show -g {rg} -n {ip} -network lb create -g {rg} -l {location} -n {lb} --frontend-ip-zone {zone} --public-ip-address "" --vnet-name vnet1 --subnet subnet1 -network lb show -g {rg} -n {lb} -network lb frontend-ip create -g {rg} --lb-name {lb} -n LoadBalancerFrontEnd2 -z {zone} --vnet-name vnet1 --subnet subnet1 -network lb create -g {rg} -n {lb2} -l westcentralus --sku Standard -network public-ip create -n {ip2} -g {rg} -l westcentralus --sku Standard --allocation-method Static --version IPv6 -network lb frontend-ip create --lb-name {lb2} -n ipv6 -g {rg} --private-ip-address-version IPv6 --public-ip-address {ip2} -network lb create -g {rg} -n {lb3} --sku Standard -l westcentralus --private-ip-address-version IPv6 -network public-ip create -g {rg} -l {location} -n {ip1} -network public-ip show -g {rg} -n {ip1} -network public-ip create -g {rg} -l {location} -n {ip2} --sku {standard_sku} --tags foo=doo -network public-ip show -g {rg} -n {ip2} -network public-ip create -g {rg} -l {location} -n {ip3} --sku {standard_sku} --tier {global_tier} -network public-ip show -g {rg} -n {ip3} -network public-ip create -g {rg} -l {location} -n {ip4} --tier {global_tier} -network custom-ip prefix create -g {rg} -n {prefix} --cidr 40.40.40.0/24 -network custom-ip prefix update -g {rg} -n {prefix} --tags foo=doo -network custom-ip prefix list -g {rg} -network custom-ip prefix show -g {rg} -n {prefix} -network custom-ip prefix update -g {rg} -n {prefix} --state commission -network public-ip prefix create -g {rg} -n {prefix} --length 30 -network public-ip prefix update -g {rg} -n {prefix} --tags foo=doo -network public-ip prefix list -g {rg} -network public-ip prefix delete -g {rg} -n {prefix} -network public-ip prefix list -g {rg} -network public-ip prefix create -g {rg} -n {prefix} --length 30 -network public-ip create -g {rg} -n {pip} --public-ip-prefix {prefix} --sku Standard -network public-ip prefix create -g {rg} -n {prefix_name_ipv4} --length 30 -network public-ip prefix create -g {rg} -n {prefix_name_ipv6} --length 127 --version IPv6 -network public-ip prefix create -g {rg} -n {prefix_name_ipv6} --length 127 --version IPv5 -network public-ip prefix create -g {rg} -n {prefix_name_ipv4} --length 28 -network public-ip create -g {rg} -n {pip} --public-ip-prefix {prefix_name_ipv4} --sku Standard --ip-address 20.44.7010 -network public-ip prefix create -g {rg} -n {prefix} --length 30 --zone 1 2 3 -network list-usages --location westus -network application-gateway create -g {rg} -n ag1 --no-wait -network application-gateway wait -g {rg} -n ag1 --exists -network application-gateway update -g {rg} -n ag1 --no-wait -network application-gateway update -g {rg} -n ag1 --no-wait --capacity 3 --sku standard_small --tags foo=doo -network application-gateway wait -g {rg} -n ag1 --updated -network application-gateway list --resource-group {rg} -network application-gateway show --resource-group {rg} --name ag1 -network application-gateway show-backend-health -g {rg} -n ag1 -network application-gateway stop --resource-group {rg} -n ag1 -network application-gateway start --resource-group {rg} -n ag1 -network application-gateway delete --resource-group {rg} -n ag1 -network application-gateway list --resource-group {rg} -network public-ip create -g {rg} -n pubip1 --sku Standard -network application-gateway create -g {rg} -n ag1 --sku WAF_v2 --public-ip-address pubip1 -network application-gateway list --resource-group {rg} -network application-gateway show --resource-group {rg} --name ag1 -network application-gateway show-backend-health -g {rg} -n ag1 --host-name-from-http-settings --path /test --timeout 100 --http-settings appGatewayBackendHttpSettings --address-pool appGatewayBackendPool -network public-ip create -g {rg} -n {ip} --sku Standard -network application-gateway create -g {rg} -n {appgw} --sku Standard_v2 --enable-private-link --private-ip-address 10.0.0.17 --public-ip-address {ip} -network application-gateway show -g {rg} -n {appgw} -network application-gateway delete -g {rg} -n {appgw} -identity create -g {rg} -n {access_identity} -keyvault set-policy -g {rg} -n {kv} --object-id {access_identity_principal} --secret-permissions get list set -keyvault certificate get-default-policy -keyvault certificate create --vault-name {kv} --name {cert} --policy "{keyvault_cert_policy}" -keyvault certificate show --vault-name {kv} --name {cert} -network public-ip create -g {rg} -n {ip} --sku Standard -network application-gateway create -g {rg} -n {gw} --sku Standard_v2 --public-ip-address {ip} --identity {access_identity} --frontend-port 1000 --key-vault-secret-id {secret_id} --ssl-certificate-name {ssl_cert_name} -identity create -g {rg} -n {one_off_identity} -identity create -g {rg} -n {access_identity} -keyvault set-policy -g {rg} -n {kv} --object-id {access_identity_principal} --secret-permissions get list set -keyvault certificate get-default-policy -keyvault certificate create --vault-name {kv} --name {cert} --policy "{keyvault_cert_policy}" -network public-ip create -g {rg} -n {ip} --sku Standard -network application-gateway create -g {rg} -n {gw} --sku Standard_v2 --public-ip-address {ip} --trusted-client-cert name={cname} data="{cert}" -network application-gateway client-cert add -g {rg} --gateway-name {gw} --name {cname1} --data "{cert1}" -network application-gateway client-cert list -g {rg} --gateway-name {gw} -network application-gateway client-cert update -g {rg} --gateway-name {gw} --name {cname1} --data "{cert}" -network application-gateway client-cert show -g {rg} --gateway-name {gw} --name {cname} -network application-gateway client-cert show -g {rg} --gateway-name {gw} --name {cname1} -network application-gateway client-cert remove -g {rg} --gateway-name {gw} --name {cname1} -network public-ip create -g {rg} -n {ip} --sku Standard -network application-gateway create -g {rg} -n {gw} --sku Standard_v2 --public-ip-address {ip} --ssl-profile name={name} client-auth-configuration=True min-protocol-version=TLSv1_0 cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 policy-type=Custom -network application-gateway ssl-profile add -g {rg} --gateway-name {gw} --name {name1} --client-auth-configuration True --min-protocol-version TLSv1_0 --cipher-suites TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 --policy-type Custom -network application-gateway ssl-profile update -g {rg} --gateway-name {gw} --name {name1} --client-auth-configuration False -network application-gateway ssl-profile show -g {rg} --gateway-name {gw} --name {name1} -network application-gateway ssl-profile list -g {rg} --gateway-name {gw} -network application-gateway ssl-profile remove -g {rg} --gateway-name {gw} --name {name} -network public-ip create -g {rg} -n {ip} --sku Standard -z 1 3 -network application-gateway create -g {rg} -n {gateway} --sku Standard_v2 --min-capacity 2 --max-capacity 4 --zones 1 3 --public-ip-address {ip} --no-wait -network application-gateway wait -g {rg} -n {gateway} --exists -network application-gateway show -g {rg} -n {gateway} -network application-gateway create -g {rg} -n {gateway} --no-wait -network application-gateway wait -g {rg} -n {gateway} --exists -network application-gateway auth-cert create -g {rg} --gateway-name {gateway} -n {cert1} --cert-file "{cert1_file}" --no-wait -network application-gateway auth-cert create -g {rg} --gateway-name {gateway} -n {cert2} --cert-file "{cert2_file}" --no-wait -network application-gateway http-settings create -g {rg} --gateway-name {gateway} -n {settings} --auth-certs {cert1} {cert2} --no-wait --port 443 --protocol https -network application-gateway http-settings update -g {rg} --gateway-name {gateway} -n {settings} --auth-certs {cert2} {cert1} --no-wait -network application-gateway show -g {rg} -n {gateway} -network public-ip create -g {rg} -n {ip1} --sku Standard -network application-gateway create -g {rg} -n {gateway} --sku Standard_v2 --public-ip-address {ip1} -network application-gateway wait -g {rg} -n {gateway} --exists -network application-gateway root-cert create -g {rg} --gateway-name {gateway} -n {cert1} --cert-file "{cert1_file}" -network application-gateway root-cert create -g {rg} --gateway-name {gateway} -n {cert2} --cert-file "{cert2_file}" -network application-gateway http-settings create -g {rg} --gateway-name {gateway} -n {settings} --root-certs {cert1} {cert2} --host-name-from-backend-pool true --no-wait --port 443 --protocol https -network application-gateway http-settings update -g {rg} --gateway-name {gateway} -n {settings} --root-certs {cert2} {cert1} --no-wait -network application-gateway show -g {rg} -n {gateway} -network application-gateway http-settings update -g {rg} --gateway-name {gateway} -n {settings} --no-wait -network application-gateway create -g {rg} -n {gateway} --no-wait -network application-gateway wait -g {rg} -n {gateway} --exists -network application-gateway redirect-config create --gateway-name {gateway} -g {rg} -n {name} -t permanent --include-query-string --include-path false --target-listener appGatewayHttpListener --no-wait -network application-gateway redirect-config show --gateway-name {gateway} -g {rg} -n {name} -network application-gateway redirect-config update --gateway-name {gateway} -g {rg} -n {name} --include-path --include-query-string false --no-wait -network application-gateway redirect-config show --gateway-name {gateway} -g {rg} -n {name} -network vnet create -g {rg} -n vnet2 --subnet-name subnet1 -network application-gateway create -g {rg} -n ag2 --subnet {subnet_id} --subnet-address-prefix 10.0.0.0/28 --tags foo=doo -network application-gateway create -g {rg} -n ag2 --subnet {subnet_id} --servers 172.0.0.1 www.mydomain.com -network application-gateway create -g {rg} -n ag1 --no-wait --connection-draining-timeout 180 -network application-gateway create -g {rg} -n ag2 --no-wait --tags a=b c=d -network application-gateway wait -g {rg} -n ag1 --created --interval 120 -network application-gateway wait -g {rg} -n ag2 --created --interval 120 -network application-gateway show -g {rg} -n ag1 -network application-gateway show -g {rg} -n ag2 -network application-gateway delete -g {rg} -n ag2 --no-wait -network application-gateway wait -g {rg} -n ag2 --deleted -network application-gateway create -g {rg} -n ag3 --subnet subnet1 --private-ip-address {private_ip} --cert-file "{path}" --cert-password {pass} --no-wait -network application-gateway wait -g {rg} -n ag3 --exists -network application-gateway show -g {rg} -n ag3 -network application-gateway ssl-cert update -g {rg} --gateway-name ag3 -n ag3SslCert --cert-file "{path}" --cert-password {pass} -network application-gateway wait -g {rg} -n ag3 --updated -network application-gateway ssl-policy set -g {rg} --gateway-name ag3 --disabled-ssl-protocols TLSv1_0 TLSv1_1 --no-wait -network application-gateway ssl-policy show -g {rg} --gateway-name ag3 -network application-gateway ssl-policy set -g {rg} --gateway-name ag3 --min-protocol-version TLSv1_0 --cipher-suites {cipher} --no-wait -network application-gateway ssl-policy show -g {rg} --gateway-name ag3 -network application-gateway ssl-policy set -g {rg} --gateway-name ag3 -n {policy} --no-wait -network application-gateway ssl-policy show -g {rg} --gateway-name ag3 -network application-gateway create -g {rg} -n {ag} --no-wait -network application-gateway wait -g {rg} -n {ag} --exists -network {res} create -g {rg} --gateway-name {ag} -n {name} --no-wait --servers 123.4.5.6 www.mydns.com -network {res} show -g {rg} --gateway-name {ag} -n {name} -network {res} update -g {rg} --gateway-name {ag} -n {name} --no-wait --servers 5.4.3.2 -network {res} show -g {rg} --gateway-name {ag} -n {name} -network {res} list -g {rg} --gateway-name {ag} -network {res} delete -g {rg} --gateway-name {ag} --no-wait -n {name} -network {res} list -g {rg} --gateway-name {ag} -network public-ip create -g {rg} -n {ip1} -network vnet create -g {rg} -n {vnet1} --subnet-name {subnet} -network application-gateway create -g {rg} -n {ag} --no-wait --public-ip-address {ip1} --vnet-name {vnet1} --subnet {subnet} -network application-gateway wait -g {rg} -n {ag} --exists -network {res} create -g {rg} --gateway-name {ag} -n {name} --no-wait --private-ip-address 10.0.0.10 --vnet-name {vnet1} --subnet {subnet} -network {res} show -g {rg} --gateway-name {ag} -n {name} -network {res} list -g {rg} --gateway-name {ag} -network {res} delete -g {rg} --gateway-name {ag} --no-wait -n {name} -network {res} list -g {rg} --gateway-name {ag} -network application-gateway create -g {rg} -n {ag} --no-wait -network application-gateway wait -g {rg} -n {ag} --exists -network public-ip create -g {rg} -n {ip1} -network public-ip create -g {rg} -n {ip2} -network {res} create -g {rg} --gateway-name {ag} -n {name} --no-wait --public-ip-address {ip1} -network {res} show -g {rg} --gateway-name {ag} -n {name} -network {res} list -g {rg} --gateway-name {ag} -network {res} delete -g {rg} --gateway-name {ag} --no-wait -n {name} -network {res} list -g {rg} --gateway-name {ag} -network application-gateway create -g {rg} -n {ag} --no-wait -network application-gateway wait -g {rg} -n {ag} --exists -network {res} create -g {rg} --gateway-name {ag} -n {name} --no-wait --port 111 -network {res} show -g {rg} --gateway-name {ag} -n {name} -network {res} update -g {rg} --gateway-name {ag} -n {name} --no-wait --port 112 -network {res} show -g {rg} --gateway-name {ag} -n {name} -network {res} list -g {rg} --gateway-name {ag} -network {res} delete -g {rg} --gateway-name {ag} --no-wait -n {name} -network {res} list -g {rg} --gateway-name {ag} -network application-gateway create -g {rg} -n {ag} --no-wait -network application-gateway wait -g {rg} -n {ag} --exists -network {res} create -g {rg} --gateway-name {ag} -n {name} --no-wait --frontend-port appGatewayFrontendPort --host-name www.test.com -network {res} show -g {rg} --gateway-name {ag} -n {name} -network {res} update -g {rg} --gateway-name {ag} -n {name} --no-wait --host-name www.test2.com -network {res} show -g {rg} --gateway-name {ag} -n {name} -network {res} list -g {rg} --gateway-name {ag} -network {res} delete -g {rg} --gateway-name {ag} --no-wait -n {name} -network {res} list -g {rg} --gateway-name {ag} -network public-ip create -g {rg} -n {gateway_ip} --sku Standard -network application-gateway create -g {rg} -n {ag} --sku WAF_v2 --public-ip-address {gateway_ip} -network application-gateway frontend-port create -g {rg} --gateway-name {ag} -n {port} --port 18080 -network {res} create -g {rg} --gateway-name {ag} -n {name} --frontend-port {port} --host-names "*.contoso.com" "www.microsoft.com" -network {res} show -g {rg} --gateway-name {ag} -n {name} -network {res} update -g {rg} --gateway-name {ag} -n {name} --host-names "*.contoso.com" "www.bing.com" -network {res} show -g {rg} --gateway-name {ag} -n {name} -network {res} list -g {rg} --gateway-name {ag} -network {res} delete -g {rg} --gateway-name {ag} --no-wait -n {name} -network {res} list -g {rg} --gateway-name {ag} -network application-gateway waf-policy create -g {rg} --name {waf_1} -network application-gateway waf-policy create -g {rg} --name {waf_2} -network application-gateway waf-policy create -g {rg} --name {waf_3} -network public-ip create -g {rg} -n ip-1 --sku Standard -network application-gateway create -g {rg} --name {ag} --public-ip-address ip-1 --sku WAF_v2 -network application-gateway http-listener update -g {rg} --gateway-name {ag} --name appGatewayHttpListener --waf-policy {waf_1} -network application-gateway frontend-port create -g {rg} --gateway-name {ag} --port 9020 --name 9020 -network application-gateway http-listener create -g {rg} --gateway-name {ag} --name {listener_2} --frontend-port 9020 --waf-policy {waf_2} -network application-gateway http-listener update -g {rg} --gateway-name {ag} --name {listener_2} --waf-policy {waf_3} -network application-gateway show -g {rg} --name {ag} -network application-gateway create -g {rg} -n {ag} --no-wait -network application-gateway wait -g {rg} -n {ag} --exists -network {res} create -g {rg} --gateway-name {ag} -n {name} --no-wait --affinity-cookie-name mycookie --connection-draining-timeout 60 --cookie-based-affinity --host-name-from-backend-pool --protocol https --timeout 50 --port 70 -network {res} show -g {rg} --gateway-name {ag} -n {name} -network {res} update -g {rg} --gateway-name {ag} -n {name} --no-wait --affinity-cookie-name mycookie2 --connection-draining-timeout 0 --cookie-based-affinity disabled --host-name-from-backend-pool false --protocol http --timeout 40 --port 71 -network {res} show -g {rg} --gateway-name {ag} -n {name} -network {res} list -g {rg} --gateway-name {ag} -network {res} delete -g {rg} --gateway-name {ag} --no-wait -n {name} -network {res} list -g {rg} --gateway-name {ag} -network public-ip create -g {rg} -n {gateway_ip} --sku Standard -network application-gateway create -g {rg} -n {ag} --sku WAF_v2 --public-ip-address {gateway_ip} -network application-gateway probe create -g {rg} --gateway-name {ag} -n {name} --no-wait --path /test --protocol http --interval 25 --timeout 100 --threshold 10 --min-servers 2 --host www.test.com --match-status-codes 200 204 --host-name-from-http-settings false --port 2048 -network application-gateway probe show -g {rg} --gateway-name {ag} -n {name} -network application-gateway probe update -g {rg} --gateway-name {ag} -n {name} --no-wait --path /test2 --protocol https --interval 26 --timeout 101 --threshold 11 --min-servers 3 --host "" --match-status-codes 201 --host-name-from-http-settings --port 4096 -network application-gateway probe show -g {rg} --gateway-name {ag} -n {name} -network application-gateway probe list -g {rg} --gateway-name {ag} -network application-gateway probe delete -g {rg} --gateway-name {ag} --no-wait -n {name} -network application-gateway probe list -g {rg} --gateway-name {ag} -network public-ip create -g {rg} -n {ip} --sku Standard -network application-gateway create -g {rg} -n {ag} --public-ip-address {ip} --sku Standard_v2 --no-wait -network application-gateway wait -g {rg} -n {ag} --exists -network {res} update -g {rg} --gateway-name {ag} -n rule1 --priority 1 -network application-gateway http-listener create -g {rg} --gateway-name {ag} -n mylistener --no-wait --frontend-port appGatewayFrontendPort --host-name www.test.com -network application-gateway http-listener create -g {rg} --gateway-name {ag} -n mylistener2 --no-wait --frontend-port appGatewayFrontendPort --host-name www.test2.com -network {res} create -g {rg} --gateway-name {ag} -n {name} --no-wait --http-listener mylistener --priority 12 -network {res} show -g {rg} --gateway-name {ag} -n {name} -network {res} update -g {rg} --gateway-name {ag} -n {name} --no-wait --http-listener mylistener2 --priority 32 -network {res} show -g {rg} --gateway-name {ag} -n {name} -network application-gateway rewrite-rule set create -g {rg} --gateway-name {ag} -n {set} -network {res} create -g {rg} --gateway-name {ag} -n {name2} --no-wait --rewrite-rule-set {set} --http-listener mylistener --priority 10 -network {res} show -g {rg} --gateway-name {ag} -n {name2} -network {res} update -g {rg} --gateway-name {ag} -n {name2} --rewrite-rule-set {set_id} --priority 21 -network {res} list -g {rg} --gateway-name {ag} -network {res} delete -g {rg} --gateway-name {ag} --no-wait -n {name} -network {res} list -g {rg} --gateway-name {ag} -network public-ip create -g {rg} -n {ip} --sku Standard -network application-gateway create -g {rg} -n {ag} --public-ip-address {ip} --sku Standard_v2 --no-wait -network application-gateway wait -g {rg} -n {ag} --exists -network application-gateway http-listener create -g {rg} --gateway-name {ag} -n mylistener --no-wait --frontend-port appGatewayFrontendPort --host-name www.test.com -network application-gateway rewrite-rule set create -g {rg} --gateway-name {ag} -n {set} -network application-gateway address-pool create -g {rg} --gateway-name {ag} -n {pool} --no-wait -network application-gateway http-settings create -g {rg} --gateway-name {ag} -n {settings} --port 443 --protocol https -network application-gateway url-path-map create -g {rg} --gateway-name {ag} -n {name} --rule-name {rulename} --paths /mypath1/* --address-pool {pool} --default-address-pool {pool} --http-settings {settings} --default-http-settings {settings} --default-rewrite-rule-set {set} --rewrite-rule-set {set} -network application-gateway url-path-map update -g {rg} --gateway-name {ag} -n {name} --default-rewrite-rule-set {set} -network application-gateway url-path-map rule create -g {rg} --gateway-name {ag} -n {rulename2} --path-map-name {name} --paths /mypath122/* --address-pool {pool} --http-settings {settings} --rewrite-rule-set {set} -network public-ip create -g {rg} -n {ip} --sku Standard -network application-gateway create -g {rg} -n {ag} --public-ip-address {ip} --sku Standard_v2 --no-wait -network application-gateway wait -g {rg} -n {ag} --exists -network application-gateway http-listener create -g {rg} --gateway-name {ag} -n mylistener --no-wait --frontend-port appGatewayFrontendPort --host-name www.test.com -network application-gateway rewrite-rule set create -g {rg} --gateway-name {ag} -n {set} -network application-gateway redirect-config create -g {rg} --gateway-name {ag} -n {redirect_config} --target-listener mylistener --type Permanent -network application-gateway address-pool create -g {rg} --gateway-name {ag} -n {pool} --no-wait -network application-gateway http-settings create -g {rg} --gateway-name {ag} -n {settings} --port 443 --protocol https -network application-gateway url-path-map create -g {rg} --gateway-name {ag} -n {name} --rule-name {rulename} --paths /mypath1/* --redirect-config {redirect_config} --default-redirect-config {redirect_config} -network application-gateway url-path-map rule create -g {rg} --gateway-name {ag} -n {rulename2} --path-map-name {name} --paths /mypath122/* --address-pool {pool} --http-settings {settings} -network application-gateway url-path-map rule create -g {rg} --gateway-name {ag} -n {rulename2} --path-map-name {name} --paths /mypath122/* --address-pool {pool} --http-settings {settings} --redirect-config {redirect_config} -network public-ip create -g {rg} -n {ip} --sku Standard -network application-gateway create -g {rg} -n {gw} --public-ip-address {ip} --sku Standard_v2 --no-wait -network application-gateway wait -g {rg} -n {gw} --exists -network application-gateway rewrite-rule set create -g {rg} --gateway-name {gw} -n {set} --no-wait -network application-gateway rewrite-rule set show -g {rg} --gateway-name {gw} -n {set} -network application-gateway rewrite-rule create -g {rg} --gateway-name {gw} --rule-set-name {set} -n {rule} --sequence 123 --request-headers foo=bar --response-headers cat=hat --no-wait -network application-gateway rewrite-rule update -g {rg} --gateway-name {gw} --rule-set-name {set} -n {rule} --sequence 321 --request-headers bar=foo --response-headers hat=cat --no-wait -network application-gateway rewrite-rule update -g {rg} --gateway-name {gw} --rule-set-name {set} -n {rule} --set ruleSequence=321 --remove actionSet.responseHeaderConfigurations 0 --no-wait -network application-gateway rewrite-rule show -g {rg} --gateway-name {gw} --rule-set-name {set} -n {rule} -network application-gateway rewrite-rule list -g {rg} --gateway-name {gw} --rule-set-name {set} -network application-gateway rewrite-rule list-request-headers -network application-gateway rewrite-rule list-response-headers -network application-gateway rewrite-rule create -g {rg} --gateway-name {gw} --rule-set-name {set} -n {rule2} --sequence 123 --request-headers foo=bar --response-headers cat=hat --modified-path "/def" --modified-query-string "a=b&c=d%20f" -network application-gateway rewrite-rule update -g {rg} --gateway-name {gw} --rule-set-name {set} -n {rule2} --sequence 321 --request-headers bar=foo --response-headers hat=cat --modified-path "/def2" --modified-query-string "a=b&c=d%20f12" --enable-reroute -network application-gateway rewrite-rule update -g {rg} --gateway-name {gw} --rule-set-name {set} -n {rule2} --set ruleSequence=321 --remove actionSet.responseHeaderConfigurations 0 --no-wait -network application-gateway rewrite-rule show -g {rg} --gateway-name {gw} --rule-set-name {set} -n {rule2} -network application-gateway rewrite-rule create -g {rg} --gateway-name {gw} --rule-set-name {set} -n {rule3} --sequence 123 --modified-path "/" --no-wait -network application-gateway rewrite-rule condition create -g {rg} --gateway-name {gw} --rule-set-name {set} --rule-name {rule} --variable {var} --pattern "^Bearer" --ignore-case false --negate --no-wait -network application-gateway rewrite-rule condition update -g {rg} --gateway-name {gw} --rule-set-name {set} --rule-name {rule} --variable {var} --pattern "^Bearers" --no-wait -network application-gateway rewrite-rule condition show -g {rg} --gateway-name {gw} --rule-set-name {set} --rule-name {rule} --variable {var} -network application-gateway rewrite-rule condition list -g {rg} --gateway-name {gw} --rule-set-name {set} --rule-name {rule} -network application-gateway rewrite-rule condition delete -g {rg} --gateway-name {gw} --rule-set-name {set} --rule-name {rule} --variable {var} --no-wait -network application-gateway rewrite-rule condition list -g {rg} --gateway-name {gw} --rule-set-name {set} --rule-name {rule} -network application-gateway rewrite-rule condition list-server-variables -network application-gateway rewrite-rule delete -g {rg} --gateway-name {gw} --rule-set-name {set} -n {rule} --no-wait -network application-gateway rewrite-rule list -g {rg} --gateway-name {gw} --rule-set-name {set} -network application-gateway rewrite-rule set delete -g {rg} --gateway-name {gw} -n {set} --no-wait -network application-gateway rewrite-rule set list -g {rg} --gateway-name {gw} -network application-gateway create -g {rg} -n test4 --subnet subnet1 --vnet-name vnet4 --vnet-address-prefix 10.0.0.1/16 --subnet-address-prefix 10.0.0.1/28 --public-ip-address {ip} -network application-gateway create -g {rg} -n {ag} --subnet subnet1 --vnet-name vnet1 --public-ip-address {ip} --sku WAF_Medium --no-wait -network application-gateway wait -g {rg} -n {ag} --exists -network application-gateway show -g {rg} -n {ag} -network application-gateway waf-config set -g {rg} --gateway-name {ag} --enabled true --firewall-mode prevention --rule-set-version 2.2.9 --disabled-rule-groups crs_30_http_policy --disabled-rules 981175 981176 --no-wait -network application-gateway waf-config show -g {rg} --gateway-name {ag} -network public-ip create -g {rg} -n {ip} --sku standard -network application-gateway create -g {rg} -n {ag} --subnet subnet1 --vnet-name vnet1 --public-ip-address {ip} --sku WAF_v2 --no-wait -network application-gateway wait -g {rg} -n {ag} --exists -network application-gateway waf-config set -g {rg} --gateway-name ag1 --enabled true --firewall-mode prevention --rule-set-version 3.0 --exclusion RequestHeaderNames StartsWith abc --exclusion RequestArgNames Equals def --no-wait -network application-gateway waf-config show -g {rg} --gateway-name ag1 -network application-gateway waf-policy create -g {rg} -n {waf} -network application-gateway waf-policy show -g {rg} -n {waf} -network application-gateway waf-policy custom-rule create -g {rg} --policy-name {waf} -n {rule} --priority 50 --action LOG --rule-type MatchRule -network application-gateway waf-policy show -g {rg} -n {waf} -network application-gateway waf-policy custom-rule show -g {rg} --policy-name {waf} -n {rule} -network application-gateway waf-policy custom-rule match-condition add -g {rg} --policy-name {waf} -n {rule} --match-variables RequestHeaders.value --operator contains --values foo boo --transform lowercase -network application-gateway waf-policy custom-rule show -g {rg} --policy-name {waf} -n {rule} -network application-gateway waf-policy custom-rule update -g {rg} --policy-name {waf} -n {rule} --priority 75 -network application-gateway waf-policy custom-rule match-condition add -g {rg} --policy-name {waf} -n {rule} --match-variables RequestHeaders.value --operator contains --values remove this --transform lowercase -network application-gateway waf-policy custom-rule show -g {rg} --policy-name {waf} -n {rule} -network application-gateway waf-policy custom-rule match-condition remove -g {rg} --policy-name {waf} -n {rule} --index 0 -network application-gateway waf-policy custom-rule show -g {rg} --policy-name {waf} -n {rule} -network application-gateway waf-policy create -g {rg} -n {waf} -network application-gateway waf-policy managed-rule exclusion add -g {rg} --policy-name {waf} --match-variable RequestHeaderNames --match-operator StartsWith --selector Bing -network application-gateway waf-policy managed-rule exclusion rule-set add -g {rg} --policy-name {waf} --match-variable RequestHeaderNames --match-operator StartsWith --selector Bing --type OWASP --version 3.2 --group-name {rule_group1} --rule-ids 921140 921150 -network application-gateway waf-policy managed-rule exclusion rule-set add -g {rg} --policy-name {waf} --match-variable RequestHeaderNames --match-operator StartsWith --selector Bing --type OWASP --version 3.2 --group-name {rule_group2} --rule-ids 931100 -network application-gateway waf-policy managed-rule exclusion rule-set remove -g {rg} --policy-name {waf} --match-variable RequestHeaderNames --match-operator StartsWith --selector Bing --type OWASP --version 3.2 --group-name {rule_group1} -network application-gateway waf-policy managed-rule exclusion rule-set list -g {rg} --policy-name {waf} -network application-gateway waf-policy create -g {rg} -n {waf} -network application-gateway waf-policy managed-rule rule-set add -g {rg} --policy-name {waf} --type OWASP --version 3.0 --group-name {csr_grp1} --rules 921100 921110 -network application-gateway waf-policy show -g {rg} -n {waf} -network application-gateway waf-policy managed-rule rule-set add -g {rg} --policy-name {waf} --type OWASP --version 3.0 --group-name {csr_grp1} --rules 921150 -network application-gateway waf-policy managed-rule rule-set list -g {rg} --policy-name {waf} -network application-gateway waf-policy managed-rule rule-set add -g {rg} --policy-name {waf} --type OWASP --version 3.0 --group-name {csr_grp2} --rules 913100 -network application-gateway waf-policy managed-rule rule-set list -g {rg} --policy-name {waf} -network application-gateway waf-policy managed-rule rule-set update -g {rg} --policy-name {waf} --type OWASP --version 3.0 --group-name {csr_grp1} --rules 921100 921150 -network application-gateway waf-policy managed-rule rule-set list -g {rg} --policy-name {waf} -network application-gateway waf-policy managed-rule rule-set remove -g {rg} --policy-name {waf} --type OWASP --version 3.1 --group-name {csr_grp1} -network application-gateway waf-policy managed-rule rule-set list -g {rg} --policy-name {waf} -network application-gateway waf-policy managed-rule rule-set update -g {rg} --policy-name {waf} --type OWASP --version 3.1 -network application-gateway waf-policy managed-rule rule-set list -g {rg} --policy-name {waf} -network application-gateway waf-policy managed-rule rule-set update -g {rg} --policy-name {waf} --type OWASP --version 3.1 --group-name REQUEST-911-METHOD-ENFORCEMENT --rules 911100 -network application-gateway waf-policy managed-rule rule-set list -g {rg} --policy-name {waf} -network application-gateway waf-policy create -g {rg} -n {waf} -network application-gateway waf-policy managed-rule exclusion add -g {rg} --policy-name {waf} --match-variable "RequestHeaderNames" --selector-match-operator "StartsWith" --selector "Bing" -network application-gateway waf-policy managed-rule exclusion list -g {rg} --policy-name {waf} -network application-gateway waf-policy managed-rule exclusion add -g {rg} --policy-name {waf} --match-variable "RequestHeaderNames" --selector-match-operator "Contains" --selector "Azure" -network application-gateway waf-policy managed-rule exclusion list -g {rg} --policy-name {waf} -network application-gateway waf-policy managed-rule exclusion remove -g {rg} --policy-name {waf} -network application-gateway waf-policy managed-rule exclusion list -g {rg} --policy-name {waf} -network application-gateway waf-policy create -g {rg} -n {waf} -network application-gateway waf-policy policy-setting update -g {rg} --policy-name {waf} --state Enabled --file-upload-limit-in-mb 64 --mode Prevention -network application-gateway waf-policy create -g {rg} -n {waf} -network application-gateway waf-policy update -g {rg} -n {waf} --tags test=best -network application-gateway waf-policy show -g {rg} -n {waf} -network application-gateway waf-policy list -g {rg} -network application-gateway waf-policy custom-rule create -g {rg} --policy-name {waf} -n {custom-rule1} --priority 50 --action log --rule-type MatchRule -network application-gateway waf-policy custom-rule create -g {rg} --policy-name {waf} -n {custom-rule2} --priority 100 --action log --rule-type MatchRule -network application-gateway waf-policy policy-setting update -g {rg} --policy-name {waf} --state Enabled --file-upload-limit-in-mb 64 --mode Prevention -network application-gateway waf-policy managed-rule rule-set add -g {rg} --policy-name {waf} --type OWASP --version 3.0 -network application-gateway waf-policy managed-rule rule-set add -g {rg} --policy-name {waf} --type OWASP --version 3.0 --group-name {csr_grp1} --rules 921100 921110 -network application-gateway waf-policy managed-rule rule-set add -g {rg} --policy-name {waf} --type OWASP --version 3.0 --group-name {csr_grp2} --rules 913100 -network application-gateway waf-policy managed-rule rule-set add -g {rg} --policy-name {waf} --type Microsoft_BotManagerRuleSet --version 0.1 -network application-gateway waf-policy managed-rule exclusion add -g {rg} --policy-name {waf} --match-variable "RequestHeaderNames" --selector-match-operator "StartsWith" --selector "Bing" -network application-gateway waf-policy show -g {rg} -n {waf} -network public-ip create -g {rg} -n {ip1} --sku standard -network public-ip create -g {rg} -n {ip2} --sku standard -network application-gateway create -g {rg} -n {ag1} --subnet subnet1 --vnet-name vnet1 --public-ip-address {ip1} --sku WAF_v2 --waf-policy {waf} -network application-gateway create -g {rg} -n {ag2} --subnet subnet2 --vnet-name vnet2 --public-ip-address {ip2} --sku WAF_v2 --waf-policy {waf} -network application-gateway show -g {rg} -n {ag1} -network application-gateway show -g {rg} -n {ag2} -network application-gateway waf-policy show -g {rg} -n {waf} -network application-gateway waf-policy create -g {rg} -n {waf} --version 3.1 --type OWASP -network application-gateway waf-policy managed-rule rule-set add -g {rg} --policy-name {waf} --type OWASP --version 3.1 --group-name {csr_grp1} --rules 921120 921110 -network application-gateway waf-policy show -g {rg} -n {waf} -network application-gateway waf-policy managed-rule rule-set add -g {rg} --policy-name {waf} --type OWASP --version 3.1 --group-name {csr_grp1} --rules 921150 -network application-gateway waf-policy managed-rule rule-set list -g {rg} --policy-name {waf} -network application-gateway waf-policy managed-rule rule-set add -g {rg} --policy-name {waf} --type OWASP --version 3.1 --group-name {csr_grp2} --rules 913100 -network application-gateway waf-policy managed-rule rule-set list -g {rg} --policy-name {waf} -network application-gateway waf-policy managed-rule rule-set update -g {rg} --policy-name {waf} --type OWASP --version 3.1 --group-name {csr_grp1} --rules 921130 921140 -network application-gateway waf-policy managed-rule rule-set list -g {rg} --policy-name {waf} -network application-gateway waf-policy managed-rule rule-set remove -g {rg} --policy-name {waf} --type OWASP --version 3.1 --group-name {csr_grp1} -network application-gateway waf-policy managed-rule rule-set list -g {rg} --policy-name {waf} -network public-ip create -g {rg} -n {ip1} --dns-name {dns} --allocation-method static -network public-ip create -g {rg} -n {ip2} -network public-ip update -g {rg} -n {ip2} --allocation-method static --dns-name wowza2 --idle-timeout 10 --tags foo=doo -network public-ip list -g {rg} -network public-ip show -g {rg} -n {ip1} -network public-ip delete -g {rg} -n {ip1} -network public-ip list -g {rg} -network public-ip create -g {rg} -n ip --sku Standard -z 1 2 3 -network public-ip create -g {rg} -n {ip} -l centralus -z 2 -network public-ip show -g {rg} -n {ip} -otable -network route-filter create -g {rg} -n {filter} --tags foo=doo -network route-filter update -g {rg} -n {filter} -network route-filter show -g {rg} -n {filter} -network route-filter list -g {rg} -network route-filter rule create -g {rg} --filter-name {filter} -n rule1 --communities 12076:5040 12076:5030 --access allow -network route-filter rule update -g {rg} --filter-name {filter} -n rule1 --set access=Deny -network route-filter rule show -g {rg} --filter-name {filter} -n rule1 -network route-filter rule list -g {rg} --filter-name {filter} -network route-filter rule delete -g {rg} --filter-name {filter} -n rule1 -network route-filter delete -g {rg} -n {filter} -network express-route list-service-providers -network express-route create -g {rg} -n {er} --bandwidth 50 --provider "Ibiza Test Provider" --peering-location Area51 --sku-tier Premium --tags foo=doo -network express-route list -network express-route list --resource-group {rg} -network express-route show --resource-group {rg} --name {er} -network express-route get-stats --resource-group {rg} --name {er} -network express-route update -g {rg} -n {er} --set tags.test=Test -network express-route update -g {rg} -n {er} --tags foo=boo -network express-route auth create -g {rg} --circuit-name {er} -n auth1 -network express-route auth list --resource-group {rg} --circuit-name {er} -network express-route auth show -g {rg} --circuit-name {er} -n auth1 -network express-route auth delete -g {rg} --circuit-name {er} -n auth1 -network express-route auth list --resource-group {rg} --circuit-name {er} -network express-route peering create -g {rg} --circuit-name {er} --peering-type {peering} --peer-asn {asn} --vlan-id {vlan} --primary-peer-subnet {pri_prefix} --secondary-peer-subnet {sec_prefix} -network express-route peering create -g {rg} --circuit-name {er} --peering-type MicrosoftPeering --peer-asn 10002 --vlan-id 103 --primary-peer-subnet 104.0.0.0/30 --secondary-peer-subnet 105.0.0.0/30 --advertised-public-prefixes 104.0.0.0/30 --customer-asn 10000 --routing-registry-name level3 -network express-route peering show -g {rg} --circuit-name {er} -n MicrosoftPeering -network express-route peering delete -g {rg} --circuit-name {er} -n MicrosoftPeering -network express-route peering list --resource-group {rg} --circuit-name {er} -network express-route peering update -g {rg} --circuit-name {er} -n AzurePrivatePeering --set vlanId=200 -network express-route list-arp-tables --resource-group {rg} --name {er} --peering-name azureprivatepeering --path primary -network express-route list-route-tables --resource-group {rg} --name {er} --peering-name azureprivatepeering --path primary -network express-route list-route-tables-summary --resource-group {rg} --name {er} --peering-name azureprivatepeering --path primary -network express-route delete --resource-group {rg} --name {er} -network express-route list --resource-group {rg} -network express-route gateway connection show --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myrg/providers/Microsoft.Network/expressRouteGateways/aaa -keyvault secret set --name {CAK_name} --vault-name {kv} --value {CAK_value} -keyvault secret set --name {CKN_name} --vault-name {kv} --value {CKN_value} -identity create -g {rg} -n {name} -keyvault set-policy -n {kv} --secret-permissions get --object-id d085cdb2-c36a-4be8-8536-6382bb927d15 -network express-route port location list -network express-route port location show -l {peeringRG} -network express-route port create -g {rg} -n {name} --location {location} --peering-location {peeringRG} --encapsulation {encapsulation} --bandwidth {bandwidth} -network express-route port list -g {rg} -network express-route port show -g {rg} -n {name} -network express-route port identity assign -g {rg} -n {name} --identity /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_express_route_port000001/providers/Microsoft.ManagedIdentity/userAssignedIdentities/expressRouteTest -network express-route port identity show -g {rg} -n {name} -network express-route port link list -g {rg} --port-name {name} -network express-route port link show -g {rg} --port-name {name} -n link1 -network express-route port link update -g {rg} --port-name {name} -n link1 --macsec-ckn-secret-identifier {CKN_id} --macsec-cak-secret-identifier {CAK_id} --macsec-cipher {cipher} --admin-state -network express-route port generate-loa --customer-name MyCustomer -g {rg} --name {name} -f loa1 -network express-route create -g {rg} -n {er} --bandwidth 50 --provider "Ibiza Test Provider" --peering-location Area51 --sku-tier Premium -network express-route peering create -g {rg} --circuit-name {er} --peering-type MicrosoftPeering --peer-asn 10002 --vlan-id 103 --primary-peer-subnet 104.0.0.0/30 --secondary-peer-subnet 105.0.0.0/30 --advertised-public-prefixes 104.0.0.0/30 --customer-asn 10000 --routing-registry-name level3 -network express-route peering update -g {rg} --circuit-name {er} -n MicrosoftPeering --ip-version ipv6 --primary-peer-subnet 2001:db00::/126 --secondary-peer-subnet 2002:db00::/126 --advertised-public-prefixes 2001:db00::/126 --customer-asn 100001 --routing-registry-name level3 -network express-route peering show -g {rg} --circuit-name {er} -n MicrosoftPeering -network express-route peering get-stats -g {rg} --circuit-name {er} -n MicrosoftPeering -network express-route create -g {rg} -n {er} --bandwidth 50 --provider "Ibiza Test Provider" --peering-location Area51 --sku-tier Premium -network express-route peering create -g {rg} --circuit-name {er} --peering-type AzurePrivatePeering --peer-asn 10002 --vlan-id 103 --ip-version ipv6 --primary-peer-subnet 2002:db00::/126 --secondary-peer-subnet 2003:db00::/126 -network express-route create -g {rg} -n {er1} --allow-global-reach --bandwidth 50 --peering-location Area51 --provider "Microsoft ER Test" --sku-tier Premium -network express-route peering create -g {rg} --circuit-name {er1} --peering-type AzurePrivatePeering --peer-asn 10001 --vlan-id 101 --primary-peer-subnet 102.0.0.0/30 --secondary-peer-subnet 103.0.0.0/30 -network express-route create -g {rg} -n {er2} --allow-global-reach --bandwidth 50 --peering-location "Denver Test" --provider "Test Provider NW" --sku-tier Premium -network express-route peering create -g {rg} --circuit-name {er2} --peering-type AzurePrivatePeering --peer-asn 10002 --vlan-id 102 --primary-peer-subnet 104.0.0.0/30 --secondary-peer-subnet 105.0.0.0/30 -network express-route peering connection create -g {rg} --circuit-name {er1} --peering-name AzurePrivatePeering -n {conn12} --peer-circuit {er2} --address-prefix 104.0.0.0/29 -network express-route peering connection show -g {rg} --circuit-name {er1} --peering-name AzurePrivatePeering -n {conn12} -network express-route peering connection list -g {rg} --circuit-name {er1} --peering-name AzurePrivatePeering -network express-route peering connection delete -g {rg} --circuit-name {er1} --peering-name AzurePrivatePeering -n {conn12} -network express-route create -g {rg} -n {er1} --allow-global-reach --bandwidth 50 --peering-location Area51 --provider "Microsoft ER Test" --sku-tier Premium -network express-route peering create -g {rg} --circuit-name {er1} --peering-type AzurePrivatePeering --peer-asn 10001 --vlan-id 101 --primary-peer-subnet 102.0.0.0/30 --secondary-peer-subnet 103.0.0.0/30 -network express-route create -g {rg} -n {er2} --allow-global-reach --bandwidth 50 --peering-location "Denver Test" --provider "Test Provider NW" --sku-tier Premium -network express-route peering create -g {rg} --circuit-name {er2} --peering-type AzurePrivatePeering --peer-asn 10002 --vlan-id 102 --primary-peer-subnet 104.0.0.0/30 --secondary-peer-subnet 105.0.0.0/30 -network express-route peering connection create -g {rg} --circuit-name {er1} --peering-name AzurePrivatePeering -n {conn12} --peer-circuit {er2} --address-prefix 104.0.0.0/29 -network express-route peering connection ipv6-config set -g {rg} --circuit-name {er1} --peering-name AzurePrivatePeering -n {conn12} --address-prefix .../125 -network express-route peering connection ipv6-config remove -g {rg} --circuit-name {er1} --peering-name AzurePrivatePeering -n {conn12} -network express-route peering connection delete -g {rg} --circuit-name {er1} --peering-name AzurePrivatePeering -n {conn12} -network express-route create -g {rg} -n {er1} --allow-global-reach --bandwidth 50 --peering-location Area51 --provider "Microsoft ER Test" --sku-tier Premium -network express-route peering create -g {rg} --circuit-name {er1} --peering-type AzurePrivatePeering --peer-asn 10001 --vlan-id 101 --primary-peer-subnet 102.0.0.0/30 --secondary-peer-subnet 103.0.0.0/30 -network express-route create -g {rg} -n {er2} --allow-global-reach --bandwidth 50 --peering-location "Denver Test" --provider "Test Provider NW" --sku-tier Premium -network express-route peering create -g {rg} --circuit-name {er2} --peering-type AzurePrivatePeering --peer-asn 10002 --vlan-id 102 --primary-peer-subnet 104.0.0.0/30 --secondary-peer-subnet 105.0.0.0/30 -network express-route peering peer-connection show -g {rg} --circuit-name {er1} --peering-name AzurePrivatePeering -n {peconn12} -network express-route peering peer-connection list -g {rg} --circuit-name {er1} --peering-name AzurePrivatePeering -network cross-region-lb create -n {lb}1 -g {rg} -network cross-region-lb create -n {lb}2 -g {rg} --public-ip-address-allocation static --tags foo=doo -network public-ip show -g {rg} -n PublicIP{lb}2 -network public-ip create -n {pub_ip} -g {rg} --sku Standard --tier Global -network cross-region-lb create -n {lb}3 -g {rg} --public-ip-address {pub_ip} -network cross-region-lb list -network cross-region-lb list --resource-group {rg} -network cross-region-lb show --resource-group {rg} --name {lb}1 -network cross-region-lb delete --resource-group {rg} --name {lb}1 -network cross-region-lb list --resource-group {rg} -network cross-region-lb create -g {rg} -n {lb} -network cross-region-lb address-pool create -g {rg} --lb-name {lb} -n bap1 -network cross-region-lb address-pool create -g {rg} --lb-name {lb} -n bap2 -network cross-region-lb address-pool create -g {rg} --lb-name {lb} -n bap3 -network lb address-pool list -g {rg} --lb-name {lb} -network lb address-pool show -g {rg} --lb-name {lb} -n bap1 -network lb address-pool delete -g {rg} --lb-name {lb} -n bap1 -network lb address-pool list -g {rg} --lb-name {lb} -network lb create -n {regional_lb1} -g {rg} --sku Standard -network lb create -n {regional_lb2} -g {rg} --sku Standard -network cross-region-lb create -g {rg} -n {lb} -network cross-region-lb address-pool create -g {rg} --lb-name {lb} -n {address_pool} --backend-address name={backend_address1} frontend-ip-address={regional_lb_frontend_ip_address1} -network cross-region-lb address-pool address add -g {rg} --lb-name {lb} --pool-name {address_pool} --name {backend_address2} --frontend-ip-address {regional_lb_frontend_ip_address2} -network cross-region-lb address-pool address remove -g {rg} --lb-name {lb} --pool-name {address_pool} --name {backend_address2} -network cross-region-lb address-pool address list -g {rg} --lb-name {lb} --pool-name {address_pool} -network cross-region-lb address-pool list -g {rg} --lb-name {lb} -network cross-region-lb address-pool show -g {rg} --lb-name {lb} -n {address_pool} -network cross-region-lb address-pool delete -g {rg} --lb-name {lb} -n {address_pool} -network cross-region-lb address-pool list -g {rg} --lb-name {lb} -network cross-region-lb create -g {rg} -n {lb} -network cross-region-lb probe create -g {rg} --lb-name {lb} -n probe1 --port 1 --protocol http --path "/test1" -network cross-region-lb probe create -g {rg} --lb-name {lb} -n probe2 --port 2 --protocol http --path "/test2" -network cross-region-lb probe create -g {rg} --lb-name {lb} -n probe3 --port 3 --protocol http --path "/test3" -network lb probe list -g {rg} --lb-name {lb} -network cross-region-lb probe update -g {rg} --lb-name {lb} -n probe1 --interval 20 --threshold 5 -network cross-region-lb probe update -g {rg} --lb-name {lb} -n probe2 --protocol tcp --path "" -network cross-region-lb probe show -g {rg} --lb-name {lb} -n probe1 -network cross-region-lb probe update -g {rg} --lb-name {lb} -n probe1 --set intervalInSeconds=15 --set numberOfProbes=3 -network cross-region-lb probe show -g {rg} --lb-name {lb} -n probe2 -network cross-region-lb probe delete -g {rg} --lb-name {lb} -n probe3 -network cross-region-lb probe list -g {rg} --lb-name {lb} -network cross-region-lb create -g {rg} -n {lb2} -network cross-region-lb probe create -g {rg} --lb-name {lb2} -n probe1 --port 443 --protocol https --path "/test1" -network cross-region-lb probe list -g {rg} --lb-name {lb2} -network cross-region-lb create -g {rg} -n {lb} -network cross-region-lb rule create -g {rg} --lb-name {lb} -n rule2 --frontend-port 60 --backend-port 60 --protocol tcp -network cross-region-lb address-pool create -g {rg} --lb-name {lb} -n bap1 -network cross-region-lb address-pool create -g {rg} --lb-name {lb} -n bap2 -network cross-region-lb rule create -g {rg} --lb-name {lb} -n rule1 --frontend-ip-name LoadBalancerFrontEnd --frontend-port 40 --backend-pool-name bap1 --backend-port 40 --protocol tcp -network cross-region-lb rule list -g {rg} --lb-name {lb} -network cross-region-lb rule update -g {rg} --lb-name {lb} -n rule1 --floating-ip true --idle-timeout 20 --load-distribution sourceip --protocol udp -network cross-region-lb rule update -g {rg} --lb-name {lb} -n rule2 --backend-pool-name bap2 --load-distribution sourceipprotocol -network cross-region-lb rule show -g {rg} --lb-name {lb} -n rule1 -network cross-region-lb rule update -g {rg} --lb-name {lb} -n rule1 --set idleTimeoutInMinutes=5 -network cross-region-lb rule show -g {rg} --lb-name {lb} -n rule2 -network cross-region-lb rule delete -g {rg} --lb-name {lb} -n rule1 -network cross-region-lb rule delete -g {rg} --lb-name {lb} -n rule2 -network cross-region-lb rule list -g {rg} --lb-name {lb} -network public-ip create -g {rg} -n publicip1 --sku Standard -network public-ip create -g {rg} -n publicip2 --sku Standard -network public-ip create -g {rg} -n publicip3 --sku Standard -network cross-region-lb create -g {rg} -n lb1 --public-ip-address publicip1 -network cross-region-lb frontend-ip create -g {rg} --lb-name lb1 -n ipconfig1 --public-ip-address publicip2 -network cross-region-lb frontend-ip list -g {rg} --lb-name lb1 -network cross-region-lb frontend-ip update -g {rg} --lb-name lb1 -n ipconfig1 --public-ip-address publicip3 -network cross-region-lb frontend-ip show -g {rg} --lb-name lb1 -n ipconfig1 -network cross-region-lb frontend-ip update -g {rg} --lb-name lb1 -n ipconfig1 --set publicIpAddress.id="{ip2_id}" -network cross-region-lb frontend-ip delete -g {rg} --lb-name lb1 -n ipconfig1 -network cross-region-lb frontend-ip list -g {rg} --lb-name lb1 -network lb create -n {lb}1 -g {rg} -network lb create -n {lb}2 -g {rg} --public-ip-address-allocation static --tags foo=doo -network public-ip show -g {rg} -n PublicIP{lb}2 -network vnet create -n {vnet} -g {rg} --subnet-name default -network lb create -n {lb}3 -g {rg} --subnet {subnet_id} --private-ip-address {pri_ip} -network public-ip create -n {pub_ip} -g {rg} -network lb create -n {lb}4 -g {rg} --public-ip-address {pub_ip} -network lb list -network lb list --resource-group {rg} -network lb show --resource-group {rg} --name {lb}1 -network lb delete --resource-group {rg} --name {lb}1 -network lb list --resource-group {rg} -network public-ip create -g {rg} -n publicip1 -network public-ip create -g {rg} -n publicip2 -network public-ip create -g {rg} -n publicip3 -network lb create -g {rg} -n lb1 --public-ip-address publicip1 -network vnet create -g {rg} -n vnet1 --subnet-name subnet1 -network vnet subnet create -g {rg} --vnet-name vnet1 -n subnet2 --address-prefix 10.0.1.0/24 -network lb create -g {rg} -n lb2 --subnet subnet1 --vnet-name vnet1 -network lb frontend-ip create -g {rg} --lb-name lb1 -n ipconfig1 --public-ip-address publicip2 -network lb frontend-ip list -g {rg} --lb-name lb1 -network lb frontend-ip update -g {rg} --lb-name lb1 -n ipconfig1 --public-ip-address publicip3 -network lb frontend-ip show -g {rg} --lb-name lb1 -n ipconfig1 -network lb frontend-ip update -g {rg} --lb-name lb1 -n ipconfig1 --set publicIpAddress.id="{ip2_id}" -network lb frontend-ip delete -g {rg} --lb-name lb1 -n ipconfig1 -network lb frontend-ip list -g {rg} --lb-name lb1 -network lb frontend-ip create -g {rg} --lb-name lb2 -n ipconfig2 --vnet-name vnet1 --subnet subnet1 --private-ip-address 10.0.0.99 -network lb frontend-ip list -g {rg} --lb-name lb2 -network lb frontend-ip update -g {rg} --lb-name lb2 -n ipconfig2 --subnet subnet2 --vnet-name vnet1 --private-ip-address 10.0.1.100 -network lb frontend-ip show -g {rg} --lb-name lb2 -n ipconfig2 -network lb create -g {rg} -n {lb} --sku Standard -network public-ip prefix create -g {rg} -n {prefix} --length 30 -network lb frontend-ip create -g {rg} --lb-name {lb} -n {frontend2} --public-ip-prefix {prefix} -network lb outbound-rule create -g {rg} --lb-name {lb} -n {rule1} --address-pool {backend} --enable-tcp-reset --frontend-ip-configs {frontend1} --outbound-ports 512 --protocol Tcp -network lb outbound-rule create -g {rg} --lb-name {lb} -n {rule2} --address-pool {backend} --frontend-ip-configs {frontend2} --idle-timeout 20 --protocol all -network lb outbound-rule update -g {rg} --lb-name {lb} -n {rule2} --idle-timeout 25 -network lb outbound-rule list -g {rg} --lb-name {lb} -network lb outbound-rule show -g {rg} --lb-name {lb} -n {rule1} -network lb outbound-rule delete -g {rg} --lb-name {lb} -n {rule1} -network lb outbound-rule list -g {rg} --lb-name {lb} -network lb create -g {rg} -n {lb} -network lb address-pool create -g {rg} --lb-name {lb} -n bap1 -network lb address-pool create -g {rg} --lb-name {lb} -n bap2 -network lb address-pool create -g {rg} --lb-name {lb} -n bap3 -network lb address-pool list -g {rg} --lb-name {lb} -network lb address-pool show -g {rg} --lb-name {lb} -n bap1 -network lb address-pool delete -g {rg} --lb-name {lb} -n bap1 -network lb address-pool list -g {rg} --lb-name {lb} -network vnet create -g {rg} -n {vnet} --subnet-name subnet1 -network vnet subnet create -g {rg} -n {subnet_name} --vnet-name {vnet} --address-prefixes 10.0.1.0/24 -network nic create -g {rg} -n {nic} --subnet subnet1 --vnet-name {vnet} -network lb create -g {rg} -n {lb} --sku Standard -network vnet show -g {rg} -n {vnet} -network lb address-pool create -g {rg} --lb-name {lb} -n bap1 --vnet {vnet} --backend-address name=addr1 ip-address=10.0.0.1 --backend-address name=addr2 ip-address=10.0.0.2 --backend-address name=addr3 ip-address=10.0.0.3 -network lb address-pool create -g {rg} --lb-name {lb} -n bap2 --vnet {vnet} --backend-address name=addr1 ip-address=10.0.0.1 subnet={subnet} --backend-address name=addr2 ip-address=10.0.0.2 subnet={subnet_name} --backend-address name=addr3 ip-address=10.0.0.3 subnet={subnet} -network lb address-pool update -g {rg} --lb-name {lb} -n bap2 --vnet {vnet} --backend-address name=addr1 ip-address=10.0.0.3 subnet={subnet} --backend-address name=addr2 ip-address=10.0.0.4 subnet={subnet_name} --backend-address name=addr3 ip-address=10.0.0.5 subnet={subnet} -network lb address-pool delete -g {rg} --lb-name {lb} -n bap2 -network lb address-pool address add -g {rg} --lb-name {lb} --pool-name bap1 --name addr6 --vnet {vnet} --ip-address 10.0.0.6 -network lb address-pool address remove -g {rg} --lb-name {lb} --pool-name bap1 --name addr2 -network lb address-pool address list -g {rg} --lb-name {lb} --pool-name bap1 -network lb address-pool list -g {rg} --lb-name {lb} -network lb address-pool show -g {rg} --lb-name {lb} -n bap1 -network lb address-pool delete -g {rg} --lb-name {lb} -n bap1 -network lb address-pool list -g {rg} --lb-name {lb} -network lb address-pool create -g {rg} --lb-name {lb} -n bap1 --vnet {vnet} --backend-addresses-config-file @"{lb_address_pool_file_path}" -network lb address-pool address list -g {rg} --lb-name {lb} --pool-name bap1 -network lb address-pool delete -g {rg} --lb-name {lb} -n bap1 -network lb address-pool list -g {rg} --lb-name {lb} -network lb address-pool create -g {rg} --lb-name {lb} -n bap1 --vnet {vnet} -network lb address-pool address add -g {rg} --lb-name {lb} --pool-name bap1 --name addr6 --vnet {vnet} --ip-address 10.0.0.6 -network lb address-pool address list -g {rg} --lb-name {lb} --pool-name bap1 -network lb address-pool address add -g {rg} --lb-name {lb} --pool-name bap1 --name addr7 --subnet {subnet} --ip-address 10.0.0.7 -network lb address-pool address add -g {rg} --lb-name {lb} --pool-name bap1 --name addr8 --vnet {vnet} --subnet {subnet_name} --ip-address 10.0.0.8 -network lb address-pool address list -g {rg} --lb-name {lb} --pool-name bap1 -network lb create -g {rg} -n {lb} -network lb inbound-nat-pool create -g {rg} --lb-name {lb} -n rule1000 --protocol tcp --frontend-port-range-start 1000 --frontend-port-range-end 1999 --backend-port 1000 -network lb inbound-nat-pool create -g {rg} --lb-name {lb} -n rule2000 --protocol tcp --frontend-port-range-start 2000 --frontend-port-range-end 2999 --backend-port 2000 -network lb inbound-nat-pool create -g {rg} --lb-name {lb} -n rule3000 --protocol tcp --frontend-port-range-start 3000 --frontend-port-range-end 3999 --backend-port 3000 -network lb inbound-nat-pool list -g {rg} --lb-name {lb} -network lb inbound-nat-pool update -g {rg} --lb-name {lb} -n rule1000 --protocol udp --backend-port 50 --floating-ip --idle-timeout 20 -network lb inbound-nat-pool show -g {rg} --lb-name {lb} -n rule1000 -network lb inbound-nat-pool update -g {rg} --lb-name {lb} -n rule1000 --set protocol=Tcp -network lb inbound-nat-pool delete -g {rg} --lb-name {lb} -n rule1000 -network lb inbound-nat-pool delete -g {rg} --lb-name {lb} -n rule2000 -network lb inbound-nat-pool delete -g {rg} --lb-name {lb} -n rule3000 -network lb inbound-nat-pool list -g {rg} --lb-name {lb} -network lb create -g {rg} -n {lb} -network lb inbound-nat-rule create -g {rg} --lb-name {lb} -n rule1 --protocol tcp --frontend-port 1 --backend-port 1 --frontend-ip-name LoadBalancerFrontEnd -network lb inbound-nat-rule create -g {rg} --lb-name {lb} -n rule2 --protocol tcp --frontend-port 2 --backend-port 2 --frontend-ip-name LoadBalancerFrontEnd -network lb inbound-nat-rule create -g {rg} --lb-name {lb} -n rule3 --protocol tcp --frontend-port 3 --backend-port 3 -network lb inbound-nat-rule list -g {rg} --lb-name {lb} -network lb inbound-nat-rule update -g {rg} --lb-name {lb} -n rule1 --floating-ip true --idle-timeout 10 -network lb inbound-nat-rule show -g {rg} --lb-name {lb} -n rule1 -network lb inbound-nat-rule update -g {rg} --lb-name {lb} -n rule1 --set idleTimeoutInMinutes=5 -network lb inbound-nat-rule delete -g {rg} --lb-name {lb} -n rule1 -network lb inbound-nat-rule delete -g {rg} --lb-name {lb} -n rule2 -network lb inbound-nat-rule delete -g {rg} --lb-name {lb} -n rule3 -network lb inbound-nat-rule list -g {rg} --lb-name {lb} -network lb create -g {rg} -n {lb} --sku Standard -network lb inbound-nat-rule create -g {rg} --lb-name {lb} -n rule3 --protocol tcp --backend-port 3 --frontend-port-range-start 0 --frontend-port-range-end 3 -network lb inbound-nat-rule update -g {rg} --lb-name {lb} -n rule3 --floating-ip true --idle-timeout 10 --frontend-port-range-end 5 -network lb inbound-nat-rule delete -g {rg} --lb-name {lb} -n rule3 -network lb create -g {rg} -n {lb} -network lb probe create -g {rg} --lb-name {lb} -n probe1 --port 1 --protocol http --path "/test1" -network lb probe create -g {rg} --lb-name {lb} -n probe2 --port 2 --protocol http --path "/test2" -network lb probe create -g {rg} --lb-name {lb} -n probe3 --port 3 --protocol http --path "/test3" -network lb probe list -g {rg} --lb-name {lb} -network lb probe update -g {rg} --lb-name {lb} -n probe1 --interval 20 --threshold 5 -network lb probe update -g {rg} --lb-name {lb} -n probe2 --protocol tcp --path "" -network lb probe show -g {rg} --lb-name {lb} -n probe1 -network lb probe update -g {rg} --lb-name {lb} -n probe1 --set intervalInSeconds=15 --set numberOfProbes=3 -network lb probe show -g {rg} --lb-name {lb} -n probe2 -network lb probe delete -g {rg} --lb-name {lb} -n probe3 -network lb probe list -g {rg} --lb-name {lb} -network lb create -g {rg} -n {lb2} --sku standard -network lb probe create -g {rg} --lb-name {lb2} -n probe1 --port 443 --protocol https --path "/test1" -network lb probe list -g {rg} --lb-name {lb2} -network lb create -g {rg} -n {lb} -network lb rule create -g {rg} --lb-name {lb} -n rule2 --frontend-port 60 --backend-port 60 --protocol tcp -network lb address-pool create -g {rg} --lb-name {lb} -n bap1 -network lb address-pool create -g {rg} --lb-name {lb} -n bap2 -network lb rule create -g {rg} --lb-name {lb} -n rule1 --frontend-ip-name LoadBalancerFrontEnd --frontend-port 40 --backend-pool-name bap1 --backend-port 40 --protocol tcp -network lb rule list -g {rg} --lb-name {lb} -network lb rule update -g {rg} --lb-name {lb} -n rule1 --floating-ip true --idle-timeout 20 --load-distribution sourceip --protocol udp -network lb rule update -g {rg} --lb-name {lb} -n rule2 --backend-pool-name bap2 --load-distribution sourceipprotocol -network lb rule show -g {rg} --lb-name {lb} -n rule1 -network lb rule update -g {rg} --lb-name {lb} -n rule1 --set idleTimeoutInMinutes=5 -network lb rule show -g {rg} --lb-name {lb} -n rule2 -network lb rule delete -g {rg} --lb-name {lb} -n rule1 -network lb rule delete -g {rg} --lb-name {lb} -n rule2 -network lb rule list -g {rg} --lb-name {lb} -network local-gateway create --resource-group {rg} --name {lgw1} --gateway-ip-address 10.1.1.1 --tags foo=doo -network local-gateway update --resource-group {rg} --name {lgw1} --tags foo=boo -network local-gateway show --resource-group {rg} --name {lgw1} -network local-gateway create --resource-group {rg} --name {lgw2} --gateway-ip-address 10.1.1.2 --local-address-prefixes 10.0.1.0/24 -network local-gateway list --resource-group {rg} -network local-gateway delete --resource-group {rg} --name {lgw1} -network local-gateway list --resource-group {rg} -network vnet create -g {rg} -n {vnet} --subnet-name {subnet} -network nsg create -g {rg} -n {nsg1} -network nsg show -g {rg} -n {nsg1} -network nsg create -g {rg} -n {nsg2} -network public-ip create -g {rg} -n {pub_ip} -network public-ip show -g {rg} -n {pub_ip} -network lb create -g {rg} -n {lb} -network lb inbound-nat-rule create -g {rg} --lb-name {lb} -n rule1 --protocol tcp --frontend-port 100 --backend-port 100 --frontend-ip-name LoadBalancerFrontEnd -network lb inbound-nat-rule create -g {rg} --lb-name {lb} -n rule2 --protocol tcp --frontend-port 200 --backend-port 200 --frontend-ip-name LoadBalancerFrontEnd -network lb inbound-nat-rule list -g {rg} --lb-name {lb} --query "[].id" -network lb address-pool create -g {rg} --lb-name {lb} -n bap1 -network lb address-pool create -g {rg} --lb-name {lb} -n bap2 -network lb address-pool list -g {rg} --lb-name {lb} --query "[].id" -network nic create -g {rg} -n {nic} --subnet {subnet} --vnet-name {vnet} -network nic create -g {rg} -n {nic} --subnet {subnet_id} --ip-forwarding --private-ip-address {pri_ip} --public-ip-address {pub_ip} --internal-dns-name test --dns-servers 100.1.2.3 --lb-address-pools {address_pool_ids} --lb-inbound-nat-rules {rule_ids} --accelerated-networking --tags foo=doo -network lb list-nic -g {rg} -n {lb} -network nic create -g {rg} -n {nic} --subnet {subnet} --vnet-name {vnet} --network-security-group {nsg1} -network nic create -g {rg} -n {nic} --subnet {subnet} --vnet-name {vnet} --network-security-group {nsg_id} --public-ip-address {pub_ip_id} -network nic list -network nic list --resource-group {rg} -network nic show --resource-group {rg} --name {nic} -network nic update -g {rg} -n {nic} --internal-dns-name noodle --ip-forwarding true --accelerated-networking false --dns-servers "" --network-security-group {nsg2} -network nic update -g {rg} -n {nic} --set dnsSettings.internalDnsNameLabel=doodle --set enableIpForwarding=false -network nic delete --resource-group {rg} --name {nic} -network nic list -g {rg} -network vnet create -g {rg} -n {vnet} --subnet-name {subnet1} --defer -network vnet subnet create -g {rg} --vnet-name {vnet} -n {subnet2} --address-prefix 10.0.1.0/24 -network application-gateway create -g {rg} -n {ag} --vnet-name {vnet} --subnet {subnet1} --no-wait -network application-gateway wait -g {rg} -n {ag} --exists --timeout 120 -network application-gateway address-pool update -g {rg} --gateway-name {ag} -n {pool1} --add backendAddresses '{ipaddres}' -network application-gateway address-pool update -g {rg} --gateway-name {ag} -n {pool1} --add backendAddresses '{ipaddres}' -network application-gateway address-pool create -g {rg} --gateway-name {ag} -n {pool2} --no-wait -network lb create -g {rg} -n {lb} -network lb address-pool create -g {rg} --lb-name {lb} -n {bap} -network nic create -g {rg} -n {nic} --subnet {subnet2} --vnet-name {vnet} --gateway-name {ag} --app-gateway-address-pools {pool1} -network nic ip-config create -g {rg} --nic-name {nic} -n {config2} --subnet {subnet2} --vnet-name {vnet} --gateway-name {ag} --app-gateway-address-pools {pool2} -network nic ip-config update -g {rg} --nic-name {nic} -n {config1} --gateway-name {ag} --app-gateway-address-pools {pool1} {pool2} -network nic ip-config address-pool add -g {rg} --nic-name {nic} --lb-name {lb} --address-pool {bap} --ip-config-name {config1} -network vnet create -g {rg} -n {vnet} --subnet-name {subnet1} --defer -network vnet subnet create -g {rg} --vnet-name {vnet} -n {subnet2} --address-prefix 10.0.1.0/24 -network application-gateway create -g {rg} -n {ag} --vnet-name {vnet} --subnet {subnet1} --no-wait -network application-gateway wait -g {rg} -n {ag} --exists --timeout 120 -network application-gateway address-pool create -g {rg} --gateway-name {ag} -n {pool} --no-wait -network application-gateway address-pool show -g {rg} --gateway-name {ag} -n {pool} -network nic create -g {rg} -n {nic} --subnet {subnet2} --vnet-name {vnet} -network nic ip-config address-pool add -g {rg} --gateway-name {ag} --nic-name {nic} --ip-config-name {config} --address-pool {pool} -network nic ip-config address-pool remove -g {rg} --gateway-name {ag} --nic-name {nic} --ip-config-name {config} --address-pool {pool} -network nic ip-config address-pool add -g {rg} --nic-name {nic} --ip-config-name {config} --address-pool {ag_pool_id} -network nic ip-config address-pool remove -g {rg} --nic-name {nic} --ip-config-name {config} --address-pool {ag_pool_id} -network vnet create -g {rg} -n vnet1 --subnet-name subnet1 -network nic create -g {rg} -n {nic} --subnet subnet1 --vnet-name vnet1 -network lb create -g {rg} -n {lb} -network lb address-pool create -g {rg} --lb-name {lb} -n {pool} -network lb address-pool show -g {rg} --lb-name {lb} -n {pool} -network nic ip-config address-pool add -g {rg} --lb-name {lb} --nic-name {nic} --ip-config-name {config} --address-pool {pool} -network nic ip-config address-pool remove -g {rg} --lb-name {lb} --nic-name {nic} --ip-config-name {config} --address-pool {pool} -network nic ip-config address-pool add -g {rg} --nic-name {nic} --ip-config-name {config} --address-pool {lb_pool_id} -network nic ip-config address-pool remove -g {rg} --nic-name {nic} --ip-config-name {config} --address-pool {lb_pool_id} -network vnet create -g {rg} -n vnet1 --subnet-name subnet1 -network nic create -g {rg} -n {nic} --subnet subnet1 --vnet-name vnet1 -network nic ip-config list -g {rg} --nic-name {nic} -network nic ip-config show -g {rg} --nic-name {nic} -n ipconfig1 -network nic ip-config create -g {rg} --nic-name {nic} -n ipconfig2 --make-primary -network nic ip-config update -g {rg} --nic-name {nic} -n ipconfig1 --make-primary -network nic ip-config delete -g {rg} --nic-name {nic} -n ipconfig2 -network vnet create -g {rg} -n {vnet} --subnet-name {subnet} -network public-ip create -g {rg} -n {ip} -network public-ip show -g {rg} -n {ip} -network lb create -g {rg} -n {lb} -network lb inbound-nat-rule create -g {rg} --lb-name {lb} -n rule1 --protocol tcp --frontend-port 100 --backend-port 100 --frontend-ip-name LoadBalancerFrontEnd -network lb inbound-nat-rule create -g {rg} --lb-name {lb} -n rule2 --protocol tcp --frontend-port 200 --backend-port 200 --frontend-ip-name LoadBalancerFrontEnd -network lb inbound-nat-rule show -g {rg} --lb-name {lb} -n rule1 -network lb address-pool create -g {rg} --lb-name {lb} -n bap1 -network lb address-pool create -g {rg} --lb-name {lb} -n bap2 -network lb address-pool show -g {rg} --lb-name {lb} -n bap1 -network nic ip-config update -g {rg} --nic-name {nic} -n {config} --lb-name {lb} --lb-address-pools {bap1_id} bap2 --lb-inbound-nat-rules {rule1_id} rule2 --private-ip-address {private_ip} -network nic ip-config update -g {rg} --nic-name {nic} -n {config} --set privateIpAddress=10.0.0.50 -network nic ip-config inbound-nat-rule remove -g {rg} --lb-name {lb} --nic-name {nic} --ip-config-name {config} --inbound-nat-rule rule1 -network nic ip-config inbound-nat-rule add -g {rg} --lb-name {lb} --nic-name {nic} --ip-config-name {config} --inbound-nat-rule rule1 -network nic ip-config address-pool remove -g {rg} --lb-name {lb} --nic-name {nic} --ip-config-name {config} --address-pool bap1 -network nic ip-config address-pool add -g {rg} --lb-name {lb} --nic-name {nic} --ip-config-name {config} --address-pool bap1 -network nic ip-config update -g {rg} --nic-name {nic} -n {config} --private-ip-address "" --public-ip-address {ip_id} -network nic ip-config update -g {rg} --nic-name {nic} -n {config} --subnet {subnet} --vnet-name {vnet} -vm create -g {rg} -n {vm} --image UbuntuLTS --admin-username myusername --admin-password aBcD1234!@#$ --authentication-type password --nsg-rule None -vm show -g {rg} -n {vm} --query "networkProfile.networkInterfaces[0].id" -network nic list-effective-nsg --ids {nic_id} -network nic show-effective-route-table --ids {nic_id} -network nsg create --name {nsg} -g {rg} -network nsg rule create --access allow --destination-address-prefixes 10.0.0.0/24 11.0.0.0/24 --direction inbound --nsg-name {nsg} --protocol * -g {rg} --source-address-prefix * -n {rule} --source-port-range 700-900 1000-1100 --destination-port-range 4444 --priority 1000 -network nsg rule update --destination-address-prefixes Internet --nsg-name {nsg} -g {rg} --source-address-prefix 10.0.0.0/24 11.0.0.0/24 -n {rule} --source-port-range * --destination-port-range 500-1000 2000 3000 -network nsg create --name {nsg} -g {rg} --tags foo=doo -network nsg rule create --access allow --destination-address-prefix 1234 --direction inbound --nsg-name {nsg} --protocol * -g {rg} --source-address-prefix 789 -n {rule} --source-port-range * --destination-port-range 4444 --priority 1000 -network nsg list -network nsg list --resource-group {rg} -network nsg show --resource-group {rg} --name {nsg} -network nsg rule list --resource-group {rg} --nsg-name {nsg} -network nsg rule show --resource-group {rg} --nsg-name {nsg} --name {rule} -network nsg rule update -g {rg} --nsg-name {nsg} -n {rule} --direction {dir} --access {access} --destination-address-prefix {prefix} --protocol {protocol} --source-address-prefix {prefix} --source-port-range {ports} --destination-port-range {ports} --priority {priority} --description {desc} -network nsg rule update -g {rg} --nsg-name {nsg} -n {rule} --set description="cool" -network nsg rule delete --resource-group {rg} --nsg-name {nsg} --name {rule} -network nsg delete --resource-group {rg} --name {nsg} -network nsg list --resource-group {rg} -network route-table create -n {table} -g {rg} --tags foo=doo -network route-table update -n {table} -g {rg} --tags foo=boo --disable-bgp-route-propagation -network route-table route create --address-prefix 10.0.5.0/24 -n {route} -g {rg} --next-hop-type None --route-table-name {table} -network route-table list -network route-table list --resource-group {rg} -network route-table show --resource-group {rg} --name {table} -network route-table route list --resource-group {rg} --route-table-name {table} -network route-table route show --resource-group {rg} --route-table-name {table} --name {route} -network route-table route delete --resource-group {rg} --route-table-name {table} --name {route} -network route-table route list --resource-group {rg} --route-table-name {table} -network route-table delete --resource-group {rg} --name {table} -network route-table list --resource-group {rg} -network vnet create --resource-group {rg} --name {vnet} --subnet-name default -network vnet check-ip-address -g {rg} -n {vnet} --ip-address 10.0.0.50 -network vnet check-ip-address -g {rg} -n {vnet} --ip-address 10.0.0.0 -network vnet list -network vnet list --resource-group {rg} -network vnet show --resource-group {rg} --name {vnet} -network vnet update --resource-group {rg} --name {vnet} --address-prefixes {prefixes} --dns-servers 1.2.3.4 -network vnet update -g {rg} -n {vnet} --dns-servers "" -network vnet update --resource-group {rg} --name {vnet} --set addressSpace.addressPrefixes[0]="20.0.0.0/24" -network vnet subnet create --resource-group {rg} --vnet-name {vnet} --name {subnet} --address-prefix 20.0.0.0/24 -network vnet subnet list --resource-group {rg} --vnet-name {vnet} -network vnet subnet show --resource-group {rg} --vnet-name {vnet} --name {subnet} -network vnet subnet delete --resource-group {rg} --vnet-name {vnet} --name {subnet} -network vnet subnet list --resource-group {rg} --vnet-name {vnet} -network vnet list --resource-group {rg} -network vnet delete --resource-group {rg} --name {vnet} -network vnet list --resource-group {rg} -network vnet create --resource-group {rg} --name {vnet} --subnet-name default -network vnet update --resource-group {rg} --name {vnet} --address-prefixes {prefixes} --dns-servers 1.2.3.4 -network vnet subnet create --resource-group {rg} --vnet-name {vnet} --name {subnet} --address-prefix 20.0.0.0/24 -network vnet list-available-ips -g {rg} --name {vnet} -network vnet create --resource-group {rg} --name {vnet} --subnet-name default --bgp-community "12076:20000" -network vnet update --resource-group {rg} --name {vnet} --bgp-community "12076:20001" -network vnet create --address-prefixes 10.0.0.0/16 -n MyVnet1 -g {rg} --subnet-name Mysubnet --subnet-prefixes 10.0.0.0/24 --enable-encryption true --encryption-enforcement-policy allowUnencrypted -network vnet create --address-prefixes 10.1.0.0/16 -n MyVnet2 -g {rg} --subnet-name MySubnet --subnet-prefixes 10.1.0.0/24 --enable-encryption true --encryption-enforcement-policy dropUnencrypted -network vnet show -n MyVnet1 -g {rg} -network vnet show -n MyVnet2 -g {rg} -network vnet create --address-prefixes 10.2.0.0/16 --name MyVnet3 --resource-group {rg} --subnet-name Mysubnet --subnet-prefixes 10.2.0.0/24 --enable-encryption false -network vnet create --address-prefixes 10.3.0.0/16 --name MyVnet4 --resource-group {rg} --subnet-name MySubnet --subnet-prefixes 10.3.0.0/24 --enable-encryption true -network vnet update --name MyVnet3 --resource-group {rg} --enable-encryption true --encryption-enforcement-policy allowUnencrypted -network vnet update --name MyVnet3 --resource-group {rg} --enable-encryption true --encryption-enforcement-policy dropUnencrypted -network vnet create --address-prefixes 10.4.0.0/16 --name MyVnet5 --resource-group {rg} --subnet-name Mysubnet --subnet-prefixes 10.4.0.0/24 --encryption-enforcement-policy allowUnencrypted -network vnet create --address-prefixes 10.5.0.0/16 --name MyVnet6 --resource-group {rg} --subnet-name Mysubnet --subnet-prefixes 10.5.0.0/24 -network vnet create --address-prefixes 10.6.0.0/16 --name MyVnet7 --resource-group {rg} --subnet-name Mysubnet --subnet-prefixes 10.6.0.0/24 -network vnet create --address-prefixes 10.7.0.0/16 --name MyVnet8 --resource-group {rg} --subnet-name Mysubnet --subnet-prefixes 10.7.0.0/24 -network vnet update --name MyVnet6 --resource-group {rg} --enable-encryption true -network vnet update --name MyVnet7 --resource-group {rg} --encryption-enforcement-policy dropUnencrypted -network vnet update --name MyVnet8 --resource-group {rg} --enable-encryption true --encryption-enforcement-policy dropUnencrypted -network vnet peering create --name MyVnet1ToMyVnet2 --remote-vnet MyVnet2 --resource-group {rg} --vnet-name MyVnet1 -network vnet peering show --name MyVnet1ToMyVnet2 --vnet-name MyVnet1 -g {rg} -network nsg create --resource-group {rg} --name {nsg} -network vnet create --resource-group {rg} --name {vnet} --address-prefixes {prefixes} --subnet-name {subnet} --subnet-prefixes 20.0.0.0/24 --nsg {nsg} -network vnet subnet list --resource-group {rg} --vnet-name {vnet} -network vnet subnet show --resource-group {rg} --vnet-name {vnet} --name {subnet} -network vnet subnet delete --resource-group {rg} --vnet-name {vnet} --name {subnet} -network vnet create -g {rg} -n {vnet} --address-prefix 10.0.0.0/16 --defer -network vnet subnet create -g {rg} --vnet-name {vnet} -n subnet1 --address-prefix 10.0.0.0/24 --defer -network vnet subnet create -g {rg} --vnet-name {vnet} -n subnet2 --address-prefix 10.0.1.0/24 --defer -network vnet show -g {rg} -n {vnet} -cache show -g {rg} -n {vnet} -t VirtualNetwork -network vnet subnet create -g {rg} --vnet-name {vnet} -n subnet3 --address-prefix 10.0.2.0/24 -network vnet show -g {rg} -n {vnet} -cache show -g {rg} -n {vnet} -t VirtualNetwork -network vnet update -g {rg} -n {vnet} --set tags.a=1 --defer -network vnet update -g {rg} -n {vnet} --set tags.b=2 -network vnet show -g {rg} -n {vnet} -network vnet create -g {rg} -n vnet --flowtimeout {time} -network vnet update -g {rg} -n vnet --flowtimeout {time1} -network vnet create -g {rg} -n vnet1 -network vnet create -g {rg} -n vnet2 --subnet-name GatewaySubnet --address-prefix 11.0.0.0/16 --subnet-prefix 11.0.0.0/24 -network public-ip create -g {rg} -n ip1 -network public-ip show -g {rg} -n ip1 --query id -network vnet show -g {rg} -n vnet2 --query id -network vnet-gateway create -g {rg} -n gateway1 --public-ip-address {ip_id} --vnet {vnet_id} --tags foo=doo -network vnet show -g {rg} -n vnet1 --query id -network vnet show -g {rg} -n vnet2 --query id -network vnet peering create -g {rg} -n peering2 --vnet-name vnet2 --remote-vnet {vnet1_id} --allow-gateway-transit -network vnet peering create -g {rg} -n peering1 --vnet-name vnet1 --remote-vnet vnet2 --use-remote-gateways --allow-forwarded-traffic -network vnet peering show -g {rg} -n peering1 --vnet-name vnet1 -network vnet peering list -g {rg} --vnet-name vnet2 -network vnet peering update -g {rg} -n peering1 --vnet-name vnet1 --set useRemoteGateways=false -network vnet peering delete -g {rg} -n peering1 --vnet-name vnet1 -network vnet peering list -g {rg} --vnet-name vnet1 -network vnet peering delete -g {rg} -n peering2 --vnet-name vnet2 -network vnet-gateway delete -g {rg} -n gateway1 -network vnet create -g {rg} -n {vnet1} --address-prefix {vnet_prefix1} {vnet_prefix2} -network vnet subnet create -g {rg} --vnet-name {vnet1} -n {fe_sub1} --address-prefix {fe_sub_prefix1} -network vnet subnet create -g {rg} --vnet-name {vnet1} -n {be_sub1} --address-prefix {be_sub_prefix1} -network vnet subnet create -g {rg} --vnet-name {vnet1} -n {gw_sub1} --address-prefix {gw_sub_prefix1} -network public-ip create -g {rg} -n {gw1ip} -network vnet-gateway create -g {rg} -n {gw1} --public-ip-address {gw1ip} --vnet {vnet1} --sku {gw1_sku} -network local-gateway create -g {rg} -n {lgw1} --gateway-ip-address {lgw1ip} --local-address-prefixes {lgw1_prefix1} {lgw1_prefix2} -network vpn-connection create -g {rg} -n {conn1} --vnet-gateway1 {gw1} --local-gateway2 {lgw1} --shared-key AzureA1b2C3 -network vpn-connection list -g {rg} -network vpn-connection list -g {rg} --vnet-gateway {gw1} -network vpn-connection ipsec-policy add -g {rg} --connection-name {conn1} --ike-encryption AES256 --ike-integrity SHA384 --dh-group DHGroup24 --ipsec-encryption GCMAES256 --ipsec-integrity GCMAES256 --pfs-group PFS24 --sa-lifetime 7200 --sa-max-size 2048 -network vpn-connection ipsec-policy list -g {rg} --connection-name {conn1} -network vpn-connection ipsec-policy clear -g {rg} --connection-name {conn1} -network vpn-connection ipsec-policy list -g {rg} --connection-name {conn1} -network vnet create -g {rg} -n {vnet} --subnet-name {subnet} -network public-ip create -g {rg} -n {ip} -network vnet-gateway create -g {rg} -n {vg} --vnet {vnet} --public-ip-address {ip} --sku {sku} --nat-rule name={nat} mode=IngressSnat internal-mappings={i_map} external-mappings={e_map} --nat-rule name={nat1} mode=EgressSnat internal-mappings={i_map1} external-mappings={e_map1} -network local-gateway create -g {rg} -n {lgw1} --gateway-ip-address {lgw1ip} --local-address-prefixes {lgw1_prefix1} {lgw1_prefix2} -network vpn-connection create -g {rg} -n {conn1} --vnet-gateway1 {vg} --local-gateway2 {lgw1} --shared-key AzureA1b2C3 --ingress-nat-rule {id} -network vpn-connection delete -g {rg} -n {conn1} -network vpn-connection create -g {rg} -n {conn1} --vnet-gateway1 {vg} --local-gateway2 {lgw1} --shared-key AzureA1b2C3 --egress-nat-rule {id1} -network vnet create -g {rg} -n {vnet} --subnet-name GatewaySubnet -network public-ip create -g {rg} -n {ip} -network vnet-gateway create -g {rg} -n {gw} --public-ip-address {ip} --vnet {vnet} --sku {gw_sku} --gateway-type Vpn --vpn-type RouteBased --address-prefix 40.1.0.0/24 --client-protocol IkeV2 SSTP --radius-secret 111_aaa --radius-server 30.1.1.15 -network vnet-gateway ipsec-policy add -g {rg} --gateway-name {gw} --ike-encryption AES256 --ike-integrity SHA384 --dh-group DHGroup24 --ipsec-encryption GCMAES256 --ipsec-integrity GCMAES256 --pfs-group PFS24 --sa-lifetime 7200 --sa-max-size 2048 -network vnet-gateway ipsec-policy list -g {rg} --gateway-name {gw} -network vnet-gateway ipsec-policy clear -g {rg} --gateway-name {gw} -network vnet-gateway ipsec-policy list -g {rg} --gateway-name {gw} -network vnet-gateway vpn-client show-health -g {rg} -n {gw} -network vnet-gateway show-supported-devices -g {rg} -n {gw} -o tsv -network vnet create -g {rg} -n {vnet} --subnet-name GatewaySubnet -network public-ip create -g {rg} -n {ip} -network vnet-gateway create -g {rg} -n {gw} --public-ip-address {ip} --vnet {vnet} --sku {gw_sku} --gateway-type Vpn --vpn-type RouteBased --address-prefix 40.1.0.0/24 --client-protocol OpenVPN --aad-audience {aad_audience} --aad-issuer {aad_issuer} --aad-tenant {aad_tenant} --root-cert-name {root_cert_name} --root-cert-data "{root_cert_data}" --radius-secret 111_aaa --radius-server 30.1.1.15 --vpn-auth-type AAD Certificate Radius -network vnet create -g {rg} -n {vnet} --subnet-name GatewaySubnet -network public-ip create -g {rg} -n {ip} -network vnet-gateway create -g {rg} -n {gw} --public-ip-address {ip} --vnet {vnet} --sku {gw_sku} --gateway-type Vpn --vpn-type RouteBased --address-prefix 40.1.0.0/24 --client-protocol OpenVPN -network vnet-gateway update -g {rg} -n {gw} --vpn-auth-type AAD Certificate Radius --aad-audience {aad_audience} --aad-issuer {aad_issuer} --aad-tenant {aad_tenant} --root-cert-name {root_cert_name} --root-cert-data "{root_cert_data}" --radius-secret 111_aaa --radius-server 30.1.1.15 -network vnet create -g {rg} -n {vnet} --location {location} --subnet-name {subnet1} --address-prefix 10.0.0.0/24 -network vnet subnet update -g {rg} --vnet-name {vnet} -n {subnet1} --remove networkSecurityGroup -network vnet show -g {rg} -n {vnet} -network public-ip create -g {rg} -n {vhr_ip1} -network routeserver create -g {rg} -l {location} -n {vrouter} --hosted-subnet {subnet1_id} --public-ip-address {vhr_ip1} -network routeserver update -g {rg} --name {vrouter} --allow-b2b-traffic -network routeserver list -g {rg} -network routeserver show -g {rg} -n {vrouter} -network routeserver peering create -g {rg} --routeserver {vrouter} -n {peer} --peer-asn 11000 --peer-ip 10.0.0.120 -network routeserver peering list -g {rg} --routeserver {vrouter} -network routeserver peering show -g {rg} --routeserver {vrouter} -n {peer} -network routeserver peering list-advertised-routes -g {rg} --routeserver {vrouter} -n {peer} -network routeserver peering list-learned-routes -g {rg} --routeserver {vrouter} -n {peer} -network routeserver peering delete -g {rg} --routeserver {vrouter} -n {peer} -y -network routeserver delete -g {rg} -n {vrouter} -y -network vnet subnet list-available-delegations -l westcentralus -network vnet subnet list-available-delegations -g {rg} -network vnet create -g {rg} -n {vnet} -l westcentralus -network vnet subnet create -g {rg} --vnet-name {vnet} -n {subnet} --address-prefix 10.0.0.0/24 --delegations Microsoft.Web.serverFarms -network vnet subnet update -g {rg} --vnet-name {vnet} -n {subnet} --delegations Microsoft.Sql/managedInstances -network vnet list-endpoint-services -l westus -network vnet create -g {rg} -n {vnet} -network vnet subnet create -g {rg} --vnet-name {vnet} -n {subnet} --address-prefix 10.0.1.0/24 --service-endpoints Microsoft.Storage -network vnet subnet update -g {rg} --vnet-name {vnet} -n {subnet} --service-endpoints "" -network vnet create --resource-group {rg} --name {vnet} --address-prefix {vnet_prefix} --subnet-name {subnet} --subnet-prefix {subnet_prefix} -network nsg create --resource-group {rg} --name {nsg} -network vnet subnet update --resource-group {rg} --vnet-name {vnet} --name {subnet} --address-prefix {subnet_prefix2} --network-security-group {nsg} -network vnet subnet update -g {rg} --vnet-name {vnet} -n {subnet} --set addressPrefix=123.0.0.0/24 -network vnet subnet update --resource-group {rg} --vnet-name {vnet} --name {subnet} --address-prefix {subnet_prefix2} --network-security-group "" -network vnet delete --resource-group {rg} --name {vnet} -network nsg delete --resource-group {rg} --name {nsg} -network vnet create -g {rg} -n {vnet} -network vnet subnet create -g {rg} --vnet-name {vnet} --address-prefixes 10.0.1.0/24 --name {subnet1} --disable-private-endpoint-network-policies true -network vnet subnet create -g {rg} --vnet-name {vnet} --address-prefixes 10.0.2.0/24 --name {subnet2} --disable-private-link-service-network-policies true -network vnet subnet create -g {rg} --vnet-name {vnet} --address-prefixes 10.0.3.0/24 --name {subnet3} --disable-private-endpoint-network-policies true --disable-private-link-service-network-policies true -network vnet create -g {rg} -n {vnet1} --address-prefix {vnet_prefix1} {vnet_prefix2} --subnet-name {gw_subnet} --subnet-prefix {gw_subnet_prefix} -network public-ip create -g {rg} -n {gw_ip1} -network public-ip create -g {rg} -n {gw_ip2} -network vnet-gateway create -g {rg} -n {gw1} --vnet {vnet1} --sku HighPerformance --asn {vnet1_asn} --public-ip-addresses {gw_ip1} {gw_ip2} --tags foo=doo -network vnet-gateway update -g {rg} -n {gw1} --vnet {vnet1} --sku HighPerformance --asn {vnet1_asn} --public-ip-addresses {gw_ip1} --no-wait --tags foo=boo -network local-gateway create -g {rg} -n {lgw2} -l {lgw_loc} --gateway-ip-address {lgw_ip} --local-address-prefixes {lgw_prefix} --asn {lgw_asn} --bgp-peering-address {bgp_peer1} -network vpn-connection create -g {rg} -n {conn_151} --vnet-gateway1 {gw1} --local-gateway2 {lgw2} --shared-key {shared_key} --enable-bgp -network vpn-connection shared-key reset -g {rg} --connection-name {conn_151} --key-length 128 -network vpn-connection shared-key show -g {rg} --connection-name {conn_151} -network vpn-connection shared-key update -g {rg} --connection-name {conn_151} --value {shared_key2} -network vpn-connection shared-key show -g {rg} --connection-name {conn_151} -network local-gateway create -g {rg} -n {lgw3} -l {lgw_loc} --gateway-ip-address {lgw3_ip} --local-address-prefixes {lgw3_prefix} --asn {lgw_asn} --bgp-peering-address {bgp_peer2} -network vpn-connection create -g {rg} -n {conn_152} --vnet-gateway1 {gw1} --local-gateway2 {lgw3} --shared-key {shared_key} --enable-bgp -storage container create --account-name {storage_account} --name {ctn} -storage blob generate-sas -n src --account-name {storage_account} -c {ctn} --permissions acrwd --expiry {expiry} -otsv -network vnet create -g {rg} -n {vnet1} --address-prefix {vnet1_prefix} --subnet-name {subnet} --subnet-prefix {gw1_prefix} -network public-ip create -g {rg} -n {gw1_ip1} -network public-ip create -g {rg} -n {gw1_ip2} -network vnet create -g {rg} -n {vnet2} --address-prefix {vnet2_prefix} --subnet-name {subnet} --subnet-prefix {gw2_prefix} -network public-ip create -g {rg} -n {gw2_ip1} -network public-ip create -g {rg} -n {gw2_ip2} -network vnet-gateway create -g {rg} -n {gw1} --vnet {vnet1} --sku HighPerformance --asn {vnet1_asn} --public-ip-addresses {gw1_ip1} {gw1_ip2} --bgp-peering-address {bgp_peer1} --no-wait -network vnet-gateway create -g {rg} -n {gw2} --vnet {vnet2} --sku HighPerformance --asn {vnet2_asn} --public-ip-addresses {gw2_ip1} {gw2_ip2} --bgp-peering-address {bgp_peer2} --no-wait -network vnet-gateway wait -g {rg} -n {gw1} --created -network vnet-gateway wait -g {rg} -n {gw2} --created -network vpn-connection create -g {rg} -n {conn12} --vnet-gateway1 {gw1} --vnet-gateway2 {gw2} --shared-key {key} --enable-bgp -network vpn-connection create -g {rg} -n {conn21} --vnet-gateway1 {gw2} --vnet-gateway2 {gw1} --shared-key {key} --enable-bgp -network vpn-connection list-ike-sas -g {rg} -n {conn12} -network vpn-connection packet-capture start -g {rg} -n {conn12} -network vpn-connection packet-capture stop -g {rg} -n {conn12} --sas-url {sas_url} -network public-ip create -n {ip1} -g {rg} -network public-ip create -n {ip2} -g {rg} -network public-ip create -n {ip3} -g {rg} -network vnet create -g {rg} -n {vnet1} --subnet-name GatewaySubnet --address-prefix 10.0.0.0/16 --subnet-prefix 10.0.0.0/24 -network vnet create -g {rg} -n {vnet2} --subnet-name GatewaySubnet --address-prefix 10.1.0.0/16 -network vnet create -g {rg} -n {vnet3} --subnet-name GatewaySubnet --address-prefix 10.2.0.0/16 -network vnet-gateway create -g {rg} -n {gw1} --vnet {vnet1_id} --public-ip-address {ip1} --gateway-type ExpressRoute --vpn-gateway-generation Generation1 -network vnet-gateway create -g {rg} -n {gw1} --vnet {vnet1_id} --public-ip-address {ip1} --vpn-gateway-generation Generation1 --custom-routes {custom_routes1} --no-wait -network vnet-gateway create -g {rg} -n {gw2} --vnet {vnet2_id} --public-ip-address {ip2} --no-wait -network vnet-gateway create -g {rg} -n {gw3} --vnet {vnet3} --public-ip-address {ip3} --no-wait --sku standard --asn 12345 --bgp-peering-address 10.2.250.250 --peer-weight 50 -network vnet-gateway wait -g {rg} -n {gw1} --created -network vnet-gateway wait -g {rg} -n {gw2} --created -network vnet-gateway wait -g {rg} -n {gw3} --created -network vnet-gateway show -g {rg} -n {gw1} -network vnet-gateway update -g {rg} -n {gw1} --sku Standard --custom-routes {custom_routes1} {custom_routes2} -network vnet-gateway show -g {rg} -n {gw2} -network vnet-gateway show -g {rg} -n {gw3} -network vpn-connection create -n {conn12} -g {rg} --shared-key 123 --vnet-gateway1 {gw1_id} --vnet-gateway2 {gw2} --tags foo=doo -network vpn-connection update -n {conn12} -g {rg} --routing-weight 25 --tags foo=boo -network vpn-connection create -n {conn21} -g {rg} --shared-key 123 --vnet-gateway2 {gw1_id} --vnet-gateway1 {gw2} -network vnet-gateway list-learned-routes -g {rg} -n {gw1} -network vnet-gateway list-advertised-routes -g {rg} -n {gw1} --peer 10.1.1.1 -network vnet-gateway list-bgp-peer-status -g {rg} -n {gw1} --peer 10.1.1.1 -network vpn-connection list -g {rg} --vnet-gateway {gw1} -network public-ip create -g {rg} -n {ip} -network vnet create -g {rg} -n {vnet} --subnet-name GatewaySubnet -network vnet-gateway create -g {rg} -n {gw} --vnet {vnet} --public-ip-address {ip} --gateway-type Vpn --vpn-type RouteBased --sku VpnGw1 --client-protocol OpenVPN --address-prefixes 201.169.0.0/16 -network vnet-gateway show -g {rg} -n {gw} -network vnet-gateway aad assign -g {rg} --gateway-name {gw} --tenant {aad_tenant} --audience {aad_audience} --issuer {aad_issuer} -network vnet-gateway show -g {rg} -n {gw} -network vnet-gateway aad show -g {rg} --gateway-name {gw} -network vnet-gateway aad remove -g {rg} --gateway-name {gw} -network vnet-gateway aad show -g {rg} --gateway-name {gw} -network public-ip create -n {ip1} -g {rg} -network public-ip create -n {ip2} -g {rg} -network vnet create -g {rg} -n {vnet1} --subnet-name GatewaySubnet --address-prefix 10.0.0.0/16 -network vnet create -g {rg} -n {vnet2} --subnet-name GatewaySubnet --address-prefix 10.1.0.0/16 -network vnet-gateway create -g {rg} -n {gw1} --vnet {vnet1} --public-ip-address {ip1} --vpn-gateway-generation Generation1 --address-prefixes 201.169.0.0/16 --no-wait -network vnet-gateway create -g {rg} -n {gw2} --vnet {vnet2} --public-ip-address {ip2} --vpn-gateway-generation Generation1 --no-wait -network vnet-gateway wait -g {rg} -n {gw1} --created -network vnet-gateway wait -g {rg} -n {gw2} --created -network vpn-connection create -n {conn12} -g {rg} --shared-key 123 --vnet-gateway1 {gw1} --vnet-gateway2 {gw2} -network vpn-connection create -n {conn21} -g {rg} --shared-key 123 --vnet-gateway2 {gw1} --vnet-gateway1 {gw2} -network vnet-gateway disconnect-vpn-connections -g {rg} -n {gw1} --vpn-connections {conn12} -storage container create --account-name {storage_account} --name {ctn} -storage blob generate-sas -n src --account-name {storage_account} -c {ctn} --permissions acrwd --expiry {expiry} -otsv -network public-ip create -n {ip1} -g {rg} -network vnet create -g {rg} -n {vnet1} --subnet-name GatewaySubnet --address-prefix 10.0.0.0/16 --subnet-prefix 10.0.0.0/24 -network vnet-gateway create -g {rg} -n {gw1} --vnet {vnet1} --public-ip-address {ip1} --sku {gw1_sku} -network vnet-gateway packet-capture start -g {rg} -n {gw1} -network vnet-gateway packet-capture stop -g {rg} -n {gw1} --sas-url {sas_url} -network traffic-manager profile check-dns -n myfoobar1 -network traffic-manager profile create -n {tm} -g {rg} --routing-method priority --unique-dns-name {dns} --tags foo=doo -network traffic-manager profile show -g {rg} -n {tm} -network traffic-manager profile update -n {tm} -g {rg} --routing-method weighted --tags foo=boo -network traffic-manager profile list -g {rg} -network traffic-manager endpoint create -n {endpoint} --profile-name {tm} -g {rg} --type externalEndpoints --weight 50 --target www.microsoft.com -network traffic-manager endpoint update -n {endpoint} --profile-name {tm} -g {rg} --type externalEndpoints --weight 25 --target www.contoso.com -network traffic-manager endpoint show -g {rg} --profile-name {tm} -t externalEndpoints -n {endpoint} -network traffic-manager endpoint list -g {rg} --profile-name {tm} -t externalEndpoints -network traffic-manager profile update -n {tm} -g {rg} -network traffic-manager endpoint delete -g {rg} --profile-name {tm} -t externalEndpoints -n {endpoint} -network traffic-manager endpoint list -g {rg} --profile-name {tm} -t externalEndpoints -network traffic-manager profile delete -g {rg} -n {tm} -network traffic-manager profile create -n {tm} -g {rg} --routing-method Multivalue --unique-dns-name {dns} --max-return 3 --tags foo=doo -network traffic-manager profile update -n {tm} -g {rg} --routing-method MultiValue --max-return 4 --tags foo=boo -network traffic-manager profile create -n {tm} -g {rg} --routing-method subnet --unique-dns-name {dns} --custom-headers foo=bar --status-code-ranges 200-202 -network public-ip create -g {rg} -n {pip} --dns-name {ip_dns} --query publicIp.id -network traffic-manager profile update -n {tm} -g {rg} --status-code-ranges 200-204 --custom-headers foo=doo test=best -network traffic-manager endpoint create -n {endpoint} --profile-name {tm} -g {rg} --type azureEndpoints --target-resource-id {ip_id} --subnets 10.0.0.0 --custom-headers test=best -network traffic-manager endpoint update -n {endpoint} --type azureEndpoints --profile-name {tm} -g {rg} --subnets 10.0.0.0:24 -network traffic-manager endpoint update -n {endpoint} --type azureEndpoints --profile-name {tm} -g {rg} --subnets 10.0.0.0-11.0.0.0 -network nsg create -g {rg} -n {nsg} -network watcher flow-log configure -g {rg} --nsg {nsg} --enabled --retention 5 --storage-account {sa} -network watcher flow-log configure -g {rg} --nsg {nsg} --retention 0 -network watcher flow-log show -g {rg} --nsg {nsg} -resource create -g {rg} -n {ws} --resource-type Microsoft.OperationalInsights/workspaces -p @"{la_prop_path}" -network watcher flow-log configure -g {rg} --nsg {nsg} --workspace {ws} --interval 10 -network watcher flow-log show -g {rg} --nsg {nsg} -network watcher flow-log configure -g {rg} --nsg {nsg} --workspace {ws} --interval 60 -network watcher flow-log show -g {rg} --nsg {nsg} -network watcher flow-log configure -g {rg} --nsg {nsg} --traffic-analytics false -network watcher flow-log show -g {rg} --nsg {nsg} -network watcher flow-log configure -g {rg} --nsg {nsg} --workspace "" -network watcher flow-log show -g {rg} --nsg {nsg} -network watcher configure -g {rg} --locations westus westus2 westcentralus eastus canadaeast --enabled -network nsg create -g {rg} -n {nsg} -network watcher flow-log configure -g {rg} --nsg {nsg} --enabled --retention 5 --storage-account {sa} -vm create -g {rg} -n {vm} --image UbuntuLTS --authentication-type password --admin-username deploy --admin-password PassPass10!) --nsg {vm} --nsg-rule None -vm extension set -g {rg} --vm-name {vm} -n NetworkWatcherAgentLinux --publisher Microsoft.Azure.NetworkWatcher -network watcher packet-capture create -g {rg} --vm {vm} -n {capture} --file-path capture/capture.cap -network watcher packet-capture show -l {loc} -n {capture} -network watcher packet-capture stop -l {loc} -n {capture} -network watcher packet-capture show-status -l {loc} -n {capture} -network watcher packet-capture list -l {loc} -network watcher packet-capture delete -l {loc} -n {capture} -network watcher packet-capture list -l {loc} -storage container create -n troubleshooting --account-name {sa} -storage account show -g {rg} -n {sa} -network vnet create -g {rg} -n vnet1 --subnet-name GatewaySubnet -network public-ip create -g {rg} -n vgw1-pip -network vnet-gateway create -g {rg} -n vgw1 --vnet vnet1 --public-ip-address vgw1-pip --no-wait -network vnet-gateway wait -g {rg} -n vgw1 --created -network watcher troubleshooting start --resource vgw1 -t vnetGateway -g {rg} --storage-account {sa} --storage-path {storage_path} -network watcher troubleshooting show --resource vgw1 -t vnetGateway -g {rg} -vm create -g {rg} -n {vm} --image UbuntuLTS --authentication-type password --admin-username deploy --admin-password PassPass10!) --nsg {nsg} --nsg-rule None --private-ip-address {private-ip} -vm extension set -g {rg} --vm-name {vm} -n NetworkWatcherAgentLinux --publisher Microsoft.Azure.NetworkWatcher -network watcher test-connectivity -g {rg} --source-resource {vm} --dest-address www.microsoft.com --dest-port 80 --valid-status-codes 200 202 -network watcher run-configuration-diagnostic --resource {vm_id} --direction Inbound --protocol TCP --source 12.11.12.14 --destination 10.1.1.4 --port 12100 -network watcher show-topology -g {rg} -network watcher test-ip-flow -g {rg} --vm {vm} --direction inbound --local {private-ip}:22 --protocol tcp --remote 100.1.2.3:* -network watcher test-ip-flow -g {rg} --vm {vm} --direction outbound --local {private-ip}:* --protocol tcp --remote 100.1.2.3:80 -network watcher show-security-group-view -g {rg} --vm {vm} -network watcher show-next-hop -g {rg} --vm {vm} --source-ip 10.0.0.9 --dest-ip 10.0.0.6 -network service-endpoint list -l {loc} -network service-endpoint policy create -g {rg} -n {policy} --tags test=best -network service-endpoint policy update -g {rg} -n {policy} --tags test=nest -network service-endpoint policy list -g {rg} -network service-endpoint policy show -g {rg} -n {policy} -network service-endpoint policy delete -g {rg} -n {policy} -network service-endpoint policy list -g {rg} -network service-endpoint policy create -g {rg} -n {policy} --tags test=best -network service-endpoint policy-definition create -g {rg} --policy-name {policy} -n {pd_name} --service Microsoft.Storage --description "Test Def" --service-resources /subscriptions/{sub} -network service-endpoint policy-definition update -g {rg} --policy-name {policy} -n {pd_name} --description "Better description" -network service-endpoint policy-definition list -g {rg} --policy-name {policy} -network service-endpoint policy-definition show -g {rg} --policy-name {policy} -n {pd_name} -network service-endpoint policy-definition delete -g {rg} --policy-name {policy} -n {pd_name} -network service-endpoint policy-definition list -g {rg} --policy-name {policy} -network service-endpoint policy-definition create -g {rg} --policy-name {policy} -n {pd_name} --service Microsoft.Storage --service-resources /subscriptions/{sub} -network vnet create -g {rg} -n {vnet} -network vnet subnet create -g {rg} --vnet-name {vnet} -n {subnet} --address-prefix 10.0.0.0/24 --service-endpoints Microsoft.Storage --service-endpoint-policy {policy} -network profile list -network profile list -g {rg} -network profile show -g {rg} -n dummy -network profile delete -g {rg} -n dummy -y -network list-service-aliases -l centralus -network list-service-aliases -l centralus -g {rg} -network vnet create -g {rg} -n {vnet} --subnet-name {subnet1} -network vnet subnet create -g {rg} -n {subnet2} --vnet-name {vnet} --address-prefixes 10.0.2.0/24 -network public-ip create -g {rg} -n {ip1} --sku Standard -vm create -g {rg} -n {vm} --image UbuntuLTS --vnet-name {vnet} --subnet {subnet2} --admin-password TestPassword11!! --admin-username testadmin --authentication-type password --nsg-rule None -network bastion create -g {rg} -n {bastion} --vnet-name {vnet} --public-ip-address {ip1} --scale-units {num} --tags a=b -network bastion list -network bastion list -g {rg} -network bastion show -g {rg} -n {bastion} -network bastion delete -g {rg} -n {bastion} -local-context on -network vnet create -g {rg} -n {vnet} --subnet-name {subnet} -network vnet show -network vnet subnet show -network vnet delete -network vnet subnet delete -network vnet subnet delete -n {subnet} -network vnet delete -n {vnet} -local-context off -local-context delete --all --purge -y -network public-ip create -g {rg} -n {ip} -network vnet create -g {rg} -n {vnet} --subnet-name {subnet} -network vnet-gateway create -g {rg} -n {vg} --vnet {vnet} --public-ip-address {ip} --sku {sku} --nat-rule name=nat internal-mappings=10.4.0.0/24 external-mappings=192.168.21.0/24 -network public-ip create -g {rg} -n {ip1} -network vnet create -g {rg} -n {vnet1} --subnet-name {subnet} -network vnet-gateway create -g {rg} -n {vg1} --vnet {vnet1} --public-ip-address {ip1} --sku {sku} --nat-rule name=nat type=Static mode=EgressSnat internal-mappings=10.4.0.0/24 external-mappings=192.168.21.0/24 -network public-ip create -g {rg} -n {ip} -network vnet create -g {rg} -n {vnet} --subnet-name {subnet} -network vnet-gateway create -g {rg} -n {vg} --vnet {vnet} --public-ip-address {ip} --sku {sku} -network vnet-gateway nat-rule add -g {rg} --gateway-name {vg} --name {nat} --internal-mappings 10.4.0.0/24 --external-mappings 192.168.21.0/24 -network vnet-gateway nat-rule add -g {rg} --gateway-name {vg} --name {nat1} --internal-mappings 10.3.0.0/24 --external-mappings 192.168.22.0/24 -network vnet-gateway nat-rule list -g {rg} --gateway-name {vg} -network vnet-gateway nat-rule remove -g {rg} --gateway-name {vg} --name {nat} -extension add -n virtual-wan -network vwan create -n {vwan} -g {rg} --type Standard -network vhub create -g {rg} -n {vhub} --vwan {vwan} --address-prefix 10.5.0.0/16 -l westus --sku Standard -network vpn-gateway create -g {rg} -n {gateway} --vhub {vhub} -network security-partner-provider create -n {name} -g {rg} --vhub {vhub} --provider Checkpoint -network security-partner-provider show -n {name} -g {rg} -network security-partner-provider update -n {name} -g {rg} --tag a=b -network security-partner-provider list -g {rg} -network security-partner-provider list -network security-partner-provider delete -n {name} -g {rg} -extension add -n virtual-wan -network vwan create -n {vwan} -g {rg} --type Standard -network vhub create -g {rg} -n {vhub} --vwan {vwan} --address-prefix 10.5.0.0/16 --sku Standard -network virtual-appliance create -n {name} -g {rg} --vhub {vhub} --vendor "barracudasdwanrelease" --scale-unit 2 -v latest --asn 10000 --init-config "echo $abc" --boot-blobs {blob} {blob} --cloud-blobs {blob} {blob} -network virtual-appliance update -n {name} -g {rg} --asn 20000 --init-config "echo $abcd" -network virtual-appliance show -n {name} -g {rg} -network virtual-appliance list -g {rg} -network virtual-appliance list -network virtual-appliance sku list -network virtual-appliance sku show --name "barracudasdwanrelease" -network virtual-appliance site create -n {site} -g {rg} --appliance-name {name} --address-prefix 10.0.0.0/24 --allow --default --optimize -network virtual-appliance site update -n {site} -g {rg} --appliance-name {name} --address-prefix 10.0.0.1/24 --allow false --default false --optimize false -network virtual-appliance site show -n {site} -g {rg} --appliance-name {name} -network virtual-appliance site list -g {rg} --appliance-name {name} -network virtual-appliance site delete -n {site} -g {rg} --appliance-name {name} -y -network virtual-appliance delete -n {name} -g {rg} -y -network lb create -g {rg} -n {lb} --sku {sku} --public-ip-address {ip} --edge-zone {edge_name} -network lb show -g {rg} -n {lb} -network lb create -g {rg} -n {lb1} --vnet-name vnet1 --subnet subnet1 --edge-zone {edge_name} -network vnet create -g {rg} -n {vnet} --subnet-name subnet1 --edge-zone {edge_name} -network nic create -g {rg} -n {nic} --subnet subnet1 --vnet-name {vnet} --edge-zone {edge_name} -network lb create -g {rg} -n {lb} --public-ip-address ip --sku Standard -network vnet create -g {rg} -n {vnet} --subnet-name {subnet1} --edge-zone {edge_name} -network vnet subnet update -g {rg} -n {subnet1} --vnet-name {vnet} --disable-private-link-service-network-policies -network vnet subnet create -g {rg} -n {subnet2} --vnet-name {vnet} --address-prefixes 10.0.2.0/24 -network vnet subnet update -g {rg} -n {subnet2} --vnet-name {vnet} --disable-private-endpoint-network-policies -network private-link-service create -g {rg} -n pls --vnet-name {vnet} --subnet {subnet1} --lb-name {lb} --lb-frontend-ip-configs LoadBalancerFrontEnd --edge-zone {edge_name} -network private-endpoint create -g {rg} -n pe --vnet-name {vnet} --subnet {subnet2} --private-connection-resource-id {pls_id} --connection-name cn --edge-zone {edge_name} -network public-ip create -g {rg} -n {ip1} --edge-zone {edge_name} -network public-ip prefix create -g {rg} -n {ip1} --length 30 --edge-zone {edge_name} -network public-ip create -g {rg} -n {ip1} -network vnet create -g {rg} -n {vnet} --subnet-name GatewaySubnet -network vnet-gateway create -g {rg} -n vnet-gateway --vnet {vnet} --public-ip-address {ip1} --edge-zone {edge_name} -network lb create -g {rg} -n {lb} --sku Standard --public-ip-address {ip} -network lb create -g {rg} -n {lb1} --sku Gateway --vnet-name {vnet} --subnet {subnet} -network public-ip create -g {rg} -n {ip1} --sku standard -network lb frontend-ip create -g {rg} --lb-name {lb} -n {fip} --public-ip-address {ip1} -network lb frontend-ip create -g {rg} --lb-name {lb1} -n {fip} --vnet-name {vnet} --subnet {subnet} -network lb frontend-ip update -g {rg} --lb-name {lb} -n {fip} --gateway-lb {id} -network lb frontend-ip update -g {rg} --lb-name {lb} -n {fip} --gateway-lb '' -network lb create -g {rg} -n {lb} --sku Gateway --vnet-name vnet --subnet subnet -network lb address-pool create -g {rg} --lb-name {lb} -n {bap1} -network lb address-pool create -g {rg} --lb-name {lb} -n {bap2} -network lb address-pool create -g {rg} --lb-name {lb} -n {bap3} -network lb address-pool tunnel-interface add -g {rg} --lb-name {lb} --address-pool {bap1} --type {type} --protocol {protocol} --identifier {identifier} -network lb address-pool tunnel-interface update -g {rg} --lb-name {lb} --address-pool {bap2} --type {type} --index 0 -network lb address-pool tunnel-interface update -g {rg} --lb-name {lb} --address-pool {bap3} --port {port} --identifier {identifier1} --index 0 -network lb rule create -g {rg} --lb-name {lb} -n rule1 --frontend-ip-name {fip} --frontend-port {fport} --protocol tcp --backend-port {bport} --backend-pool-name {bap1} -network lb rule create -g {rg} --lb-name {lb} -n rule2 --frontend-ip-name {fip} --frontend-port {fport1} --backend-pools-name {bap3} {bap2} --protocol tcp --backend-port {bport1} -network lb rule update -g {rg} --lb-name {lb} -n rule2 --frontend-ip-name {fip} --backend-pools-name {bap1} -network lb create -g {rg} -n {lb} --sku {sku} --vnet-name {vnet} --subnet {subnet} -network lb address-pool create -g {rg} --lb-name {lb} -n {bap} --vnet {vnet} -network lb address-pool tunnel-interface add -g {rg} --lb-name {lb} --address-pool {bap} --type {type} --protocol {protocol} --identifier {identifier} --port 15000 -network lb address-pool tunnel-interface list -g {rg} --lb-name {lb} --address-pool {bap} -network lb address-pool tunnel-interface remove -g {rg} --lb-name {lb} --address-pool {bap} --index 0 -network lb address-pool tunnel-interface update -g {rg} --lb-name {lb} --address-pool {bap} --type {type1} --protocol {protocol} --identifier {identifier1} --port 10000 --index 0 -network public-ip create -g {rg} -n {ip} --sku standard -network public-ip create -g {rg} -n {ip1} --sku standard -network vnet create -g {rg} -n {vnet} --subnet-name {subnet} -network nic create -g {rg} -n {nic} --public-ip-address {ip} --vnet-name {vnet} --subnet {subnet} -network lb create -g {rg} -n {lb} --sku Gateway --vnet-name {vnet1} --subnet {subnet1} -network lb frontend-ip create -g {rg} --lb-name {lb} -n {fip} --vnet-name {vnet1} --subnet {subnet1} -network nic ip-config create -g {rg} --nic-name {nic} -n {nip} --make-primary --public-ip-address {ip1} -network nic ip-config update -g {rg} --nic-name {nic} -n {nip} --gateway-lb {id} -vm create -g connection_monitor_v2_test_000001 --name vm1 --image UbuntuLTS --authentication-type password --admin-username deploy --admin-password PassPass10!) --nsg vm1 --nsg-rule None -vm extension set -g connection_monitor_v2_test_000001 --vm-name vm1 --name NetworkWatcherAgentLinux --publisher Microsoft.Azure.NetworkWatcher -vm create -g connection_monitor_v2_test_000001 --name vm2 --image UbuntuLTS --authentication-type password --admin-username deploy --admin-password PassPass10!) --nsg vm2 --nsg-rule None -vm extension set -g connection_monitor_v2_test_000001 --vm-name vm2 --name NetworkWatcherAgentLinux --publisher Microsoft.Azure.NetworkWatcher -network watcher connection-monitor create --location {location} --name {cmv2} --endpoint-source-name vm1 --endpoint-source-resource-id {vm1_id} --endpoint-dest-name bing --endpoint-dest-address bing.com --test-config-name DefaultTestConfig --protocol Tcp --tcp-port 2048 -monitor log-analytics workspace create -g {rg} --location {location} --workspace-name {workspace_name} -network watcher connection-monitor output list --location {location} --connection-monitor {cmv2} -vm create -g {rg} -n {vm2} --image UbuntuLTS --authentication-type password --admin-username deploy --admin-password PassPass10!) --nsg {vm2} --nsg-rule None -vm extension set -g {rg} --vm-name {vm2} -n NetworkWatcherAgentLinux --publisher Microsoft.Azure.NetworkWatcher -vm create -g {rg} -n {vm3} --image UbuntuLTS --authentication-type password --admin-username deploy --admin-password PassPass10!) --nsg {vm3} --nsg-rule None -vm extension set -g {rg} --vm-name {vm3} -n NetworkWatcherAgentLinux --publisher Microsoft.Azure.NetworkWatcher -network watcher connection-monitor create -n {cm} --source-resource {vm2} -g {rg} --dest-resource {vm3} --dest-port 80 --tags foo=doo -network watcher connection-monitor list -l {loc} -network watcher connection-monitor show -l {loc} -n {cm} -network watcher connection-monitor stop -l {loc} -n {cm} -network watcher connection-monitor start -l {loc} -n {cm} -network watcher connection-monitor query -l {loc} -n {cm} -network watcher connection-monitor delete -l {loc} -n {cm} -vm create -g connection_monitor_v2_test_000001 --name vm1 --image UbuntuLTS --authentication-type password --admin-username deploy --admin-password PassPass10!) --nsg vm1 --nsg-rule None -vm extension set -g connection_monitor_v2_test_000001 --vm-name vm1 --name NetworkWatcherAgentLinux --publisher Microsoft.Azure.NetworkWatcher -vm create -g connection_monitor_v2_test_000001 --name vm2 --image UbuntuLTS --authentication-type password --admin-username deploy --admin-password PassPass10!) --nsg vm2 --nsg-rule None -vm extension set -g connection_monitor_v2_test_000001 --vm-name vm2 --name NetworkWatcherAgentLinux --publisher Microsoft.Azure.NetworkWatcher -network watcher connection-monitor create --location {location} --name {cmv2} --endpoint-source-name vm1 --endpoint-source-resource-id {vm1_id} --endpoint-dest-name bing --endpoint-dest-address bing.com --test-config-name DefaultTestConfig --protocol Tcp --tcp-port 2048 -network watcher connection-monitor create --name cmv2-01 --endpoint-source-name vm2 --endpoint-source-resource-id {vm2_id} --endpoint-dest-name bing --endpoint-dest-address bing.com --test-config-name DefaultIcmp --protocol Icmp -vm create -g connection_monitor_v2_test_000001 --name vm1 --image UbuntuLTS --authentication-type password --admin-username deploy --admin-password PassPass10!) --nsg vm1 --nsg-rule None -vm extension set -g connection_monitor_v2_test_000001 --vm-name vm1 --name NetworkWatcherAgentLinux --publisher Microsoft.Azure.NetworkWatcher -vm create -g connection_monitor_v2_test_000001 --name vm2 --image UbuntuLTS --authentication-type password --admin-username deploy --admin-password PassPass10!) --nsg vm2 --nsg-rule None -vm extension set -g connection_monitor_v2_test_000001 --vm-name vm2 --name NetworkWatcherAgentLinux --publisher Microsoft.Azure.NetworkWatcher -network watcher connection-monitor create --location {location} --name {cmv2} --endpoint-source-name vm1 --endpoint-source-resource-id {vm1_id} --endpoint-dest-name bing --endpoint-dest-address bing.com --test-config-name DefaultTestConfig --protocol Tcp --tcp-port 2048 -network vnet create -g {rg} --name cmv2-vnet --subnet-name subnet1 --address-prefix 10.0.0.0/24 -network vnet subnet show -g {rg} --vnet-name cmv2-vnet --name subnet1 -network watcher connection-monitor endpoint add --connection-monitor {cmv2} --location {location} --source-test-groups {test_group} --name {cm_subnet_endpoint} --resource-id {subnet_id} --type AzureSubnet --address-exclude 10.0.0.25 --coverage-level BelowAverage -network watcher connection-monitor endpoint add --connection-monitor {cmv2} --location {location} --dest-test-groups {test_group} --name Github --address github.com --type ExternalAddress -network watcher connection-monitor endpoint list --connection-monitor {cmv2} --location {location} -network watcher connection-monitor endpoint show --connection-monitor {cmv2} --location {location} --name Github -network watcher connection-monitor endpoint remove --connection-monitor {cmv2} --location {location} --name {cm_subnet_endpoint} --test-groups DefaultTestGroup -network watcher connection-monitor endpoint list --connection-monitor {cmv2} --location {location} -network nsg create -g {rg} -n {nsg} -monitor log-analytics workspace create --resource-group {rg} --location {location} --workspace-name {workspace} -network watcher flow-log create --location {location} --resource-group {rg} --nsg {nsg} --storage-account {storage_account} --workspace {workspace_id} --name {flow_log} -network watcher flow-log list --location {location} -network watcher flow-log show --location {location} --name {flow_log} -network nsg create -g {rg} -n {nsg} -monitor log-analytics workspace create --resource-group {rg} --location {location} --workspace-name {workspace} -network watcher flow-log create --location {location} --resource-group {rg} --nsg {nsg} --storage-account {storage_account} --workspace {workspace_id} --name {flow_log} -network watcher flow-log show --location {location} --name {flow_log} -network watcher flow-log delete --location {location} --name {flow_log} -network watcher flow-log show --location {location} --name {flow_log} -network nsg create -g {rg} -n {nsg} -monitor log-analytics workspace create --resource-group {rg} --location {location} --workspace-name {workspace} -network watcher flow-log create --location {location} --resource-group {rg} --nsg {nsg} --storage-account {storage_account} --workspace {workspace_id} --name {flow_log} -network watcher flow-log show --location {location} --name {flow_log} -network watcher flow-log show --nsg {nsg_id} -network nsg create -g {rg} -n {nsg} -storage account create --resource-group {rg} --name {storage_account_2} --https-only -monitor log-analytics workspace create --resource-group {rg} --location {location} --workspace-name {workspace} -network watcher flow-log create --location {location} --resource-group {rg} --nsg {nsg} --storage-account {storage_account} --workspace {workspace_id} --name {flow_log} -network watcher flow-log show --location {location} --name {flow_log} -network watcher flow-log update --location {location} --name {flow_log} --retention 2 --storage-account {another_storage} --tags foo=bar -keyvault create --hsm-name {hsm} -g {rg} -l {loc} --administrators "3707fb2f-ac10-4591-a04f-8b0d786ea37d" -network vnet create -n {vnet} -g {rg} -l {loc} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} -l {loc} --connection-name {pe_connection} --private-connection-resource-id {hsm_id} --group-id managedhsm -keyvault show --hsm-name {hsm} -network private-endpoint-connection show --id {hsm_pe_id} -network private-endpoint-connection show --resource-name {hsm} -g {rg} --name {hsm_pe_name} --type Microsoft.KeyVault/managedHSMs -network private-endpoint-connection approve --resource-name {hsm} --name {hsm_pe_name} -g {rg} --type Microsoft.KeyVault/managedHSMs --description "{approval_desc}" -network private-endpoint-connection show --id {hsm_pe_id} -network private-endpoint-connection reject --id {hsm_pe_id} --description "{rejection_desc}" -network private-endpoint-connection show --id {hsm_pe_id} -network private-endpoint-connection list --id {hsm_id} -network private-endpoint-connection delete --id {hsm_pe_id} -y -network private-endpoint delete -g {rg} -n {pe} -keyvault delete --hsm-name {hsm} -g {rg} -keyvault purge --hsm-name {hsm} -l {loc} -keyvault create --hsm-name {hsm} -g {rg} -l {loc} --administrators "3707fb2f-ac10-4591-a04f-8b0d786ea37d" -network private-link-resource list --name {hsm} -g {rg} --type microsoft.keyvault/managedHSMs -keyvault delete --hsm-name {hsm} -g {rg} -keyvault purge --hsm-name {hsm} -l {loc} -keyvault show -n {kv} -g {rg} --query "id" -otsv -network vnet create -n {vnet} -g {rg} -l {loc} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} -l {loc} --connection-name {pe_connection} --private-connection-resource-id {kv_id} --group-id vault -keyvault show -n {kv} -network private-endpoint-connection show --id {kv_pe_id} -network private-endpoint-connection show --resource-name {kv} -g {rg} --name {kv_pe_name} --type microsoft.keyvault/vaults -network private-endpoint-connection show --resource-name {kv} -g {rg} -n {kv_pe_name} --type microsoft.keyvault/vaults -keyvault set-policy -g {rg} -n {kv} --object-id {policy_id} --certificate-permissions get list -network private-endpoint-connection reject --id {kv_pe_id} --description "{rejection_desc}" -network private-endpoint-connection show --id {kv_pe_id} -network private-endpoint-connection approve --resource-name {kv} --name {kv_pe_name} -g {rg} --type microsoft.keyvault/vaults --description "{approval_desc}" -network private-endpoint-connection show --id {kv_pe_id} -network private-endpoint-connection list --id {kv_id} -network private-endpoint-connection delete --id {kv_pe_id} -y -network private-link-resource list --name {kv} -g {rg} --type microsoft.keyvault/vaults -network vnet create -n {vnet} -g {rg} -l {loc} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -storage account private-link-resource list --account-name {sa} -g {rg} -storage account show -n {sa} -g {rg} -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} -l {loc} --connection-name {pe_connection} --private-connection-resource-id {sa_id} --group-id blob -storage account show -n {sa} -g {rg} -network private-endpoint-connection show --name {sa_pec_name} -g {rg} --resource-name {sa} --type Microsoft.Storage/storageAccounts -network private-endpoint-connection reject --name {sa_pec_name} -g {rg} --resource-name {sa} --type Microsoft.Storage/storageAccounts -network private-endpoint-connection list --id {sa_pec_id} -network private-endpoint-connection delete --id {sa_pec_id} -y -network private-link-resource list --name {sa} -g {rg} --type Microsoft.Storage/storageAccounts -network vnet create -g {rg} -n {vnet_name} --subnet-name {subnet_name} -network vnet subnet update -g {rg} --vnet-name {vnet_name} --name {subnet_name} --disable-private-endpoint-network-policies true -acr create --name {registry_name} --resource-group {rg} --sku premium -network private-endpoint create -n {endpoint_name} -g {rg} --subnet {subnet_name} --vnet-name {vnet_name} --private-connection-resource-id {registry_id} --group-id registry --connection-name {endpoint_conn_name} --manual-request -network private-endpoint-connection list -g {rg} --name {registry_name} --type Microsoft.ContainerRegistry/registries -network private-endpoint-connection approve -g {rg} --resource-name {registry_name} -n {endpoint_request} --description {description_msg} --type Microsoft.ContainerRegistry/registries -network private-endpoint create -n {second_endpoint_name} -g {rg} --subnet {subnet_name} --vnet-name {vnet_name} --private-connection-resource-id {registry_id} --group-id registry --connection-name {second_endpoint_conn_name} --manual-request -network private-endpoint-connection list -g {rg} --name {registry_name} --type Microsoft.ContainerRegistry/registries -network private-endpoint-connection reject -g {rg} --resource-name {registry_name} -n {second_endpoint_request} --description {description_msg} --type Microsoft.ContainerRegistry/registries -network private-endpoint-connection list -g {rg} -n {registry_name} --type Microsoft.ContainerRegistry/registries -network private-endpoint-connection delete -g {rg} --resource-name {registry_name} -n {second_endpoint_request} --type Microsoft.ContainerRegistry/registries -y -network private-endpoint-connection list -g {rg} -n {registry_name} --type Microsoft.ContainerRegistry/registries -network private-endpoint-connection show -g {rg} --resource-name {registry_name} -n {endpoint_request} --type Microsoft.ContainerRegistry/registries -network private-endpoint-connection delete -g {rg} --resource-name {registry_name} -n {endpoint_request} --type Microsoft.ContainerRegistry/registries -y -acr create --name {registry_name} --resource-group {rg} --sku premium -network private-link-resource list --id {registry_id} -network private-link-resource list -g clitest.rg000001 --name azuredbclitest000002 --type Microsoft.DBforMariaDB/servers -network vnet create -n cli-vnet-000003 -g clitest.rg000001 -l westus --subnet-name cli-subnet-000004 -network vnet subnet update -n cli-subnet-000004 --vnet-name cli-vnet-000003 -g clitest.rg000001 --disable-private-endpoint-network-policies true -mariadb server show -g clitest.rg000001 -n azuredbclitest000002 -network private-link-resource list -g clitest.rg000001 -n azuredbclitest000002 --type Microsoft.DBforMariaDB/servers -network private-endpoint create -g clitest.rg000001 -n cli-pe-000005 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000008 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMariaDB/servers/azuredbclitest000002 --group-id mariadbServer -mariadb server show -g clitest.rg000001 -n azuredbclitest000002 -network private-endpoint-connection show --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-35be1cf1-835f-4ba9-a1b1-4f702c112bff --type Microsoft.DBforMariaDB/servers -network private-endpoint-connection approve --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-35be1cf1-835f-4ba9-a1b1-4f702c112bff --description "You are approved!" --type Microsoft.DBforMariaDB/servers -network private-endpoint-connection reject --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-35be1cf1-835f-4ba9-a1b1-4f702c112bff --description "You are rejected!" --type Microsoft.DBforMariaDB/servers -network private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMariaDB/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000005-35be1cf1-835f-4ba9-a1b1-4f702c112bff -y -network private-endpoint create -g clitest.rg000001 -n cli-pe-000006 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000009 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMariaDB/servers/azuredbclitest000002 --group-id mariadbServer --manual-request -mariadb server show -g clitest.rg000001 -n azuredbclitest000002 -network private-endpoint-connection show --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-2b9755ba-69d4-4453-b348-d4548f70f54f --type Microsoft.DBforMariaDB/servers -network private-endpoint-connection approve --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-2b9755ba-69d4-4453-b348-d4548f70f54f --description "You are approved!" --type Microsoft.DBforMariaDB/servers -network private-endpoint-connection reject --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-2b9755ba-69d4-4453-b348-d4548f70f54f --description "You are rejected!" --type Microsoft.DBforMariaDB/servers -network private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMariaDB/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000006-2b9755ba-69d4-4453-b348-d4548f70f54f -y -network private-endpoint create -g clitest.rg000001 -n cli-pe-000007 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000010 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMariaDB/servers/azuredbclitest000002 --group-id mariadbServer --manual-request true -mariadb server show -g clitest.rg000001 -n azuredbclitest000002 -network private-endpoint-connection show --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-f66a670b-5236-4b0f-939e-86f797613a36 --type Microsoft.DBforMariaDB/servers -network private-endpoint-connection reject --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-f66a670b-5236-4b0f-939e-86f797613a36 --description "You are rejected!" --type Microsoft.DBforMariaDB/servers -network private-endpoint-connection approve --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-f66a670b-5236-4b0f-939e-86f797613a36 --description "You are approved!" --type Microsoft.DBforMariaDB/servers -network private-endpoint-connection list --name azuredbclitest000002 -g clitest.rg000001 --type Microsoft.DBforMariaDB/servers -network private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMariaDB/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000007-f66a670b-5236-4b0f-939e-86f797613a36 -y -network private-link-resource list -g clitest.rg000001 --name azuredbclitest000002 --type Microsoft.DBforMySQL/servers -network vnet create -n cli-vnet-000003 -g clitest.rg000001 -l westus --subnet-name cli-subnet-000004 -network vnet subnet update -n cli-subnet-000004 --vnet-name cli-vnet-000003 -g clitest.rg000001 --disable-private-endpoint-network-policies true -mysql server show -g clitest.rg000001 -n azuredbclitest000002 -network private-link-resource list -g clitest.rg000001 -n azuredbclitest000002 --type Microsoft.DBforMySQL/servers -network private-endpoint create -g clitest.rg000001 -n cli-pe-000005 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000008 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000002 --group-id mysqlServer -mysql server show -g clitest.rg000001 -n azuredbclitest000002 -network private-endpoint-connection show --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-a69aef3a-51e5-4ea4-8511-44c809f5d615 --type Microsoft.DBforMySQL/servers -network private-endpoint-connection approve --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-a69aef3a-51e5-4ea4-8511-44c809f5d615 --description "You are approved!" --type Microsoft.DBforMySQL/servers -network private-endpoint-connection reject --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-a69aef3a-51e5-4ea4-8511-44c809f5d615 --description "You are rejected!" --type Microsoft.DBforMySQL/servers -network private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000005-a69aef3a-51e5-4ea4-8511-44c809f5d615 -y -network private-endpoint create -g clitest.rg000001 -n cli-pe-000006 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000009 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000002 --group-id mysqlServer --manual-request -mysql server show -g clitest.rg000001 -n azuredbclitest000002 -network private-endpoint-connection show --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-f0cad45b-624b-4623-adf5-4cb88dc47025 --type Microsoft.DBforMySQL/servers -network private-endpoint-connection approve --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-f0cad45b-624b-4623-adf5-4cb88dc47025 --description "You are approved!" --type Microsoft.DBforMySQL/servers -network private-endpoint-connection reject --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-f0cad45b-624b-4623-adf5-4cb88dc47025 --description "You are rejected!" --type Microsoft.DBforMySQL/servers -network private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000006-f0cad45b-624b-4623-adf5-4cb88dc47025 -y -network private-endpoint create -g clitest.rg000001 -n cli-pe-000007 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000010 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000002 --group-id mysqlServer --manual-request true -mysql server show -g clitest.rg000001 -n azuredbclitest000002 -network private-endpoint-connection show --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-c0291705-440d-4cee-bd7a-6a5edc908b84 --type Microsoft.DBforMySQL/servers -network private-endpoint-connection reject --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-c0291705-440d-4cee-bd7a-6a5edc908b84 --description "You are rejected!" --type Microsoft.DBforMySQL/servers -network private-endpoint-connection approve --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-c0291705-440d-4cee-bd7a-6a5edc908b84 --description "You are approved!" --type Microsoft.DBforMySQL/servers -network private-endpoint-connection list --name azuredbclitest000002 -g clitest.rg000001 --type Microsoft.DBforMySQL/servers -network private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000007-c0291705-440d-4cee-bd7a-6a5edc908b84 -y -network private-link-resource list -g clitest.rg000001 --name azuredbclitest000002 --type Microsoft.DBforPostgreSQL/servers -network vnet create -n cli-vnet-000003 -g clitest.rg000001 -l westus --subnet-name cli-subnet-000004 -network vnet subnet update -n cli-subnet-000004 --vnet-name cli-vnet-000003 -g clitest.rg000001 --disable-private-endpoint-network-policies true -postgres server show -g clitest.rg000001 -n azuredbclitest000002 -network private-link-resource list -g clitest.rg000001 -n azuredbclitest000002 --type Microsoft.DBforPostgreSQL/servers -network private-endpoint create -g clitest.rg000001 -n cli-pe-000005 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000008 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000002 --group-id postgresqlServer -postgres server show -g clitest.rg000001 -n azuredbclitest000002 -network private-endpoint-connection show --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-7b7c2d5c-6ad7-4239-b514-89d2a7540a5e --type Microsoft.DBforPostgreSQL/servers -network private-endpoint-connection approve --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-7b7c2d5c-6ad7-4239-b514-89d2a7540a5e --description "You are approved!" --type Microsoft.DBforPostgreSQL/servers -network private-endpoint-connection reject --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-7b7c2d5c-6ad7-4239-b514-89d2a7540a5e --description "You are rejected!" --type Microsoft.DBforPostgreSQL/servers -network private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000005-7b7c2d5c-6ad7-4239-b514-89d2a7540a5e -y -network private-endpoint create -g clitest.rg000001 -n cli-pe-000006 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000009 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000002 --group-id postgresqlServer --manual-request -postgres server show -g clitest.rg000001 -n azuredbclitest000002 -network private-endpoint-connection show --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-facb72e5-61d2-49b5-bee2-1cb3650e1ffa --type Microsoft.DBforPostgreSQL/servers -network private-endpoint-connection approve --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-facb72e5-61d2-49b5-bee2-1cb3650e1ffa --description "You are approved!" --type Microsoft.DBforPostgreSQL/servers -network private-endpoint-connection reject --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-facb72e5-61d2-49b5-bee2-1cb3650e1ffa --description "You are rejected!" --type Microsoft.DBforPostgreSQL/servers -network private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000006-facb72e5-61d2-49b5-bee2-1cb3650e1ffa -y -network private-endpoint create -g clitest.rg000001 -n cli-pe-000007 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000010 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000002 --group-id postgresqlServer --manual-request true -postgres server show -g clitest.rg000001 -n azuredbclitest000002 -network private-endpoint-connection show --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-b60881c9-67c9-4da1-930e-a7393ba45d32 --type Microsoft.DBforPostgreSQL/servers -network private-endpoint-connection reject --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-b60881c9-67c9-4da1-930e-a7393ba45d32 --description "You are rejected!" --type Microsoft.DBforPostgreSQL/servers -network private-endpoint-connection approve --resource-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-b60881c9-67c9-4da1-930e-a7393ba45d32 --description "You are approved!" --type Microsoft.DBforPostgreSQL/servers -network private-endpoint-connection list --name azuredbclitest000002 -g clitest.rg000001 --type Microsoft.DBforPostgreSQL/servers -network private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000007-b60881c9-67c9-4da1-930e-a7393ba45d32 -y -network vnet create -n {vnet} -g {rg} -l {loc} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -rest --method "PUT" --url "https://management.azure.com/subscriptions/{sub}/resourcegroups/{rg}/providers/Microsoft.Authorization/resourceManagementPrivateLinks/{rmplname}?api-version=2020-05-01" --body "{body}" -network private-endpoint create -g {rg} -n {pename} --vnet-name {vnet} --subnet {subnet} -l {loc} --connection-name {pe_connection} --private-connection-resource-id {rmpl_id} --group-id ResourceManagement -network private-endpoint-connection list -g {rg} -n {rmplname} --type Microsoft.Authorization/resourceManagementPrivateLinks -network private-endpoint-connection show --resource-name {rmplname} --name {pe} --resource-group {rg} --type Microsoft.Authorization/resourceManagementPrivateLinks -network private-endpoint-connection approve -g {rg} --resource-name {rmplname} --name {pe} --type Microsoft.Authorization/resourceManagementPrivateLinks -network private-endpoint-connection reject -g {rg} --resource-name {rmplname} --name {pe} --type Microsoft.Authorization/resourceManagementPrivateLinks -network private-endpoint-connection delete -g {rg} --resource-name {rmplname} -n {pe} --type Microsoft.Authorization/resourceManagementPrivateLinks -y -rest --method PUT --url "https://management.azure.com/subscriptions/{sub}/resourcegroups/{rg}/providers/Microsoft.Authorization/resourceManagementPrivateLinks/{rmplname}?api-version=2020-05-01" --body {body} -network private-link-resource list --name {rmplname} --resource-group {rg} --type Microsoft.Authorization/resourceManagementPrivateLinks -cosmosdb create -n {acc} -g {rg} --enable-public-network false -network vnet create -n {vnet} -g {rg} -l {loc} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} -l {loc} --connection-name {pe_connection} --private-connection-resource-id {acc_id} --group-id Sql -network private-endpoint-connection show --id {pec_id} -network private-endpoint-connection show --resource-name {acc} --name {pe_name} --resource-group {rg} --type Microsoft.DocumentDB/databaseAccounts -network private-endpoint-connection show --resource-name {acc} -n {pe_name} -g {rg} --type Microsoft.DocumentDB/databaseAccounts -network private-endpoint-connection approve --resource-name {acc} --resource-group {rg} --name {pe_name} --type Microsoft.DocumentDB/databaseAccounts --description "{approval_desc}" -network private-endpoint-connection reject --id {pec_id} --description "{rejection_desc}" -network private-endpoint-connection list --name {acc} --resource-group {rg} --type Microsoft.DocumentDB/databaseAccounts -network private-endpoint-connection delete --id {pec_id} -y -cosmosdb create -n {acc} -g {rg} -network private-link-resource list --name {acc} --resource-group {rg} --type Microsoft.DocumentDB/databaseAccounts -appservice plan create -g {resource_group} -n {plan_name} --sku P1V2 -webapp create -g {resource_group} -n {webapp_name} --plan {plan_name} -network private-link-resource list --id {webapp_id} -network vnet create --resource-group {resource_group_net} --location {location} --name {vnet_name} --address-prefix 10.0.0.0/16 -network vnet subnet create --resource-group {resource_group_net} --vnet-name {vnet_name} --name {subnet_name} --address-prefixes 10.0.0.0/24 -network vnet subnet update --resource-group {resource_group_net} --vnet-name {vnet_name} --name {subnet_name} --disable-private-endpoint-network-policies true -eventgrid domain create --name {domain_name} --resource-group {rg} --location {location} --public-network-access disabled -network private-endpoint create --resource-group {resource_group_net} --name {private_endpoint_name} --vnet-name {vnet_name} --subnet {subnet_name} --private-connection-resource-id {scope} --location {location} --group-ids domain --connection-name {connection_name} -eventgrid domain show --name {domain_name} --resource-group {rg} -network private-endpoint-connection list --resource-group {rg} --name {domain_name} --type Microsoft.EventGrid/domains -network private-endpoint-connection show --resource-group {rg} --resource-name {domain_name} --name {server_pec_name} --type Microsoft.EventGrid/domains -network private-endpoint-connection approve --resource-group {rg} --resource-name {domain_name} --name {server_pec_name} --type Microsoft.EventGrid/domains --description "{approval_description}" -network private-endpoint-connection reject --resource-group {rg} --resource-name {domain_name} --name {server_pec_name} --type Microsoft.EventGrid/domains --description "{rejection_description}" -network private-endpoint-connection delete --resource-group {rg} --resource-name {domain_name} --name {server_pec_name} --type Microsoft.EventGrid/domains -y -network private-endpoint delete --resource-group {resource_group_net} --name {private_endpoint_name} -network vnet subnet delete --resource-group {resource_group_net} --vnet-name {vnet_name} --name {subnet_name} -network vnet delete --resource-group {resource_group_net} --name {vnet_name} -eventgrid domain delete --name {domain_name} --resource-group {rg} -network vnet create --resource-group {resource_group_net} --location {location} --name {vnet_name} --address-prefix 10.0.0.0/16 -network vnet subnet create --resource-group {resource_group_net} --vnet-name {vnet_name} --name {subnet_name} --address-prefixes 10.0.0.0/24 -network vnet subnet update --resource-group {resource_group_net} --vnet-name {vnet_name} --name {subnet_name} --disable-private-endpoint-network-policies true -eventgrid topic create --name {topic_name} --resource-group {rg} --location {location} --public-network-access disabled -network private-endpoint create --resource-group {resource_group_net} --name {private_endpoint_name} --vnet-name {vnet_name} --subnet {subnet_name} --private-connection-resource-id {scope} --location {location} --group-ids topic --connection-name {connection_name} -eventgrid topic show --name {topic_name} --resource-group {rg} -network private-endpoint-connection list --resource-group {rg} --name {topic_name} --type Microsoft.EventGrid/topics -network private-endpoint-connection show --resource-group {rg} --resource-name {topic_name} --name {server_pec_name} --type Microsoft.EventGrid/topics -network private-endpoint-connection approve --resource-group {rg} --resource-name {topic_name} --name {server_pec_name} --type Microsoft.EventGrid/topics --description "{approval_description}" -network private-endpoint-connection reject --resource-group {rg} --resource-name {topic_name} --name {server_pec_name} --type Microsoft.EventGrid/topics --description "{rejection_description}" -network private-endpoint-connection delete --resource-group {rg} --resource-name {topic_name} --name {server_pec_name} --type Microsoft.EventGrid/topics -y -network private-endpoint delete --resource-group {resource_group_net} --name {private_endpoint_name} -network vnet subnet delete --resource-group {resource_group_net} --vnet-name {vnet_name} --name {subnet_name} -network vnet delete --resource-group {resource_group_net} --name {vnet_name} -eventgrid topic delete --name {topic_name} --resource-group {rg} -eventgrid topic create --name {topic_name} --resource-group {rg} --location {location} --public-network-access disabled -network private-link-resource list --id {scope_id} -eventgrid domain create --name {domain_name} --resource-group {rg} --location {location} --public-network-access disabled -network private-link-resource list --id {domain_id} -network public-ip create -g {rg} -n {appgw_ip} --sku Standard -network vnet create -g {rg} -n {appgw_pe_vnet} --subnet-name {appgw_pe_subnet} -network vnet subnet update -g {rg} -n {appgw_pe_subnet} --vnet-name {appgw_pe_vnet} --disable-private-endpoint-network-policies true -network application-gateway create -g {rg} -n {appgw} --sku Standard_v2 --public-ip-address {appgw_ip} --enable-private-link -network application-gateway show -g {rg} -n {appgw} -network vnet show -g {rg} -n "{appgw}Vnet" -network private-link-resource list --id {appgw_id} -network private-endpoint create -g {rg} -n {appgw_pe} --connection-name {appgw_pec} --vnet-name {appgw_pe_vnet} --subnet {appgw_pe_subnet} --private-connection-resource-id {appgw_id} --group-id {private_link_group_id} -network private-endpoint-connection list --id {appgw_id} -network private-endpoint-connection reject --id {private_endpoint_conn_id} -network private-endpoint-connection show --id {private_endpoint_conn_id} -network private-endpoint delete -g {rg} -n {appgw_pe} -network public-ip create -g {rg} -n {appgw_ip} --sku Standard -network vnet create -g {rg} -n {appgw_pe_vnet} --subnet-name {appgw_pe_subnet} -network vnet subnet update -g {rg} -n {appgw_pe_subnet} --vnet-name {appgw_pe_vnet} --disable-private-endpoint-network-policies true -network application-gateway create -g {rg} -n {appgw} --sku Standard_v2 --public-ip-address {appgw_ip} --enable-private-link --private-link-subnet YetAnotherSubnetName --private-link-primary true --private-link-subnet-prefix 10.0.2.0/24 -network application-gateway show -g {rg} -n {appgw} -network vnet show -g {rg} -n "{appgw}Vnet" -network private-link-resource list --id {appgw_id} -network private-endpoint create -g {rg} -n {appgw_pe} --connection-name {appgw_pec} --vnet-name {appgw_pe_vnet} --subnet {appgw_pe_subnet} --private-connection-resource-id {appgw_id} --group-id {private_link_group_id} -network private-endpoint-connection list --id {appgw_id} -network private-endpoint-connection reject --id {private_endpoint_conn_id} -network private-endpoint-connection show --id {private_endpoint_conn_id} -network private-endpoint delete -g {rg} -n {appgw_pe} -disk-access create -g {rg} -l {loc} -n {disk_access} -network private-link-resource list -g {rg} -n {disk_access} --type Microsoft.Compute/diskAccesses -network vnet create -g {rg} -n {pe_vnet} --subnet-name {pe_subnet} -network vnet subnet update -g {rg} -n {pe_subnet} --vnet-name {pe_vnet} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe_name} --vnet-name {pe_vnet} --subnet {pe_subnet} --private-connection-resource-id {disk_access_id} --group-ids disks --connection-name {pe_connection} -network private-endpoint-connection list -g {rg} -n {disk_access} --type Microsoft.Compute/diskAccesses -deployment group create -g {rg} -p "@{param_path}" target_resource_name={target_resource_name} -f "{template_path}" -network vnet create -n {vnet} -g {rg} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-link-resource list --name {target_resource_name} --resource-group {rg} --type {resource_type} -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} --connection-name {pe_connection} --private-connection-resource-id {target_resource_id} --group-id {group_id} -network private-endpoint-connection list --name {target_resource_name} --resource-group {rg} --type {resource_type} -network private-endpoint-connection show --id {pec_id} -network private-endpoint-connection show --resource-name {target_resource_name} --name {pec_name} --resource-group {rg} --type {resource_type} -network private-endpoint-connection show --resource-name {target_resource_name} -n {pec_name} -g {rg} --type {resource_type} -network private-endpoint-connection approve --resource-name {target_resource_name} --resource-group {rg} --name {pec_name} --type {resource_type} --description "{approval_desc}" -network private-endpoint-connection reject --id {pec_id} --description "{rejection_desc}" -network private-endpoint-connection list --name {target_resource_name} --resource-group {rg} --type {resource_type} -network private-endpoint-connection delete --id {pec_id} -y -deployment group create --name {deployment_name} -g {dt_rg} --template-file "{dt_template}" --parameters name={dt_name} --parameters location={dt_loc} -network private-link-resource list --name {dt_name} --resource-group {dt_rg} --type {dt_type} -network vnet create -n {vnet} -g {dt_rg} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {dt_rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {dt_rg} -n {pe} --vnet-name {vnet} --subnet {subnet} --connection-name {pe_connection} --private-connection-resource-id {target_resource_id} --group-id {group_id} --manual-request -network private-endpoint-connection list --name {dt_name} --resource-group {dt_rg} --type {dt_type} -network private-endpoint-connection show --id {pec_id} -network private-endpoint-connection show --resource-name {dt_name} --name {pec_name} --resource-group {dt_rg} --type {dt_type} -network private-endpoint-connection approve --resource-name {dt_name} --resource-group {dt_rg} --name {pec_name} --type {dt_type} --description "{approval_desc}" -network private-endpoint-connection reject --id {pec_id} --description "{rejection_desc}" -network private-endpoint-connection approve --resource-name {dt_name} --resource-group {dt_rg} --name {pec_name} --type {dt_type} --description "{approval_desc}" -network private-endpoint-connection list --name {dt_name} --resource-group {dt_rg} --type {dt_type} -network private-endpoint-connection delete --id {pec_id} -y -deployment group create --name {deployment_name} -g {azs_rg} --template-file "{azs_template}" --parameters name={azs_name} --parameters location={azs_loc} -network private-link-resource list --name {azs_name} --resource-group {azs_rg} --type {azs_type} -network vnet create -n {vnet} -g {azs_rg} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {azs_rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {azs_rg} -n {pe} --vnet-name {vnet} --subnet {subnet} --connection-name {pe_connection} --private-connection-resource-id {target_resource_id} --group-id {group_id} --manual-request -network private-endpoint-connection list --name {azs_name} --resource-group {azs_rg} --type {azs_type} -network private-endpoint-connection show --id {pec_id} -network private-endpoint-connection show --resource-name {azs_name} --name {pec_name} --resource-group {azs_rg} --type {azs_type} -network private-endpoint-connection approve --resource-name {azs_name} --resource-group {azs_rg} --name {pec_name} --type {azs_type} --description "{approval_desc}" -network private-endpoint-connection reject --id {pec_id} --description "{rejection_desc}" -network private-endpoint-connection approve --resource-name {azs_name} --resource-group {azs_rg} --name {pec_name} --type {azs_type} --description "{approval_desc}" -network private-endpoint-connection list --name {azs_name} --resource-group {azs_rg} --type {azs_type} -network private-endpoint-connection delete --id {pec_id} -y -{cmd} create -g {rg} {create_name} {resource} {extra_create} -{cmd} show -g {rg} {show_name} {resource} -network private-link-resource list --name {resource} -g {rg} --type {type} -network vnet create -n {vnet} -g {rg} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} --connection-name {pe_connection} --private-connection-resource-id {id} --group-id {group_id} -network private-endpoint-connection list --name {resource} -g {rg} --type {type} -network private-endpoint-connection show --name {name} -g {rg} --resource-name {resource} --type {type} -{cmd} create -g {rg} {create_name} {resource} {extra_create} -{cmd} show -g {rg} {show_name} {resource} -network private-link-resource list --name {resource} -g {rg} --type {type} -network vnet create -n {vnet} -g {rg} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} --connection-name {pe_connection} --private-connection-resource-id {id} --group-id {group_id} -network private-endpoint-connection list --name {resource} -g {rg} --type {type} -network private-endpoint-connection approve --name {name} -g {rg} --resource-name {resource} --type {type} -network private-endpoint-connection show --name {name} -g {rg} --resource-name {resource} --type {type} -network private-endpoint-connection reject --name {name} -g {rg} --resource-name {resource} --type {type} -network private-endpoint-connection delete --name {name} -g {rg} --resource-name {resource} --type {type} -y -{cmd} create -g {rg} {create_name} {resource} {extra_create} -{cmd} show -g {rg} {show_name} {resource} -network private-link-resource list --name {resource} -g {rg} --type {type} -network vnet create -n {vnet} -g {rg} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} --connection-name {pe_connection} --private-connection-resource-id {id} --group-id {group_id} -network private-endpoint-connection list --name {resource} -g {rg} --type {type} -network private-endpoint-connection show --name {name} -g {rg} --resource-name {resource} --type {type} -network private-endpoint-connection reject --name {name} -g {rg} --resource-name {resource} --type {type} -network private-endpoint-connection delete --name {name} -g {rg} --resource-name {resource} --type {type} -y -{cmd} create -g {rg} {create_name} {resource} {extra_create} -{cmd} show -g {rg} {show_name} {resource} -network private-link-resource list --name {resource} -g {rg} --type {type} -network vnet create -n {vnet} -g {rg} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} --connection-name {pe_connection} --private-connection-resource-id {id} --group-id {group_id} -network private-endpoint-connection list --name {resource} -g {rg} --type {type} -network private-endpoint-connection show --name {name} -g {rg} --resource-name {resource} --type {type} -network private-endpoint-connection delete --name {name} -g {rg} --resource-name {resource} --type {type} -y -{cmd} create -g {rg} {create_name} {resource} {extra_create} -{cmd} show -g {rg} {show_name} {resource} -network private-link-resource list --name {resource} -g {rg} --type {type} -network vnet create -n {vnet} -g {rg} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} --connection-name {pe_connection} --private-connection-resource-id {id} --group-id {group_id} -network private-endpoint-connection list --name {resource} -g {rg} --type {type} -network private-endpoint-connection show --name {name} -g {rg} --resource-name {resource} --type {type} -network private-endpoint-connection delete --name {name} -g {rg} --resource-name {resource} --type {type} -y -{cmd} create -g {rg} {create_name} {resource} {extra_create} -{cmd} show -g {rg} {show_name} {resource} -network private-link-resource list --name {resource} -g {rg} --type {type} -network vnet create -n {vnet} -g {rg} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} --connection-name {pe_connection} --private-connection-resource-id {id} --group-id {group_id} -network private-endpoint-connection list --name {resource} -g {rg} --type {type} -network private-endpoint-connection show --name {name} -g {rg} --resource-name {resource} --type {type} -network private-endpoint-connection delete --name {name} -g {rg} --resource-name {resource} --type {type} -y -{cmd} create -g {rg} {create_name} {resource} {extra_create} -{cmd} show -g {rg} {show_name} {resource} -network private-link-resource list --name {resource} -g {rg} --type {type} -network vnet create -n {vnet} -g {rg} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} --connection-name {pe_connection} --private-connection-resource-id {id} --group-id {group_id} -network private-endpoint-connection list --name {resource} -g {rg} --type {type} -network private-endpoint-connection approve --name {name} -g {rg} --resource-name {resource} --type {type} -network private-endpoint-connection show --name {name} -g {rg} --resource-name {resource} --type {type} -network private-endpoint-connection reject --name {name} -g {rg} --resource-name {resource} --type {type} -network private-endpoint-connection delete --name {name} -g {rg} --resource-name {resource} --type {type} -y -network vnet create -g {rg} -n {web_vnet} --address-prefixes 10.1.0.0/16 --subnet-name {web_subnet} --subnet-prefixes 10.1.0.0/24 -{cmd} create -g {rg} {create_name} {resource} {extra_create} -{cmd} show -g {rg} {show_name} {resource} -network private-link-resource list --name {resource} -g {rg} --type {type} -network vnet create -n {vnet} -g {rg} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} --connection-name {pe_connection} --private-connection-resource-id {id} --group-id {group_id} -network private-endpoint-connection list --name {resource} -g {rg} --type {type} -network private-endpoint-connection show --name {name} -g {rg} --resource-name {resource} --type {type} -network private-endpoint-connection delete --name {name} -g {rg} --resource-name {resource} --type {type} -y -account list --query "[?isDefault].tenantId" -o tsv -deployment group create -g {rg} -p "@{param_path}" powerbi_resource_name={powerbi_resource_name} tenant_object_id={tenant_id} -f "{template_path}" -network vnet create -n {vnet} -g {rg} -l {loc} --address-prefixes 10.5.0.0/16 --subnet-name {subnet} --subnet-prefixes 10.5.0.0/24 -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-link-resource list --name {powerbi_resource_name} --resource-group {rg} --type {resource_type} -network private-endpoint create -g {rg} -n {pe} -l {loc} --vnet-name {vnet} --subnet {subnet} --connection-name {pe_connection} --private-connection-resource-id {powerbi_resource_id} --group-ids {group_ids} -network private-endpoint-connection list --name {powerbi_resource_name} --resource-group {rg} --type {resource_type} -network private-endpoint-connection show --id {pec_id} -network private-endpoint-connection show --resource-name {powerbi_resource_name} --name {pec_name} --resource-group {rg} --type {resource_type} -network private-endpoint-connection approve --resource-name {powerbi_resource_name} --resource-group {rg} --name {pec_name} --type {resource_type} --description "{approval_desc}" -network private-endpoint-connection list --name {powerbi_resource_name} --resource-group {rg} --type {resource_type} -network private-endpoint-connection delete --id {pec_id} -y -network vnet create -g {rg} -n {vnet_name} --subnet-name {subnet_name} -network vnet subnet update -g {rg} --vnet-name {vnet_name} --name {subnet_name} --disable-private-endpoint-network-policies true -bot create -g {rg} -n {bot_name} -k registration --appid {app_id} -network private-endpoint create -g {rg} -n {endpoint_name} --vnet-name {vnet_name} --subnet {subnet_name} --private-connection-resource-id {bot_id} --connection-name {endpoint_conn_name} --group-id bot -network private-endpoint create -g {rg} -n {second_endpoint_name} --vnet-name {vnet_name} --subnet {subnet_name} --private-connection-resource-id {bot_id} --connection-name {second_endpoint_conn_name} --group-id bot --manual-request -network private-endpoint-connection approve -g {rg} -n {second_endpoint_name} --resource-name {bot_name} --type Microsoft.BotService/botServices --description {desc} -network private-endpoint-connection reject -g {rg} -n {second_endpoint_name} --resource-name {bot_name} --type Microsoft.BotService/botServices --description {desc} -network private-endpoint-connection list -g {rg} --name {bot_name} --type Microsoft.BotService/botServices -network private-endpoint-connection delete -g {rg} --resource-name {bot_name} -n {second_endpoint_name} --type Microsoft.BotService/botServices -y -network private-endpoint-connection list -g {rg} --name {bot_name} --type Microsoft.BotService/botServices -network private-endpoint-connection show -g {rg} --type Microsoft.BotService/botServices --resource-name {bot_name} -n {endpoint_name} -network private-endpoint-connection delete -g {rg} --resource-name {bot_name} -n {endpoint_name} --type Microsoft.BotService/botServices -y -network vnet create -g {rg} -n {vnet_name} --subnet-name {subnet_name} -network vnet subnet update -g {rg} --vnet-name {vnet_name} --name {subnet_name} --disable-private-endpoint-network-policies true -network private-link-resource list --id {cluster_id} -network private-endpoint create -g {rg} -n {endpoint_name} --vnet-name {vnet_name} --subnet {subnet_name} --private-connection-resource-id {cluster_id} --connection-name {endpoint_connection_name} --group-id {group_id} --manual-request -network private-endpoint-connection list --id {cluster_id} -network private-endpoint-connection approve --id {private-endpoint-connection-id} --description {approve_description_msg} -network private-endpoint-connection reject --id {private-endpoint-connection-id} --description {reject_description_msg} -network private-endpoint-connection delete --id {private-endpoint-connection-id} --yes -network private-endpoint-connection show --id {private-endpoint-connection-id} -redis create --location {loc} --name {cache_name} --resource-group {rg} --sku Standard --vm-size c1 -network vnet create -n {vnet} -g {rg} -l {loc} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} -l {loc} --connection-name {pe_connection} --private-connection-resource-id {acfr_id} --group-id redisCache -network private-endpoint show --id {pec_id} -network private-endpoint show --resource-group {rg} --name {pe_name} -redis show -n {cache_name} -g {rg} -network private-endpoint-connection list --id {red_pec_id} -network private-endpoint-connection show --id {red_pec_id} -network private-endpoint-connection reject --id {red_pec_id} -network private-endpoint-connection delete --id {red_pec_id} -y -network private-endpoint-connection list --id {red_pec_id} -redis create --location {loc} --name {cache_name} --resource-group {rg} --sku Basic --vm-size c0 -network private-link-resource list --name {cache_name} -g {rg} --type Microsoft.Cache/Redis -policy event list -m "azgovtest5" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state list -m "azgovtest5" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state summarize -m "azgovtest5" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --top 2 -policy event list --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state list --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state summarize --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --top 2 -policy event list -g "defaultresourcegroup-eus" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state list -g "defaultresourcegroup-eus" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state summarize -g "defaultresourcegroup-eus" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --top 2 -policy event list --resource "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cheggpolicy/providers/microsoft.keyvault/vaults/cheggtmpkv" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state list --resource "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cheggpolicy/providers/microsoft.keyvault/vaults/cheggtmpkv" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state summarize --resource "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cheggpolicy/providers/microsoft.keyvault/vaults/cheggtmpkv" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --top 2 -policy event list --resource "cheggkv" --namespace "microsoft.keyvault" --resource-type "vaults" -g "cheggpolicy" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state list --resource "cheggkv" --namespace "microsoft.keyvault" --resource-type "vaults" -g "cheggpolicy" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state summarize --resource "cheggkv" --namespace "microsoft.keyvault" --resource-type "vaults" -g "cheggpolicy" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --top 2 -policy event list --resource "subnet2" --namespace "microsoft.network" --resource-type "subnets" --parent "virtualnetworks/cheggvnet" -g "cheggpolicy" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state list --resource "subnet2" --namespace "microsoft.network" --resource-type "subnets" --parent "virtualnetworks/cheggvnet" -g "cheggpolicy" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state summarize --resource "subnet2" --namespace "microsoft.network" --resource-type "subnets" --parent "virtualnetworks/cheggvnet" -g "cheggpolicy" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --top 2 -policy event list -s "1f3afdf9-d0c9-4c3d-847f-89da613e70a8" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state list -s "1f3afdf9-d0c9-4c3d-847f-89da613e70a8" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state summarize -s "1f3afdf9-d0c9-4c3d-847f-89da613e70a8" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --top 2 -policy event list -d "34c877ad-507e-4c82-993e-3452a6e0ad3c" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state list -d "34c877ad-507e-4c82-993e-3452a6e0ad3c" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state summarize -d "34c877ad-507e-4c82-993e-3452a6e0ad3c" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --top 2 -policy event list -a "4d31128e32d04a0098fd536e" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state list -a "4d31128e32d04a0098fd536e" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state summarize -a "4d31128e32d04a0098fd536e" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --top 2 -policy event list -a "f32eeddfc32345b585f9a70b" -g "cheggpolicy" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state list -a "f32eeddfc32345b585f9a70b" -g "cheggpolicy" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --apply "groupby((policyAssignmentId, resourceId), aggregate($count as numRecords))" --select "policyAssignmentId, resourceId, numRecords" --order-by "numRecords desc" --top 2 -policy state summarize -a "f32eeddfc32345b585f9a70b" -g "cheggpolicy" --from "2021-07-01T00:00:00Z" --to "2021-07-03T01:30:00Z" --filter "isCompliant eq false" --top 2 -policy state list --resource "/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cheggpolicy/providers/microsoft.keyvault/vaults/cheggtmpkv" --expand PolicyEvaluationDetails --top 2 -policy metadata list -policy metadata list --top 0 -policy metadata list --top 4267 -policy metadata list --top 4265 -policy metadata show --name ACF1000 -policy metadata show -n ACF1000 -policy assignment create --policy {bip} -n {pan} -policy remediation create -n {rn} -g {rg} -a {pan} -policy remediation show -n {rn} -g {rg} -policy remediation list -g {rg} -policy remediation deployment list -n {rn} -g {rg} -policy remediation delete -n {rn} -g {rg} -policy remediation list -g {rg} -policy remediation create -n {rn} -a {pan} --location-filters {location} -policy remediation show -n {rn} -policy remediation list -policy remediation deployment list -n {rn} -policy remediation delete -n {rn} -policy remediation list -policy remediation create -n {rn} -a {pan} -g {rg} --namespace "Microsoft.Storage" --resource-type storageAccounts --resource {sa} -policy remediation show -n {rn} -g {rg} --namespace "Microsoft.Storage" --resource-type storageAccounts --resource {sa} -policy remediation list -g {rg} --namespace "Microsoft.Storage" --resource-type storageAccounts --resource {sa} -policy remediation deployment list -n {rn} -g {rg} --namespace "Microsoft.Storage" --resource-type storageAccounts --resource {sa} -policy remediation delete -n {rn} -g {rg} --namespace "Microsoft.Storage" --resource-type storageAccounts --resource {sa} -policy remediation list -g {rg} --namespace "Microsoft.Storage" --resource-type storageAccounts --resource {sa} -policy assignment delete -n {pan} -policy assignment show -g {rg} -n {pan} -policy remediation create -n {rn} -g {rg} -a {pan} -policy remediation show -n {rn} -g {rg} -policy remediation show -n {rn} -g {rg} -policy remediation show -n {rn} -g {rg} -policy remediation show -n {rn} -g {rg} -policy remediation list -g {rg} -policy remediation deployment list -n {rn} -g {rg} -policy remediation cancel -n {rn} -g {rg} -account management-group create -n {mg} -policy assignment create --scope {mgid} --policy {bip} -n {pan} -policy remediation create -n {rn} -m {mg} -a {pid} -policy remediation show -n {rn} -m {mg} -policy remediation list -m {mg} -policy remediation deployment list -n {rn} -m {mg} -policy remediation delete -n {rn} -m {mg} -policy remediation list -m {mg} -policy assignment delete -n {pan} --scope {mgid} -account management-group delete -n {mg} -policy set-definition create -n {psn} --definitions "[{{ \"policyDefinitionId\": \"{bip}\", \"policyDefinitionReferenceId\": \"{drid}\" }}]" -policy assignment create --policy-set-definition {psn} -n {pan} -policy remediation create -n {rn} -a {pan} --definition-reference-id {drid} -policy remediation show -n {rn} -policy remediation list -policy remediation deployment list -n {rn} -policy remediation delete -n {rn} -policy remediation list -policy assignment delete -n {pan} -policy set-definition delete -n {psn} -policy assignment create --policy {bip} -g {rg} -n {pan} --location {location} --assign-identity -p '{{"tagName": {{ "value": "cliTagKey" }}, "tagValue": {{ "value": "cliTagValue" }} }}' -policy remediation create -n {rn} -g {rg} -a {pan} --resource-discovery-mode ReEvaluateCompliance -policy remediation show -n {rn} -g {rg} -policy remediation list -g {rg} -policy remediation deployment list -n {rn} -g {rg} -policy remediation cancel -n {rn} -g {rg} -policy assignment create --policy {bip} -n {pan} --resource-group {rg} -p '{{ "tagName": {{ "value": "notThere" }} }}' -policy state trigger-scan --no-wait -policy state trigger-scan -g {rg} -policy state list -g {rg} -a {pan} --filter "isCompliant eq false" -network private-dns zone create -g {rg} -n {zone} -network private-dns zone delete -g {rg} -n {zone} -y -network private-dns zone delete -g {rg} -n {zone} -y -network private-dns zone create -g {rg} -n {zone} -network private-dns zone show -g {rg} -n {zone} -network private-dns zone show -g {rg} -n {zone} -network private-dns zone create -g {rg} -n {zone} -network private-dns zone create -g {rg} -n {zone} -network private-dns zone list -g {rg} -network private-dns zone list -g {rg} -network private-dns zone create -g {rg} -n {zone} -network private-dns zone create -g {rg} -n {zone} -network private-dns zone list -network private-dns zone create -g {rg} -n {zone} -network private-dns zone update -g {rg} -n {zone} --tags {tags} -network private-dns zone create -g {rg} -n {zone} --tags {tags} -network private-dns zone update -g {rg} -n {zone} --tags {tags} -network private-dns zone create -g {rg} -n {zone} -network private-dns zone update -g {rg} -n {zone} -network private-dns zone create -g {rg} -n {zone} -network private-dns zone update -g {rg} -n {zone} --if-match {etag} -network private-dns zone create -g {rg} -n {zone} -network private-dns zone update -g {rg} -n {zone} --if-match {etag} -network private-dns zone create -g {rg} -n {zone} --tags {tags} -network private-dns zone update -g {rg} -n {zone} --tags "" -network private-dns zone update -g {rg} -n {zone} -network private-dns zone create -g {rg} -n {zone} -network private-dns zone create -g {rg} -n {zone} -network private-dns zone create -g {rg} -n {zone} --tags {tags} -network private-dns zone create -g {rg} -n {zone} -network private-dns zone create -g {rg} -n {zone} -network vnet create -g {rg} -n {vnet} -network private-dns link vnet create -g {rg} -n {link} -z {zone} -v {vnet} -e {registrationEnabled} -network private-dns link vnet delete -g {rg} -n {link} -z {zone} -y -network private-dns zone create -g {rg} -n {zone} -network private-dns link vnet delete -g {rg} -n {link} -z {zone} -y -network private-dns link vnet delete -g {rg} -n {link} -z {zone} -y -network private-dns zone create -g {rg} -n {zone} -network vnet create -g {rg} -n {vnet} -network private-dns link vnet create -g {rg} -n {link} -z {zone} -v {vnet} -e {registrationEnabled} -network private-dns link vnet show -g {rg} -n {link} -z {zone} -network private-dns zone create -g {rg} -n {zone} -network private-dns link vnet show -g {rg} -n {link} -z {zone} -network private-dns link vnet show -g {rg} -n {link} -z {zone} -network private-dns zone create -g {rg} -n {zone} -network vnet create -g {rg} -n {vnet} -network private-dns link vnet create -g {rg} -n {link} -z {zone} -v {vnet} -e {registrationEnabled} -network vnet create -g {rg} -n {vnet} -network private-dns link vnet create -g {rg} -n {link} -z {zone} -v {vnet} -e {registrationEnabled} -network private-dns link vnet list -g {rg} -z {zone} -network private-dns zone create -g {rg} -n {zone} -network private-dns link vnet list -g {rg} -z {zone} -network private-dns zone create -g {rg} -n {zone} -network private-dns link vnet update -g {rg} -n {link} -z {zone} -network private-dns link vnet update -g {rg} -n {link} -z {zone} -network private-dns zone create -g {rg} -n {zone} -network vnet create -g {rg} -n {vnet} -network private-dns link vnet create -g {rg} -n {link} -z {zone} -v {vnet} -e {registrationEnabled} -network private-dns link vnet create -g {rg} -n {link} -z {zone} -v {vnet} -e {registrationEnabled} -network private-dns zone create -g {rg} -n {zone} -network vnet create -g {rg} -n {vnet} -network private-dns link vnet create -g {rg} -n {link} -z {zone} -v {vnet} -e {registrationEnabled} -network private-dns zone create -g {rg} -n {zone} -network vnet create -g {rg} -n {vnet} -network private-dns link vnet create -g {rg} -n {link} -z {zone} -v {vnet} -e {registrationEnabled} -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set aaaa add-record -g {rg} -n {recordset} -z {zone} -a {aaaarecord} -network private-dns record-set {recordType} update -g {rg} -n {recordset} -z {zone} --metadata {tags} -network private-dns record-set aaaa add-record -g {rg} -n {recordset} -z {zone} -a {aaaarecord} -network private-dns record-set {recordType} show -g {rg} -n {recordset} -z {zone} -network private-dns record-set aaaa remove-record -g {rg} -n {recordset} -z {zone} -a {aaaarecord} --keep-empty-record-set -network private-dns record-set aaaa remove-record -g {rg} -n {recordset} -z {zone} -a {aaaarecord} --keep-empty-record-set -network private-dns record-set {recordType} delete -g {rg} -n {recordset} -z {zone} -y -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set a add-record -g {rg} -n {recordset} -z {zone} -a {arecord} -network private-dns record-set {recordType} update -g {rg} -n {recordset} -z {zone} --metadata {tags} -network private-dns record-set a add-record -g {rg} -n {recordset} -z {zone} -a {arecord} -network private-dns record-set {recordType} show -g {rg} -n {recordset} -z {zone} -network private-dns record-set a remove-record -g {rg} -n {recordset} -z {zone} -a {arecord} --keep-empty-record-set -network private-dns record-set a remove-record -g {rg} -n {recordset} -z {zone} -a {arecord} --keep-empty-record-set -network private-dns record-set {recordType} delete -g {rg} -n {recordset} -z {zone} -y -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set cname set-record -g {rg} -n {recordset} -z {zone} -c {cname} -network private-dns record-set {recordType} update -g {rg} -n {recordset} -z {zone} --metadata {tags} -network private-dns record-set cname set-record -g {rg} -n {recordset} -z {zone} -c {cname} -network private-dns record-set {recordType} show -g {rg} -n {recordset} -z {zone} -network private-dns record-set cname remove-record -g {rg} -n {recordset} -z {zone} -c {cname} --keep-empty-record-set -network private-dns record-set cname remove-record -g {rg} -n {recordset} -z {zone} -c {cname} --keep-empty-record-set -network private-dns record-set {recordType} delete -g {rg} -n {recordset} -z {zone} -y -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set mx add-record -g {rg} -n {recordset} -z {zone} -e {exchange} -p {preference} -network private-dns record-set {recordType} update -g {rg} -n {recordset} -z {zone} --metadata {tags} -network private-dns record-set mx add-record -g {rg} -n {recordset} -z {zone} -e {exchange} -p {preference} -network private-dns record-set {recordType} show -g {rg} -n {recordset} -z {zone} -network private-dns record-set mx remove-record -g {rg} -n {recordset} -z {zone} -e {exchange} -p {preference} --keep-empty-record-set -network private-dns record-set mx remove-record -g {rg} -n {recordset} -z {zone} -e {exchange} -p {preference} --keep-empty-record-set -network private-dns record-set {recordType} delete -g {rg} -n {recordset} -z {zone} -y -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set ptr add-record -g {rg} -n {recordset} -z {zone} -d {ptrdname} -network private-dns record-set {recordType} update -g {rg} -n {recordset} -z {zone} --metadata {tags} -network private-dns record-set ptr add-record -g {rg} -n {recordset} -z {zone} -d {ptrdname} -network private-dns record-set {recordType} show -g {rg} -n {recordset} -z {zone} -network private-dns record-set ptr remove-record -g {rg} -n {recordset} -z {zone} -d {ptrdname} --keep-empty-record-set -network private-dns record-set ptr remove-record -g {rg} -n {recordset} -z {zone} -d {ptrdname} --keep-empty-record-set -network private-dns record-set {recordType} delete -g {rg} -n {recordset} -z {zone} -y -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set srv add-record -g {rg} -n {recordset} -z {zone} -r {port} -p {priority} -t {target} -w {weight} -network private-dns record-set {recordType} update -g {rg} -n {recordset} -z {zone} --metadata {tags} -network private-dns record-set srv add-record -g {rg} -n {recordset} -z {zone} -r {port} -p {priority} -t {target} -w {weight} -network private-dns record-set {recordType} show -g {rg} -n {recordset} -z {zone} -network private-dns record-set srv remove-record -g {rg} -n {recordset} -z {zone} -r {port} -p {priority} -t {target} -w {weight} --keep-empty-record-set -network private-dns record-set srv remove-record -g {rg} -n {recordset} -z {zone} -r {port} -p {priority} -t {target} -w {weight} --keep-empty-record-set -network private-dns record-set {recordType} delete -g {rg} -n {recordset} -z {zone} -y -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set txt add-record -g {rg} -n {recordset} -z {zone} -v "{txtrecord}" -network private-dns record-set {recordType} update -g {rg} -n {recordset} -z {zone} --metadata {tags} -network private-dns record-set txt add-record -g {rg} -n {recordset} -z {zone} -v "{txtrecord}" -network private-dns record-set {recordType} show -g {rg} -n {recordset} -z {zone} -network private-dns record-set txt remove-record -g {rg} -n {recordset} -z {zone} -v "{txtrecord}" --keep-empty-record-set -network private-dns record-set txt remove-record -g {rg} -n {recordset} -z {zone} -v "{txtrecord}" --keep-empty-record-set -network private-dns record-set {recordType} delete -g {rg} -n {recordset} -z {zone} -y -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set soa show -g {rg} -z {zone} -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set list -g {rg} -z {zone} -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set a add-record -g {rg} -n {recordset} -z {zone} -a {arecord} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set aaaa add-record -g {rg} -n {recordset} -z {zone} -a {aaaarecord} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set txt add-record -g {rg} -n {recordset} -z {zone} -v "{txtrecord}" -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set cname set-record -g {rg} -n {recordset} -z {zone} -c {cname} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set srv add-record -g {rg} -n {recordset} -z {zone} -r {port} -p {priority} -t {target} -w {weight} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set mx add-record -g {rg} -n {recordset} -z {zone} -e {exchange} -p {preference} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set ptr add-record -g {rg} -n {recordset} -z {zone} -d {ptrdname} -network private-dns record-set soa show -g {rg} -z {zone} -network private-dns record-set list -g {rg} -z {zone} -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set a add-record -g {rg} -n {recordset} -z {zone} -a {arecord} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set a add-record -g {rg} -n {recordset} -z {zone} -a {arecord} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set a add-record -g {rg} -n {recordset} -z {zone} -a {arecord} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set a add-record -g {rg} -n {recordset} -z {zone} -a {arecord} -network private-dns record-set a list -g {rg} -z {zone} -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set a list -g {rg} -z {zone} -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set a add-record -g {rg} -n {recordset} -z {zone} -a {arecord} -network private-dns record-set a update -g {rg} -n {recordset} -z {zone} --metadata {tags} -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set a add-record -g {rg} -n {recordset} -z {zone} -a {arecord} -network private-dns record-set a update -g {rg} -n {recordset} -z {zone} --metadata {tags} -network private-dns record-set a update -g {rg} -n {recordset} -z {zone} --metadata {tags} -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set a add-record -g {rg} -n {recordset} -z {zone} -a {arecord} -network private-dns record-set {recordType} update -g {rg} -n {recordset} -z {zone} --metadata {tags} --if-match {etag} -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set a add-record -g {rg} -n {recordset} -z {zone} -a {arecord} -network private-dns record-set {recordType} update -g {rg} -n {recordset} -z {zone} --metadata {tags} --if-match {etag} -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set a add-record -g {rg} -n {recordset} -z {zone} -a {arecord} -network private-dns record-set a update -g {rg} -n {recordset} -z {zone} --metadata {tags} -network private-dns record-set a update -g {rg} -n {recordset} -z {zone} --metadata "" -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set soa update -g {rg} -z {zone} -e {email} -x {expireTime} -m {minimumTtl} -f {refreshTime} -r {retryTime} -s {serialNumber} -network private-dns zone create -g {rg} -n {zone} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set a add-record -g {rg} -n {recordset} -z {zone} -a {arecord} -network private-dns record-set {recordType} create -g {rg} -n {recordset} -z {zone} -network private-dns record-set a create -g {rg} -n {recordset} -z {zone} -mariadb server create -g clitest.rg000001 --name azuredbclitest000003 -l westus2 --admin-user cloudsa --admin-password SecretPassword123 --sku-name GP_Gen5_2 --tags key=1 --geo-redundant-backup Enabled --backup-retention 10 -mariadb server show -g clitest.rg000001 --name azuredbclitest000003 -mariadb server update -g clitest.rg000001 --name azuredbclitest000003 --admin-password SecretPassword456 --ssl-enforcement Disabled --tags key=2 -mariadb server update -g clitest.rg000001 --name azuredbclitest000003 --public-network-access Disabled -mariadb server update -g clitest.rg000001 --name azuredbclitest000003 --sku-name GP_Gen5_4 -mariadb server show -g clitest.rg000001 --name azuredbclitest000003 -mariadb server update -g clitest.rg000001 --name azuredbclitest000003 --sku-name GP_Gen5_2 -mariadb server update -g clitest.rg000001 --name azuredbclitest000003 --ssl-enforcement Enabled -mariadb server update -g clitest.rg000001 --name azuredbclitest000003 --tags key=3 -mariadb server restore -g clitest.rg000002 --name azuredbclirestore000004 --source-server /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMariaDB/servers/azuredbclitest000003 --restore-point-in-time 2021-03-03T22:31:19.360000+00:00 -mariadb server georestore -g clitest.rg000002 --name azuredbcligeorestore000005 --source-server /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMariaDB/servers/azuredbclitest000003 -l eastus --geo-redundant-backup Disabled --backup-retention 20 -mariadb server list -g clitest.rg000002 -mariadb server list -mariadb server show-connection-string -s azuredbclitest000003 -mariadb server delete -g clitest.rg000001 --name azuredbclitest000003 --yes -mariadb server delete -g clitest.rg000002 -n azuredbclirestore000004 --yes -mariadb server list -g clitest.rg000001 -mariadb server list -g clitest.rg000002 -mariadb server list-skus -l westus2 -mysql server create -g clitest.rg000001 --name azuredbclitest000003 -l westus2 --admin-user cloudsa --admin-password SecretPassword123 --sku-name GP_Gen5_2 --tags key=1 --geo-redundant-backup Enabled --backup-retention 10 -mysql server show -g clitest.rg000001 --name azuredbclitest000003 -mysql server update -g clitest.rg000001 --name azuredbclitest000003 --minimal-tls-version TLS1_2 -mysql server update -g clitest.rg000001 --name azuredbclitest000003 --admin-password SecretPassword456 --ssl-enforcement Disabled --tags key=2 -mysql server update -g clitest.rg000001 --name azuredbclitest000003 --public-network-access Disabled -mysql server update -g clitest.rg000001 --name azuredbclitest000003 --sku-name GP_Gen5_4 -mysql server show -g clitest.rg000001 --name azuredbclitest000003 -mysql server update -g clitest.rg000001 --name azuredbclitest000003 --sku-name GP_Gen5_2 -mysql server update -g clitest.rg000001 --name azuredbclitest000003 --ssl-enforcement Enabled -mysql server update -g clitest.rg000001 --name azuredbclitest000003 --tags key=3 -mysql server restore -g clitest.rg000002 --name azuredbclirestore000004 --source-server /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000003 --restore-point-in-time 2021-02-08T18:13:51.757000+00:00 -mysql server georestore -g clitest.rg000002 --name azuredbcligeorestore000005 --source-server /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000003 -l eastus --geo-redundant-backup Disabled --backup-retention 20 -mysql server create -g clitest.rg000001 --name azuredbcliinfraencrypt000006 -l westus2 --admin-user cloudsa --admin-password SecretPassword123 --sku-name GP_Gen5_2 --tags key=1 --geo-redundant-backup Enabled --backup-retention 10 --infrastructure-encryption Enabled -mysql server list -g clitest.rg000002 -mysql server list -mysql server show-connection-string -s azuredbclitest000003 -mysql server create -g clitest.rg000001 --name azuredbcliupgrade000007 -l westus2 --admin-user cloudsa --admin-password SecretPassword123 --sku-name GP_Gen5_2 --tags key=1 --geo-redundant-backup Enabled --backup-retention 10 --version 5.6 -mysql server upgrade -g clitest.rg000001 --name azuredbcliupgrade000007 --target-server-version 5.7 -mysql server show -g clitest.rg000001 -n azuredbcliupgrade000007 -mysql server delete -g clitest.rg000001 --name azuredbclitest000003 --yes -mysql server delete -g clitest.rg000002 -n azuredbclirestore000004 --yes -mysql server delete -g clitest.rg000001 -n azuredbcliinfraencrypt000006 --yes -mysql server delete -g clitest.rg000001 -n azuredbcliupgrade000007 --yes -mysql server list -g clitest.rg000001 -mysql server list -g clitest.rg000002 -mysql server list-skus -l westus2 -postgres server create -g clitest.rg000001 --name azuredbclitest000003 -l westus2 --admin-user cloudsa --admin-password SecretPassword123 --sku-name GP_Gen5_2 --tags key=1 --geo-redundant-backup Enabled --backup-retention 10 -postgres server show -g clitest.rg000001 --name azuredbclitest000003 -postgres server update -g clitest.rg000001 --name azuredbclitest000003 --minimal-tls-version TLS1_2 -postgres server update -g clitest.rg000001 --name azuredbclitest000003 --admin-password SecretPassword456 --ssl-enforcement Disabled --tags key=2 -postgres server update -g clitest.rg000001 --name azuredbclitest000003 --public-network-access Disabled -postgres server update -g clitest.rg000001 --name azuredbclitest000003 --sku-name GP_Gen5_4 -postgres server show -g clitest.rg000001 --name azuredbclitest000003 -postgres server update -g clitest.rg000001 --name azuredbclitest000003 --sku-name GP_Gen5_2 -postgres server update -g clitest.rg000001 --name azuredbclitest000003 --ssl-enforcement Enabled -postgres server update -g clitest.rg000001 --name azuredbclitest000003 --tags key=3 -postgres server restore -g clitest.rg000002 --name azuredbclirestore000004 --source-server /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000003 --restore-point-in-time 2021-02-08T18:12:48.680000+00:00 -postgres server georestore -g clitest.rg000002 --name azuredbcligeorestore000005 --source-server /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000003 -l eastus --geo-redundant-backup Disabled --backup-retention 20 -postgres server create -g clitest.rg000001 --name azuredbcliinfraencrypt000006 -l westus2 --admin-user cloudsa --admin-password SecretPassword123 --sku-name GP_Gen5_2 --tags key=1 --geo-redundant-backup Enabled --backup-retention 10 --infrastructure-encryption Enabled -postgres server list -g clitest.rg000002 -postgres server list -postgres server show-connection-string -s azuredbclitest000003 -postgres server delete -g clitest.rg000001 --name azuredbclitest000003 --yes -postgres server delete -g clitest.rg000002 -n azuredbclirestore000004 --yes -postgres server delete -g clitest.rg000001 -n azuredbcliinfraencrypt000006 --yes -postgres server list -g clitest.rg000001 -postgres server list -g clitest.rg000002 -postgres server list-skus -l westus2 -mariadb server firewall-rule create -n rule1 -g clitest.rg000001 -s azuredbclitest000002 --start-ip-address 0.0.0.0 --end-ip-address 255.255.255.255 -mariadb server firewall-rule show --name rule1 -g clitest.rg000001 --server azuredbclitest000002 -mariadb server firewall-rule update -n rule1 -g clitest.rg000001 -s azuredbclitest000002 --start-ip-address 123.123.123.123 --end-ip-address 123.123.123.124 -mariadb server firewall-rule update --name rule1 -g clitest.rg000001 --server azuredbclitest000002 --start-ip-address 0.0.0.0 -mariadb server firewall-rule update -n rule1 -g clitest.rg000001 -s azuredbclitest000002 --end-ip-address 255.255.255.255 -mariadb server firewall-rule create --name rule2 -g clitest.rg000001 --server azuredbclitest000002 --start-ip-address 123.123.123.123 --end-ip-address 123.123.123.124 -mariadb server firewall-rule list -g clitest.rg000001 -s azuredbclitest000002 -mariadb server firewall-rule delete --name rule1 -g clitest.rg000001 --server azuredbclitest000002 --yes -mariadb server firewall-rule list -g clitest.rg000001 --server azuredbclitest000002 -mariadb server firewall-rule delete -n rule2 -g clitest.rg000001 -s azuredbclitest000002 --yes -mariadb server firewall-rule list -g clitest.rg000001 --server azuredbclitest000002 -network vnet create -n clitestvnet -g clitest.rg000001 -l westus --address-prefix 10.0.0.0/16 --subnet-name clitestsubnet1 --subnet-prefix 10.0.0.0/24 -network vnet subnet create --vnet-name clitestvnet -g clitest.rg000001 --address-prefix 10.0.1.0/24 -n clitestsubnet2 -mariadb server vnet-rule create -n vnet_rule1 -g clitest.rg000001 -s azuredbclitest000002 --vnet-name clitestvnet --subnet clitestsubnet1 --ignore-missing-endpoint true -mariadb server vnet-rule show -n vnet_rule1 -g clitest.rg000001 -s azuredbclitest000002 -mariadb server vnet-rule create -n vnet_rule2 -g clitest.rg000001 -s azuredbclitest000002 --vnet-name clitestvnet --subnet clitestsubnet2 --ignore-missing-endpoint true -network vnet subnet create --vnet-name clitestvnet -g clitest.rg000001 --address-prefix 10.0.3.0/24 -n clitestsubnet3 -mariadb server vnet-rule update -n vnet_rule2 -g clitest.rg000001 -s azuredbclitest000002 --vnet-name clitestvnet --subnet clitestsubnet3 --ignore-missing-endpoint true -mariadb server vnet-rule list -g clitest.rg000001 -s azuredbclitest000002 -mariadb server vnet-rule delete --name vnet_rule1 -g clitest.rg000001 --server azuredbclitest000002 -mariadb server vnet-rule list -g clitest.rg000001 --server azuredbclitest000002 -mariadb server vnet-rule delete -n vnet_rule2 -g clitest.rg000001 -s azuredbclitest000002 -mariadb server vnet-rule list -g clitest.rg000001 --server azuredbclitest000002 -network vnet delete -n clitestvnet -g clitest.rg000001 -mariadb db list -g clitest.rg000001 -s azuredbclitest000002 -mariadb server configuration show --name log_slow_admin_statements -g clitest.rg000001 --server azuredbclitest000002 -mariadb server configuration set -n log_slow_admin_statements -g clitest.rg000001 -s azuredbclitest000002 --value ON -mariadb server configuration set -n log_slow_admin_statements -g clitest.rg000001 -s azuredbclitest000002 -mariadb server configuration list -g clitest.rg000001 -s azuredbclitest000002 -mariadb server configuration set -n slow_query_log -g clitest.rg000001 -s azuredbclitest000002 --value ON -mariadb server-logs list -g clitest.rg000001 -s azuredbclitest000002 --file-last-written 43800 -mariadb server private-link-resource list -g clitest.rg000001 -s azuredbclitest000002 -network vnet create -n cli-vnet-000003 -g clitest.rg000001 -l westus --subnet-name cli-subnet-000004 -network vnet subnet update -n cli-subnet-000004 --vnet-name cli-vnet-000003 -g clitest.rg000001 --disable-private-endpoint-network-policies true -mariadb server show -g clitest.rg000001 -n azuredbclitest000002 -mariadb server private-link-resource list -g clitest.rg000001 -s azuredbclitest000002 -network private-endpoint create -g clitest.rg000001 -n cli-pe-000005 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000008 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMariaDB/servers/azuredbclitest000002 --group-id mariadbServer -mariadb server show -g clitest.rg000001 -n azuredbclitest000002 -mariadb server private-endpoint-connection show --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-2e9429d3-41ff-452f-b00e-db95351214e2 -mariadb server private-endpoint-connection approve --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-2e9429d3-41ff-452f-b00e-db95351214e2 --description "You are approved!" -mariadb server private-endpoint-connection reject --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-2e9429d3-41ff-452f-b00e-db95351214e2 --description "You are rejected!" -mariadb server private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMariaDB/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000005-2e9429d3-41ff-452f-b00e-db95351214e2 -network private-endpoint create -g clitest.rg000001 -n cli-pe-000006 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000009 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMariaDB/servers/azuredbclitest000002 --group-id mariadbServer --manual-request -mariadb server show -g clitest.rg000001 -n azuredbclitest000002 -mariadb server private-endpoint-connection show --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-09130543-0ad9-49c6-b2c3-5aab59be86d7 -mariadb server private-endpoint-connection approve --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-09130543-0ad9-49c6-b2c3-5aab59be86d7 --description "You are approved!" -mariadb server private-endpoint-connection reject --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-09130543-0ad9-49c6-b2c3-5aab59be86d7 --description "You are rejected!" -mariadb server private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMariaDB/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000006-09130543-0ad9-49c6-b2c3-5aab59be86d7 -network private-endpoint create -g clitest.rg000001 -n cli-pe-000007 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000010 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMariaDB/servers/azuredbclitest000002 --group-id mariadbServer --manual-request true -mariadb server show -g clitest.rg000001 -n azuredbclitest000002 -mariadb server private-endpoint-connection show --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-6975d7d3-761b-452c-b294-367ee4c5c586 -mariadb server private-endpoint-connection reject --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-6975d7d3-761b-452c-b294-367ee4c5c586 --description "You are rejected!" -mariadb server private-endpoint-connection approve --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-6975d7d3-761b-452c-b294-367ee4c5c586 --description "You are approved!" -mariadb server private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMariaDB/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000007-6975d7d3-761b-452c-b294-367ee4c5c586 -mysql server firewall-rule create -n rule1 -g clitest.rg000001 -s azuredbclitest000002 --start-ip-address 0.0.0.0 --end-ip-address 255.255.255.255 -mysql server firewall-rule show --name rule1 -g clitest.rg000001 --server azuredbclitest000002 -mysql server firewall-rule update -n rule1 -g clitest.rg000001 -s azuredbclitest000002 --start-ip-address 123.123.123.123 --end-ip-address 123.123.123.124 -mysql server firewall-rule update --name rule1 -g clitest.rg000001 --server azuredbclitest000002 --start-ip-address 0.0.0.0 -mysql server firewall-rule update -n rule1 -g clitest.rg000001 -s azuredbclitest000002 --end-ip-address 255.255.255.255 -mysql server firewall-rule create --name rule2 -g clitest.rg000001 --server azuredbclitest000002 --start-ip-address 123.123.123.123 --end-ip-address 123.123.123.124 -mysql server firewall-rule list -g clitest.rg000001 -s azuredbclitest000002 -mysql server firewall-rule delete --name rule1 -g clitest.rg000001 --server azuredbclitest000002 --yes -mysql server firewall-rule list -g clitest.rg000001 --server azuredbclitest000002 -mysql server firewall-rule delete -n rule2 -g clitest.rg000001 -s azuredbclitest000002 --yes -mysql server firewall-rule list -g clitest.rg000001 --server azuredbclitest000002 -network vnet create -n clitestvnet -g clitest.rg000001 -l westus --address-prefix 10.0.0.0/16 --subnet-name clitestsubnet1 --subnet-prefix 10.0.0.0/24 -network vnet subnet create --vnet-name clitestvnet -g clitest.rg000001 --address-prefix 10.0.1.0/24 -n clitestsubnet2 -mysql server vnet-rule create -n vnet_rule1 -g clitest.rg000001 -s azuredbclitest000002 --vnet-name clitestvnet --subnet clitestsubnet1 --ignore-missing-endpoint true -mysql server vnet-rule show -n vnet_rule1 -g clitest.rg000001 -s azuredbclitest000002 -mysql server vnet-rule create -n vnet_rule2 -g clitest.rg000001 -s azuredbclitest000002 --vnet-name clitestvnet --subnet clitestsubnet2 --ignore-missing-endpoint true -network vnet subnet create --vnet-name clitestvnet -g clitest.rg000001 --address-prefix 10.0.3.0/24 -n clitestsubnet3 -mysql server vnet-rule update -n vnet_rule2 -g clitest.rg000001 -s azuredbclitest000002 --vnet-name clitestvnet --subnet clitestsubnet3 --ignore-missing-endpoint true -mysql server vnet-rule list -g clitest.rg000001 -s azuredbclitest000002 -mysql server vnet-rule delete --name vnet_rule1 -g clitest.rg000001 --server azuredbclitest000002 -mysql server vnet-rule list -g clitest.rg000001 --server azuredbclitest000002 -mysql server vnet-rule delete -n vnet_rule2 -g clitest.rg000001 -s azuredbclitest000002 -mysql server vnet-rule list -g clitest.rg000001 --server azuredbclitest000002 -network vnet delete -n clitestvnet -g clitest.rg000001 -mysql db list -g clitest.rg000001 -s azuredbclitest000002 -mysql server configuration show --name log_slow_admin_statements -g clitest.rg000001 --server azuredbclitest000002 -mysql server configuration set -n log_slow_admin_statements -g clitest.rg000001 -s azuredbclitest000002 --value ON -mysql server configuration set -n log_slow_admin_statements -g clitest.rg000001 -s azuredbclitest000002 -mysql server configuration list -g clitest.rg000001 -s azuredbclitest000002 -mysql server configuration set -n slow_query_log -g clitest.rg000001 -s azuredbclitest000002 --value ON -mysql server-logs list -g clitest.rg000001 -s azuredbclitest000002 --file-last-written 43800 -mysql server private-link-resource list -g clitest.rg000001 -s azuredbclitest000002 -network vnet create -n cli-vnet-000003 -g clitest.rg000001 -l westus --subnet-name cli-subnet-000004 -network vnet subnet update -n cli-subnet-000004 --vnet-name cli-vnet-000003 -g clitest.rg000001 --disable-private-endpoint-network-policies true -mysql server show -g clitest.rg000001 -n azuredbclitest000002 -mysql server private-link-resource list -g clitest.rg000001 -s azuredbclitest000002 -network private-endpoint create -g clitest.rg000001 -n cli-pe-000005 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000008 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000002 --group-id mysqlServer -mysql server show -g clitest.rg000001 -n azuredbclitest000002 -mysql server private-endpoint-connection show --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-be01ca42-1f15-455f-a978-a02e1cd233e6 -mysql server private-endpoint-connection approve --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-be01ca42-1f15-455f-a978-a02e1cd233e6 --description "You are approved!" -mysql server private-endpoint-connection reject --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-be01ca42-1f15-455f-a978-a02e1cd233e6 --description "You are rejected!" -mysql server private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000005-be01ca42-1f15-455f-a978-a02e1cd233e6 -network private-endpoint create -g clitest.rg000001 -n cli-pe-000006 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000009 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000002 --group-id mysqlServer --manual-request -mysql server show -g clitest.rg000001 -n azuredbclitest000002 -mysql server private-endpoint-connection show --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-c32bc5a7-5290-4a7e-bb78-b8a8ec8c4a75 -mysql server private-endpoint-connection approve --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-c32bc5a7-5290-4a7e-bb78-b8a8ec8c4a75 --description "You are approved!" -mysql server private-endpoint-connection reject --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-c32bc5a7-5290-4a7e-bb78-b8a8ec8c4a75 --description "You are rejected!" -mysql server private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000006-c32bc5a7-5290-4a7e-bb78-b8a8ec8c4a75 -network private-endpoint create -g clitest.rg000001 -n cli-pe-000007 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000010 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000002 --group-id mysqlServer --manual-request true -mysql server show -g clitest.rg000001 -n azuredbclitest000002 -mysql server private-endpoint-connection show --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-f35ea28d-4f02-4ebd-a357-f2cf319fef70 -mysql server private-endpoint-connection reject --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-f35ea28d-4f02-4ebd-a357-f2cf319fef70 --description "You are rejected!" -mysql server private-endpoint-connection approve --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-f35ea28d-4f02-4ebd-a357-f2cf319fef70 --description "You are approved!" -mysql server private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000007-f35ea28d-4f02-4ebd-a357-f2cf319fef70 -mysql server ad-admin create --server-name azuredbclitest000002 -g clitest.rg000001 -i 5e90ef3b-9b42-4777-819b-25c36961ea4d -u DSEngAll -mysql server ad-admin show --server-name azuredbclitest000002 -g clitest.rg000001 -mysql server ad-admin list --server-name azuredbclitest000002 -g clitest.rg000001 -mysql server ad-admin create --server-name azuredbclitest000002 -g clitest.rg000001 -i e4d43337-d52c-4a0c-b581-09055e0359a0 -u TestUser --no-wait -mysql server ad-admin wait --server-name azuredbclitest000002 -g clitest.rg000001 --created -mysql server ad-admin delete --server-name azuredbclitest000002 -g clitest.rg000001 --yes -mysql server ad-admin list --server-name azuredbclitest000002 -g clitest.rg000001 -postgres server firewall-rule create -n rule1 -g clitest.rg000001 -s azuredbclitest000002 --start-ip-address 0.0.0.0 --end-ip-address 255.255.255.255 -postgres server firewall-rule show --name rule1 -g clitest.rg000001 --server azuredbclitest000002 -postgres server firewall-rule update -n rule1 -g clitest.rg000001 -s azuredbclitest000002 --start-ip-address 123.123.123.123 --end-ip-address 123.123.123.124 -postgres server firewall-rule update --name rule1 -g clitest.rg000001 --server azuredbclitest000002 --start-ip-address 0.0.0.0 -postgres server firewall-rule update -n rule1 -g clitest.rg000001 -s azuredbclitest000002 --end-ip-address 255.255.255.255 -postgres server firewall-rule create --name rule2 -g clitest.rg000001 --server azuredbclitest000002 --start-ip-address 123.123.123.123 --end-ip-address 123.123.123.124 -postgres server firewall-rule list -g clitest.rg000001 -s azuredbclitest000002 -postgres server firewall-rule delete --name rule1 -g clitest.rg000001 --server azuredbclitest000002 --yes -postgres server firewall-rule list -g clitest.rg000001 --server azuredbclitest000002 -postgres server firewall-rule delete -n rule2 -g clitest.rg000001 -s azuredbclitest000002 --yes -postgres server firewall-rule list -g clitest.rg000001 --server azuredbclitest000002 -network vnet create -n clitestvnet -g clitest.rg000001 -l westus --address-prefix 10.0.0.0/16 --subnet-name clitestsubnet1 --subnet-prefix 10.0.0.0/24 -network vnet subnet create --vnet-name clitestvnet -g clitest.rg000001 --address-prefix 10.0.1.0/24 -n clitestsubnet2 -postgres server vnet-rule create -n vnet_rule1 -g clitest.rg000001 -s azuredbclitest000002 --vnet-name clitestvnet --subnet clitestsubnet1 --ignore-missing-endpoint true -postgres server vnet-rule show -n vnet_rule1 -g clitest.rg000001 -s azuredbclitest000002 -postgres server vnet-rule create -n vnet_rule2 -g clitest.rg000001 -s azuredbclitest000002 --vnet-name clitestvnet --subnet clitestsubnet2 --ignore-missing-endpoint true -network vnet subnet create --vnet-name clitestvnet -g clitest.rg000001 --address-prefix 10.0.3.0/24 -n clitestsubnet3 -postgres server vnet-rule update -n vnet_rule2 -g clitest.rg000001 -s azuredbclitest000002 --vnet-name clitestvnet --subnet clitestsubnet3 --ignore-missing-endpoint true -postgres server vnet-rule list -g clitest.rg000001 -s azuredbclitest000002 -postgres server vnet-rule delete --name vnet_rule1 -g clitest.rg000001 --server azuredbclitest000002 -postgres server vnet-rule list -g clitest.rg000001 --server azuredbclitest000002 -postgres server vnet-rule delete -n vnet_rule2 -g clitest.rg000001 -s azuredbclitest000002 -postgres server vnet-rule list -g clitest.rg000001 --server azuredbclitest000002 -network vnet delete -n clitestvnet -g clitest.rg000001 -postgres db list -g clitest.rg000001 -s azuredbclitest000002 -postgres server configuration show --name array_nulls -g clitest.rg000001 --server azuredbclitest000002 -postgres server configuration set -n array_nulls -g clitest.rg000001 -s azuredbclitest000002 --value off -postgres server configuration set -n array_nulls -g clitest.rg000001 -s azuredbclitest000002 -postgres server configuration list -g clitest.rg000001 -s azuredbclitest000002 -postgres server-logs list -g clitest.rg000001 -s azuredbclitest000002 --file-last-written 43800 -postgres server private-link-resource list -g clitest.rg000001 -s azuredbclitest000002 -network vnet create -n cli-vnet-000003 -g clitest.rg000001 -l westus --subnet-name cli-subnet-000004 -network vnet subnet update -n cli-subnet-000004 --vnet-name cli-vnet-000003 -g clitest.rg000001 --disable-private-endpoint-network-policies true -postgres server show -g clitest.rg000001 -n azuredbclitest000002 -postgres server private-link-resource list -g clitest.rg000001 -s azuredbclitest000002 -network private-endpoint create -g clitest.rg000001 -n cli-pe-000005 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000008 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000002 --group-id postgresqlServer -postgres server show -g clitest.rg000001 -n azuredbclitest000002 -postgres server private-endpoint-connection show --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-03f039d7-6194-4a73-b637-374609f90cbe -postgres server private-endpoint-connection approve --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-03f039d7-6194-4a73-b637-374609f90cbe --description "You are approved!" -postgres server private-endpoint-connection reject --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000005-03f039d7-6194-4a73-b637-374609f90cbe --description "You are rejected!" -postgres server private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000005-03f039d7-6194-4a73-b637-374609f90cbe -network private-endpoint create -g clitest.rg000001 -n cli-pe-000006 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000009 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000002 --group-id postgresqlServer --manual-request -postgres server show -g clitest.rg000001 -n azuredbclitest000002 -postgres server private-endpoint-connection show --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-29ef92d4-3ea7-4af8-a03f-a700c2c2bd6e -postgres server private-endpoint-connection approve --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-29ef92d4-3ea7-4af8-a03f-a700c2c2bd6e --description "You are approved!" -postgres server private-endpoint-connection reject --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000006-29ef92d4-3ea7-4af8-a03f-a700c2c2bd6e --description "You are rejected!" -postgres server private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000006-29ef92d4-3ea7-4af8-a03f-a700c2c2bd6e -network private-endpoint create -g clitest.rg000001 -n cli-pe-000007 --vnet-name cli-vnet-000003 --subnet cli-subnet-000004 -l westus --connection-name cli-pec-000010 --private-connection-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000002 --group-id postgresqlServer --manual-request true -postgres server show -g clitest.rg000001 -n azuredbclitest000002 -postgres server private-endpoint-connection show --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-8414e825-5c5b-41fa-9111-429d35d5207e -postgres server private-endpoint-connection reject --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-8414e825-5c5b-41fa-9111-429d35d5207e --description "You are rejected!" -postgres server private-endpoint-connection approve --server-name azuredbclitest000002 -g clitest.rg000001 --name cli-pe-000007-8414e825-5c5b-41fa-9111-429d35d5207e --description "You are approved!" -postgres server private-endpoint-connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000002/privateEndpointConnections/cli-pe-000007-8414e825-5c5b-41fa-9111-429d35d5207e -postgres server ad-admin create --server-name azuredbclitest000002 -g clitest.rg000001 -i 5e90ef3b-9b42-4777-819b-25c36961ea4d -u DSEngAll -postgres server ad-admin show --server-name azuredbclitest000002 -g clitest.rg000001 -postgres server ad-admin list --server-name azuredbclitest000002 -g clitest.rg000001 -postgres server ad-admin create --server-name azuredbclitest000002 -g clitest.rg000001 -i e4d43337-d52c-4a0c-b581-09055e0359a0 -u TestUser --no-wait -postgres server ad-admin wait --server-name azuredbclitest000002 -g clitest.rg000001 --created -postgres server ad-admin delete --server-name azuredbclitest000002 -g clitest.rg000001 --yes -postgres server ad-admin list --server-name azuredbclitest000002 -g clitest.rg000001 -mysql server create -g clitest.rg000001 --name azuredbclitest000002 -l westus --admin-user cloudsa --admin-password SecretPassword123 --sku-name GP_Gen5_2 -mysql server replica create -g clitest.rg000001 -n azuredbclirep1000003 -l westus --sku-name GP_Gen5_4 --source-server /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000002 -mysql server show -g clitest.rg000001 --name azuredbclitest000002 -mysql server replica list -g clitest.rg000001 -s azuredbclitest000002 -mysql server replica stop -g clitest.rg000001 -n azuredbclirep1000003 --yes -mysql server show -g clitest.rg000001 --name azuredbclitest000002 -mysql server replica create -g clitest.rg000001 -n azuredbclirep2000004 --source-server /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/servers/azuredbclitest000002 -mysql server delete -g clitest.rg000001 --name azuredbclitest000002 --yes -mysql server show -g clitest.rg000001 --name azuredbclirep2000004 -mysql server delete -g clitest.rg000001 --name azuredbclirep1000003 --yes -mysql server delete -g clitest.rg000001 --name azuredbclirep2000004 --yes -postgres server create -g clitest.rg000001 --name azuredbclitest000003 -l westus --admin-user cloudsa --admin-password SecretPassword123 --sku-name B_Gen5_2 -postgres server replica create -g clitest.rg000001 -n azuredbclirep1000004 -l westus --sku-name B_Gen5_2 --source-server /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000003 -postgres server show -g clitest.rg000001 --name azuredbclitest000003 -postgres server replica list -g clitest.rg000001 -s azuredbclitest000003 -postgres server delete -g clitest.rg000001 --name azuredbclirep1000004 --yes -postgres server show -g clitest.rg000001 --name azuredbclitest000003 -postgres server replica create -g clitest.rg000001 -n azuredbclirep2000005 --source-server /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000003 -postgres server delete -g clitest.rg000001 --name azuredbclitest000003 --yes -postgres server delete -g clitest.rg000001 --name azuredbclirep1000004 --yes -postgres server delete -g clitest.rg000001 --name azuredbclirep2000005 --yes -postgres server create -g clitest.rg000001 --name azuredbclitest000003 -l westus --admin-user cloudsa --admin-password SecretPassword123 --sku-name GP_Gen5_2 -postgres server configuration set -g clitest.rg000001 -s azuredbclitest000003 -n azure.replication_support --value REPLICA -postgres server restart -g clitest.rg000001 --name azuredbclitest000003 -postgres server replica create -g clitest.rg000001 -n azuredbclirep1000004 -l westus --sku-name GP_Gen5_4 --source-server /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000003 -postgres server show -g clitest.rg000001 --name azuredbclitest000003 -postgres server replica list -g clitest.rg000001 -s azuredbclitest000003 -postgres server delete -g clitest.rg000001 --name azuredbclirep1000004 --yes -postgres server show -g clitest.rg000001 --name azuredbclitest000003 -postgres server replica create -g clitest.rg000001 -n azuredbclirep2000005 --source-server /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforPostgreSQL/servers/azuredbclitest000003 -postgres server delete -g clitest.rg000001 --name azuredbclitest000003 --yes -postgres server delete -g clitest.rg000001 --name azuredbclirep1000004 --yes -postgres server delete -g clitest.rg000001 --name azuredbclirep2000005 --yes -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 --vnet VNET000009 --subnet SUBNET000010 -l eastus2euap --geo-redundant-backup Enabled --yes -mysql flexible-server show -g clitest.rg000001 -n azuredbclitest-000002 -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000003 --public-access None -l eastus2euap --geo-redundant-backup Enabled -mysql flexible-server show -g clitest.rg000001 -n azuredbclitest-000003 -mysql flexible-server geo-restore -g clitest.rg000001 -l centraluseuap --name azuredbclitest-000004 --source-server azuredbclitest-000002 -mysql flexible-server geo-restore -g clitest.rg000001 -l centraluseuap --name azuredbclitest-000007 --source-server azuredbclitest-000002 --public-access enabled -network vnet create -g clitest.rg000001 -l centraluseuap -n VNET000011 --address-prefixes 172.1.0.0/16 -network vnet subnet create -g clitest.rg000001 -n SUBNET000012 --vnet-name VNET000011 --address-prefixes 172.1.0.0/24 -mysql flexible-server geo-restore -g clitest.rg000001 -l centraluseuap -n azuredbclitest-000005 --source-server azuredbclitest-000002 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/VNET000011/subnets/SUBNET000012 --yes -network vnet create -g clitest.rg000001 -l centraluseuap -n VNET000013 --address-prefixes 172.1.0.0/16 -network vnet subnet create -g clitest.rg000001 -n SUBNET000014 --vnet-name VNET000013 --address-prefixes 172.1.0.0/24 -network private-dns zone create -g clitest.rg000001 --name azuredbclitest-000006.private.mysql.database.azure.com -mysql flexible-server geo-restore -g clitest.rg000001 -l centraluseuap -n azuredbclitest-000006 --source-server azuredbclitest-000003 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/VNET000013/subnets/SUBNET000014 --private-dns-zone azuredbclitest-000006.private.mysql.database.azure.com --public-access disabled --yes -mysql flexible-server geo-restore -g clitest.rg000001 -l centraluseuap --name azuredbclitest-000008 --source-server azuredbclitest-000003 -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000002 --yes -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000005 --yes -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000006 --yes -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000007 --yes -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000008 --yes -mysql flexible-server create --public-access none -g clitest.rg000001 -n azuredbclitest-000002 -l westus2 --iops 50 --storage-size 200 --tier Burstable --sku-name Standard_B1s -mysql flexible-server show -g clitest.rg000001 -n azuredbclitest-000002 -mysql flexible-server create --public-access none -g clitest.rg000001 -n azuredbclitest-2000003 -l westus2 --iops 50 --storage-size 30 --tier Burstable --sku-name Standard_B1s -mysql flexible-server show -g clitest.rg000001 -n azuredbclitest-2000003 -mysql flexible-server create --public-access none -g clitest.rg000001 -n azuredbclitest-3000004 -l westus2 --iops 50 --storage-size 40 --tier Burstable --sku-name Standard_B1s -mysql flexible-server show -g clitest.rg000001 -n azuredbclitest-3000004 -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 --backup-retention 7 --sku-name Standard_D2ds_v4 --tier GeneralPurpose --storage-size 32 -u dbadmin --version 5.7 --tags keys=3 --database-name testdb --high-availability ZoneRedundant --zone 1 --public-access None -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 --vnet VNET000007 --subnet SUBNET000008 -l westus2 --yes -mysql flexible-server show -g clitest.rg000001 -n azuredbclitest-000002 -mysql flexible-server restore -g clitest.rg000001 --name azuredbclitest-000003 --source-server azuredbclitest-000002 -mysql flexible-server restore -g clitest.rg000001 --name azuredbclitest-000006 --source-server azuredbclitest-000002 --public-access Enabled -network vnet create -g clitest.rg000001 -l westus2 -n VNET000009 --address-prefixes 172.1.0.0/16 -network vnet subnet create -g clitest.rg000001 -n SUBNET000010 --vnet-name VNET000009 --address-prefixes 172.1.0.0/24 -network private-dns zone create -g clitest.rg000001 --name azuredbclitest-000004.private.mysql.database.azure.com -mysql flexible-server restore -g clitest.rg000001 -n azuredbclitest-000004 --source-server azuredbclitest-000002 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/VNET000009/subnets/SUBNET000010 --private-dns-zone azuredbclitest-000004.private.mysql.database.azure.com -network vnet create -g clitest.rg000001 -l westus2 -n VNET000011 --address-prefixes 172.1.0.0/16 -network vnet subnet create -g clitest.rg000001 -n SUBNET000012 --vnet-name VNET000011 --address-prefixes 172.1.0.0/24 -network private-dns zone create -g clitest.rg000001 --name azuredbclitest-000005.private.mysql.database.azure.com -mysql flexible-server restore -g clitest.rg000001 -n azuredbclitest-000005 --source-server azuredbclitest-000006 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/VNET000011/subnets/SUBNET000012 --private-dns-zone azuredbclitest-000005.private.mysql.database.azure.com -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000002 --yes -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000003 --yes -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000004 --yes -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000005 --yes -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000006 --yes -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 --backup-retention 7 --sku-name Standard_D2s_v3 --tier GeneralPurpose --storage-size 128 -u dbadmin --version 12 --tags keys=3 --database-name testdb --high-availability Enabled --zone 1 --public-access None -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 --vnet VNET000007 --subnet SUBNET000008 -l eastus --yes -postgres flexible-server show -g clitest.rg000001 -n azuredbclitest-000002 -postgres flexible-server restore -g clitest.rg000001 --name azuredbclitest-000003 --source-server azuredbclitest-000002 -network vnet create -g clitest.rg000001 -l eastus -n VNET000009 --address-prefixes 172.1.0.0/16 -network vnet subnet create -g clitest.rg000001 -n SUBNET000010 --vnet-name VNET000009 --address-prefixes 172.1.0.0/24 -network private-dns zone create -g clitest.rg000001 --name azuredbclitest-000004.private.postgres.database.azure.com -postgres flexible-server restore -g clitest.rg000001 -n azuredbclitest-000004 --source-server azuredbclitest-000002 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/VNET000009/subnets/SUBNET000010 --private-dns-zone azuredbclitest-000004.private.postgres.database.azure.com -postgres flexible-server delete -g clitest.rg000001 -n azuredbclitest-000002 --yes -postgres flexible-server delete -g clitest.rg000001 -n azuredbclitest-000003 --yes -postgres flexible-server delete -g clitest.rg000001 -n azuredbclitest-000004 --yes -postgres flexible-server delete -g clitest.rg000001 -n azuredbclitest-000005 --yes -postgres flexible-server delete -g clitest.rg000001 -n azuredbclitest-000006 --yes -mysql flexible-server firewall-rule create -g clitest.rg000001 --name azuredbclitest-000002 --rule-name firewall_test_rule --start-ip-address 10.10.10.10 --end-ip-address 12.12.12.12 -mysql flexible-server firewall-rule show -g clitest.rg000001 --name azuredbclitest-000002 --rule-name firewall_test_rule -mysql flexible-server firewall-rule update -g clitest.rg000001 --name azuredbclitest-000002 --rule-name firewall_test_rule --start-ip-address 9.9.9.9 -mysql flexible-server firewall-rule update -g clitest.rg000001 --name azuredbclitest-000002 --rule-name firewall_test_rule --end-ip-address 13.13.13.13 -mysql flexible-server firewall-rule create -g clitest.rg000001 -n azuredbclitest-000002 --rule-name firewall_test_rule2 --start-ip-address 10.10.10.10 --end-ip-address 12.12.12.12 -mysql flexible-server firewall-rule list -g clitest.rg000001 -n azuredbclitest-000002 -mysql flexible-server firewall-rule delete --rule-name firewall_test_rule -g clitest.rg000001 --name azuredbclitest-000002 --yes -mysql flexible-server firewall-rule list -g clitest.rg000001 --name azuredbclitest-000002 -mysql flexible-server firewall-rule delete -g clitest.rg000001 -n azuredbclitest-000002 --rule-name firewall_test_rule2 --yes -mysql flexible-server firewall-rule list -g clitest.rg000001 -n azuredbclitest-000002 -mysql flexible-server parameter list -g clitest.rg000001 -s azuredbclitest-000002 -mysql flexible-server parameter show --name wait_timeout -g clitest.rg000001 -s azuredbclitest-000002 -mysql flexible-server parameter set --name wait_timeout -v 30000 --source user-override -s azuredbclitest-000002 -g clitest.rg000001 -mysql flexible-server db create -g clitest.rg000001 -s azuredbclitest-000002 -d database000003 -mysql flexible-server db show -g clitest.rg000001 -s azuredbclitest-000002 -d database000003 -mysql flexible-server db list -g clitest.rg000001 -s azuredbclitest-000002 -mysql flexible-server db delete -g clitest.rg000001 -s azuredbclitest-000002 -d database000003 --yes -postgres flexible-server firewall-rule create -g clitest.rg000001 --name azuredbclitest-000002 --rule-name firewall_test_rule --start-ip-address 10.10.10.10 --end-ip-address 12.12.12.12 -postgres flexible-server firewall-rule show -g clitest.rg000001 --name azuredbclitest-000002 --rule-name firewall_test_rule -postgres flexible-server firewall-rule update -g clitest.rg000001 --name azuredbclitest-000002 --rule-name firewall_test_rule --start-ip-address 9.9.9.9 -postgres flexible-server firewall-rule update -g clitest.rg000001 --name azuredbclitest-000002 --rule-name firewall_test_rule --end-ip-address 13.13.13.13 -postgres flexible-server firewall-rule create -g clitest.rg000001 -n azuredbclitest-000002 --rule-name firewall_test_rule2 --start-ip-address 10.10.10.10 --end-ip-address 12.12.12.12 -postgres flexible-server firewall-rule list -g clitest.rg000001 -n azuredbclitest-000002 -postgres flexible-server firewall-rule delete --rule-name firewall_test_rule -g clitest.rg000001 --name azuredbclitest-000002 --yes -postgres flexible-server firewall-rule list -g clitest.rg000001 --name azuredbclitest-000002 -postgres flexible-server firewall-rule delete -g clitest.rg000001 -n azuredbclitest-000002 --rule-name firewall_test_rule2 --yes -postgres flexible-server firewall-rule list -g clitest.rg000001 -n azuredbclitest-000002 -postgres flexible-server parameter list -g clitest.rg000001 -s azuredbclitest-000002 -postgres flexible-server parameter show --name lock_timeout -g clitest.rg000001 -s azuredbclitest-000002 -postgres flexible-server parameter set --name lock_timeout -v 2000 --source user-override -s azuredbclitest-000002 -g clitest.rg000001 -postgres flexible-server db create -g clitest.rg000001 -s azuredbclitest-000002 -d database000003 -postgres flexible-server db show -g clitest.rg000001 -s azuredbclitest-000002 -d database000003 -postgres flexible-server db list -g clitest.rg000001 -s azuredbclitest-000002 -postgres flexible-server db delete -g clitest.rg000001 -s azuredbclitest-000002 -d database000003 --yes -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l westus2 --tier tier000005 -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l westus2 --version version000003 -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l westus2 --tier GeneralPurpose --sku-name sku_name000004 -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l westus2 --backup-retention 40 -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l centraluseuap --high-availability ZoneRedundant -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l westus2 --tier Burstable --sku-name Standard_B1ms --high-availability ZoneRedundant -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l centraluseuap --tier GeneralPurpose --sku-name Standard_D2s_v3 --high-availability ZoneRedundant -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l westus2 --tier GeneralPurpose --sku-name Standard_D2s_v3 --high-availability ZoneRedundant --zone 1 --standby-zone 1 -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l westus2 --tier GeneralPurpose --sku-name Standard_D2s_v3 --high-availability ZoneRedundant --storage-auto-grow Disabled -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l westus2 --vnet testvnet --subnet testsubnet --public-access All -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l westus2 --subnet testsubnet -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l westus2 --public-access 12.0.0.0-10.0.0.0.0 -mysql flexible-server create -g clitest.rg000001 -l westus2 --storage-size 10 --public-access none -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l westus2 --tier Burstable --version 5.7 --sku-name Standard_B1ms --storage-size 32 --backup-retention 10 --public-access none -mysql flexible-server show -g clitest.rg000001 -n azuredbclitest-000002 -mysql flexible-server update -g clitest.rg000001 -n azuredbclitest-000002 --tier GeneralPurpose -mysql flexible-server update -g clitest.rg000001 -n azuredbclitest-000002 --tier GeneralPurpose --sku-name sku_name000004 -mysql flexible-server update -g clitest.rg000001 -n azuredbclitest-000002 --storage-size 30 -mysql flexible-server update -g clitest.rg000001 -n azuredbclitest-000002 --backup-retention 40 -mysql flexible-server update -g clitest.rg000001 -n azuredbclitest-000002 --high-availability ZoneRedundant -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000002 --yes -postgres flexible-server create -g clitest.rg000001 -n Wrongserver.Name -l eastus2euap -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l eastus2euap --tier tier000005 -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l eastus2euap --version version000003 -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l eastus2euap --tier GeneralPurpose --sku-name sku_name000004 -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l eastus2euap --backup-retention 40 -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l centraluseuap --high-availability Enabled -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l eastus2euap --tier Burstable --sku-name Standard_B1ms --high-availability Enabled -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l centraluseuap --tier GeneralPurpose --sku-name Standard_D2s_v3 --high-availability Enabled -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l eastus2euap --tier GeneralPurpose --sku-name Standard_D2s_v3 --high-availability Enabled --zone 1 --standby-zone 1 -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l eastus2euap --vnet testvnet --subnet testsubnet --public-access All -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l eastus2euap --subnet testsubnet -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l eastus2euap --public-access 12.0.0.0-10.0.0.0.0 -postgres flexible-server create -g clitest.rg000001 -l eastus2euap --storage-size 60 --public-access none -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 -l eastus2euap --tier Burstable --version 12 --sku-name Standard_B1ms --storage-size 128 --backup-retention 10 --public-access none -postgres flexible-server show -g clitest.rg000001 -n azuredbclitest-000002 -postgres flexible-server update -g clitest.rg000001 -n azuredbclitest-000002 --tier GeneralPurpose -postgres flexible-server update -g clitest.rg000001 -n azuredbclitest-000002 --tier GeneralPurpose --sku-name sku_name000004 -postgres flexible-server update -g clitest.rg000001 -n azuredbclitest-000002 --storage-size 64 -postgres flexible-server update -g clitest.rg000001 -n azuredbclitest-000002 --backup-retention 40 -postgres flexible-server update -g clitest.rg000001 -n azuredbclitest-000002 --high-availability Enabled -postgres flexible-server delete -g clitest.rg000001 -n azuredbclitest-000002 --yes -mysql flexible-server create -g clitest.rg000001 --name azuredbclitest-000002 -l westus2 --storage-size 256 --public-access none --tier GeneralPurpose --sku-name Standard_D2ds_v4 -mysql flexible-server show -g clitest.rg000001 --name azuredbclitest-000002 -mysql flexible-server replica create -g clitest.rg000001 --replica-name azuredbclirep1000003 --source-server /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/flexibleServers/azuredbclitest-000002 --zone 2 -mysql flexible-server replica list -g clitest.rg000001 --name azuredbclitest-000002 -mysql flexible-server update -g clitest.rg000001 -n azuredbclitest-000002 --storage-auto-grow Disabled -mysql flexible-server replica stop-replication -g clitest.rg000001 --name azuredbclirep1000003 --yes -mysql flexible-server show -g clitest.rg000001 --name azuredbclitest-000002 -mysql flexible-server replica create -g clitest.rg000001 --replica-name azuredbclirep2000004 --source-server /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.DBforMySQL/flexibleServers/azuredbclitest-000002 -mysql flexible-server delete -g clitest.rg000001 --name azuredbclitest-000002 --yes -mysql flexible-server show -g clitest.rg000001 --name azuredbclirep2000004 -mysql flexible-server delete -g clitest.rg000001 --name azuredbclirep1000003 --yes -mysql flexible-server delete -g clitest.rg000001 --name azuredbclirep2000004 --yes -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet/subnets/testsubnet -network vnet subnet create -g clitest.rg000001 -n testsubnet2 --address-prefixes 172.1.1.0/24 --vnet-name testvnet -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet/subnets/testsubnet2 -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet1 -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet1/subnets/testsubnet1 -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet1 -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet1/subnets/testsubnet2 -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet1 -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet1/subnets/testsubnet3 -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet1 -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet1/subnets/testsubnet1 -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet1 -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet1/subnets/testsubnet1 -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet1 -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet1/subnets/Subnetvnet-preparer-server -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/testvnet2 -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/testvnet2/subnets/Subnetvnet-preparer-server -network vnet create -n testvnet3 -g clitest.rg000001 -l eastus2euap --address-prefix 172.0.0.0/16 -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet3 -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet3/subnets/Subnetvnet-preparer-server -network vnet create -n testvnet4 -g clitest.rg000002 -l eastus2euap --address-prefix 173.1.0.0/16 -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/testvnet4 -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/testvnet4/subnets/Subnetvnet-preparer-server -network vnet create -g clitest.rg000001 -l eastus2euap -n testvnet --address-prefixes 172.1.0.0/16 -postgres flexible-server create -g clitest.rg000001 -l eastus --vnet testvnet --yes -network vnet subnet create -g clitest.rg000001 -n testsubnet --vnet-name testvnet --address-prefixes 172.1.0.0/24 --delegations Microsoft.DBforMySQL/flexibleServers -postgres flexible-server create -g clitest.rg000001 -l eastus --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet/subnets/testsubnet --yes -network vnet create -n clitestvnet5 -g clitest.rg000001 -l westus2 --address-prefix 10.10.0.0/16 --subnet-name clitestsubnet5 --subnet-prefix 10.10.0.0/24 -mysql flexible-server create -g clitest.rg000002 -n azuredbclitest-000003 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/clitestvnet5/subnets/clitestsubnet5 -l westus2 --private-dns-zone testdnszone5.private.mysql.database.azure.com --yes -mysql flexible-server show -g clitest.rg000002 -n azuredbclitest-000003 -mysql flexible-server delete -g clitest.rg000002 -n azuredbclitest-000003 --yes -network vnet subnet update -g clitest.rg000001 --name clitestsubnet5 --vnet-name clitestvnet5 --remove delegations -network vnet delete -g clitest.rg000001 -n clitestvnet5 -network vnet create -g clitest.rg000001 -l westus2 -n testvnet --address-prefixes 172.1.0.0/16 --subnet-name testsubnet --subnet-prefixes 172.1.0.0/24 -network vnet subnet show -g clitest.rg000001 -n testsubnet --vnet-name testvnet -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet/subnets/testsubnet -l westus2 --private-dns-zone testdnszone0.private.mysql.database.azure.com --yes -mysql flexible-server show -g clitest.rg000001 -n azuredbclitest-000002 -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000002 --yes -network vnet create -n clitestvnet3 -g clitest.rg000001 -l westus2 --address-prefix 13.0.0.0/16 -mysql flexible-server create -g clitest.rg000001 -n testvnetserver3mysql --vnet clitestvnet3 -l westus2 --subnet clitestsubnet3 --private-dns-zone testdnszone3.private.mysql.database.azure.com --yes -mysql flexible-server create -g clitest.rg000001 -n testvnetserver4mysql -l westus2 --vnet clitestvnet4 --private-dns-zone testdnszone4.private.mysql.database.azure.com --yes -mysql flexible-server show -g clitest.rg000001 -n testvnetserver3mysql -mysql flexible-server show -g clitest.rg000001 -n testvnetserver4mysql -mysql flexible-server delete -g clitest.rg000001 -n testvnetserver3mysql --yes -mysql flexible-server delete -g clitest.rg000001 -n testvnetserver4mysql --yes -network vnet create -n clitestvnet5 -g clitest.rg000001 -l eastus2euap --address-prefix 10.10.0.0/16 --subnet-name clitestsubnet5 --subnet-prefix 10.10.0.0/24 -postgres flexible-server create -g clitest.rg000002 -n azuredbclitest-000003 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/clitestvnet5/subnets/clitestsubnet5 -l eastus2euap --private-dns-zone testdnszone5.private.postgres.database.azure.com --yes -postgres flexible-server show -g clitest.rg000002 -n azuredbclitest-000003 -postgres flexible-server delete -g clitest.rg000002 -n azuredbclitest-000003 --yes -network vnet subnet update -g clitest.rg000001 --name clitestsubnet5 --vnet-name clitestvnet5 --remove delegations -network vnet delete -g clitest.rg000001 -n clitestvnet5 -network vnet create -g clitest.rg000001 -l eastus2euap -n testvnet --address-prefixes 172.1.0.0/16 --subnet-name testsubnet --subnet-prefixes 172.1.0.0/24 -network vnet subnet show -g clitest.rg000001 -n testsubnet --vnet-name testvnet -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000002 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/testvnet/subnets/testsubnet -l eastus2euap --private-dns-zone testdnszone0.private.postgres.database.azure.com --yes -postgres flexible-server show -g clitest.rg000001 -n azuredbclitest-000002 -postgres flexible-server delete -g clitest.rg000001 -n azuredbclitest-000002 --yes -network vnet create -n clitestvnet3 -g clitest.rg000001 -l eastus2euap --address-prefix 13.0.0.0/16 -postgres flexible-server create -g clitest.rg000001 -n testvnetserver3postgres --vnet clitestvnet3 -l eastus2euap --subnet clitestsubnet3 --private-dns-zone testdnszone3.private.postgres.database.azure.com --yes -postgres flexible-server create -g clitest.rg000001 -n testvnetserver4postgres -l eastus2euap --vnet clitestvnet4 --private-dns-zone testdnszone4.private.postgres.database.azure.com --yes -postgres flexible-server show -g clitest.rg000001 -n testvnetserver3postgres -postgres flexible-server show -g clitest.rg000001 -n testvnetserver4postgres -postgres flexible-server delete -g clitest.rg000001 -n testvnetserver3postgres --yes -postgres flexible-server delete -g clitest.rg000001 -n testvnetserver4postgres --yes -network vnet create -g clitest.rg000001 -l westus2 -n servergrouptestvnet --address-prefixes 172.1.0.0/16 --subnet-name servergrouptestsubnet --subnet-prefixes 172.1.0.0/24 -network vnet show -g clitest.rg000001 -n servergrouptestvnet -network vnet subnet show -g clitest.rg000001 -n servergrouptestsubnet --vnet-name servergrouptestvnet -network vnet create -g clitest.rg000002 -l westus2 -n vnetgrouptestvnet --address-prefixes 172.1.0.0/16 --subnet-name vnetgrouptestsubnet --subnet-prefixes 172.1.0.0/24 -network vnet show -g clitest.rg000002 -n vnetgrouptestvnet -network vnet subnet show -g clitest.rg000002 -n vnetgrouptestsubnet --vnet-name vnetgrouptestvnet -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000003 -l westus2 --private-dns-zone azuredbclitest-000003.mysql.database.azure.com --vnet servergrouptestvnet --subnet servergrouptestsubnet --yes -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000003 -l westus2 --private-dns-zone clitestincorrectsuffix.database.mysql.azure.com --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/servergrouptestvnet/subnets/servergrouptestsubnet --yes -network private-dns zone create -g clitest.rg000001 --name clitestunlinked.mysql.database.azure.com -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000003 -l westus2 --private-dns-zone clitestunlinked.mysql.database.azure.com --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/servergrouptestvnet/subnets/servergrouptestsubnet --yes -mysql flexible-server show -g clitest.rg000001 -n azuredbclitest-000003 -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/servergrouptestvnet -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/servergrouptestvnet/subnets/servergrouptestsubnet -network private-dns zone create -g clitest.rg000002 --name clitestvnetgroup.mysql.database.azure.com -network private-dns link vnet create -g clitest.rg000002 -n MyLinkName -z clitestvnetgroup.mysql.database.azure.com -v /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnetgrouptestvnet -e False -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000004 -l westus2 --private-dns-zone clitestvnetgroup.mysql.database.azure.com --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnetgrouptestvnet/subnets/vnetgrouptestsubnet --yes -mysql flexible-server show -g clitest.rg000001 -n azuredbclitest-000004 -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnetgrouptestvnet -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnetgrouptestvnet/subnets/vnetgrouptestsubnet -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000003 --yes -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000004 --yes -network vnet create -g clitest.rg000001 -l westus2 -n servergrouptestvnet --address-prefixes 172.1.0.0/16 --subnet-name servergrouptestsubnet --subnet-prefixes 172.1.0.0/24 -network vnet show -g clitest.rg000001 -n servergrouptestvnet -network vnet subnet show -g clitest.rg000001 -n servergrouptestsubnet --vnet-name servergrouptestvnet -network vnet create -g clitest.rg000002 -l westus2 -n vnetgrouptestvnet --address-prefixes 172.1.0.0/16 --subnet-name vnetgrouptestsubnet --subnet-prefixes 172.1.0.0/24 -network vnet show -g clitest.rg000002 -n vnetgrouptestvnet -network vnet subnet show -g clitest.rg000002 -n vnetgrouptestsubnet --vnet-name vnetgrouptestvnet -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000005 -l westus2 --private-dns-zone /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000003/providers/Microsoft.Network/privateDnsZones/clitestdnszone2.private.mysql.database.azure.com --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnetgrouptestvnet/subnets/vnetgrouptestsubnet --yes -mysql flexible-server show -g clitest.rg000001 -n azuredbclitest-000005 -mysql flexible-server create -g clitest.rg000001 -n azuredbclitest-000006 -l westus2 --private-dns-zone /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000003/providers/Microsoft.Network/privateDnsZones/clitestdnszone3.private.mysql.database.azure.com --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/servergrouptestvnet/subnets/servergrouptestsubnet --yes -mysql flexible-server show -g clitest.rg000001 -n azuredbclitest-000006 -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000005 --yes -mysql flexible-server delete -g clitest.rg000001 -n azuredbclitest-000006 --yes -network vnet create -g clitest.rg000001 -l eastus2euap -n servergrouptestvnet --address-prefixes 172.1.0.0/16 --subnet-name servergrouptestsubnet --subnet-prefixes 172.1.0.0/24 -network vnet show -g clitest.rg000001 -n servergrouptestvnet -network vnet subnet show -g clitest.rg000001 -n servergrouptestsubnet --vnet-name servergrouptestvnet -network vnet create -g clitest.rg000002 -l eastus2euap -n vnetgrouptestvnet --address-prefixes 172.1.0.0/16 --subnet-name vnetgrouptestsubnet --subnet-prefixes 172.1.0.0/24 -network vnet show -g clitest.rg000002 -n vnetgrouptestvnet -network vnet subnet show -g clitest.rg000002 -n vnetgrouptestsubnet --vnet-name vnetgrouptestvnet -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000003 -l eastus2euap --private-dns-zone azuredbclitest-000003.postgres.database.azure.com --vnet servergrouptestvnet --subnet servergrouptestsubnet --yes -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000003 -l eastus2euap --private-dns-zone clitestincorrectsuffix.database.postgres.azure.com --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/servergrouptestvnet/subnets/servergrouptestsubnet --yes -network private-dns zone create -g clitest.rg000001 --name clitestunlinked.postgres.database.azure.com -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000003 -l eastus2euap --private-dns-zone clitestunlinked.postgres.database.azure.com --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/servergrouptestvnet/subnets/servergrouptestsubnet --yes -postgres flexible-server show -g clitest.rg000001 -n azuredbclitest-000003 -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/servergrouptestvnet -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/servergrouptestvnet/subnets/servergrouptestsubnet -network private-dns zone create -g clitest.rg000002 --name clitestvnetgroup.postgres.database.azure.com -network private-dns link vnet create -g clitest.rg000002 -n MyLinkName -z clitestvnetgroup.postgres.database.azure.com -v /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnetgrouptestvnet -e False -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000004 -l eastus2euap --private-dns-zone clitestvnetgroup.postgres.database.azure.com --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnetgrouptestvnet/subnets/vnetgrouptestsubnet --yes -postgres flexible-server show -g clitest.rg000001 -n azuredbclitest-000004 -network vnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnetgrouptestvnet -network vnet subnet show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnetgrouptestvnet/subnets/vnetgrouptestsubnet -postgres flexible-server delete -g clitest.rg000001 -n azuredbclitest-000003 --yes -postgres flexible-server delete -g clitest.rg000001 -n azuredbclitest-000004 --yes -network vnet create -g clitest.rg000001 -l eastus2euap -n servergrouptestvnet --address-prefixes 172.1.0.0/16 --subnet-name servergrouptestsubnet --subnet-prefixes 172.1.0.0/24 -network vnet show -g clitest.rg000001 -n servergrouptestvnet -network vnet subnet show -g clitest.rg000001 -n servergrouptestsubnet --vnet-name servergrouptestvnet -network vnet create -g clitest.rg000002 -l eastus2euap -n vnetgrouptestvnet --address-prefixes 172.1.0.0/16 --subnet-name vnetgrouptestsubnet --subnet-prefixes 172.1.0.0/24 -network vnet show -g clitest.rg000002 -n vnetgrouptestvnet -network vnet subnet show -g clitest.rg000002 -n vnetgrouptestsubnet --vnet-name vnetgrouptestvnet -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000005 -l eastus2euap --private-dns-zone /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000003/providers/Microsoft.Network/privateDnsZones/clitestdnszone2.private.postgres.database.azure.com --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000002/providers/Microsoft.Network/virtualNetworks/vnetgrouptestvnet/subnets/vnetgrouptestsubnet --yes -postgres flexible-server show -g clitest.rg000001 -n azuredbclitest-000005 -postgres flexible-server create -g clitest.rg000001 -n azuredbclitest-000006 -l eastus2euap --private-dns-zone /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000003/providers/Microsoft.Network/privateDnsZones/clitestdnszone3.private.postgres.database.azure.com --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/servergrouptestvnet/subnets/servergrouptestsubnet --yes -postgres flexible-server show -g clitest.rg000001 -n azuredbclitest-000006 -postgres flexible-server delete -g clitest.rg000001 -n azuredbclitest-000005 --yes -postgres flexible-server delete -g clitest.rg000001 -n azuredbclitest-000006 --yes -postgres flexible-server migration check-name-availability --subscription 00000000-0000-0000-0000-000000000000 --resource-group raganesa-t-m-pg-1 --name raganesa-t-m-pg-1-vnet --migration-name 00000000-0000-0000-0000-000000000000 -postgres flexible-server migration create --subscription 00000000-0000-0000-0000-000000000000 --resource-group raganesa-t-m-pg-1 --name raganesa-t-m-pg-1-vnet --migration-name 00000000-0000-0000-0000-000000000000 --properties C:\\Code\\azure-cli\\src\\azure-cli\\azure\\cli\\command_modules\\rdbms\\tests\\latest\\migrationVNet.json -postgres flexible-server migration list --subscription 00000000-0000-0000-0000-000000000000 --resource-group raganesa-t-m-pg-1 --name raganesa-t-m-pg-1-vnet --filter Active -postgres flexible-server migration list --subscription 00000000-0000-0000-0000-000000000000 --resource-group raganesa-t-m-pg-1 --name raganesa-t-m-pg-1-vnet -postgres flexible-server migration show --subscription 00000000-0000-0000-0000-000000000000 --resource-group raganesa-t-m-pg-1 --name raganesa-t-m-pg-1-vnet --migration-name 00000000-0000-0000-0000-000000000000 -postgres flexible-server migration update --subscription 00000000-0000-0000-0000-000000000000 --resource-group raganesa-t-m-pg-1 --name raganesa-t-m-pg-1-vnet --migration-name 00000000-0000-0000-0000-000000000000 -postgres flexible-server migration delete --subscription 00000000-0000-0000-0000-000000000000 --resource-group raganesa-t-m-pg-1 --name raganesa-t-m-pg-1-vnet --migration-name 00000000-0000-0000-0000-000000000000 --yes -redis create -n {name} -g {rg} -l {location} --sku {sku} --vm-size {size} -redis export -n {name} -g {rg} --prefix {prefix} --container "{containersasURL}" -redis import-method -n {name} -g {rg} --files "{filesasURL}" -redis import -n {name} -g {rg} --files "{filesasURL}" -redis delete -n {name} -g {rg} -y -redis create -n {name} -g {rg} -l {location} --sku {sku} --vm-size {size} -redis firewall-rules create -n {name} -g {rg} --start-ip 127.0.0.1 --end-ip 127.0.0.1 --rule-name {rulename} -redis firewall-rules update -n {name} -g {rg} --start-ip 127.0.0.0 --end-ip 127.0.0.1 --rule-name {rulename} -redis firewall-rules list -n {name} -g {rg} -redis firewall-rules show -n {name} -g {rg} --rule-name {rulename} -redis firewall-rules delete -n {name} -g {rg} --rule-name {rulename} -redis delete -n {name} -g {rg} -y -redis create -n {name} -g {rg} -l {location} --sku {sku} --vm-size {size} -redis firewall-rules list -n {name} -g {rg} -redis server-link list -n {name} -g {rg} -redis create -n {name} -g {rg} -l {location} --sku {sku} --vm-size {size} -redis list-keys -n {name} -g {rg} -redis list -redis list -g {rg} -redis create -n {name} -g {rg} -l {location} --sku {sku} --vm-size {size} -redis patch-schedule create -n {name} -g {rg} --schedule-entries {schedule_entries_one} -redis patch-schedule update -n {name} -g {rg} --schedule-entries {schedule_entries_two} -redis patch-schedule show -n {name} -g {rg} -redis patch-schedule delete -n {name} -g {rg} -redis create -n {name} -g {rg} -l {location} --sku {sku} --vm-size {size} -redis force-reboot -n {name} -g {rg} --reboot-type AllNodes -redis force-reboot -n {name} -g {rg} --reboot-type PrimaryNode -redis force-reboot -n {name} -g {rg} --reboot-type SecondaryNode -redis delete -n {name} -g {rg} -y -redis create -n {name} -g {rg} -l {location} --sku {sku} --vm-size {size} -redis regenerate-keys -n {name} -g {rg} --key-type Primary -redis regenerate-keys -n {name} -g {rg} --key-type Secondary -redis update -n {name} -g {rg} --set "tags.mytag=mytagval" -redis delete -n {name} -g {rg} -y -redis create -n {name} -g {rg} -l {location} --sku {sku} --vm-size {size} -redis create -n {secname} -g {rg} -l {seclocation} --sku {sku} --vm-size {size} -redis server-link create -n {name} -g {rg} --replication-role Secondary --server-to-link {secname} -redis server-link list -n {name} -g {rg} -redis server-link show -n {name} -g {rg} --linked-server-name {secname} -redis server-link delete -n {name} -g {rg} --linked-server-name {secname} -redis delete -n {name} -g {rg} -y -redis delete -n {secname} -g {rg} -y -redis create -n {name} -g {rg} -l {location} --sku {sku} --vm-size {size} -redis show -n {name} -g {rg} -redis create -n {name} -g {rg} -l {location} --sku {sku} --vm-size {size} --redis-version {redis_version} -redis show -n {name} -g {rg} -redis create -n {name} -g {rg} -l {location} --sku {sku} --vm-size {size} --tags {tags} --zones {zones} -redis show -n {name} -g {rg} -redis create -n {name} -g {rg} -l {location} --sku {sku} --vm-size {size} --minimum-tls-version {tls_version} --tenant-settings {tenant_settings} -redis show -n {name} -g {rg} -relay namespace create --resource-group {rg} --name {namespacename} --location {loc} --tags {tags} -relay namespace show --resource-group {rg} --name {namespacename} -relay hyco create --resource-group {rg} --namespace-name {namespacename} --name {hyconame} -relay hyco show --resource-group {rg} --namespace-name {namespacename} --name {hyconame} -relay hyco update --resource-group {rg} --namespace-name {namespacename} --name {hyconame} -relay hyco list --resource-group {rg} --namespace-name {namespacename} -relay hyco authorization-rule create --resource-group {rg} --namespace-name {namespacename} --hybrid-connection-name {hyconame} --name {authoname} --rights {accessrights} -relay hyco authorization-rule show --resource-group {rg} --namespace-name {namespacename} --hybrid-connection-name {hyconame} --name {authoname} -relay hyco authorization-rule update --resource-group {rg} --namespace-name {namespacename} --hybrid-connection-name {hyconame} --name {authoname} --rights {accessrights1} -relay hyco authorization-rule keys list --resource-group {rg} --namespace-name {namespacename} --hybrid-connection-name {hyconame} --name {authoname} -relay hyco authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --hybrid-connection-name {hyconame} --name {authoname} --key {primary} -relay hyco authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --hybrid-connection-name {hyconame} --name {authoname} --key {secondary} -relay hyco authorization-rule delete --resource-group {rg} --namespace-name {namespacename} --hybrid-connection-name {hyconame} --name {authoname} -relay hyco delete --resource-group {rg} --namespace-name {namespacename} --name {hyconame} -relay namespace delete --resource-group {rg} --name {namespacename} -relay namespace exists --name {namespacename} -relay namespace create --resource-group {rg} --name {namespacename} --location {loc} --tags {tags} -relay namespace show --resource-group {rg} --name {namespacename} -relay namespace update --resource-group {rg} --name {namespacename} --tags {tags} -relay namespace list -relay namespace list --resource-group {rg} -relay namespace authorization-rule create --resource-group {rg} --namespace-name {namespacename} --name {authoname} --rights {accessrights} -relay namespace authorization-rule show --resource-group {rg} --namespace-name {namespacename} --name {authoname} -relay namespace authorization-rule create --resource-group {rg} --namespace-name {namespacename} --name {authoname} --rights {accessrights1} -relay namespace authorization-rule show --resource-group {rg} --namespace-name {namespacename} --name {defaultauthorizationrule} -relay namespace authorization-rule keys list --resource-group {rg} --namespace-name {namespacename} --name {authoname} -relay namespace authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --name {authoname} --key {primary} -relay namespace authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --name {authoname} --key {secondary} -relay namespace authorization-rule delete --resource-group {rg} --namespace-name {namespacename} --name {authoname} -relay namespace delete --resource-group {rg} --name {namespacename} -relay namespace create --resource-group {rg} --name {namespacename} --location {loc} --tags {tags} -relay namespace show --resource-group {rg} --name {namespacename} -relay wcfrelay create --resource-group {rg} --namespace-name {namespacename} --name {wcfrelayname} --relay-type {relaytype} --requires-transport-security false --requires-client-authorization false -relay wcfrelay show --resource-group {rg} --namespace-name {namespacename} --name {wcfrelayname} -relay wcfrelay update --resource-group {rg} --namespace-name {namespacename} --name {wcfrelayname} --relay-type {relaytype} -relay wcfrelay list --resource-group {rg} --namespace-name {namespacename} -relay wcfrelay authorization-rule create --resource-group {rg} --namespace-name {namespacename} --relay-name {wcfrelayname} --name {authoname} --rights {accessrights} -relay wcfrelay authorization-rule show --resource-group {rg} --namespace-name {namespacename} --relay-name {wcfrelayname} --name {authoname} -relay wcfrelay authorization-rule update --resource-group {rg} --namespace-name {namespacename} --relay-name {wcfrelayname} --name {authoname} --rights {accessrights1} -relay wcfrelay authorization-rule keys list --resource-group {rg} --namespace-name {namespacename} --relay-name {wcfrelayname} --name {authoname} -relay wcfrelay authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --relay-name {wcfrelayname} --name {authoname} --key {primary} -relay wcfrelay authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --relay-name {wcfrelayname} --name {authoname} --key {secondary} -relay wcfrelay authorization-rule delete --resource-group {rg} --namespace-name {namespacename} --relay-name {wcfrelayname} --name {authoname} -relay wcfrelay delete --resource-group {rg} --namespace-name {namespacename} --name {wcfrelayname} -reservations reservation-order calculate --sku {sku} --location {location} --reserved-resource-type {reservedResourceType} --billing-scope {subid} --term {term} --billing-plan {billingPlan} --display-name {displayName} --quantity {quantity} --applied-scope-type {appliedScopeType} -reservations reservation-order-id list --subscription-id {subscription} -reservations catalog show --subscription-id {subscription} --reserved-resource-type {type} --location {location} -reservations reservation show --reservation-order-id {reservation_order_id} --reservation-id {reservation_id} -reservations reservation-order show --reservation-order-id {reservation_order_id} -reservations reservation list --reservation-order-id {reservation_order_id} -reservations reservation list-history --reservation-order-id {reservation_order_id} --reservation-id {reservation_id} -reservations reservation-order list -reservations reservation-order purchase --reservation-order-id {roid} --sku {sku} --location {location} --reserved-resource-type {reservedResourceType} --billing-scope {subid} --term {term} --billing-plan {billingPlan} --display-name {displayName} --quantity {quantity} --applied-scope-type {appliedScopeType} -reservations reservation show --reservation-order-id {reservation_order_id} --reservation-id {reservation_id} -reservations reservation split --reservation-order-id {reservation_order_id} --reservation-id {reservation_id} -1 {quantity1} -2 {quantity2} -reservations reservation merge --reservation-order-id {reservation_order_id} -1 {split_id1} -2 {split_id2} -reservations reservation update --reservation-order-id {reservation_order_id} --reservation-id {reservation_id} -t Single -s {scope} --instance-flexibility {instance_flexibility} -reservations reservation update --reservation-order-id {reservation_order_id} --reservation-id {reservation_id} -t Shared --instance-flexibility {instance_flexibility} -lock create -n {lock} -g {rg} --lock-type {type} -lock show -g {rg} -n {lock} -lock list -g {rg} --query '[].name' -lock update -n {lock} -g {rg} --notes {notes} --lock-type {new_lvl} -lock delete -g {rg} -n {lock} -network vnet create -n cli.lock.rsrc000002 -g cli_test_cannotdelete_resource_lock000001 -lock create -n cli-test-lock000003 -g cli_test_cannotdelete_resource_lock000001 --resource-type Microsoft.Network/virtualNetworks --resource-name cli.lock.rsrc000002 --lock-type CanNotDelete -lock show --name cli-test-lock000003 -g cli_test_cannotdelete_resource_lock000001 --resource-type Microsoft.Network/virtualNetworks --resource-name cli.lock.rsrc000002 -lock list --query '[].name' -ojson -lock update -n cli-test-lock000003 -g cli_test_cannotdelete_resource_lock000001 --resource-type Microsoft.Network/virtualNetworks --resource-name cli.lock.rsrc000002 --notes notes000004 --lock-type ReadOnly -lock delete --name cli-test-lock000003 -g cli_test_cannotdelete_resource_lock000001 --resource-name cli.lock.rsrc000002 --resource-type Microsoft.Network/virtualNetworks -lock create -n cli-test-lock000001 --lock-type ReadOnly -lock list -lock show -n cli-test-lock000001 -lock show --ids /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/locks/cli-test-lock000001 -lock update -n cli-test-lock000001 --notes notes000002 --lock-type CanNotDelete -lock update --ids /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/locks/cli-test-lock000001 --lock-type ReadOnly -lock delete -n cli-test-lock000001 -lock create -n cli-test-lock000003 --lock-type CanNotDelete -lock list -lock show -n cli-test-lock000003 -lock show --ids /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/locks/cli-test-lock000003 -lock update -n cli-test-lock000003 --notes notes000004 --lock-type ReadOnly -lock update --ids /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/locks/cli-test-lock000003 --lock-type CanNotDelete -lock delete -n cli-test-lock000003 -group lock create -n {lock} -g {rg} --lock-type CanNotDelete -group lock show -g {rg} -n {lock} -group lock list -g {rg} --query [].name -group lock update -n {lock} -g {rg} --notes {notes} --lock-type ReadOnly -group lock delete -g {rg} -n {lock} -lock list -network vnet create -n cli-lock-vnet000002 -g cli_test_lock_commands_with_ids000001 -network vnet subnet create -n cli-lock-subnet000003 --address-prefix 10.0.0.0/16 --vnet-name cli-lock-vnet000002 -g cli_test_lock_commands_with_ids000001 -lock create -n cli-test-lock000004 -g cli_test_lock_commands_with_ids000001 --lock-type CanNotDelete -lock create -n cli-test-lock000005 -g cli_test_lock_commands_with_ids000001 --resource-type Microsoft.Network/virtualNetworks --resource-name cli-lock-vnet000002 --lock-type CanNotDelete -lock create -n cli-test-lock000006 -g cli_test_lock_commands_with_ids000001 --resource-name cli-lock-subnet000003 --resource-type subnets --namespace Microsoft.Network --parent virtualNetworks/cli-lock-vnet000002 --lock-type CanNotDelete -lock show --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_lock_commands_with_ids000001/providers/Microsoft.Authorization/locks/cli-test-lock000004 /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_lock_commands_with_ids000001/providers/Microsoft.Network/virtualNetworks/cli-lock-vnet000002/providers/Microsoft.Authorization/locks/cli-test-lock000005 /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_lock_commands_with_ids000001/providers/Microsoft.Network/virtualNetworks/cli-lock-vnet000002/subnets/cli-lock-subnet000003/providers/Microsoft.Authorization/locks/cli-test-lock000006 --query [].name -lock update --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_lock_commands_with_ids000001/providers/Microsoft.Authorization/locks/cli-test-lock000004 /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_lock_commands_with_ids000001/providers/Microsoft.Network/virtualNetworks/cli-lock-vnet000002/providers/Microsoft.Authorization/locks/cli-test-lock000005 /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_lock_commands_with_ids000001/providers/Microsoft.Network/virtualNetworks/cli-lock-vnet000002/subnets/cli-lock-subnet000003/providers/Microsoft.Authorization/locks/cli-test-lock000006 --notes somenotes --lock-type ReadOnly -lock delete --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_lock_commands_with_ids000001/providers/Microsoft.Authorization/locks/cli-test-lock000004 /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_lock_commands_with_ids000001/providers/Microsoft.Network/virtualNetworks/cli-lock-vnet000002/providers/Microsoft.Authorization/locks/cli-test-lock000005 /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_lock_commands_with_ids000001/providers/Microsoft.Network/virtualNetworks/cli-lock-vnet000002/subnets/cli-lock-subnet000003/providers/Microsoft.Authorization/locks/cli-test-lock000006 -lock list -g cli_test_lock_commands_with_ids000001 -ojson -network vnet create -n cli-lock-vnet000002 -g cli_test_lock_with_resource_id000001 -network vnet subnet create -n cli-lock-subnet000003 --address-prefix 10.0.0.0/16 --vnet-name cli-lock-vnet000002 -g cli_test_lock_with_resource_id000001 -resource lock create -n cli-test-lock000004 --resource /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_lock_with_resource_id000001/providers/Microsoft.Network/virtualNetworks/cli-lock-vnet000002 --lock-type CanNotDelete -lock create -n cli-test-lock000005 --resource /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_lock_with_resource_id000001/providers/Microsoft.Network/virtualNetworks/cli-lock-vnet000002/subnets/cli-lock-subnet000003 --lock-type CanNotDelete -resource lock show --name cli-test-lock000004 --resource /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_lock_with_resource_id000001/providers/Microsoft.Network/virtualNetworks/cli-lock-vnet000002 -lock show --name cli-test-lock000005 --resource /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_lock_with_resource_id000001/providers/Microsoft.Network/virtualNetworks/cli-lock-vnet000002/subnets/cli-lock-subnet000003 -resource lock delete --name cli-test-lock000004 --resource /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_lock_with_resource_id000001/providers/Microsoft.Network/virtualNetworks/cli-lock-vnet000002 -lock delete --name cli-test-lock000005 --resource /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_lock_with_resource_id000001/providers/Microsoft.Network/virtualNetworks/cli-lock-vnet000002/subnets/cli-lock-subnet000003 -lock create -n {lock} -g {rg} --lock-type {type} -lock show -g {rg} -n {lock} -lock list -g {rg} --query '[].name' -lock update -n {lock} -g {rg} --notes {notes} --lock-type {new_lvl} -lock delete -g {rg} -n {lock} -network vnet create -n cli.lock.rsrc000002 -g cli_test_readonly_resource_lock000001 -lock create -n cli-test-lock000003 -g cli_test_readonly_resource_lock000001 --resource-type Microsoft.Network/virtualNetworks --resource-name cli.lock.rsrc000002 --lock-type ReadOnly -lock show --name cli-test-lock000003 -g cli_test_readonly_resource_lock000001 --resource-type Microsoft.Network/virtualNetworks --resource-name cli.lock.rsrc000002 -lock list --query '[].name' -ojson -lock update -n cli-test-lock000003 -g cli_test_readonly_resource_lock000001 --resource-type Microsoft.Network/virtualNetworks --resource-name cli.lock.rsrc000002 --notes notes000004 --lock-type CanNotDelete -lock delete --name cli-test-lock000003 -g cli_test_readonly_resource_lock000001 --resource-name cli.lock.rsrc000002 --resource-type Microsoft.Network/virtualNetworks -network vnet create -n cli.lock.rsrc000002 -g cli_test_resource_lock000001 -resource lock create -n cli-test-lock000003 -g cli_test_resource_lock000001 --resource-type Microsoft.Network/virtualNetworks --resource-name cli.lock.rsrc000002 --lock-type CanNotDelete -resource lock show --name cli-test-lock000003 -g cli_test_resource_lock000001 --resource-type Microsoft.Network/virtualNetworks --resource-name cli.lock.rsrc000002 -resource lock list -g cli_test_resource_lock000001 --resource-type Microsoft.Network/virtualNetworks --resource-name cli.lock.rsrc000002 --query [].name -ojson -resource lock update -n cli-test-lock000003 -g cli_test_resource_lock000001 --resource-type Microsoft.Network/virtualNetworks --resource-name cli.lock.rsrc000002 --notes notes000004 --lock-type ReadOnly -resource lock delete --name cli-test-lock000003 -g cli_test_resource_lock000001 --resource-name cli.lock.rsrc000002 --resource-type Microsoft.Network/virtualNetworks -account lock create -n cli-test-lock000001 --lock-type CanNotDelete -account lock list --query [].name -account lock show -n cli-test-lock000001 -account lock show --ids /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/locks/cli-test-lock000001 -account lock update -n cli-test-lock000001 --notes notes000002 --lock-type ReadOnly -account lock update --ids /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/locks/cli-test-lock000001 --lock-type CanNotDelete -account lock delete -n cli-test-lock000001 -account management-group create --name testcligroup -account management-group delete --name testcligroup -account management-group create --name testcligroup -account management-group delete --name testcligroup -account management-group create --name testcligroup --display-name TestCliDisplayName -account management-group delete --name testcligroup -account management-group create --name testcligroup -account management-group create --name testcligroupchild --display-name testcligroupchildDisplayName --parent testcligroup -account management-group delete --name testcligroupchild -account management-group delete --name testcligroup -account management-group create --name testcligroup -account management-group create --name testcligroupchild --parent /providers/Microsoft.Management/managementGroups/testcligroup -account management-group delete --name testcligroupchild -account management-group delete --name testcligroup -account management-group list -account management-group create --name testcligetgroup1 -account management-group create --name testcligetgroup2 --parent /providers/Microsoft.Management/managementGroups/testcligetgroup1 -account management-group show --name testcligetgroup2 -account management-group delete --name testcligetgroup2 -account management-group delete --name testcligetgroup1 -account management-group create --name testcligetgroup1 -account management-group create --name testcligetgroup2 --parent testcligetgroup1 -account management-group create --name testcligetgroup3 --parent /providers/Microsoft.Management/managementGroups/testcligetgroup2 -account management-group show --name testcligetgroup2 --expand -account management-group delete --name testcligetgroup3 -account management-group delete --name testcligetgroup2 -account management-group delete --name testcligetgroup1 -account management-group create --name testcligetgroup1 -account management-group create --name testcligetgroup2 --parent /providers/Microsoft.Management/managementGroups/testcligetgroup1 -account management-group create --name testcligetgroup3 --parent testcligetgroup2 -account management-group create --name testcligetgroup4 --parent /providers/Microsoft.Management/managementGroups/testcligetgroup3 -account management-group show --name testcligetgroup2 --expand --recurse -account management-group delete --name testcligetgroup4 -account management-group delete --name testcligetgroup3 -account management-group delete --name testcligetgroup2 -account management-group delete --name testcligetgroup1 -account management-group create --name testcligroup -account management-group update --name testcligroup --display-name testcligroupDisplayName -account management-group delete --name testcligroup -account management-group create --name testcligroup -account management-group create --name testcligroupchild -account management-group update --name testcligroupchild --display-name testcligroupchild --parent testcligroup -account management-group delete --name testcligroupchild -account management-group delete --name testcligroup -account management-group create --name testcligroup -account management-group create --name testcligroupchild -account management-group update --name testcligroupchild --parent /providers/Microsoft.Management/managementGroups/testcligroup -account management-group delete --name testcligroupchild -account management-group delete --name testcligroup -group delete -n {rg} --yes -group exists -n {rg} -group create -n {rg} -l westus --tag a=b c --managed-by test_admin -group exists -n {rg} -group show -n {rg} -group list --tag a=b -group list --tag a -group update -g {rg} --tags "" -group update -g {rg} --set tags.a={tag} -group update -g {rg} --set tags.b={tag} --force-string -group export --name {rg} --query "contentVersion" -network vnet create -g {rg} -n {vnet} -network vnet show -g {rg} -n {vnet} -group export --name {rg} --resource-ids "{vnet_id}" --skip-all-params --query "parameters" -network vnet create -g {rg} -n {vnet} -network vnet show -g {rg} -n {vnet} -group export --name {rg} --resource-ids "{vnet_id}" --skip-resource-name-params --query "parameters" -group delete -n {rg} --no-wait --yes -group wait --deleted -n {rg} -group exists -n {rg} -group create -n {rg} -l westus --managed-by test_admin -group exists -n {rg} -group wait --exists -n {rg} -network vnet create -g {rg} -n {vnet} -network vnet show -g {rg} -n {vnet} -group show -g {rg} -resource link create --link {link_id} --target {vnet_id} --notes "blah notes" -resource link show --link {link_id} -resource link update --link {link_id} --target {vnet_id} --notes "group to vnet" -resource link list --query length(@) -o tsv -resource link show --link {link_id} -resource link delete --link {link_id} -resource link list -resource list --query "length([?name=='{vnet}'])" -network vnet create -g {rg} -n {vnet} --subnet-name {subnet} -resource tag --id {vnet_id} --tags tag-vnet -resource show --id {vnet_id} -resource show --id {subnet_id} -resource update --id {subnet_id} --set properties.addressPrefix=10.0.0.0/22 -resource delete --id {subnet_id} -resource delete --id {vnet_id} -resource create -g {rg} -n {plan} --resource-type Microsoft.web/serverFarms --is-full-object --properties "{{\"location\":\"{loc}\",\"sku\":{{\"name\":\"B1\",\"tier\":\"BASIC\"}}}}" -resource create -g {rg} -n {app} --resource-type Microsoft.web/sites --properties "{{\"serverFarmId\":\"{plan}\"}}" -resource create --id {app_settings_id} --properties "{{\"key2\":\"value12\"}}" -resource show --id {app_config_id} -resource show --id {app_config_id} --include-response-body -resource create -g {rg} -n {vault} --resource-type Microsoft.RecoveryServices/vaults --is-full-object -p "{{\"properties\":{{}},\"location\":\"{loc}\",\"sku\":{{\"name\":\"Standard\"}}}}" -tag create --resource-id {resource_id} --tags -tag create --resource-id {resource_id} --tags {expected_tags1} -tag create --resource-id {resource_id} --tags {expected_tags2} -tag delete --resource-id {resource_id} -y -tag create --resource-id {resource_id} --tags -tag create --resource-id {resource_id} --tags {expected_tags1} -tag create --resource-id {resource_id} --tags {expected_tags2} -tag delete --resource-id {resource_id} -y -tag create --resource-id {resource_id} --tags -tag create --resource-id {resource_id} --tags {expected_tags1} -tag create --resource-id {resource_id} --tags {expected_tags2} -tag delete --resource-id {resource_id} -y -resource create -g {rg} -n {vault} --resource-type Microsoft.RecoveryServices/vaults --is-full-object -p "{{\"properties\":{{}},\"location\":\"{loc}\",\"sku\":{{\"name\":\"Standard\"}}}}" -resource tag --ids {vault_id} --tags {tag} -configure --defaults location={loc} -resource list --tag {tag} -resource list --tag {tag} -l westus -resource list --tag {tag} --l westus -resource list --tag {tag} --location westus -configure --defaults location="" -resource list --tag {tag} -resource create -g {rg} -n {vault} --resource-type Microsoft.RecoveryServices/vaults --is-full-object -p "{{\"properties\":{{}},\"location\":\"{loc}\",\"sku\":{{\"name\":\"Standard\"}}}}" -tag create --resource-id {resource_id} --tags {original_tags} -tag list --resource-id {resource_id} -tag delete --resource-id {resource_id} -y -tag create --resource-id {resource_id} --tags {original_tags} -tag list --resource-id {resource_id} -tag delete --resource-id {resource_id} -y -tag create --resource-id {resource_id} --tags {original_tags} -tag list --resource-id {resource_id} -tag delete --resource-id {resource_id} -y -resource create -g {rg} -n {vault} --resource-type Microsoft.RecoveryServices/vaults --is-full-object -p "{{\"properties\":{{}},\"location\":\"{loc}\",\"sku\":{{\"name\":\"Standard\"}}}}" -resource tag --ids {vault_id} --tags cli-test=test cli-test2=test2 -resource tag --ids {vault_id} --tags cli-test3=test3 cli-test4=test4 -resource tag --ids {vault_id} --tags cli-test4=test4a cli-test5=test5 -i -resource tag --ids {vault_id} --tags -i -resource tag --ids {vault_id} --tags "" -i -resource tag --ids {vault_id} --tags -resource delete --id {vault_id} -tag list --query "[?tagName == '{tag}'].values[].tagValue" -tag delete -n {tag} -y -tag list --query "[?tagName == '{tag}']" -tag create -n {tag} -tag add-value -n {tag} --value test -tag add-value -n {tag} --value test2 -tag list --query "[?tagName == '{tag}']" -tag remove-value -n {tag} --value test -tag list --query "[?tagName == '{tag}']" -tag remove-value -n {tag} --value test2 -tag list --query "[?tagName == '{tag}']" -tag delete -n {tag} -y -tag list --query "[?tagName == '{tag}']" -resource create -g {rg} -n {vault} --resource-type Microsoft.RecoveryServices/vaults --is-full-object -p "{{\"properties\":{{}},\"location\":\"{loc}\",\"sku\":{{\"name\":\"Standard\"}}}}" -resource tag --ids {vault_id} --tags {tag} -resource tag --ids {vault_id} --tags -resource tag --ids {resource_group_id} --tags {tag} -acr create -n {registry_name} -g {rg} -l {rg_loc} --sku {sku} -acr webhook create -n {webhook_name} -r {registry_name} --uri {uri} --actions {actions} -resource tag --ids {webhook_id} --tags {tag} -resource tag --ids {webhook_id} --tags -container create -g {rg} -n {container_group_name} --image {image} -resource tag --ids {container_id} --tags {tag} -resource tag --ids {container_id} --tags -resource tag --ids {vault_id} {webhook_id} {container_id} --tags {tag} -network public-ip create -g {rg} -n {ip_name} --location {loc} --sku Standard -resource tag --ids {public_ip_id} --tags {tag} -resource delete --id {vault_id} -resource delete --id {webhook_id} -resource delete --id {public_ip_id} -resource create -g {rg} -n {vault} --resource-type Microsoft.RecoveryServices/vaults --is-full-object -p "{{\"properties\":{{}},\"location\":\"{loc}\",\"sku\":{{\"name\":\"Standard\"}}}}" -tag create --resource-id {resource_id} --tags {original_tags} -tag update --resource-id {resource_id} --operation {merge_operation} --tags {merge_tags} -tag update --resource-id {resource_id} --operation {replace_operation} --tags {replace_tags} -tag update --resource-id {resource_id} --operation {delete_operation} --tags {delete_tags} -tag delete --resource-id {resource_id} -y -tag create --resource-id {resource_id} --tags {original_tags} -tag update --resource-id {resource_id} --operation {merge_operation} --tags {merge_tags} -tag update --resource-id {resource_id} --operation {replace_operation} --tags {replace_tags} -tag update --resource-id {resource_id} --operation {delete_operation} --tags {delete_tags} -tag delete --resource-id {resource_id} -y -tag create --resource-id {resource_id} --tags {original_tags} -tag update --resource-id {resource_id} --operation {merge_operation} --tags {merge_tags} -tag update --resource-id {resource_id} --operation {replace_operation} --tags {replace_tags} -tag update --resource-id {resource_id} --operation {delete_operation} --tags {delete_tags} -tag delete --resource-id {resource_id} -y -provider show -n {prov} -provider register -n {prov} -provider show -n {prov} -provider unregister -n {prov} -provider show -n {prov} -provider register -n {prov} --m testmg -provider show -n {prov} -provider register -n {prov} --accept-terms -provider show -n {prov} -provider unregister -n {prov} -provider show -n {prov} -provider show -n {prov} -provider register -n {prov} -provider show -n {prov} -provider unregister -n {prov} -provider show -n {prov} -provider show -n {prov} -provider register -n {prov} --consent-to-permissions -provider show -n {prov} -provider permission list -n {prov} -provider unregister -n {prov} -provider operation show --namespace microsoft.compute -provider operation show --namespace microsoft.compute -provider operation show --namespace microsoft.storage -ts create -g {rg} -n {template_spec_name} -v 1.0 -l {resource_group_location} -f "{tf}" --description {description} --version-description {version_description} -ts create --name {template_spec_name} -g {rg} -l {resource_group_location} --template-file "{tf}" -ts delete --template-spec {template_spec_id} --yes -ts create -g {rg} -n {template_spec_name} -v 1.0 -l {resource_group_location} -f "{tf}" --ui-form-definition "{uf}" -d {display_name} --description {description} --version-description {version_description} -ts create -g {rg} -n {template_spec_name} -v 1.0 -f "{tf}" --yes -ts delete --template-spec {template_spec_id} --yes -ts create -g {rg} -n {template_spec_name} -v 1.0 -l {resource_group_location} -f "{tf}" -ts show --template-spec {template_spec_version_id} -ts show --template-spec {template_spec_id} -ts delete --template-spec {template_spec_version_id} --yes -ts list -g {rg} -ts delete --template-spec {template_spec_id} --yes -ts list -g {rg} -ts create -g {rg} -n {template_spec_name} -v 1.0 -l {resource_group_location} -f "{tf}" -ts create -g {rg1} -n {template_spec_name} -v 2.0 -l {resource_group_location} -f "{tf}" -ts create -g {rg1} -n {template_spec_name} -v 3.0 -l {resource_group_location} -f "{tf}" -ts list -g {rg1} -ts list -g {rg} -ts list -g {rg1} -n {template_spec_name} -ts list -ts delete --template-spec {template_spec_id_rg} --yes -ts delete --template-spec {template_spec_id_rg1} --yes -ts create -g {rg} -n {template_spec_name} -v 1.0 -l {resource_group_location} -f "{tf}" -ts show -g {rg} --name {template_spec_name} -ts show --template-spec {template_spec_id} -ts show -g {rg} --name {template_spec_name} --version 1.0 -ts show --template-spec {template_spec_version_id} -ts delete --template-spec {template_spec_id} --yes -ts create -g {rg} -n {template_spec_name} -v 1.0 -l {resource_group_location} -f "{tf}" --tags cli-test=test -ts show --template-spec {template_spec_version_one_id} -ts show --template-spec {template_spec_id} -ts create -g {rg} -n {template_spec_name} -v 2.0 -l {resource_group_location} -f "{tf}" -ts show --template-spec {template_spec_version_two_id} -ts create -g {rg} -n {template_spec_name} -v 3.0 -l {resource_group_location} -f "{tf}" --tags cliName1=cliValue1 cliName4=cliValue4 -ts show --template-spec {template_spec_version_three_id} -ts show --template-spec {template_spec_id} -ts update -g {rg} -n {template_spec_name} -v 1.0 -f "{tf}" --yes -ts show --template-spec {template_spec_version_one_id} -ts update -g {rg} -n {template_spec_name} -v 1.0 -f "{tf}" --tags "" --yes -ts show --template-spec {template_spec_version_one_id} -ts update -g {rg} -n {template_spec_name} -v 2.0 -f "{tf}" --tags --yes -ts show --template-spec {template_spec_version_two_id} -ts create -g {rg} -n {template_spec_name} -v 3.0 -f "{tf}" --tags --yes -ts show --template-spec {template_spec_version_three_id} -ts show --template-spec {template_spec_id} -ts create -g {rg} -n {template_spec_name} --yes -ts show --template-spec {template_spec_id} -ts delete --template-spec {template_spec_id} --yes -ts create -g {rg} -n {template_spec_name} -v 1.0 -l {resource_group_location} -f "{tf}" -ts update -s {template_spec_id} --display-name {display_name} --description {description} --yes -ts update -s {template_spec_version_id} --version-description {version_description} --yes -ts update -g {rg} -n {template_spec_name} -v 1.0 -f "{tf1}" --ui-form-definition "{uf1}" --yes -ts delete --template-spec {template_spec_id} --yes -deployment sub validate --location WestUS --template-file "{tf}" --parameters @"{params}" --parameters storageAccountName="{storage-account-name}" -deployment sub validate --location WestUS --template-file "{tf}" --parameters "{params_uri}" -deployment sub create -n {dn} --location WestUS --template-file "{tf}" --parameters @"{params}" --parameters storageAccountName="{storage-account-name}" -deployment sub list -deployment sub list --filter "provisioningState eq 'Succeeded'" -deployment sub show -n {dn} -deployment sub export -n {dn} -deployment operation sub list -n {dn} -deployment sub create -n {dn2} --location WestUS --template-file "{tf}" --parameters @"{params}" --parameters storageAccountName="{storage-account-name}" --no-wait -deployment sub cancel -n {dn2} -deployment sub wait -n {dn2} --custom "provisioningState==Canceled" -deployment sub show -n {dn2} -policy assignment delete -n location-lock -policy definition delete -n policy2 -group delete -n cli_test_subscription_level_deployment --yes -deployment validate --location WestUS --template-file "{tf}" --parameters @"{params}" --parameters storageAccountName="{storage-account-name}" -deployment validate --location WestUS --template-file "{tf}" --parameters "{params_uri}" -deployment create -n {dn} --location WestUS --template-file "{tf}" --parameters @"{params}" --parameters storageAccountName="{storage-account-name}" -deployment list --query "[?name == 'azure-cli-subscription_level_deployment000001']" -deployment list --filter "provisioningState eq 'Succeeded'" --query "[?name == 'azure-cli-subscription_level_deployment000001']" -deployment show -n {dn} -deployment export -n {dn} -deployment operation list -n {dn} -deployment create -n {dn2} --location WestUS --template-file "{tf}" --parameters @"{params}" --parameters storageAccountName="{storage-account-name}" --no-wait -deployment cancel -n {dn2} -deployment show -n {dn2} -policy assignment delete -n location-lock -policy definition delete -n policy2 -group delete -n cli_test_subscription_level_deployment --yes -deployment group validate --resource-group {rg} --template-file "{tf}" --parameters @"{params}" -deployment group validate --resource-group {rg} --template-file "{Japanese-characters-tf}" -deployment group validate --resource-group {rg} --template-file "{tf_multiline}" --parameters @"{params}" -deployment group validate --resource-group {rg} --template-file "{extra_param_tf}" --parameters @"{params}" --no-prompt true -deployment group validate --resource-group {rg} --template-file "{extra_param_tf}" --parameters @"{params}" -deployment group validate --resource-group {rg} --template-file "{extra_param_tf}" --parameters @"{params}" --no-prompt false -deployment group create --resource-group {rg} -n {dn} --template-file "{tf}" --parameters @"{params}" -deployment group create --resource-group {rg} -n {dn} --template-file "{tf_multiline}" --parameters @"{params}" -deployment group create --resource-group {rg} -n {dn2} --template-file "{extra_param_tf}" --parameters @"{params}" --no-prompt true -deployment group create --resource-group {rg} -n {dn2} --template-file "{extra_param_tf}" --parameters @"{params}" -deployment group create --resource-group {rg} -n {dn2} --template-file "{extra_param_tf}" --parameters @"{params}" --no-prompt false -deployment group validate -g {rg} -f "{tf_invalid}" -p @"{params}" -deployment group validate -g {rg} -f "{tf}" -p @"{params_invalid}" -deployment group create -g {rg} -n {dn} -f "{tf_invalid}" -p @"{params}" -deployment group create -g {rg} -n {dn} -f "{tf}" -p @"{params_invalid}" -deployment group list --resource-group {rg} -deployment group list --resource-group {rg} --filter "provisioningState eq 'Succeeded'" -deployment group show --resource-group {rg} -n {dn} -deployment group export --resource-group {rg} -n {dn} -deployment operation group list --resource-group {rg} -n {dn} -deployment group create --resource-group {rg} -n {dn2} --template-file "{tf}" --parameters @"{params}" --no-wait -deployment group cancel -n {dn2} -g {rg} -deployment group wait -n {dn2} -g {rg} --custom "provisioningState==Canceled" -deployment group show -n {dn2} -g {rg} -account management-group create --name {mg} -deployment mg validate --management-group-id {mg} --location WestUS --template-file "{tf}" --parameters @"{params}" --parameters targetMG="{mg}" --parameters nestedRG="{sub-rg}" --parameters storageAccountName="{storage-account-name}" -deployment mg create --management-group-id {mg} --location WestUS -n {dn} --template-file "{tf}" --parameters @"{params}" --parameters targetMG="{mg}" --parameters nestedRG="{sub-rg}" --parameters storageAccountName="{storage-account-name}" -deployment mg list --management-group-id {mg} -deployment mg list --management-group-id {mg} --filter "provisioningState eq 'Succeeded'" -deployment mg show --management-group-id {mg} -n {dn} -deployment mg export --management-group-id {mg} -n {dn} -deployment operation mg list --management-group-id {mg} -n {dn} -deployment mg create --management-group-id {mg} --location WestUS -n {dn2} --template-file "{tf}" --parameters @"{params}" --parameters targetMG="{mg}" --parameters nestedRG="{sub-rg}" --parameters storageAccountName="{storage-account-name}" --no-wait -deployment mg cancel -n {dn2} --management-group-id {mg} -deployment mg wait -n {dn2} --management-group-id {mg} --custom "provisioningState==Canceled" -deployment mg show -n {dn2} --management-group-id {mg} -account management-group delete -n {mg} -account management-group create --name {mg} -deployment tenant validate --location WestUS --template-file "{tf}" --parameters targetMG="{mg}" -deployment tenant create --location WestUS -n {dn} --template-file "{tf}" --parameters targetMG="{mg}" -deployment tenant list -deployment tenant list --filter "provisioningState eq 'Succeeded'" -deployment tenant show -n {dn} -deployment tenant export -n {dn} -deployment operation tenant list -n {dn} -deployment tenant create --location WestUS -n {dn2} --template-file "{tf}" --parameters targetMG="{mg}" --no-wait -deployment tenant cancel -n {dn2} -deployment tenant show -n {dn2} -group delete -n cli_tenant_level_deployment --yes -account management-group delete -n {mg} -network vnet create -g {rg} -n vnet1 --subnet-name subnet1 -group deployment validate -g {rg} --template-file "{tf}" --parameters @"{params}" --parameters subnetId="{subnet_id}" --parameters backendAddressPools=@"{of}" -group deployment validate -g {rg} --template-file "{tf}" --parameters "{params_uri}" --parameters subnetId="{subnet_id}" --parameters backendAddressPools=@"{of}" -group deployment validate -g {rg} --template-file "{tf}" --parameters @"{error_params}" --parameters subnetId="{subnet_id}" --parameters backendAddressPools=@"{of}" -group deployment create -g {rg} -n {dn} --template-file "{tf}" --parameters @"{params}" --parameters subnetId="{subnet_id}" --parameters backendAddressPools=@"{of}" -network lb show -g {rg} -n test-lb -group deployment list -g {rg} -group deployment list -g {rg} --filter "provisioningState eq 'Succeeded'" -group deployment show -g {rg} -n {dn} -group deployment operation list -g {rg} -n {dn} -group deployment validate -g {rg} -f "{tf_invalid}" -p @"{params}" -group deployment validate -g {rg} -f "{tf}" -p @"{params_invalid}" -group deployment create -g {rg} -n {dn} -f "{tf_invalid}" -p @"{params}" -group deployment create -g {rg} -n {dn} -f "{tf}" -p @"{params_invalid}" -group deployment create -g {rg} -n {dn2} --template-file "{tf}" --parameters @"{params}" --parameters subnetId="{subnet_id}" --parameters backendAddressPools=@"{of}" --no-wait -group deployment cancel -n {dn2} -g {rg} -group deployment show -n {dn2} -g {rg} -group deployment create -g {rg} -n {dn} --template-file "{tf}" -group deployment validate -g {rg} --template-file "{large_tf}" --parameters @"{large_params}" -group deployment validate -g {rg} --template-file "{large_tf}" --parameters "{large_params}" -group deployment create -g {rg} --template-file "{large_tf}" --parameters @"{large_params}" --parameters function-app-name="{app_name}" -group deployment create -g {rg} --template-file "{large_tf}" --parameters "{large_params}" --parameters function-app-name="{app_name}" -group deployment create -g {rg} -n {dn} --template-file "{tf}" -group deployment create -g {rg} -n {sdn} --template-file "{tf}" --rollback-on-error -group deployment create -g {rg} -n {dn} --template-file "{tf}" -group deployment create -g {rg} -n {sdn} --template-file "{tf}" --rollback-on-error {dn} -group deployment create -g {rg} -n {dn} --template-file "{tf}" --parameters @"{params}" --no-wait -group deployment wait -g {rg} -n {dn} --created -group deployment show -g {rg} -n {dn} -group deployment create -g {rg} --template-uri "{tf}" --parameters @"{params}" -group deployment show -g {rg} -n {dn} -group deployment delete -g {rg} -n {dn} -group deployment list -g {rg} -deployment group create -g {rg} --template-uri "{tf}" --parameters @"{params}" -deployment group show -g {rg} -n {dn} -deployment group delete -g {rg} -n {dn} -deployment group list -g {rg} -deployment group create --resource-group {rg} --template-file "{tf}" -deployment group what-if --resource-group {rg} --template-file "{tf}" --parameters "{params}" --no-pretty-print -deployment sub create --location westus --template-file "{tf}" -deployment sub what-if --location westus --template-file "{tf}" --parameters "{params}" -deployment sub what-if --location westus --template-file "{tf}" --parameters "{params}" --no-pretty-print -account management-group create --name {mg} -deployment mg what-if --management-group-id {mg} --location WestUS --template-file "{tf}" --no-pretty-print --parameters @"{params}" --parameters targetMG="{mg}" --parameters nestedRG="{sub-rg}" --parameters storageAccountName="{storage-account-name}" -account management-group create --name {mg} -deployment tenant what-if --location WestUS --template-file "{tf}" --parameters targetMG="{mg}" --no-pretty-print -ts create -g {rg} -n {template_spec_name} -v 1.0 -l {resource_group_location} -f "{tf}" -deployment group create --resource-group {rg} --template-spec "{template_spec_version_id}" -deployment group what-if --resource-group {rg} --template-spec "{template_spec_version_id}" --parameters "{params}" --no-pretty-print -ts create -g {rg} -n {template_spec_name} -v 1.0 -l {resource_group_location} -f "{tf}" -deployment sub create --location westus --template-spec {template_spec_version_id} -deployment sub what-if --location westus --template-spec {template_spec_version_id} --parameters "{params}" --no-pretty-print -deployment group create -g {resource_group} -n {deployment_name} --template-file "{template_file}" --parameters scriptName={deployment_script_name} -deployment-scripts show --resource-group {resource_group} --name {deployment_script_name} -deployment-scripts delete --resource-group {resource_group} --name {deployment_script_name} --yes -deployment-scripts list -deployment-scripts list -deployment group create -g {resource_group} -n {deployment_name} --template-file "{template_file}" --parameters scriptName={deployment_script_name} -deployment-scripts list -deployment group create -g {resource_group} -n {deployment_name} --template-file "{template_file}" --parameters scriptName={deployment_script_name} -deployment-scripts show --resource-group {resource_group} --name {deployment_script_name} -deployment group create -g {resource_group} -n {deployment_name} --template-file "{template_file}" --parameters scriptName={deployment_script_name} -deployment-scripts show-log --resource-group {resource_group} --name {deployment_script_name} -ts create -g {rg} -n {template_spec_name} -v 1.0 -l {resource_group_location} -f "{tf}" -deployment sub validate --location WestUS --template-spec {template_spec_version_id} --parameters "{params_uri}" --parameters storageAccountName="{storage-account-name}" -deployment sub create -n {dn} --location WestUS --template-spec {template_spec_version_id} --parameters @"{params}" --parameters storageAccountName="{storage-account-name}" -deployment sub show -n {dn} -deployment sub export -n {dn} -deployment operation sub list -n {dn} -deployment sub create -n {dn2} --location WestUS --template-spec "{template_spec_version_id}" --parameters @"{params}" --no-wait -deployment sub cancel -n {dn2} -deployment sub show -n {dn2} -ts delete --template-spec {template_spec_id} --yes -ts create -g {rg} -n {template_spec_name} -v 1.0 -l {resource_group_location} -f "{tf}" -deployment group validate --resource-group {rg} --template-spec "{template_spec_version_id}" --parameters @"{params}" -deployment group create --resource-group {rg} -n {dn} --template-spec "{template_spec_version_id}" --parameters @"{params}" -deployment group list --resource-group {rg} -deployment group list --resource-group {rg} --filter "provisioningState eq 'Succeeded'" -deployment group show --resource-group {rg} -n {dn} -deployment group export --resource-group {rg} -n {dn} -deployment operation group list --resource-group {rg} -n {dn} -deployment group create --resource-group {rg} -n {dn2} --template-spec "{template_spec_version_id}" --parameters @"{params}" --no-wait -deployment group cancel -n {dn2} -g {rg} -deployment group show -n {dn2} -g {rg} -network nsg create -n {nsg1} -g {rg1} -network nsg create -n {nsg2} -g {rg1} -resource move --ids {nsg1_id} {nsg2_id} --destination-group {rg2} -network nsg show -g {rg2} -n {nsg1} -network nsg show -g {rg2} -n {nsg2} -feature list -feature list --namespace Microsoft.Network -feature show --namespace Microsoft.Network -n AllowLBPreview -feature registration create --namespace Microsoft.Network --name AllowLBPreview -feature registration delete --namespace Microsoft.Network --name AllowLBPreview --yes -feature registration list -feature registration show --provider-namespace Microsoft.Network -n AllowLBPreview -feature unregister --namespace Microsoft.Network --name AllowLBPreview -policy definition create -n {pn} --rules "{rf}" --params "{pdf}" --display-name {pdn} --description {desc} --mode {mode} --metadata category={metadata} -policy definition update -n {pn} --description {desc} --display-name {pdn} --metadata category={updated_metadata} -policy definition update -n {pn} --description {desc} --display-name {pdn} --metadata category=test2 --params "{pdf}" --rules "{rf}" -policy definition list -policy definition show -n {pn} -policy assignment create --policy {pn} -n {pan} --display-name {padn} -g {rg} --params "{params}" --description "Policy description" --not-scopes "invalid" -policy assignment create --policy {pn} -n {pan} --display-name {padn} -g {rg} --params "{params}" --description "Policy description" -policy assignment create --policy {pn} -n {pan} --display-name {padn} -g {rg} --not-scopes {notscope} --params "{params}" -policy assignment update -n {pan} -g {rg} --not-scopes "{notscope} {notscope2}" --params "{params}" -policy assignment create --policy {bip} -n {pan2} --display-name {padn} -g {rg} -policy assignment delete -n {pan2} -g {rg} -policy assignment list -policy assignment list --disable-scope-strict-match -policy assignment delete -n {pan} -g {rg} -policy assignment list --disable-scope-strict-match -policy definition delete -n {pn} -policy definition list -policy assignment create --policy 'test/error_policy' -n {pan} -g {rg} --location {location} --assign-identity --enforcement-mode {em} -policy assignment create --policy {bip} -n {pan} -g {rg} --location {location} --assign-identity --enforcement-mode {em} -policy assignment identity show -n {pan} -g {rg} -policy assignment update -n {pan} -g {rg} --description "New description" -policy assignment identity remove -n {pan} -g {rg} -policy assignment show -n {pan} -g {rg} -policy assignment identity assign -n {pan} -g {rg} -policy assignment show -n {pan} -g {rg} -policy assignment identity remove -n {pan} -g {rg} -policy assignment create --policy {bip} -n {pan} -g {rg} --location {location} --assign-identity --identity-scope {idScope} --role {idRole} -role assignment list --resource-group {rg} --role {idRole} -policy assignment identity remove -n {pan} -g {rg} -policy assignment identity assign -n {pan} -g {rg} --identity-scope {idScope} --role {idRole} -role assignment list --resource-group {rg} --role {idRole} -policy assignment delete -n {pan} -g {rg} -policy assignment create --policy {bip} -n {pan} -g {rg} --location {location} --mi-system-assigned --enforcement-mode {em} -policy assignment identity show -n {pan} -g {rg} -policy assignment update -n {pan} -g {rg} --description "New description" -policy assignment identity remove -n {pan} -g {rg} -policy assignment show -n {pan} -g {rg} -policy assignment identity assign --system-assigned -n {pan} -g {rg} -policy assignment show -n {pan} -g {rg} -policy assignment identity remove -n {pan} -g {rg} -policy assignment create --policy {bip} -n {pan} -g {rg} --location {location} --mi-system-assigned --identity-scope {idScope} --role {idRole} -role assignment list --resource-group {rg} --role {idRole} -policy assignment identity remove -n {pan} -g {rg} -policy assignment identity assign -n {pan} -g {rg} --system-assigned --identity-scope {idScope} --role {idRole} -role assignment list --resource-group {rg} --role {idRole} -policy assignment delete -n {pan} -g {rg} -identity create -g {rg} -n {msi} --tags tag1=d1 -policy assignment create --policy {bip} -n {pan} -g {rg} --location {location} --mi-user-assigned {msi} --enforcement-mode {em} -policy assignment identity show -n {pan} -g {rg} -policy assignment update -n {pan} -g {rg} --description "New description" -policy assignment identity remove -n {pan} -g {rg} -policy assignment show -n {pan} -g {rg} -policy assignment identity assign --user-assigned {fullQualifiedMsi} -n {pan} -g {rg} -policy assignment show -n {pan} -g {rg} -policy assignment identity assign --system-assigned -n {pan} -g {rg} -policy assignment show -n {pan} -g {rg} -policy assignment identity remove -n {pan} -g {rg} -policy assignment delete -n {pan} -g {rg} -account management-group create -n cli-test-mgmt-group000002 -policy definition create -n {pn} --rules "{rf}" --params "{pdf}" --display-name {pdn} --description {desc} --mode {mode} --metadata category={metadata} --management-group {mg} -policy definition update -n {pn} --description {desc} --display-name {pdn} --metadata category={updated_metadata} --management-group {mg} -policy definition update -n {pn} --description {desc} --display-name {pdn} --metadata category=test2 --params "{pdf}" --rules "{rf}" --management-group {mg} -policy definition list --management-group {mg} -policy definition show -n {pn} --management-group {mg} -policy assignment create --policy {pol} -n {pan} --display-name {padn} --params "{params}" --scope {scope} --enforcement-mode {em} -policy assignment list --scope {scope} -policy assignment delete -n {pan} --scope {scope} -policy assignment list --disable-scope-strict-match -policy definition delete -n {pn} --management-group {mg} -policy definition list --management-group {mg} -policy definition show -n "/providers/microsoft.management/managementgroups/myMg/providers/microsoft.authorization/missingsegment" -account management-group delete -n cli-test-mgmt-group000002 -policy assignment create -d {bip} -n {pan} -g {rg} --enforcement-mode {em} -policy assignment non-compliance-message list -n {pan} -g {rg} -policy assignment non-compliance-message create -n {pan} -g {rg} -m "General message" -policy assignment non-compliance-message create -n {pan} -g {rg} -m "Specific message" -r {drid} -policy assignment non-compliance-message list -n {pan} -g {rg} -policy assignment show -n {pan} -g {rg} -policy assignment update -n {pan} -g {rg} --description "New description" -policy assignment non-compliance-message delete -n {pan} -g {rg} -m "Unknown message" -policy assignment non-compliance-message delete -n {pan} -g {rg} -m "Specific message" -policy assignment non-compliance-message delete -n {pan} -g {rg} -m "General message" -policy assignment non-compliance-message delete -n {pan} -g {rg} -m "Specific message" -r {drid} -policy assignment non-compliance-message list -n {pan} -g {rg} -policy assignment delete -n {pan} -g {rg} -policy definition create -n {pn} --rules "{rf}" --params "{pdf}" --display-name {pdn} --description {desc} -policy definition create -n {dpn} --rules "{dprf}" --mode {dp_mode} --display-name {dpdn} --description {dp_desc} -policy set-definition create -n {psn} --definitions @"{psf}" --display-name {psdn} -policy assignment create -d clitest000006 -n clitest000008 -g cli_test_policyexemption000001 --display-name clitest000009 -policy assignment list --resource-group {rg} -policy exemption create -n clitest000010 -a /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_policyexemption000001/providers/Microsoft.Authorization/policyAssignments/clitest000008 -e waiver -g cli_test_policyexemption000001 --display-name clitest000011 --description desc_for_clitest_policyexemption_123 --metadata category=test -policy exemption list --resource-group {rg} -policy exemption update -n clitest000010 -e mitigated -g cli_test_policyexemption000001 -r 3567663991096992642 --expires-on 3021-04-05T00:45:13+00:00 --display-name clitest000011_new --description desc_for_clitest_policyexemption_123_new --metadata category=test2 -policy exemption show -n clitest000010 -g cli_test_policyexemption000001 -policy exemption delete -n clitest000010 -g cli_test_policyexemption000001 -policy assignment delete -n clitest000008 -g cli_test_policyexemption000001 -policy exemption list -policy set-definition list -policy set-definition show -n {psn} -policy set-definition delete -n {psn} -policy set-definition list -policy definition delete -n {pn} -policy definition delete -n {dpn} -policy definition list -policy definition list -account management-group create -n cli-test-mgmt-group000002 -policy definition create -n {pn} --rules "{rf}" --params "{pdf}" --display-name {pdn} --description {desc} --management-group {mg} -policy definition create -n {dpn} --rules "{dprf}" --mode {dp_mode} --display-name {dpdn} --description {dp_desc} --management-group {mg} -policy set-definition create -n {psn} --definitions @"{psf}" --display-name {psdn} --management-group {mg} -policy assignment create -d /providers/Microsoft.Management/managementGroups/cli-test-mgmt-group000002/providers/Microsoft.Authorization/policySetDefinitions/clitest000007 -n clitest000009 --scope /providers/Microsoft.Management/managementGroups/cli-test-mgmt-group000002 --display-name clitest000010 -policy exemption create -n clitest000011 -a /providers/Microsoft.Management/managementGroups/cli-test-mgmt-group000002/providers/Microsoft.Authorization/policyAssignments/clitest000009 -e waiver --scope /providers/Microsoft.Management/managementGroups/cli-test-mgmt-group000002 --display-name clitest000012 --description desc_for_clitest_policyexemption_123 --metadata category=test -policy exemption list --scope /providers/Microsoft.Management/managementGroups/cli-test-mgmt-group000002 -policy exemption update -n clitest000011 -e mitigated --scope /providers/Microsoft.Management/managementGroups/cli-test-mgmt-group000002 -r 13661170549606573459 --expires-on 3021-04-05T00:45:13+00:00 --display-name clitest000012_new --description desc_for_clitest_policyexemption_123_new --metadata category=test2 -policy exemption show -n clitest000011 --scope /providers/Microsoft.Management/managementGroups/cli-test-mgmt-group000002 -policy exemption delete -n clitest000011 --scope /providers/Microsoft.Management/managementGroups/cli-test-mgmt-group000002 -policy assignment delete -n clitest000009 --scope /providers/Microsoft.Management/managementGroups/cli-test-mgmt-group000002 -policy exemption list --disable-scope-strict-match -policy assignment list --disable-scope-strict-match -policy set-definition list --management-group {mg} -policy set-definition show -n {psn} --management-group {mg} -policy set-definition delete -n {psn} --management-group {mg} -policy set-definition list --management-group {mg} -policy definition delete -n {pn} --management-group {mg} -policy definition delete -n {dpn} --management-group {mg} -policy definition list --management-group {mg} -policy definition list --management-group {mg} -account management-group delete -n cli-test-mgmt-group000002 -policy definition create -n {pn} --rules "{rf}" --params "{pdf}" --display-name {pdn} --description {desc} -policy definition create -n {dpn} --rules "{dprf}" --mode {dp_mode} --display-name {dpdn} --description {dp_desc} -policy set-definition create -n {psn} --definitions @"{psf}" --display-name {psdn} --description {ps_desc} --metadata category={metadata} -policy set-definition update -n {psn} --display-name {psdn} --description {ps_desc} --metadata category={updated_metadata} -policy set-definition list -policy set-definition show -n {psn} -policy assignment create -d {psn} -n {pan} --display-name {padn} -g {rg} -policy assignment list --resource-group {rg} -policy assignment delete -n {pan} -g {rg} -policy assignment list --disable-scope-strict-match -policy set-definition delete -n {psn} -policy set-definition list -policy set-definition create -n {psn} --definitions @"{psf}" --display-name {psdn} --description {ps_desc} --params "{pdf}" --metadata category={updated_metadata} -policy set-definition update -n {psn} --params "{pdf}" --metadata category={updated_metadata} -policy set-definition delete -n {psn} -policy set-definition list -policy definition delete -n {pn} -policy definition delete -n {dpn} -policy definition list -policy definition list -policy definition create -n {pn} --rules "{rf}" --params "{pdf}" --display-name {pdn} -policy set-definition create -n {psn} --definitions @"{psf}" --display-name {psdn} --definition-groups @"{pgf}" -policy set-definition update -n {psn} --definition-groups @"{pgf2}" -policy set-definition show -n {psn} -policy set-definition delete -n {psn} -policy set-definition list -policy definition delete -n {pn} -account management-group create -n cli-test-mgmt-group000002 -policy definition create -n {pn} --rules "{rf}" --params "{pdf}" --display-name {pdn} --description {desc} --management-group {mg} -policy definition create -n {dpn} --rules "{dprf}" --mode {dp_mode} --display-name {dpdn} --description {dp_desc} --management-group {mg} -policy set-definition create -n {psn} --definitions @"{psf}" --display-name {psdn} --description {ps_desc} --metadata category={metadata} --management-group {mg} -policy set-definition update -n {psn} --display-name {psdn} --description {ps_desc} --metadata category={updated_metadata} --management-group {mg} -policy set-definition list --management-group {mg} -policy set-definition show -n {psn} --management-group {mg} -policy set-definition delete -n {psn} --management-group {mg} -policy set-definition list --management-group {mg} -policy set-definition create -n {psn} --definitions @"{psf}" --display-name {psdn} --description {ps_desc} --params "{pdf}" --metadata category={updated_metadata} --management-group {mg} -policy set-definition update -n {psn} --params "{pdf}" --metadata category={updated_metadata} --management-group {mg} -policy set-definition delete -n {psn} --management-group {mg} -policy set-definition list --management-group {mg} -policy definition delete -n {pn} --management-group {mg} -policy definition delete -n {dpn} --management-group {mg} -policy definition list --management-group {mg} -policy definition list --management-group {mg} -account management-group delete -n cli-test-mgmt-group000002 -policy definition create -n {pn} --rules "{rf}" --params "{pdf}" --display-name {pdn} --description {desc} --subscription {sub} -policy definition create -n {dpn} --rules "{dprf}" --mode {dp_mode} --display-name {dpdn} --description {dp_desc} --subscription {sub} -policy set-definition create -n {psn} --definitions @"{psf}" --display-name {psdn} --description {ps_desc} --metadata category={metadata} --subscription {sub} -policy set-definition update -n {psn} --display-name {psdn} --description {ps_desc} --metadata category={updated_metadata} --subscription {sub} -policy set-definition list --subscription {sub} -policy set-definition show -n {psn} --subscription {sub} -policy set-definition delete -n {psn} --subscription {sub} -policy set-definition list --subscription {sub} -policy set-definition create -n {psn} --definitions @"{psf}" --display-name {psdn} --description {ps_desc} --params "{pdf}" --metadata category={updated_metadata} --subscription {sub} -policy set-definition update -n {psn} --params "{pdf}" --metadata category={updated_metadata} --subscription {sub} -policy set-definition delete -n {psn} --subscription {sub} -policy set-definition list --subscription {sub} -policy definition delete -n {pn} --subscription {sub} -policy definition delete -n {dpn} --subscription {sub} -policy definition list --subscription {sub} -policy definition list --subscription {sub} -policy definition list --query "[?policyType=='BuiltIn']" -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -policy definition show -n {pn} -ad user create --display-name tester123 --password Test123456789 --user-principal-name {upn} -role assignment create --assignee {upn} --role contributor --scope "/subscriptions/{sub}" -managedapp definition create -n {adn} --package-file-uri {uri} --display-name {addn} --description {ad_desc} -l {loc} -a {auth} --lock-level {lock} -g {rg} -managedapp definition update -n {adn} --package-file-uri {uri} --display-name {addn} --description {new_ad_desc} -l {loc} -a {auth} --lock-level {lock} -g {rg} -managedapp definition list -g {rg} -managedapp definition show --ids {ad_id} -managedapp definition delete -g {rg} -n {adn} -managedapp definition list -g {rg} -role assignment delete --assignee {upn} --role contributor -ad user delete --upn-or-object-id {upn} -ad user create --display-name tester123 --password Test123456789 --user-principal-name {upn} -role assignment create --assignee {upn} --role contributor --scope "/subscriptions/{sub}" -managedapp definition create -n {adn} --create-ui-definition @"{ui_file}" --main-template @"{main_file}" --display-name {addn} --description {ad_desc} -l {loc} -a {auth} --lock-level {lock} -g {rg} -managedapp definition list -g {rg} -managedapp definition show --ids {ad_id} -managedapp definition delete -g {rg} -n {adn} -managedapp definition list -g {rg} -role assignment delete --assignee {upn} --role contributor -ad user delete --upn-or-object-id {upn} -ad user create --display-name tester123 --password Test123456789 --user-principal-name {upn} -role assignment create --assignee {upn} --role contributor --scope "/subscriptions/{sub}" -managedapp definition create -n {adn} --package-file-uri {uri} --display-name {addn} --description {ad_desc} -l {loc} -a {auth} --lock-level {lock} -g {rg} -managedapp create -n {man} -g {rg} -l {ma_loc} --kind {ma_kind} -m {ma_rg_id} -d {ad_id} --parameters {param} --tags "key=val" -managedapp list -g {rg} -managedapp show --ids {ma_id} -managedapp delete -g {rg} -n {man} -managedapp list -g {rg} -role assignment delete --assignee {upn} --role contributor -ad user delete --upn-or-object-id {upn} -group deployment validate -g {rg1} --template-file "{tf}" --parameters CrossRg={rg2} StorageAccountName1={sa1} StorageAccountName2={sa2} -group deployment validate -g {rg1} --template-file "{tf}" --parameters CrossRg=SomeRandomRG StorageAccountName1={sa1} StorageAccountName2={sa2} -group deployment create -g {rg1} -n {dn} --template-file "{tf}" --parameters CrossRg={rg2} -group deployment list -g {rg1} -group deployment show -g {rg1} -n {dn} -group deployment operation list -g {rg1} -n {dn} -vm create -g {rg} -n {vm} --use-unmanaged-disk --image UbuntuLTS --admin-username {user} --admin-password {pass} --authentication-type password --nsg-rule None -resource invoke-action --action powerOff --ids {vm_id} -resource invoke-action --action generalize --ids {vm_id} -resource invoke-action --action deallocate --ids {vm_id} -resource invoke-action --action capture --ids {vm_id} --request-body {request_body} -network vnet create -g {rg} -n {vnet} -network vnet show --subscription fakesub --resource-group fakerg -n fakevnet --ids {vnet_id} -local-context on -group create -n {group1} -l {location} -group show -group delete -group delete -n {group1} -y -group create -n {group2} -group delete -n {group2} -y -local-context off -local-context delete --all --purge -y -bicep list-versions -ad app create --display-name {display_name} --available-to-other-tenants true -ad app create --display-name {display_name} --available-to-other-tenants false -ad app delete --id 4c7aa4b1-654c-4e69-adc5-f8f7cf4a6b1f -ad app create --display-name {native_app_name} --native-app --required-resource-accesses '{required_access}' -ad app create --display-name {native_app_name} --key-value {cert_file} -ad app update --id {id} --required-resource-accesses '{required_access2}' -ad app show --id {id} -ad sp create-for-rbac -n {display_name} --skip-assignment -ad app show --id {app_id} -ad app list --app-id {app_id} -ad app list -ad app list --show-mine -ad sp show --id {app_id} -ad sp list --spn {app_id} -ad sp credential reset -n {app_id} -ad sp delete --id {app_id} -ad sp list --spn {app_id} -ad app list --app-id {app_id} -ad sp list -ad sp list --show-mine -ad sp show --id non-exist-sp-name -ad app create --display-name {web_app_name} --available-to-other-tenants true -ad app show --id non-exist-identifierUris -ad app create --display-name {name1} --optional-claims '{optional_claims}' -ad app create --display-name {name2} -ad app update --id {app_id} --optional-claims '{optional_claims}' -ad app show --id {app_id} -ad app create --display-name {name} --homepage {app} --identifier-uris {app} -ad app credential reset --id {app} --append --password "test" --years 2 -ad app show --id {app} -ad app show --id {app_id} -ad app list --display-name {name} -ad app update --id {app} --reply-urls {reply_uri} -ad app show --id {app} -ad app update --id {app} --add replyUrls {reply_uri2} -ad app show --id {app} -ad app update --id {app} --remove replyUrls 1 -ad app show --id {app} -ad app update --id {app} --display-name {name2} -ad app show --id {app} -ad app update --id {app} --homepage {homepage2} -ad app show --id {app} -ad app update --id {app} --set oauth2AllowUrlPathMatching=true -ad app show --id {app} -ad app update --id {app} --app-roles '{app_roles}' -ad app show --id {app} -ad app delete --id {app} -ad app list --identifier-uri {app} -ad sp create-for-rbac -n {display_name} -ad sp create-for-rbac -n {display_name} -ad sp list --spn {app_id} -role assignment list --assignee {app_id} -ad sp delete --id {app_id} -ad sp create-for-rbac -n {display_name} -ad sp list --spn {app_id} -ad app list --app-id {app_id} -role assignment list --assignee {app_id} -ad sp delete --id {app_id} -role assignment list --all -ad sp list --spn {app_id} -ad app list --app-id {app_id} -account show -ad group create --display-name {group} --mail-nickname {group} -ad group create --display-name {group} --mail-nickname {group} -ad group list -ad group delete -g {group} -ad user create --display-name {user1} --password {pass} --user-principal-name {user1}@{domain} -ad user update --display-name {user1}_new --account-enabled false --id {user1}@{domain} --mail-nickname {new_mail_nick_name} -ad user show --upn-or-object-id {user1}@{domain} -ad user update --id {user1}@{domain} --password {pass} -ad user update --id {user1}@{domain} --password {pass} --force-change-password-next-login true -ad user update --id {user1}@{domain} --force-change-password-next-login false -ad user create --display-name {user2} --password {pass} --user-principal-name {user2}@{domain} -ad group create --display-name {group} --mail-nickname {group} --description {group} -ad group member add -g {group} --member-id {user1_id} -ad group member add -g {group} --member-id {user2_id} -ad user get-member-groups --upn-or-object-id {user1_id} -ad group show -g {group} -ad group show -g {group} -ad group list --display-name {group} -ad group get-member-groups -g {group} -ad group member check -g {group} --member-id {user1_id} -ad group member check -g {group} --member-id {user2_id} -ad group member list -g {group} -ad group member remove -g {group} --member-id {user1_id} -ad group member check -g {group} --member-id {user1_id} -ad group delete -g {group} -ad group list -ad user delete --upn-or-object-id {user1_id} -ad user delete --upn-or-object-id {user2_id} -ad group delete -g {group} -account show -ad group create --display-name {group1} --mail-nickname {group1} -ad group create --display-name {group11} --mail-nickname {group11} -ad group create --display-name {prefix_group} --mail-nickname {prefix_group} -ad group show --group {group1} -ad group show --group {group11} -ad group show --group {prefix} -ad group delete -g {group1} -ad group delete -g {group11} -ad group delete -g {prefix} -ad user show --upn-or-object-id {owner} -ad sp create-for-rbac -n {display_name} --skip-assignment -ad app owner add --owner-object-id {owner_object_id} --id {app_id} -ad app owner add --owner-object-id {owner_object_id} --id {app_id} -ad app owner list --id {app_id} -ad app owner remove --owner-object-id {owner_object_id} --id {app_id} -ad app owner list --id {app_id} -ad sp delete --id {app_id} -ad user show --upn-or-object-id {owner} -ad group create --display-name {group} --mail-nickname {group} -ad group owner add -g {group_object_id} --owner-object-id {owner_object_id} -ad group owner add -g {group_object_id} --owner-object-id {owner_object_id} -ad group owner list -g {group_object_id} -ad group delete -g 973e7589-b9e7-49b7-a41a-f9a7e054d41d -ad sp create-for-rbac --name {display_name} --skip-assignment -ad sp credential list --id {app_id} -ad sp credential reset -n {app_id} --password {test_pwd} --append --credential-description newCred1 -ad sp credential list --id {app_id} -ad sp credential delete --id {app_id} --key-id 7aeb1555-b9f3-44c1-b264-42b517a46e95 -ad sp credential list --id {app_id} -ad app credential list --id {app_id} -ad app credential reset --id {app_id} --password {test_pwd} --append --credential-description newCred2 -ad app credential list --id {app_id} -ad app credential delete --id {app_id} --key-id d121d5a6-770c-41d8-a256-bb4ff99f5625 -ad app credential list --id {app_id} -ad sp credential reset -n {app_id} --password {test_pwd} --end-date "2100-12-31T11:59:59+00:00" --credential-description newCred3 -ad app credential reset --id {app_id} --password {test_pwd} --end-date "2100-12-31" --credential-description newCred4 -ad app update --id {app_id} --set groupMembershipClaims=All -ad app show --id {app_id} -ad sp update --id {app_id} --set appRoleAssignmentRequired=true -ad sp show --id {app_id} -ad sp create-for-rbac --name {display_name2} --skip-assignment --years 10 -ad sp credential list --id {app_id2} -ad app delete --id {app_id} -ad app delete --id {app_id2} -ad sp create-for-rbac --name {display_name} --skip-assignment -ad app permission add --id {app_id} --api {ad_graph_resource} --api-permissions {ad_target_api}=Scope {ad_target_api2}=Scope -ad app permission add --id {app_id} --api {ms_graph_resource} --api-permissions {ms_target_api}=Scope {ms_target_api2}=Scope -ad app permission list --id {app_id} -ad app permission delete --id {app_id} --api {ms_graph_resource} --api-permissions {ms_target_api} -ad app permission list --id {app_id} -ad app permission delete --id {app_id} --api {ms_graph_resource} --api-permissions {ms_target_api2} -ad app permission list --id {app_id} -ad app permission add --id {app_id} --api {ms_graph_resource} --api-permissions {ms_target_api}=Scope {ms_target_api2}=Scope -ad app permission delete --id {app_id} --api {ms_graph_resource} --api-permissions {ms_target_api} {ms_target_api2} -ad app permission list --id {app_id} -ad app permission delete --id {app_id} --api {ad_graph_resource} -ad app permission list --id {app_id} -ad app permission delete --id {app_id} --api 11111111-0000-0000-c000-000000000000 -ad app permission list --id {app_id} -ad app permission delete --id {app_id} --api 11111111-0000-0000-c000-000000000000 --api-permissions {ms_target_api} {ms_target_api2} -ad app permission list --id {app_id} -ad app permission add --id {app_id} --api {ms_graph_resource} --api-permissions {ms_target_api}=Scope {ms_target_api2}=Scope -ad app permission delete --id {app_id} --api {ms_graph_resource} --api-permissions 22222222-0000-0000-c000-000000000000 -ad app permission list --id {app_id} -ad app delete --id 066d25bf-13d9-4e34-b031-a24f1f196f8a -ad sp create-for-rbac --name {display_name} --skip-assignment -ad app permission add --id {app_id} --api {graph_resource} --api-permissions {target_api}=Scope -ad app permission grant --id {app_id} --api {graph_resource} -ad app permission list --id {app_id} -ad app permission list-grants --id {app_id} -ad app permission list-grants --id {app_id} --show-resource-name -ad app permission add --id {app_id} --api {graph_resource} --api-permissions {target_api2}=Scope -ad app permission grant --id {app_id} --api {graph_resource} -ad app permission delete --id {app_id} --api {graph_resource} -ad app permission list --id {app_id} -ad app delete --id e2322d30-1da0-4f6a-ab73-d0233521feea -ad sp create-for-rbac -n {display_name} --skip-assignment -ad app create --display-name {display_name_new} --password {gen_password} -ad app delete --id {app_id} -ad app delete --id {sp_new} -ad sp create-for-rbac -n {display_name} --skip-assignment -ad app delete --id {app_id} -ad sp create-for-rbac -n {display_name} --scopes {scope} {scope}/resourceGroups/{rg} -role assignment list --assignee {app_id} --scope {scope} -role assignment list --assignee {app_id} -g {rg} -role assignment delete --assignee {app_id} -g {rg} -role assignment delete --assignee {app_id} -ad app delete --id {app_id} -ad sp create-for-rbac -n {display_name} --scopes {scope} {scope}/resourceGroups/{rg} --create-cert -ad sp credential reset -n {app_id} --create-cert -ad app delete --id {app_id} -ad sp create-for-rbac --scopes {scope}/resourceGroups/{rg} --create-cert --keyvault {kv} --cert {cert} -n {display_name} -keyvault certificate show --vault-name {kv} -n {cert} -ad sp credential reset -n {app_id} --create-cert --keyvault {kv} --cert {cert} -keyvault certificate show --vault-name {kv} -n {cert} -ad app delete --id {app_id} -keyvault certificate get-default-policy -keyvault certificate create --vault-name {kv} -n {cert} -p "{policy}" --validity 24 -ad sp create-for-rbac -n {display_name} --keyvault {kv} --cert {cert} --scopes {scope}/resourceGroups/{rg} -ad sp credential reset -n {app_id} --keyvault {kv} --cert {cert} -ad app delete --id {app_id} -keyvault certificate create --vault-name {kv} -n {cert} -p "{policy}" --validity 6 -ad sp create-for-rbac --scopes {scope}/resourceGroups/{rg} --keyvault {kv} --cert {cert} -n {display_name2} -ad sp credential reset -n {app_id2} --keyvault {kv} --cert {cert} -ad app delete --id {app_id2} -role definition create --role-definition {template} -role definition list -n {role} -role definition list -n {role} -role definition list -n {role} -role definition list -n {role} -role definition list -n {role} -role definition list -n {role} -role definition list -n {role} -role definition list -n {role} -role definition list -n {role} -role definition update --role-definition {template} -role definition delete -n {role} -role definition list -n {role} -role definition list -n {role} -account show -ad user create --display-name tester123 --password Test123456789 --user-principal-name {upn} -role assignment create --assignee {upn} --role contributor -g {rg} -role assignment list-changelogs --start-time 2020-09-17T07:35:29Z --end-time 2020-09-17T07:37:29Z -role assignment list-changelogs --start-time 2020-09-17T07:35:29Z --end-time 2020-09-17T07:37:29Z -role assignment list-changelogs --start-time 2020-09-17T07:35:29Z --end-time 2020-09-17T07:37:29Z -role assignment list-changelogs --start-time 2020-09-17T07:35:29Z --end-time 2020-09-17T07:37:29Z -role assignment list-changelogs --start-time 2020-09-17T07:35:29Z --end-time 2020-09-17T07:37:29Z -role assignment list-changelogs --start-time 2020-09-17T07:35:29Z --end-time 2020-09-17T07:37:29Z -role assignment list-changelogs --start-time 2020-09-17T07:35:29Z --end-time 2020-09-17T07:37:29Z -ad user delete --upn-or-object-id {upn} -account show -ad user create --display-name tester123 --password Test123456789 --user-principal-name {upn} -role assignment create --assignee-object-id {object_id} --assignee-principal-type User --role reader -g {rg} --description "{description}" --condition "{condition}" --condition-version {condition_version} -role assignment delete -g {rg} -role assignment create --assignee-object-id {object_id} --assignee-principal-type User --role reader -g {rg} --description "{description}" --condition "{condition}" -role assignment delete -g {rg} -role assignment create --assignee-object-id {object_id} --assignee-principal-type User --role reader -g {rg} --condition-version {condition_version} -role assignment create --assignee-object-id {object_id} --assignee-principal-type User --role reader -g {rg} --description "{description}" --condition "{condition}" --condition-version {condition_version} -role assignment update --role-assignment '{{"canDelegate": null, "condition": "@Resource[Microsoft.Storage/storageAccounts/blobServices/containers:Name] stringEquals '"'"'foo'"'"'", "conditionVersion": "2.0", "description": "Some updated description.", "id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_role_assign000001/providers/Microsoft.Authorization/roleAssignments/88888888-0000-0000-0000-000000000003", "name": "88888888-0000-0000-0000-000000000003", "principalId": "8cbeeffa-bf11-4f90-b401-311350e3cd99", "principalType": "User", "resourceGroup": "cli_role_assign000001", "roleDefinitionId": "/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7", "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_role_assign000001", "type": "Microsoft.Authorization/roleAssignments"}}' -role assignment update --role-assignment '{{"canDelegate": null, "condition": "@Resource[Microsoft.Storage/storageAccounts/blobServices/containers:Name] stringEquals '"'"'foo'"'"'", "conditionVersion": "1.0", "description": "Some updated description.", "id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_role_assign000001/providers/Microsoft.Authorization/roleAssignments/88888888-0000-0000-0000-000000000003", "name": "88888888-0000-0000-0000-000000000003", "principalId": "8cbeeffa-bf11-4f90-b401-311350e3cd99", "principalType": "User", "resourceGroup": "cli_role_assign000001", "roleDefinitionId": "/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7", "scope": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_role_assign000001", "type": "Microsoft.Authorization/roleAssignments"}}' -role assignment delete -g {rg} -ad user delete --upn-or-object-id {upn} -account show -ad user create --display-name tester123 --password Test123456789 --user-principal-name {upn} -role assignment create --assignee-object-id {object_id} --assignee-principal-type {principal_type} --role Reader -g {rg} -role assignment list -g {rg} -role assignment delete -g {rg} -role assignment list -g {rg} -role assignment create --assignee-object-id {object_id} --role Reader -g {rg} -role assignment list -g {rg} -role assignment delete -g {rg} -role assignment list -g {rg} -role assignment create --assignee-object-id {object_id} --role Reader -g {rg} -role assignment list -g {rg} -role assignment delete -g {rg} -role assignment list -g {rg} -ad user delete --upn-or-object-id {upn} -ad group create --display-name {group_name} --mail-nickname {group_name} -role assignment create --assignee-object-id {object_id} --assignee-principal-type {principal_type} --role Reader -g {rg} -role assignment list -g {rg} -role assignment delete -g {rg} -role assignment list -g {rg} -role assignment create --assignee-object-id {object_id} --role Reader -g {rg} -role assignment list -g {rg} -role assignment delete -g {rg} -role assignment list -g {rg} -role assignment create --assignee-object-id {object_id} --role Reader -g {rg} -role assignment list -g {rg} -role assignment delete -g {rg} -role assignment list -g {rg} -ad group delete --group {object_id} -ad sp create-for-rbac --skip-assignment --name {sp_name} -ad sp show --id {app_id} -role assignment create --assignee-object-id {object_id} --assignee-principal-type {principal_type} --role Reader -g {rg} -role assignment list -g {rg} -role assignment delete -g {rg} -role assignment list -g {rg} -role assignment create --assignee-object-id {object_id} --role Reader -g {rg} -role assignment list -g {rg} -role assignment delete -g {rg} -role assignment list -g {rg} -role assignment create --assignee-object-id {object_id} --role Reader -g {rg} -role assignment list -g {rg} -role assignment delete -g {rg} -role assignment list -g {rg} -ad sp delete --id {object_id} -account show -ad user create --display-name tester123 --password Test123456789 --user-principal-name {upn} -ad group create --display-name group123 --mail-nickname {group} -ad group member add --group {group_id} --member-id {user_id} -network nsg create -n {nsg} -g {rg} -network nsg show -n {nsg} -g {rg} -role assignment create --assignee {upn} --role contributor -g {rg} -role assignment create --assignee {upn} --role contributor -g {rg} -role assignment list -g {rg} -role assignment list --assignee {upn} --role contributor -g {rg} -role assignment create --assignee {group_id} --role contributor -g {rg} -role assignment list --assignee {upn} --all --include-groups -role assignment list -g {rg} --include-inherited -role assignment list --all -role assignment delete --assignee {group_id} --role contributor -g {rg} -role assignment delete --assignee {upn} --role contributor -g {rg} -role assignment list -g {rg} -role assignment create --assignee {upn} --role contributor --scope {nsg_id} -role assignment list --assignee {upn} --role contributor --scope {nsg_id} -role assignment delete --assignee {upn} --role contributor --scope {nsg_id} -role assignment list --scope {nsg_id} -role assignment create --assignee {upn} --role reader -role assignment list --assignee {upn} --role reader -role assignment list --assignee {upn} -role assignment delete --assignee {upn} --role reader -role assignment create --assignee fake --role contributor -ad user delete --upn-or-object-id {upn} -role assignment delete --assignee "" -role assignment delete --scope "" -role assignment delete --role "" -role assignment delete --resource-group "" -account show -ad user create --display-name tester123 --password Test123456789 --user-principal-name {upn} -configure --default group={rg} --scope local -configure --list-defaults --scope local -group show -n {rg} -role assignment create --assignee {upn} --role reader --scope /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_role_assign000001 -role assignment list --assignee {upn} --role reader --scope /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_role_assign000001 -role assignment delete --assignee {upn} --role reader --scope /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_role_assign000001 -role assignment list --assignee {upn} --role reader --scope /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_role_assign000001 -configure --default group="" --scope local -ad user delete --upn-or-object-id {upn} -role assignment list --include-classic-administrator -role assignment list -g cli_test_assignments_for_coadmins000001 -role assignment list -g cli_test_assignments_for_coadmins000001 --include-classic-administrator -search service create -n {name} -g {rg} --sku {sku_name} -search admin-key show --service-name {name} -g {rg} -search admin-key renew --service-name {name} -g {rg} --key-kind primary -search admin-key show --service-name {name} -g {rg} -search admin-key renew --service-name {name} -g {rg} --key-kind secondary -search admin-key show --service-name {name} -g {rg} -search service create -n {search_service_name} -g {rg} --sku {sku_name} --public-access {public_network_access} -network vnet create --resource-group {rg} --name {vnet_name} --address-prefix 10.0.0.0/16 -network vnet subnet create --resource-group {rg} --vnet-name {vnet_name} --name {subnet_name} --address-prefixes 10.0.0.0/24 -network vnet subnet update --resource-group {rg} --vnet-name {vnet_name} --name {subnet_name} --disable-private-endpoint-network-policies true -network private-endpoint create --resource-group {rg} --name {private_endpoint_name} --vnet-name {vnet_name} --subnet {subnet_name} --private-connection-resource-id {_search_service_resource_id} --connection-name {private_endpoint_connection_name} --group-id searchService -search service show -n {search_service_name} -g {rg} -search private-endpoint-connection list -g {rg} --service-name {search_service_name} -search private-endpoint-connection show --name {_private_endpoint_connection_name} -g {rg} --service-name {search_service_name} -search private-endpoint-connection update --service-name {search_service_name} -g {rg} --name {_private_endpoint_connection_name} --status {private_endpoint_connection_status_rejected} --description "{private_endpoint_connection_description_rejected}" --actions-required "No action required" -search private-endpoint-connection update --service-name {search_service_name} -g {rg} --name {_private_endpoint_connection_name} --status {private_endpoint_connection_status_pending} --description "{private_endpoint_connection_description_pending}" --actions-required "No action required" -search private-endpoint-connection update --service-name {search_service_name} -g {rg} --name {_private_endpoint_connection_name} --status {private_endpoint_connection_status_approved} --description "{private_endpoint_connection_description_approved}" --actions-required "No action required" -search private-endpoint-connection delete --service-name {search_service_name} -g {rg} --name {_private_endpoint_connection_name} -y -search private-endpoint-connection show --name {_private_endpoint_connection_name} -g {rg} --service-name {search_service_name} -search private-endpoint-connection list -g {rg} --service-name {search_service_name} -search service create -n {name} -g {rg} --sku {sku_name} --public-access {public_network_access} -search private-link-resource list --service-name {name} -g {rg} -search service create -n {name} -g {rg} --sku {sku_name} -search query-key list --service-name {name} -g {rg} -search query-key create --service-name {name} -g {rg} -n {key_name_1} -search query-key list --service-name {name} -g {rg} -search query-key create --service-name {name} -g {rg} -n {key_name_2} -search query-key list --service-name {name} -g {rg} -search query-key delete --service-name {name} -g {rg} --key-value {key_value_1} -search query-key list --service-name {name} -g {rg} -search query-key delete --service-name {name} -g {rg} --key-value {key_value_2} -search query-key list --service-name {name} -g {rg} -search service list -g {rg} -search service create -n {name1} -g {rg} --sku {sku_name} -search service list -g {rg} -search service create -n {name2} -g {rg} --sku {sku_name} -search service list -g {rg} -search service delete -n {name1} -g {rg} -y -search service list -g {rg} -search service delete -n {name2} -g {rg} -y -search service list -g {rg} -search service create -n {name} -g {rg} --sku {sku_name} -search service show -n {name} -g {rg} -search service delete -n {name} -g {rg} -y -search service show -n {name} -g {rg} -search service create -n {name} -g {rg} --sku {sku_name} --ip-rules {ip_rules} -search service create -n {name} -g {rg} --sku {sku_name} --identity-type {identity_type} -search service create -n {name} -g {rg} --sku {sku_name} --replica-count {replica_count} --partition-count {partition_count} -search service create -n {name} -g {rg} --sku {sku_name} --replica-count {replica_count} --partition-count {partition_count} -search service create -n {name} -g {rg} --sku {sku_name} --public-access {public_network_access} -search service create -n {name} -g {rg} --sku {sku_name} -search service create -n {name} -g {rg} --sku {sku_name} --replica-count {replica_count} --partition-count {partition_count} -search service create -n {name} -g {rg} --sku {sku_name} -search service update -n {name} -g {rg} --replica-count {replica_count} --partition-count {partition_count} -search service create -n {name} -g {rg} --sku {sku_name} -search service update -n {name} -g {rg} --replica-count {replica_count} --partition-count {partition_count} -search service create -n {name} -g {rg} --sku {sku_name} --ip-rules {ip_rules} -search service update -n {name} -g {rg} --ip-rules {ip_rules} -search service update -n {name} -g {rg} --ip-rules {ip_rules} -search service create -n {name} -g {rg} --sku {sku_name} --identity-type {identity_type} -search service update -n {name} -g {rg} --identity-type {identity_type} -search service update -n {name} -g {rg} --identity-type {identity_type} -search service create -n {name} -g {rg} --sku {sku_name} --public-access {public_network_access} -search service update -n {name} -g {rg} --public-access {public_network_access} -search service update -n {name} -g {rg} --public-access {public_network_access} -search service create -n {search_service_name} -g {rg} --sku {sku_name} --public-network-access {public_network_access} -storage account create -n {storage_account_name} -g {rg} --kind StorageV2 -storage account show -n {storage_account_name} -g {rg} -search shared-private-link-resource create --service-name {search_service_name} -g {rg} --resource-id {_account_resource_id} --name {shared_private_link_resource_name} --group-id {shared_private_link_resource_group_id} -search shared-private-link-resource update --service-name {search_service_name} -g {rg} --resource-id {_account_resource_id} --name {shared_private_link_resource_name} --group-id {shared_private_link_resource_group_id} --request-message "{shared_private_link_resource_request_message}" -search shared-private-link-resource list --service-name {search_service_name} -g {rg} -search shared-private-link-resource show --service-name {search_service_name} -g {rg} --name {shared_private_link_resource_name} -search shared-private-link-resource delete --service-name {search_service_name} -g {rg} --name {shared_private_link_resource_name} -y -search shared-private-link-resource list --service-name {search_service_name} -g {rg} -search shared-private-link-resource show --service-name {search_service_name} -g {rg} --name {shared_private_link_resource_name} -security adaptive-application-controls list -security adaptive-application-controls show --group-name {group_name} -security adaptive_network_hardenings list --resource-group MSI-GLStandard_A1 --resource-type virtualMachines --resource-namespace Microsoft.Compute --resource-name MSI-22122 -security alert list -security alert show -g Sample-RG -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 -security alert update -g Sample-RG -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 --status Activate -security alert show -g Sample-RG -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 -security alert update -g Sample-RG -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 --status Dismiss -security alert show -g Sample-RG -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 -security alert update -g Sample-RG -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 --status Resolve -security alert show -g Sample-RG -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 -security alert update -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 --status Activate -security alert show -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 -security alert update -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 --status Dismiss -security alert show -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 -security alert update -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 --status Resolve -security alert show -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 -security alert update -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 --status Activate -security alert show -l centralus -n 2517956498655466228_04034174-f436-4f6d-90ed-2425247dafd1 -security allowed_connections list -security assessment list -security assessment-metadata list -security assessment-metadata create -n "8f211ea8-777b-45c4-8631-776d535afd62" --display-name "test assessment" --severity "High" --description "hello world" -security assessment-metadata list -security assessment create -n 8f211ea8-777b-45c4-8631-776d535afd62 --status-code Healthy -security assessment list -security assessment-metadata delete -n "8f211ea8-777b-45c4-8631-776d535afd62" -security assessment-metadata list -security assessment list -security atp storage show --resource-group clitest.rg000001 --storage-account clitest000002 -security atp storage update --resource-group clitest.rg000001 --storage-account clitest000002 --is-enabled true -security atp storage show --resource-group clitest.rg000001 --storage-account clitest000002 -security atp storage update --resource-group clitest.rg000001 --storage-account clitest000002 --is-enabled false -security atp storage show --resource-group clitest.rg000001 --storage-account clitest000002 -security atp storage update --resource-group clitest.rg000001 --storage-account clitest000002 --is-enabled -security atp storage show --resource-group clitest.rg000001 --storage-account clitest000002 -security auto-provisioning-setting list -security auto-provisioning-setting update -n "default" --auto-provision "On" -security auto-provisioning-setting show -n "default" -security auto-provisioning-setting update -n "default" --auto-provision "Off" -security auto-provisioning-setting show -n "default" -security discovered-security-solution list -security external-security-solution list -iot hub create -n {iot_hub_name} -g {rg} -security iot-solution create --solution-name "azurecli-hub" --resource-group {rg} --iot-hubs {iot_hub_id} --display-name "Solution Default" --location "east us" -security iot-solution list --resource-group {rg} -security iot-solution update --solution-name "azurecli-hub" --resource-group {rg} --iot-hubs {iot_hub_id} --display-name "Solution Default" -security iot-solution list --resource-group {rg} -security iot-solution show --solution-name "azurecli-hub" --resource-group {rg} -security iot-solution delete --solution-name "azurecli-hub" --resource-group {rg} -security iot-solution list --resource-group {rg} -security jit-policy list -security location list -security location show -n westcentralus -security pricing list -security pricing create -n VirtualMachines --tier free -security pricing show -n VirtualMachines -security pricing create -n VirtualMachines --tier standard -security pricing show -n VirtualMachines -security regulatory-compliance-standards list -security regulatory-compliance-standards show -n "Azure-CIS-1.1.0" -security regulatory-compliance-standards show -n "Azure-CIS-1.1.0" -security regulatory-compliance-controls show --standard-name "Azure-CIS-1.1.0" -n "1.1" -security regulatory-compliance-assessments list --standard-name "Azure-CIS-1.1.0" --control-name "1.1" -security regulatory-compliance-assessments show --standard-name "Azure-CIS-1.1.0" --control-name "1.1" -n "94290b00-4d0c-d7b4-7cea-064a9554e681" -security secure-scores list -security secure-scores show --n "ascScore" -security secure-score-controls list -security secure-score-controls list_by_score --n "ascScore" -security secure-score-control-definitions list -security contact list -security contact create -n default1 --email john@contoso.com --alert-notifications off --alerts-admins off -security contact list -security contact show -n default1 -security contact create -n default1 --email lisa@contoso.com --alert-notifications off --alerts-admins off -security contact show -n default1 -security contact delete -n default1 -security contact list -security setting list -security setting show -n MCAS -security setting update -n Sentinel --enabled true -security setting update -n Sentinel --enabled false -security task list -security task show -g {task_id} -n {task_name} -security task show -n 099f0768-eb14-0179-f5a9-8553cad54542 -security topology list -servicebus namespace exists --name {namespacenameprimary} -servicebus namespace create --resource-group {rg} --name {namespacenameprimary} --location {loc_south} --tags {tags} --sku {sku} -servicebus namespace show --resource-group {rg} --name {namespacenameprimary} -servicebus namespace create --resource-group {rg} --name {namespacenamesecondary} --location {loc_north} --tags {tags} --sku {sku} -servicebus namespace show --resource-group {rg} --name {namespacenamesecondary} -servicebus namespace authorization-rule create --resource-group {rg} --namespace-name {namespacenameprimary} --name {authoname} --rights {accessrights} -servicebus namespace authorization-rule show --resource-group {rg} --namespace-name {namespacenameprimary} --name {authoname} -servicebus georecovery-alias exists --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias set --resource-group {rg} --namespace-name {namespacenameprimary} -a {aliasname} --partner-namespace {namespacenamesecondary} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenamesecondary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias authorization-rule show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} --name {authoname} -servicebus georecovery-alias authorization-rule keys list --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} --name {authoname} -servicebus georecovery-alias authorization-rule list --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias break-pair --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias set --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} --partner-namespace {id} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenameprimary} --alias {aliasname} -servicebus georecovery-alias fail-over --resource-group {rg} --namespace-name {namespacenamesecondary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenamesecondary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenamesecondary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenamesecondary} --alias {aliasname} -servicebus georecovery-alias show --resource-group {rg} --namespace-name {namespacenamesecondary} --alias {aliasname} -servicebus georecovery-alias delete --resource-group {rg} --namespace-name {namespacenamesecondary} --alias {aliasname} -servicebus namespace delete --resource-group {rg} --name {namespacenameprimary} -servicebus namespace delete --resource-group {rg} --name {namespacenamesecondary} -servicebus namespace exists --name {namespacename} -servicebus namespace create --resource-group {rg} --name {namespacename} --tags {tags} --sku {sku} -servicebus namespace show --resource-group {rg} --name {namespacename} -servicebus namespace update --resource-group {rg} --name {namespacename} --tags {tags} -servicebus namespace list -servicebus namespace list --resource-group {rg} -servicebus namespace authorization-rule create --resource-group {rg} --namespace-name {namespacename} --name {authoname} --rights {accessrights} -servicebus namespace authorization-rule show --resource-group {rg} --namespace-name {namespacename} --name {authoname} -servicebus namespace authorization-rule create --resource-group {rg} --namespace-name {namespacename} --name {authoname} --rights {accessrights1} -servicebus namespace authorization-rule show --resource-group {rg} --namespace-name {namespacename} --name {defaultauthorizationrule} -servicebus namespace authorization-rule keys list --resource-group {rg} --namespace-name {namespacename} --name {authoname} -servicebus namespace authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --name {authoname} --key {primary} -servicebus namespace authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --name {authoname} --key {secondary} -servicebus namespace authorization-rule delete --resource-group {rg} --namespace-name {namespacename} --name {authoname} -servicebus namespace delete --resource-group {rg} --name {namespacename} -network vnet create --resource-group {rg} --name {namevnet} -network vnet create --resource-group {rg} --name {namevnet1} -network vnet subnet create --resource-group {rg} --name {namesubnet1} --vnet-name {namevnet} --address-prefixes 10.0.0.0/24 -network vnet subnet create --resource-group {rg} --name {namesubnet2} --vnet-name {namevnet1} --address-prefixes 10.0.0.0/24 -servicebus namespace exists --name {namespacename} -servicebus namespace create --resource-group {rg} --name {namespacename} --tags {tags} --sku {sku} --default-action Allow -servicebus namespace show --resource-group {rg} --name {namespacename} -servicebus namespace update --resource-group {rg} --name {namespacename} --tags {tags} --default-action Deny -servicebus namespace network-rule list --resource-group {rg} --name {namespacename} -servicebus namespace network-rule add --resource-group {rg} --name {namespacename} --ip-address {ipmask1} --action Allow -servicebus namespace network-rule add --resource-group {rg} --name {namespacename} --ip-address {ipmask2} --action Allow -servicebus namespace network-rule list --resource-group {rg} --name {namespacename} -servicebus namespace network-rule remove --resource-group {rg} --name {namespacename} --ip-address {ipmask2} -servicebus namespace network-rule add --resource-group {rg} --name {namespacename} --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_sb_network000001/providers/Microsoft.Network/virtualNetworks/sbehvnettest1/subnets/default --ignore-missing-endpoint True -servicebus namespace network-rule add --resource-group {rg} --name {namespacename} --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_sb_network000001/providers/Microsoft.Network/virtualNetworks/sbehvnettest2/subnets/secondvnet --ignore-missing-endpoint True -servicebus namespace network-rule list --resource-group {rg} --name {namespacename} -servicebus namespace network-rule remove --resource-group {rg} --name {namespacename} --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/cli_test_sb_network000001/providers/Microsoft.Network/virtualNetworks/sbehvnettest2/subnets/secondvnet -servicebus namespace delete --resource-group {rg} --name {namespacename} -servicebus namespace create --resource-group {rg} --name {namespacename} --tags {tags} --sku {sku} -servicebus namespace show --resource-group {rg} --name {namespacename} -servicebus queue create --resource-group {rg} --namespace-name {namespacename} --name {queuename} --auto-delete-on-idle {lockduration} --max-size 1024 -servicebus queue show --resource-group {rg} --namespace-name {namespacename} --name {queuename} -servicebus queue update --resource-group {rg} --namespace-name {namespacename} --name {queuename} --auto-delete-on-idle {lockduration1} -servicebus queue list --resource-group {rg} --namespace-name {namespacename} -servicebus queue authorization-rule create --resource-group {rg} --namespace-name {namespacename} --queue-name {queuename} --name {authoname} --rights {accessrights} -servicebus queue authorization-rule show --resource-group {rg} --namespace-name {namespacename} --queue-name {queuename} --name {authoname} -servicebus queue authorization-rule update --resource-group {rg} --namespace-name {namespacename} --queue-name {queuename} --name {authoname} --rights {accessrights1} -servicebus queue authorization-rule keys list --resource-group {rg} --namespace-name {namespacename} --queue-name {queuename} --name {authoname} -servicebus queue authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --queue-name {queuename} --name {authoname} --key {primary} -servicebus queue authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --queue-name {queuename} --name {authoname} --key {secondary} -servicebus queue authorization-rule delete --resource-group {rg} --namespace-name {namespacename} --queue-name {queuename} --name {authoname} -servicebus queue delete --resource-group {rg} --namespace-name {namespacename} --name {queuename} -servicebus namespace delete --resource-group {rg} --name {namespacename} -servicebus namespace create --resource-group {rg} --name {namespacename} --tags {tags} --sku {sku} -servicebus namespace show --resource-group {rg} --name {namespacename} -servicebus topic create --resource-group {rg} --namespace-name {namespacename} --name {topicname} -servicebus topic show --resource-group {rg} --namespace-name {namespacename} --name {topicname} -servicebus topic subscription create --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --name {subscriptionname} -servicebus topic subscription show --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --name {subscriptionname} -servicebus topic subscription rule create --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --subscription-name {subscriptionname} --name {rulename} --filter-sql-expression {sqlexpression} -servicebus topic subscription rule show --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --subscription-name {subscriptionname} --name {rulename} -servicebus topic subscription rule update --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --subscription-name {subscriptionname} --name {rulename} --filter-sql-expression {sqlexpression1} -servicebus topic subscription rule list --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --subscription-name {subscriptionname} -servicebus topic subscription rule delete --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --subscription-name {subscriptionname} --name {rulename} -servicebus topic subscription delete --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --name {subscriptionname} -servicebus topic delete --resource-group {rg} --namespace-name {namespacename} --name {topicname} -servicebus namespace delete --resource-group {rg} --name {namespacename} -servicebus namespace create --resource-group {rg} --name {namespacename} --tags {tags} --sku {sku} -servicebus namespace show --resource-group {rg} --name {namespacename} -servicebus topic create --resource-group {rg} --namespace-name {namespacename} --name {topicname} -servicebus topic show --resource-group {rg} --namespace-name {namespacename} --name {topicname} -servicebus topic subscription create --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --name {subscriptionname} -servicebus topic subscription show --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --name {subscriptionname} -servicebus topic subscription list --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} -servicebus topic subscription update --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --name {subscriptionname} --max-delivery {maxdelivery} --default-message-time-to-live {defaultmessagetimetolive} --dead-letter-on-filter-exceptions {false} --enable-dead-lettering-on-message-expiration {false} --auto-delete-on-idle {autodeleteonidle} --default-message-time-to-live {defaultmessagetimetolive} --lock-duration {lockduration} -servicebus topic subscription delete --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --name {subscriptionname} -servicebus topic delete --resource-group {rg} --namespace-name {namespacename} --name {topicname} -servicebus namespace delete --resource-group {rg} --name {namespacename} -servicebus namespace create --resource-group {rg} --name {namespacename} --tags {tags} --sku {sku} -servicebus namespace show --resource-group {rg} --name {namespacename} -servicebus topic create --resource-group {rg} --namespace-name {namespacename} --name {topicname} -servicebus topic show --resource-group {rg} --namespace-name {namespacename} --name {topicname} -servicebus topic update --resource-group {rg} --namespace-name {namespacename} --name {topicname} --enable-ordering True -servicebus topic list --resource-group {rg} --namespace-name {namespacename} -servicebus topic authorization-rule create --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --name {authoname} --rights {accessrights} -servicebus topic authorization-rule show --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --name {authoname} -servicebus topic authorization-rule update --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --name {authoname} --rights {accessrights1} -servicebus topic authorization-rule keys list --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --name {authoname} -servicebus topic authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --name {authoname} --key {primary} -servicebus topic authorization-rule keys renew --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --name {authoname} --key {secondary} -servicebus topic authorization-rule delete --resource-group {rg} --namespace-name {namespacename} --topic-name {topicname} --name {authoname} -servicebus topic delete --resource-group {rg} --namespace-name {namespacename} --name {topicname} -webapp connection create confluent-cloud --connection testconn --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-kafka-app2 --bootstrap-server xxx.eastus.azure.confluent.cloud:9092 --kafka-key Name --kafka-secret Secret --schema-registry https://xxx.eastus.azure.confluent.cloud --schema-key Name --schema-secret Secret --client-type python -webapp connection list --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-kafka-app2 -webapp connection list-configuration --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-kafka-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection validate --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-kafka-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-kafka-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-kafka-app2/providers/Microsoft.ServiceLinker/linkers/testconn --yes -webapp connection create cosmos-cassandra --connection testconn --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-cassandra-cosmos-asp-app2 --target-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.DocumentDB/databaseAccounts/servicelinker-cassandra-cosmos2/cassandraKeyspaces/coredb --system-identity --client-type python -webapp connection list --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-cassandra-cosmos-asp-app2 -webapp connection list-configuration --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-cassandra-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection validate --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-cassandra-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-cassandra-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-cassandra-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn --yes -webapp connection create cosmos-gremlin --connection testconn --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-gremlin-cosmos-asp-app2 --target-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.DocumentDB/databaseAccounts/servicelinker-gremlin-cosmos2/gremlinDatabases/coreDB/graphs/MyItem --system-identity --client-type python -webapp connection list --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-gremlin-cosmos-asp-app2 -webapp connection list-configuration --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-gremlin-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection validate --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-gremlin-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-gremlin-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-gremlin-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn --yes -webapp connection create cosmos-mongo --connection testconn --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-mongo-cosmos-asp-app2 --target-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.DocumentDB/databaseAccounts/servicelinker-mongo-cosmos2/mongodbDatabases/coreDB --system-identity --client-type dotnet -webapp connection list --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-mongo-cosmos-asp-app2 -webapp connection list-configuration --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-mongo-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection validate --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-mongo-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-mongo-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-mongo-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn --yes -webapp connection create cosmos-sql --connection testconn --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-sql-cosmos-asp-app2 --target-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.DocumentDB/databaseAccounts/servicelinker-sql-cosmos2/sqlDatabases/coreDB --system-identity --client-type python -webapp connection list --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-sql-cosmos-asp-app2 -webapp connection list-configuration --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-sql-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection validate --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-sql-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-sql-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-sql-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn --yes -webapp connection create cosmos-table --connection testconn --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-table-cosmos-asp-app2 --target-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.DocumentDB/databaseAccounts/servicelinker-table-cosmos2/tables/MyItem --system-identity --client-type python -webapp connection list --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-table-cosmos-asp-app2 -webapp connection list-configuration --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-table-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection validate --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-table-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-table-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-win-group/providers/Microsoft.Web/sites/servicelinker-table-cosmos-asp-app2/providers/Microsoft.ServiceLinker/linkers/testconn --yes -webapp connection create keyvault --connection testconn --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-keyvault-app2 --target-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.KeyVault/vaults/servicelinker-test-kv2 --system-identity --client-type python -webapp connection list --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-keyvault-app2 -webapp connection list-configuration --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-keyvault-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection validate --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-keyvault-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-keyvault-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-keyvault-app2/providers/Microsoft.ServiceLinker/linkers/testconn --yes -keyvault secret show --vault-name cupertino-kv-test -n TestDbPassword -webapp connection create mysql --connection testconn --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-mysql-app2 --target-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.DBForMySQL/servers/servicelinker-mysql2/databases/mysqlDB --secret name=servicelinker secret=microsoft123! --client-type python -webapp connection list --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-mysql-app2 -webapp connection list-configuration --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-mysql-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection validate --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-mysql-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-mysql-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-mysql-app2/providers/Microsoft.ServiceLinker/linkers/testconn --yes -keyvault secret show --vault-name cupertino-kv-test -n TestDbPassword -keyvault secret show --vault-name cupertino-kv-test -n TestDbPassword -keyvault secret show --vault-name cupertino-kv-test -n TestDbPassword -webapp connection create signalr --connection testconn --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-signalr-app2 --target-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.SignalRService/SignalR/servicelinker-signalr2 --system-identity --client-type dotnet -webapp connection list --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-signalr-app2 -webapp connection list-configuration --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-signalr-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection validate --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-signalr-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-signalr-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-signalr-app2/providers/Microsoft.ServiceLinker/linkers/testconn --yes -webapp connection create storage-blob --connection testconn --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storageblob-app2 --target-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Storage/storageAccounts/servicelinkerstorage2/blobServices/default --system-identity --client-type python -webapp connection list --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storageblob-app2 -webapp connection list-configuration --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storageblob-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection validate --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storageblob-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storageblob-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storageblob-app2/providers/Microsoft.ServiceLinker/linkers/testconn --yes -webapp connection create storage-file --connection testconn --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagefile-app2 --target-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Storage/storageAccounts/servicelinkerstorage2/fileServices/default --secret --client-type python -webapp connection list --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagefile-app2 -webapp connection list-configuration --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagefile-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection validate --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagefile-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagefile-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagefile-app2/providers/Microsoft.ServiceLinker/linkers/testconn --yes -webapp connection create storage-queue --connection testconn --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagequeue-app2 --target-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Storage/storageAccounts/servicelinkerstorage2/queueServices/default --secret --client-type python -webapp connection list --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagequeue-app2 -webapp connection list-configuration --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagequeue-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection validate --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagequeue-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagequeue-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagequeue-app2/providers/Microsoft.ServiceLinker/linkers/testconn --yes -webapp connection create storage-table --connection testconn --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagetable-app2 --target-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Storage/storageAccounts/servicelinkerstorage2/tableServices/default --secret --client-type python -webapp connection list --source-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagetable-app2 -webapp connection list-configuration --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagetable-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection validate --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagetable-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagetable-app2/providers/Microsoft.ServiceLinker/linkers/testconn -webapp connection delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/servicelinker-test-linux-group/providers/Microsoft.Web/sites/servicelinker-storagetable-app2/providers/Microsoft.ServiceLinker/linkers/testconn --yes -keyvault certificate create --vault-name {kv_name} -n {cert_name} -p @"{policy_path}" -keyvault certificate show --vault-name {kv_name} -n {cert_name} -sf cluster create -g {rg} -c {cluster_name} -l {loc} --secret-identifier {cert_secret_id} --vm-password "{vm_password}" --cluster-size 3 -sf cluster show -g {rg} -c {cluster_name} -sf application-type list -g {rg} -c {cluster_name} -sf application-type create -g {rg} -c {cluster_name} --application-type-name {app_type_name} -sf application-type show -g {rg} -c {cluster_name} --application-type-name {app_type_name} -sf application-type delete -g {rg} -c {cluster_name} --application-type-name {app_type_name} -sf application-type show -g {rg} -c {cluster_name} --application-type-name {app_type_name} -sf application-type version list -g {rg} -c {cluster_name} --application-type-name {app_type_name} -sf application-type version create -g {rg} -c {cluster_name} --application-type-name {app_type_name} --version {v1} --package-url {app_package_v1} -sf application-type version show -g {rg} -c {cluster_name} --application-type-name {app_type_name} --version {v1} -sf application-type version delete -g {rg} -c {cluster_name} --application-type-name {app_type_name} --version {v1} -sf application-type version show -g {rg} -c {cluster_name} --application-type-name {app_type_name} --version {v1} -sf application list -g {rg} -c {cluster_name} -sf application create -g {rg} -c {cluster_name} --application-name {app_name} --application-type-name {app_type_name} --application-type-version {v1} --package-url {app_package_v1} --application-parameters Mode=binary -sf application show -g {rg} -c {cluster_name} --application-name {app_name} -sf service create -g {rg} -c {cluster_name} --application-name {app_name} --state stateless --instance-count -1 --service-name "{app_name}~testService" --service-type {service_type} --partition-scheme singleton -sf service show -g {rg} -c {cluster_name} --application-name {app_name} --service-name "{app_name}~testService" -sf application-type version create -g {rg} -c {cluster_name} --application-type-name {app_type_name} --version {v2} --package-url {app_package_v2} -sf application update -g {rg} -c {cluster_name} --application-name {app_name} --application-type-version {v2} --application-parameters Precision=3 --health-check-stable-duration 0 --health-check-wait-duration 0 --health-check-retry-timeout 0 --upgrade-domain-timeout 5000 --upgrade-timeout 7000 --failure-action Rollback --upgrade-replica-set-check-timeout 300 --force-restart -sf application update -g {rg} -c {cluster_name} --application-name {app_name} --minimum-nodes 1 --maximum-nodes 3 -sf application show -g {rg} -c {cluster_name} --application-name {app_name} -sf application delete -g {rg} -c {cluster_name} --application-name {app_name} -sf application-type delete -g {rg} -c {cluster_name} --application-type-name {app_type_name} -sf application show -g {rg} -c {cluster_name} --application-name {app_name} -keyvault certificate create --vault-name {kv_name} -n {cert_name} -p @"{policy_path}" -sf managed-cluster create -g {rg} -c {cluster_name} -l {loc} --cert-thumbprint {cert_tp} --cert-is-admin --admin-password {vm_password} -sf managed-node-type create -g {rg} -c {cluster_name} -n pnt --instance-count 5 --primary -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-application-type list -g {rg} -c {cluster_name} -sf managed-application-type create -g {rg} -c {cluster_name} --application-type-name {app_type_name} --tags {tags} -sf managed-application-type show -g {rg} -c {cluster_name} --application-type-name {app_type_name} -sf managed-application-type update -g {rg} -c {cluster_name} --application-type-name {app_type_name} --tags {new_tags} -sf managed-application-type show -g {rg} -c {cluster_name} --application-type-name {app_type_name} -sf managed-application-type delete -g {rg} -c {cluster_name} --application-type-name {app_type_name} -sf managed-application-type show -g {rg} -c {cluster_name} --application-type-name {app_type_name} -sf managed-cluster create -g {rg} -c {cluster_name} -l {loc} --cert-thumbprint {cert_tp} --cert-is-admin --admin-password {vm_password} -sf managed-node-type create -g {rg} -c {cluster_name} -n pnt --instance-count 5 --primary -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-application-type version list -g {rg} -c {cluster_name} --application-type-name {app_type_name} -sf managed-application-type version create -g {rg} -c {cluster_name} --application-type-name {app_type_name} --version {v1} --package-url {app_package_v1} --tags {tags} -sf managed-application-type version show -g {rg} -c {cluster_name} --application-type-name {app_type_name} --version {v1} -sf managed-application-type version update -g {rg} -c {cluster_name} --application-type-name {app_type_name} --version {v1} --tags {new_tags} -sf managed-application-type version show -g {rg} -c {cluster_name} --application-type-name {app_type_name} --version {v1} -sf managed-application-type version delete -g {rg} -c {cluster_name} --application-type-name {app_type_name} --version {v1} -sf managed-application-type version show -g {rg} -c {cluster_name} --application-type-name {app_type_name} --version {v1} -sf managed-cluster create -g {rg} -c {cluster_name} -l {loc} --cert-thumbprint {cert_tp} --cert-is-admin --admin-password {vm_password} -sf managed-node-type create -g {rg} -c {cluster_name} -n pnt --instance-count 5 --primary -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-application list -g {rg} -c {cluster_name} -sf managed-application create -g {rg} -c {cluster_name} --application-name {app_name} --application-type-name {app_type_name} --application-type-version {v1} --package-url {app_package_v1} -sf managed-application show -g {rg} -c {cluster_name} --application-name {app_name} -sf managed-service create -g {rg} -c {cluster_name} --application-name {app_name} --state stateless --instance-count -1 --service-name {stateless_service_name} --service-type {stateless_service_type} --partition-scheme singleton -sf managed-service show -g {rg} -c {cluster_name} --application-name {app_name} --service-name {stateless_service_name} -sf managed-application-type version create -g {rg} -c {cluster_name} --application-type-name {app_type_name} --version {v2} --package-url {app_package_v2} -sf managed-application update -g {rg} -c {cluster_name} --application-name {app_name} --application-type-version {v2} --health-check-stable-duration 0 --health-check-wait-duration 0 --health-check-retry-timeout 0 --upgrade-domain-timeout 5000 --upgrade-timeout 7000 --failure-action Rollback --upgrade-replica-set-check-timeout 300 --force-restart -sf managed-application delete -g {rg} -c {cluster_name} --application-name {app_name} -sf managed-application-type delete -g {rg} -c {cluster_name} --application-type-name {app_type_name} -sf managed-application show -g {rg} -c {cluster_name} --application-name {app_name} -sf managed-cluster create -g {rg} -c {cluster_name} -l {loc} --cert-thumbprint {cert_tp} --cert-is-admin --admin-password {vm_password} -sf managed-node-type create -g {rg} -c {cluster_name} -n pnt --instance-count 5 --primary -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-application create -g {rg} -c {cluster_name} --application-name {app_name} --application-type-name {app_type_name} --application-type-version {v1} --package-url {app_package_v1} -sf managed-service list -g {rg} -c {cluster_name} --application-name {app_name} -sf managed-service create -g {rg} -c {cluster_name} --application-name {app_name} --state stateful --min-replica-set-size 2 --target-replica-set-size 3 --service-name {stateful_service_name} --service-type {stateful_service_type} --has-persisted-state --partition-scheme uniformint64range --partition-count 1 --low-key 0 --high-key 25 -sf managed-service show -g {rg} -c {cluster_name} --application-name {app_name} --service-name {stateful_service_name} -sf managed-service create -g {rg} -c {cluster_name} --application-name {app_name} --state stateless --instance-count -1 --service-name {stateless_service_name} --service-type {stateless_service_type} --partition-scheme singleton -sf managed-service show -g {rg} -c {cluster_name} --application-name {app_name} --service-name {stateless_service_name} -sf managed-service update -g {rg} -c {cluster_name} --application-name {app_name} --service-name {stateful_service_name} --service-placement-time-limit {service_placement_time_limit} --stand-by-replica-keep-duration {standby_replica_keep_duration} --replica-restart-wait-duration {replica_restart_wait_duration} --quorum-loss-wait-duration {quorum_loss_wait_duration} -sf managed-service update -g {rg} -c {cluster_name} --application-name {app_name} --service-name {stateless_service_name} --min-instance-count {min_instance_count} --min-instance-percentage {min_instance_percentage} -sf managed-service delete -g {rg} -c {cluster_name} --application-name {app_name} --service-name {stateless_service_name} -sf managed-service delete -g {rg} -c {cluster_name} --application-name {app_name} --service-name {stateful_service_name} -sf managed-application delete -g {rg} -c {cluster_name} --application-name {app_name} -sf managed-application-type delete -g {rg} -c {cluster_name} --application-type-name {app_type_name} -sf managed-service show -g {rg} -c {cluster_name} --application-name {app_name} --service-name {stateful_service_name} -sf managed-service show -g {rg} -c {cluster_name} --application-name {app_name} --service-name {stateless_service_name} -sf managed-cluster create -g {rg} -c {cluster_name} -l {loc} --cert-thumbprint {cert_tp} --cert-is-admin --admin-password {vm_password} -sf managed-node-type create -g {rg} -c {cluster_name} -n pnt --instance-count 5 --primary -sf managed-node-type delete -g {rg} -c {cluster_name} -n pnt -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster delete -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster create -g {rg} -c {cluster_name} -l {loc} --cert-thumbprint {cert_tp} --cert-is-admin --admin-password {vm_password} -sf managed-node-type create -g {rg} -c {cluster_name} -n pnt --instance-count 5 --primary -sf managed-node-type vm-extension add -g {rg} -c {cluster_name} -n pnt --extension-name {extName} --publisher {publisher} --extension-type {extType} --type-handler-version {extVer} --auto-upgrade-minor-version -sf managed-node-type show -g {rg} -c {cluster_name} -n pnt -keyvault show -n {kv_name} -g {rg} -keyvault certificate create --vault-name {kv_name} -n {cert_name} -p @"{policy_path}" -sf managed-cluster create -g {rg} -c {cluster_name} -l {loc} --cert-thumbprint {cert_tp} --cert-is-admin --admin-password {vm_password} --sku Standard --upgrade-mode Automatic --upgrade-cadence Wave1 -sf managed-node-type create -g {rg} -c {cluster_name} -n pnt --instance-count 5 --primary --disk-type Premium_LRS --vm-size Standard_DS2 -sf managed-node-type list -g {rg} -c {cluster_name} -sf managed-node-type create -g {rg} -c {cluster_name} -n snt --instance-count 6 --is-stateless --multiple-placement-groups -sf managed-node-type list -g {rg} -c {cluster_name} -sf managed-node-type node restart -g {rg} -c {cluster_name} -n snt --node-name snt_0 snt_1 -sf managed-node-type node restart -g {rg} -c {cluster_name} -n snt --node-name snt_0 snt_1 -sf managed-node-type node delete -g {rg} -c {cluster_name} -n snt --node-name snt_1 -sf managed-node-type node reimage -g {rg} -c {cluster_name} -n snt --node-name snt_3 -sf managed-node-type delete -g {rg} -c {cluster_name} -n snt -sf managed-node-type show -g {rg} -c {cluster_name} -n snt -sf managed-node-type list -g {rg} -c {cluster_name} -sf managed-cluster delete -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -signalr create -n {signalr_name} -g {rg} --sku {sku} --unit-count {unit_count} -l {location} --tags {tags} --service-mode {service_mode} --enable-message-logs {enable_message_logs_input} --allowed-origins {allowed_origins} --default-action {default_action} -signalr show -n {signalr_name} -g {rg} -signalr list -g {rg} -signalr update -n {signalr_name} -g {rg} --sku {updated_sku} --tags {updated_tags} --service-mode {update_service_mode} --enable-message-logs {update_enable_message_logs_input} -signalr cors remove -n {signalr_name} -g {rg} --allowed-origins {allowed_origins} -signalr cors add -n {signalr_name} -g {rg} --allowed-origins {added_allowed_origins} -signalr cors update -n {signalr_name} -g {rg} --allowed-origins {added_allowed_origins} -signalr key list -n {signalr_name} -g {rg} -signalr key renew -n {signalr_name} -g {rg} --key-type secondary -signalr create -n {signalr_name} -g {rg} --sku {sku} --unit-count {unit_count} -l {location} -signalr identity assign -n {signalr_name} -g {rg} --identity [system] -signalr identity show -n {signalr_name} -g {rg} -signalr identity remove -n {signalr_name} -g {rg} -signalr create -n {signalr_name} -g {rg} --sku {sku} -l {location} -network vnet create -g {rg} -n {vnet} -l {location} --subnet-name {subnet} -network vnet subnet update --name {subnet} --resource-group {rg} --vnet-name {vnet} --disable-private-endpoint-network-policies true -network private-endpoint create --resource-group {rg} --vnet-name {vnet} --subnet {subnet} --name {private_endpoint} --private-connection-resource-id {signalr_id} --group-ids signalr --connection-name {private_endpoint_connection} --location {location} --manual-request -network private-link-resource list -n {signalr_name} -g {rg} --type Microsoft.SignalRService/signalr -signalr show -n {signalr_name} -g {rg} -network private-endpoint-connection show --id {private_endpoint_connection_id} -network private-endpoint-connection list --id {signalr_id} -network private-endpoint-connection approve --id {private_endpoint_connection_id} -network private-endpoint-connection reject --id {private_endpoint_connection_id} -signalr network-rule update --public-network -n {signalr_name} -g {rg} --allow RESTAPI -signalr network-rule list -n {signalr_name} -g {rg} -signalr network-rule update --connection-name {connection_name} -n {signalr_name} -g {rg} --allow RESTAPI -network private-endpoint-connection delete --id {private_endpoint_connection_id} -y -network private-endpoint-connection list --id {signalr_id} -signalr create -n {signalr_name} -g {rg} --sku {sku} --unit-count {unit_count} -l {location} --tags {tags} --service-mode {service_mode} --allowed-origins {allowed_origins} --default-action {default_action} -signalr upstream update -n {signalr_name} -g {rg} --template url-template="{url_template_1}" category-pattern="{category_pattern_1}" hub-pattern={hub_pattern_1} event-pattern={event_pattern_1} --template url-template={url_template_2} category-pattern={category_pattern_2} -signalr upstream list -n {signalr_name} -g {rg} -signalr upstream clear -n {signalr_name} -g {rg} -sql server create -g clitest.rg000001 --name clitestserver000003 --admin-user admin123 --admin-password SecretPassword123 -sql server list -g clitest.rg000001 -sql server update -g clitest.rg000001 --name clitestserver000003 --admin-password SecretPassword456 -i -sql server update --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000003 --admin-password SecretPassword123 -sql server create -g clitest.rg000002 --name clitestserver000004 -l westeurope -i --admin-user admin123 --admin-password SecretPassword123 -sql server list -g clitest.rg000002 -sql server list -sql server show -g clitest.rg000001 --name clitestserver000003 -sql server show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000003 -sql server list-usages -g clitest.rg000001 -n clitestserver000003 -sql server delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000003 --yes -sql server delete -g clitest.rg000002 --name clitestserver000004 --yes -sql server list -g clitest.rg000001 -sql server create -g clitest.rg000001 --name clitestserver000002 --admin-user admin123 --admin-password SecretPassword123 -sql server create -g clitest.rg000001 --name clitestserver000003 --admin-user admin123 --admin-password SecretPassword123 --enable-public-network true -sql server create -g clitest.rg000001 --name clitestserver000004 --admin-user admin123 --admin-password SecretPassword123 -e false -sql server show -g clitest.rg000001 --name clitestserver000004 -sql server create -g clitest.rg000001 --name clitestserver000002 --admin-user admin123 --admin-password SecretPassword123 -sql server update -g clitest.rg000001 -n clitestserver000002 --enable-public-network false -sql server create -g clitest.rg000001 --name clitestserver000003 --admin-user admin123 --admin-password SecretPassword123 -e false -sql server update -g clitest.rg000001 -n clitestserver000003 -i -sql server update -g clitest.rg000001 -n clitestserver000003 -e true -sql server firewall-rule create --name rule1 -g clitest.rg000001 --server clitestserver000002 --start-ip-address 0.0.0.0 --end-ip-address 255.255.255.255 -sql server firewall-rule show --name rule1 -g clitest.rg000001 --server clitestserver000002 -sql server firewall-rule show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/firewallRules/rule1 -sql server firewall-rule update --name rule1 -g clitest.rg000001 --server clitestserver000002 --start-ip-address 123.123.123.123 --end-ip-address 123.123.123.124 -sql server firewall-rule update --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/firewallRules/rule1 --start-ip-address 0.0.0.0 -sql server firewall-rule update --name rule1 -g clitest.rg000001 --server clitestserver000002 --end-ip-address 255.255.255.255 -sql server firewall-rule create --name rule2 -g clitest.rg000001 --server clitestserver000002 --start-ip-address 123.123.123.123 --end-ip-address 123.123.123.124 -sql server firewall-rule list -g clitest.rg000001 --server clitestserver000002 -sql server firewall-rule delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/firewallRules/rule1 -sql server firewall-rule list -g clitest.rg000001 --server clitestserver000002 -sql server firewall-rule delete --name rule2 -g clitest.rg000001 --server clitestserver000002 -sql server firewall-rule list -g clitest.rg000001 --server clitestserver000002 -sql server outbound-firewall-rule create -g clitest.rg000001 --server clitestserver000002 --outbound-rule-fqdn testOBFR1 -sql server outbound-firewall-rule show -g clitest.rg000001 --server clitestserver000002 --outbound-rule-fqdn testOBFR1 -sql server outbound-firewall-rule create -g clitest.rg000001 --server clitestserver000002 --outbound-rule-fqdn testOBFR2 -sql server outbound-firewall-rule list -g clitest.rg000001 --server clitestserver000002 -sql server outbound-firewall-rule delete -g clitest.rg000001 --server clitestserver000002 --outbound-rule-fqdn testOBFR2 -sql server outbound-firewall-rule list -g clitest.rg000001 --server clitestserver000002 -sql db create -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 --yes -sql db show -g clitest.rg000001 -s clitestserver000002 --name cliautomationdb01 -sql db create -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb02 --ledger-on --yes -sql db show -g clitest.rg000001 -s clitestserver000002 --name cliautomationdb02 -sql db create -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 --read-scale Disabled --backup-storage-redundancy local --yes -sql db list -g clitest.rg000001 --server clitestserver000002 -sql db list-usages -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 -sql db show -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 -sql db show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/databases/cliautomationdb01 -sql db update -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 --service-objective P1 --max-size 10GB --read-scale Enabled --set tags.key1=value1 --backup-storage-redundancy zone -sql db update --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/databases/cliautomationdb01 --set tags.key2=value2 -sql db rename -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 --new-name cliautomationdb02 -sql db rename --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/databases/cliautomationdb02 --new-name cliautomationdb03 -sql db delete -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb03 --yes -sql db delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/databases/cliautomationdb03 --yes -sql db create -g clitest-sql000001 --server clitest-sql000002 --name cliautomationdb01 --edition Hyperscale --family Gen5 --capacity 2 --ha-replicas 4 -sql db update -g clitest-sql000001 --server clitest-sql000002 --name cliautomationdb01 --read-replicas 3 -sql db update -g clitest-sql000001 --server clitest-sql000002 --name cliautomationdb01 --read-replicas 0 -sql db update -g clitest-sql000001 --server clitest-sql000002 --name cliautomationdb01 --ha-replicas 2 -sql db create -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 --edition GeneralPurpose -sql db update -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 --edition Standard --capacity 10 --max-size 250GB -sql db update -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 -e GeneralPurpose -c 4 -f Gen5 -sql db update -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 --capacity 8 -sql db update -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 --tier BusinessCritical -sql db create -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb02 -e BusinessCritical -c 8 -f Gen5 -sql db create -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 --edition GeneralPurpose -sql db update -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 --compute-model Serverless -sql db update -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 --auto-pause-delay 120 --min-capacity 1.0 -sql db update -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 -c 8 -sql db update -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 --compute-model Provisioned -sql db create -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb02 -e GeneralPurpose -c 4 -f Gen5 --compute-model Serverless --auto-pause-delay 120 --min-capacity 1.0 -sql db create -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 --yes -sql db update -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 --service-objective GP_Gen5_8 --no-wait -sql db op list -g clitest.rg000001 -s clitestserver000002 -d cliautomationdb01 -sql db op cancel -g clitest.rg000001 -s clitestserver000002 -d cliautomationdb01 -n 91e5cc5d-39b5-4f47-b771-ac39dac9bcef -sql db str-policy set -g {resource_group} -s {server_name} -n {database_name} --retention-days {retention_days_v1} --diffbackup-hours {diffbackup_hours_v1} -sql db str-policy show -g {resource_group} -s {server_name} -n {database_name} -sql db str-policy set -g {resource_group} -s {server_name} -n {database_name} --retention-days {retention_days_v2} --diffbackup-hours {diffbackup_hours_v2} -sql db ltr-policy set -g {rg} -s {server_name} -n {database_name} --weekly-retention {weekly_retention} --monthly-retention {monthly_retention} --yearly-retention {yearly_retention} --week-of-year {week_of_year} -sql db ltr-policy show -g {rg} -s {server_name} -n {database_name} -sql db ltr-backup list -l {loc} -g {rg} -sql db ltr-backup list -l {loc} -sql db ltr-backup list -l {loc} -s {server_name} -g {rg} -sql db ltr-backup list -l {loc} -s {server_name} -sql db ltr-backup list -l {loc} -s {server_name} -d {database_name} -g {rg} -sql db ltr-backup list -l {loc} -s {server_name} -d {database_name} -sql db ltr-backup list -l {loc} -s {server_name} -d {database_name} --latest True -sql db ltr-backup show -l {loc} -s {server_name} -d {database_name} -n {backup_name} -sql db ltr-backup restore --backup-id '{backup_id}' --dest-database {dest_database_name} --dest-server {server_name} --dest-resource-group {rg} -sql db ltr-backup delete -l {loc} -s {server_name} -d {database_name} -n '{backup_name}' --yes -sql mi update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestmi000001 --edition BusinessCritical --capacity 4 --no-wait -sql mi op list -g Committer-SwaggerAndGeneratedSDKs-MI-CLI --mi clitestmi000001 -sql mi op cancel -g Committer-SwaggerAndGeneratedSDKs-MI-CLI --mi clitestmi000001 -n 606457fa-8a61-469f-99ac-726e484612c7 -sql server conn-policy show -g clitest.rg000001 -s clitestserver000002 -sql server conn-policy update -g clitest.rg000001 -s clitestserver000002 -t Proxy -sql server conn-policy update -g clitest.rg000001 -s clitestserver000002 -t Default -sql server conn-policy update -g clitest.rg000001 -s clitestserver000002 -t Redirect -sql server ad-admin create -s {sn} -g {rg} -i {oid} -u {user} -sql server ad-admin list -s {sn} -g {rg} -sql server ad-admin update -s {sn} -g {rg} -u {user2} -i {oid2} -sql server ad-admin delete -s {sn} -g {rg} -sql server ad-admin list -s {sn} -g {rg} -sql server ad-admin create -s clitestserver000002 -g clitest.rg000001 -u DSEngAll -i 5e90ef3b-9b42-4777-819b-25c36961ea4d -sql server ad-only-auth enable -n clitestserver000002 -g clitest.rg000001 -sql server ad-only-auth disable -n clitestserver000002 -g clitest.rg000001 -sql server ad-only-auth get -n clitestserver000002 -g clitest.rg000001 -sql db create -g clitest.rg000001 --server clitestserver000003 --name cliautomationdb01 --yes -sql db copy -g clitest.rg000001 --server clitestserver000003 --name cliautomationdb01 --dest-name cliautomationdb02 -sql db copy -g clitest.rg000001 --server clitestserver000003 --name cliautomationdb01 --dest-name cliautomationdb02 --service-objective GP_Gen5_8 -sql db copy -g clitest.rg000001 --server clitestserver000003 --name cliautomationdb01 --dest-name bsr_database --backup-storage-redundancy local -sql elastic-pool create -g clitest.rg000002 --server clitestserver000004 --name pool1 --edition GeneralPurpose -sql db copy -g clitest.rg000001 --server clitestserver000003 --name cliautomationdb01 --dest-name cliautomationdb02 --dest-resource-group clitest.rg000002 --dest-server clitestserver000004 --elastic-pool pool1 -sql elastic-pool create -g clitest.rg000001 -s clitestserver000002 -n cliautomationpool1 -sql db create -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 -y -sql db show -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 -sql db show -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 -sql db show -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 -sql db restore -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 -t 2021-12-04T11:06:53.131602 --dest-name cliautomationdb01restore1 --service-objective S1 --edition Standard -sql db restore -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 -t 2021-12-04T11:06:58.628365 --dest-name cliautomationdb01restore2 --elastic-pool cliautomationpool1 -sql db show -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01restore2 -sql db restore -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 -t 2021-12-04T11:07:02.852251 --dest-name bsr_database --backup-storage-redundancy geo -sql db create -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 -y -sql db show -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 -sql db show -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 -sql db show -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 -sql db delete -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 --yes -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db list-deleted -g clitest.rg000001 -s clitestserver000002 -sql db restore -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 --deleted-time 2021-06-29T06:20:39.167000 --dest-name cliautomationdb01restore1 --service-objective S1 --edition Standard -sql db restore -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 -t 2021-06-29T06:19:51 --deleted-time 2021-06-29T06:20:39.167000 --dest-name cliautomationdb01restore2 -storage account show -g clitest.rg000001 -n clitest000004 --query primaryEndpoints.blob -storage account keys list -g clitest.rg000001 -n clitest000004 --query [0].value -sql db create -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 -sql db audit-policy show -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 -sql db audit-policy update -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --state Enabled --blob-storage-target-state Enabled --storage-key veryFakedStorageAccountKey== --storage-endpoint=https://clitest000004.blob.core.windows.net/ --retention-days=30 --actions DATABASE_LOGOUT_GROUP DATABASE_ROLE_MEMBER_CHANGE_GROUP -sql db audit-policy show -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 -storage account show -g clitest.rg000002 -n clitest000005 --query primaryEndpoints.blob -sql db audit-policy update -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --blob-storage-target-state Enabled --storage-account clitest000005 -sql db audit-policy update -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --state Disabled -sql db threat-policy show -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 -sql db threat-policy update -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --state Enabled --storage-key veryFakedStorageAccountKey== --storage-endpoint https://clitest000004.blob.core.windows.net/ --retention-days 30 --email-addresses test1@example.com test2@example.com --disabled-alerts Sql_Injection_Vulnerability Access_Anomaly --email-account-admins True -storage account keys list -g clitest.rg000002 -n clitest000005 --query [0].value -sql db threat-policy update -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --storage-account clitest000005 -monitor log-analytics workspace create -g clitest.rg000001 -n laws000006 -sql db audit-policy update -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --state Enabled --log-analytics-target-state Enabled --log-analytics-workspace-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/microsoft.operationalinsights/workspaces/laws000006 -sql db audit-policy show -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 -sql db audit-policy update -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --state Enabled --log-analytics-target-state Disabled -sql db audit-policy show -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 -eventhubs namespace create -g clitest.rg000001 -n cliehnamespacedb01 -eventhubs eventhub create -g clitest.rg000001 -n cliehdb01 --namespace-name cliehnamespacedb01 -eventhubs namespace authorization-rule create -g clitest.rg000001 -n cliehauthruledb01 --namespace-name cliehnamespacedb01 --rights Listen Manage Send -sql db audit-policy update -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --state Enabled --event-hub-target-state Enabled --event-hub-authorization-rule-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.EventHub/namespaces/cliehnamespacedb01/authorizationRules/cliehauthruledb01 --event-hub cliehdb01 -sql db audit-policy show -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 -sql db audit-policy update -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --state Enabled --event-hub-target-state Disabled -sql db audit-policy show -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 -storage account show -g clitest.rg000001 -n clitest000004 --query primaryEndpoints.blob -storage account keys list -g clitest.rg000001 -n clitest000004 --query [0].value -sql server audit-policy show -g clitest.rg000001 -n clitestserver000003 -sql server audit-policy update -g clitest.rg000001 -n clitestserver000003 --state Enabled --blob-storage-target-state Enabled --storage-key veryFakedStorageAccountKey== --storage-endpoint=https://clitest000004.blob.core.windows.net/ --retention-days=30 --actions DATABASE_LOGOUT_GROUP DATABASE_ROLE_MEMBER_CHANGE_GROUP -sql server audit-policy show -g clitest.rg000001 -n clitestserver000003 -storage account show -g clitest.rg000002 -n clitest000005 --query primaryEndpoints.blob -sql server audit-policy update -g clitest.rg000001 -n clitestserver000003 --blob-storage-target-state Enabled --storage-account clitest000005 -sql server audit-policy update -g clitest.rg000001 -n clitestserver000003 --state Disabled -monitor log-analytics workspace create -g clitest.rg000001 -n laws000006 -sql server audit-policy update -g clitest.rg000001 -n clitestserver000003 --state Enabled --log-analytics-target-state Enabled --log-analytics-workspace-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/microsoft.operationalinsights/workspaces/laws000006 -sql server audit-policy show -g clitest.rg000001 -n clitestserver000003 -sql server audit-policy update -g clitest.rg000001 -n clitestserver000003 --state Enabled --log-analytics-target-state Disabled -sql server audit-policy show -g clitest.rg000001 -n clitestserver000003 -eventhubs namespace create -g clitest.rg000001 -n cliehnamespacedb01 -eventhubs eventhub create -g clitest.rg000001 -n cliehsrv01 --namespace-name cliehnamespacedb01 -eventhubs namespace authorization-rule create -g clitest.rg000001 -n cliehauthruledb01 --namespace-name cliehnamespacedb01 --rights Listen Manage Send -sql server audit-policy update -g clitest.rg000001 -n clitestserver000003 --state Enabled --event-hub-target-state Enabled --event-hub-authorization-rule-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.EventHub/namespaces/cliehnamespacedb01/authorizationRules/cliehauthruledb01 --event-hub cliehsrv01 -sql server audit-policy show -g clitest.rg000001 -n clitestserver000003 -sql server audit-policy update -g clitest.rg000001 -n clitestserver000003 --state Enabled --event-hub-target-state Disabled -sql server audit-policy show -g clitest.rg000001 -n clitestserver000003 -storage account show -g clitest.rg000001 -n clitest000004 --query primaryEndpoints.blob -storage account keys list -g clitest.rg000001 -n clitest000004 --query [0].value -sql server ms-support audit-policy show -g clitest.rg000001 -n clitestserver000003 -sql server ms-support audit-policy update -g clitest.rg000001 -n clitestserver000003 --state Enabled --blob-storage-target-state Enabled --storage-key veryFakedStorageAccountKey== --storage-endpoint=https://clitest000004.blob.core.windows.net/ -sql server ms-support audit-policy show -g clitest.rg000001 -n clitestserver000003 -storage account show -g clitest.rg000002 -n clitest000005 --query primaryEndpoints.blob -sql server ms-support audit-policy update -g clitest.rg000001 -n clitestserver000003 --blob-storage-target-state Enabled --storage-account clitest000005 -sql server ms-support audit-policy update -g clitest.rg000001 -n clitestserver000003 --state Disabled -monitor log-analytics workspace create -g clitest.rg000001 -n clilaworkspacems04 -sql server ms-support audit-policy update -g clitest.rg000001 -n clitestserver000003 --state Enabled --log-analytics-target-state Enabled --log-analytics-workspace-resource-id /subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/microsoft.operationalinsights/workspaces/clilaworkspacems04 -sql server ms-support audit-policy show -g clitest.rg000001 -n clitestserver000003 -sql server ms-support audit-policy update -g clitest.rg000001 -n clitestserver000003 --state Enabled --log-analytics-target-state Disabled -sql server ms-support audit-policy show -g clitest.rg000001 -n clitestserver000003 -eventhubs namespace create -g clitest.rg000001 -n cliehnamespacems02 -eventhubs eventhub create -g clitest.rg000001 -n cliehms02 --namespace-name cliehnamespacems02 -eventhubs namespace authorization-rule create -g clitest.rg000001 -n cliehauthrulems02 --namespace-name cliehnamespacems02 --rights Listen Manage Send -sql server ms-support audit-policy update -g clitest.rg000001 -n clitestserver000003 --state Enabled --event-hub-target-state Enabled --event-hub-authorization-rule-id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.EventHub/namespaces/cliehnamespacems02/authorizationRules/cliehauthrulems02 --event-hub cliehms02 -sql server ms-support audit-policy show -g clitest.rg000001 -n clitestserver000003 -sql server ms-support audit-policy update -g clitest.rg000001 -n clitestserver000003 --state Enabled --event-hub-target-state Disabled -sql server ms-support audit-policy show -g clitest.rg000001 -n clitestserver000003 -sql dw create -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 -sql db list -g clitest.rg000001 --server clitestserver000002 -sql dw list -g clitest.rg000001 --server clitestserver000002 -sql db show -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 -sql dw pause -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 -sql dw show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/databases/cliautomationdb01 -sql dw resume -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 -sql dw show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/databases/cliautomationdb01 -sql dw update -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb01 --max-size 20TB --set tags.key1=value1 -sql dw update --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/databases/cliautomationdb01 --service-objective DW200c -sql dw delete -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 --yes -sql dw delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/databases/cliautomationdb01 --yes -sql server show -g clitest.rg000001 -n clitestserver000003 -sql server show -g clitest.rg000001 -n clitestserver000004 -sql server show -g clitest.rg000002 -n clitestserver000005 -sql server dns-alias create -n alias1 -s clitestserver000003 -g clitest.rg000001 -sql server dns-alias list -s clitestserver000003 -g clitest.rg000001 -sql server dns-alias set -n alias1 --original-server clitestserver000003 -s clitestserver000004 -g clitest.rg000001 -sql server dns-alias list -s clitestserver000003 -g clitest.rg000001 -sql server dns-alias list -s clitestserver000004 -g clitest.rg000001 -sql server dns-alias set -n alias1 --original-server clitestserver000003 -s clitestserver000004 -g clitest.rg000001 -sql server dns-alias list -s clitestserver000004 -g clitest.rg000001 -sql server dns-alias set -n alias1 --original-server clitestserver000004 --original-resource-group clitest.rg000001 -s clitestserver000005 -g clitest.rg000002 -sql server dns-alias list -s clitestserver000004 -g clitest.rg000001 -sql server dns-alias list -s clitestserver000005 -g clitest.rg000002 -sql server dns-alias delete -n alias1 -s clitestserver000005 -g clitest.rg000002 -sql server dns-alias list -s clitestserver000005 -g clitest.rg000002 -sql server show -g clitest.rg000001 -n clitestserver000003 -sql server show -g clitest.rg000001 -n clitestserver000004 -sql server show -g clitest.rg000002 -n clitestserver000005 -sql db create -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --yes -sql db create -g clitest.rg000001 -s clitestserver000003 -n cliautomationhs03 --service-objective HS_Gen5_8 --yes -sql db replica create -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --partner-server clitestserver000004 -sql db replica create -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --partner-server clitestserver000004 --backup-storage-redundancy zone -sql db show -g clitest.rg000001 -s clitestserver000004 -n cliautomationdb01 -sql db delete -g clitest.rg000001 -s clitestserver000004 -n cliautomationdb01 --yes -sql db replica create -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --partner-server clitestserver000004 --service-objective GP_Gen5_8 --partner-database cliautomationdb02 --secondary-type Geo -sql db replica create -g clitest.rg000001 -s clitestserver000003 -n cliautomationhs03 --partner-server clitestserver000003 --service-objective HS_Gen5_8 --partner-resource-group clitest.rg000001 --partner-database cliautomationnr04 --secondary-type Named --ha-replicas 2 -sql elastic-pool create -g clitest.rg000002 --server clitestserver000005 --name pool1 --edition GeneralPurpose -sql db replica create -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --partner-server clitestserver000005 --partner-resource-group clitest.rg000002 --elastic-pool pool1 -sql db show -g clitest.rg000002 -s clitestserver000005 -n cliautomationdb01 -sql db replica list-links -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 -sql db replica list-links -g clitest.rg000002 -s clitestserver000005 -n cliautomationdb01 -sql db replica set-primary -g clitest.rg000002 -s clitestserver000005 -n cliautomationdb01 -sql db replica list-links -g clitest.rg000002 -s clitestserver000005 -n cliautomationdb01 -sql db replica delete-link -g clitest.rg000002 -s clitestserver000005 -n cliautomationdb01 --partner-resource-group clitest.rg000001 --partner-server clitestserver000004 --yes -sql db replica list-links -g clitest.rg000002 -s clitestserver000005 -n cliautomationdb01 -sql db replica delete-link -g clitest.rg000002 -s clitestserver000005 -n cliautomationdb01 --partner-resource-group clitest.rg000001 --partner-server clitestserver000004 --yes -sql db replica list-links -g clitest.rg000002 -s clitestserver000005 -n cliautomationdb01 -sql db replica set-primary -g clitest.rg000002 -s clitestserver000005 -n cliautomationdb01 --allow-data-loss -sql db replica list-links -g clitest.rg000002 -s clitestserver000005 -n cliautomationdb01 -sql db replica set-primary -g clitest.rg000001 -s clitestserver000003 -n cliautomationdb01 --allow-data-loss -sql elastic-pool create -g clitest.rg000001 --server clitestserver000002 --name cliautomationpool01 --dtu 1200 --edition Standard --db-dtu-min 10 --db-dtu-max 50 --storage 1200GB -sql elastic-pool show -g clitest.rg000001 --server clitestserver000002 --name cliautomationpool01 -sql elastic-pool show --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/elasticPools/cliautomationpool01 -sql elastic-pool list -g clitest.rg000001 --server clitestserver000002 -sql elastic-pool update -g clitest.rg000001 --server clitestserver000002 --name cliautomationpool01 --dtu 50 --storage 50GB --set tags.key1=value1 -sql elastic-pool update --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/elasticPools/cliautomationpool01 --dtu 1200 --db-dtu-min 10 --db-dtu-max 50 --storage 1200GB -sql elastic-pool update -g clitest.rg000001 --server clitestserver000002 --name cliautomationpool01 --remove tags.key1 -sql elastic-pool create -g clitest.rg000001 --server clitestserver000002 --name cliautomationpool02 -sql elastic-pool list -g clitest.rg000001 -s clitestserver000002 -sql db create -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb02 --elastic-pool cliautomationpool01 -sql db show -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb02 -sql db update -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb02 --elastic-pool cliautomationpool02 --service-objective ElasticPool -sql db show -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb02 -sql db update -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb02 --service-objective S1 -sql db update -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb02 --elastic-pool /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/elasticPools/cliautomationpool01 --service-objective ElasticPool -sql db show -g clitest.rg000001 -s clitestserver000002 -n cliautomationdb02 -sql elastic-pool list-dbs -g clitest.rg000001 -s clitestserver000002 -n cliautomationpool01 -sql db list -g clitest.rg000001 -s clitestserver000002 --elastic-pool cliautomationpool01 -sql db delete -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb02 --yes -sql elastic-pool delete -g clitest.rg000001 --server clitestserver000002 --name cliautomationpool01 -sql elastic-pool delete --id /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Sql/servers/clitestserver000002/elasticPools/cliautomationpool01 -sql elastic-pool create -g clitest.rg000001 --server clitestserver000002 --name cliautomationpool1 --edition GeneralPurpose -sql elastic-pool update -g clitest.rg000001 --server clitestserver000002 --name cliautomationpool1 --edition Standard --capacity 100 --max-size 250GB --db-max-dtu 10 -sql elastic-pool update -g clitest.rg000001 --server clitestserver000002 --name cliautomationpool1 -e GeneralPurpose -c 4 -f Gen5 --db-max-capacity 2 -sql elastic-pool update -g clitest.rg000001 -s clitestserver000002 -n cliautomationpool1 --capacity 8 -sql elastic-pool update -g clitest.rg000001 -s clitestserver000002 -n cliautomationpool1 --tier BusinessCritical -sql elastic-pool update -g clitest.rg000001 -s clitestserver000002 -n cliautomationpool1 --db-max-capacity 1 --db-min-capacity 0.5 -sql elastic-pool create -g clitest.rg000001 --server clitestserver000002 --name cliautomationpool2 -e BusinessCritical -c 8 -f Gen5 -sql elastic-pool create -g clitest.rg000001 --server clitestserver000002 --name operationtestep1 --dtu 125 --edition Premium --db-dtu-min 0 --db-dtu-max 50 --storage 50GB -sql elastic-pool update -g clitest.rg000001 --server clitestserver000002 --name operationtestep1 --dtu 250 --db-dtu-min 50 --db-dtu-max 250 -sql elastic-pool op list -g clitest.rg000001 --server clitestserver000002 --elastic-pool operationtestep1 -sql elastic-pool op cancel -g clitest.rg000001 --server clitestserver000002 --elastic-pool operationtestep1 --name 31ef718c-2403-44fe-a438-b06ced00e4b6 -sql db list-editions -l westeurope -sql db list-editions -l westeurope --available -sql db list-editions -l westeurope --show-details max-size -sql db list-editions -l westeurope --edition standard -sql db list-editions -l westeurope --dtu 100 -sql db list-editions -l westeurope --vcore 2 -sql db list-editions -l westeurope --edition standard --service-objective s0 -sql elastic-pool list-editions -l westeurope -sql elastic-pool list-editions -l westeurope --edition standard -sql elastic-pool list-editions -l westeurope --dtu 100 -sql elastic-pool list-editions -l westeurope --vcore 2 -sql elastic-pool list-editions -l westeurope --show-details max-size -sql elastic-pool list-editions -l westeurope --show-details db-max-size -sql elastic-pool list-editions -l westeurope --edition standard --show-details db-max-dtu -sql elastic-pool list-editions -l westeurope --edition standard --show-details db-min-dtu -sql elastic-pool list-editions -l westeurope --edition standard --show-details db-min-dtu db-max-dtu db-max-size max-size -sql server firewall-rule create --name allowAllIps -g clitest.rg000001 --server clitestserver000002 --start-ip-address 0.0.0.0 --end-ip-address 0.0.0.0 -sql db create -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb01 -sql db create -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb02 -sql db create -g clitest.rg000001 --server clitestserver000002 --name cliautomationdb03 -storage account show -g clitest.rg000001 -n clitest000003 --query primaryEndpoints.blob -storage account keys list -g clitest.rg000001 -n clitest000003 --query [0].value -storage blob generate-sas --account-name clitest000003 -c bacpacs -n testbacpac2.bacpac --permissions rw --expiry 9999-12-25T00:00:00Z -storage container create -n bacpacs --account-name clitest000003 --account-key veryFakedStorageAccountKey== -sql db export -s clitestserver000002 -n cliautomationdb01 -g clitest.rg000001 -p SecretPassword123 -u admin123 --storage-key veryFakedStorageAccountKey== --storage-key-type StorageAccessKey --storage-uri https://clitest000003.blob.core.windows.net/bacpacs/testbacpac.bacpac -sql db export -s clitestserver000002 -n cliautomationdb01 -g clitest.rg000001 -p SecretPassword123 -u admin123 --storage-key se=9999-12-25T00%3A00%3A00Z&sp=rw&sv=2018-11-09&sr=b&sig=X6bPzFyFbxDHYFnCL9l%2BpiV1aT3tXd02PXlwE5sdBiA%3D --storage-key-type SharedAccessKey --storage-uri https://clitest000003.blob.core.windows.net/bacpacs/testbacpac2.bacpac -sql db import -s clitestserver000002 -n cliautomationdb02 -g clitest.rg000001 -p SecretPassword123 -u admin123 --storage-key veryFakedStorageAccountKey== --storage-key-type StorageAccessKey --storage-uri https://clitest000003.blob.core.windows.net/bacpacs/testbacpac.bacpac -sql db import -s clitestserver000002 -n cliautomationdb03 -g clitest.rg000001 -p SecretPassword123 -u admin123 --storage-key se=9999-12-25T00%3A00%3A00Z&sp=rw&sv=2018-11-09&sr=b&sig=X6bPzFyFbxDHYFnCL9l%2BpiV1aT3tXd02PXlwE5sdBiA%3D --storage-key-type SharedAccessKey --storage-uri https://clitest000003.blob.core.windows.net/bacpacs/testbacpac2.bacpac -sql db show-connection-string -s myserver -n mydb -c ado.net -sql db show-connection-string -s myserver -n mydb -c ado.net -a ADPassword -sql db show-connection-string -s myserver -n mydb -c ado.net -a ADIntegrated -sql db show-connection-string -s myserver -n mydb -c sqlcmd -sql db show-connection-string -s myserver -n mydb -c sqlcmd -a ADPassword -sql db show-connection-string -s myserver -n mydb -c sqlcmd -a ADIntegrated -sql db show-connection-string -s myserver -n mydb -c jdbc -sql db show-connection-string -s myserver -n mydb -c jdbc -a ADPassword -sql db show-connection-string -s myserver -n mydb -c jdbc -a ADIntegrated -sql db show-connection-string -s myserver -n mydb -c php_pdo -sql db show-connection-string -s myserver -n mydb -c php_pdo -a ADPassword -sql db show-connection-string -s myserver -n mydb -c php_pdo -a ADIntegrated -sql db show-connection-string -s myserver -n mydb -c php -sql db show-connection-string -s myserver -n mydb -c php -a ADPassword -sql db show-connection-string -s myserver -n mydb -c php -a ADIntegrated -sql db show-connection-string -s myserver -n mydb -c odbc -sql db show-connection-string -s myserver -n mydb -c odbc -a ADPassword -sql db show-connection-string -s myserver -n mydb -c odbc -a ADIntegrated -sql db create -g clitest.rg000001 --server clitestserver000002 --name sqltdedb000003 -sql db tde show -g clitest.rg000001 -s clitestserver000002 -d sqltdedb000003 -sql db tde list-activity -g clitest.rg000001 -s clitestserver000002 -d sqltdedb000003 -sql db tde set -g clitest.rg000001 -s clitestserver000002 -d sqltdedb000003 --status Disabled -sql db tde list-activity -g clitest.rg000001 -s clitestserver000002 -d sqltdedb000003 -sql db tde show -g clitest.rg000001 -s clitestserver000002 -d sqltdedb000003 -sql db tde set -g clitest.rg000001 -s clitestserver000002 -d sqltdedb000003 --status Enabled -sql db tde list-activity -g clitest.rg000001 -s clitestserver000002 -d sqltdedb000003 -sql db tde show -g clitest.rg000001 -s clitestserver000002 -d sqltdedb000003 -sql server update -g clitest.rg000001 -n clitestserver000002 -i -sql db create -g clitest.rg000001 --server clitestserver000002 --name sqltdebyok000004 -keyvault set-policy -g clitest.rg000001 -n sqltdebyok000003 --object-id 92e958c4-b79d-4e1f-87cd-03176eed491b --key-permissions wrapKey unwrapKey get list -keyvault key create -n sqltdebyok000005 -p software --vault-name sqltdebyok000003 -sql server key create -g clitest.rg000001 -s clitestserver000002 -k https://sqltdebyok000003.vault.azure.net/keys/sqltdebyok000005/81bab0c401934064bc3b6f83f98bf77a -sql server key show -g clitest.rg000001 -s clitestserver000002 -k https://sqltdebyok000003.vault.azure.net/keys/sqltdebyok000005/81bab0c401934064bc3b6f83f98bf77a -sql server key list -g clitest.rg000001 -s clitestserver000002 -sql server tde-key show -g clitest.rg000001 -s clitestserver000002 -sql server tde-key set -g clitest.rg000001 -s clitestserver000002 -t AzureKeyVault -k https://sqltdebyok000003.vault.azure.net/keys/sqltdebyok000005/81bab0c401934064bc3b6f83f98bf77a --auto-rotation-enabled -sql server tde-key show -g clitest.rg000001 -s clitestserver000002 -sql server tde-key set -g clitest.rg000001 -s clitestserver000002 -t ServiceManaged -sql server tde-key show -g clitest.rg000001 -s clitestserver000002 -sql server key delete -g clitest.rg000001 -s clitestserver000002 -k https://sqltdebyok000003.vault.azure.net/keys/sqltdebyok000005/81bab0c401934064bc3b6f83f98bf77a -sql server key list -g clitest.rg000001 -s clitestserver000002 -sql server create -g alswansotest3-rg -n umitest000001 -l eastus2euap -i --admin-user admin123 --admin-password SecretPassword123 --user-assigned-identity-id /subscriptions/e64f3e8e-ab91-4a65-8cdd-5cd2f47d00b4/resourceGroups/viparek/providers/Microsoft.ManagedIdentity/userAssignedIdentities/testumi --identity-type SystemAssigned,UserAssigned --pid /subscriptions/e64f3e8e-ab91-4a65-8cdd-5cd2f47d00b4/resourceGroups/viparek/providers/Microsoft.ManagedIdentity/userAssignedIdentities/testumi -sql server show -g alswansotest3-rg --name umitest000001 -sql server delete -g alswansotest3-rg -n umitest000001 --yes -sql server show -g alswansotest3-rg -n umitest000001 -network vnet create -g clitest.rg000001 -n vnet1 -network vnet subnet create -g clitest.rg000001 --vnet-name vnet1 -n subnet1 --address-prefix 10.0.1.0/24 -network vnet subnet show -n subnet1 --vnet-name vnet1 -g clitest.rg000001 -network vnet create -g clitest.rg000001 -n vnet2 -network vnet subnet create -g clitest.rg000001 --vnet-name vnet2 -n subnet1 --address-prefix 10.0.1.0/24 --service-endpoints Microsoft.Sql -network vnet subnet show -n subnet1 --vnet-name vnet2 -g clitest.rg000001 -sql server vnet-rule create --name rule1 -g clitest.rg000001 --server clitestserver000002 --subnet subnet1 --vnet-name vnet1 -i -sql server vnet-rule show --name rule1 -g clitest.rg000001 --server clitestserver000002 -sql server vnet-rule create --name rule2 -g clitest.rg000001 --server clitestserver000002 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/vnet2/subnets/subnet1 -sql server vnet-rule update --name rule1 -g clitest.rg000001 --server clitestserver000002 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/vnet2/subnets/subnet1 -sql server vnet-rule update --name rule2 -g clitest.rg000001 --server clitestserver000002 --subnet /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/virtualNetworks/vnet1/subnets/subnet1 -i -sql server vnet-rule list -g clitest.rg000001 --server clitestserver000002 -sql server vnet-rule delete --name rule1 -g clitest.rg000001 --server clitestserver000002 -sql server vnet-rule delete --name rule2 -g clitest.rg000001 --server clitestserver000002 -sql list-usages -l westus -sql show-usage -l westus -u ServerQuota -sql db create -g clitest.rg000001 --server clitestserver000002 --name createUnzonedUpdateToZonedDb --edition Premium --zone-redundant False -sql db update -g clitest.rg000001 -s clitestserver000002 -n createUnzonedUpdateToZonedDb --service-objective P1 --zone-redundant -sql db create -g clitest.rg000001 --server clitestserver000002 --name createZonedUpdateToUnzonedDb --edition Premium --z -sql db update -g clitest.rg000001 -s clitestserver000002 -n createZonedUpdateToUnzonedDb --service-objective P1 --z False -sql db create -g clitest.rg000001 --server clitestserver000002 --name updateNoParamForUnzonedDb --edition Premium -sql db update -g clitest.rg000001 -s clitestserver000002 -n updateNoParamForUnzonedDb --service-objective P2 -sql db create -g clitest.rg000001 --server clitestserver000002 --name updateNoParamForZonedDb --edition Premium --zone-redundant -sql db update -g clitest.rg000001 -s clitestserver000002 -n updateNoParamForZonedDb --service-objective P2 -sql elastic-pool create -g clitest.rg000001 --server clitestserver000002 --name createUnzonedUpdateToZonedPool --edition Premium --z False -sql elastic-pool show -g clitest.rg000001 --server clitestserver000002 --name createUnzonedUpdateToZonedPool -sql elastic-pool update -g clitest.rg000001 -s clitestserver000002 -n createUnzonedUpdateToZonedPool --z -sql elastic-pool show -g clitest.rg000001 --server clitestserver000002 --name createUnzonedUpdateToZonedPool -sql elastic-pool create -g clitest.rg000001 --server clitestserver000002 --name createZonedUpdateToUnzonedPool --edition Premium --zone-redundant -sql elastic-pool show -g clitest.rg000001 --server clitestserver000002 --name createZonedUpdateToUnzonedPool -sql elastic-pool update -g clitest.rg000001 -s clitestserver000002 -n createZonedUpdateToUnzonedPool --zone-redundant False -sql elastic-pool show -g clitest.rg000001 --server clitestserver000002 --name createZonedUpdateToUnzonedPool -sql elastic-pool create -g clitest.rg000001 --server clitestserver000002 --name updateNoParamForUnzonedPool --edition Premium -sql elastic-pool show -g clitest.rg000001 --server clitestserver000002 --name updateNoParamForUnzonedPool -sql elastic-pool update -g clitest.rg000001 -s clitestserver000002 -n updateNoParamForUnzonedPool --dtu 250 -sql elastic-pool show -g clitest.rg000001 --server clitestserver000002 --name updateNoParamForUnzonedPool -sql elastic-pool create -g clitest.rg000001 --server clitestserver000002 --name updateNoParamForZonedPool --edition Premium --zone-redundant -sql elastic-pool show -g clitest.rg000001 --server clitestserver000002 --name updateNoParamForZonedPool -sql elastic-pool update -g clitest.rg000001 -s clitestserver000002 -n updateNoParamForZonedPool --dtu 250 -sql elastic-pool show -g clitest.rg000001 --server clitestserver000002 --name updateNoParamForZonedPool -sql db create -g clitest.rg000001 --server clitestserver000002 --name createDb1maintenance --edition Premium --maint-config-id SQL_EastUS2_DB_1 -sql db create -g clitest.rg000001 --server clitestserver000002 --name createDb2maintenance --edition Standard --capacity 50 --maint-config-id /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Maintenance/publicMaintenanceConfigurations/SQL_EastUS2_DB_2 -sql db create -g clitest.rg000001 --server clitestserver000002 --name updateEnrollAndSwitchDb1maintenance --edition Standard -sql db update -g clitest.rg000001 --server clitestserver000002 --name updateEnrollAndSwitchDb1maintenance --edition Premium --capacity 125 -m SQL_EastUS2_DB_2 -sql db update -g clitest.rg000001 --server clitestserver000002 --name updateEnrollAndSwitchDb1maintenance -m /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Maintenance/publicMaintenanceConfigurations/SQL_EastUS2_DB_1 --zone-redundant -sql elastic-pool create -g clitest.rg000001 --server clitestserver000002 --name createDb1maintenance --edition Premium --maint-config-id SQL_EastUS2_DB_1 -sql elastic-pool create -g clitest.rg000001 --server clitestserver000002 --name createDb2maintenance --edition Standard --capacity 100 --maint-config-id /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Maintenance/publicMaintenanceConfigurations/SQL_EastUS2_DB_2 -sql elastic-pool create -g clitest.rg000001 --server clitestserver000002 --name updateEnrollAndSwitchDb1maintenance --edition Premium -sql elastic-pool update -g clitest.rg000001 --server clitestserver000002 --name updateEnrollAndSwitchDb1maintenance --edition Premium -m SQL_EastUS2_DB_2 -sql elastic-pool update -g clitest.rg000001 --server clitestserver000002 --name updateEnrollAndSwitchDb1maintenance --maint-config-id /subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Maintenance/publicMaintenanceConfigurations/SQL_EastUS2_DB_1 --zone-redundant -sql mi show -g {rg} -n {managed_instance_name_1} -sql mi show -g {rg} -n {managed_instance_name_2} -sql stg create -g {rg} -l {loc} --trust-scope {trust_scope} -n {stg_name} -m {mi1} {mi2} -sql stg show -g {rg} -l {loc} -n {stg_name} -sql stg list -g {rg} --instance-name {managed_instance_name_1} -sql stg list -g {rg} -l {loc} -sql stg delete -g {rg} -l {loc} -n {stg_name} --yes -sql mi create -g {rg} -n {managed_instance_name} -l {loc} -u {username} -p {admin_password} --subnet {subnet} --license-type {license_type} --capacity {v_cores} --storage {storage_size_in_gb} --edition {edition} --family {family} --collation {collation} --proxy-override {proxy_override} --public-data-endpoint-enabled --timezone-id "{timezone_id}" --maint-config-id "{maintenance_id}" -sql mi delete --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/northeutest/providers/Microsoft.Sql/managedInstances/clitestmi000001 --yes -sql mi show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestmi000001 -sql mi show --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/Committer-SwaggerAndGeneratedSDKs-MI-CLI/providers/Microsoft.Sql/managedInstances/clitestmi000001 -sql mi update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestmi000001 --admin-password SecretPassword456 -i -sql mi update --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/Committer-SwaggerAndGeneratedSDKs-MI-CLI/providers/Microsoft.Sql/managedInstances/clitestmi000001 --admin-password SecretPassword123 -sql mi update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestmi000001 --minimal-tls-version 1.1 -sql mi update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestmi000001 --set tags.tagName3=tagValue3 -sql mi update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestmi000001 --remove tags.tagName1 -sql mi update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestmi000001 --tags tagName1=tagValue1 -sql mi update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestmi000001 --tags "" -sql mi update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestmi000001 --subnet /subscriptions/4cac86b0-1e56-48c2-9df2-669a6d2d87c5/resourceGroups/Committer-SwaggerAndGeneratedSDKs-MI-CLI/providers/Microsoft.Network/virtualNetworks/vnet-powershell-cli-testing/subnets/ManagedInstance2 -sql mi update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestmi000001 --subnet ManagedInstance2 --vnet-name vnet-powershell-cli-testing -sql mi list -sql mi show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestmi000001 -sql instance-pool list -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -sql instance-pool create -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestip000002 -l westeurope --subnet /subscriptions/4cac86b0-1e56-48c2-9df2-669a6d2d87c5/resourceGroups/Committer-SwaggerAndGeneratedSDKs-MI-CLI/providers/Microsoft.Network/virtualNetworks/vnet-powershell-cli-testing/subnets/ManagedInstance --license-type LicenseIncluded --capacity 8 -e GeneralPurpose -f Gen5 -sql instance-pool show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestip000002 -sql instance-pool update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestip000002 --tags bar=foo foo=bar -sql instance-pool update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestip000002 --tags "" -sql instance-pool create -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestip000003 -l westeurope --subnet /subscriptions/4cac86b0-1e56-48c2-9df2-669a6d2d87c5/resourceGroups/Committer-SwaggerAndGeneratedSDKs-MI-CLI/providers/Microsoft.Network/virtualNetworks/vnet-powershell-cli-testing/subnets/ManagedInstance --license-type LicenseIncluded --capacity 8 -e GeneralPurpose -f Gen5 -sql instance-pool show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestip000003 -sql instance-pool update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestip000003 --tags bar=foo foo=bar -sql instance-pool update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestip000003 --tags "" -sql instance-pool list -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -sql instance-pool delete -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestip000002 --yes -sql instance-pool show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestip000002 -sql instance-pool delete -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n clitestip000003 --yes --no-wait -sql instance-pool list -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -sql mi show -g {rg} -n {managed_instance_name} -sql midb create -g {rg} --mi {managed_instance_name} -n {database_name} --collation {collation} -keyvault create -g {rg} -n {vault_name} --enable-soft-delete true -keyvault set-policy -g {rg} -n {vault_name} --object-id {mi_identity} --key-permissions wrapKey unwrapKey get list -keyvault key create -n {key_name} -p software --vault-name {vault_name} -sql mi key create -g {rg} --mi {managed_instance_name} -k {kid} -sql mi key show -g {rg} --mi {managed_instance_name} -k {kid} -sql mi key list -g {rg} --mi {managed_instance_name} -sql mi tde-key show -g {rg} --mi {managed_instance_name} -sql mi tde-key set -g {rg} --mi {managed_instance_name} -t AzureKeyVault -k {kid} --auto-rotation-enabled -sql mi tde-key show -g {rg} --mi {managed_instance_name} -sql mi tde-key set -g {rg} --mi {managed_instance_name} -t ServiceManaged -sql mi tde-key show -g {rg} --mi {managed_instance_name} -sql midb create -g {rg} --mi {managed_instance_name} -n {database_name} --collation {collation} -sql midb short-term-retention-policy set -g {rg} --mi {managed_instance_name} -n {database_name} --retention-days {retention_days_inc} -sql midb short-term-retention-policy show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb delete -g {rg} --managed-instance {managed_instance_name} -n {database_name} --yes -sql midb list-deleted -g {rg} --managed-instance {managed_instance_name} -sql midb short-term-retention-policy set -g {rg} --mi {managed_instance_name} -n {database_name} --retention-days {retention_days_dec} --deleted-time {deleted_time} -sql midb short-term-retention-policy show -g {rg} --mi {managed_instance_name} -n {database_name} --deleted-time {deleted_time} -sql midb create -g {rg} --mi {managed_instance_name} -n {database_name} --collation {collation} -sql midb ltr-policy set -g {rg} --mi {managed_instance_name} -n {database_name} --weekly-retention {weekly_retention} --monthly-retention {monthly_retention} --yearly-retention {yearly_retention} --week-of-year {week_of_year} -sql midb ltr-policy show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb ltr-backup list -l {loc} -g {rg} -sql midb ltr-backup list -l {loc} -sql midb ltr-backup list -l {loc} --mi {managed_instance_name} -g {rg} -sql midb ltr-backup list -l {loc} --mi {managed_instance_name} -sql midb ltr-backup list -l {loc} --mi {managed_instance_name} -d {database_name} -g {rg} -sql midb ltr-backup list -l {loc} --mi {managed_instance_name} -d {database_name} -sql midb create -g {rg} --mi {managed_instance_name} -n {database_name} --collation {collation} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb show -g {rg} --mi {managed_instance_name} -n {database_name} -sql midb delete -g {rg} --managed-instance {managed_instance_name} -n {database_name} --yes -sql midb list-deleted -g {rg} --managed-instance {managed_instance_name} -sql midb restore -g {rg} --mi {managed_instance_name} -n {database_name} --dest-name {restored_database_name} --deleted-time {deleted_time} --time {deleted_time} -sql midb create -g Committer-SwaggerAndGeneratedSDKs-MI-CLI --mi clitestmi000001 -n cliautomationdb01 --collation Serbian_Cyrillic_100_CS_AS -sql midb restore -g Committer-SwaggerAndGeneratedSDKs-MI-CLI --mi clitestmi000001 -n cliautomationdb01 --dest-name restoredcliautomationdb01 --time 2021-12-04T11:21:45.185110 -sql midb list -g Committer-SwaggerAndGeneratedSDKs-MI-CLI --managed-instance clitestmi000001 -sql midb show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI --managed-instance clitestmi000001 -n cliautomationdb01 -sql midb show --ids /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/Committer-SwaggerAndGeneratedSDKs-MI-CLI/providers/Microsoft.Sql/managedInstances/clitestmi000001/databases/restoredcliautomationdb01 -sql midb delete -g Committer-SwaggerAndGeneratedSDKs-MI-CLI --managed-instance clitestmi000001 -n cliautomationdb01 --yes -sql midb show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI --managed-instance clitestmi000001 -n cliautomationdb01 -sql mi ad-admin create --mi {managed_instance_name} -g {rg} -i {oid} -u {user} -sql mi ad-admin list --mi {managed_instance_name} -g {rg} -sql mi ad-admin update --mi {managed_instance_name} -g {rg} -u {user2} -i {oid2} -sql mi ad-admin delete --mi {managed_instance_name} -g {rg} -sql mi ad-admin list --mi {managed_instance_name} -g {rg} -sql mi ad-admin create --mi {managed_instance_name} -g {rg} -i {oid} -u {user} -sql mi ad-only-auth enable -n {managed_instance_name} -g {rg} -sql mi ad-only-auth disable -n {managed_instance_name} -g {rg} -sql mi ad-only-auth get -n {managed_instance_name} -g {rg} -sql db create -g clitest.rg000001 --server clitestserver000003 --name db1 -sql failover-group create -n fgclitest16578-lulu -g clitest.rg000001 -s clitestserver000003 --partner-resource-group clitest.rg000002 --partner-server clitestserver000004 --failover-policy Automatic --grace-period 2 -sql failover-group list -g clitest.rg000001 -s clitestserver000003 -sql failover-group show -g clitest.rg000002 -s clitestserver000004 -n fgclitest16578-lulu -sql failover-group update -g clitest.rg000001 -s clitestserver000003 -n fgclitest16578-lulu --grace-period 3 --add-db db1 -sql failover-group show -g clitest.rg000002 -s clitestserver000004 -n fgclitest16578-lulu -sql db list -g clitest.rg000002 -s clitestserver000004 -sql failover-group update -g clitest.rg000001 -s clitestserver000003 -n fgclitest16578-lulu --failover-policy Manual -sql failover-group set-primary -g clitest.rg000002 -s clitestserver000004 -n fgclitest16578-lulu -sql failover-group show -g clitest.rg000002 -s clitestserver000004 -n fgclitest16578-lulu -sql failover-group show -g clitest.rg000001 -s clitestserver000003 -n fgclitest16578-lulu -sql failover-group set-primary -g clitest.rg000001 -s clitestserver000003 -n fgclitest16578-lulu -sql failover-group show -g clitest.rg000002 -s clitestserver000004 -n fgclitest16578-lulu -sql failover-group show -g clitest.rg000001 -s clitestserver000003 -n fgclitest16578-lulu -sql failover-group set-primary -g clitest.rg000001 -s clitestserver000003 -n fgclitest16578-lulu -sql failover-group show -g clitest.rg000002 -s clitestserver000004 -n fgclitest16578-lulu -sql failover-group show -g clitest.rg000001 -s clitestserver000003 -n fgclitest16578-lulu -sql failover-group update -g clitest.rg000001 -s clitestserver000003 -n fgclitest16578-lulu --remove-db db1 -sql db show -g clitest.rg000002 -s clitestserver000004 -n db1 -sql failover-group delete -g clitest.rg000001 -s clitestserver000003 -n fgclitest16578-lulu -sql failover-group list -g clitest.rg000001 -s clitestserver000003 -sql failover-group list -g clitest.rg000002 -s clitestserver000004 -sql virtual-cluster list -sql virtual-cluster list -g {rg} -sql virtual-cluster show -g {rg} -n {vc_name} -sql instance-failover-group create -n fgtest2021a -g Committer-SwaggerAndGeneratedSDKs-MI-CLI --mi clitestmi000001 --partner-resource-group Committer-SwaggerAndGeneratedSDKs-MI-CLI --partner-mi clitestmi000002 --failover-policy Automatic --grace-period 2 -sql instance-failover-group show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -l westus -n fgtest2021a -sql instance-failover-group update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n fgtest2021a -l westeurope --grace-period 3 -sql instance-failover-group show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -l westus -n fgtest2021a -sql instance-failover-group update -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n fgtest2021a -l westeurope --failover-policy Manual -sql instance-failover-group set-primary -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n fgtest2021a -l westus -sql instance-failover-group show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -l westus -n fgtest2021a -sql instance-failover-group show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -l westeurope -n fgtest2021a -sql instance-failover-group set-primary --allow-data-loss -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n fgtest2021a -l westeurope -sql instance-failover-group show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -l westus -n fgtest2021a -sql instance-failover-group show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -l westeurope -n fgtest2021a -sql instance-failover-group set-primary -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -n fgtest2021a -l westeurope -sql instance-failover-group show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -l westus -n fgtest2021a -sql instance-failover-group show -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -l westeurope -n fgtest2021a -sql instance-failover-group delete -g Committer-SwaggerAndGeneratedSDKs-MI-CLI -l westeurope -n fgtest2021a -sql db create -g clitest.rg000001 -s clitestserver000002 -n sensitivityclassificationsdb01 --sample-name AdventureWorksLT -sql db classification list -g clitest.rg000001 -s clitestserver000002 -n sensitivityclassificationsdb01 -storage account show -g clitest.rg000001 -n clitest000003 --query primaryEndpoints.blob -storage account keys list -g clitest.rg000001 -n clitest000003 --query [0].value -sql db threat-policy update -g clitest.rg000001 -s clitestserver000002 -n sensitivityclassificationsdb01 --state Enabled --storage-key veryFakedStorageAccountKey== --storage-endpoint https://clitest000003.blob.core.windows.net/ --retention-days 30 --email-addresses test1@example.com test2@example.com --disabled-alerts Sql_Injection_Vulnerability Access_Anomaly --email-account-admins True -sql db classification recommendation list -g clitest.rg000001 -s clitestserver000002 -n sensitivityclassificationsdb01 -sql db classification recommendation disable -g clitest.rg000001 -s clitestserver000002 -n sensitivityclassificationsdb01 --schema SalesLT --table Customer --column FirstName -sql db classification recommendation list -g clitest.rg000001 -s clitestserver000002 -n sensitivityclassificationsdb01 -sql db classification recommendation enable -g clitest.rg000001 -s clitestserver000002 -n sensitivityclassificationsdb01 --schema SalesLT --table Customer --column FirstName -sql db classification recommendation list -g clitest.rg000001 -s clitestserver000002 -n sensitivityclassificationsdb01 -sql db classification update -g clitest.rg000001 -s clitestserver000002 -n sensitivityclassificationsdb01 --schema SalesLT --table Customer --column FirstName --information-type Name --label "Confidential - GDPR" -sql db classification show -g clitest.rg000001 -s clitestserver000002 -n sensitivityclassificationsdb01 --schema SalesLT --table Customer --column FirstName -sql db classification recommendation list -g clitest.rg000001 -s clitestserver000002 -n sensitivityclassificationsdb01 -sql db classification list -g clitest.rg000001 -s clitestserver000002 -n sensitivityclassificationsdb01 -sql db classification delete -g clitest.rg000001 -s clitestserver000002 -n sensitivityclassificationsdb01 --schema SalesLT --table Customer --column FirstName -sql db classification list -g clitest.rg000001 -s clitestserver000002 -n sensitivityclassificationsdb01 -sql server create -g clitest.rg000001 --name clitestserver000002 --admin-user admin123 --admin-password SecretPassword123 --minimal-tls-version 1.2 -sql server update -g clitest.rg000001 --name clitestserver000002 --minimal-tls-version 1.1 -i -sql mi failover -g {resource_group} -n {managed_instance_name} -sql db create -g clitest.rg000001 --server clitestserver000002 --name sqlledgerdb000003 -sql db ledger-digest-uploads show -g clitest.rg000001 -s clitestserver000002 --name sqlledgerdb000003 -sql db ledger-digest-uploads enable -g clitest.rg000001 -s clitestserver000002 --name sqlledgerdb000003 --endpoint https://test.confidential-ledger.azure.com -sql db ledger-digest-uploads show -g clitest.rg000001 -s clitestserver000002 --name sqlledgerdb000003 -sql db ledger-digest-uploads disable -g clitest.rg000001 -s clitestserver000002 --name sqlledgerdb000003 -sql db ledger-digest-uploads show -g clitest.rg000001 -s clitestserver000002 --name sqlledgerdb000003 -sql vm create -n clisqlvm000002 -g sqlvm_cli_test_create000001 -l westus --license-type PAYG -sql vm create -n clisqlvm000003 -g sqlvm_cli_test_create000001 -l westus --license-type AHUB -sql vm create -n clisqlvm000004 -g sqlvm_cli_test_create000001 -l westus --license-type PAYG --sql-mgmt-type Full --connectivity-type PUBLIC --port 1433 --sql-auth-update-username sqladmin123 --sql-auth-update-pwd SecretPassword123 -sql vm delete -n clisqlvm000002 -g sqlvm_cli_test_create000001 --yes -sql vm delete -n clisqlvm000003 -g sqlvm_cli_test_create000001 --yes -sql vm delete -n clisqlvm000004 -g sqlvm_cli_test_create000001 --yes -sql vm create -n clisqlvm000002 -g sqlvm_cli_test_create000001 -l westus --license-type PAYG --sql-mgmt-type Full --day-of-week Monday --maintenance-window-duration 60 --maintenance-window-start-hour 22 -storage account update -n clitest000005 -g sqlvm_cli_test_create000001 --set kind=StorageV2 -storage account show -n clitest000005 -g sqlvm_cli_test_create000001 -storage account keys list -n clitest000005 -g sqlvm_cli_test_create000001 -sql vm create -n clisqlvm000003 -g sqlvm_cli_test_create000001 -l westus --license-type PAYG --backup-schedule-type Manual --full-backup-frequency Weekly --full-backup-start-hour 2 --full-backup-duration 2 --sa-key veryFakedStorageAccountKey== --storage-account https://clitest000005.blob.core.windows.net/ --retention-period 30 --log-backup-frequency 60 --sql-mgmt-type Full -sql vm create -n clisqlvm000004 -g sqlvm_cli_test_create000001 -l westus --license-type PAYG --enable-r-services True --sql-mgmt-type Full -storage account update -n clitest000003 -g clitest.rg000001 --set kind=StorageV2 -storage account show -n clitest000003 -g clitest.rg000001 -storage account keys list -n clitest000003 -g clitest.rg000001 -sql vm create -n clisqlvm000002 -g clitest.rg000001 -l westus --license-type PAYG --sql-mgmt-type NoAgent -sql vm create -n clisqlvm000002 -g clitest.rg000001 -l westus --license-type PAYG -sql vm list -g clitest.rg000001 -sql vm show -n clisqlvm000002 -g clitest.rg000001 -sql vm show -n clisqlvm000002 -g clitest.rg000001 -sql vm update -n clisqlvm000002 -g clitest.rg000001 --sql-mgmt-type Full --yes -sql vm show -n clisqlvm000002 -g clitest.rg000001 --expand * -sql vm show -n clisqlvm000002 -g clitest.rg000001 --expand AutoBackupSettings -sql vm show -n clisqlvm000002 -g clitest.rg000001 --expand AutoPatchingSettings AutoBackupSettings -sql vm show -n clisqlvm000002 -g clitest.rg000001 --expand AutoPatchingSettings * AutoBackupSettings -sql vm update -n clisqlvm000002 -g clitest.rg000001 --license-type AHUB -sql vm update -n clisqlvm000002 -g clitest.rg000001 --enable-r-services True -sql vm update -n clisqlvm000002 -g clitest.rg000001 --day-of-week Monday --maintenance-window-duration 60 --maintenance-window-start-hour 22 -sql vm update -n clisqlvm000002 -g clitest.rg000001 --enable-auto-patching False -sql vm update -n clisqlvm000002 -g clitest.rg000001 --backup-schedule-type Manual --full-backup-frequency Weekly --full-backup-start-hour 2 --full-backup-duration 2 --sa-key veryFakedStorageAccountKey== --storage-account https://clitest000003.blob.core.windows.net/ --retention-period 30 --log-backup-frequency 60 -sql vm delete -n clisqlvm000002 -g clitest.rg000001 --yes -sql vm list -g clitest.rg000001 -sql vm create -n clisqlvm000002 -g sqlvm_cli_test_license000001 -l westus --image-sku Enterprise --license-type AHUB -sql vm update -n clisqlvm000002 -g sqlvm_cli_test_license000001 --image-sku Enterprise --license-type PAYG -sql vm delete -n clisqlvm000002 -g sqlvm_cli_test_license000001 --yes -sql vm create -n clisqlvm000002 -g sqlvm_cli_test_license000001 -l westus --image-sku Enterprise --license-type PAYG -sql vm update -n clisqlvm000002 -g sqlvm_cli_test_license000001 --image-sku Enterprise -sql vm update -n clisqlvm000002 -g sqlvm_cli_test_license000001 --image-sku Enterprise --license-type AHUB -sql vm update -n clisqlvm000002 -g sqlvm_cli_test_license000001 --license-type DR -sql vm delete -n clisqlvm000002 -g sqlvm_cli_test_license000001 --yes -sql vm create -n clisqlvm000002 -g sqlvm_cli_test_license000001 -l westus --license-type DR -storage account show -n clitest000002 -g clitest.rg000001 -storage account keys list -n clitest000002 -g clitest.rg000001 -storage account show -n clitest000003 -g clitest.rg000001 -storage account keys list -n clitest000003 -g clitest.rg000001 -sql vm group create -n sqlvmgroup -g clitest.rg000001 -l westus -i SQL2017-WS2016 -s Enterprise -f domain.com -p myvmadmin -k veryFakedStorageAccountKey== -e sqlservice -u https://clitest000002.blob.core.windows.net/ -sql vm group list -g clitest.rg000001 -sql vm group show -n sqlvmgroup -g clitest.rg000001 -sql vm group update -n sqlvmgroup -g clitest.rg000001 -u https://clitest000003.blob.core.windows.net/ -k veryFakedStorageAccountKey== -sql vm group update -n sqlvmgroup -g clitest.rg000001 -f mydomain.com -k veryFakedStorageAccountKey== -sql vm group update -n sqlvmgroup -g clitest.rg000001 -p mymyvmadmin -k veryFakedStorageAccountKey== -sql vm group delete -n sqlvmgroup -g clitest.rg000001 --yes -sql vm group list -g clitest.rg000001 -vm run-command invoke -n adVM -g clitest.rg000001 --command-id RunPowerShellScript --scripts "Set-AdUser -UserPrincipalName admin123@domain.com -Identity admin123 -PasswordNeverExpires $true" -deployment group create --name joinvms -g clitest.rg000001 --template-uri https://raw.githubusercontent.com/Azure/azure-quickstart-templates/master/quickstarts/microsoft.compute/vm-domain-join-existing/azuredeploy.json --parameters location=westus domainJoinUserName=domain\\admin123 domainJoinUserPassword=SecretPassword123 domainFQDN=domain.com vmList=clisqlvm000003 -storage account show -n clitest000004 -g clitest.rg000001 -storage account keys list -n clitest000004 -g clitest.rg000001 -sql vm group create -n cligroup -g clitest.rg000001 -l westus -i SQL2017-WS2016 -s Enterprise -f domain.com -p admin123 -k veryFakedStorageAccountKey== -e admin123 -u https://clitest000004.blob.core.windows.net/ --bootstrap-acc admin123 -sql vm create -n clisqlvm000003 -g clitest.rg000001 -l westus --license-type PAYG --connectivity-type PRIVATE --port 1433 --sql-auth-update-pwd admin123 --sql-auth-update-username SecretPassword123 --sql-mgmt-type Full -sql vm add-to-group -n clisqlvm000003 -g clitest.rg000001 -r /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.SqlVirtualMachine/sqlVirtualMachineGroups/cligroup -p SecretPassword123 -s SecretPassword123 -b SecretPassword123 -sql vm remove-from-group -n clisqlvm000003 -g clitest.rg000001 -storage account generate-sas --resource-types o --services b --expiry 2000-01-01 --permissions r --account-name "" -storage account generate-sas --resource-types o --services b --expiry 2000-01-01 --permissions r --connection-string DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net; -storage account generate-sas --resource-types o --services b --expiry 2046-12-31T08:23Z --permissions r --https-only --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage account create -n cli000002 -g clitest.rg000001 --sku Standard_LRS -l westus -storage account check-name --name cli000002 -storage account list -g clitest.rg000001 -storage account show -n cli000002 -g clitest.rg000001 -storage account show -n cli000002 -storage account show-connection-string -g clitest.rg000001 -n cli000002 --protocol http -storage account update -g clitest.rg000001 -n cli000002 --tags foo=bar cat -storage account update -g clitest.rg000001 -n cli000002 --sku Standard_GRS --tags -storage account update -g clitest.rg000001 -n cli000002 --set tags.test=success -storage account delete -g clitest.rg000001 -n cli000002 --yes -storage account check-name --name cli000002 -storage account create -g clitest.rg000001 -n cli000003 --sku Standard_LRS --enable-large-file-share -storage account show -n cli000003 -g clitest.rg000001 -storage account create -n {name} -g {rg} -l {loc} --kind StorageV2 -storage account check-name --name {name} -storage account create -n cli000002 -g clitest.rg000001 --sku Standard_LRS --assign-identity -storage account create -n cli000002 -g clitest.rg000001 --require-infrastructure-encryption -storage account show -n cli000002 -g clitest.rg000001 -storage account create -n cli000002 -g clitest.rg000001 --enable-files-aadds -storage account create -n cli000002 -g clitest.rg000001 --enable-files-aadds false -storage account create -n cli000002 -g clitest.rg000001 --enable-files-aadds true -storage account create -n {sc} -g {rg} -l eastus2euap --enable-files-adds --domain-name - {domain_name} --net-bios-domain-name {net_bios_domain_name} --forest-name {forest_name} --domain-guid - {domain_guid} --domain-sid {domain_sid} --azure-storage-sid {azure_storage_sid} -storage account create -n {sc} -g {rg} -l eastus2euap --enable-files-adds false -storage account create -n {sc} -g {rg} -l eastus2euap --enable-files-adds true --domain-name - {domain_name} --net-bios-domain-name {net_bios_domain_name} --forest-name {forest_name} --domain-guid - {domain_guid} --domain-sid {domain_sid} --azure-storage-sid {azure_storage_sid} -storage account create -n cli000002 -g clitest.rg000001 -storage account create -n cli000003 -g clitest.rg000001 --public-network-access Disabled -keyvault show -n {vt} -g {rg} -keyvault key create -n testkey -p software --vault-name {vt} -otsv --query 'key.kid' -storage account update -n {sa} -g {rg} --assign-identity -otsv --query 'identity.principalId' -keyvault set-policy -n {vt} --object-id {oid} -g {rg} --key-permissions get wrapKey unwrapKey recover -keyvault update -n {vt} -g {rg} --set properties.enableSoftDelete=true -resource update --id {vid} --set properties.enablePurgeProtection=true -storage account update -n {sa} -g {rg} --encryption-key-source Microsoft.Keyvault --encryption-key-vault {vtn} --encryption-key-name testkey -storage account update -n {sa} -g {rg} --encryption-key-version {ver} -storage account update -n {sa} -g {rg} --encryption-key-version "" -keyvault key create -n newkey -p software --vault-name {vt} -storage account update -n {sa} -g {rg} --encryption-key-vault {vtn} --encryption-key-name "newkey" -storage account update -n {sa} -g {rg} --encryption-key-source Microsoft.Storage -account list-locations -storage account list -storage account show-connection-string -g clitest.rg000001 -n clitest000002 -otsv -storage logging show --connection-string DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== - -storage logging update --services b --log r --retention 1 --service b --connection-string DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== - -storage logging show --connection-string DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== - -storage logging off --connection-string DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== - -storage logging show --connection-string DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== - -storage logging update --services t --log r --retention 1 --version 2.0 --connection-string DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== - -storage logging update --services t --log r --retention 1 --version 1.0 --connection-string DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== - -storage logging show --connection-string DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== - -storage logging update --services t --log r --retention 1 --connection-string DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== - -storage logging show --connection-string DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== - -storage account blob-service-properties update --enable-last-access-tracking true -n {sa} -g {rg} -storage account management-policy create --account-name {sa} -g {rg} --policy @"{policy}" -storage account management-policy update --account-name {sa} -g {rg} --set "policy.rules[0].name=newname" -storage account management-policy show --account-name {sa} -g {rg} -storage account management-policy delete --account-name {sa} -g {rg} -storage account management-policy show --account-name {sa} -g {rg} -storage metrics show --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage metrics update --services f --api true --hour true --minute true --retention 1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage metrics show --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage account create -g {rg} -n {sc} -l eastus2euap --enable-files-aadds -storage account keys list -g {rg} -n {sc} -storage account keys list -g {rg} -n {sc} --expand-key-type kerb -storage account keys renew -g {rg} -n {sc} --key secondary -storage account keys renew -g {rg} -n {sc} --key primary --key-type kerb -storage account keys list -g clitest.rg000001 -n clitest000002 -storage account keys renew -g clitest.rg000001 -n clitest000002 --key primary -storage account keys renew -g clitest.rg000001 -n clitest000002 --key secondary -storage account show-usage -l westus -storage account show-usage -storage account create -n {sa1} -g {rg} --edge-zone microsoftrrdclab1 -l eastus2euap --sku Premium_LRS -storage account create -n {sa2} -g {rg} --edge-zone microsoftlosangeles1 --sku Premium_LRS -storage account network-rule add -g {rg} --account-name {sa} --resource-id {rid1} --tenant-id {tid1} -storage account network-rule list -g {rg} --account-name {sa} -storage account network-rule add -g {rg} --account-name {sa} --resource-id {rid1} --tenant-id {tid1} -storage account network-rule list -g {rg} --account-name {sa} -storage account network-rule add -g {rg} --account-name {sa} --resource-id {rid2} --tenant-id {tid1} -storage account network-rule list -g {rg} --account-name {sa} -storage account network-rule add -g {rg} --account-name {sa} --resource-id {rid3} --tenant-id {tid2} -storage account network-rule list -g {rg} --account-name {sa} -storage account network-rule remove -g {rg} --account-name {sa} --resource-id {rid1} --tenant-id {tid1} -storage account network-rule list -g {rg} --account-name {sa} -storage account network-rule remove -g {rg} --account-name {sa} --resource-id {rid2} --tenant-id {tid2} -storage account network-rule list -g {rg} --account-name {sa} -storage account create -g cli_test_storage_service_endpoints000001 -n cli000002 --bypass Metrics --default-action Deny --https-only -storage account update -g cli_test_storage_service_endpoints000001 -n cli000002 --bypass Logging --default-action Allow -storage account update -g cli_test_storage_service_endpoints000001 -n cli000002 --set networkRuleSet.default_action=deny -network vnet create -g cli_test_storage_service_endpoints000001 -n vnet1 --subnet-name subnet1 -network vnet subnet update -g cli_test_storage_service_endpoints000001 --vnet-name vnet1 -n subnet1 --service-endpoints Microsoft.Storage -storage account network-rule add -g cli_test_storage_service_endpoints000001 --account-name cli000002 --ip-address 25.1.2.3 -storage account network-rule add -g cli_test_storage_service_endpoints000001 --account-name cli000002 --ip-address 25.1.2.3 -storage account network-rule add -g cli_test_storage_service_endpoints000001 --account-name cli000002 --ip-address 25.2.0.0/24 -storage account network-rule add -g cli_test_storage_service_endpoints000001 --account-name cli000002 --vnet-name vnet1 --subnet subnet1 -storage account network-rule list -g cli_test_storage_service_endpoints000001 --account-name cli000002 -storage account network-rule add -g cli_test_storage_service_endpoints000001 --account-name cli000002 --vnet-name vnet1 --subnet subnet1 -storage account network-rule list -g cli_test_storage_service_endpoints000001 --account-name cli000002 -storage account network-rule remove -g cli_test_storage_service_endpoints000001 --account-name cli000002 --ip-address 25.1.2.3 -storage account network-rule remove -g cli_test_storage_service_endpoints000001 --account-name cli000002 --vnet-name vnet1 --subnet subnet1 -storage account network-rule list -g cli_test_storage_service_endpoints000001 --account-name cli000002 -storage account show -g {rg} -n {sa} -storage account show text_causing_parsing_error -storage account show -g fake_group -n {sa} -storage account show -g {rg} -n fake_account -storage account create -n {name1} -g {rg} --enable-alw --immutability-period 10 --immutability-state Disabled --allow-append -storage account create -n {name2} -g {rg} --enable-alw false --immutability-period 10 --immutability-state Disabled --allow-append -storage account create -n {name2} -g {rg} --enable-alw --immutability-period 10 --allow-append -storage account create -n {name2} -g {rg} --enable-alw --immutability-period 10 --immutability-state Locked --allow-append -storage account update -n {name1} --immutability-period 15 --immutability-state Unlocked --allow-append false -storage account create -n {name2} -g {rg} --enable-alw false -storage account update -n {name2} --immutability-period 10 --immutability-state Disabled --allow-append -storage account update -n {name1} --immutability-state Disabled -storage account update -n {name1} --immutability-state Locked -storage account update -n {name1} --immutability-state UnLocked -storage account update -n {name1} --immutability-state Locked -storage account update -n {name1} --immutability-period 10 -storage account update -n {name1} --immutability-state UnLocked -storage account update -n {name1} --allow-append -storage account create -n {name} -g {rg} -storage account create -n {name} -g {rg} --default-share-permission StorageFileDataSmbShareReader -storage account update -n {name} -g {rg} --default-share-permission None -storage account create -n cli000002 -g cli_storage_account000001 -storage account create -n cli000002 -g cli_storage_account000001 --key-exp-days 3 -storage account create -n cli000002 -g cli_storage_account000001 --sas-exp 1.23:59:59 -storage account update -n cli000002 -g cli_storage_account000001 --key-exp-days 100000 -storage account update -n cli000002 -g cli_storage_account000001 --sas-exp 100000.00:00:00 -network vnet create -g {rg} -n {vnet} --subnet-name {subnet} -network vnet subnet update -g {rg} --vnet-name {vnet} -n {subnet} --service-endpoints Microsoft.Storage -storage account create -n {name1} -g {rg} --subnet {subnet_id} --default-action Deny --hns --sku Standard_LRS --enable-nfs-v3 true -storage account create -n {name2} -g {rg} --enable-nfs-v3 false -storage account create -n {name3} -g {rg} --enable-nfs-v3 --vnet-name {vnet} --subnet {subnet} --default-action Deny --hns --sku Standard_LRS -storage account create -n clirouting000002 -g cli_storage_account_routing000001 --routing-choice MicrosoftRouting --publish-microsoft-endpoint true -storage account update -n clirouting000002 -g cli_storage_account_routing000001 --routing-choice InternetRouting --publish-microsoft-endpoint false --publish-internet-endpoint true -storage account create -n clirouting000003 -g cli_storage_account_routing000001 --routing-choice InternetRouting --publish-internet-endpoints true --publish-microsoft-endpoints false -storage account update -n clirouting000003 -g cli_storage_account_routing000001 --routing-choice MicrosoftRouting -storage account create -n clirouting000004 -g cli_storage_account_routing000001 -storage account update -n clirouting000004 -g cli_storage_account_routing000001 --routing-choice MicrosoftRouting --publish-internet-endpoints false --publish-microsoft-endpoints true -storage account create -n cli000002 -g cli_storage_account000001 --allow-shared-key-access -storage account create -n cli000002 -g cli_storage_account000001 --allow-shared-key-access false -storage account create -n cli000002 -g cli_storage_account000001 --allow-shared-key-access true -storage account update -n cli000002 --allow-shared-key-access false -storage account update -n cli000002 --allow-shared-key-access true -storage account create -n cli000002 -g clitest.rg000001 -storage account create -n cli000002 -g clitest.rg000001 -storage account create -n cliencryption000002 -g cli_storage_account_encryption000001 --kind StorageV2 -t Account -q Service -storage account create -n cli000002 -g cli_storage_account_hns000001 --kind StorageV2 --hns -storage account create -n cli000002 -g cli_storage_account_hns000001 --kind StorageV2 --hns false -storage account create -n cli000002 -g cli_storage_account_hns000001 --kind StorageV2 --hns true -storage account create -n cli000002 -g cli_storage_account000001 -storage account create -n cli000003 -g cli_storage_account000001 --min-tls-version TLS1_0 -storage account create -n cli000004 -g cli_storage_account000001 --min-tls-version TLS1_1 -storage account create -n cli000005 -g cli_storage_account000001 --min-tls-version TLS1_2 -storage account create -n cli000002 -g cli_storage_account000001 --allow-blob-public-access -storage account create -n cli000003 -g cli_storage_account000001 --allow-blob-public-access true -storage account create -n cli000004 -g cli_storage_account000001 --allow-blob-public-access false -storage account show -n tls000002 -g cli_storage_account000001 -storage account update -n tls000002 -g cli_storage_account000001 --min-tls-version TLS1_1 -storage account update -n tls000002 -g cli_storage_account000001 --min-tls-version TLS1_2 -storage account update -n tls000002 -g cli_storage_account000001 --min-tls-version TLS1_0 -storage account update -n blob000002 --allow-blob-public-access -storage account update -n blob000002 --allow-blob-public-access true -storage account update -n blob000002 --allow-blob-public-access false -storage account create -n cli000002 -g clitest.rg000001 --sku Standard_LRS -storage account update -n cli000002 -g clitest.rg000001 --assign-identity -storage account create -n cli000002 -g clitest.rg000001 -storage account update -n cli000002 -g clitest.rg000001 --enable-files-aadds -storage account create -n cli000002 -g clitest.rg000001 -storage account update -n cli000002 -g clitest.rg000001 --enable-files-aadds false -storage account create -n cli000002 -g clitest.rg000001 -storage account update -n cli000002 -g clitest.rg000001 --enable-files-aadds true -storage account create -n cli000002 -g clitest.rg000001 -l eastus2euap -storage account update -n {sc} -g {rg} --enable-files-adds --domain-name {domain_name} - --net-bios-domain-name {net_bios_domain_name} --forest-name {forest_name} --domain-guid {domain_guid} - --domain-sid {domain_sid} --azure-storage-sid {azure_storage_sid} -storage account create -n cli000002 -g clitest.rg000001 -l eastus2euap -storage account update -n cli000002 -g clitest.rg000001 --enable-files-adds false -storage account create -n cli000002 -g clitest.rg000001 -l eastus2euap -storage account update -n {sc} -g {rg} --enable-files-adds true --domain-name {domain_name} - --net-bios-domain-name {net_bios_domain_name} --forest-name {forest_name} --domain-guid {domain_guid} - --domain-sid {domain_sid} --azure-storage-sid {azure_storage_sid} -storage account create -n cli000002 -g clitest.rg000001 --public-network-access Enabled -storage account update -n cli000002 -g clitest.rg000001 --public-network-access Disabled -identity create -n {identity} -g {rg} -keyvault show -n {vt} -g {rg} -keyvault key create -n testkey -p software --vault-name {vt} -otsv --query 'key.kid' -keyvault set-policy -n {vt} --object-id {oid} -g {rg} --key-permissions get wrapKey unwrapKey recover -keyvault update -n {vt} -g {rg} --set properties.enableSoftDelete=true -resource update --id {vid} --set properties.enablePurgeProtection=true -storage account create -n {sa1} -g {rg} --encryption-key-source Microsoft.Keyvault --encryption-key-vault {vtn} --encryption-key-name testkey --key-vault-user-identity-id {iid} --identity-type UserAssigned --user-identity-id {iid} -storage account update -n {sa1} -g {rg} --identity-type None -storage account update -n {sa1} -g {rg} --identity-type UserAssigned --user-identity-id {iid} -storage account update -n {sa1} -g {rg} --encryption-key-source Microsoft.Keyvault --encryption-key-vault {vtn} --encryption-key-name testkey --identity-type SystemAssigned,UserAssigned -storage account update -n {sa1} -g {rg} --assign-identity -otsv --query 'identity.principalId' -keyvault set-policy -n {vt} --object-id {oid} -g {rg} --key-permissions get wrapKey unwrapKey recover -storage account update -n {sa1} -g {rg} --key-vault-user-identity-id "" -storage account update -n {sa1} -g {rg} --encryption-key-source Microsoft.Storage -storage account create -n {sa2} -g {rg} --encryption-key-source Microsoft.Storage -storage account create -n {sa3} -g {rg} --encryption-key-source Microsoft.Keyvault --encryption-key-vault {vtn} --encryption-key-name testkey --key-vault-user-identity-id {iid} --identity-type SystemAssigned,UserAssigned --user-identity-id {iid} -storage account update -n {sa2} -g {rg} --assign-identity -otsv --query 'identity.principalId' -keyvault set-policy -n {vt} --object-id {sid} -g {rg} --key-permissions get wrapKey unwrapKey recover -keyvault set-policy -n {vt} --object-id {sid} -g {rg} --key-permissions get wrapKey unwrapKey recover -storage account update -n {sa2} -g {rg} --encryption-key-source Microsoft.Keyvault --encryption-key-vault {vtn} --encryption-key-name testkey --identity-type SystemAssigned -storage account create -n {sa2} -g {rg} --encryption-key-source Microsoft.Storage -storage account update -n {sa2} -g {rg} --encryption-key-source Microsoft.Keyvault --encryption-key-vault {vtn} --encryption-key-name testkey --identity-type SystemAssigned -storage account update -n {sa2} -g {rg} --identity-type None -storage account update -n {sa2} -g {rg} --identity-type UserAssigned --user-identity-id {iid} --key-vault-user-identity-id {iid} -storage account update -n {sa2} -g {rg} --identity-type SystemAssigned,UserAssigned -storage account update -n {sa2} -g {rg} --key-vault-user-identity-id "" -storage account update -n {sa2} -g {rg} --identity-type SystemAssigned -storage account update -n {sa2} -g {rg} --encryption-key-source Microsoft.Keyvault --encryption-key-vault {vtn} --encryption-key-name testkey --key-vault-user-identity-id {iid} --identity-type SystemAssigned,UserAssigned --user-identity-id {iid} -identity create -n {new_id} -g {rg} -keyvault set-policy -n {vt} --object-id {new_oid} -g {rg} --key-permissions get wrapKey unwrapKey recover -storage account update -n {sa2} -g {rg} --encryption-key-source Microsoft.Keyvault --encryption-key-vault {vtn} --encryption-key-name testkey --key-vault-user-identity-id {new_iid} --identity-type UserAssigned --user-identity-id {new_iid} -storage account update -n {sa2} -g {rg} --identity-type None -storage account update -n {sa2} -g {rg} --identity-type UserAssigned --user-identity-id {new_iid} --key-vault-user-identity-id {new_iid} -storage account blob-service-properties show -n {sa} -g {rg} -storage account blob-service-properties update --default-service-version 2018 -n {sa} -g {rg} -storage account blob-service-properties update --default-service-version 2018-11-09 -n {sa} -g {rg} -storage account blob-service-properties show -n {sa} -g {rg} -{cmd} --enable-change-feed false --change-feed-retention-days 14600 -n {sa} -g {rg} -{cmd} --change-feed-retention-days 1 -n {sa} -g {rg} -{cmd} --enable-change-feed true --change-feed-retention-days -1 -n {sa} -g {rg} -{cmd} --enable-change-feed true --change-feed-retention-days 0 -n {sa} -g {rg} -{cmd} --enable-change-feed true --change-feed-retention-days 146001 -n {sa} -g {rg} -{cmd} --enable-change-feed true --change-feed-retention-days 1 -n {sa} -g {rg} -{cmd} --enable-change-feed true --change-feed-retention-days 100 -n {sa} -g {rg} -{cmd} --enable-change-feed true --change-feed-retention-days 14600 -n {sa} -g {rg} -{cmd} --enable-change-feed false -n {sa} -g {rg} -{cmd} --enable-container-delete-retention true -n {sa} -g {rg} -{cmd} --enable-container-delete-retention false --container-delete-retention-days 365 -n {sa} -g {rg} -{cmd} --container-delete-retention-days 1 -n {sa} -g {rg} -{cmd} --enable-container-delete-retention true --container-delete-retention-days -1 -n {sa} -g {rg} -{cmd} --enable-container-delete-retention true --container-delete-retention-days 0 -n {sa} -g {rg} -{cmd} --enable-container-delete-retention true --container-delete-retention-days 366 -n {sa} -g {rg} -{cmd} --enable-container-delete-retention true --container-delete-retention-days 1 -n {sa} -g {rg} -{cmd} --enable-container-delete-retention true --container-delete-retention-days 100 -n {sa} -g {rg} -{cmd} --enable-container-delete-retention true --container-delete-retention-days 365 -n {sa} -g {rg} -{cmd} --enable-container-delete-retention false -n {sa} -g {rg} -{cmd} --enable-delete-retention true -n {sa} -g {rg} -{cmd} --enable-delete-retention false --delete-retention-days 365 -n {sa} -g {rg} -{cmd} --delete-retention-days 1 -n {sa} -g {rg} -{cmd} --enable-delete-retention true --delete-retention-days -1 -n {sa} -g {rg} -{cmd} --enable-delete-retention true --delete-retention-days 0 -n {sa} -g {rg} -{cmd} --enable-delete-retention true --delete-retention-days 366 -n {sa} -g {rg} -{cmd} --enable-delete-retention true --delete-retention-days 1 -n {sa} -g {rg} -{cmd} --enable-delete-retention true --delete-retention-days 100 -n {sa} -g {rg} -{cmd} --enable-delete-retention true --delete-retention-days 365 -n {sa} -g {rg} -{cmd} --enable-delete-retention false -n {sa} -g {rg} -storage account blob-service-properties update --enable-last-access-tracking true -n {sa} -g {rg} -storage account blob-service-properties show -n {sa} -g {rg} -storage account blob-service-properties update --enable-last-access-tracking false -n {sa} -g {rg} -storage account blob-service-properties update --enable-last-access-tracking -n {sa} -g {rg} -storage account blob-service-properties show -n {sa} -g {rg} -storage account blob-service-properties update --enable-versioning true -n {sa} -g {rg} -storage account blob-service-properties update --enable-versioning false -n {sa} -g {rg} -storage account blob-service-properties update --enable-versioning -n {sa} -g {rg} -storage account blob-service-properties show -n {sa} -g {rg} -{cmd} show --account-name {sa} -g {rg} -{cmd} update --account-name {sa} -g {rg} -{cmd} update --enable-delete-retention false -n {sa} -g {rg} -{cmd} show -n {sa} -g {rg} -{cmd} update --account-name {sa} -g {rg} -{cmd} update --enable-delete-retention true -n {sa} -g {rg} -{cmd} update --delete-retention-days 1 -n {sa} -g {rg} -n {sa} -g {rg} -{cmd} update --enable-delete-retention false --delete-retention-days 1 -n {sa} -g {rg} -{cmd} update --enable-delete-retention true --delete-retention-days 10 -n {sa} -g {rg} -{cmd} update --delete-retention-days 1 -n {sa} -g {rg} -{cmd} show -n {sa} -g {rg} -{cmd} update --versions "SMB2.1;SMB3.0;SMB3.1.1" --auth-methods "NTLMv2;Kerberos" --kerb-ticket-encryption "RC4-HMAC;AES-256" --channel-encryption "AES-128-CCM;AES-128-GCM;AES-256-GCM" -n {sa} -g {rg} -{cmd} show -n {sa} -g {rg} -{cmd} update --mc -n {sa2} -g {rg} -{cmd} show -n {sa} -g {rg} -{cmd} show -n {sa2} -g {rg} -{cmd} update --enable-smb-multichannel -n {sa} -g {rg} -{cmd} update --enable-smb-multichannel false -n {sa} -g {rg} -{cmd} update --enable-smb-multichannel true -n {sa} -g {rg} -storage account private-link-resource list --account-name {sa} -g {rg} -network vnet create -n {vnet} -g {rg} -l {loc} --subnet-name {subnet} -network vnet subnet update -n {subnet} --vnet-name {vnet} -g {rg} --disable-private-endpoint-network-policies true -storage account private-link-resource list --account-name {sa} -g {rg} -storage account show -n {sa} -g {rg} -network private-endpoint create -g {rg} -n {pe} --vnet-name {vnet} --subnet {subnet} -l {loc} --connection-name {pe_connection} --private-connection-resource-id {sa_id} --group-ids blob -storage account show -n {sa} -g {rg} -storage account private-endpoint-connection show --account-name {sa} -g {rg} --name {sa_pec_name} -storage account private-endpoint-connection approve --account-name {sa} -g {rg} --name {sa_pec_name} -storage account private-endpoint-connection reject --account-name {sa} -g {rg} --name {sa_pec_name} -storage account private-endpoint-connection approve --account-name {sa} -g {rg} --name {sa_pec_name} -storage account private-endpoint-connection delete --id {sa_pec_id} -y -storage account create -n {sa} -g {rg} -l eastus2euap --kind StorageV2 --sku Standard_RAGRS --https-only -storage account show -n {sa} -g {rg} --expand geoReplicationStats --query geoReplicationStats.canFailover -o tsv -storage account show -n {sa} -g {rg} --expand geoReplicationStats --query geoReplicationStats.canFailover -o tsv -storage account show -n {sa} -g {rg} --expand geoReplicationStats --query geoReplicationStats.canFailover -o tsv -storage account show -n {sa} -g {rg} --expand geoReplicationStats --query geoReplicationStats.canFailover -o tsv -storage account show -n {sa} -g {rg} --expand geoReplicationStats --query geoReplicationStats.canFailover -o tsv -storage account show -n {sa} -g {rg} --expand geoReplicationStats --query geoReplicationStats.canFailover -o tsv -storage account show -n {sa} -g {rg} --expand geoReplicationStats --query geoReplicationStats.canFailover -o tsv -storage account show -n {sa} -g {rg} --expand geoReplicationStats --query geoReplicationStats.canFailover -o tsv -storage account show -n {sa} -g {rg} --expand geoReplicationStats --query geoReplicationStats.canFailover -o tsv -storage account show -n {sa} -g {rg} --expand geoReplicationStats -storage account failover -n {sa} -g {rg} --no-wait -y -storage account show -n {sa} -g {rg} --expand geoReplicationStats -local-context on -storage account create -g {rg} -n {account_name} --https-only -storage account show -storage account delete -storage account delete -n {account_name} -y -local-context off -local-context delete --all --purge -y -storage account create -n {src_sc} -g {rg} -storage account update -n {src_sc} -g {rg} -r false -storage account update -n {src_sc} -g {rg} -r true -storage account create -n {src_sc} -g {rg} -r false -storage account create -n {src_sc} -g {rg} -r true -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g cli_test_storage_account_ors000001 --query "[0].value" -otsv -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage account blob-service-properties update -n {dest_sc} -g {rg} --enable-versioning -storage account or-policy create -n {dest_sc} -s /subscriptions/1c638cf4-608f-4ee6-b680-c329e824c3a8/resourcegroups/clitest/providers/Microsoft.Storage/storageAccounts/clitestcor --dcont {dcont} --scont {scont} -t "2020-02-19T16:05:00Z" -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g cli_test_storage_account_ors000001 --query "[0].value" -otsv -storage container create -n cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage account keys list -n clitest000003 -g cli_test_storage_account_ors000001 --query "[0].value" -otsv -storage container create -n cont000006 --account-name clitest000003 --account-key veryFakedStorageAccountKey== - -storage account show -n clitest000002 -g cli_test_storage_account_ors000001 --query id -otsv -storage account show -n clitest000003 -g cli_test_storage_account_ors000001 --query id -otsv -storage account show -n clitest000004 -g cli_test_storage_account_ors000001 --query id -otsv -storage account blob-service-properties update -n {src_sc} -g {rg} --enable-change-feed -storage account blob-service-properties update -n {src_sc} -g {rg} --enable-versioning -storage account blob-service-properties update -n {dest_sc} -g {rg} --enable-versioning -storage account or-policy create -n {dest_sc} -s {src_sc} --dcont {dcont} --scont {scont} -t "2020-02-19T16:05:00Z" -storage account or-policy show -g {rg} -n {dest_sc} --policy-id {policy_id} -storage container create -n cont000007 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container create -n cont000008 --account-name clitest000003 --account-key veryFakedStorageAccountKey== - -storage account or-policy rule list -g {rg} -n {dest_sc} --policy-id {policy_id} -storage account or-policy rule show -g {rg} -n {dest_sc} --rule-id {rule_id} --policy-id {policy_id} -storage account or-policy rule add -g cli_test_storage_account_ors000001 -n clitest000003 --policy-id 1d4871a6-67ce-4174-b829-f8b07f3685dd -d cont000008 -s cont000007 -t "2020-02-19T16:05:00Z" -storage account or-policy rule list -g {rg} -n {dest_sc} --policy-id {policy_id} -storage account or-policy rule update -g cli_test_storage_account_ors000001 -n clitest000003 --policy-id 1d4871a6-67ce-4174-b829-f8b07f3685dd --rule-id cab1d6b3-2e67-4173-b44d-7e3fb4d824e8 --prefix-match blobA blobB -t "2020-02-20T16:05:00Z" -storage account or-policy rule show -g cli_test_storage_account_ors000001 -n clitest000003 --policy-id 1d4871a6-67ce-4174-b829-f8b07f3685dd --rule-id cab1d6b3-2e67-4173-b44d-7e3fb4d824e8 -storage account or-policy rule remove -g cli_test_storage_account_ors000001 -n clitest000003 --policy-id 1d4871a6-67ce-4174-b829-f8b07f3685dd --rule-id cab1d6b3-2e67-4173-b44d-7e3fb4d824e8 -storage account or-policy rule list -g {rg} -n {dest_sc} --policy-id {policy_id} -storage account or-policy create -g {rg} -n {src_sc} -d {dest_sc} -s {src_sc} --dcont {dcont} --scont {scont} -storage account or-policy show -g {rg} -n {dest_sc} --policy-id {policy_id} -storage account or-policy create -g {rg} -n {src_sc} -p @"{policy}" -storage account or-policy update -g cli_test_storage_account_ors000001 -n clitest000003 --policy-id 1d4871a6-67ce-4174-b829-f8b07f3685dd --source-account clitest000004 -storage account or-policy delete -g {rg} -n {src_sc} --policy-id {policy_id} -storage account or-policy list -g {rg} -n {src_sc} -storage account or-policy delete -g {rg} -n {dest_sc} --policy-id {policy_id} -storage account or-policy list -g {rg} -n {dest_sc} -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g cli_test_blob_inventory000001 --query "[0].value" -otsv -storage container create -n mycontainer --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage account blob-inventory-policy create --account-name {sa} -g {rg} --policy @"{policy_no_type}" -storage account blob-inventory-policy show --account-name {sa} -g {rg} -storage account blob-service-properties update -n {sa} -g {rg} --enable-versioning -storage account blob-inventory-policy create --account-name {sa} -g {rg} --policy @"{policy}" -storage account blob-inventory-policy show --account-name {sa} -g {rg} -storage account blob-inventory-policy update --account-name {sa} -g {rg} --set "policy.rules[0].name=newname" -storage account blob-inventory-policy show --account-name {sa} -g {rg} -storage account blob-inventory-policy delete --account-name {sa} -g {rg} -y -storage account blob-inventory-policy show --account-name {sa} -g {rg} -storage account hns-migration start --request-type validation -n {sa1} -g {rg} -storage account hns-migration start --request-type upgrade -n {sa1} -g {rg} -storage account hns-migration start --request-type validation -n {sa2} -g {rg} -storage account hns-migration start --request-type upgrade -n {sa2} -g {rg} --no-wait -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -storage account hns-migration stop -n {sa2} -g {rg} -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container policy list --container-name cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container policy create --container-name cont000003 -n test1 --permission l --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container policy create --container-name cont000003 -n test2 --start 2016-01-01T00:00Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container policy create --container-name cont000003 -n test3 --expiry 2018-01-01T00:00Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container policy create --container-name cont000003 -n test4 --permission rwdl --start 2016-01-01T00:00Z --expiry 2016-05-01T00:00Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container policy list --container-name cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container policy show --container-name cont000003 -n test1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container policy show --container-name cont000003 -n test2 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container policy show --container-name cont000003 -n test3 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container policy show --container-name cont000003 -n test4 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container policy update --container-name cont000003 -n test1 --permission r --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container policy show --container-name cont000003 -n test1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container policy delete --container-name cont000003 -n test1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container policy list --container-name cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage share create -n share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share policy list --share-name share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share policy create --share-name share000003 -n test1 --permission l --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share policy create --share-name share000003 -n test2 --start 2016-01-01T00:00Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share policy create --share-name share000003 -n test3 --expiry 2018-01-01T00:00Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share policy create --share-name share000003 -n test4 --permission rwdl --start 2016-01-01T00:00Z --expiry 2016-05-01T00:00Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share policy list --share-name share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share policy show --share-name share000003 -n test1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share policy show --share-name share000003 -n test2 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share policy show --share-name share000003 -n test3 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share policy show --share-name share000003 -n test4 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share policy update --share-name share000003 -n test1 --permission r --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share policy show --share-name share000003 -n test1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share policy delete --share-name share000003 -n test1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share policy list --share-name share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage fs create -n filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file create -p dir000004/file000005 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file show -p dir000004/file000005 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory show -n dir000004 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs access set -f filesystem000003 -p / --acl user::rwx,group::r--,other::--- --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs access show -f filesystem000003 -p / --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs access set -f filesystem000003 -p dir000004/file000005 --permissions rwxrwxrwx --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs access show -f filesystem000003 -p dir000004/file000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage fs create -n filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory exists -n dir000004 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory create -n dir000004 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory exists -n dir000004 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory show -n dir000004 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory create -n dir000004/subdir000005 -f filesystem000003 --permissions rwxrwxrwx --umask 0007 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory show -n dir000004/subdir000005 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory list -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory list -f filesystem000003 --path dir000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory exists -n new_dir -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory move -n dir000004/subdir000005 -f filesystem000003 --new-directory filesystem000003/new_dir --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory exists -n new_dir -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory exists -n dir000004/subdir000005 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory show -n new_dir -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory list -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory list -f filesystem000003 --path dir000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs create -n filesystem000006 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory move -n dir000004 -f filesystem000003 --new-directory filesystem000006/new_dir --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory show -n new_dir -f filesystem000006 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory delete -n new_dir -f filesystem000003 -y --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory delete -n new_dir -f filesystem000006 -y --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory list -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage fs create -n filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file exists -p file000005 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file create -p file000005 -f filesystem000003 --content-type "application/json" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file exists -p file000005 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file show -p file000005 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file append -p file000005 -f filesystem000003 --content testappend --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file show -p file000005 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file upload -p dir000004/file000005 -f filesystem000003 -s "C:\Users\ZELINW~1\AppData\Local\Temp\tmpf7gbpfwu" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file upload -p dir000004/file000005 -f filesystem000003 -s "C:\Users\ZELINW~1\AppData\Local\Temp\tmpehwqi_wh" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file upload -p dir000004/file000005 -f filesystem000003 -s "C:\Users\ZELINW~1\AppData\Local\Temp\tmpehwqi_wh" --overwrite --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file upload -p dir000004/file000005 -f filesystem000003 -s "C:\Users\ZELINW~1\AppData\Local\Temp\tmpehwqi_wh" --overwrite true --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file list -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file list -f filesystem000003 --exclude-dir --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file list --path dir000004 -f filesystem000003 --exclude-dir --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file list -f filesystem000003 --num-results 1 --show-next-marker --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file list -f filesystem000003 --num-results 1 --marker VBa8hL7YxabTv3QYcxhuL2NsaXRlc3R1bWp4d25xMjZveWZvaWhmbgEwMUQ3QkU2QURDQjQ3MjYzL2ZpbGVzeXN0ZW1reHQ2N3ZiN3F1ejdsegEwMUQ3QkU2QUVBNkM0NDE2L2RpcmhuZGRobGQ0Ni9maWxlNmdkM21ieWYWAAAA --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file list -f filesystem000003 --num-results 1 --show-next-marker --exclude-dir --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file download -p dir000004/file000005 -f filesystem000003 -d "C:\Users\ZELINW~1\AppData\Local\Temp\tmpcllj8_ut" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file download -p dir000004/file000005 -f filesystem000003 -d "C:\Users\ZELINW~1\AppData\Local\Temp\tmpcllj8_ut" --overwrite false --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs create -n filesystem000006 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file move -p dir000004/file000005 -f filesystem000003 --new-path filesystem000006/file000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file exists -p dir000004/file000005 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file exists -p file000005 -f filesystem000006 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file delete -p file000005 -f filesystem000006 -y --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file exists -p file000005 -f filesystem000006 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage account show-connection-string -n clitest000002 -g clitest.rg000001 -otsv -storage fs exists -n filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs create -n filesystem000003 --public-access file --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs exists -n filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs show -n filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs create -n filesystem000004 --public-access filesystem --connection-string DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== - -storage fs show -n filesystem000004 --connection-string DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== - -storage fs create -n filesystem000005 --public-access off --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs show -n filesystem000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs list --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs delete -n filesystem000003 -y --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs delete -n filesystem000004 -y --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs delete -n filesystem000005 -y --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage fs create -n filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs metadata update -n filesystem000003 --metadata a=b c=d --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs metadata show -n filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory create -n dir000004 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory metadata update -n dir000004 -f filesystem000003 --metadata foo=bar moo=bak --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs directory metadata show -n dir000004 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file create -p file000005 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file metadata update -p file000005 -f filesystem000003 --metadata test=beta cat=file --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs file metadata show -p file000005 -f filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage fs create -n filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs generate-sas --account-name clitest000002 -n filesystem000003 --expiry 2021-12-04T12:48Z --permissions r --https-only --auth-mode login -storage fs generate-sas --account-name clitest000002 -n filesystem000003 --expiry 2021-12-04T12:48Z --permissions dlrwop --https-only --as-user --auth-mode login -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage fs create -n filesystem000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage fs generate-sas -n filesystem000003 --expiry 2021-12-04T12:48Z --permissions r --https-only --full-uri --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000003 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpl7h3rd5i" -n blob000004 --type append --if-none-match * --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000003 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpl7h3rd5i" -n blob000004 --type append --if-none-match * --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container exists -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container set-permission -n cont000003 --public-access blob --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container show-permission -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container set-permission -n cont000003 --public-access off --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container show-permission -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container show -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container list --query "[].name" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container metadata update -n cont000003 --metadata foo=bar moo=bak --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container metadata show -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container metadata update -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container metadata show -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container lease acquire --lease-duration 60 -c cont000003 --if-modified-since 2016-04-01t12:00z --proposed-lease-id abcdabcd-abcd-abcd-abcd-abcdabcdabcd --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container show --name cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container lease change -c cont000003 --lease-id abcdabcd-abcd-abcd-abcd-abcdabcdabcd --proposed-lease-id dcbadcba-dcba-dcba-dcba-dcbadcbadcba --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container lease renew -c cont000003 --lease-id dcbadcba-dcba-dcba-dcba-dcbadcbadcba --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container show -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container lease break -c cont000003 --lease-break-period 30 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container show --name cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container lease release -c cont000003 --lease-id dcbadcba-dcba-dcba-dcba-dcbadcbadcba --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container show --name cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container generate-sas -n cont000003 --permissions r --expiry 2021-12-04T12:48Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container delete --name cont000003 --fail-not-exist --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container exists -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000003 -n blob000004 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpo2hfwc9c" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob copy cancel -c cont000003 -b blob000004 --copy-id abcdabcd-abcd-abcd-abcd-abcdabcdabcd --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage blob download -c mycontainer -n myblob -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpemuzjpbp" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob generate-sas --account-name clitest000002 -n blob000004 -c cont000003 --expiry 2021-12-04T12:48Z --permissions r --https-only --auth-mode login -storage blob generate-sas --account-name clitest000002 -n blob000004 -c cont000003 --expiry 2021-12-04T12:48Z --permissions r --https-only --as-user --auth-mode login -storage container generate-sas --account-name clitest000002 -n cont000003 --expiry 2021-12-04T12:48Z --permissions r --https-only --as-user --auth-mode login -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob generate-sas -n blob000004 -c cont000003 --expiry 2021-12-04T12:48Z --permissions r --https-only --full-uri --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000004 -n src -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpkqrwk7b7" -t page --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob snapshot -c cont000004 -n src --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage account keys list -n clitest000003 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000005 --account-name clitest000003 --account-key veryFakedStorageAccountKey== - -storage blob incremental-copy start --source-container cont000004 --source-blob src --source-account-name clitest000002 --source-account-key veryFakedStorageAccountKey== - --source-snapshot 2021-09-07T07:11:33.5615303Z --destination-container cont000005 --destination-blob backup --destination-if-modified-since "2020-06-29T06:32Z" --account-name clitest000003 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000003 -n blob000004 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp8noklk9m" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob lease acquire --lease-duration 60 -b blob000004 -c cont000003 --if-modified-since 2016-04-01t12:00z --proposed-lease-id abcdabcd-abcd-abcd-abcd-abcdabcdabcd --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000004 -c cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob lease change -b blob000004 -c cont000003 --lease-id abcdabcd-abcd-abcd-abcd-abcdabcdabcd --proposed-lease-id dcbadcba-dcba-dcba-dcba-dcbadcbadcba --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob lease renew -b blob000004 -c cont000003 --lease-id dcbadcba-dcba-dcba-dcba-dcbadcbadcba --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000004 -c cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob lease break -b blob000004 -c cont000003 --lease-break-period 30 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000004 -c cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob lease release -b blob000004 -c cont000003 --lease-id dcbadcba-dcba-dcba-dcba-dcbadcbadcba --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000004 -c cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000003 -n blob000004 -f "c:\code\azure-cli\src\azure-cli\azure\cli\command_modules\storage\tests\latest\test_storage_blob_scenarios.py" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob metadata update -n blob000004 -c cont000003 --metadata a=b c=d --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob metadata show -n blob000004 -c cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob metadata update -n blob000004 -c cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob metadata show -n blob000004 -c cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c foo -n bar -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp6_dobscz" -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000003 -n blob000004 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp3_5a78jt" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob snapshot -c cont000003 -n blob000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000004 -c cont000003 --snapshot 2021-10-18T07:57:49.9371982Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000004 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp5xgdk_ce" -n blob000003 --type block --socket-timeout -11 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000003 -c cont000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000004 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp5xgdk_ce" -n blob000003 --type block --socket-timeout 10 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000003 -c cont000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000003 -c cont000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob download -n blob000003 -c cont000004 --file "C:\Users\ZELINW~1\AppData\Local\Temp\tmplc69_hha\test.file" --socket-timeout 10 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage blob upload -c cont000003 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpnn5bpx60" -n blob000004 --type block --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage blob list -c cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage blob service-properties delete-policy update --enable true --days-retained 2 --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage blob service-properties delete-policy show --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage blob delete -c cont000003 -n blob000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage blob list -c cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage blob list -c cont000003 --include d --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage blob undelete -c cont000003 -n blob000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage blob list -c cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage blob show -c foo -n bar.txt --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show --account-name clitest000002 --account-key="YQ==" -c foo -n bar.txt -storage account create -n account000002 -g clitest.rg000001 --kind StorageV2 -cloud show --query profile -otsv -storage account keys list -n account000002 -g clitest.rg000001 --query "[0].value" -otsv -storage blob service-properties show --account-name account000002 --account-key veryFakedStorageAccountKey== - -storage blob service-properties update --static-website --index-document index.html --404-document error.html --account-name account000002 --account-key veryFakedStorageAccountKey== - -storage blob service-properties update --delete-retention --delete-retention-period 1 --account-name account000002 --account-key veryFakedStorageAccountKey== - -storage blob service-properties update --set hourMetrics.enabled=false --account-name account000002 --account-key veryFakedStorageAccountKey== - -storage blob service-properties update --set minuteMetrics.enabled=true minuteMetrics.includeApis=true --account-name account000002 --account-key veryFakedStorageAccountKey== - -storage blob service-properties update --set logging.delete=true --account-name account000002 --account-key veryFakedStorageAccountKey== - -storage blob service-properties show --account-name account000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000003 -c cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000005 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp561xq0kc" -n blob000003 --type block --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000003 -c cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000005 -f "C:\Users\ZELINW~1\AppData\Local\Temp\blob000004" --type block --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000004 -c cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c cont000005 -otable --num-results 1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000003 -c cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob generate-sas -n blob000003 -c cont000005 --expiry 2021-12-04T12:50Z --permissions r --https-only --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob update -n blob000003 -c cont000005 --content-type application/test-content --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000003 -c cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob update -n blob000003 -c cont000005 --content-type "" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000003 -c cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob service-properties show --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob download -n blob000003 -c cont000005 --file "C:\Users\ZELINW~1\AppData\Local\Temp\tmpa95rx6_z\test.file" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob download -n blob000003 -c cont000005 --file "C:\Users\ZELINW~1\AppData\Local\Temp\tmpa95rx6_z\test.file" --start-range 10 --end-range 499 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000008 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000006 -c cont000008 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000008 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpsgrfko82" -n blob000006 --type block --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000006 -c cont000008 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000008 -f "C:\Users\ZELINW~1\AppData\Local\Temp\blob000007" --type block --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000007 -c cont000008 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c cont000008 -otable --num-results 1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000006 -c cont000008 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob generate-sas -n blob000006 -c cont000008 --expiry 2021-12-04T12:50Z --permissions r --https-only --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob update -n blob000006 -c cont000008 --content-type application/test-content --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000006 -c cont000008 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob update -n blob000006 -c cont000008 --content-type "" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000006 -c cont000008 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob service-properties show --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob download -n blob000006 -c cont000008 --file "C:\Users\ZELINW~1\AppData\Local\Temp\tmpuu43vfy1\test.file" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob download -n blob000006 -c cont000008 --file "C:\Users\ZELINW~1\AppData\Local\Temp\tmpuu43vfy1\test.file" --start-range 10 --end-range 499 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000003 -c cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000005 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpps1fjg3w" -n blob000003 --type block --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000003 -c cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000005 -f "C:\Users\ZELINW~1\AppData\Local\Temp\blob000004" --type block --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000004 -c cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c cont000005 -otable --num-results 1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000003 -c cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob generate-sas -n blob000003 -c cont000005 --expiry 2021-12-04T12:50Z --permissions r --https-only --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob update -n blob000003 -c cont000005 --content-type application/test-content --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000003 -c cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob update -n blob000003 -c cont000005 --content-type "" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000003 -c cont000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob service-properties show --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob download -n blob000003 -c cont000005 --file "C:\Users\ZELINW~1\AppData\Local\Temp\tmpy8ewji5l\test.file" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob download -n blob000003 -c cont000005 --file "C:\Users\ZELINW~1\AppData\Local\Temp\tmpy8ewji5l\test.file" --start-range 10 --end-range 499 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000008 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000006 -c cont000008 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000008 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpavhyta4t" -n blob000006 --type page --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000006 -c cont000008 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000008 -f "C:\Users\ZELINW~1\AppData\Local\Temp\blob000007" --type page --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob exists -n blob000007 -c cont000008 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c cont000008 -otable --num-results 1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000006 -c cont000008 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob generate-sas -n blob000006 -c cont000008 --expiry 2021-12-04T12:50Z --permissions r --https-only --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob update -n blob000006 -c cont000008 --content-type application/test-content --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000006 -c cont000008 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob update -n blob000006 -c cont000008 --content-type "" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -n blob000006 -c cont000008 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob service-properties show --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob download -n blob000006 -c cont000008 --file "C:\Users\ZELINW~1\AppData\Local\Temp\tmppe3a_7qc\test.file" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob download -n blob000006 -c cont000008 --file "C:\Users\ZELINW~1\AppData\Local\Temp\tmppe3a_7qc\test.file" --start-range 10 --end-range 499 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000003 -n blob000004 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp68g82ugt" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob set-tier -c cont000003 -n blob000004 --tier Cool -r Middle --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob set-tier -c cont000003 -n blob000004 --tier Archive -r High --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob set-tier -c cont000003 -n blob000004 --tier Archive --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -c cont000003 -n blob000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob set-tier -c cont000003 -n blob000004 --tier Cool -r High --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -c cont000003 -n blob000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000003 -n blob000005 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp68g82ugt" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob set-tier -c cont000003 -n blob000005 --tier Archive --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -c cont000003 -n blob000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob set-tier -c cont000003 -n blob000005 --tier Hot --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -c cont000003 -n blob000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000003 -n blob000004 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpvil3x9at" -t page --tier P10 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -c cont000003 -n blob000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob set-tier -c cont000003 -n blob000004 --tier P20 -r High -t page --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob set-tier -c cont000003 -n blob000004 --tier P20 -t page --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -c cont000003 -n blob000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage account blob-service-properties update -n {sa} -g {rg} --enable-versioning -storage container-rm create -n {container} --storage-account {sa} -g {rg} --enable-vlw -storage blob upload -c container000003 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp9sahctpr" -n blob000004 --account-name version000002 --account-key veryFakedStorageAccountKey== -storage blob immutability-policy set -n blob000004 -c container000003 --expiry-time 2021-12-04T12:51Z --policy-mode Unlocked --account-name version000002 --account-key veryFakedStorageAccountKey== -storage blob immutability-policy delete -n blob000004 -c container000003 --account-name version000002 --account-key veryFakedStorageAccountKey== -storage blob set-legal-hold --legal-hold -n blob000004 -c container000003 --account-name version000002 --account-key veryFakedStorageAccountKey== -storage blob set-legal-hold --legal-hold false -n blob000004 -c container000003 --account-name version000002 --account-key veryFakedStorageAccountKey== -cloud show --query profile -otsv -storage account keys list -n storage000002 -g clitest000001 --query "[0].value" -otsv -storage container create -n con000003 --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c con000003 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpgrk_v4tx" -n dir/blob000004 --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c con000003 --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob snapshot -c con000003 -n dir/blob000004 --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c con000003 --include s --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob metadata update -c con000003 -n dir/blob000004 --metadata test=1 --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob metadata show -c con000003 -n dir/blob000004 --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c con000003 --include m --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c con000003 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpgrk_v4tx" -n dir/blob000005 --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c con000003 --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c con000003 --num-results 1 --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c con000003 --num-results 1 --show-next-marker --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c con000003 --marker 2!96!MDAwMDI4IWRpci9ibG9iZnR1cnBybW55aG1odTJmMnhtN20hMDAwMDI4ITk5OTktMTItMzFUMjM6NTk6NTkuOTk5OTk5OVoh --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c con000003 --prefix dir/ --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c con000003 --delimiter "/" --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c con000003 --delimiter "ir" --account-name storage000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c con000003 --account-name storage000002-secondary --account-key veryFakedStorageAccountKey== - -storage account blob-service-properties update --enable-change-feed --enable-delete-retention --delete-retention-days 2 --enable-versioning -n {sa} -storage account blob-service-properties update --enable-restore-policy --restore-days 1 -n {sa} -storage account keys list -n restore000002 -g storage_blob_restore000001 --query "[0].value" -otsv -storage container create -n containera000003 --account-name restore000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c containera000003 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp5zic2ys9" -n blob1000005 --account-name restore000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c containera000003 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp5zic2ys9" -n blob2000006 --account-name restore000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c containera000003 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp5zic2ys9" -n blob3000007 --account-name restore000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c containera000003 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp5zic2ys9" -n blob4000008 --account-name restore000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c containera000003 --account-name restore000002 --account-key veryFakedStorageAccountKey== - -storage container delete -n containera000003 --account-name restore000002 --account-key veryFakedStorageAccountKey== - -storage container create -n containerb000004 --account-name restore000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c containerb000004 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp5zic2ys9" -n blob1000005 --account-name restore000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c containerb000004 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp5zic2ys9" -n blob2000006 --account-name restore000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c containerb000004 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp5zic2ys9" -n blob3000007 --account-name restore000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c containerb000004 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmp5zic2ys9" -n blob4000008 --account-name restore000002 --account-key veryFakedStorageAccountKey== - -storage blob list -c containerb000004 --account-name restore000002 --account-key veryFakedStorageAccountKey== - -storage container delete -n containerb000004 --account-name restore000002 --account-key veryFakedStorageAccountKey== - -storage account blob-service-properties show -n {sa} -storage blob restore -t 2021-12-04T11:51Z -r containera000003/blob1000005 containera000003/blob2000006 --account-name restore000002 -g storage_blob_restore000001 -storage blob restore -t 2021-12-04T11:51Z -r containera000003/blob1000005 containera000003/blob2000006 --account-name restore000002 -g storage_blob_restore000001 --no-wait -storage blob restore -t 2021-12-04T11:51Z -r containera000003/blob2000006 containerb000004/blob3000007 --account-name restore000002 -g storage_blob_restore000001 -storage blob restore -t 2021-12-04T11:51Z --account-name restore000002 -g storage_blob_restore000001 --no-wait -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container create -n cont000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob upload -c cont000003 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpnd21620u" -n src --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob set-tier -c cont000003 -n src --tier Archive --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -c cont000003 -n src --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob url -c cont000003 -n src --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob copy start -b dst -c cont000004 --source-uri "https://clitest000002.blob.core.windows.net/cont000003/src" - --tier Cool -r High --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage blob show -c cont000004 -n dst --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage account blob-service-properties update -n {sa} -g {rg} --enable-versioning -storage container-rm create -n {container1} --storage-account {sa} -g {rg} --enable-vlw -storage container-rm show -n {container1} --storage-account {sa} -g {rg} -storage container-rm create -n {container2} --storage-account {sa} -g {rg} -storage container immutability-policy create -c {container2} --account-name {sa} -g {rg} -w --period 1 -storage container-rm migrate-vlw -n {container2} --storage-account {sa} -g {rg} --no-wait -storage container-rm show -n {container2} --storage-account {sa} -g {rg} -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest000001 --query "[0].value" -otsv -storage container create -n con1000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container create -n con2000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage account blob-service-properties update -n {sa} -g {rg} --container-delete-retention-days 7 --enable-container-delete-retention -storage container list --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container metadata update -n con1000003 --metadata test=1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container metadata show -n con1000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container list --include-metadata --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container list --num-results 1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container list --num-results 1 --show-next-marker --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container list --marker /clitest000002/con2000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container list --prefix con1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container delete -n con2000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container list --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container list --include-deleted --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest000001 --query "[0].value" -otsv -storage container create -n con1000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage account blob-service-properties update -n {sa} -g {rg} --container-delete-retention-days 7 --enable-container-delete-retention -storage container list --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container delete -n con1000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container list --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container list --include-deleted --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container list --include-deleted --query [0].version -o tsv --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container restore -n con1000003 --deleted-version 01D7A3BA487C4FF2 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container list --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container list --include-deleted --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage container create --account-name clitest000002 -n container1 -storage container immutability-policy create --account-name clitest000002 -c container1 -g clitest.rg000001 --period 1 -w -storage container immutability-policy show --account-name clitest000002 -c container1 -g clitest.rg000001 -storage container immutability-policy delete --account-name clitest000002 -c container1 -g clitest.rg000001 --if-match '"8d971cf1c7aaa02"' -storage container immutability-policy show --account-name clitest000002 -c container1 -g clitest.rg000001 -storage container immutability-policy create --account-name clitest000002 -c container1 -g clitest.rg000001 --period 1 -w false -storage container immutability-policy show --account-name clitest000002 -c container1 -g clitest.rg000001 -storage container immutability-policy lock --account-name clitest000002 -c container1 -g clitest.rg000001 --if-match '"8d971cf1f7800f4"' -storage container immutability-policy show --account-name clitest000002 -c container1 -g clitest.rg000001 -storage container immutability-policy delete --account-name clitest000002 -c container1 -g clitest.rg000001 --if-match '"8d971cf20e72a29"' -storage container immutability-policy extend --period 2 --account-name clitest000002 -c container1 -g clitest.rg000001 --if-match '"8d971cf20e72a29"' -storage container delete --account-name clitest000002 -n container1 --bypass-immutability-policy -storage container create --account-name clitest000002 -n container1 -storage container immutability-policy create --account-name clitest000002 -c container1 -g clitest.rg000001 --period 1 --w-all -storage container immutability-policy create --account-name clitest000002 -c container1 -g clitest.rg000001 --period 1 --w-all -w -storage container immutability-policy show --account-name clitest000002 -c container1 -g clitest.rg000001 -storage container immutability-policy delete --account-name clitest000002 -c container1 -g clitest.rg000001 --if-match '"8d981921b962ea7"' -storage container immutability-policy create --account-name clitest000002 -c container1 -g clitest.rg000001 --period 1 --w-all false -storage container immutability-policy create --account-name clitest000002 -c container1 -g clitest.rg000001 --w-all -storage container immutability-policy show --account-name clitest000002 -c container1 -g clitest.rg000001 -storage container immutability-policy lock --account-name clitest000002 -c container1 -g clitest.rg000001 --if-match '"8d981921e3b4b25"' -storage container immutability-policy show --account-name clitest000002 -c container1 -g clitest.rg000001 -storage container immutability-policy extend --account-name clitest000002 -c container1 -g clitest.rg000001 --period 5 --if-match '"8d981921f7aca52"' -storage account create -g clitest.rg000001 -n clistorage000002 --kind StorageV2 -storage container create --account-name clistorage000002 -n container1 --metadata k1=v1 k2=v2 -storage container legal-hold show --account-name clistorage000002 -c container1 -g clitest.rg000001 -storage container legal-hold set --account-name clistorage000002 -c container1 -g clitest.rg000001 --tags tag1 tag2 -storage container legal-hold clear --account-name clistorage000002 -c container1 -g clitest.rg000001 --tags tag1 tag2 -storage container create --account-name clitest000002 -n container1 --metadata k1=v1 k2=v2 -storage container legal-hold show --account-name clitest000002 -c container1 -g clitest.rg000001 -storage container legal-hold set --account-name clitest000002 -c container1 -g clitest.rg000001 --tags tag1 tag2 --w-all -storage container legal-hold clear --account-name clitest000002 -c container1 -g clitest.rg000001 --tags tag1 tag2 -storage container legal-hold set --account-name clitest000002 -c container1 -g clitest.rg000001 --tags tag3 tag4 --w-all false -network vnet create -g {rg} -n {vnet} --subnet-name {subnet} -network vnet subnet update -g {rg} --vnet-name {vnet} -n {subnet} --service-endpoints Microsoft.Storage -storage account create -n {sa} -g {rg} --subnet {subnet_id} --default-action Deny --hns --sku Standard_LRS --enable-nfs-v3 true -storage container-rm create -n {cont} --storage-account {sa} --root-squash RootSquash -storage container-rm update -n {cont} --storage-account {sa} --root-squash AllSquash -storage container-rm update -n {cont} --storage-account {sa} --root-squash NoRootSquash -storage container-rm create --storage-account {sa} -g {rg} -n {container_name} --public-access blob --metadata key1=value1 -d {encryption} --deny-override false -storage container-rm create --storage-account {sa} -g {rg} -n {container_name} --fail-on-exist -storage account show -n {sa} -storage container-rm create --storage-account {storage_account_id} -n {container_name_2} --public-access off -storage container-rm exists --storage-account {sa} -g {rg} -n {container_name} -storage container-rm exists --storage-account {storage_account_id} -n {container_name} -storage container-rm exists --ids {container_id} -storage container-rm show --storage-account {sa} -g {rg} -n {container_name} -storage container-rm show --storage-account {storage_account_id} -n {container_name} -storage container-rm show --ids {container_id} -storage container-rm update --storage-account {sa} -g {rg} -n {container_name} --metadata key2=value2 -storage container-rm update --storage-account {storage_account_id} -n {container_name} --public-access container -storage container-rm update --ids {container_id} --deny-encryption-scope-override true -storage container-rm list --storage-account {sa} --query "[].name" -storage container-rm delete --storage-account {sa} -g {rg} -n {container_name_2} -y -storage container-rm list --storage-account {storage_account_id} --query "[].name" -storage container-rm delete --ids {container_id} -y -storage container-rm list --storage-account {storage_account_id} -storage container-rm show --storage-account {sa} -g {rg} -n {container_name} -storage container-rm exists --storage-account {sa} -g {rg} -n {container_name} -storage account show-connection-string -n clitest000002 -g clitest.rg000001 -otsv -storage cors list --connection-string "DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== -" -storage cors add --method POST --origins http://example.com --services bfq --max-age 60 --connection-string "DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== -" -storage cors add --method GET --origins http://example.com --services bf --connection-string "DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== -" -storage cors list --connection-string "DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== -" -storage cors clear --services bf --connection-string "DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== -" -storage cors list --connection-string "DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== -" -storage cors clear --services q --connection-string "DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== -" -storage cors list --connection-string "DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== -" -storage account encryption-scope create --account-name {sa} -g {rg} -n {encryption} -s Microsoft.KeyVault -storage account encryption-scope update --account-name {sa} -g {rg} -n {encryption} -u keyuri -storage account encryption-scope create -i --account-name {sa} -g {rg} -n {encryption} -storage account encryption-scope show --account-name {sa} -g {rg} -n {encryption} -storage account encryption-scope list --account-name {sa} -g {rg} -storage account encryption-scope update --account-name {sa} -g {rg} -n {encryption} -s Microsoft.KeyVault -storage account update -n {sa} --assign-identity -keyvault set-policy -n {vault} -g {rg} --object-id {sa_pid} --key-permissions get wrapKey unwrapkey -keyvault key create --vault-name {vault} -n {key} -storage account encryption-scope update --account-name {sa} -g {rg} -n {encryption} -u {key_uri} -storage account encryption-scope update --account-name {sa} -g {rg} -n {encryption} -s Microsoft.KeyVault -u {key_uri} -storage account encryption-scope update --account-name {sa} -g {rg} -n {encryption} --state Disabled -storage account encryption-scope update --account-name {sa} -g {rg} -n {encryption} --state Enabled -storage container create -n {con} --account-name {sa} -g {rg} --default-encryption-scope {encryption} -storage container create -n {con} --account-name {sa} -g {rg} --prevent-encryption-scope-override False -storage container create -n {con} --account-name {sa} -g {rg} --default-encryption-scope {encryption} --prevent-encryption-scope-override false --public-access off -cloud show --query profile -otsv -storage account keys list -n encryption000002 -g cli_test_storage_encryption000001 --query "[0].value" -otsv -storage blob upload -c container000006 -n blob000007 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpg926cy4y" --encryption-scope encryption000004 --account-name encryption000002 --account-key veryFakedStorageAccountKey== - -storage account show-connection-string -n {sa} -g {rg} -storage blob upload -c container000006 -n blob000008 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpg926cy4y" --encryption-scope encryption000004 --connection-string "DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=encryption000002;AccountKey=veryFakedStorageAccountKey==" -storage share-rm create --storage-account {sa} -g {rg} -n {share_name_1} --quota {initial_quota} --metadata key1=value1 -storage account show -n {sa} -storage share-rm create --storage-account {storage_account_id} -n {share_name_2} --quota {initial_quota} --metadata key1=value1 -storage share-rm exists --storage-account {sa} -g {rg} -n {share_name_1} -storage share-rm exists --storage-account {storage_account_id} -n {share_name_1} -storage share-rm exists --ids {share_id_1} -storage share-rm show --storage-account {sa} -g {rg} -n {share_name_1} -storage share-rm show --storage-account {storage_account_id} -n {share_name_1} -storage share-rm show --ids {share_id_1} -storage share-rm show --storage-account {sa} -g {rg} -n {non_exist_share_name} -storage share-rm update --storage-account {sa} -g {rg} -n {share_name_1} --quota {updated_quota} --metadata key2=value2 -storage share-rm update --storage-account {storage_account_id} -n {share_name_2} --quota {updated_quota} --metadata key2=value2 -storage share-rm update --ids {share_id_1} --quota {updated_quota} --metadata key2=value2 -storage share-rm list --storage-account {sa} -g {rg} --query "[].name" -storage share-rm list --storage-account {storage_account_id} --query "[].name" -storage share-rm delete --storage-account {sa} -g {rg} -n {share_name_1} -y -storage share-rm delete --ids {share_id_2} -y -storage share-rm exists --storage-account {sa} -g {rg} -n {share_name_1} -storage share-rm exists --ids {share_id_2} -storage account file-service-properties update -n {sa} -g {rg} --delete-retention-days 7 --enable-delete-retention -storage share-rm create --storage-account {sa} -g {rg} -n {share} -storage share-rm list --storage-account {sa} -g {rg} -storage share-rm delete --storage-account {sa} -g {rg} -n {share} -y -storage share-rm list --storage-account {sa} -g {rg} -storage share-rm list --storage-account {sa} -g {rg} --include-deleted -storage share-rm list --storage-account {sa} -g {rg} --include-deleted --query [0].version -o tsv -storage share-rm restore --storage-account {sa} -g {rg} -n {share} --deleted-version {version} -storage share-rm list --storage-account {sa} -g {rg} -storage share-rm create --storage-account {sa} -g {rg} -n {share} --enabled-protocols NFS --root-squash AllSquash -storage share-rm update --storage-account {sa} -g {rg} -n {share} --root-squash NoRootSquash -storage share-rm show --storage-account {sa} -g {rg} -n {share} -storage share-rm list --storage-account {sa} -g {rg} -storage share-rm delete --storage-account {sa} -g {rg} -n {share} -y -storage share-rm list --storage-account {sa} -g {rg} -storage share-rm create --storage-account {sa} -g {rg} -n {share} -storage share-rm show --storage-account {sa} -g {rg} -n {share} -storage share-rm update --storage-account {sa} -g {rg} -n {share} --access-tier Hot -storage share-rm show --storage-account {sa} -g {rg} -n {share} -storage share-rm create --storage-account {sa} -g {rg} -n {new_share} --access-tier Hot -storage share-rm create --storage-account {sa} -g {rg} -n {share} -storage share-rm snapshot --storage-account {sa} -g {rg} -n {share} -q 10 --metadata k1=v1 --access-tier Hot --enabled-protocols SMB --root-squash AllSquash -storage share-rm show --storage-account {sa} -g {rg} -n {share} --snapshot {snapshot} -storage share-rm list --storage-account {sa} -g {rg} --include-snapshot -storage share-rm delete --storage-account {sa} -g {rg} -n {share} -y -storage share-rm delete --storage-account {sa} -g {rg} -n {share} --snapshot {snapshot} -y -storage share-rm list --storage-account {sa} -g {rg} --include-deleted --include-snapshot -storage share-rm show --storage-account {sa} -g {rg} -n {share} --snapshot {snapshot} -storage share-rm delete --storage-account {sa} -g {rg} -n {share} -y -storage share-rm list --storage-account {sa} -g {rg} --include-deleted --include-snapshot -cloud show --query profile -otsv -storage account keys list -n stats000002 -g cli_stats000001 --query "[0].value" -otsv -storage share-rm create -n share000003 --storage-account stats000002 -g cli_stats000001 -storage share-rm stats -n share000003 --storage-account stats000002 -g cli_stats000001 -storage file upload --share-name share000003 --source "C:\Users\ZELINW~1\AppData\Local\Temp\tmp8hdryylo" --path source_file.txt --account-name stats000002 --account-key veryFakedStorageAccountKey== - -storage share-rm stats -n share000003 --storage-account stats000002 -g cli_stats000001 -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage share create -n share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share create -n share000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory create --share-name share000003 -n dir1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory create --share-name share000004 -n dir2 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file upload -p "dir1\source_file.txt" --share-name share000003 --source "C:\Users\ZELINW~1\AppData\Local\Temp\tmp1i6gdqjx" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file exists -p "dir1\source_file.txt" -s share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file url -p "dir1\source_file.txt" -s share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file copy start -s share000004 -p "dir2\destination_file.txt" -u "https://clitest000002.file.core.windows.net/share000003/dir1/source_file.txt" - --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file show --share-name share000004 -p "dir2\destination_file.txt" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file copy start -s share000004 -p "dir2\destination_file.txt" -u "https://clitest000002.file.core.windows.net/share000003/dir1/source_file.txt" - --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file show -s share000004 -p "dir2\destination_file.txt" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file copy start -s share000004 -p "dir2\destination_file.txt" --source-share share000003 --source-path "dir1\source_file.txt" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage share create -n share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share create -n share000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory create --share-name share000003 -n dir1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory create --share-name share000004 -n dir2 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file upload -p "dir1\source_file.txt" --share-name share000003 --source "C:\Users\ZELINW~1\AppData\Local\Temp\tmp0ycdld1q" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file exists -p "dir1\source_file.txt" -s share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share snapshot -n share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file delete --share-name share000003 -p "dir1\source_file.txt" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file exists -p "dir1\source_file.txt" -s share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file copy start -s share000004 -p "dir2\destination_file.txt" --source-share share000003 --source-path "dir1\source_file.txt" --file-snapshot 2021-09-07T07:16:22.0000000Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file show --share-name share000004 -p "dir2\destination_file.txt" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage share create -n share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share create -n share000004 --metadata foo=bar cat=hat --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share exists -n share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share metadata show --name share000004 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share list --query "[].name" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share metadata update --name share000003 --metadata a=b c=d --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share metadata show -n share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share metadata update -n share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share metadata show -n share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share update --name share000003 --quota 3 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share show --name share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share url --name share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share url --name share000003 --unc --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share generate-sas -n share000003 --permissions r --expiry 2046-08-23T10:30Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file upload --share-name share000003 --source "C:\Users\ZELINW~1\AppData\Local\Temp\tmpwo1s5454" -p sample_file.bin --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file exists -s share000003 -p sample_file.bin --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file download --share-name share000003 -p "sample_file.bin" --dest "C:\Users\ZELINW~1\AppData\Local\Temp\tmpa13p39_c" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file download --share-name share000003 -p "sample_file.bin" --dest "C:\Users\ZELINW~1\AppData\Local\Temp\tmpa13p39_c" --start-range 0 --end-range 511 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file resize --share-name share000003 -p "sample_file.bin" --size 1234 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file show -s share000003 -p "sample_file.bin" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file metadata update --share-name share000003 -p "sample_file.bin" --metadata a=b c=d --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file metadata show -s share000003 -p "sample_file.bin" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file metadata update --share-name share000003 -p "sample_file.bin" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file metadata show -s share000003 -p "sample_file.bin" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file url -s share000003 -p "sample_file.bin" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file list -s share000003 --query "[].name" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file generate-sas -s share000003 -p sample_file.bin --permissions r --expiry 2021-12-04T12:55Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file update -s share000003 -p sample_file.bin --content-type "test/type" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file show -s share000003 -p sample_file.bin --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file delete --share-name share000003 -p "sample_file.bin" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file exists --share-name share000003 -p "sample_file.bin" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory create --share-name share000003 --name dir000005 --fail-on-exist --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory list -s share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory exists --share-name share000003 -n dir000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory metadata update -s share000003 -n dir000005 --metadata a=b c=d --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory metadata show --share-name share000003 -n dir000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory show --share-name share000003 -n dir000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory metadata update --share-name share000003 --name dir000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory metadata show --share-name share000003 --name dir000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file upload --share-name share000003 -p "dir000005/testfile.txt" --source "C:\Users\ZELINW~1\AppData\Local\Temp\tmpsf486xac" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file exists --share-name share000003 -p "dir000005/testfile.txt" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file download --share-name share000003 -p "dir000005/testfile.txt" --dest "C:\Users\ZELINW~1\AppData\Local\Temp\tmp233mpgs0" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file list -s share000003 -p dir000005 --query "[].name" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share stats --name share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file delete --share-name share000003 -p "dir000005/testfile.txt" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage file exists -s share000003 -p "testfile.txt" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory delete --share-name share000003 --name dir000005 --fail-not-exist --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory exists --share-name share000003 --name dir000005 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory create --share-name share000003 --name dir000006 --fail-on-exist --metadata foo=bar cat=hat --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory metadata show --share-name share000003 -n dir000006 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage directory delete --share-name share000003 --name dir000006 --fail-not-exist --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage share delete -n share000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -cloud show --query profile -otsv -storage account keys list -n testfilehandlesa -g azure-cli-test-file-handle-rg --query "[0].value" -otsv -storage share list-handle --name file-share --recursive --account-name testfilehandlesa --account-key veryFakedStorageAccountKey== - -storage share list-handle --name file-share --recursive --path dir1 --account-name testfilehandlesa --account-key veryFakedStorageAccountKey== - -storage share list-handle --name file-share --path 'Book1.csv' --account-name testfilehandlesa --account-key veryFakedStorageAccountKey== - -storage share close-handle --name file-share --path 'Book1.csv' --handle-id 117235056741 --account-name testfilehandlesa --account-key veryFakedStorageAccountKey== - -storage share list-handle --name file-share --path 'Book1.csv' --account-name testfilehandlesa --account-key veryFakedStorageAccountKey== - -storage share close-handle --name file-share --path 'dir1' --recursive --close-all --account-name testfilehandlesa --account-key veryFakedStorageAccountKey== - -storage share list-handle --name file-share --path 'dir1/testjson.json' --account-name testfilehandlesa --account-key veryFakedStorageAccountKey== - -storage share close-handle --name file-share --recursive --handle-id '*' --account-name testfilehandlesa --account-key veryFakedStorageAccountKey== - -storage share list-handle --name file-share --recursive --account-name testfilehandlesa --account-key veryFakedStorageAccountKey== - -storage container create -n {container} --account-name {account} --public-access off --auth-mode login -storage blob upload -c {container} -f "{local_file}" -n {blob} --type block --account-name {account} --auth-mode login -storage blob exists -n {blob} -c {container} --account-name {account} --auth-mode login -storage blob list -c {container} --account-name {account} --auth-mode login -storage blob show -c {container} --account-name {account} -n {blob} --auth-mode login -storage blob download -n {blob} -c {container} --file "{download_path}" --account-name {account} --auth-mode login -storage queue create -n {queue} --account-name {account} --fail-on-exist --metadata a=b c=d --auth-mode login -storage queue exists -n {queue} --account-name {account} --auth-mode login -storage queue metadata show -n {queue} --account-name {account} --auth-mode login -storage queue metadata update -n {queue} --account-name {account} --metadata e=f g=h --auth-mode login -storage queue metadata show -n {queue} --account-name {account} --auth-mode login -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage blob upload -c {c} -n {b} -f "{local_file}" --account-name {sa} --auth-mode login -storage blob lease acquire --lease-duration 60 -b {b} -c {c} --account-name {sa} --proposed-lease-id {proposed_lease_id} -o tsv --auth-mode login -storage blob show -n {b} -c {c} --account-name {sa} --auth-mode login -storage blob lease change -b {b} -c {c} --lease-id {proposed_lease_id} --proposed-lease-id {new_lease_id} --account-name {sa} --auth-mode login -storage blob lease renew -b {b} -c {c} --lease-id {new_lease_id} --account-name {sa} --auth-mode login -storage blob show -n {b} -c {c} --account-name {sa} --auth-mode login -storage blob lease break -b {b} -c {c} --lease-break-period 30 --account-name {sa} --auth-mode login -storage blob show -n {b} -c {c} --account-name {sa} --auth-mode login -storage blob lease release -b {b} -c {c} --lease-id {new_lease_id} --account-name {sa} --auth-mode login -storage blob show -n {b} -c {c} --account-name {sa} --auth-mode login -storage container create -n cont000003 --account-name storage000002 --account-key veryFakedStorageAccountKey== -storage blob upload -c {container} -f "{local_file}" -n {blob_name1} --account-name {account} --auth-mode login -storage blob snapshot -c {container} -n {blob_name1} --account-name {account} --auth-mode login -storage blob list -c {container} --include s --account-name {account} --auth-mode login -storage blob metadata update -c {container} -n {blob_name1} --metadata test=1 --account-name {account} --auth-mode login -storage blob metadata show -c {container} -n {blob_name1} --account-name {account} --auth-mode login -storage blob list -c {container} --include m --account-name {account} --auth-mode login -storage blob upload -c {container} -f "{local_file}" -n {blob_name2} --account-name {account} --auth-mode login -storage blob list -c {container} --account-name {account} --auth-mode login -storage blob list -c {container} --num-results 1 --account-name {account} --auth-mode login -storage blob list -c {container} --num-results 1 --show-next-marker --account-name {account} --auth-mode login -storage blob list -c {container} --marker {next_marker} --account-name {account} --auth-mode login -storage blob list -c {container} --prefix dir/ --account-name {account} --auth-mode login -storage blob list -c {container} --delimiter "/" --account-name {account} --auth-mode login -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage blob upload -c {container} -n {block} -f "{local_file}" --account-name {sa} --auth-mode login -storage blob show -c {container} -n {block} --account-name {sa} --auth-mode login -storage blob show -c {container} -n {block} --account-name {sa} --auth-mode login -storage blob upload -c {container} -n {page} -f "{local_file}" --type page --account-name {sa} --auth-mode login -storage blob show -c {container} -n {page} --account-name {sa} --auth-mode login -storage blob snapshot -c {container} -n {block} --account-name {sa} --auth-mode login -storage blob show -c {container} -n {block} --account-name {sa} --auth-mode login -storage blob show -c {container} -n {block} --account-name {sa} --if-match {etag} --auth-mode login -storage blob show -c {container} -n {block} --account-name {sa} --if-match * --auth-mode login -storage blob show -c {container} -n {block} --account-name {sa} --if-none-match {etag} --auth-mode login -storage blob show -c {container} -n {block} --account-name {sa} --if-none-match * --auth-mode login -storage blob show -c {container} -n {block} --account-name {sa} --if-unmodified-since "2020-06-29T06:32Z" --auth-mode login -storage blob show -c {container} -n {block} --account-name {sa} --if-modified-since "2020-06-29T06:32Z" --auth-mode login -storage fs create -n {filesystem} --account-name {account} --auth-mode login -storage fs exists -n {filesystem} --account-name {account} --auth-mode login -storage fs show --n {filesystem} --account-name {account} --auth-mode login -storage fs list --account-name {account} --auth-mode login -storage fs directory create -n {directory} -f {filesystem} --account-name {account} --auth-mode login -storage fs directory exists -n {directory} -f {filesystem} --account-name {account} --auth-mode login -storage fs directory show --n {directory} -f {filesystem} --account-name {account} --auth-mode login -storage fs directory list -f {filesystem} --account-name {account} --auth-mode login -storage fs file create -p {file} -f {filesystem} --account-name {account} --auth-mode login -storage fs file upload -f {filesystem} -s "{local_file}" -p {file} --account-name {account} --auth-mode login -storage fs file exists -p {file} -f {filesystem} --account-name {account} --auth-mode login -storage fs file list -f {filesystem} --account-name {account} --auth-mode login -storage fs file list -f {filesystem} --account-name {account} --exclude-dir --auth-mode login -storage fs file show -p {file} -f {filesystem} --account-name {account} --auth-mode login -storage fs file download -p {file} -f {filesystem} -d "{download_path}" --account-name {account} --auth-mode login -storage fs file move -f {filesystem} -p {file} --new-path {filesystem}/{new_file} --account-name {account} --auth-mode login -storage fs file delete -f {filesystem} -p {new_file} --account-name {account} -y --auth-mode login -storage fs access set --acl "user::rwx,group::r--,other::---,mask::rwx" -f {filesystem} -p {directory} --account-name {account} --auth-mode login -storage fs access show -f {filesystem} -p {directory} --account-name {account} --auth-mode login -storage queue create -n {queue_name1} --metadata key1=value1 --account-name {account} --auth-mode login -storage queue list --account-name {account} --auth-mode login -storage queue list --include-metadata --account-name {account} --auth-mode login -storage queue create -n {queue_name2} --account-name {account} --auth-mode login -storage queue list --account-name {account} --auth-mode login -storage queue list --num-results 1 --account-name {account} --auth-mode login -storage queue list --num-results 1 --show-next-marker --account-name {account} --auth-mode login -storage queue list --marker {next_marker} --account-name {account} --auth-mode login -storage queue list --prefix second --account-name {account} --auth-mode login -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage blob upload -c cont000003 -n blob000004 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpld2ehd1l" --account-name clitest000002 --auth-mode login -storage blob set-tier -c cont000003 -n blob000004 --tier Cool -r Middle --account-name clitest000002 --auth-mode login -storage blob set-tier -c cont000003 -n blob000004 --tier Archive -r High --account-name clitest000002 --auth-mode login -storage blob set-tier -c cont000003 -n blob000004 --tier Archive --account-name clitest000002 --auth-mode login -storage blob show -c cont000003 -n blob000004 --account-name clitest000002 --auth-mode login -storage blob set-tier -c cont000003 -n blob000004 --tier Cool -r High --account-name clitest000002 --auth-mode login -storage blob show -c cont000003 -n blob000004 --account-name clitest000002 --auth-mode login -storage blob upload -c cont000003 -n blob000005 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpld2ehd1l" --account-name clitest000002 --auth-mode login -storage blob set-tier -c cont000003 -n blob000005 --tier Archive --account-name clitest000002 --auth-mode login -storage blob show -c cont000003 -n blob000005 --account-name clitest000002 --auth-mode login -storage blob set-tier -c cont000003 -n blob000005 --tier Hot --account-name clitest000002 --auth-mode login -storage blob show -c cont000003 -n blob000005 --account-name clitest000002 --auth-mode login -storage container create -n cont000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== -storage blob upload -c cont000003 -n blob000004 -f "C:\Users\ZELINW~1\AppData\Local\Temp\tmpk_ijxjha" -t page --tier P10 --account-name clitest000002 --auth-mode login -storage blob show -c cont000003 -n blob000004 --account-name clitest000002 --auth-mode login -storage blob set-tier -c cont000003 -n blob000004 --tier P20 -r High -t page --account-name clitest000002 --auth-mode login -storage blob set-tier -c cont000003 -n blob000004 --tier P20 -t page --account-name clitest000002 --auth-mode login -storage blob show -c cont000003 -n blob000004 --account-name clitest000002 --auth-mode login -storage account show-connection-string -n clitest000002 -g clitest.rg000001 --query connectionString -otsv -storage queue create -n queue000003 --fail-on-exist --metadata a=b c=d -storage queue exists -n queue000003 -storage queue list -storage queue list --connection-string DefaultEndpointsProtocol=https;EndpointSuffix=core.windows.net;AccountName=clitest000002;AccountKey=veryFakedStorageAccountKey== -storage queue generate-sas -n queue000003 --permissions r --expiry 2021-12-04T12:57Z -storage queue metadata show -n queue000003 -storage queue metadata update -n queue000003 --metadata e=f g=h -storage queue metadata show -n queue000003 -storage queue policy list -q queue000003 -storage queue policy create -q queue000003 -n policy000004 --permission raup --start 2016-01-01T00:00Z --expiry 2021-12-04T12:57Z -storage queue policy list -q queue000003 -storage queue policy show -q queue000003 -n policy000004 -storage queue policy update -q queue000003 -n policy000004 --permission ra -storage queue policy show -q queue000003 -n policy000004 -storage queue policy delete -q queue000003 -n policy000004 -storage queue policy list -q queue000003 -storage message put -q queue000003 --content "test message" -storage message peek -q queue000003 -storage message get -q queue000003 -storage message update -q queue000003 --id fc5424df-0519-49bb-a1ac-c6874e8ef9cd --pop-receipt AgAAAAMAAAAAAAAA/8of6b2j1wE= --visibility-timeout 1 --content "new message!" -storage message peek -q queue000003 -storage message put -q queue000003 --content "second message" -storage message put -q queue000003 --content "third message" -storage message peek -q queue000003 --num-messages 32 -storage message get -q queue000003 -storage message delete -q queue000003 --id fc5424df-0519-49bb-a1ac-c6874e8ef9cd --pop-receipt AgAAAAMAAAAAAAAAJLkX7r2j1wE= -storage message peek -q queue000003 --num-messages 32 -storage message clear -q queue000003 -storage message peek -q queue000003 --num-messages 32 -storage queue delete -n queue000003 --fail-not-exist -storage queue exists -n queue000003 -storage queue stats -cloud show --query profile -otsv -storage account keys list -n clitest000002 -g clitest.rg000001 --query "[0].value" -otsv -storage table create -n table000003 --fail-on-exist --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table exists -n table000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table list --query "[].name" --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table generate-sas -n table000003 --permissions r --expiry 2021-12-04T12:57Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage entity insert -t table000003 -e rowkey=001 partitionkey=001 name=test value=something binaryProperty=AAECAwQF binaryProperty@odata.type=Edm.Binary --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage entity show -t table000003 --row-key 001 --partition-key 001 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage entity show -t table000003 --row-key 001 --partition-key 001 --select name --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage entity merge -t table000003 -e rowkey=001 partitionkey=001 name=test value=newval --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage entity show -t table000003 --row-key 001 --partition-key 001 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage entity replace -t table000003 -e rowkey=001 partitionkey=001 cat=hat --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage entity show -t table000003 --row-key 001 --partition-key 001 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage entity delete -t table000003 --row-key 001 --partition-key 001 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage entity show -t table000003 --row-key 001 --partition-key 001 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage entity insert -t table000003 -e rowkey=001 partitionkey=001 name=test value=something binaryProperty=AAECAwQF binaryProperty@odata.type=Edm.Binary --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage entity insert -t table000003 -e rowkey=002 partitionkey=002 name=test2 value=something2 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage entity query -t table000003 --num-results 1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage entity query -t table000003 --marker nextpartitionkey=1!4!MDAy nextrowkey=1!4!MDAy --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table policy list -t table000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table policy create -t table000003 -n test1 --permission a --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table policy create -t table000003 -n test2 --start 2016-01-01T00:00Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table policy create -t table000003 -n test3 --expiry 2018-01-01T00:00Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table policy create -t table000003 -n test4 --permission raud --start 2016-01-01T00:00Z --expiry 2016-05-01T00:00Z --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table policy list -t table000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table policy show -t table000003 -n test1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table policy show -t table000003 -n test2 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table policy show -t table000003 -n test3 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table policy show -t table000003 -n test4 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table policy update -t table000003 -n test1 --permission au --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table policy show -t table000003 -n test1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table policy delete -t table000003 -n test1 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table policy list -t table000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table delete --name table000003 --fail-not-exist --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table exists -n table000003 --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -storage table stats --account-name clitest000002 --account-key veryFakedStorageAccountKey== - -synapse role scope list --workspace-name {workspace} -synapse role definition list --workspace-name {workspace} -synapse role definition show --workspace-name {workspace} --role "{role}" -synapse role assignment create --workspace-name {workspace} --role "{role}" --assignee {servicePrincipal} --assignment-id 0550e787-7841-4669-9ac8-a8176e900002 -synapse role assignment create --workspace-name {workspace} --role "{role}" --assignee {servicePrincipal} --item-type {itemType} --item {item} --assignment-id 0333e787-7841-4669-9ac8-a8176e900002 -synapse role assignment show --workspace-name {workspace} --id {roleAssignmentId} -synapse role assignment list --workspace-name {workspace} --role "{role}" --item-type {itemType} --item {item} -synapse role assignment list --workspace-name {workspace} --assignee {servicePrincipal} -synapse role assignment list --workspace-name {workspace} --assignee-object-id {principalId} -synapse role assignment delete --workspace-name {workspace} --ids {roleAssignmentId} -y -synapse role assignment show --workspace-name {workspace} --id {roleAssignmentId} -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace firewall-rule create --resource-group {rg} --name allowAll --workspace-name {workspace} --start-ip-address 0.0.0.0 --end-ip-address 255.255.255.255 -synapse dataset create --workspace-name {workspace} --name {name} --file {file} -synapse dataset show --workspace-name {workspace} --name {name} -synapse dataset list --workspace-name {workspace} -synapse dataset delete --workspace-name {workspace} --name {name} -y -synapse dataset show --workspace-name {workspace} --name {name} -synapse integration-runtime managed create --resource-group {rg} --workspace-name {workspace} --name {name} -synapse integration-runtime self-hosted create --resource-group {rg} --workspace-name {workspace} --name {selfhosted-name} -synapse integration-runtime show --resource-group {rg} --workspace-name {workspace} --name {name} -synapse integration-runtime list --resource-group {rg} --workspace-name {workspace} -synapse integration-runtime delete --resource-group {rg} --workspace-name {workspace} --name {name} -y -synapse integration-runtime show --resource-group {rg} --workspace-name {workspace} --name {name} -synapse integration-runtime upgrade --resource-group {rg} --workspace-name {workspace} --name {selfhosted-integration-runtime} -synapse integration-runtime list-auth-key --resource-group {rg} --workspace-name {workspace} --name {selfhosted-integration-runtime} -synapse integration-runtime regenerate-auth-key --resource-group {rg} --workspace-name {workspace} --name {selfhosted-integration-runtime} --key-name authKey1 -synapse integration-runtime get-monitoring-data --resource-group {rg} --workspace-name {workspace} --name {selfhosted-integration-runtime} -synapse integration-runtime sync-credentials --resource-group {rg} --workspace-name {workspace} --name {selfhosted-integration-runtime} -synapse integration-runtime get-status --resource-group {rg} --workspace-name {workspace} --name {selfhosted-integration-runtime} -synapse integration-runtime start --resource-group {rg} --workspace-name {workspace} --name {ssisirname} -synapse integration-runtime stop --resource-group {rg} --workspace-name {workspace} --name {ssisirname} -y -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace check-name --name {workspace} -synapse workspace firewall-rule create --name {ruleName} --workspace-name {workspace} --resource-group {rg} --start-ip-address {startIpAddress} --end-ip-address {endIpAddress} -synapse workspace firewall-rule show --name {ruleName} --workspace-name {workspace} --resource-group {rg} -synapse workspace firewall-rule update --name {ruleName} --workspace-name {workspace} --resource-group {rg} --start-ip-address {secondIpAddress} -synapse workspace firewall-rule list --workspace-name {workspace} --resource-group {rg} -synapse workspace firewall-rule delete --name {ruleName} --workspace-name {workspace} --resource-group {rg} --yes -synapse workspace firewall-rule show --name {ruleName} --workspace-name {workspace} --resource-group {rg} -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace check-name --name {workspace} -synapse kusto pool create --name "{kustoPool}" --location "{location}" --enable-purge true --enable-streaming-ingest true --sku name="Storage optimized" capacity=2 size="Medium" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool create --name "{leaderkustoPool}" --location "{location}" --enable-purge true --enable-streaming-ingest true --sku name="Storage optimized" capacity=2 size="Medium" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database create --database-name "{database}" --kusto-pool-name "{leaderkustoPool}" --read-write-database location="{location}" soft-delete-period="P1D" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool show --name "{leaderkustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool show --name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto attached-database-configuration create --attached-database-configuration-name "{database-configuration-name}" --kusto-pool-name "{kustoPool}" --location "{location}" --kusto-pool-resource-id "{leaderkpoolsourceid}" --database-name "{database}" --default-principals-modification-kind "Union" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto attached-database-configuration show --attached-database-configuration-name "{database-configuration-name}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto attached-database-configuration list --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto attached-database-configuration update --attached-database-configuration-name "{database-configuration-name}" --kusto-pool-name "{kustoPool}" --location "{location}" --kusto-pool-resource-id "{leaderkpoolsourceid}" --database-name "{database}" --default-principals-modification-kind "Union" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool detach-follower-database --attached-database-configuration-name "{database-configuration-name}" --kusto-pool-resource-id "{kpoolsourceid}" --name "{leaderkustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto attached-database-configuration create --attached-database-configuration-name "{database-configuration-name}" --kusto-pool-name "{kustoPool}" --location "{location}" --kusto-pool-resource-id "{leaderkpoolsourceid}" --database-name "{database}" --default-principals-modification-kind "Union" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto attached-database-configuration delete -y --attached-database-configuration-name "{database-configuration-name}" --kusto-pool-name "{leaderkustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto attached-database-configuration show --attached-database-configuration-name "{database-configuration-name}" --kusto-pool-name "{leaderkustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace check-name --name {workspace} -synapse kusto pool create --name "{kustoPool}" --location "{location}" --enable-purge true --enable-streaming-ingest true --sku name="Storage optimized" capacity=2 size="Medium" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database create --database-name "{database}" --kusto-pool-name "{kustoPool}" --read-write-database location="{location}" soft-delete-period="P1D" --resource-group "{rg}" --workspace-name "{workspace}" -eventhubs namespace create --resource-group {rg} -n {eventhub_namespace} --location eastus -eventhubs eventhub create --resource-group {rg} -n {eventhub_name} --namespace-name {eventhub_namespace} -synapse kusto data-connection event-grid create --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --location "{location}" --consumer-group "$Default" --event-hub-resource-id "{ehresourceid}" --storage-account-resource-id "/subscriptions/{subscription_id}/resourceGroups/{rg}/providers/Microsoft.Storage/storageAccounts/{storage-account}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection show --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection list --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection event-grid update --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --location "{location}" --consumer-group "$Default" --event-hub-resource-id "{ehresourceid}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection delete -y --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection show --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace check-name --name {workspace} -synapse kusto pool create --name "{kustoPool}" --location "{location}" --enable-purge true --enable-streaming-ingest true --sku name="Storage optimized" capacity=2 size="Medium" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database create --database-name "{database}" --kusto-pool-name "{kustoPool}" --read-write-database location="{location}" soft-delete-period="P1D" --resource-group "{rg}" --workspace-name "{workspace}" -eventhubs namespace create --resource-group {rg} -n {eventhub_namespace} --location eastus -eventhubs eventhub create --resource-group {rg} -n {eventhub_name} --namespace-name {eventhub_namespace} -synapse kusto data-connection event-hub create --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --location "{location}" --consumer-group "$Default" --event-hub-resource-id "{ehresourceid}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection show --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection list --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection event-hub update --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --location "{location}" --consumer-group "$Default" --event-hub-resource-id "{ehresourceid}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection delete -y --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection show --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace check-name --name {workspace} -synapse kusto pool create --name "{kustoPool}" --location "{location}" --enable-purge true --enable-streaming-ingest true --sku name="Storage optimized" capacity=2 size="Medium" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database create --database-name "{database}" --kusto-pool-name "{kustoPool}" --read-write-database location="{location}" soft-delete-period="P1D" --resource-group "{rg}" --workspace-name "{workspace}" -iot hub create --resource-group "{rg}" --name "{iotHubName}" --location "{location}" -synapse kusto data-connection iot-hub create --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --location "{location}" --consumer-group "$Default" --iot-hub-resource-id "{iotresourceid}" --shared-access-policy-name "{iotHubSharedAccessPolicyName}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection show --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection list --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection iot-hub update --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --location "{location}" --consumer-group "$Default" --iot-hub-resource-id "{iotresourceid}" --shared-access-policy-name "{iotHubSharedAccessPolicyName}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection delete -y --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto data-connection show --data-connection-name "{dataConnectionName}" --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace check-name --name {workspace} -synapse kusto pool create --name "{kustoPool}" --location "{location}" --enable-purge true --enable-streaming-ingest true --sku name="Storage optimized" capacity=2 size="Medium" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database create --database-name "{database}" --kusto-pool-name "{kustoPool}" --read-write-database location="{location}" soft-delete-period="P1D" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database list --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database show --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database update --database-name "{database}" --kusto-pool-name "{kustoPool}" --read-write-database soft-delete-period="P1D" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database delete -y --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database show --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace check-name --name {workspace} -synapse kusto pool create --name "{kustoPool}" --location "{location}" --enable-purge true --enable-streaming-ingest true --sku name="Storage optimized" capacity=2 size="Medium" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database create --database-name "{database}" --kusto-pool-name "{kustoPool}" --read-write-database location="{location}" soft-delete-period="P1D" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database-principal-assignment create --database-name "{database}" --kusto-pool-name "{kustoPool}" --principal-id "{principalId}" --principal-type "App" --role "Admin" --principal-assignment-name "{principalAssignmentName}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database-principal-assignment show --database-name "{database}" --kusto-pool-name "{kustoPool}" --principal-assignment-name "{principalAssignmentName}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database-principal-assignment list --database-name "{database}" --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database-principal-assignment update --database-name "{database}" --kusto-pool-name "{kustoPool}" --principal-id "{principalId}" --principal-type "App" --role "Admin" --principal-assignment-name "{principalAssignmentName}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database-principal-assignment delete -y --database-name "{database}" --kusto-pool-name "{kustoPool}" --principal-assignment-name "{principalAssignmentName}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database-principal-assignment show --database-name "{database}" --kusto-pool-name "{kustoPool}" --principal-assignment-name "{principalAssignmentName}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace check-name --name {workspace} -synapse kusto pool create --name "{kustoPool}" --location "{location}" --enable-purge true --enable-streaming-ingest true --sku name="Storage optimized" capacity=2 size="Medium" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool show --name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool list-sku --name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool list --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool update --name "{kustoPool}" --enable-purge true --enable-streaming-ingest true --sku name="Storage optimized" capacity=2 size="Medium" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool add-language-extension --name "{kustoPool}" --value language-extension-name="PYTHON" --value language-extension-name="R" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool list-language-extension --name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool remove-language-extension --name "{kustoPool}" --value language-extension-name="PYTHON" --value language-extension-name="R" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool start --name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool stop --name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace check-name --name {workspace} -synapse kusto pool create --name "{kustoPool}" --location "{location}" --enable-purge true --enable-streaming-ingest true --sku name="Storage optimized" capacity=2 size="Medium" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto database create --database-name "{database}" --kusto-pool-name "{kustoPool}" --read-write-database location="{location}" soft-delete-period="P1D" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool-principal-assignment create --kusto-pool-name "{kustoPool}" --principal-id "{principalId}" --principal-type "App" --role "AllDatabasesAdmin" --principal-assignment-name "{principalAssignmentName}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool-principal-assignment show --kusto-pool-name "{kustoPool}" --principal-assignment-name "{principalAssignmentName}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool-principal-assignment list --kusto-pool-name "{kustoPool}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool-principal-assignment update --kusto-pool-name "{kustoPool}" --principal-id "{principalId}" --principal-type "App" --role "AllDatabasesAdmin" --principal-assignment-name "{principalAssignmentName}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool-principal-assignment delete -y --kusto-pool-name "{kustoPool}" --principal-assignment-name "{principalAssignmentName}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse kusto pool-principal-assignment show --kusto-pool-name "{kustoPool}" --principal-assignment-name "{principalAssignmentName}" --resource-group "{rg}" --workspace-name "{workspace}" -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace firewall-rule create --resource-group {rg} --name allowAll --workspace-name {workspace} --start-ip-address 0.0.0.0 --end-ip-address 255.255.255.255 -synapse linked-service create --workspace-name {workspace} --name {name} --file @"{file}" -synapse linked-service show --workspace-name {workspace} --name {name} -synapse linked-service list --workspace-name {workspace} -synapse linked-service delete --workspace-name {workspace} --name {name} -y -synapse linked-service show --workspace-name {workspace} --name {name} -synapse managed-private-endpoints create --workspace-name {workspace} --pe-name {name} --resource-id {privateLinkResourceId} --group-Id {groupId} -synapse managed-private-endpoints show --workspace-name {workspace} --pe-name {name} -synapse managed-private-endpoints list --workspace-name {workspace} -synapse managed-private-endpoints delete --workspace-name {workspace} --pe-name {name} -y -synapse managed-private-endpoints show --workspace-name {workspace} --pe-name {name} -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} --enable-managed-virtual-network -synapse workspace show --name {workspace} --resource-group {rg} -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace firewall-rule create --resource-group {rg} --name allowAll --workspace-name {workspace} --start-ip-address 0.0.0.0 --end-ip-address 255.255.255.255 -synapse spark pool create --name {spark-pool} --spark-version {spark-version} --workspace {workspace} --resource-group {rg} --node-count 3 --node-size Medium -synapse notebook create --workspace-name {workspace} --name {name} --file @"{file}" --spark-pool-name {spark-pool} --folder-path {folder_path} -synapse notebook show --workspace-name {workspace} --name {name} -synapse notebook list --workspace-name {workspace} -synapse notebook export --workspace-name {workspace} --name {name} --output-folder "{output-folder}" -synapse notebook delete --workspace-name {workspace} --name {name} -y -synapse notebook show --workspace-name {workspace} --name {name} -synapse pipeline create --workspace-name {workspace} --name {name} --file @"{file}" -synapse pipeline show --workspace-name {workspace} --name {name} -synapse pipeline list --workspace-name {workspace} -synapse pipeline create-run --workspace-name {workspace} --name {name} -synapse pipeline-run cancel --workspace-name {workspace} --run-id {runId} -y -synapse pipeline-run show --workspace-name {workspace} --run-id {runId} -synapse pipeline-run query-by-workspace --workspace-name {workspace} --last-updated-after 2020-09-01T00:36:44.3345758Z --last-updated-before 2020-10-16T00:36:44.3345758Z -synapse activity-run query-by-pipeline-run --workspace-name {workspace} --name {name} --run-id {runId} --last-updated-after 2020-09-01T00:36:44.3345758Z --last-updated-before 2020-10-16T00:36:44.3345758Z -synapse pipeline delete --workspace-name {workspace} --name {name} -y -synapse pipeline show --workspace-name {workspace} --name {name} -synapse spark job submit --name {job} --workspace-name {workspace} --spark-pool-name {spark-pool} --main-definition-file {main-definition-file} --main-class-name {main-class-name} --arguments {arguments} --executors {executors} --executor-size {executor-size} --configuration {configuration} -synapse spark job show --livy-id {batch-id} --workspace-name {workspace} --spark-pool-name {spark-pool} -synapse spark job list --workspace-name {workspace} --spark-pool-name {spark-pool} -synapse spark job cancel --livy-id {batch-id} --workspace-name {workspace} --spark-pool-name {spark-pool} --yes -synapse spark job show --livy-id {batch-id} --workspace-name {workspace} --spark-pool-name {spark-pool} -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace firewall-rule create --resource-group {rg} --name allowAll --workspace-name {workspace} --start-ip-address 0.0.0.0 --end-ip-address 255.255.255.255 -synapse spark pool create --name {spark-pool} --spark-version {spark-version} --workspace {workspace} --resource-group {rg} --node-count 3 --node-size Medium -synapse spark-job-definition create --workspace-name {workspace} --name {name} --file @"{file}" --folder-path {folder_path} -synapse spark-job-definition show --workspace-name {workspace} --name {name} -synapse spark-job-definition list --workspace-name {workspace} -synapse spark-job-definition delete --workspace-name {workspace} --name {name} -synapse spark-job-definition show --workspace-name {workspace} --name {name} -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace check-name --name {workspace} -synapse spark pool create --name {spark-pool} --spark-version {spark-version} --workspace {workspace} --resource-group {rg} --node-count 3 --node-size Medium --spark-config-file-path "{file}" -synapse spark pool show --name {spark-pool} --workspace {workspace} --resource-group {rg} -synapse spark pool list --workspace {workspace} --resource-group {rg} -synapse spark pool update --ids {pool-id} --tags key1=value1 --spark-config-file-path "{file}" -synapse spark pool delete --name {spark-pool} --workspace {workspace} --resource-group {rg} --yes -synapse spark pool show --name {spark-pool} --workspace {workspace} --resource-group {rg} -synapse spark session create --name {job} --workspace-name {workspace} --spark-pool-name {spark-pool} --executor-size {executor-size} --executors {executors} -synapse spark session show --livy-id {session-id} --workspace-name {workspace} --spark-pool-name {spark-pool} -synapse spark session list --workspace-name {workspace} --spark-pool-name {spark-pool} -synapse spark session reset-timeout --livy-id {session-id} --workspace-name {workspace} --spark-pool-name {spark-pool} -synapse spark statement invoke --session-id {session-id} --workspace-name {workspace} --spark-pool-name {spark-pool} --code {code} --language {language} -synapse spark statement show --livy-id {statement-id} --session-id {session-id} --workspace-name {workspace} --spark-pool-name {spark-pool} -synapse spark statement list --session-id {session-id} --workspace-name {workspace} --spark-pool-name {spark-pool} -synapse spark statement cancel --livy-id {statement-id} --session-id {session-id} --workspace-name {workspace} --spark-pool-name {spark-pool} --yes -synapse spark session cancel --livy-id {session-id} --workspace-name {workspace} --spark-pool-name {spark-pool} --yes -synapse spark session show --livy-id {session-id} --workspace-name {workspace} --spark-pool-name {spark-pool} -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse sql ad-admin create --workspace-name {workspace} --resource-group {rg} --display-name {user-name} --object-id {object-id} -synapse sql ad-admin show --workspace-name {workspace} --resource-group {rg} -synapse sql ad-admin update --workspace-name {workspace} --resource-group {rg} --display-name {user-email} -synapse sql ad-admin delete --workspace-name {workspace} --resource-group {rg} -y -synapse sql ad-admin show --workspace-name {workspace} --resource-group {rg} -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace check-name --name {workspace} -synapse sql pool create --name {sql-pool} --performance-level {performance-level} --workspace {workspace} --resource-group {rg} -synapse sql pool show --name {sql-pool} --workspace {workspace} --resource-group {rg} -synapse sql pool list --workspace {workspace} --resource-group {rg} -synapse sql pool update --ids {pool-id} --tags key1=value1 -synapse sql pool show --ids {pool-id} -synapse sql pool pause --name {sql-pool} --workspace {workspace} --resource-group {rg} -synapse sql pool show --name {sql-pool} --workspace {workspace} --resource-group {rg} -synapse sql pool resume --name {sql-pool} --workspace {workspace} --resource-group {rg} -synapse sql pool show --name {sql-pool} --workspace {workspace} --resource-group {rg} -synapse sql pool delete --name {sql-pool} --workspace {workspace} --resource-group {rg} --yes -synapse sql pool show --name {sql-pool} --workspace {workspace} --resource-group {rg} -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse sql pool create --name {sql-pool} --performance-level {performance-level} --workspace {workspace} --resource-group {rg} -storage account show -g synapse-cli000001 -n adlsgen2000002 --query primaryEndpoints.blob -storage account keys list -g synapse-cli000001 -n adlsgen2000002 --query [0].value -synapse sql pool audit-policy show --workspace-name {workspace} --resource-group {rg} --name {sql-pool} -synapse sql pool audit-policy update --resource-group {rg} --workspace-name {workspace} --name {sql-pool} --state Enabled --bsts Enabled --storage-key {storage-key} --storage-endpoint={storage-endpoint} --retention-days={retention-days} --actions {audit-actions-input} -synapse sql pool audit-policy show --workspace-name {workspace} --resource-group {rg} --name {sql-pool} -synapse sql pool audit-policy update --resource-group {rg} --workspace-name {workspace} --name {sql-pool} --state Enabled --bsts Enabled --storage-account {storage-account} --retention-days={retention-days} --actions {audit-actions-input} -synapse sql pool audit-policy update --resource-group {rg} --workspace-name {workspace} --name {sql-pool} --state Disabled -monitor log-analytics workspace create --resource-group {rg} --workspace-name {log_analytics_workspace_name} -synapse sql pool audit-policy update --resource-group {rg} --workspace-name {workspace} --name {sql-pool} --state Enabled --lats Enabled --lawri {log_analytics_workspace_id} -synapse sql pool audit-policy show --resource-group {rg} --workspace-name {workspace} --name {sql-pool} -synapse sql pool audit-policy update --resource-group {rg} --workspace-name {workspace} --name {sql-pool} --state Enabled --lats Disabled -synapse sql pool audit-policy show --resource-group {rg} --workspace-name {workspace} --name {sql-pool} -eventhubs namespace create --resource-group {rg} -n {eventhub_namespace} --location eastus -eventhubs eventhub create --resource-group {rg} -n {eventhub_name} --namespace-name {eventhub_namespace} -eventhubs namespace authorization-rule create --resource-group {rg} -n {eventhub_auth_rule} --namespace-name {eventhub_namespace} --rights Listen Manage Send -synapse sql pool audit-policy update --resource-group {rg} --workspace-name {workspace} --name {sql-pool} --state Enabled --event-hub-target-state Enabled --ehari {eventhub_auth_rule_id} --event-hub {eventhub_name} -synapse sql pool audit-policy show --resource-group {rg} --workspace-name {workspace} --name {sql-pool} -synapse sql pool audit-policy update --resource-group {rg} --workspace-name {workspace} --name {sql-pool} --state Enabled --event-hub-target-state Disabled -synapse sql pool audit-policy show --resource-group {rg} --workspace-name {workspace} --name {sql-pool} -synapse sql pool classification create --name {sql-pool} --workspace-name {workspace} --resource-group {rg} --schema {schema} --table {table} --column {column} --label {label} --information-type {information-type} -synapse sql pool classification show --name {sql-pool} --workspace-name {workspace} --resource-group {rg} --schema {schema} --table {table} --column {column} -synapse sql pool classification list --name {sql-pool} --workspace-name {workspace} --resource-group {rg} -synapse sql pool classification update --name {sql-pool} --workspace-name {workspace} --resource-group {rg} --schema {schema} --table {table} --column {column} --label {label} --information-type {information-type} -synapse sql pool classification delete --name {sql-pool} --workspace-name {workspace} --resource-group {rg} --schema {schema} --table {table} --column {column} -synapse sql pool classification recommendation enable --name {sql-pool} --workspace-name {workspace} --resource-group {rg} --schema {schema} --table {table} --column {column} -synapse sql pool classification recommendation list --name {sql-pool} --workspace-name {workspace} --resource-group {rg} -synapse sql pool classification recommendation disable --name {sql-pool} --workspace-name {workspace} --resource-group {rg} --schema {schema} --table {table} --column {column} -synapse sql pool classification recommendation list --name {sql-pool} --workspace-name {workspace} --resource-group {rg} -synapse sql pool restore --name {sql-pool} --workspace-name {workspace} --resource-group {rg} --dest-name {dest-sql-pool} --time {restore-point-time} -synapse sql pool show --name {dest-sql-pool} --workspace-name {workspace} --resource-group {rg} -synapse sql pool delete --name {dest-sql-pool} --workspace-name {workspace} --resource-group {rg} --yes -synapse sql pool list-deleted --workspace-name {workspace} --resource-group {rg} -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse sql pool create --name {sql-pool} --performance-level {performance-level} --workspace {workspace} --resource-group {rg} -synapse sql pool tde set --status Enabled --name {sql-pool} --workspace-name {workspace} --resource-group {rg} --transparent-data-encryption-name current -synapse sql pool tde show --name {sql-pool} --workspace-name {workspace} --resource-group {rg} --transparent-data-encryption-name current -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse sql pool create --name {sql-pool} --performance-level {performance-level} --workspace {workspace} --resource-group {rg} -synapse sql pool threat-policy update --state Enabled --storage-account {storage-account} --name {sql-pool} --workspace-name {workspace} --resource-group {rg} --security-alert-policy-name {threat-policy} -synapse sql pool threat-policy show --name {sql-pool} --workspace-name {workspace} --resource-group {rg} --security-alert-policy-name {threat-policy} -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -storage account show -g synapse-cli000001 -n adlsgen2000002 --query primaryEndpoints.blob -storage account keys list -g synapse-cli000001 -n adlsgen2000002 --query [0].value -synapse sql audit-policy show --workspace-name {workspace} --resource-group {rg} -synapse sql audit-policy update --resource-group {rg} --workspace-name {workspace} --state Enabled --bsts Enabled --storage-key {storage-key} --storage-endpoint={storage-endpoint} --retention-days={retention-days} --actions {audit-actions-input} -synapse sql audit-policy show --workspace-name {workspace} --resource-group {rg} -synapse sql audit-policy update --resource-group {rg} --workspace-name {workspace} --state Enabled --bsts Enabled --storage-account {storage-account} --retention-days={retention-days} --actions {audit-actions-input} -synapse sql audit-policy update --resource-group {rg} --workspace-name {workspace} --state Disabled -monitor log-analytics workspace create --resource-group {rg} --workspace-name {log_analytics_workspace_name} -synapse sql audit-policy update --resource-group {rg} --workspace-name {workspace} --state Enabled --lats Enabled --lawri {log_analytics_workspace_id} -synapse sql audit-policy show --resource-group {rg} --workspace-name {workspace} -synapse sql audit-policy update --resource-group {rg} --workspace-name {workspace} --state Enabled --lats Disabled -synapse sql audit-policy show --resource-group {rg} --workspace-name {workspace} -eventhubs namespace create --resource-group {rg} -n {eventhub_namespace} --location eastus -eventhubs eventhub create --resource-group {rg} -n {eventhub_name} --namespace-name {eventhub_namespace} -eventhubs namespace authorization-rule create --resource-group {rg} -n {eventhub_auth_rule} --namespace-name {eventhub_namespace} --rights Listen Manage Send -synapse sql audit-policy update --resource-group {rg} --workspace-name {workspace} --state Enabled --event-hub-target-state Enabled --ehari {eventhub_auth_rule_id} --event-hub {eventhub_name} -synapse sql audit-policy show --resource-group {rg} --workspace-name {workspace} -synapse sql audit-policy update --resource-group {rg} --workspace-name {workspace} --state Enabled --event-hub-target-state Disabled -synapse sql audit-policy show --resource-group {rg} --workspace-name {workspace} -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace firewall-rule create --resource-group {rg} --name allowAll --workspace-name {workspace} --start-ip-address 0.0.0.0 --end-ip-address 255.255.255.255 -synapse sql pool create --name {sql_pool_name} --performance-level {performance_level} --workspace {workspace} --resource-group {rg} -synapse sql-script create --workspace-name {workspace} --name {name} --file "{file}" --sql-pool-name {sql_pool_name} --sql-database-name {data_base_name} --folder-name {folder_name} -synapse sql-script show --workspace-name {workspace} --name {name} -synapse sql-script list --workspace-name {workspace} -synapse sql-script export --workspace-name {workspace} --name {name} --output-folder "{output_folder}" -synapse sql-script delete --workspace-name {workspace} --name {name} -synapse sql-script show --workspace-name {workspace} --name {name} -synapse trigger create --workspace-name {workspace} --name {name} --file @"{file}" -synapse trigger show --workspace-name {workspace} --name {name} -synapse trigger list --workspace-name {workspace} -synapse trigger delete --workspace-name {workspace} --name {name} -y -synapse trigger show --workspace-name {workspace} --name {name} -synapse trigger subscribe-to-event --workspace-name {workspace} --name {event-trigger} -synapse trigger get-event-subscription-status --workspace-name {workspace} --name {event-trigger} -synapse trigger unsubscribe-from-event --workspace-name {workspace} --name {event-trigger} -synapse trigger start --workspace-name {workspace} --name {tumbling-window-trigger} -synapse trigger-run query-by-workspace --workspace-name {workspace} --last-updated-after 2020-09-01T00:36:44.3345758Z --last-updated-before 2020-10-01T00:36:44.3345758Z -synapse trigger-run rerun --workspace-name {workspace} --name {tumbling-window-trigger} --run-id {run-id} -synapse trigger stop --workspace-name {workspace} --name {tumbling-window-trigger} -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace firewall-rule create --resource-group {rg} --name allowAll --workspace-name {workspace} --start-ip-address 0.0.0.0 --end-ip-address 255.255.255.255 -synapse workspace-package upload --workspace-name {workspace} --package "{file}" -synapse workspace-package show --workspace-name {workspace} --name {name} -synapse workspace-package list --workspace-name {workspace} -synapse workspace-package delete --workspace-name {workspace} --name {name} -y -synapse workspace-package show --workspace-name {workspace} --name {name} -synapse workspace create --name {workspace} --resource-group {rg} --storage-account {storage-account} --file-system {file-system} --sql-admin-login-user {login-user} --sql-admin-login-password {login-password} --location {location} -synapse workspace check-name --name {workspace} -synapse workspace show --name {workspace} --resource-group {rg} -synapse workspace list --resource-group {rg} -synapse workspace update --ids {workspace-id} --tags key1=value1 -synapse workspace delete --name {workspace} --resource-group {rg} --yes -synapse workspace show --name {workspace} --resource-group {rg} -rest -u /subscriptions?api-version=2020-01-01 -rest -u /tenants?api-version=2020-01-01 -rest -m PUT -u https://management.azure.com/subscriptions/{{subscriptionId}}/resourcegroups/{rg}?api-version=2019-10-01 --body '{{"location": "eastus"}}' -rest -u https://management.azure.com/subscriptions/{{subscriptionId}}/resourcegroups/{rg}?api-version=2019-10-01 -rest -m DELETE -u https://management.azure.com/subscriptions/{{subscriptionId}}/resourcegroups/{rg}?api-version=2019-10-01 -rest -u https://management.azure.com/subscriptions/{{subscriptionId}}/resourcegroups/{rg}?api-version=2019-10-01 -rest -u https://management.azure.com/subscriptions/{{subscriptionId}}/resourcegroups/{rg}?api-version=2019-10-01 -rest -u https://management.azure.com/subscriptions/{{subscriptionId}}/resourcegroups/{rg}?api-version=2019-10-01 -rest -u https://management.azure.com/subscriptions/{{subscriptionId}}/resourcegroups/{rg}?api-version=2019-10-01 -rest -u https://management.azure.com/subscriptions/{{subscriptionId}}/resourcegroups/{rg}?api-version=2019-10-01 -rest -u https://management.azure.com/subscriptions/{{subscriptionId}}/resourcegroups/{rg}?api-version=2019-10-01 -rest -u https://management.azure.com/subscriptions/{{subscriptionId}}/resourcegroups/{rg}?api-version=2019-10-01 -rest --method POST --url https://graph.microsoft.com/v1.0/applications --body '{{"displayName": "{display_name}"}}' -rest --method GET --url https://graph.microsoft.com/v1.0/applications/{app_object_id} -rest --method PATCH --url https://graph.microsoft.com/v1.0/applications/{app_object_id} --body '{{"web":{{"redirectUris":["https://myapp.com"]}}}}' -rest --method POST --url https://graph.microsoft.com/v1.0/applications/{app_object_id}/addPassword --body '{{"passwordCredential": {{"displayName": "Password friendly name"}}}}' -rest --method POST --url https://graph.microsoft.com/v1.0/serviceprincipals --body '{{"appId": "{app_id}"}}' -rest --method GET --url https://graph.microsoft.com/v1.0/servicePrincipals/{sp_object_id} -rest --method PATCH --url https://graph.microsoft.com/v1.0/servicePrincipals/{sp_object_id} --body '{{"appRoleAssignmentRequired": true}}' -rest --method POST --url https://graph.microsoft.com/v1.0/servicePrincipals/{sp_object_id}/addPassword --body '{{"passwordCredential": {{"displayName": "Password friendly name"}}}}' -rest --method DELETE --url https://graph.microsoft.com/v1.0/serviceprincipals/{sp_object_id} -rest --method GET --url https://graph.microsoft.com/v1.0/servicePrincipals/{sp_object_id} -rest --method DELETE --url https://graph.microsoft.com/v1.0/applications/{app_object_id} -rest --method GET --url https://graph.microsoft.com/v1.0/applications/{app_object_id} -rest -m GET -u "https://graph.microsoft.com/v1.0/applications?$filter=startswith(displayName, '{display_name_prefix}')" -rest -m PUT -u /subscriptions/{{subscriptionId}}/resourceGroups/{rg}/providers/Microsoft.Storage/storageAccounts/{sa}?api-version=2019-06-01 -b @"{storage_account_create_body}" -rest -m GET -u /subscriptions/{{subscriptionId}}/resourceGroups/{rg}/providers/Microsoft.Storage/storageAccounts/{sa}?api-version=2019-06-01 -rest -m GET -u /subscriptions/{{subscriptionId}}/resourceGroups/{rg}/providers/Microsoft.Storage/storageAccounts/{sa}?api-version=2019-06-01 -rest -m GET -u /subscriptions/{{subscriptionId}}/resourceGroups/{rg}/providers/Microsoft.Storage/storageAccounts/{sa}?api-version=2019-06-01 -rest -m POST -u "/subscriptions/{{subscriptionId}}/resourceGroups/{rg}/providers/Microsoft.Storage/storageAccounts/{sa}/ListAccountSas?api-version=2019-06-01" -b @"{storage_account_sas_body}" -rest -m PUT -u https://{sa}.blob.core.windows.net/mycontainer?restype=container&sv=2015-04-05&ss=b&srt=sco&sp=rwdlacu&st=2017-05-24T10%3A42%3A03.1567373Z&se=2030-05-24T11%3A42%3A03.1567373Z&spr=https,http&sig=%2BhKh5DtEK1XbrA1zm32lu4t6ij9zGWvTG3DzOEdH%2FJE%3D --skip-authorization-header -rest -m HEAD -u https://{sa}.blob.core.windows.net/mycontainer?restype=container&sv=2015-04-05&ss=b&srt=sco&sp=rwdlacu&st=2017-05-24T10%3A42%3A03.1567373Z&se=2030-05-24T11%3A42%3A03.1567373Z&spr=https,http&sig=%2BhKh5DtEK1XbrA1zm32lu4t6ij9zGWvTG3DzOEdH%2FJE%3D --skip-authorization-header -rest -m PUT -u https://{sa}.blob.core.windows.net/mycontainer/myblob?sv=2015-04-05&ss=b&srt=sco&sp=rwdlacu&st=2017-05-24T10%3A42%3A03.1567373Z&se=2030-05-24T11%3A42%3A03.1567373Z&spr=https,http&sig=%2BhKh5DtEK1XbrA1zm32lu4t6ij9zGWvTG3DzOEdH%2FJE%3D --headers "Content-Type=text/plain; charset=UTF-8" "x-ms-blob-type=BlockBlob" --skip-authorization-header --body "hello world" -rest -m GET -u https://{sa}.blob.core.windows.net/mycontainer/myblob?sv=2015-04-05&ss=b&srt=sco&sp=rwdlacu&st=2017-05-24T10%3A42%3A03.1567373Z&se=2030-05-24T11%3A42%3A03.1567373Z&spr=https,http&sig=%2BhKh5DtEK1XbrA1zm32lu4t6ij9zGWvTG3DzOEdH%2FJE%3D --skip-authorization-header -rest -m GET -u https://{sa}.blob.core.windows.net/mycontainer?restype=container&comp=list&sv=2015-04-05&ss=b&srt=sco&sp=rwdlacu&st=2017-05-24T10%3A42%3A03.1567373Z&se=2030-05-24T11%3A42%3A03.1567373Z&spr=https,http&sig=%2BhKh5DtEK1XbrA1zm32lu4t6ij9zGWvTG3DzOEdH%2FJE%3D --skip-authorization-header -rest -m DELETE -u https://{sa}.blob.core.windows.net/mycontainer/myblob?sv=2015-04-05&ss=b&srt=sco&sp=rwdlacu&st=2017-05-24T10%3A42%3A03.1567373Z&se=2030-05-24T11%3A42%3A03.1567373Z&spr=https,http&sig=%2BhKh5DtEK1XbrA1zm32lu4t6ij9zGWvTG3DzOEdH%2FJE%3D --skip-authorization-header -rest -m DELETE -u https://{sa}.blob.core.windows.net/mycontainer?restype=container&sv=2015-04-05&ss=b&srt=sco&sp=rwdlacu&st=2017-05-24T10%3A42%3A03.1567373Z&se=2030-05-24T11%3A42%3A03.1567373Z&spr=https,http&sig=%2BhKh5DtEK1XbrA1zm32lu4t6ij9zGWvTG3DzOEdH%2FJE%3D --skip-authorization-header -rest -m DELETE -u "/subscriptions/{{subscriptionId}}/resourceGroups/{rg}/providers/Microsoft.Storage/storageAccounts/{sa}?api-version=2019-06-01" -version -identity create -g {rg} -n {ide} -role assignment create --assignee {identity_id} --role Contributor --scope {scope} -image builder create -n {tmpl} -g {rg} --scripts {script_url} --image-source {img_src} --identity {ide} --defer -image builder customizer add -n {tmpl} -g {rg} --customizer-name {pwsh_name} --type powershell -e 0 1 2 --script-url {script_url} -image builder customizer remove -n {tmpl} -g {rg} --customizer-name {pwsh_name} -image builder customizer clear -n {tmpl} -g {rg} -image builder output add -n {tmpl} -g {rg} --is-vhd --output-name {vhd_name} -image builder output remove -n {tmpl} -g {rg} --output-name {vhd_name} -image builder output clear -n {tmpl} -g {rg} -identity create -g {rg} -n {ide} -role assignment create --assignee {identity_id} --role Contributor --scope {scope} -image builder create -n {tmpl_1} -g {rg} --image-source {img_src} --managed-image-destinations {img_1}={loc} --scripts {script} --identity {ide} -image builder run -n {tmpl_1} -g {rg} -image builder show-runs -n {tmpl_1} -g {rg} --output-name {img_1} -vm create --name {vm} -g {rg} --image {image_id} --generate-ssh-keys --admin-username azureuser -vm show -n {vm} -g {rg} -image builder create -n {tmpl_2} -g {rg} --image-source {image_id} --managed-image-destinations {img_2}={loc} --scripts {script} --identity {ide} -identity create -g {rg} -n {ide} -role assignment create --assignee {identity_id} --role Contributor --scope {scope} -sig create -g {rg} --gallery-name {gallery} -sig image-definition create -g {rg} --gallery-name {gallery} --gallery-image-definition {sig1} --os-type linux -p publisher1 -f offer1 -s sku1 -image builder create -n {tmpl} -g {rg} --scripts {script} --image-source {img_src} --identity {ide} --defer -image builder output add -n {tmpl} -g {rg} --gallery-name {gallery} --gallery-image-definition {sig1} --gallery-replication-regions westus --defer -image builder update -n {tmpl} -g {rg} -image builder run -n {tmpl} -g {rg} -image builder show-runs -n {tmpl} -g {rg} --output-name {sig1} -vm create --name {vm} -g {rg} --image {image_id} --generate-ssh-keys --admin-username azureuser -vm show -n {vm} -g {rg} -image builder create -n {tmpl_2} -g {rg} --image-source {image_id} --identity {ide} --shared-image-destinations "{gallery}/{sig1}={loc}" --scripts {script} -identity create -g {rg} -n {ide} -role assignment create --assignee {identity_id} --role Contributor --scope {scope} -network vnet create -g {rg} -n {vnet} --subnet-name {subnet} -network vnet subnet update -g {rg} -n {subnet} --vnet-name {vnet} --disable-private-link-service-network-policies true -image builder create -n {tmpl_01} -g {rg} --scripts {script} {script} --image-source {img_src} --identity {ide} --vnet {vnet} --subnet {subnet} --vm-size Standard_D1_v2 --os-disk-size 20 --defer -image builder output add -n {tmpl_01} -g {rg} --managed-image {new_img} --managed-image-location {new_loc} --defer -image builder output add -n {tmpl_01} -g {rg} --output-name {vhd_out} --is-vhd --defer -image builder update -n {tmpl_01} -g {rg} -image builder create -n {tmpl_02} -g {rg} --identity {ide} --scripts {script} --image-source {img_src} --build-timeout 22 --managed-image-destinations img_1=westus /subscriptions/{sub}/resourceGroups/{rg}/providers/Microsoft.Compute/images/img_2=centralus -identity create -g {rg} -n {ide} -role assignment create --assignee {identity_id} --role Contributor --scope {scope} -sig create -g {rg} --gallery-name {gallery} -sig image-definition create -g {rg} --gallery-name {gallery} --gallery-image-definition {sig1} --os-type linux -p publisher1 -f offer1 -s sku1 -image builder create -n {tmpl_01} -g {rg} --scripts {script} --image-source {img_src} --shared-image-destinations {sig_out} --identity {ide} -identity create -g {rg} -n {ide} -role assignment create --assignee {identity_id} --role Contributor --scope {scope} -image builder create -g {rg} -n {tmpl} --image-source {img_src} --managed-image-destinations {img}={loc} --identity {ide} -image builder run -g {rg} -n {tmpl} --no-wait -image builder show -g {rg} -n {tmpl} -image builder cancel -g {rg} -n {tmpl} -image builder show -g {rg} -n {tmpl} -identity create -g {rg} -n {ide} -role assignment create --assignee {identity_id} --role Contributor --scope {scope} -image builder create -n {tmpl} -g {rg} --scripts {script_url} --image-source {img_src} --managed-image-destinations {img}={loc} --identity {ide} --defer -image builder customizer add -n {tmpl} -g {rg} --customizer-name {pwsh_name} --type powershell -e 0 1 2 --script-url {script_url} --defer -image builder customizer add -n {tmpl} -g {rg} --customizer-name {pwsh_name_2} --type powershell -e 12 14 16 --inline-script {inline_script} --defer -image builder customizer add -n {tmpl} -g {rg} --customizer-name {win_restart_name} -t windows-restart --restart-check-command "{win_restart_check_cmd}" --defer -image builder customizer add -n {tmpl} -g {rg} --customizer-name {file_name} -t file --file-source "{file_url}" --dest-path "{file_dest_path}" --defer -image builder customizer add -n {tmpl} -g {rg} --customizer-name {shell_name} --type shell --inline-script "{inline_shell_script}" --defer -image builder customizer add -n {tmpl} -g {rg} --customizer-name {win_update_name} --type windows-update --search-criteria IsInstalled=0 --filters "exclude:$_.Title -like '*Preview*'" "include:$true" --update-limit 20 --defer -image builder customizer remove -n {tmpl} -g {rg} --customizer-name {shell_name} --defer -image builder update -n {tmpl} -g {rg} -image builder customizer clear -n {tmpl} -g {rg} --defer -identity create -g {rg} -n {ide} -role assignment create --assignee {identity_id} --role Contributor --scope {scope} -image builder create -n {tmpl_01} -g {rg} --scripts {script} --image-source {img_src} --identity {ide} --defer -image builder output add -n {tmpl_01} -g {rg} --managed-image {img_1} --managed-image-location {loc} --defer -image builder output add -n {tmpl_01} -g {rg} --managed-image {img_2} --managed-image-location {loc} --defer -image builder output add -n {tmpl_01} -g {rg} --output-name {vhd_out} --artifact-tags "is_vhd=True" --is-vhd --defer -image builder output remove -n {tmpl_01} -g {rg} --output-name {img_2} --defer -image builder update -n {tmpl_01} -g {rg} -image builder output clear -n {tmpl_01} -g {rg} --defer -vm image list --offer ubuntu -vm list-usage --location westus -vm image list --edge-zone microsoftlosangeles1 --offer CentOs --publisher OpenLogic --sku 7.7 -o tsv --all -vm create -g {rg} -l westus -n {vm} --admin-username ubuntu --image Canonical:UbuntuServer:14.04.4-LTS:latest --admin-password @PasswordPassword1! --public-ip-address-allocation dynamic --authentication-type password --nsg-rule NONE -vm open-port -g {rg} -n {vm} --port 555,556,557-559 --priority 800 -network nsg show -g {rg} -n {nsg_list} -vm open-port -g {rg} -n {vm} --port "*" --priority 900 -network nsg show -g {rg} -n {nsg} -vm open-port -g {rg} -n {vm} --apply-to-subnet --nsg-name {nsg} --port "*" --priority 900 -network nsg show -g {rg} -n {nsg} -vm list-ip-addresses --resource-group {rg} -vm create --resource-group {rg} --location {loc} -n {vm} --admin-username ubuntu --image Canonical:UbuntuServer:14.04.4-LTS:latest --admin-password testPassword0 --public-ip-address-allocation {allocation} --authentication-type password --zone {zone} --nsg-rule NONE -vm show --resource-group {rg} --name {vm} -d -vm list --resource-group {rg} -d -vm list-vm-resize-options --resource-group {rg} --name {vm} -vm list-ip-addresses --resource-group {rg_caps} -vm list-sizes --location westus -vm image list-offers --location {loc} --publisher {pub} -vm image list-offers --location {loc} --publisher {pub} --edge-zone {edge_zone} -vm image list-publishers --location {loc} -vm image list-publishers --location {loc} --edge-zone {edge_zone} -vm image list-skus --location {loc} -p {pub} --offer {offer} --query "length([].id.contains(@, '/Publishers/{pub}/ArtifactTypes/VMImage/Offers/{offer}/Skus/'))" -vm image list-skus --location {loc} --edge-zone {edge_zone} --offer {offer} --publisher {pub} --edge-zone {edge_zone} -vm image show --location {loc} --publisher {pub} --offer {offer} --sku {sku} --version {ver} -vm image show --offer {offer} --publisher {pub} --sku {sku} --version {ver} -l {loc} --edge-zone {edge_zone} -vm create -g {rg} --location {loc} -n {vm} --admin-username ubuntu --image centos --admin-password testPassword0 --authentication-type password --nsg-rule NONE -vm deallocate -g {rg} -n {vm} -vm generalize -g {rg} -n {vm} -vm show -g {rg} -n {vm} -image create -g {rg} -n {image} --source {vm} --zone-resilient -l {loc} -vm create -g {rg} -n {vm} --admin-username ubuntu --image UbuntuLTS --admin-password testPassword0 --authentication-type password --use-unmanaged-disk --nsg-rule NONE -vm stop -g {rg} -n {vm} -vm generalize -g {rg} -n {vm} -vm show -g {rg} -n {vm} -vm capture -g {rg} -n {vm} --vhd-name-prefix vmtest -image create -g {rg} -n {image} --source {vm} -vm create -g {rg} -n {vm} --image Win2012R2Datacenter --admin-username clitest1234 --admin-password Test123456789# --license-type Windows_Server --nsg-rule NONE -vm show -g {rg} -n {vm} -vm update -g {rg} -n {vm} --license-type None -vm create -g {rg} -n {vm1} --image ubuntults --use-unmanaged-disk --admin-username sdk-test-admin --admin-password testPassword0 --nsg-rule NONE -vm run-command invoke -g {rg} -n {vm1} --command-id RunShellScript --scripts "echo 'sudo waagent -deprovision+user --force' | at -M now + 1 minutes" -vm deallocate -g {rg} -n {vm1} -vm generalize -g {rg} -n {vm1} -image create -g {rg} -n {image1} --source {vm1} -vm create -g {rg} -n {vm2} --image ubuntults --storage-sku standard_lrs --data-disk-sizes-gb 1 1 1 1 --admin-username sdk-test-admin --admin-password testPassword0 --nsg-rule NONE -vm show -g {rg} -n {vm2} -vm disk detach -n {disk_0_name} --vm-name {vm2} -g {rg} -vm disk detach -n {disk_2_name} --vm-name {vm2} -g {rg} -vm show -g {rg} -n {vm2} -vm run-command invoke -g {rg} -n {vm2} --command-id RunShellScript --scripts "echo 'sudo waagent -deprovision+user --force' | at -M now + 1 minutes" -vm deallocate -g {rg} -n {vm2} -vm generalize -g {rg} -n {vm2} -image create -g {rg} -n {image2} --source {vm2} -vm create -g {rg} -n {newvm1} --image {image1} --admin-username sdk-test-admin --admin-password testPassword0 --authentication-type password --nsg-rule NONE -vm show -g {rg} -n {newvm1} -vmss create -g {rg} -n vmss1 --image {image1} --admin-username sdk-test-admin --admin-password testPassword0 --authentication-type password -vm create -g {rg} -n {newvm2} --image {image2} --admin-username sdk-test-admin --admin-password testPassword0 --authentication-type password --nsg-rule NONE -vm show -g {rg} -n {newvm2} -vm create -g {rg} -n vm3 --image {image2} --admin-username sdk-test-admin --admin-password testPassword0 --authentication-type password --storage-sku os=Premium_LRS 0=StandardSSD_LRS --data-disk-sizes-gb 1 --nsg-rule NONE -vm show -g {rg} -n vm3 -vmss create -g {rg} -n vmss2 --image {image2} --admin-username sdk-test-admin --admin-password testPassword0 --authentication-type password -vm create -g {rg} -n {vm} --image debian --use-unmanaged-disk --admin-username ubuntu --admin-password testPassword0 --authentication-type password --nsg-rule NONE -vm show -g {rg} -n {vm} -vm stop -g {rg} -n {vm} -disk create -g {rg} -n {os_disk} --source {os_disk_vhd_uri} --os-type linux -vm deallocate -g {rg} -n {vm} -vm generalize -g {rg} -n {vm} -image create -g {rg} -n {image1} --source {vm} -image create -g {rg} -n {image2} --source {vm_id} -image create -g {rg} -n {image3} --source {os_disk_id} --os-type linux --hyper-v-generation "V1" -vm create -g {rg} -n {vm} --image debian --use-unmanaged-disk --admin-username ubuntu --admin-password testPassword0 --authentication-type password --nsg-rule NONE -vm show -g {rg} -n {vm} -vm stop -g {rg} -n {vm} -disk create -g {rg} -n {os_disk} --source {os_disk_vhd_uri} --os-type linux -vm create -g {rg} -n {vm} --attach-os-disk {os_disk} --os-type linux --nsg-rule NONE -vm create -g {rg} -n vm1 --image debian --use-unmanaged-disk --admin-username ubuntu --admin-password testPassword0 --authentication-type password --nsg-rule NONE -vm show -g {rg} -n vm1 -vm delete -g {rg} -n vm1 -y -vm create -g {rg} -n vm2 --attach-os-disk {disk_uri} --os-type linux --use-unmanaged-disk --nsg-rule NONE -vm create -g {rg} -n vm1 --image debian --use-unmanaged-disk --admin-username ubuntu --admin-password testPassword0 --authentication-type password --nsg-rule NONE -vm unmanaged-disk attach -g {rg} --vm-name {vm} --new --size-gb 1 -vm unmanaged-disk attach -g {rg} --vm-name {vm} --new --size-gb 2 -vm show -g {rg} -n {vm} -vm delete -g {rg} -n vm1 -y -vm create -g {rg} -n {vm2} --attach-os-disk {disk_uri} --os-type linux --use-unmanaged-disk --attach-data-disks {data_disk} {data_disk2} --data-disk-caching 0=ReadWrite 1=ReadOnly --nsg-rule NONE -vm show -g {rg} -n {vm2} -d -vm create -g {rg} -n vm1 --image centos --admin-username centosadmin --admin-password testPassword0 --authentication-type password --data-disk-sizes-gb 2 --nsg-rule NONE -vm show -g {rg} -n vm1 -snapshot create -g {rg} -n {os_snapshot} --source {origin_os_disk} -disk create -g {rg} -n {os_disk} --source {os_snapshot} -snapshot create -g {rg} -n {data_snapshot} --source {origin_data_disk} -disk create -g {rg} -n {data_disk} --source {data_snapshot} -vm create -g {rg} -n vm2 --attach-os-disk {os_disk} --os-disk-delete-option Delete --attach-data-disks {data_disk} --data-disk-delete-option Detach --data-disk-sizes-gb 3 --os-disk-size-gb 100 --os-type linux --nsg-rule NONE -vm show -g {rg} -n vm2 -vm create -g {rg} -n vm1 --use-unmanaged-disk --image centos --admin-username centosadmin --admin-password testPassword0 --authentication-type password --nsg-rule NONE -vm unmanaged-disk attach -g {rg} --vm-name vm1 --new --size-gb 2 -vm show -g {rg} -n vm1 -vm deallocate -g {rg} -n vm1 -vm delete -g {rg} -n vm1 -y -vm create -g {rg} -n vm2 --attach-os-disk {os_disk_vhd} --attach-data-disks {data_disk_vhd} --os-type linux --use-unmanaged-disk --nsg-rule NONE -vm create -n Delete_CLI1 -g {rg} --image RedHat:RHEL:7-RAW:7.4.2018010506 -l northeurope --size Standard_E8as_v4 --generate-ssh-keys --public-ip-address "" --os-disk-size-gb 64 --data-disk-sizes-gb 200 --data-disk-delete-option Delete -vm show -g {rg} -n Delete_CLI1 -vm create -g {rg} -n vm1 --image centos --admin-username centosadmin --admin-password testPassword0 --authentication-type password --data-disk-sizes-gb 2 --nsg-rule NONE -vm show -g {rg} -n vm1 -snapshot create -g {rg} -n {os_snapshot} --source {origin_os_disk} -disk create -g {rg} -n {os_disk} --source {os_snapshot} -snapshot create -g {rg} -n {data_snapshot} --source {origin_data_disk} -disk create -g {rg} -n {data_disk} --source {data_snapshot} -disk create -g {rg} -n {data_disk2} --source {data_snapshot} -vm create -g {rg} -n vm2 --attach-os-disk {os_disk} --os-disk-delete-option Delete --attach-data-disks {data_disk} {data_disk2} --data-disk-delete-option {data_disk}=Delete {data_disk2}=Detach --os-disk-size-gb 100 --os-type linux --nsg-rule NONE -vm show -g {rg} -n vm2 -vm create -g {rg} -n vm --image centos --admin-username centosadmin --admin-password testPassword0 --authentication-type password --os-disk-size-gb 75 --use-unmanaged-disk --storage-account {sa} --nsg-rule NONE -storage blob list --account-name {sa} --container-name vhds -vm create -g {rg} -n vm1 --image centos --admin-username centosadmin --admin-password testPassword0 --authentication-type password --os-disk-size-gb 75 --nsg-rule NONE -vm show -g {rg} -n vm1 -disk create -g {rg} -n {disk1} --size-gb 10 --sku UltraSSD_LRS --disk-iops-read-only 200 --disk-mbps-read-only 30 -disk update -g {rg} -n {disk1} --disk-iops-read-only 250 --disk-mbps-read-only 40 -disk create -g {rg} -n {disk2} --image-reference {image} -disk create -g {rg} -n {disk3} --image-reference Canonical:UbuntuServer:18.04-LTS:18.04.202002180 -sig create -g {rg} --gallery-name {g1} -sig image-definition create -g {rg} --gallery-name {g1} --gallery-image-definition image --os-type linux -p publisher1 -f offer1 -s sku1 --features "IsAcceleratedNetworkSupported=true" --hyper-v-generation V2 -disk create -g {rg} -n disk --size-gb 10 -snapshot create -g {rg} -n s1 --source disk -sig image-version create -g {rg} --gallery-name {g1} --gallery-image-definition image --gallery-image-version 1.0.0 --os-snapshot s1 -disk create -g {rg} -n {disk4} --gallery-image-reference {gallery_image} -disk create -g {rg} -n {disk6} --size-gb 256 --max-shares 2 -l centraluseuap -disk update -g {rg} -n {disk6} --max-shares 1 -disk create -g {rg} -n {disk} --for-upload --upload-size-bytes 21474836992 -disk create -g {rg} -n {disk1} --size-gb 1 --tags tag1=d1 -disk update -g {rg} -n {disk1} --size-gb 10 --sku Standard_LRS -disk grant-access -g {rg} -n {disk1} --duration-in-seconds 10 -disk create -g {rg} -n {disk2} --source {disk1_id} -snapshot create -g {rg} -n {snapshot1} --size-gb 1 --sku Premium_LRS --tags tag1=s1 -snapshot update -g {rg} -n {snapshot1} --sku Standard_LRS -snapshot create -g {rg} -n {snapshot2} --source {disk1} --sku Premium_LRS -image create -g {rg} -n {image} --source {snapshot1} --data-disk-sources {disk1} {snapshot2_id} {disk2_id} --os-type Linux --tags tag1=i1 -image create -g {rg} -n {image_2} --source {snapshot1} --data-disk-sources {disk1} {snapshot2_id} {disk2_id} --os-type Linux --tags tag1=i1 --storage-sku Premium_LRS --os-disk-caching None -image create -g {rg} -n {image_3} --source {snapshot1} --data-disk-sources {disk1} {snapshot2_id} {disk2_id} --os-type Linux --tags tag1=i1 --storage-sku Standard_LRS --os-disk-caching ReadWrite --data-disk-caching ReadOnly -disk create -g {rg} -n {disk} --size-gb 10 -l westus -snapshot create -g {rg} -n {snapshot1} --source {disk} -snapshot create -g {rg} -n {snapshot2} --source {disk} -l eastus -disk create -g {rg} -n {disk} --size-gb 10 -l centraluseuap -snapshot create -g {rg} -n {snapshot} --incremental -l centraluseuap --source {disk} -vm list --resource-group {rg} -vm create --resource-group {rg} --location {loc} --name {vm} --admin-username ubuntu --image UbuntuLTS --admin-password testPassword0 --authentication-type password --tags firsttag=1 secondtag=2 thirdtag --nsg {nsg} --public-ip-address {ip} --vnet-name {vnet} --storage-account {sa} --use-unmanaged-disk --nsg-rule NONE -vm list --resource-group {rg} -vm show --resource-group {rg} --name {vm} -vm get-instance-view --resource-group {rg} --name {vm} -vm user update -g {rg} -n {vm} -u foouser1 -p Foo12345 -vm user delete -g {rg} -n {vm} -u foouser1 -network nsg show --resource-group {rg} --name {nsg} -network public-ip show --resource-group {rg} --name {ip} -network vnet show --resource-group {rg} --name {vnet} -storage account show --resource-group {rg} --name {sa} -vm stop --resource-group {rg} --name {vm} -vm get-instance-view --resource-group {rg} --name {vm} -vm start --resource-group {rg} --name {vm} -vm get-instance-view --resource-group {rg} --name {vm} -vm restart --resource-group {rg} --name {vm} -vm get-instance-view --resource-group {rg} --name {vm} -vm restart --resource-group {rg} --name {vm} --force -vm get-instance-view --resource-group {rg} --name {vm} -vm deallocate --resource-group {rg} --name {vm} -vm get-instance-view --resource-group {rg} --name {vm} -vm resize -g {rg} -n {vm} --size Standard_DS2_v2 -vm delete --resource-group {rg} --name {vm} --yes -vm list --resource-group {rg} -vm create -g {rg} -n vm --image Win2019Datacenter --admin-username AzureUser --admin-password testPassword0 --nsg-rule NONE -vm user update -g {rg} -n vm --username AzureUser --password testPassword1 -vm create --resource-group {rg} --name {vm1} --admin-username azureuser --admin-password testPassword0 --authentication-type password --location {loc} --image Centos --priority Regular --nsg-rule NONE -vm simulate-eviction --resource-group {rg} --name {vm1} -vm create --resource-group {rg} --name {vm2} --admin-username azureuser --admin-password testPassword0 --authentication-type password --location {loc} --image Centos --priority Spot --eviction-policy Deallocate --nsg-rule NONE -vm simulate-eviction --resource-group {rg} --name {vm2} -vm get-instance-view --resource-group {rg} --name {vm2} -vm create --resource-group {rg} --name {vm3} --admin-username azureuser --admin-password testPassword0 --authentication-type password --location {loc} --image Centos --priority Spot --eviction-policy Delete --nsg-rule NONE -vm simulate-eviction --resource-group {rg} --name {vm3} -vm list --resource-group {rg} -vm show --resource-group {rg} --name {vm3} -vm create -g {rg} -n {vm} --admin-username user12 --admin-password testPassword0 --authentication-type password --image UbuntuLTS --nsg-rule NONE --no-wait -vm wait -g {rg} -n {vm} --custom "instanceView.statuses[?code=='PowerState/running']" -vm get-instance-view -g {rg} -n {vm} -vm update -g {rg} -n {vm} --set tags.mytag=tagvalue1 --no-wait -vm wait -g {rg} -n {vm} --updated -vm show -g {rg} -n {vm} -vm availability-set create -g {rg} -n {availset} -vm availability-set create -g {rg} -n avset2 --platform-fault-domain-count 2 --platform-update-domain-count 2 -vm availability-set delete -g {rg} -n avset2 -vm availability-set update -g {rg} -n {availset} --set tags.test=success -vm availability-set list -g {rg} -vm availability-set list --query "[?name=='availset-test']" -vm availability-set list-sizes -g {rg} -n {availset} -vm availability-set show -g {rg} -n {availset} -vm availability-set delete -g {rg} -n {availset} -vm availability-set list -g {rg} -vm availability-set create -g {rg} -n {availset} --unmanaged --platform-fault-domain-count 3 -l westus2 -vm availability-set convert -g {rg} -n {availset} -vm list-skus -l eastus2 --size Standard_DS1_V2 --zone -vm list-skus -l westus --resource-type disks -vm list-skus -l eastus --query "[?name=='Standard_M64m']" -vm list-skus -l eastus2 -otable -vm create -n {vm} -g {rg} --image UbuntuLTS --authentication-type password --admin-username user11 --admin-password testPassword0 --nsg-rule NONE -vm extension list --vm-name {vm} --resource-group {rg} -vm extension set -n {ext} --publisher {pub} --version 1.2 --vm-name {vm} --resource-group {rg} --protected-settings "{config}" --force-update --enable-auto-upgrade false -vm get-instance-view -n {vm} -g {rg} -vm extension show --resource-group {rg} --vm-name {vm} --name {ext} -vm extension delete --resource-group {rg} --vm-name {vm} --name {ext} -vm create -n {vm} -g {rg} --image UbuntuLTS --authentication-type password --admin-username user11 --admin-password testPassword0 --nsg-rule NONE -vm extension set -n {ext_type} --publisher {pub} --version 1.2 --vm-name {vm} --resource-group {rg} --protected-settings "{config}" --extension-instance-name {ext_name} -vm extension show --resource-group {rg} --vm-name {vm} --name {ext_name} -vm extension delete --resource-group {rg} --vm-name {vm} --name {ext_name} -vm extension image list-names --location {loc} --publisher {pub} -vm extension image list-versions --location {loc} -p {pub} --name {ext} -vm extension image show --location {loc} -p {pub} --name {ext} --version {ver} -vm create --resource-group {rg} --admin-username {username} --name {vm} --authentication-type {auth} --computer-name {comp_name} --image {image} --ssh-key-value '{ssh_key}' --location {loc} --data-disk-sizes-gb 1 --data-disk-caching ReadOnly --nsg-rule NONE -vm show -g {rg} -n {vm} -vm create --resource-group {rg} --admin-username {username} --name {vm} --authentication-type {auth} --computer-name {comp_name} --image {image} --ssh-key-value '{ssh_key}' --location {loc} --data-disk-sizes-gb 1 --data-disk-caching ReadOnly --nsg-rule NONE -vm create --resource-group {rg} --name {vm} --image {image} --ssh-key-value '{ssh_key}' --location {loc} --ephemeral-os-disk --admin-username {user} --nsg-rule NONE -vm show -g {rg} -n {vm} -vm create --resource-group {rg} --name {vm_2} --image {image} --ssh-key-value '{ssh_key}' --location {loc} --ephemeral-os-disk --os-disk-caching ReadOnly --admin-username {user} --nsg-rule NONE -vm show -g {rg} -n {vm_2} -vm create -n {base} -g {rg} --image {image} --size Standard_DS4_v2 --location {loc} --ephemeral-os-disk --ephemeral-os-disk-placement {placement1} -vm show -g {rg} -n {base} -vm create --resource-group {rg} --name {vm} --image {image} --size Standard_DS4_v2 --ssh-key-value '{ssh_key}' --location {loc} --ephemeral-os-disk --ephemeral-os-disk-placement {placement1} --admin-username {user} --nsg-rule NONE -vm show -g {rg} -n {vm} -vm create --resource-group {rg} --name {vm_2} --image {image} --ssh-key-value '{ssh_key}' --location {loc} --ephemeral-os-disk --ephemeral-os-disk-placement {placement2} --os-disk-caching ReadOnly --admin-username {user} --nsg-rule NONE -vm show -g {rg} -n {vm_2} -vm create -n {vm1} -g {rg} --image {image} --size Standard_DS4_v2 --location {loc} --ephemeral-os-disk -vm show -g {rg} -n {vm1} -vm update --resource-group {rg} --name {vm1} --size {size1} --ephemeral-os-disk-placement {placement1} -vm show -g {rg} -n {vm1} -vm update --resource-group {rg} --name {vm1} --size {size2} --ephemeral-os-disk-placement {placement2} --set tags.tagName=tagValue -vm show -g {rg} -n {vm1} -vm create -n {base} -g {rg} --image {image} --size Standard_DS4_v2 --location {loc} -vm show -g {rg} -n {base} -vm update --resource-group {rg} --name {base} --size {size} --set tags.tagName=tagValue -vm show -g {rg} -n {base} -vm update --resource-group {rg} --name {base} --size {size} --set tags.tagName=tagValue -vm show -g {rg} -n {base} -vm create -n {base2} -g {rg} --image {image} --location {loc} -vm show -g {rg} -n {base2} -vm update --resource-group {rg} --name {base2} --size {size} -vm show -g {rg} -n {base2} -network vnet create -g {rg} -n {vnet} --subnet-name {subnet} -network nic create -g {rg} -n {nic} --subnet {subnet} --vnet-name {vnet} -network nic create -g {rg} -n {nic} --subnet {subnet} --vnet-name {vnet} -network nic create -g {rg} -n {nic} --subnet {subnet} --vnet-name {vnet} -network nic create -g {rg} -n {nic} --subnet {subnet} --vnet-name {vnet} -vm create -g {rg} -n {vm} --image UbuntuLTS --nics nic1 nic2 nic3 nic4 --nic-delete-option nic1=Delete nic3=Delete --admin-username user11 --size Standard_DS3 --ssh-key-value '{ssh_key}' -vm show -g {rg} -n {vm} -vm create -g {rg} -n {vm} --image UbuntuLTS --nics nic1 nic2 nic3 nic4 --nic-delete-option Detach --admin-username user11 --size Standard_DS3 --ssh-key-value '{ssh_key}' -vm show -g {rg} -n {vm} -vm deallocate -g {rg} -n {vm} -vm nic list -g {rg} --vm-name {vm} -vm nic show -g {rg} --vm-name {vm} --nic nic1 -vm nic remove -g {rg} --vm-name {vm} --nics nic4 --primary-nic nic1 -vm nic add -g {rg} --vm-name {vm} --nics nic4 -vm nic set -g {rg} --vm-name {vm} --nics nic1 nic2 --primary-nic nic2 -vm create -n {vm} -g {rg} --computer-name {quotes} --image Debian --availability-set {quotes} --nsg {quotes} --ssh-key-value '{ssh_key}' --public-ip-address {quotes} --tags {quotes} --location {loc} --admin-username user11 -vm show -n {vm} -g {rg} -network public-ip show -n {vm}PublicIP -g {rg} -network nsg create -g {rg} -n {nsg} -vm create -n {vm} -g {rg} --image UbuntuLTS --workspace {workspace} --nsg {nsg} --admin-username azureuser --admin-password testPassword0 --authentication-type password -vm monitor log show -n {vm} -g {rg} -q "Perf | limit 10" -network nsg create -g {rg} -n {nsg} -vm create -n {vm} -g {rg} --image UbuntuLTS --nsg {nsg} --admin-username azureuser --admin-password testPassword0 --authentication-type password -vm start -n {vm} -g {rg} -vm monitor metrics tail -n {vm} -g {rg} --metrics "Percentage CPU" -vm monitor metrics list-definitions -n {vm} -g {rg} -network nsg create -g {rg} -n {nsg} -vm create -n {vm} -g {rg} --image UbuntuLTS --workspace {workspace} --nsg {nsg} --generate-ssh-keys --admin-username azureuser -monitor log-analytics workspace show -n {workspace} -g {rg} -rest --method get --uri "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_vm_create_with_workspace_linux000001/providers/microsoft.operationalinsights/workspaces/cliworkspace000002/dataSources?$filter=kind eq 'LinuxPerformanceCollection'&api-version=2020-03-01-preview" -rest --method get --uri "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_vm_create_with_workspace_linux000001/providers/microsoft.operationalinsights/workspaces/cliworkspace000002/dataSources?$filter=kind eq 'LinuxSyslog'&api-version=2020-03-01-preview" -rest --method get --uri "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_vm_create_with_workspace_linux000001/providers/microsoft.operationalinsights/workspaces/cliworkspace000002/dataSources?$filter=kind eq 'LinuxSyslogCollection'&api-version=2020-03-01-preview" -rest --method get --uri "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_vm_create_with_workspace_linux000001/providers/microsoft.operationalinsights/workspaces/cliworkspace000002/dataSources?$filter=kind eq 'LinuxPerformanceObject'&api-version=2020-03-01-preview" -network nsg create -g {rg} -n {nsg} -vm create -n {vm} -g {rg} --image Win2016Datacenter --workspace {workspace} --admin-username azureuser --admin-password AzureCLI@1224 --nsg {nsg} -monitor log-analytics workspace show -n {workspace} -g {rg} -rest --method get --uri "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_vm_create_with_workspace_windows000001/providers/microsoft.operationalinsights/workspaces/cliworkspace000002/dataSources?$filter=kind eq 'WindowsEvent'&api-version=2020-03-01-preview" -rest --method get --uri "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_vm_create_with_workspace_windows000001/providers/microsoft.operationalinsights/workspaces/cliworkspace000002/dataSources?$filter=kind eq 'WindowsPerformanceCounter'&api-version=2020-03-01-preview" -network nsg create -g {rg} -n {nsg} -vm create -n {vm} -g {rg} --image UbuntuLTS --nsg {nsg} --generate-ssh-keys --admin-username azureuser -vm update -n {vm} -g {rg} --workspace {workspace1} -monitor log-analytics workspace show -n {workspace1} -g {rg} -rest --method get --uri "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_vm_update_with_workspace_linux000001/providers/microsoft.operationalinsights/workspaces/cliworkspace000002/dataSources?$filter=kind eq 'LinuxPerformanceCollection'&api-version=2020-03-01-preview" -rest --method get --uri "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_vm_update_with_workspace_linux000001/providers/microsoft.operationalinsights/workspaces/cliworkspace000002/dataSources?$filter=kind eq 'LinuxSyslog'&api-version=2020-03-01-preview" -rest --method get --uri "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_vm_update_with_workspace_linux000001/providers/microsoft.operationalinsights/workspaces/cliworkspace000002/dataSources?$filter=kind eq 'LinuxSyslogCollection'&api-version=2020-03-01-preview" -rest --method get --uri "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_vm_update_with_workspace_linux000001/providers/microsoft.operationalinsights/workspaces/cliworkspace000002/dataSources?$filter=kind eq 'LinuxPerformanceObject'&api-version=2020-03-01-preview" -vm monitor log show -n {vm} -g {rg} -q "Perf" -monitor log-analytics workspace create -n {workspace2} -g {rg} -vm update -n {vm} -g {rg} --workspace {workspace2} -monitor log-analytics workspace show -n {workspace2} -g {rg} -rest --method get --uri "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_vm_update_with_workspace_linux000001/providers/microsoft.operationalinsights/workspaces/cliworkspace000003/dataSources?$filter=kind eq 'LinuxPerformanceCollection'&api-version=2020-03-01-preview" -rest --method get --uri "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_vm_update_with_workspace_linux000001/providers/microsoft.operationalinsights/workspaces/cliworkspace000003/dataSources?$filter=kind eq 'LinuxSyslog'&api-version=2020-03-01-preview" -rest --method get --uri "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_vm_update_with_workspace_linux000001/providers/microsoft.operationalinsights/workspaces/cliworkspace000003/dataSources?$filter=kind eq 'LinuxSyslogCollection'&api-version=2020-03-01-preview" -rest --method get --uri "https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/cli_test_vm_update_with_workspace_linux000001/providers/microsoft.operationalinsights/workspaces/cliworkspace000003/dataSources?$filter=kind eq 'LinuxPerformanceObject'&api-version=2020-03-01-preview" -vm monitor log show -n {vm} -g {rg} -q "Perf" -storage account create -g {rg} -n {sa} --sku Standard_LRS -l westus -vm create -n {vm} -g {rg} --image UbuntuLTS --authentication-type password --admin-username user11 --admin-password testPassword0 --nsg-rule NONE -vm boot-diagnostics enable -g {rg} -n {vm} -vm show -g {rg} -n {vm} -vm boot-diagnostics get-boot-log-uris -g {rg} -n {vm} --expire 100 -vm boot-diagnostics get-boot-log -g {rg} -n {vm} -vm boot-diagnostics enable -g {rg} -n {vm} --storage {sa} -vm show -g {rg} -n {vm} -vm boot-diagnostics disable -g {rg} -n {vm} -vm show -g {rg} -n {vm} -vm create -g {rg} -n {vm2} --image debian --admin-username user11 --admin-password testPassword0 --boot-diagnostics-storage {sa} --nsg-rule NONE -vm show -g {rg} -n {vm2} -vmss create -n {vmss} -g {rg} --image UbuntuLTS --authentication-type password --admin-username admin123 --admin-password testPassword0 --instance-count 1 -vmss extension set -n {net-ext} --publisher {net-pub} --version 1.4 --vmss-name {vmss} --resource-group {rg} --protected-settings "{config_file}" --force-update --enable-auto-upgrade false -vmss extension show --resource-group {rg} --vmss-name {vmss} --name {net-ext} -vmss extension set -g {rg} --vmss-name {vmss} -n {script-ext} --publisher {script-pub} --version 2.0 --provision-after-extensions {net-ext} --settings "{{\"commandToExecute\": \"echo testing\"}}" -vmss extension show -g {rg} --vmss-name {vmss} --name {script-ext} -vmss extension set -g {rg} --vmss-name {vmss} -n {access-ext} --publisher {access-pub} --version 1.5 --provision-after-extensions {net-ext} {script-ext} --protected-settings "{config_file}" -vmss extension show -g {rg} --vmss-name {vmss} --name {access-ext} -vmss extension upgrade -g {rg} -n {vmss} -vmss extension delete --resource-group {rg} --vmss-name {vmss} --name {access-ext} -vmss extension delete --resource-group {rg} --vmss-name {vmss} --name {script-ext} -vmss extension delete --resource-group {rg} --vmss-name {vmss} --name {net-ext} -vmss create -n {vmss} -g {rg} --image UbuntuLTS --authentication-type password --admin-username admin123 --admin-password testPassword0 --instance-count 1 -vmss extension set -n {ext_type} --publisher {pub} --version 1.4 --vmss-name {vmss} --resource-group {rg} --protected-settings "{config_file}" --extension-instance-name {ext_name} -vmss extension show --resource-group {rg} --vmss-name {vmss} --name {ext_name} -vmss extension delete --resource-group {rg} --vmss-name {vmss} --name {ext_name} -vmss create -g {rg} -n {vmss} --image UbuntuLTS --authentication-type password --admin-username user11 --admin-password TestTest12#$ -vm create -g {rg} -n {vm} --image UbuntuLTS --authentication-type password --admin-username user11 --admin-password TestTest12#$ --use-unmanaged-disk --nsg-rule NONE -vmss diagnostics set -g {rg} --vmss-name {vmss} --settings {public_settings} --protected-settings {protected_settings} -vmss show -g {rg} -n {vmss} -vm extension set -g {rg} --vm-name {vm} -n LinuxDiagnostic --version 2.3.9025 --publisher Microsoft.OSTCExtensions --settings {public_settings} --protected-settings {protected_settings} -vm diagnostics set -g {rg} --vm-name {vm} --settings {public_settings} --protected-settings {protected_settings} -vm show -g {rg} -n {vm} -vm create --image Debian -l westus -g {rg} -n {vm_1} --authentication-type all --admin-username myadmin --admin-password testPassword0 --ssh-key-value "{ssh_key}" --nsg-rule NONE -vm show -n {vm_1} -g {rg} -vm create --image Debian -l westus -g {rg} -n {vm_2} --authentication-type ssh --admin-username myadmin --ssh-key-value "{ssh_key}" "{ssh_key_2}" --ssh-dest-key-path "{ssh_dest}" --nsg-rule NONE -vm show -n {vm_2} -g {rg} -vm availability-set create --name {availset} -g {rg} --unmanaged --platform-fault-domain-count 3 --platform-update-domain-count 3 -network public-ip create --name {pubip} -g {rg} -network vnet create --name {vnet} -g {rg} --subnet-name {subnet} -network nsg create --name {nsg} -g {rg} -vm create --image UbuntuLTS --os-disk-name {disk} --os-disk-delete-option Delete --vnet-name {vnet} --subnet {subnet} --availability-set {availset} --public-ip-address {pubip} -l "West US" --nsg {nsg} --use-unmanaged-disk --size Standard_DS2 --admin-username user11 --storage-account {sa} --storage-container-name {container} -g {rg} --name {vm} --ssh-key-value '{ssh_key}' -vm availability-set show -n {availset} -g {rg} -network nsg show -n {nsg} -g {rg} -network nic show -n {vm}VMNic -g {rg} -vm show -n {vm} -g {rg} -vm create -g {rg} -n {vm1} --image UbuntuLTS --enable-agent --admin-username azureuser --admin-password {pswd} --authentication-type password --nsg-rule NONE -vm show -g {rg} -n {vm1} -vm create -g {rg} -n {vm2} --image Win2019Datacenter --admin-username azureuser --admin-password {pswd} --authentication-type password --enable-agent false --nsg-rule NONE -vm show -g {rg} -n {vm2} -vm availability-set create --name {availset} -g {rg} --unmanaged --platform-fault-domain-count 3 --platform-update-domain-count 3 -network public-ip create --name {pubip} -g {rg} -network vnet create --name {vnet} -g {rg} --subnet-name {subnet} -network nsg create --name {nsg} -g {rg} -vm create --image UbuntuLTS --os-disk-name {disk} --subnet {subnet_id} --availability-set {availset_id} --public-ip-address {pubip_id} -l "West US" --nsg {nsg_id} --use-unmanaged-disk --size Standard_DS2 --admin-username user11 --storage-account {sa} --storage-container-name {container} -g {rg} --name {vm} --ssh-key-value '{ssh_key}' -vm availability-set show -n {availset} -g {rg} -network nsg show -n {nsg} -g {rg} -network nic show -n {vm}VMNic -g {rg} -vm show -n {vm} -g {rg} -vm create -n {vm} -g {rg} --image UbuntuLTS --admin-username user11 --private-ip-address 10.0.0.5 --public-ip-sku {public_ip_sku} --public-ip-address-dns-name {dns} --generate-ssh-keys --nsg-rule NONE -network public-ip show -n {vm}PublicIP -g {rg} -network nic show -n {vm}VMNic -g {rg} -vm create -n {vm2} -g {rg} --image UbuntuLTS --admin-username user11 --generate-ssh-keys --nsg-rule NONE -network public-ip show -n {vm2}PublicIP -g {rg} -vm create -g {rg} --location {loc} -n {vm} --admin-username admin123 --image centos --admin-password testPassword0 --authentication-type password --nsg-rule NONE -vm disk attach -g {rg} --vm-name {vm} --name {disk1} --new --size-gb 1 --caching ReadOnly -vm disk attach -g {rg} --vm-name {vm} --name {disk2} --new --size-gb 2 --lun 2 --sku standard_lrs -vm show -g {rg} -n {vm} -vm disk detach -g {rg} --vm-name {vm} -n {disk1} -vm show -g {rg} -n {vm} -vm disk attach -g {rg} --vm-name {vm} --name {disk1} -vm show -g {rg} -n {vm} -vm disk detach -g {rg} --vm-name {vm} -n {disk2} -vm disk detach -g {rg} --vm-name {vm} -n {disk1} -vm show -g {rg} -n {vm} -vm disk attach -g {rg} --vm-name {vm} --name {disk1} --caching ReadWrite --sku standard_lrs -vm show -g {rg} -n {vm} -disk create -g {rg} -n {disk1} --size-gb 4 -snapshot create -g {rg} -n {snapshot1} --source {disk1} --sku Standard_ZRS -vm create -g {rg} -n {vm} --admin-username admin123 --admin-password testPassword0 --image debian --storage-sku StandardSSD_LRS --data-disk-sizes-gb 1 --nsg-rule NONE -vm disk attach -g {rg} --vm-name {vm} --name {disk1} --new --size-gb 1 --sku premium_lrs -vm disk attach -g {rg} --vm-name {vm} --name {disk2} --new --size-gb 2 --sku StandardSSD_LRS -disk create -g {rg} -n {disk3} --size-gb 4 --sku StandardSSD_LRS -vm disk attach -g {rg} --vm-name {vm} --name {disk3} -vm show -g {rg} -n {vm} -vm create -g {rg} -n {vm} --image UbuntuLTS --enable-hibernation True -vm show -g {rg} -n {vm} -vm deallocate -g {rg} -n {vm} -vm update -g {rg} -n {vm} --enable-hibernation False -disk create -g {rg} -n {disk1} --size-gb 4 --sku UltraSSD_LRS --disk-iops-read-write 500 --disk-mbps-read-write 8 --zone 2 -disk update -g {rg} -n {disk1} --disk-iops-read-write 510 --disk-mbps-read-write 10 -disk create -g {rg} -n {disk1} --size-gb 4 --sku UltraSSD_LRS --disk-iops-read-write 500 --disk-mbps-read-write 8 --zone 2 -disk show -g {rg} -n {disk1} -disk create -g {rg} -n {disk2} --size-gb 4 --sku UltraSSD_LRS -vm create -g {rg} -n {vm} --admin-username admin123 --size Standard_D2s_v3 --admin-password testPassword0 --image debian --storage-sku UltraSSD_LRS --data-disk-sizes-gb 4 --zone 2 --location eastus --nsg-rule NONE -vm disk attach -g {rg} --vm-name {vm} --name {disk3} --new --size-gb 5 --sku UltraSSD_LRS -vm disk attach -g {rg} --vm-name {vm} --name {disk1} -vm show -g {rg} -n {vm} -vm create -g {rg} -n {vm2} --admin-username admin123 --admin-password testPassword0 --image debian --size Standard_D2s_v3 --ultra-ssd-enabled --zone 2 --location eastus --nsg-rule NONE -vm disk attach -g {rg} --vm-name {vm2} --name {disk4} --new --size-gb 5 --sku UltraSSD_LRS -vm show -g {rg} -n {vm2} -vm create -g {rg} -n {vm} --image centos --size Standard_D2s_v3 --zone 2 --admin-username azureuser --admin-password testPassword0 --authentication-type password --nsg-rule NONE -vm deallocate -g {rg} -n {vm} -vm update -g {rg} -n {vm} --ultra-ssd-enabled -vmss create -g {rg} -n {vmss} --image centos --vm-sku Standard_D2s_v3 --zone 2 --admin-username azureuser --admin-password testPassword0 --authentication-type password --lb "" -vmss deallocate -g {rg} -n {vmss} -vmss update -g {rg} -n {vmss} --ultra-ssd-enabled -vmss create -g {rg} -n {vmss} --admin-username admin123 --admin-password testPassword0 --image debian --storage-sku UltraSSD_LRS --data-disk-sizes-gb 4 --zone 2 --location eastus --vm-sku Standard_D2s_v3 --instance-count 1 --lb "" -vmss show -g {rg} -n {vmss} -vmss create -g {rg} -n {vmss2} --admin-username admin123 --admin-password testPassword0 --image debian --ultra-ssd-enabled --zone 2 --location eastus --vm-sku Standard_D2s_v3 --lb "" -vmss disk attach -g {rg} --vmss-name {vmss2} --size-gb 5 --sku UltraSSD_LRS -vmss show -g {rg} -n {vmss2} -vm create -g {rg} --location {loc} -n {vm} --admin-username ubuntu --image UbuntuLTS --admin-password testPassword0 --authentication-type password --use-unmanaged-disk --nsg-rule NONE -vm show -g {rg} -n {vm} -vm unmanaged-disk attach -g {rg} --vm-name {vm} -n {disk} --vhd {vhd_uri} --new --caching ReadWrite --size-gb 8 --lun 1 -vm show -g {rg} -n {vm} -vm unmanaged-disk detach -g {rg} --vm-name {vm} -n {disk} -vm show -g {rg} -n {vm} -vm unmanaged-disk attach -g {rg} --vm-name {vm} -n {disk} --vhd {vhd_uri} --caching ReadOnly -vm create -g {rg} -n {vm} --admin-username {username} --authentication-type {auth} --image {image} --ssh-key-value '{ssh_key}' -l {loc} --custom-data '{custom_data}' --nsg-rule NONE -vm show -g {rg} -n {vm} -vm create -g {rg} -n {vm} --admin-username {username} --authentication-type {auth} --image {image} --ssh-key-value '{ssh_key}' -l {loc} --user-data '{user_data}' --nsg-rule NONE -vm show -g {rg} -n {vm} --include-user-data -vm show -g {rg} -n {vm} --include-user-data --show-details -vm show -g {rg} -n {vm} -vm show -g {rg} -n {vm} --show-details -vm update -g {rg} -n {vm} --user-data @"{user_data_file}" -vm show -g {rg} -n {vm} --include-user-data -vm update -g {rg} -n {vm} --user-data "" -vm show -g {rg} -n {vm} --include-user-data -vmss create --admin-password testPassword0 --name {vmss} -g {rg} --admin-username myadmin --image Win2012R2Datacenter --instance-count {count} -vmss show --name {vmss} -g {rg} -vmss list -vmss list --resource-group {rg} -vmss list-skus --resource-group {rg} --name {vmss} -vmss show --resource-group {rg} --name {vmss} -vmss list-instances --resource-group {rg} --name {vmss} --query "[].instanceId" -vmss update-instances --resource-group {rg} --name {vmss} --instance-ids {instance_ids} -vmss get-instance-view --resource-group {rg} --name {vmss} -vmss stop --resource-group {rg} --name {vmss} -vmss start --resource-group {rg} --name {vmss} -vmss restart --resource-group {rg} --name {vmss} -vmss scale --resource-group {rg} --name {vmss} --new-capacity {new_count} -vmss show --resource-group {rg} --name {vmss} -vmss list-instances --resource-group {rg} --name {vmss} --query "[].instanceId" -vmss delete-instances --resource-group {rg} --name {vmss} --instance-ids {instance_ids} -vmss get-instance-view --resource-group {rg} --name {vmss} -vmss deallocate --resource-group {rg} --name {vmss} -vmss delete --resource-group {rg} --name {vmss} -vmss list --resource-group {rg} -vmss create -g {rg} -n {vmss} --image centos --scale-in-policy NewestVM --admin-username azureuser -vmss update -g {rg} -n {vmss} --scale-in-policy OldestVM -vmss create --image Debian -l westus -g {rg} -n {vmss_1} --authentication-type all --admin-username myadmin --admin-password testPassword0 --ssh-key-value '{ssh_key}' -vmss create --image Debian -l westus -g {rg} -n {vmss_2} --authentication-type ssh --admin-username myadmin --ssh-key-value "{ssh_key}" "{ssh_key_2}" --ssh-dest-key-path "{ssh_dest}" -vmss create --resource-group {rg} --name {vmss} --image {image} --ephemeral-os-disk --disable-overprovision --instance-count {count} --data-disk-sizes-gb 1 --storage-sku os=standard_lrs 0=premium_lrs --admin-username {user} --admin-password {password} -vmss show -g {rg} -n {vmss} -vmss create --resource-group {rg} --name {vmss_2} --image {image} --ephemeral-os-disk --os-disk-caching {caching} --disable-overprovision --instance-count {count} --admin-username {user} --admin-password {password} -vmss show -g {rg} -n {vmss_2} -vmss create -n {base} -g {rg} --image {image} --vm-sku Standard_DS4_v2 --ephemeral-os-disk --ephemeral-os-disk-placement {placement1} -vmss show -g {rg} -n {base} -vmss create --resource-group {rg} --name {vmss} --image {image} --vm-sku Standard_DS4_v2 --ephemeral-os-disk --ephemeral-os-disk-placement {placement1} --disable-overprovision --instance-count {count} --data-disk-sizes-gb 1 --storage-sku os=standard_lrs 0=premium_lrs --admin-username {user} --admin-password {password} -vmss show -g {rg} -n {vmss} -vmss create --resource-group {rg} --name {vmss_2} --image {image} --ephemeral-os-disk --ephemeral-os-disk-placement {placement2} --os-disk-caching {caching} --disable-overprovision --instance-count {count} --admin-username {user} --admin-password {password} -vmss show -g {rg} -n {vmss_2} -network public-ip create --name {ip} -g {rg} -vmss create --image Debian --admin-password testPassword0 -l westus -g {rg} -n {vmss} --disable-overprovision --instance-count {count} --os-disk-caching {caching} --upgrade-policy-mode {update} --authentication-type password --admin-username myadmin --public-ip-address {ip} --os-disk-size-gb 40 --data-disk-sizes-gb 1 --vm-sku Standard_D2_v2 --computer-name-prefix vmss1 -network lb show -g {rg} -n {vmss}lb -vmss show -g {rg} -n {vmss} -vmss list-instances -g {rg} -n {vmss} --query "[].instanceId" -vmss show -g {rg} -n {vmss} --instance-id {id} -vmss disk attach -g {rg} --vmss-name {vmss} --size-gb 3 -vmss show -g {rg} -n {vmss} -vmss disk detach -g {rg} --vmss-name {vmss} --lun 1 -vmss show -g {rg} -n {vmss} -vmss create --image Debian --admin-password testPassword0 -g {rg} -n {vmss} --instance-count 1 --generate-ssh-keys --admin-username myadmin --max-batch-instance-percent {maxBIP} --max-unhealthy-instance-percent {maxUIP} --max-unhealthy-upgraded-instance-percent {maxUUIP} --pause-time-between-batches {PTB} --prioritize-unhealthy-instances true -vmss show -g {rg} -n {vmss} -vmss create --image Debian --admin-username clitest1 --admin-password testPassword0 -l westus -g {rg} -n {vmss} --storage-sku {sku} -disk create -g {rg} -n {disk} --size-gb 1 --sku {sku} -vmss list-instances -g {rg} -n {vmss} -vmss disk attach -g {rg} --vmss-name {vmss} --instance-id {instance_id} --disk {disk} --caching {caching} -vmss list-instances -g {rg} -n {vmss} --query "[?instanceId=='{instance_id}']" -vmss disk detach -g {rg} --vmss-name {vmss} --instance-id {instance_id} --lun 0 -vmss list-instances -g {rg} -n {vmss} --query "[?instanceId=='{instance_id}']" -vmss create -g {rg} --name {vmss} --validate --image UbuntuLTS --disable-overprovision --instance-count 101 --single-placement-group false --admin-username ubuntuadmin --generate-ssh-keys --lb "" -vmss create -n {vmss} -g {rg} --image Debian --load-balancer {quotes} --admin-username ubuntu --ssh-key-value '{ssh_key}' --public-ip-address {quotes} --tags {quotes} --vm-sku Basic_A1 -vmss show -n {vmss} -g {rg} -vmss update -g {rg} -n {vmss} --set tags.test=success -network public-ip show -n {vmss}PublicIP -g {rg} -vmss create -n {vmss} -g {rg} --image Debian --admin-username clittester --ssh-key-value '{ssh_key}' --app-gateway apt1 --instance-count 5 -vmss show -n {vmss} -g {rg} -network lb create -g {rg} -n {lb} --backend-pool-name test -vmss create -g {rg} -n {vmss} --load-balancer {lb} --image UbuntuLTS --admin-username clitester --admin-password TestTest12#$ -vmss create -g {rg} -n {vmss} --admin-username clitester --admin-password PasswordPassword1! --image debian --single-placement-group false -vmss show -g {rg} -n {vmss} -network lb list -g {rg} -network public-ip list -g {rg} -network nsg create -g {rg} -n {nsg} -vmss create -n {vmss} -g {rg} --image Debian --admin-username clittester --ssh-key-value '{ssh_key}' --vm-domain-name {dns_label} --public-ip-per-vm --dns-servers 10.0.0.6 10.0.0.5 --nsg {nsg} -vmss show -n {vmss} -g {rg} -vmss list-instance-public-ips -n {vmss} -g {rg} -vmss create -g {rg} -n {flex_vmss} --image UbuntuLTS --orchestration-mode Flexible -vmss list-instance-public-ips -n {flex_vmss} -g {rg} -vmss create -g {rg} -n {vmss} --image Win2012R2Datacenter --admin-username clitest1234 --admin-password Test123456789# --license-type Windows_Server --instance-count 1 -vmss show -g {rg} -n {vmss} -vmss update -g {rg} -n {vmss} --license-type None -vmss update -g {rg} -n {vmss} --set virtualMachineProfile.licenseType=Windows_Server -vmss list-instances -n {vmss} -g {rg} -vmss update -g {rg} -n {vmss} --protect-from-scale-in True --protect-from-scale-set-actions True --instance-id {instance_id} -vmss update -g {rg} -n {vmss} --set protectionPolicy.protectFromScaleIn=False protectionPolicy.protectFromScaleSetActions=False --instance-id {instance_id} -vmss update -g {rg} -n {vmss} --protect-from-scale-in True --protect-from-scale-set-actions True -vmss create -n {vm1} -g {rg} --image {image} --vm-sku Standard_DS4_v2 --ephemeral-os-disk -vmss show -g {rg} -n {vm1} -vmss update --resource-group {rg} --name {vm1} --vm-sku {size1} --ephemeral-os-disk-placement {placement1} -vmss show -g {rg} -n {vm1} -vmss update --resource-group {rg} --name {vm1} --vm-sku {size2} --ephemeral-os-disk-placement {placement2} --set tags.tagName=tagValue -vmss show -g {rg} -n {vm1} -vm create -g {rg} -n {vm} --image centos --admin-username clitest1 --generate-ssh-key --nsg-rule None -vm run-command invoke -g {rg} -n {vm} --command-id RunShellScript --scripts "echo 'sudo waagent -deprovision+user --force' | at -M now + 1 minutes" -vm deallocate -g {rg} -n {vm} -vm generalize -g {rg} -n {vm} -image create -g {rg} -n {img} --source {vm} -vmss create -g {rg} -n {vmss} --image {image_id} -vmss update -g {rg} -n {vmss} --set tags.foo=bar -vmss create -g {rg} -n {vmss} --image Win2012R2Datacenter --admin-username clitest1234 --admin-password Test123456789# --license-type Windows_Server --instance-count 1 --generate-ssh-keys -vmss update -g {rg} -n {vmss} --max-batch-instance-percent {maxBIP} --max-unhealthy-instance-percent {maxUIP} --max-unhealthy-upgraded-instance-percent {maxUUIP} --pause-time-between-batches {PTB} --prioritize-unhealthy-instances true -vmss create -n {base} -g {rg} --image {image} --vm-sku Standard_DS4_v2 -vmss show -g {rg} -n {base} -vmss update --resource-group {rg} --name {base} --vm-sku {vm_sku} --set tags.tagName=tagValue -vmss show -g {rg} -n {base} -vmss update --resource-group {rg} --name {base} --vm-sku {vm_sku} --set tags.tagName=tagValue -vmss show -g {rg} -n {base} -vmss create -n {base2} -g {rg} --image {image} --location {loc} -vmss show -g {rg} -n {base2} -vmss update --resource-group {rg} --name {base2} --vm-sku {vm_sku} -vmss show -g {rg} -n {base2} -vm create -n {vm} -g {rg} --size Standard_DS4_v2 --image ubuntults --admin-username clittester --generate-ssh-keys --nsg-rule NONE -network nic show -n {vm}vmnic -g {rg} -vmss create -n {vmss} -g {rg} --vm-sku Standard_DS4_v2 --image Win2016Datacenter --admin-username clittester --admin-password Test12345678!!! --accelerated-networking --instance-count 1 -vmss show -n {vmss} -g {rg} -network asg create -g {rg} -n {asg} -vmss create -g {rg} -n {vmss} --image debian --instance-count 1 --asgs {asg} --admin-username clittester --generate-ssh-keys -vm create -g {rg} -n {vm} --image debian --asgs {asg} --admin-username clittester --generate-ssh-keys --nsg-rule NONE -vmss show -g {rg} -n {vmss} -network nic show -g {rg} -n {vm}VMNIC -vm create -g {rg} -n {vm} --admin-username {admin} --authentication-type {auth} --image {image} --ssh-key-value '{ssh_key}' -l {loc} --secrets '{secrets}' --nsg-rule NONE -keyvault show -g {rg} -n {vault} -keyvault certificate create --vault-name {vault} -n cert1 -p @"{policy_path}" -keyvault secret list-versions --vault-name {vault} -n cert1 --query "[?attributes.enabled].id" -o tsv -vm secret format -s {secret_out} -vm create -g {rg} -n {vm} --admin-username {admin} --authentication-type {auth} --image {image} --ssh-key-value '{ssh_key}' -l {loc} --secrets '{secrets}' --nsg-rule NONE -vm show -g {rg} -n {vm} -vm create -g {rg} -n {vm} --admin-username {admin} --admin-password VerySecret!12 --image {image} -l {loc} --secrets '{secrets}' --nsg-rule NONE -keyvault show -g {rg} -n {vault} -keyvault certificate create --vault-name {vault} -n cert1 -p @"{policy_path}" -keyvault secret list-versions --vault-name {vault} -n cert1 --query "[?attributes.enabled].id" -o tsv -vm secret format -s {secret_out} --certificate-store "My" -vm create -g {rg} -n {vm} --admin-username {admin} --admin-password VerySecret!12 --image {image} -l {loc} --secrets "{secrets}" --nsg-rule NONE -vm show -g {rg} -n {vm} -keyvault show -g {rg} -n {vault} -keyvault certificate create --vault-name {vault} -n cert1 -p @"{policy_path}" -keyvault secret list-versions --vault-name {vault} -n cert1 --query "[?attributes.enabled].id" -o tsv -vm secret format -s {secret_out} -vmss create -n {vmss} -g {rg} --image Debian --admin-username deploy --ssh-key-value '{ssh_key}' --secrets '{secrets}' -vmss show -n {vmss} -g {rg} -network vnet create -n {vnet} -g {rg} --subnet-name {subnet} -network lb create --name {lb} -g {rg} --backend-pool-name {bepool} -vmss create --image CentOS --os-disk-name {os_disk} --admin-username ubuntu --vnet-name {vnet} --subnet {subnet} -l "West US" --vm-sku {sku} --storage-container-name {container} -g {rg} --name {vmss} --load-balancer {lb} --ssh-key-value '{ssh_key}' --backend-pool-name {bepool} --use-unmanaged-disk -vmss show --name {vmss} -g {rg} -network lb show --name {lb} -g {rg} -network vnet show --name {vnet} -g {rg} -network vnet create -n {vnet} -g {rg} --subnet-name {subnet} -network lb create --name {lb} -g {rg} --backend-pool-name {bepool} -vmss create --image CentOS --os-disk-name {os_disk} --admin-username ubuntu --subnet {subnet_id} -l "West US" --vm-sku {sku} --storage-container-name {container} -g {rg} --name {vmss} --load-balancer {lb_id} --ssh-key-value '{ssh_key}' --backend-pool-name {bepool} --use-unmanaged-disk -vmss show --name {vmss} -g {rg} -network lb show --name {lb} -g {rg} -network vnet show --name {vnet} -g {rg} -vmss create -g {rg} -n {vmss} --image UbuntuLTS --authentication-type password --admin-username admin123 --admin-password TestTest12#$ --instance-count {count} -vmss list-instances --resource-group {rg} --name {vmss} -vmss show --resource-group {rg} --name {vmss} --instance-id {id} -vmss list-instance-connection-info --resource-group {rg} --name {vmss} -vmss restart --resource-group {rg} --name {vmss} --instance-ids * -vmss get-instance-view --resource-group {rg} --name {vmss} --instance-id 1 -vmss get-instance-view --resource-group {rg} --name {vmss} --instance-id 3 -vmss stop --resource-group {rg} --name {vmss} --instance-ids * -vmss get-instance-view --resource-group {rg} --name {vmss} --instance-id 1 -vmss get-instance-view --resource-group {rg} --name {vmss} --instance-id 3 -vmss start --resource-group {rg} --name {vmss} --instance-ids * -vmss get-instance-view --resource-group {rg} --name {vmss} --instance-id 1 -vmss get-instance-view --resource-group {rg} --name {vmss} --instance-id 3 -vmss deallocate --resource-group {rg} --name {vmss} --instance-ids * -vmss get-instance-view --resource-group {rg} --name {vmss} --instance-id 1 -vmss get-instance-view --resource-group {rg} --name {vmss} --instance-id 3 -vmss delete-instances --resource-group {rg} --name {vmss} --instance-ids * -vmss list-instances --resource-group {rg} --name {vmss} -vmss create -g {rg} -n {flex_vmss} --image UbuntuLTS --orchestration-mode Flexible -vmss list-instance-connection-info --resource-group {rg} --name {flex_vmss} -vmss create -g {rg} -n {spot_vmss_name} --location NorthEurope --instance-count 2 --image Centos --priority Spot --eviction-policy Deallocate --single-placement-group True --enable-spot-restore {enabled_1} --spot-restore-timeout {restore_timeout1} -vmss update -g {rg} -n {spot_vmss_name} --enable-spot-restore {enabled_2} --spot-restore-timeout {restore_timeout2} -vmss create --resource-group {rg} --name {vmss1} --location {loc} --instance-count 2 --image Centos --priority Regular -vmss list-instances --resource-group {rg} --name {vmss1} -vmss simulate-eviction --resource-group {rg} --name {vmss1} --instance-id {id} -vmss create --resource-group {rg} --name {vmss2} --location {loc} --instance-count 2 --image Centos --priority Spot --eviction-policy Deallocate --single-placement-group True -vmss list-instances --resource-group {rg} --name {vmss2} -vmss simulate-eviction --resource-group {rg} --name {vmss2} --instance-id {id} -vmss get-instance-view --resource-group {rg} --name {vmss2} --instance-id {id} -vmss create --resource-group {rg} --name {vmss3} --location {loc} --instance-count 2 --image Centos --priority Spot --eviction-policy Delete --single-placement-group True -vmss list-instances --resource-group {rg} --name {vmss3} -vmss simulate-eviction --resource-group {rg} --name {vmss3} --instance-id {id} -vmss list-instances --resource-group {rg} --name {vmss3} -vmss get-instance-view --resource-group {rg} --name {vmss3} --instance-id {id} -vmss create -n {vmss} -g {rg} --image Debian --admin-username deploy --ssh-key-value "{ssh_key}" --custom-data "#cloud-config -hostname: myVMhostname" -vmss show -n {vmss} -g {rg} -vmss create -n {vmss} -g {rg} --image Debian --admin-username deploy --ssh-key-value "{ssh_key}" --user-data "{user_data}" -vmss show -n {vmss} -g {rg} --include-user-data -vmss show -n {vmss} -g {rg} -vmss list-instances -g {rg} -n {vmss} --query "[].instanceId" -vmss show -g {rg} -n {vmss} --instance-id {instance_id} --include-user-data -vmss show -g {rg} -n {vmss} --instance-id {instance_id} -vmss update -g {rg} -n {vmss} --user-data @"{user_data_file}" -vmss show -n {vmss} -g {rg} --include-user-data -vmss update -g {rg} -n {vmss} --instance-id {instance_id} --user-data "user_data" -vmss show -g {rg} -n {vmss} --instance-id {instance_id} --include-user-data -vmss update -g {rg} -n {vmss} --user-data "" -vmss show -n {vmss} -g {rg} --include-user-data -vmss create -g {rg} -n {vmss} --authentication-type password --admin-username admin123 --admin-password PasswordPassword1! --image Win2012R2Datacenter -vmss nic list -g {rg} --vmss-name {vmss} -vmss list-instances -g {rg} -n {vmss} -vmss nic list-vm-nics -g {rg} --vmss-name {vmss} --instance-id {iid} -vmss nic show --resource-group {rg} --vmss-name {vmss} --instance-id {iid} -n {nic} -vmss create -g {rg} -n {vmss} --authentication-type password --admin-username admin123 --admin-password PasswordPassword1! --image UbuntuLTS --use-unmanaged-disk -vmss create -g {rg} -n {vmss} --authentication-type password --admin-username admin123 --admin-password PasswordPassword1! --image UbuntuLTS --use-unmanaged-disk -network vnet list -g {rg} -vmss create -g {rg} -n {vmss} --admin-username admin123 --admin-password PasswordPassword1! --image centos --instance-count 1 --public-ip-address "" -vmss list-instance-connection-info -g {rg} -n {vmss} -identity create -g {rg} -n {emsi} --tags tag1=d1 -identity create -g {rg} -n {emsi2} -vm create -g {rg} -n vm2 --image ubuntults --assign-identity {emsi} --generate-ssh-keys --admin-username {user} --nsg-rule NONE -vm create -g {rg} -n {vm} --image ubuntults --assign-identity {emsi} [system] --role reader --scope {scope} --generate-ssh-keys --admin-username {user} --nsg-rule NONE -vm identity show -g {rg} -n {vm} -vm identity assign -g {rg} -n {vm} --identities {emsi2} -vm identity show -g {rg} -n {vm} -vm identity remove -g {rg} -n {vm} --identities {emsi} -vm identity show -g {rg} -n {vm} -vm identity remove -g {rg} -n {vm} --identities {emsi2} -vm identity show -g {rg} -n {vm} -vm identity remove -g {rg} -n {vm} -vm identity remove -g {rg} -n {vm} -vm create -g {rg} -n {vm1} --image debian --assign-identity --admin-username admin123 --admin-password PasswordPassword1! --scope {scope} --nsg-rule NONE -vm create -g {rg} -n {vm2} --image Win2016Datacenter --assign-identity --scope {vm1_id} --role reader --admin-username admin123 --admin-password PasswordPassword1! --nsg-rule NONE -vm create -g {rg} -n {vm3} --image debian --admin-username admin123 --admin-password PasswordPassword1! --nsg-rule NONE -vm identity assign -g {rg} -n {vm3} --scope {vm1_id} --role reader -vm identity remove -g {rg} -n {vm3} -vm identity show -g {rg} -n {vm3} -vm create -g {rg} -n {vm1} --image debian --assign-identity --admin-username admin123 --admin-password PasswordPassword1! --nsg-rule NONE -vmss create -g {rg} -n {vmss1} --image debian --assign-identity --admin-username admin123 --admin-password PasswordPassword1! -vm create -g {rg} -n {vm2} --image debian --admin-username admin123 --admin-password PasswordPassword1! --nsg-rule NONE -vm identity assign -g {rg} -n {vm2} -vmss create -g {rg} -n {vmss2} --image debian --admin-username admin123 --admin-password PasswordPassword1! -vmss identity assign -g {rg} -n {vmss2} -identity create -g {rg} -n {emsi} -identity create -g {rg} -n {emsi2} -vmss create -g {rg} -n {vmss} --image ubuntults --assign-identity {emsi} [system] --role reader --scope {scope} --instance-count 1 --generate-ssh-keys --admin-username ubuntuadmin -vmss identity show -g {rg} -n {vmss} -vmss identity assign -g {rg} -n {vmss} --identities {emsi2} -vmss identity show -g {rg} -n {vmss} -vmss update-instances -g {rg} -n {vmss} --instance-ids * -vmss identity remove -g {rg} -n {vmss} --identities {emsi} -vmss show -g {rg} -n {vmss} -vmss identity remove -g {rg} -n {vmss} --identities {emsi2} -vmss identity show -g {rg} -n {vmss} -vmss create -g {rg} -n {vmss1} --image debian --instance-count 1 --assign-identity --admin-username admin123 --admin-password PasswordPassword1! --scope {scope} -vmss create -g {rg} -n {vmss2} --image Win2016Datacenter --instance-count 1 --assign-identity --scope {vmss1_id} --role reader --admin-username admin123 --admin-password PasswordPassword1! -vmss create -g {rg} -n {vmss3} --image debian --instance-count 1 --admin-username admin123 --admin-password PasswordPassword1! -vmss identity assign -g {rg} -n {vmss3} --scope "{vmss1_id}" --role reader -vmss identity remove -g {rg} -n {vmss3} -vmss identity show -g {rg} -n {vmss3} -vmss identity remove -g {rg} -n {vmss3} -vm create -g {rg} -n {vm} --admin-username clitester --admin-password PasswordPassword1! --image debian --zone {zones} --public-ip-address {ip} --nsg-rule NONE -network public-ip show -g {rg} -n {ip} -vm show -g {rg} -n {vm} -otable -disk create -g {rg} -n {disk} --size-gb {size} --zone {zones} -disk show -g {rg} -n {disk} -disk show -g {rg} -n {disk} -otable -disk list -g {rg} -otable -vm create -g {rg} -n vm1 --admin-username clitester --admin-password PasswordPassword1! --image debian --zone 1 -vm create -g {rg} -n {vm} --image ubuntults -vm run-command create -g {rg} --vm-name {vm} --name {run_cmd} -vm run-command show --vm-name {vm} --name {run_cmd} -g {rg} --instance-view -vm run-command update -g {rg} --vm-name {vm} --name {run_cmd} --vm-name {vm} --script script1 --parameters arg1=f1 --run-as-user user1 --timeout-in-seconds 3600 -vm run-command list --vm-name {vm} -g {rg} -vm run-command show --vm-name {vm} --name {run_cmd} -g {rg} -vm run-command delete --vm-name {vm} --name {run_cmd} -g {rg} -y -vm run-command list --vm-name {vm} -g {rg} -vm create -g {rg} -n {vm} --image debian --admin-username clitest1 --admin-password Test12345678!! --generate-ssh-keys --nsg-rule NONE -vm run-command invoke -g {rg} -n{vm} --command-id RunShellScript --scripts "echo $0 $1" --parameters hello world -vmss create -g {rg} -n {vmss} --image ubuntults --admin-username {user} --generate-ssh-keys -vmss list-instances --resource-group {rg} --name {vmss} --query "[].instanceId" -vmss run-command create --name {run_cmd} -g {rg} --vmss-name {vmss} --instance-id {instance_id} -vmss run-command show --vmss-name {vmss} --name {run_cmd} --instance-id {instance_id} -g {rg} --instance-view -vmss run-command update --name {run_cmd} -g {rg} --vmss-name {vmss} --instance-id {instance_id} --script script1 --parameters arg1=f1 --run-as-user user1 --timeout-in-seconds 3600 -vmss run-command list --vmss-name {vmss} -g {rg} --instance-id {instance_id} -vmss run-command show --vmss-name {vmss} --name {run_cmd} --instance-id {instance_id} -g {rg} -vmss run-command delete --vmss-name {vmss} --name {run_cmd} --instance-id {instance_id} -g {rg} -y -vmss run-command list --vmss-name {vmss} --instance-id {instance_id} -g {rg} -vmss create -g {rg} -n {vmss} --image debian --admin-username clitest1 --generate-ssh-keys -vmss list-instances --resource-group {rg} --name {vmss} --query "[].instanceId" -vmss run-command invoke -g {rg} -n {vmss} --instance-id {id} --command-id RunShellScript --scripts "echo $0 $1" --parameters hello world -vmss run-command invoke -g {rg} -n {vmss} --instance-id {id} --command-id RunShellScript --scripts "echo $0 $1" --parameters hello world -vm create -g {rg} -n {vm} --image win2012datacenter --admin-username clitester1 --admin-password Test123456789! --nsg-rule NONE -vm encryption enable -g {rg} -n {vm} --disk-encryption-keyvault {vault} -vm encryption show -g {rg} -n {vm} -vm encryption disable -g {rg} -n {vm} -vm create -g {rg} -n {vm} --image centos --generate-ssh-keys --nsg-rule NONE --encryption-at-host --admin-username exampleusername -vm show -g {rg} -n {vm} -vmss create -g {rg} -n {vmss} --image centos --generate-ssh-keys --encryption-at-host --admin-username exampleusername -vmss show -g {rg} -n {vmss} -vmss update -g {rg} -n {vmss} --set tags.rule=test -vmss create -g {rg} -n {vmss} --image win2016datacenter --instance-count 1 --admin-username clitester1 --admin-password Test123456789! -vmss encryption enable -g {rg} -n {vmss} --disk-encryption-keyvault {vault} -vmss update-instances -g {rg} -n {vmss} --instance-ids "*" -vmss encryption show -g {rg} -n {vmss} -vmss show -g {rg} -n {vmss} -vmss encryption disable -g {rg} -n {vmss} -vmss update-instances -g {rg} -n {vmss} --instance-ids "*" -vmss encryption show -g {rg} -n {vmss} -vmss show -g {rg} -n {vmss} -network public-ip create -g {rg} -n my-pip -network vnet create -g {rg} -n my-vnet --subnet-name my-subnet1 -network nsg create -g {rg} -n nsg -network nic create -g {rg} -n my-nic --subnet my-subnet1 --vnet-name my-vnet --public-ip-address my-pip --network-security-group nsg -network nic ip-config create -n my-ipconfig2 -g {rg} --nic-name my-nic --private-ip-address-version IPv6 -vm create -g {rg} -n vm1 --image centos --nics my-nic --generate-ssh-keys --admin-username ubuntuadmin -vm show -g {rg} -n vm1 -d -vm create -g {rg} -n {vm} --image rhel --generate-ssh-keys --admin-username rheladmin --nsg-rule NONE -keyvault certificate create --vault-name {vault} -n {cert} -p @"{policy_path}" -vm secret add -g {rg} -n {vm} --keyvault {vault} --certificate {cert} -vm secret list -g {rg} -n {vm} -vm secret remove -g {rg} -n {vm} --keyvault {vault} --certificate {cert} -vm secret list -g {rg} -n {vm} -vm create -g {rg} -n {vm} --image centos --admin-username clitest123 --generate-ssh-keys --nsg-rule NONE -vm show -g {rg} -n {vm} -disk create -g {rg} -n {backupDisk} --source /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Compute/disks/vm1_OsDisk_1_840186fdf6314d2d9fc43ffc2c275f39 -vm stop -g {rg} -n {vm} -vm update -g {rg} -n {vm} --os-disk /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Compute/disks/disk1 -vm show -g {rg} -n {vm} -vm create -g {rg} -n {vm} --image debian --data-disk-sizes-gb 1 2 --admin-username cligenerics --generate-ssh-keys --nsg-rule NONE -vm update -g {rg} -n {vm} --set identity.type="SystemAssigned" -vm update -g {rg} -n {vm} --set storageProfile.dataDisks[0].caching="ReadWrite" -vm update -g {rg} -n {vm} --remove storageProfile.dataDisks -sig create -g {rg} --gallery-name {gallery} --permissions groups -sig image-definition create -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --os-type linux -p publisher1 -f offer1 -s sku1 -vm create -g {rg} -n {vm} --image ubuntults --data-disk-sizes-gb 10 --admin-username clitest1 --generate-ssh-key --nsg-rule None -vm deallocate -g {rg} -n {vm} -vm generalize -g {rg} -n {vm} -image create -g {rg} -n {captured} --source {vm} -sig image-version create -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --gallery-image-version {version} --managed-image {captured} --replica-count 1 -sig show --gallery-name {gallery} --resource-group {rg} --select Permissions -sig share add --gallery-name {gallery} -g {rg} --subscription-ids {subId} --tenant-ids {tenantId} -sig image-version show-shared --gallery-image-definition {image} --gallery-unique-name {unique_name} --location {location} --gallery-image-version {version} -vm create -g {rg} -n {vm_with_shared_gallery_version} --image {shared_gallery_image_version} --admin-username clitest1 --generate-ssh-key --nsg-rule None -vm show -g {rg} -n {vm_with_shared_gallery_version} -vm create -g {rg} -n {vm_with_shared_gallery_version2} --image {shared_gallery_image_version} --admin-username clitest1 --generate-ssh-key --nsg-rule None --os-type linux -vm show -g {rg} -n {vm_with_shared_gallery_version2} -vmss create -g {rg} -n {vmss_with_shared_gallery_version} --image {shared_gallery_image_version} --generate-ssh-keys --upgrade-policy-mode automatic --admin-username clitest1 -vmss show -g {rg} -n {vmss_with_shared_gallery_version} -sig share reset --gallery-name {gallery} -g {rg} -sig show --gallery-name {gallery} --resource-group {rg} --select Permissions -sig create -g {rg} --gallery-name {gallery} -sig list -g {rg} -sig show -g {rg} --gallery-name {gallery} -sig image-definition create -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --os-type linux -p publisher1 -f offer1 -s sku1 -sig image-definition list -g {rg} --gallery-name {gallery} -sig image-definition show -g {rg} --gallery-name {gallery} --gallery-image-definition {image} -vm create -g {rg} -n {vm} --image ubuntults --data-disk-sizes-gb 10 --admin-username clitest1 --generate-ssh-key --nsg-rule NONE -vm run-command invoke -g {rg} -n {vm} --command-id RunShellScript --scripts "echo 'sudo waagent -deprovision+user --force' | at -M now + 1 minutes" -vm deallocate -g {rg} -n {vm} -vm generalize -g {rg} -n {vm} -image create -g {rg} -n {captured} --source {vm} -sig image-version create -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --gallery-image-version {version} --managed-image {captured} --replica-count 1 -sig image-version list -g {rg} --gallery-name {gallery} --gallery-image-definition {image} -sig image-version show -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --gallery-image-version {version} -sig image-version update -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --gallery-image-version {version} --target-regions {location2}=1 {location} --replica-count 2 -keyvault show -g {rg} -n {vault} -keyvault key create -n {key} --vault {vault} --protection software -disk-encryption-set create -g {rg} -n {des1} --key-url {kid} --source-vault {vault} -disk-encryption-set show -g {rg} -n {des1} -keyvault set-policy -n {vault} --object-id {des1_sp_id} --key-permissions wrapKey unwrapKey get -role assignment create --assignee {des1_sp_id} --role Reader --scope {vault_id} -sig image-version create -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --gallery-image-version {version2} --target-regions {location}=1 --target-region-encryption {des1},0,{des1} --managed-image {captured} --replica-count 1 -vm create -g {rg} -n {vm2} --image {image_id} --admin-username clitest1 --generate-ssh-keys --nsg-rule NONE -sig image-version delete -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --gallery-image-version {version} -sig image-version delete -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --gallery-image-version {version2} -sig image-definition delete -g {rg} --gallery-name {gallery} --gallery-image-definition {image} -sig delete -g {rg} --gallery-name {gallery} -vm create -g {rg} -n vm1 --image centos --use-unmanaged-disk --nsg-rule NONE --generate-ssh-key -vm show -g {rg} -n vm1 -sig create -g {rg} --gallery-name {gallery} -sig image-definition create -g {rg} --gallery-name {gallery} --gallery-image-definition image1 --os-type linux -p publisher1 -f offer1 -s sku1 -disk create -g {rg} -n d1 --size-gb 10 -disk create -g {rg} -n d2 --size-gb 10 -snapshot create -g {rg} -n s1 --source d1 -snapshot create -g {rg} -n s2 --source d2 -sig image-version create -g {rg} --gallery-name {gallery} --gallery-image-definition image1 --gallery-image-version 1.0.0 --os-snapshot s1 --data-snapshot-luns 0 --data-snapshots s2 --data-vhds-luns 1 --data-vhds-sa {stac} --data-vhds-uris {vhd} -sig create -g {rg} -r {gallery_name} --soft-delete True -sig show -g {rg} -r {gallery_name} -sig update -g {rg} -r {gallery_name} --soft-delete False -sig show -g {rg} -r {gallery_name} -sig delete -g {rg} -r {gallery_name} -sig create -g {rg} --gallery-name {gallery} -sig image-definition create -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --os-type linux --os-state specialized --hyper-v-generation V2 -p publisher1 -f offer1 -s sku1 -disk create -g {rg} -n d1 --size-gb 10 -disk create -g {rg} -n d2 --size-gb 10 -disk create -g {rg} -n d3 --size-gb 10 -snapshot create -g {rg} -n s1 --source d1 -snapshot create -g {rg} -n s2 --source d2 -snapshot create -g {rg} -n s3 --source d3 -sig image-version create -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --gallery-image-version 1.0.0 --os-snapshot s1 --data-snapshots s2 s3 --data-snapshot-luns 2 3 -sig create -g {rg} -r {sig_name} -sig image-definition create -g {rg} --gallery-name {sig_name} --gallery-image-definition {img_def_name} --os-type linux -p {pub_name} -f {of_name} -s {sku_name} -vm create -g {rg} -n {vm_name} --image Ubuntults -vm deallocate -g {rg} -n {vm_name} -vm generalize -g {rg} -n {vm_name} -image create -g {rg} -n {img_name} --source {vm_name} -sig image-version create --replication-mode Full -g {rg} -r {sig_name} -i {img_def_name} -e 1.1.1 --managed-image {img_name} -sig image-version show -g {rg} -r {sig_name} -i {img_def_name} -e 1.1.1 -sig image-version create --replication-mode Shallow -g {rg} -r {sig_name} -i {img_def_name} -e 1.1.2 --managed-image {img_name} -sig image-version show -g {rg} -r {sig_name} -i {img_def_name} -e 1.1.2 -sig create -g {rg} --gallery-name {gallery} --permissions private -sig image-definition create -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --os-type linux -p publisher1 -f offer1 -s sku1 -sig image-definition show -g {rg} --gallery-name {gallery} --gallery-image-definition {image} -vm create -g {rg} -n {vm} --image ubuntults --data-disk-sizes-gb 10 --admin-username clitest1 --generate-ssh-key --nsg-rule NONE -vm run-command invoke -g {rg} -n {vm} --command-id RunShellScript --scripts "echo 'sudo waagent -deprovision+user --force' | at -M now + 1 minutes" -vm deallocate -g {rg} -n {vm} -vm generalize -g {rg} -n {vm} -image create -g {rg} -n {captured} --source {vm} -sig image-version create -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --gallery-image-version {version} --managed-image {captured} --replica-count 1 -sig update --gallery-name {gallery} --resource-group {rg} --permissions groups -sig show --gallery-name {gallery} --resource-group {rg} --select Permissions -sig update --gallery-name {gallery} --resource-group {rg} --permissions groups --permissions groups -sig share add --gallery-name {gallery} -g {rg} --subscription-ids {subId} {sharedSubId} --tenant-ids {tenantId} -sig show --gallery-name {gallery} --resource-group {rg} --select Permissions -sig share remove --gallery-name {gallery} -g {rg} --subscription-ids {sharedSubId} --tenant-ids {tenantId} -sig show --gallery-name {gallery} --resource-group {rg} --select Permissions -sig list-shared --location {location} -sig show-shared --location {location} --gallery-unique-name {unique_name} -sig image-definition list-shared --gallery-unique-name {unique_name} --location {location} -sig image-definition show-shared --gallery-image-definition {image} --gallery-unique-name {unique_name} --location {location} -sig image-version list-shared --gallery-image-definition {image} --gallery-unique-name {unique_name} --location {location} -sig image-version show-shared --gallery-image-definition {image} --gallery-unique-name {unique_name} --location {location} --gallery-image-version {version} -sig share reset --gallery-name {gallery} -g {rg} -sig show --gallery-name {gallery} --resource-group {rg} --select Permissions -sig create -g {rg} --gallery-name {gallery} -sig image-definition create -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --os-type linux --os-state specialized -p publisher1 -f offer1 -s sku1 -vm create -g {rg} -n {vm1} --image ubuntults --nsg-rule NONE --admin-username azureuser --admin-password testPassword0 --authentication-type password -vm show -g {rg} -n {vm1} -snapshot create -g {rg} -n {snapshot} --source {disk} -sig image-version create -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --gallery-image-version 1.0.0 --os-snapshot {snapshot} -vm create -g {rg} -n {vm2} --image {image_version} --specialized --nsg-rule NONE --admin-username azureuser --admin-password testPassword0 --authentication-type password -vmss create -g {rg} -n {vmss1} --image {image_version} --specialized --admin-username azureuser --admin-password testPassword0 --authentication-type password -vm create -g {rg} -n {vm3} --specialized -vmss create -g {rg} -n {vmss2} --specialized -sig create -r {gallery} -g {rg} -sig gallery-application create -n {app_name} -r {gallery} --os-type windows -g {rg} -sig create -r {gallery} -g {rg} -sig gallery-application update -n {app_name} -r {gallery} -g {rg} --description test --tags tag=test -sig gallery-application list -r {gallery} -g {rg} -sig gallery-application show -n {app_name} -r {gallery} -g {rg} -sig gallery-application delete -n {app_name} -r {gallery} -g {rg} -y -sig gallery-application list -r {gallery} -g {rg} -sig create -r {gallery} -g {rg} -sig gallery-application create -n {app_name} -r {gallery} --os-type windows -g {rg} -storage account create -n {account} -g {rg} -storage account keys list -n {account} -g {rg} --query "[0].value" -storage container create -g {rg} --account-name {account} -n {container} --public-access blob --account-key {storage_key} -storage blob upload -n {blob} --account-name {account} --container-name {container} --file {f1} --type page --account-key {storage_key} -sig gallery-application version create -n {ver_name} --application-name {app_name} -r {gallery} -g {rg} --package-file-link https://{account}.blob.core.windows.net/{container}/{blob} --install-command install --remove-command remove -sig gallery-application version update -n {ver_name} --application-name {app_name} -r {gallery} -g {rg} --package-file-link https://{account}.blob.core.windows.net/{container}/{blob} --tags tag=test -sig gallery-application version list -r {gallery} --application-name {app_name} -g {rg} -sig gallery-application version show -n {ver_name} --application-name {app_name} -r {gallery} -g {rg} -sig gallery-application version delete -n {ver_name} --application-name {app_name} -r {gallery} -g {rg} -y -sig gallery-application version list -r {gallery} --application-name {app_name} -g {rg} -ppg create -g {rg} -n {ppg} -t standard -vmss create -g {rg} -n {vmss} --image debian --admin-username debian --ssh-key-value '{ssh_key}' -vmss show -g {rg} -n {vmss} -vmss deallocate -g {rg} -n {vmss} -vmss update -g {rg} -n {vmss} --ppg {ppg_id} -vm create -g {rg} -n {vm} --image debian --admin-username debian --ssh-key-value '{ssh_key}' --nsg-rule NONE -vm show -g {rg} -n {vm} -vm deallocate -g {rg} -n {vm} -vm update -g {rg} -n {vm} --ppg {ppg_id} -vm availability-set create -g {rg} -n {avset} -vm availability-set update -g {rg} -n {avset} --ppg {ppg_id} -ppg show -n {ppg} -g {rg} -ppg create -n {ppg} -t standard -g {rg} -vm create -g {rg} -n {vm} --image debian --admin-username debian --ssh-key-value '{ssh_key}' --ppg {ppg} --nsg-rule NONE -vmss create -g {rg} -n {vmss} --image debian --admin-username debian --ssh-key-value '{ssh_key}' --ppg {ppg_id} -vmss show -g {rg} -n {vmss} -vm availability-set create -g {rg} -n {avset} --ppg {ppg} -ppg show -n {ppg} -g {rg} -ppg create -n fail_ppg -g {rg} -t notAvalidType -ppg create -n {ppg1} -t StandarD -g {rg} -ppg show -g {rg} -n {ppg1} --include-colocation-status -ppg create -n {ppg2} -t ultra -g {rg} -ppg create -n {ppg3} -g {rg} -vm host group create -n {host-group} -c 3 -g {rg} --tags "foo=bar" -vm host create -n {host-name} --host-group {host-group} -d 2 -g {rg} --sku DSv3-Type1 --auto-replace false --tags "bar=baz" -vm host get-instance-view --host-group {host-group} --name {host-name} -g {rg} -vm host group get-instance-view -g {rg} -n {host-group} -vm host show -g {rg} -n {host-name} --host-group {host-group} -vm create -n {vm-name} --image debian -g {rg} --size Standard_D4s_v3 --host {host_id} --generate-ssh-keys --admin-username azureuser --nsg-rule NONE -vm show -n {vm-name} -g {rg} -vm host show --name {host-name} --host-group {host-group} -g {rg} -vm host group show --name {host-group} -g {rg} -vm delete --name {vm-name} -g {rg} --yes -vm host delete --name {host-name} --host-group {host-group} -g {rg} --yes -vm host group delete --name {host-group} -g {rg} --yes -vm host group create -n {host-group} -c 1 -g {rg2} --automatic-placement -vm host create -n {host-name} --host-group {host-group} -d 0 -g {rg2} --sku DSv3-Type1 -vm create -g {rg2} -n vm1 --image centos --host {host_id} --size Standard_D4s_v3 --nsg-rule NONE --generate-ssh-keys --admin-username azureuser -vm create -g {rg2} -n vm2 --image centos --host-group {host-group} --size Standard_D4s_v3 --nsg-rule NONE --generate-ssh-keys --admin-username azureuser -vm show -g {rg2} -n vm1 -vm show -g {rg2} -n vm2 -vm delete --name vm1 -g {rg2} --yes -vm delete --name vm2 -g {rg2} --yes -vm host delete --name {host-name} --host-group {host-group} -g {rg2} --yes -vm host group create -n {host-group} -c 3 -g {rg} --tags "foo=bar" -vm host group create -n {host2-group} -c 3 -g {rg} --tags "foo=bar" -vm host create -n {host-name} --host-group {host-group} -d 2 -g {rg} --sku DSv3-Type1 --auto-replace false --tags "bar=baz" -vm host create -n {host2-name} --host-group {host2-group} -d 2 -g {rg} --sku DSv3-Type1 --auto-replace false --tags "bar=baz" -vm host get-instance-view --host-group {host-group} --name {host-name} -g {rg} -vm host get-instance-view --host-group {host2-group} --name {host2-name} -g {rg} -vm host group get-instance-view -g {rg} -n {host-group} -vm host group get-instance-view -g {rg} -n {host2-group} -vm host show -g {rg} -n {host-name} --host-group {host-group} -vm host show -g {rg} -n {host2-name} --host-group {host2-group} -vm create -n {vm-name} --image debian -g {rg} --size Standard_D4s_v3 --generate-ssh-keys --admin-username azureuser --nsg-rule NONE -vm show -n {vm-name} -g {rg} -vm deallocate -n {vm-name} -g {rg} -vm update -n {vm-name} -g {rg} --host {host_id} --set tags.tagName=tagValue -vm start -n {vm-name} -g {rg} -vm show -n {vm-name} -g {rg} -vm deallocate -n {vm-name} -g {rg} -vm update -n {vm-name} -g {rg} --host {host2_id} --set tags.tagName=tagValue -vm start -n {vm-name} -g {rg} -vm show -n {vm-name} -g {rg} -vm delete --name {vm-name} -g {rg} --yes -vm host delete --name {host-name} --host-group {host-group} -g {rg} --yes -vm host delete --name {host2-name} --host-group {host2-group} -g {rg} --yes -vm host group delete --name {host-group} -g {rg} --yes -vm host group delete --name {host2-group} -g {rg} --yes -vm host group create -n {host-group} -c 1 -g {rg} --automatic-placement -vm host group create -n {host2-group} -c 1 -g {rg} --automatic-placement -vm host create -n {host-name} --host-group {host-group} -d 0 -g {rg} --sku DSv3-Type1 -vm host create -n {host2-name} --host-group {host2-group} -d 0 -g {rg} --sku DSv3-Type1 -vm create -g {rg} -n vm1 --image centos --size Standard_D4s_v3 --nsg-rule NONE --generate-ssh-keys --admin-username azureuser -vm create -g {rg} -n vm2 --image centos --size Standard_D4s_v3 --nsg-rule NONE --generate-ssh-keys --admin-username azureuser -vm show -g {rg} -n vm1 -vm show -g {rg} -n vm2 -vm deallocate -n vm1 -g {rg} -vm update -n vm1 -g {rg} --host {host_id} -vm start -n vm1 -g {rg} -vm show -g {rg} -n vm1 -vm deallocate -n vm1 -g {rg} -vm update -n vm1 -g {rg} --host {host2_id} -vm start -n vm1 -g {rg} -vm show -g {rg} -n vm1 -vm deallocate -n vm2 -g {rg} -vm update -n vm2 -g {rg} --host-group {host-group} -vm start -n vm2 -g {rg} -vm show -g {rg} -n vm2 -vm deallocate -n vm2 -g {rg} -vm update -n vm2 -g {rg} --host-group {host2-group} -vm start -n vm2 -g {rg} -vm show -g {rg} -n vm2 -vm deallocate -n vm2 -g {rg} -vm update -n vm2 -g {rg} --host {host_id} -vm start -n vm2 -g {rg} -vm show -g {rg} -n vm2 -vm deallocate -n vm2 -g {rg} -vm update -n vm2 -g {rg} --host-group {host2-group} -vm start -n vm2 -g {rg} -vm show -g {rg} -n vm2 -vm delete --name vm1 -g {rg} --yes -vm delete --name vm2 -g {rg} --yes -vm host delete --name {host-name} --host-group {host-group} -g {rg} --yes -vm host delete --name {host2-name} --host-group {host2-group} -g {rg} --yes -vm host group delete --name {host-group} -g {rg} --yes -vm host group delete --name {host2-group} -g {rg} --yes -vmss create -g {rg} -n {vmss1} --image UbuntuLTS --terminate-notification-time 5 --admin-username azureuser -vmss update -g {rg} -n {vmss1} --enable-terminate-notification --terminate-notification-time 8 -vmss update -g {rg} -n {vmss1} --terminate-notification-time 9 -vmss update -g {rg} -n {vmss1} --enable-terminate-notification false -vmss update -g {rg} -n {vmss1} --enable-terminate-notification false --terminate-notification-time 5 -vmss update -g {rg} -n {vmss1} --enable-terminate-notification -vmss create -g {rg} -n {vmss2} --image UbuntuLTS --admin-username azureuser -vmss update -g {rg} -n {vmss2} --enable-terminate-notification true --terminate-notification-time 5 -vm create -g {rg} -n {vm} --image UbuntuLTS --priority Low --eviction-policy Deallocate --max-price 50 --admin-username azureuser --admin-password testPassword0 --authentication-type password --nsg-rule NONE -vm show -g {rg} -n {vm} -vm deallocate -g {rg} -n {vm} -vm update -g {rg} -n {vm} --priority Spot --max-price 100 -vm create -g {rg} -n {vm} --image UbuntuLTS --admin-username azureuser --admin-password testPassword0 --authentication-type password --nsg-rule NONE -vm show -g {rg} -n {vm} -vm image terms accept --urn {urn} -vm image terms show --urn {urn} -vm image terms cancel --urn {urn} -vm image terms show --urn {urn} -vm image terms accept --publisher {publisher} --offer {offer} --plan {plan} -vm image terms show --publisher {publisher} --offer {offer} --plan {plan} -vm image terms cancel --publisher {publisher} --offer {offer} --plan {plan} -vm image terms show --publisher {publisher} --offer {offer} --plan {plan} -keyvault show -g {rg} -n {vault} -keyvault key create -n {key} --vault {vault} --protection software -disk-encryption-set create -g {rg} -n {des1} --key-url {kid} --source-vault {vault} -disk-encryption-set show -g {rg} -n {des1} -disk-encryption-set create -g {rg} -n {des2} --key-url {kid} --source-vault {vault} -disk-encryption-set show -g {rg} -n {des2} -disk-encryption-set create -g {rg} -n {des3} --key-url {kid} --source-vault {vault} -disk-encryption-set show -g {rg} -n {des3} -keyvault set-policy -n {vault} --object-id {des1_sp_id} --key-permissions wrapKey unwrapKey get -keyvault set-policy -n {vault} --object-id {des2_sp_id} --key-permissions wrapKey unwrapKey get -keyvault set-policy -n {vault} --object-id {des3_sp_id} --key-permissions wrapKey unwrapKey get -role assignment create --assignee {des1_sp_id} --role Reader --scope {vault_id} -role assignment create --assignee {des2_sp_id} --role Reader --scope {vault_id} -role assignment create --assignee {des3_sp_id} --role Reader --scope {vault_id} -disk create -g {rg} -n {disk} --encryption-type EncryptionAtRestWithCustomerKey --disk-encryption-set {des1} --size-gb 10 -vm create -g {rg} -n {vm1} --attach-os-disk {disk} --os-type linux --nsg-rule NONE -vm create -g {rg} -n {vm2} --image centos --os-disk-encryption-set {des1} --data-disk-sizes-gb 10 10 --data-disk-encryption-sets {des2} {des3} --nsg-rule NONE --admin-username azureuser --admin-password testPassword0 --authentication-type password -vm show -g {rg} -n {vm2} -vmss create -g {rg} -n {vmss} --image centos --os-disk-encryption-set {des1} --data-disk-sizes-gb 10 10 --data-disk-encryption-sets {des2} {des3} --admin-username azureuser --admin-password testPassword0 --authentication-type password -vmss show -g {rg} -n {vmss} -keyvault show -g {rg} -n {vault} -keyvault key create -n {key} --vault {vault} --protection software -disk-encryption-set create -g {rg} -n {des1} --key-url {kid} --source-vault {vault} -disk-encryption-set show -g {rg} -n {des1} -keyvault set-policy -n {vault} --object-id {des1_sp_id} --key-permissions wrapKey unwrapKey get -role assignment create --assignee {des1_sp_id} --role Reader --scope {vault_id} -disk create -g {rg} -n {disk} --size-gb 10 -disk update -g {rg} -n {disk} --disk-encryption-set {des1} --encryption-type EncryptionAtRestWithCustomerKey -keyvault show -g {rg} -n {vault} -keyvault key create -n {key} --vault {vault} --protection software -disk-encryption-set create -g {rg} -n {des1} --key-url {kid} --source-vault {vault} -disk-encryption-set show -g {rg} -n {des1} -disk-encryption-set create -g {rg} -n {des2} --key-url {kid} --source-vault {vault} -disk-encryption-set show -g {rg} -n {des2} -keyvault set-policy -n {vault} --object-id {des1_sp_id} --key-permissions wrapKey unwrapKey get -keyvault set-policy -n {vault} --object-id {des2_sp_id} --key-permissions wrapKey unwrapKey get -role assignment create --assignee {des1_sp_id} --role Reader --scope {vault_id} -role assignment create --assignee {des2_sp_id} --role Reader --scope {vault_id} -snapshot create -g {rg} -n {snapshot1} --encryption-type EncryptionAtRestWithCustomerKey --disk-encryption-set {des1} --size-gb 10 -snapshot create -g {rg} -n {snapshot2} --size-gb 10 -snapshot update -g {rg} -n {snapshot2} --encryption-type EncryptionAtRestWithCustomerKey --disk-encryption-set {des2} -disk-encryption-set list-associated-resources -g {rg} -n {des2} -keyvault key create -n {key1} --vault {vault1} --protection software -keyvault show -g {rg} -n {vault2} -keyvault key create -n {key2} --vault {vault2} --protection software -disk-encryption-set create -g {rg} -n {des} --key-url {kid1} --source-vault {vault1} --enable-auto-key-rotation true -disk-encryption-set show -g {rg} -n {des} -keyvault set-policy -n {vault2} --object-id {des_sp_id} --key-permissions wrapKey unwrapKey get -role assignment create --assignee {des_sp_id} --role Reader --scope {vault2_id} -disk-encryption-set update -g {rg} -n {des} --key-url {kid2} --source-vault {vault2} --enable-auto-key-rotation false -disk-access create -g {rg} -l {loc} -n {diskaccess} -disk-access list -g {rg} -disk-access update -g {rg} -n {diskaccess} --tags tag1=val1 -disk-access show -g {rg} -n {diskaccess} -disk create -g {rg} -n {disk} --size-gb 10 --network-access-policy AllowPrivate --disk-access {diskaccess} -disk update -g {rg} -n {disk} --network-access-policy AllowPrivate --disk-access {disk_access_id} -disk show -g {rg} -n {disk} -snapshot create -g {rg} -n {snapshot} --size-gb 10 --network-access-policy AllowPrivate --disk-access {diskaccess} -snapshot update -g {rg} -n {snapshot} --network-access-policy AllowPrivate --disk-access {disk_access_id} -snapshot show -g {rg} -n {snapshot} -disk delete -g {rg} -n {disk} --yes -snapshot delete -g {rg} -n {snapshot} -disk-access delete -g {rg} -n {diskaccess} -disk-access list -g {rg} -disk create -g {rg} -n {disk1} --size-gb 1024 --location centraluseuap --enable-bursting -disk show -g {rg} -n {disk1} -disk create -g {rg} -n {disk2} --size-gb 1024 --location centraluseuap -disk show -g {rg} -n {disk2} -disk update -g {rg} -n {disk2} --enable-bursting -disk show -g {rg} -n {disk2} -vmss create -g {rg} -n {vmss} --image debian --data-disk-sizes-gb 10 10 --data-disk-iops 555 666 --data-disk-mbps 77 88 --ultra-ssd-enabled --zone 1 --vm-sku Standard_D2s_v3 --storage-sku UltraSSD_LRS --location eastus --admin-username azureuser --lb "" -vmss update -g {rg} -n {vmss} --set virtualMachineProfile.storageProfile.dataDisks[0].diskIOPSReadWrite=444 virtualMachineProfile.storageProfile.dataDisks[1].diskIOPSReadWrite=555 virtualMachineProfile.storageProfile.dataDisks[0].diskMBpsReadWrite=66 virtualMachineProfile.storageProfile.dataDisks[1].diskMBpsReadWrite=77 -vm list --resource-group {rg} -network vnet list --resource-group {rg} -network vnet create --resource-group {rg} --name {vnet} --location {loc} -vm create --resource-group {rg} --location {loc} --name {vm} --admin-username ubuntu --image UbuntuLTS --admin-password testPassword0 --authentication-type password --vnet-name {vnet} --nsg-rule NONE -vm list --resource-group {rg} -network vnet show --resource-group {rg} --name {vnet} -vmss create -g {rg} -n {vmss} --image UbuntuLTS --automatic-repairs-grace-period 30 --admin-username azureuser -vmss create -g {rg} -n {vmss} --image UbuntuLTS --load-balancer {lb} --automatic-repairs-grace-period 30 --admin-username azureuser -vmss create -g {rg} -n {vmss} --image UbuntuLTS --health-probe {probe} --automatic-repairs-grace-period 30 --admin-username azureuser -network lb create -g {rg} -n {lb} -network lb probe create -g {rg} --lb-name {lb} -n {probe} --protocol Tcp --port 80 -network lb rule create -g {rg} --lb-name {lb} -n {lbrule} --probe-name {probe} --protocol Tcp --frontend-port 80 --backend-port 80 -vmss create -g {rg} -n {vmss} --image UbuntuLTS --load-balancer {lb} --health-probe {probe} --automatic-repairs-grace-period 30 --admin-username azureuser -vmss create -g {rg} -n {vmss} --image UbuntuLTS --admin-username azureuser -vmss extension set -g {rg} --vmss-name {vmss} --name ApplicationHealthLinux --version 1.0 --publisher Microsoft.ManagedServices --settings {settings} -vmss list-instances -g {rg} -n {vmss} --query "[].instanceId" -vmss update-instances -g {rg} -n {vmss} --instance-ids {instance_ids} -vmss update -g {rg} -n {vmss} --enable-automatic-repairs true --automatic-repairs-grace-period 30 -vmss create -g {rg} -n {vmss} --image UbuntuLTS --admin-username azureuser -vmss update -g {rg} -n {vmss} --enable-automatic-repairs false --automatic-repairs-grace-period 30 -vmss update -g {rg} -n {vmss} --enable-automatic-repairs true -network lb probe create -g {rg} --lb-name {vmss}LB -n {probe} --protocol Tcp --port 80 -network lb rule create -g {rg} --lb-name {vmss}LB -n {lbrule} --probe-name {probe} --protocol Tcp --frontend-port 80 --backend-port 80 -vmss update -g {rg} -n {vmss} --set virtualMachineProfile.networkProfile.healthProbe.id={probe_id} -vmss list-instances -g {rg} -n {vmss} --query "[].instanceId" -vmss update-instances -g {rg} -n {vmss} --instance-ids {instance_ids} -vmss update -g {rg} -n {vmss} --enable-automatic-repairs true --automatic-repairs-grace-period 30 -vm create -g {rg} -n {vm} --image centos --nsg-rule NONE --admin-username azureuser --admin-password testPassword0 --authentication-type password -network nsg show -g {rg} -n {vm}NSG -network lb create -g {rg} -n {lb} -network lb probe create -g {rg} --lb-name {lb} -n {probe} --protocol Tcp --port 80 -network lb rule create -g {rg} --lb-name {lb} -n {lbrule} --probe-name {probe} --protocol Tcp --frontend-port 80 --backend-port 80 -vmss create -g {rg} -n {vmss} --image UbuntuLTS --load-balancer {lb} --health-probe {probe} --automatic-repairs-grace-period 30 --admin-username azureuser -vmss set-orchestration-service-state -g {rg} -n {vmss} --service-name {service_name} --action Resume -vmss set-orchestration-service-state -g {rg} -n {vmss} --service-name {service_name} --action Suspend -vmss get-instance-view -g {rg} -n {vmss} -vm create -g {rg} -n {vm} --image centos --nsg-rule NONE --admin-username azureuser --admin-password testPassword0 --authentication-type password -vm auto-shutdown -g {rg} -n {vm} --time 1730 --email "foo@bar.com" --webhook "https://example.com/" -vm auto-shutdown -g {rg} -n {vm} --time 1730 --email "foo2@bar.com" -vm auto-shutdown -g {rg} -n {vm} --off -vmss create -n {vmss} -g {rg} --image ubuntults --orchestration-mode flexible -vmss show -g {rg} -n {vmss} -vmss create -n {vmss0} -g {rg} --orchestration-mode Flexible --single-placement-group false --platform-fault-domain-count 1 --vm-sku Standard_DS1_v2 --instance-count 0 --image ubuntults --computer-name-prefix testvmss --vnet-name {vnet_name} --subnet default --network-api-version 2020-11-01 --admin-username testvmss -vmss show -g {rg} -n {vmss0} -vmss create -g {rg} -n {vmss1} --orchestration-mode Flexible --single-placement-group false --platform-fault-domain-count 1 --vm-sku Standard_DS1_v2 --instance-count 0 --admin-username testvmss --admin-password This!s@Terr!bleP@ssw0rd --computer-name-prefix testvmss --image debian --vnet-name {vnet_name} --subnet default --network-api-version 2020-11-01 -vmss show -g {rg} -n {vmss1} -vmss create -n {vmss2} -g {rg} --orchestration-mode Flexible --single-placement-group false --platform-fault-domain-count 1 --vm-sku Standard_DS1_v2 --instance-count 0 --image ubuntults --computer-name-prefix testvmss --vnet-name {vnet_name} --subnet default --network-api-version 2020-11-01 --admin-username testvmss --generate-ssh-keys -vmss show -g {rg} -n {vmss2} -vmss create -n {vmss3} -g {rg} --orchestration-mode Flexible --single-placement-group false --platform-fault-domain-count 1 --vm-sku Standard_DS1_v2 --instance-count 0 --image ubuntults --computer-name-prefix testvmss --vnet-name {vnet_name} --subnet default --network-api-version 2020-11-01 --admin-username testvmss --generate-ssh-keys -vmss show -g {rg} -n {vmss3} -vmss create -n {vmss4} -g {rg} --orchestration-mode Flexible --single-placement-group false --platform-fault-domain-count 1 --vm-sku Standard_DS1_v2 --instance-count 0 --image ubuntults --computer-name-prefix testvmss --vnet-name {vnet_name} --subnet default --network-api-version 2020-11-01 --admin-username testvmss --ssh-key-value '{ssh_key}' -vmss show -g {rg} -n {vmss4} -vmss create -n {vmss5} -g {rg} --orchestration-mode Flexible --single-placement-group false --platform-fault-domain-count 1 --vm-sku Standard_DS1_v2 --instance-count 0 --image ubuntults --computer-name-prefix testvmss --vnet-name {vnet_name} --subnet default --network-api-version 2020-11-01 --admin-username testvmss --authentication-type ssh -vmss show -g {rg} -n {vmss5} -ppg create -g {rg} -n {ppg} -vmss create -g {rg} -n {vmss} --orchestration-mode Flexible --single-placement-group false --ppg {ppg} --platform-fault-domain-count 3 -vm create -g {rg} -n {vm} --image centos --platform-fault-domain 0 --vmss {vmss} --generate-ssh-keys --nsg-rule None -vm show -g {rg} -n {vm} -vm create -g {rg} -n vm1 --image UbuntuLTS --enable-agent --patch-mode AutomaticByPlatform --generate-ssh-keys --nsg-rule NONE -vm show -g {rg} -n vm1 -vmss create -g {rg} -n {vmss} --image UbuntuLTS --enable-agent --patch-mode ImageDefault --orchestration-mode Flexible --generate-ssh-keys --instance-count 0 -vmss extension set --name ApplicationHealthLinux --publisher Microsoft.ManagedServices --version 1.0 --resource-group {rg} --vmss-name {vmss} --settings {extension_file} -vmss update --name {vmss} --resource-group {rg} --set virtualMachineProfile.osProfile.linuxConfiguration.patchSettings.patchMode=AutomaticByPlatform -vmss scale --name {vmss} --new-capacity 1 --resource-group {rg} -vmss list-instances -g {rg} -n {vmss} -vm show -g {rg} -n {vm} -vmss create -g {rg} -n {vmss} --image Win2019Datacenter --enable-agent --enable-auto-update false --patch-mode Manual --orchestration-mode Flexible --admin-username azureuser --admin-password testPassword0 -vmss list-instances -g {rg} -n {vmss} -vm show -g {rg} -n {vm} -disk create -g {rg} -n d1 --size-gb 10 --logical-sector-size 4096 --sku UltraSSD_LRS -disk create -g {rg} -n d2 --size-gb 10 --tier P4 -vmss create -g {rg} -n vmss1 --image centos -vmss reimage -g {rg} -n vmss1 --instance-id 1 -vmss reimage -g {rg} -n vmss1 -sshkey create -g {rg} -n k1 -sshkey list -sshkey show -g {rg} -n k1 -sshkey create -g {rg} -n k2 --public-key "{key}" -vm create -g {rg} -n vm1 --image centos --nsg-rule None --ssh-key-name k1 -vm create -g {rg} -n vm3 --image centos --nsg-rule None --ssh-key-name k3 --generate-ssh-keys -sshkey show -g {rg} -n k3 -vm create -g {rg} -n vm --image Win2019Datacenter --enable-hotpatching true --admin-username azureuser --admin-password testPassword0 --nsg-rule NONE -vm install-patches -g {rg} -n vm --maximum-duration PT4H --reboot-setting IfRequired --classifications-to-include-win Critical Security --exclude-kbs-requiring-reboot true -vm create -g {rg} -n vm2 --image UbuntuLTS --enable-hotpatching true --admin-username azureuser --admin-password testPassword0 --nsg-rule NONE -vm install-patches -g {rg} -n vm2 --maximum-duration PT4H --reboot-setting IfRequired --classifications-to-include-linux Critical Security -disk create -g {rg} -n d1 --image-reference Canonical:UbuntuServer:18_04-lts-gen2:18.04.202004290 --hyper-v-generation V2 --security-type TrustedLaunch -disk create -g {rg} -n d1 --size-gb 10 --support-hibernation true -network vnet create -g {rg} -n vnet --address-prefix 10.0.0.0/16 -network vnet subnet create -g {rg} --vnet-name vnet -n subnet1 --address-prefixes 10.0.0.0/24 -network vnet subnet create -g {rg} --vnet-name vnet -n subnet2 --address-prefixes 10.0.1.0/24 -vm create -g {rg} -n vma --image ubuntults --count 3 --vnet-name vnet --subnet subnet1 --nsg-rule None --generate-ssh-keys --nic-delete-option Delete -vm list -g {rg} -vm create -g {rg} -n vmb --image ubuntults --count 3 --vnet-name vnet --subnet subnet2 --nsg-rule None --generate-ssh-keys -vm list -g {rg} -disk create -g {rg} -n d1 --size-gb 10 --edge-zone microsoftlosangeles1 -snapshot create -g {rg} -n s1 --size-gb 10 --edge-zone microsoftlosangeles1 --sku Premium_LRS -image create -g {rg} -n image --os-type linux --source d1 --edge-zone microsoftlosangeles1 -vm create -g {rg} -n vm --image ubuntults --nsg-rule None --generate-ssh-keys --edge-zone microsoftlosangeles1 --public-ip-sku Standard -vm show -g {rg} -n vm -network vnet show -g {rg} -n vmVNET -network nic show -g {rg} -n vmVMNic -network public-ip show -n vmPublicIP -g {rg} -vmss create -g {rg} -n vmss --image ubuntults --generate-ssh-keys --edge-zone microsoftlosangeles1 --lb-sku Standard -vmss show -g {rg} -n vmss -network vnet show -g {rg} -n vmssVNET -network lb show -g {rg} -n vmssLB -network public-ip show -n vmssLBPublicIP -g {rg} -disk create -g {rg} -n d1 --size-gb 1024 --sku StandardSSD_ZRS --max-shares 3 -disk update -g {rg} -n d1 --sku Premium_ZRS -vm create -g {rg} -n d1 --image ubuntults --zone 1 --attach-data-disks d1 --generate-ssh-keys --nsg-rule None -disk create -g {rg} -n d1 --size-gb 10 --sku StandardSSD_ZRS --zone 1 -vm create -l eastus -g {rg} -n {vm} --image Win2012R2Datacenter --admin-username clitest1234 --admin-password Test123456789# --license-type Windows_Server --nsg-rule NONE -vm application set -g {rg} -n {vm} --app-version-ids {vid1} {vid2} -vm application list -g {rg} -n {vm} -vm create -l eastus -g {rg} -n {vm} --image Win2012R2Datacenter --admin-username clitest1234 --admin-password Test123456789# --license-type Windows_Server --nsg-rule NONE -vm application set -g {rg} -n {vm} --app-version-ids -vm application list -g {rg} -n {vm} -vm create -l eastus -g {rg} -n {vm} --image Win2012R2Datacenter --admin-username clitest1234 --admin-password Test123456789# --license-type Windows_Server --nsg-rule NONE -vm application set -g {rg} -n {vm} --app-version-ids {vid1} {vid2} --app-config-overrides {config} -vm application set -g {rg} -n {vm} --app-version-ids {vid1} {vid2} --app-config-overrides null {config} -vm application list -g {rg} -n {vm} -vm create -l eastus -g {rg} -n {vm} --image Win2012R2Datacenter --admin-username clitest1234 --admin-password Test123456789# --license-type Windows_Server --nsg-rule NONE -vm application set -g {rg} -n {vm} --app-version-ids {vid1} {vid2} --order-applications -vm application list -g {rg} -n {vm} -vmss create -l eastus -g {rg} -n {vmss} --authentication-type password --admin-username admin123 --admin-password PasswordPassword1! --image Win2012R2Datacenter -vmss application set -g {rg} -n {vmss} --app-version-ids {vid1} {vid2} -vmss application list -g {rg} --name {vmss} -vmss create -l eastus -g {rg} -n {vmss} --authentication-type password --admin-username admin123 --admin-password PasswordPassword1! --image Win2012R2Datacenter -vmss application set -g {rg} -n {vmss} --app-version-ids -vmss application list -g {rg} --name {vmss} -vmss create -l eastus -g {rg} -n {vmss} --authentication-type password --admin-username admin123 --admin-password PasswordPassword1! --image Win2012R2Datacenter -vmss application set -g {rg} -n {vmss} --app-version-ids {vid1} {vid2} --app-config-overrides {config} -vmss application set -g {rg} -n {vmss} --app-version-ids {vid1} {vid2} --app-config-overrides null {config} -vmss application list -g {rg} --name {vmss} -vmss create -l eastus -g {rg} -n {vmss} --authentication-type password --admin-username admin123 --admin-password PasswordPassword1! --image Win2012R2Datacenter -vmss application set -g {rg} -n {vmss} --app-version-ids {vid1} {vid2} --order-applications -vmss application list -g {rg} --name {vmss} -disk create --accelerated-network true --size-gb 5 -n {disk1} -g {rg} -disk show -g {rg} -n {disk1} -disk update --accelerated-network false -n {disk1} -g {rg} -disk show -g {rg} -n {disk1} -disk create --size-gb 5 -n {disk2} -g {rg} -disk show -g {rg} -n {disk2} -disk update --accelerated-network true -n {disk1} -g {rg} -disk show -g {rg} -n {disk1} -snapshot create --accelerated-network true --size-gb 5 -n {snapshot1} -g {rg} -snapshot show -g {rg} -n {snapshot1} -snapshot update --accelerated-network false -n {snapshot1} -g {rg} -snapshot show -g {rg} -n {snapshot1} -snapshot create --size-gb 5 -n {snapshot2} -g {rg} -snapshot show -g {rg} -n {snapshot2} -snapshot update --accelerated-network true -n {snapshot2} -g {rg} -snapshot show -g {rg} -n {snapshot2} -disk create -g {rg} -n disk1 --size-gb 200 -l westus -snapshot create -g {rg} -n snapa --source disk1 -l westus --incremental true -snapshot create -g {rg2} -n snapb --copy-start true --incremental true --source {source} -l eastus -snapshot show -g {rg2} -n snapb -disk create --public-network-access Enabled --size-gb 5 -n {disk1} -g {rg} -disk show -g {rg} -n {disk1} -disk update --public-network-access Disabled -n {disk1} -g {rg} -disk show -g {rg} -n {disk1} -disk create --network-access-policy AllowAll --public-network-access Disabled --size-gb 5 -n {disk2} -g {rg} -disk show -g {rg} -n {disk2} -disk-access create -g {rg} -n diskaccess -snapshot create --network-access-policy AllowPrivate --disk-access diskaccess --public-network-access Enabled --size-gb 5 -n {disk3} -g {rg} -snapshot show -g {rg} -n {disk3} -snapshot create --public-network-access Enabled --size-gb 5 -n {snapshot1} -g {rg} -snapshot show -g {rg} -n {snapshot1} -snapshot update --public-network-access Disabled -n {snapshot1} -g {rg} -snapshot show -g {rg} -n {snapshot1} -snapshot create --network-access-policy AllowAll --public-network-access Disabled --size-gb 5 -n {snapshot2} -g {rg} -snapshot show -g {rg} -n {snapshot2} -disk-access create -g {rg} -n diskaccess -snapshot create --network-access-policy AllowPrivate --disk-access diskaccess --public-network-access Enabled --size-gb 5 -n {snapshot3} -g {rg} -snapshot show -g {rg} -n {snapshot3} -# live -security jit-policy list -keyvault secret show --vault-name cupertino-kv-test -n TestDbPassword -keyvault secret show --vault-name cupertino-kv-test -n TestDbPassword -keyvault secret show --vault-name cupertino-kv-test -n TestDbPassword -vmss create -n {vm1} -g {rg} --image {image} --vm-sku Standard_DS4_v2 --ephemeral-os-disk -resource create -g {rg} -n {vault} --resource-type Microsoft.RecoveryServices/vaults --is-full-object -p "{{\"properties\":{{}},\"location\":\"{loc}\",\"sku\":{{\"name\":\"Standard\"}}}}" -sig create -g {rg} --gallery-name {gallery} --permissions groups -vmss create -n {base} -g {rg} --image {image} --vm-sku Standard_DS4_v2 -vm create -g {rg} -n vm1 --admin-username clitester --admin-password PasswordPassword1! --image debian --zone 1 -vm host group create -n {host-group} -c 3 -g {rg} --tags "foo=bar" -resource tag --ids {vault_id} --tags {tag} -vm host create -n {host-name} --host-group {host-group} -d 2 -g {rg} --sku DSv3-Type1 --auto-replace false --tags "bar=baz" -configure --defaults location={loc} -resource list --tag {tag} -resource list --tag {tag} -l westus -resource list --tag {tag} --l westus -resource list --tag {tag} --location westus -configure --defaults location="" -resource list --tag {tag} -resource list --tag {tag} -l westus -resource list --tag {tag} --l westus -resource list --tag {tag} --location westus -resource delete --id {vault_id} -storage account show-usage -sig image-definition create -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --os-type linux -p publisher1 -f offer1 -s sku1 -identity create -g {rg} -n {one_off_identity} -cdn endpoint list -g clitest.rga77kjj65yiwcucpyoxkdy6omddibzkemupslicbse3n3ibisvziecfzo6h7suwk3j --profile-name profile123 -cdn profile create -g clitest.rga77kjj65yiwcucpyoxkdy6omddibzkemupslicbse3n3ibisvziecfzo6h7suwk3j -n profile123 --sku Standard_Microsoft -identity create -g {rg} -n {access_identity} -vm host get-instance-view --host-group {host-group} --name {host-name} -g {rg} -vm host group get-instance-view -g {rg} -n {host-group} -vm host show -g {rg} -n {host-name} --host-group {host-group} -keyvault set-policy -g {rg} -n {kv} --object-id {access_identity_principal} --secret-permissions get list set -vm create -n {vm-name} --image debian -g {rg} --size Standard_D4s_v3 --host {host_id} --generate-ssh-keys --admin-username azureuser --nsg-rule NONE -keyvault certificate get-default-policy -keyvault certificate create --vault-name {kv} --name {cert} --policy "{keyvault_cert_policy}" -keyvault certificate show --vault-name {kv} --name {cert} -network public-ip create -g {rg} -n {ip} --sku Standard -vm create -g {rg} -n {vm} --image ubuntults --data-disk-sizes-gb 10 --admin-username clitest1 --generate-ssh-key --nsg-rule None -network application-gateway create -g {rg} -n {gw} --sku Standard_v2 --public-ip-address {ip} --identity {one_off_identity} -cdn endpoint create -g clitest.rga77kjj65yiwcucpyoxkdy6omddibzkemupslicbse3n3ibisvziecfzo6h7suwk3j -n cdn-cli-test-4 --profile-name profile123 --origin www.example.com 80 443 -vmss show -g {rg} -n {vm1} -vmss update --resource-group {rg} --name {vm1} --vm-sku {size1} --ephemeral-os-disk-placement {placement1} -vmss show -g {rg} -n {base} -vmss update --resource-group {rg} --name {base} --vm-sku {vm_sku} --set tags.tagName=tagValue -vmss show -g {rg} -n {vm1} -vmss update --resource-group {rg} --name {vm1} --vm-sku {size2} --ephemeral-os-disk-placement {placement2} --set tags.tagName=tagValue -vmss show -g {rg} -n {vm1} -vm host group create -n {host-group} -c 3 -g {rg} --tags "foo=bar" -vm host group create -n {host2-group} -c 3 -g {rg} --tags "foo=bar" -vm show -n {vm-name} -g {rg} -vm host show --name {host-name} --host-group {host-group} -g {rg} -vm host group show --name {host-group} -g {rg} -vm delete --name {vm-name} -g {rg} --yes -vmss show -g {rg} -n {base} -vmss update --resource-group {rg} --name {base} --vm-sku {vm_sku} --set tags.tagName=tagValue -vm host create -n {host-name} --host-group {host-group} -d 2 -g {rg} --sku DSv3-Type1 --auto-replace false --tags "bar=baz" -keyvault certificate create --vault-name {kv_name} -n {cert_name} -p @"{policy_path}" -keyvault certificate show --vault-name {kv_name} -n {cert_name} -sf cluster create -g {rg} -c {cluster_name} -l {loc} --secret-identifier {cert_secret_id} --vm-password "{vm_password}" --cluster-size 3 -vmss show -g {rg} -n {base} -vmss create -n {base2} -g {rg} --image {image} --location {loc} -vm host create -n {host2-name} --host-group {host2-group} -d 2 -g {rg} --sku DSv3-Type1 --auto-replace false --tags "bar=baz" -vm host delete --name {host-name} --host-group {host-group} -g {rg} --yes -vm deallocate -g {rg} -n {vm} -vm host get-instance-view --host-group {host-group} --name {host-name} -g {rg} -vm host get-instance-view --host-group {host2-group} --name {host2-name} -g {rg} -vm host group get-instance-view -g {rg} -n {host-group} -vm host group get-instance-view -g {rg} -n {host2-group} -vm host show -g {rg} -n {host-name} --host-group {host-group} -vm host show -g {rg} -n {host2-name} --host-group {host2-group} -vm create -n {vm-name} --image debian -g {rg} --size Standard_D4s_v3 --generate-ssh-keys --admin-username azureuser --nsg-rule NONE -vm generalize -g {rg} -n {vm} -image create -g {rg} -n {captured} --source {vm} -vmss show -g {rg} -n {base2} -vmss update --resource-group {rg} --name {base2} --vm-sku {vm_sku} -vm host group delete --name {host-group} -g {rg} --yes -vm host group create -n {host-group} -c 1 -g {rg2} --automatic-placement -vm host create -n {host-name} --host-group {host-group} -d 0 -g {rg2} --sku DSv3-Type1 -vm show -n {vm-name} -g {rg} -vm deallocate -n {vm-name} -g {rg} -sig image-version create -g {rg} --gallery-name {gallery} --gallery-image-definition {image} --gallery-image-version {version} --managed-image {captured} --replica-count 1 -vm create -g {rg2} -n vm1 --image centos --host {host_id} --size Standard_D4s_v3 --nsg-rule NONE --generate-ssh-keys --admin-username azureuser -vmss show -g {rg} -n {base2} -disk create -g {rg} -n d1 --image-reference Canonical:UbuntuServer:18_04-lts-gen2:18.04.202004290 --hyper-v-generation V2 --security-type TrustedLaunch -network application-gateway show -g {rg} -n {gw} -network application-gateway identity remove -g {rg} --gateway-name {gw} -vm update -n {vm-name} -g {rg} --host {host_id} --set tags.tagName=tagValue -network application-gateway identity assign -g {rg} --gateway-name {gw} --identity {access_identity} -network application-gateway identity show -g {rg} --gateway-name {gw} -network application-gateway ssl-cert create -g {rg} --gateway-name {gw} --name MySSLCert --key-vault-secret-id {secret_id} -vm start -n {vm-name} -g {rg} -network application-gateway root-cert create -g {rg} --gateway-name {gw} -n cert1 --keyvault-secret {secret_id} -vm show -n {vm-name} -g {rg} -vm deallocate -n {vm-name} -g {rg} -vm update -n {vm-name} -g {rg} --host {host2_id} --set tags.tagName=tagValue -vm create -g {rg2} -n vm2 --image centos --host-group {host-group} --size Standard_D4s_v3 --nsg-rule NONE --generate-ssh-keys --admin-username azureuser -sf managed-cluster create -g {rg} -c {cluster_name} -l {loc} --cert-thumbprint {cert_tp} --cert-is-admin --admin-password {vm_password} -vm start -n {vm-name} -g {rg} -vm show -n {vm-name} -g {rg} -vm delete --name {vm-name} -g {rg} --yes -sf cluster show -g {rg} -c {cluster_name} -sf cluster show -g {rg} -c {cluster_name} -vm show -g {rg2} -n vm1 -vm show -g {rg2} -n vm2 -vm delete --name vm1 -g {rg2} --yes -sf cluster show -g {rg} -c {cluster_name} -vm host delete --name {host-name} --host-group {host-group} -g {rg} --yes -vm delete --name vm2 -g {rg2} --yes -sf cluster show -g {rg} -c {cluster_name} -sf managed-node-type create -g {rg} -c {cluster_name} -n pnt --instance-count 5 --primary -vm host delete --name {host2-name} --host-group {host2-group} -g {rg} --yes -vm host delete --name {host-name} --host-group {host-group} -g {rg2} --yes -sf cluster show -g {rg} -c {cluster_name} -vm host group delete --name {host-group} -g {rg} --yes -vm host group delete --name {host2-group} -g {rg} --yes -sf cluster show -g {rg} -c {cluster_name} -vm host group create -n {host-group} -c 1 -g {rg} --automatic-placement -vm host group create -n {host2-group} -c 1 -g {rg} --automatic-placement -vm host create -n {host-name} --host-group {host-group} -d 0 -g {rg} --sku DSv3-Type1 -sf cluster show -g {rg} -c {cluster_name} -sig show --gallery-name {gallery} --resource-group {rg} --select Permissions -sig share add --gallery-name {gallery} -g {rg} --subscription-ids {subId} --tenant-ids {tenantId} -vm host create -n {host2-name} --host-group {host2-group} -d 0 -g {rg} --sku DSv3-Type1 -sig image-version show-shared --gallery-image-definition {image} --gallery-unique-name {unique_name} --location {location} --gallery-image-version {version} -vm create -g {rg} -n vm1 --image centos --size Standard_D4s_v3 --nsg-rule NONE --generate-ssh-keys --admin-username azureuser -sf cluster show -g {rg} -c {cluster_name} -sf cluster show -g {rg} -c {cluster_name} -vm create -g {rg} -n vm2 --image centos --size Standard_D4s_v3 --nsg-rule NONE --generate-ssh-keys --admin-username azureuser -sf managed-node-type vm-extension add -g {rg} -c {cluster_name} -n pnt --extension-name {extName} --publisher {publisher} --extension-type {extType} --type-handler-version {extVer} --auto-upgrade-minor-version -sf managed-node-type show -g {rg} -c {cluster_name} -n pnt -keyvault show -n {kv_name} -g {rg} -keyvault certificate create --vault-name {kv_name} -n {cert_name} -p @"{policy_path}" -keyvault certificate show --vault-name {kv_name} -n {cert_name} -sf managed-node-type vm-secret add -g {rg} -c {cluster_name} -n pnt --source-vault-id {kv_id} --certificate-url {cert_secret_id} --certificate-store my -sf managed-node-type show -g {rg} -c {cluster_name} -n pnt -sf managed-cluster client-certificate add -g {rg} -c {cluster_name} --thumbprint {cert_tp2} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster client-certificate delete -g {rg} -c {cluster_name} --thumbprint {cert_tp2} -sf managed-cluster show -g {rg} -c {cluster_name} -sf managed-cluster delete -g {rg} -c {cluster_name} -sf managed-cluster show -g {rg} -c {cluster_name} -bot delete -g {rg} -n {botname} -bot create -k webapp -g {rg} -n {botname} --appid {app_id} -p {password} --lang Csharp --echo -bot download -g {rg} -n {botname} -bot publish -g {rg} -n {botname} --code-dir {botname} -bot delete -g {rg} -n {botname} -bot create -k webapp -g {rg} -n {botname} --appid {app_id} -p {password} --lang Javascript --echo -bot download -g {rg} -n {botname} -bot publish -g {rg} -n {botname} --code-dir {botname} -bot delete -g {rg} -n {botname} -bot delete -g {rg} -n {botname} -bot create -k webapp -g {rg} -n {botname} --appid {app_id} -p {password} --lang Javascript --echo -bot download -g {rg} -n {botname} -bot publish -g {rg} -n {botname} --code-dir {botname} --keep-node-modules -bot create -k webapp -g {rg} -n {botname} --appid {app_id} -p {password} --lang Javascript --echo -bot download -g {rg} -n {botname} -bot publish -g {rg} -n {botname} --code-dir {botname} -cloud show -cloud set -n AzureChinaCloud -cloud show -n AzureChinaCloud -cloud set -n AzureCloud -cloud show -cloud set -n AzureCloud -cloud show -n AzureCloud -cloud set -n AzureCloud -cloud show -cloud set -n AzureGermanCloud -cloud show -n AzureGermanCloud -cloud set -n AzureCloud -cloud show -cloud set -n AzureUSGovernment -cloud show -n AzureUSGovernment -cloud set -n AzureCloud -cloud show -cloud set -n azurechinacloud -cloud show -n AzureChinaCloud -cloud set -n AzureCloud -cloud show -cloud set -n azurecloud -cloud show -n AzureCloud -cloud set -n AzureCloud -cloud show -cloud set -n azuregermancloud -cloud show -n AzureGermanCloud -cloud set -n AzureCloud -cloud show -cloud set -n azureusgovernment -cloud show -n AzureUSGovernment -cloud set -n AzureCloud -cloud show -cloud set -n azCloud -cloud set -n AzureCloud -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --assign-identity --encryption {encryption} --yes -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --assign-identity --yes -cognitiveservices account update -n {sname} -g {rg} --encryption {encryption} -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --yes -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices commitment-tier list -l centraluseuap -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --yes -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --yes -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account identity show -n {sname} -g {rg} -cognitiveservices account identity assign -n {sname} -g {rg} -cognitiveservices account identity show -n {sname} -g {rg} -cognitiveservices account identity remove -n {sname} -g {rg} -cognitiveservices account identity show -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -cognitiveservices account create -n {sname} -g {rg} --kind {kind} --sku {sku} -l {location} --assign-identity --yes -cognitiveservices account show -n {sname} -g {rg} -cognitiveservices account delete -n {sname} -g {rg} -network vnet create -n cli-vnet-lefr-02 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n cli-subnet-lefr-02 --vnet-name cli-vnet-lefr-02 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-m77u7end4kpxj2xs' -l southcentralusstage -network vnet create -n cli-vnet-lefr-02 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n cli-subnet-lefr-02 --vnet-name cli-vnet-lefr-02 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-v7qboshbz73hecof' -l southcentralusstage -network vnet create -n cli-vnet-lefr-02 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n cli-subnet-lefr-02 --vnet-name cli-vnet-lefr-02 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-ptvuw7okxi4yyqvj' -l southcentralusstage -network vnet create -n cli-vnet-lefr-02 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n cli-subnet-lefr-02 --vnet-name cli-vnet-lefr-02 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-fw2qnak6dlch65z4' -l southcentralusstage -network vnet create -n cli-vnet-lefr-02 -g {rg} -l southcentralus --address-prefix 10.5.0.0/16 -network vnet subnet create -n cli-subnet-lefr-02 --vnet-name cli-vnet-lefr-02 --address-prefixes '10.5.0.0/24' --delegations 'Microsoft.Netapp/volumes' -g {rg} -netappfiles account create -g {rg} -a 'cli-acc-c2hpuybqvibagonu' -l southcentralusstage -network vnet create -n cli-vnet-jnvc6rehxrx72fm --resource-group {rg} -l southcentralus --address-prefix 10.0.0.0/16 -network vnet subnet create -n cli-subnet-urbuw -g {rg} --vnet-name cli-vnet-jnvc6rehxrx72fm --address-prefixes '10.0.0.0/24' --delegations 'Microsoft.Netapp/volumes' -netappfiles account create -g {rg} -a 'cli-acc-2fptc6aupx5orddi' -l southcentralusstage -network vnet create -n cli-vnet-iovi6duvwqt5ypn --resource-group {rg} -l southcentralus --address-prefix 10.0.0.0/16 -network vnet subnet create -n cli-subnet-gumjo -g {rg} --vnet-name cli-vnet-iovi6duvwqt5ypn --address-prefixes '10.0.0.0/24' --delegations 'Microsoft.Netapp/volumes' -netappfiles account create -g {rg} -a 'cli-acc-zvpfdnllq65mxzez' -l southcentralusstage -storage account create -n clidceyny22juchbtovkme4i -g clitest.rgoiekd5egvv3p5kng2g2gw7uofcph7do7xqwmrtld5e3p4ed46mddujviz3stweimc --sku Standard_LRS --assign-identity -storage account create -n cliv3yhuletlf4x7uqbpk7n5 -g clitest.rgtpzm3yabhirxpvdxw3wuuggkp744s5z52wyevll5obkj3yrojvqq5pmcihfayed6r --sku Standard_LRS -storage account update -n cliv3yhuletlf4x7uqbpk7n5 -g clitest.rgtpzm3yabhirxpvdxw3wuuggkp744s5z52wyevll5obkj3yrojvqq5pmcihfayed6r --assign-identity