From 225f62bdab37c1c91c5ed1e2f6d0aa50a70d64a9 Mon Sep 17 00:00:00 2001 From: Francisco Cabrera Date: Thu, 15 Aug 2024 15:00:42 -0400 Subject: [PATCH] Update _index.md --- docs/azure_jumpstart_arcbox/DevOps/_index.md | 42 ++++++++++---------- 1 file changed, 21 insertions(+), 21 deletions(-) diff --git a/docs/azure_jumpstart_arcbox/DevOps/_index.md b/docs/azure_jumpstart_arcbox/DevOps/_index.md index e1ad0093..ecd37024 100644 --- a/docs/azure_jumpstart_arcbox/DevOps/_index.md +++ b/docs/azure_jumpstart_arcbox/DevOps/_index.md @@ -242,26 +242,26 @@ $customLocationRPOID=(az ad sp list --filter "displayname eq 'Custom Locations R ### Bicep deployment option 1: Azure CLI - ```shell - az login - az group create --name "" --location "" - az deployment group create -g "" -f "main.bicep" -p "main.parameters.json" -p customLocationRPOID="$customLocationRPOID" - ``` +```shell +az login +az group create --name "" --location "" +az deployment group create -g "" -f "main.bicep" -p "main.parameters.json" -p customLocationRPOID="$customLocationRPOID" +``` > **Note:** If you see any failure in the deployment, please check the [troubleshooting guide](#basic-troubleshooting). ### Bicep deployment option 2: Azure PowerShell - ```shell - Connect-AzAccount +```shell +Connect-AzAccount - $RGname = "" - $Location= "" +$RGname = "" +$Location= "" - New-AzResourceGroup -Name $RGname -Location $location +New-AzResourceGroup -Name $RGname -Location $location - New-AzResourceGroupDeployment -Name arcbox -ResourceGroupName $RGname -TemplateFile "./main.bicep" -TemplateParameterFile "./main.bicepparam" - ``` +New-AzResourceGroupDeployment -Name arcbox -ResourceGroupName $RGname -TemplateFile "./main.bicep" -TemplateParameterFile "./main.bicepparam" +``` > **Note:** If you see any failure in the deployment, please check the [troubleshooting guide](#basic-troubleshooting). @@ -470,10 +470,10 @@ ArcBox uses a GitOps configuration on the bookstore application to split traffic After you have finished the deployment of ArcBox, you can verify that Microsoft Defender for Cloud is working properly and alerting on security threats by running the below command to simulate an alert on the _ArcBox-K3s-Data_ cluster: - ```shell - kubectx arcbox-k3s-data - kubectl get pods --namespace=asc-alerttest-662jfi039n - ``` +```shell +kubectx arcbox-k3s-data +kubectl get pods --namespace=asc-alerttest-662jfi039n +``` After a period of time (typically less than an hour), Microsoft Defender for Cloud will detect this event and trigger a security alert that you will see in the Azure portal under Microsoft Defender for Cloud's security alerts and also on the security tab of your Azure Arc-enabled Kubernetes cluster. @@ -524,11 +524,11 @@ Optionally, you can explore additional GitOps and RBAC scenarios in a manual fas - A browser window with the open Hello-Arc application _`http://k3sdevops.devops.com/`_ URL. - PowerShell running the command _`kubectl get pods -n hello-arc -w`_ command. - - ```shell - kubectx arcbox-k3s - kubectl get pods -n hello-arc -w - ``` + + ```shell + kubectx arcbox-k3s + kubectl get pods -n hello-arc -w + ``` The result should look like this: