Skip to content

Commit 81bdeb9

Browse files
authored
fix spelling (#3623)
1 parent 27b2468 commit 81bdeb9

29 files changed

+45
-45
lines changed

azps-12.5.0/Az.EventHub/New-AzEventHub.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Type : Microsoft.EventHub/namespaces/eventhubs
8787
UpdatedAt : 4/25/2023 3:55:46 AM
8888
```
8989

90-
Creates a new eventhub entity `myEventHub` on namespace `myNamespace` with CleaupPolicy `Delete`.
90+
Creates a new eventhub entity `myEventHub` on namespace `myNamespace` with CleanupPolicy `Delete`.
9191

9292
### Example 2: Create EventHub with Capture Enabled
9393
```powershell
@@ -160,7 +160,7 @@ Type : Microsoft.EventHub/namespaces/eventhubs
160160
UpdatedAt : 4/25/2023 4:05:58 AM
161161
```
162162

163-
Creates a new eventhub entity `myEventHub` on namespace `myNamespace` with CleaupPolicy `Compact`.
163+
Creates a new eventhub entity `myEventHub` on namespace `myNamespace` with CleanupPolicy `Compact`.
164164

165165
## PARAMETERS
166166

azps-12.5.0/Az.EventHub/New-AzEventHubAuthorizationRuleSASToken.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ New-AzEventHubAuthorizationRuleSASToken [-AuthorizationRuleId] <String> [-KeyTyp
2121
```
2222

2323
## DESCRIPTION
24-
The New-AzEventHubAuthorizationRuleSASToken cmdlet generates a Shared Access Signature (SAS) token for an Azure Eventhub Namesapce or Azure Eventhub
24+
The New-AzEventHubAuthorizationRuleSASToken cmdlet generates a Shared Access Signature (SAS) token for an Azure Eventhub Namespace or Azure Eventhub
2525

2626
## EXAMPLES
2727

@@ -32,7 +32,7 @@ $EndTime = $StartTime.AddHours(2.0)
3232
$SasToken = New-AzEventHubAuthorizationRuleSASToken -AuthorizationRuleId $updatedAuthRule.Id -KeyType Primary -ExpiryTime $EndTime -StartTime $StartTime
3333
```
3434

35-
Generate SAS token for the given authorixation rule for Namespace with start and expiry time..
35+
Generate SAS token for the given authorization rule for Namespace with start and expiry time..
3636

3737
### Example 2
3838
```powershell
@@ -41,12 +41,12 @@ $EndTime = $StartTime.AddHours(2.0)
4141
$SasToken = New-AzEventHubAuthorizationRuleSASToken -AuthorizationRuleId $updatedAuthRule.Id -KeyType Primary -ExpiryTime $EndTime
4242
```
4343

44-
Generate SAS token for the given authorixation rule for Namespace with expiry time.
44+
Generate SAS token for the given authorization rule for Namespace with expiry time.
4545

4646
## PARAMETERS
4747

4848
### -AuthorizationRuleId
49-
ARM ResourceId of the Authoraization Rule
49+
ARM ResourceId of the Authorization Rule
5050

5151
```yaml
5252
Type: System.String

azps-12.5.0/Az.EventHub/Set-AzEventHubApplicationGroup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ ResourceGroupName : myResourceGroup
6969
```
7070

7171
`-Policy` takes an array of Policy objects.
72-
It represents the entire set of throttling policies defined on the appplication group and not just the one.
72+
It represents the entire set of throttling policies defined on the application group and not just the one.
7373
If you want to add or remove throttling policies, the right way to do it is to get the application group and query the Policy data member of the object returned as shown above.
7474

7575
### Example 2: Update application group using InputObject parameter set

azps-12.5.0/Az.EventHub/Set-AzEventHubNamespace.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ ZoneRedundant : True
114114

115115
The output type of New and Set cmdlets `IEhNamespace` has a property named `UserAssignedIdentity` which is a hashtable.
116116
The keys
117-
of this hastable are the resource ID's of the managed identities the namespace is part of.
117+
of this hashtable are the resource ID's of the managed identities the namespace is part of.
118118
To add or remove an IdentityId, extract the
119119
keys from the hashtable, which would result in an array of strings which can then be queried and fed as input to set cmdlet as shown above.
120120

azps-12.5.0/Az.EventHub/Test-AzEventHubName.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Message
5656
The specified name is not available. For more information visit https://aka.ms/eventhubsarmexceptions. False NameInUse
5757
```
5858

59-
Checks the availability of alias name `myAlias` on namespace `myNamepace`.
59+
Checks the availability of alias name `myAlias` on namespace `myNamespace`.
6060

6161
## PARAMETERS
6262

azps-12.5.0/Az.FrontDoor/New-AzFrontDoorRulesEngineActionObject.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ DynamicCompression : Disabled
100100
EnableCaching : True
101101
```
102102

103-
Create a rules engine action that forwards the requests to a speicific backend pool and show how to view the properties of the rules engine action created.
103+
Create a rules engine action that forwards the requests to a specific backend pool and show how to view the properties of the rules engine action created.
104104

105105
### Example 3
106106
<!-- Skip: Output cannot be splitted from code -->

azps-12.5.0/Az.FrontDoor/New-AzFrontDoorRulesEngineMatchConditionObject.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ NegateCondition : False
3939
Transform : {Lowercase, Uppercase}
4040
```
4141

42-
Greate a new PSRulesEngineMatchCondition object.
42+
Create a new PSRulesEngineMatchCondition object.
4343

4444
## PARAMETERS
4545

azps-12.5.0/Az.FrontDoor/New-AzFrontDoorWafLogScrubbingRuleObject.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Create LogScrubbingRule object for LogScrubbingSetting
3030
New-AzFrontDoorWafLogScrubbingRuleObject -MatchVariable "RequestHeaderNames" -SelectorMatchOperator "EqualsAny" -State "Enabled"
3131
```
3232

33-
This obejct is a parameter for LogscrubbingSetting
33+
This object is a parameter for LogscrubbingSetting
3434

3535
## PARAMETERS
3636

azps-12.5.0/Az.FrontDoor/Set-AzFrontDoor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ Type : Microsoft.Network/frontdoor1
177177
update an existing FrontDoor.
178178

179179
### Example 4: update BackendPoolSetting property EnforceCertificateNameCheck of an existing Front Door with -DisableCertificateNameCheck switch parameter
180-
Front Door to be updated can be identified using FrontoorName and ResourceGroupName, PSFrontDoor object, or ResourceId. (See above 3 examples for example)
180+
Front Door to be updated can be identified using FrontDoorName and ResourceGroupName, PSFrontDoor object, or ResourceId. (See above 3 examples for example)
181181
The below example uses PSFrontDoor object.
182182

183183
```powershell

azps-12.5.0/Az.HDInsight/New-AzHDInsightCluster.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -431,7 +431,7 @@ $clusterCreds = Get-Credential
431431
# New-AzResourceGroup -Name $clusterResourceGroupName -Location $location
432432
433433
# ESP configuration
434-
$domainResourceId = "your Azure AD Domin Service resource id"
434+
$domainResourceId = "your Azure AD Domain Service resource id"
435435
$domainUser = "yourdomainuser"
436436
$domainPassword = ConvertTo-SecureString -String "****" -AsPlainText -Force
437437
$domainCredential = New-Object System.Management.Automation.PSCredential($domainUser, $domainPassword)
@@ -441,7 +441,7 @@ $ldapUrls = "ldaps://{your domain name}:636"
441441
$clusterTier = "Premium"
442442
$vnetId = "yourvnetid"
443443
$subnetName = "yoursubnetname"
444-
$assignedIdentity = "your user managed assigned identity resourcee id"
444+
$assignedIdentity = "your user managed assigned identity resource id"
445445
446446
#Create security profile
447447
$config= New-AzHDInsightClusterConfig|Add-AzHDInsightSecurityProfile -DomainResourceId $domainResourceId -DomainUserCredential $domainCredential -LdapsUrls $ldapUrls -ClusterUsersGroupDNs $clusterUserGroupDns
@@ -639,7 +639,7 @@ $clusterCreds = Get-Credential
639639
# If the cluster's resource group doesn't exist yet, run:
640640
# New-AzResourceGroup -Name $clusterResourceGroupName -Location $location
641641
# ESP configuration
642-
$domainResourceId = "your Azure AD Domin Service resource id"
642+
$domainResourceId = "your Azure AD Domain Service resource id"
643643
$domainUser = "yourdomainuser"
644644
$domainPassword = ConvertTo-SecureString -String "****" -AsPlainText -Force
645645
$domainCredential = New-Object System.Management.Automation.PSCredential($domainUser, $domainPassword)
@@ -648,7 +648,7 @@ $ldapUrls = "ldaps://{your domain name}:636"
648648
$clusterTier = "Premium"
649649
$vnetId = "yourvnetid"
650650
$subnetName = "yoursubnetname"
651-
$assignedIdentity = "your user managed assigned identity resourcee id"
651+
$assignedIdentity = "your user managed assigned identity resource id"
652652
#Create security profile
653653
$config= New-AzHDInsightClusterConfig|Add-AzHDInsightSecurityProfile -DomainResourceId $domainResourceId -DomainUserCredential $domainCredential -LdapsUrls $ldapUrls -ClusterUsersGroupDNs $clusterUserGroupDns
654654
# Create the cluster

0 commit comments

Comments
 (0)