Skip to content

Commit 56bca07

Browse files
Split Az.FrontDoor Examples (#17130)
* Split Az.FrontDoor Examples * Split Az.FrontDoor Examples
1 parent 170f16f commit 56bca07

34 files changed

+194
-106
lines changed

src/FrontDoor/FrontDoor/help/Disable-AzFrontDoorCustomDomainHttps.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,10 @@ The **Disable-AzFrontDoorCustomDomainHttps** disables HTTPS for a custom domain.
3838

3939
### Example 1: Disable HTTPS for a custom domain with FrontDoorName and ResourceGroupName.
4040
```powershell
41-
PS C:\> Disable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz"
41+
Disable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz"
42+
```
4243

44+
```output
4345
HostName : frontendpointname1.custom.xyz
4446
SessionAffinityEnabledState : Disabled
4547
SessionAffinityTtlSeconds : 0
@@ -64,8 +66,10 @@ Disable HTTPS for a custom domain "frontendpointname1-custom-xyz" with FrontDoor
6466

6567
### Example 2: Disable HTTPS for a custom domain with PSFrontendEndpoint object.
6668
```powershell
67-
PS C:\> Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" | Disable-AzFrontDoorCustomDomainHttps -InputObject $frontendEndpointObj
69+
Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" | Disable-AzFrontDoorCustomDomainHttps -InputObject $frontendEndpointObj
70+
```
6871

72+
```output
6973
HostName : frontendpointname1.custom.xyz
7074
SessionAffinityEnabledState : Disabled
7175
SessionAffinityTtlSeconds : 0
@@ -90,8 +94,10 @@ Disable HTTPS for a custom domain with PSFrontendEndpoint object.
9094

9195
### Example 3: Disable HTTPS for a custom domain with ResourceId.
9296
```powershell
93-
PS C:\> Disable-AzFrontDoorCustomDomainHttps -ResourceId $resourceId
97+
Disable-AzFrontDoorCustomDomainHttps -ResourceId $resourceId
98+
```
9499

100+
```output
95101
HostName : frontendpointname1.custom.xyz
96102
SessionAffinityEnabledState : Disabled
97103
SessionAffinityTtlSeconds : 0

src/FrontDoor/FrontDoor/help/Enable-AzFrontDoorCustomDomainHttps.md

Lines changed: 17 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -60,9 +60,10 @@ The **Enable-AzFrontDoorCustomDomainHttps** enables HTTPS for a custom domain.
6060

6161
### Example 1: Enable HTTPS for a custom domain with FrontDoorName and ResourceGroupName using Front Door managed certificate.
6262
```powershell
63-
PS C:\> Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -MinimumTlsVersion "1.2"
64-
63+
Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -MinimumTlsVersion "1.2"
64+
```
6565

66+
```output
6667
HostName : frontendpointname1.custom.xyz
6768
SessionAffinityEnabledState : Disabled
6869
SessionAffinityTtlSeconds : 0
@@ -88,10 +89,11 @@ Enable HTTPS for a custom domain "frontendpointname1-custom-xyz" that is part of
8889

8990
### Example 2: Enable HTTPS for a custom domain with FrontDoorName and ResourceGroupName using customer's own certificate in Key Vault with the specific version.
9091
```powershell
91-
PS C:\> $vaultId = (Get-AzKeyVault -VaultName $vaultName).ResourceId
92-
PS C:\> Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -Vault $vaultId -secretName $secretName -SecretVersion $secretVersion -MinimumTlsVersion "1.0"
93-
92+
$vaultId = (Get-AzKeyVault -VaultName $vaultName).ResourceId
93+
Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -Vault $vaultId -secretName $secretName -SecretVersion $secretVersion -MinimumTlsVersion "1.0"
94+
```
9495

96+
```output
9597
HostName : frontendpointname1.custom.xyz
9698
SessionAffinityEnabledState : Disabled
9799
SessionAffinityTtlSeconds : 0
@@ -117,9 +119,10 @@ Enable HTTPS for a custom domain "frontendpointname1-custom-xyz" that is part of
117119

118120
### Example 3: Enable HTTPS for a custom domain with PSFrontendEndpoint object using Front Door managed certificate.
119121
```powershell
120-
PS C:\> Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -Name "frontendpointname1-custom-xyz" | Enable-AzFrontDoorCustomDomainHttps
121-
122+
Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -Name "frontendpointname1-custom-xyz" | Enable-AzFrontDoorCustomDomainHttps
123+
```
122124

125+
```output
123126
HostName : frontendpointname1.custom.xyz
124127
SessionAffinityEnabledState : Disabled
125128
SessionAffinityTtlSeconds : 0
@@ -145,9 +148,10 @@ Enable HTTPS for a custom domain with PSFrontendEndpoint object using Front Door
145148

146149
### Example 4: Enable HTTPS for a custom domain with resource id using Front Door managed certificate.
147150
```powershell
148-
PS C:\> Enable-AzFrontDoorCustomDomainHttps -ResourceId $resourceId
149-
151+
Enable-AzFrontDoorCustomDomainHttps -ResourceId $resourceId
152+
```
150153

154+
```output
151155
HostName : frontendpointname1.custom.xyz
152156
SessionAffinityEnabledState : Disabled
153157
SessionAffinityTtlSeconds : 0
@@ -173,10 +177,11 @@ Enable HTTPS for a custom domain "frontendpointname1-custom-xyz" with resource i
173177

174178
### Example 5: Enable HTTPS for a custom domain with FrontDoorName and ResourceGroupName using customer's own certificate in Key Vault with the latest version to enable certificate auto-rotation.
175179
```powershell
176-
PS C:\> $vaultId = (Get-AzKeyVault -VaultName $vaultName).ResourceId
177-
PS C:\> Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -Vault $vaultId -secretName $secretName -MinimumTlsVersion "1.0"
178-
180+
$vaultId = (Get-AzKeyVault -VaultName $vaultName).ResourceId
181+
Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -Vault $vaultId -secretName $secretName -MinimumTlsVersion "1.0"
182+
```
179183

184+
```output
180185
HostName : frontendpointname1.custom.xyz
181186
SessionAffinityEnabledState : Disabled
182187
SessionAffinityTtlSeconds : 0

src/FrontDoor/FrontDoor/help/Get-AzFrontDoor.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,10 @@ The **Get-AzFrontDoor** cmdletGet gets all existing Front Doors in the current s
2424

2525
### Example 1: Get all FrontDoors in the current subscription.
2626
```powershell
27-
PS C:\> Get-AzFrontDoor
27+
Get-AzFrontDoor
28+
```
2829

30+
```output
2931
FriendlyName : frontdoor1
3032
FrontDoorId : {guid}
3133
RoutingRules : {routingrule1}
@@ -65,8 +67,10 @@ Get all FrontDoors in the current subscription.
6567

6668
### Example 2: Get all FrontDoors in resource group "rg1" in the current subscription.
6769
```powershell
68-
PS C:\> Get-AzFrontDoor -ResourceGroupName "rg1"
70+
Get-AzFrontDoor -ResourceGroupName "rg1"
71+
```
6972

73+
```output
7074
FriendlyName : frontdoor1
7175
FrontDoorId : {guid}
7276
RoutingRules : {routingrule1}
@@ -106,8 +110,10 @@ Get all FrontDoors in resource group "rg1" in the current subscription.
106110

107111
### Example 3: Get the FrontDoors in resource group "rg1" with name "frontDoor1" in the current subscription.
108112
```powershell
109-
PS C:\> Get-AzFrontDoor -ResourceGroupName "rg1" -Name "frontDoor1"
113+
Get-AzFrontDoor -ResourceGroupName "rg1" -Name "frontDoor1"
114+
```
110115

116+
```output
111117
FriendlyName : frontdoor1
112118
FrontDoorId : {guid}
113119
RoutingRules : {routingrule1}

src/FrontDoor/FrontDoor/help/Get-AzFrontDoorFrontendEndpoint.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,10 @@ The **Get-AzFrontDoorFrontendEndpoint** cmdlet gets all existing frontend endpoi
3737

3838
### Example 1: Get all frontend endpoints in Front Door "frontdoor1" which is part of resource group "rg1".
3939
```powershell
40-
PS C:\> Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "rg1" -FrontDoorName "frontdoor1"
41-
40+
Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "rg1" -FrontDoorName "frontdoor1"
41+
```
4242

43+
```output
4344
HostName : frontdoor1.azurefd.net
4445
SessionAffinityEnabledState : Disabled
4546
SessionAffinityTtlSeconds : 0
@@ -83,9 +84,10 @@ Get all frontend endpoints in Front Door "frontdoor1" which is part of resource
8384

8485
### Example 2: Get frontend endpoint with name "frontdoor1-azurefd-net" in Front Door "frontdoor1" which is part of resource group "rg1"
8586
```powershell
86-
PS C:\> Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "rg1" -FrontDoorName "frontdoor1" -Name "frontdoor1-azurefd-net"
87-
87+
Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "rg1" -FrontDoorName "frontdoor1" -Name "frontdoor1-azurefd-net"
88+
```
8889

90+
```output
8991
HostName : frontdoor1.azurefd.net
9092
SessionAffinityEnabledState : Disabled
9193
SessionAffinityTtlSeconds : 0

src/FrontDoor/FrontDoor/help/Get-AzFrontDoorRulesEngine.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,10 @@ The **Get-AzFrontDoorRulesEngine** cmdlet gets a specific rules engine configura
2424

2525
### Example 1
2626
```powershell
27-
PS C:\> Get-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName -Name rulesengine3
27+
Get-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName -Name rulesengine3
28+
```
2829

30+
```output
2931
Name RulesEngineRules
3032
---- ----------------
3133
rulesEngine3 {rules1}
@@ -36,8 +38,10 @@ Get specific rules engine configuration.
3638
### Example 2
3739

3840
```powershell
39-
PS C:\> Get-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName
41+
Get-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName
42+
```
4043

44+
```output
4145
Name RulesEngineRules
4246
---- ----------------
4347
rulesEngine1 {Rule1}
@@ -50,7 +54,10 @@ Get all rules engine configurations in a front door.
5054
### Example 3
5155

5256
```powershell
53-
PS C:\> Get-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName -Name nonexistent
57+
Get-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName -Name nonexistent
58+
```
59+
60+
```output
5461
Get-AzFrontDoorRulesEngine : Rules Engine with name 'nonexistent' in Front Door 'frontDoorName' is not found.
5562
At line:1 char:1
5663
+ Get-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontD ...

src/FrontDoor/FrontDoor/help/Get-AzFrontDoorWafManagedRuleSetDefinition.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,10 @@ Gets the list of WAF managed rule set definitions to use as reference
2323

2424
### Example 1
2525
```powershell
26-
PS C:> Get-AzFrontDoorWafManagedRuleSetDefinition
26+
Get-AzFrontDoorWafManagedRuleSetDefinition
27+
```
2728

29+
```output
2830
ProvisioningState RuleSetType RuleSetVersion RuleGroups
2931
----------------- ----------- -------------- ----------
3032
Succeeded DefaultRuleSet 1.0 {PROTOCOL-ATTACK, LFI, RFI, RCE...}

src/FrontDoor/FrontDoor/help/Get-AzFrontDoorWafPolicy.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,10 @@ The **Get-AzFrontDoorWafPolicy** cmdletGet gets WAF policy in a resource group u
2424

2525
### Example 1
2626
```powershell
27-
PS C:\> Get-AzFrontDoorWafPolicy -Name $policyName -ResourceGroupName $resourceGroupName
27+
Get-AzFrontDoorWafPolicy -Name $policyName -ResourceGroupName $resourceGroupName
28+
```
2829

30+
```output
2931
Name PolicyMode PolicyEnabledState CustomBlockResponseStatusCode RedirectUrl
3032
---- ---------- ------------------ ----------------------------- -----------
3133
{policyName} Prevention Enabled 403 https://www.bing.com/
@@ -35,8 +37,10 @@ Get a WAF policy called $policyName in $resourceGroupName
3537

3638
### Example 2
3739
```powershell
38-
PS C:\> Get-AzFrontDoorWafPolicy -ResourceGroupName $resourceGroupName
40+
Get-AzFrontDoorWafPolicy -ResourceGroupName $resourceGroupName
41+
```
3942

43+
```output
4044
Name PolicyMode PolicyEnabledState CustomBlockResponseStatusCode RedirectUrl
4145
---- ---------- ------------------ ----------------------------- -----------
4246
{policyName} Prevention Disabled

src/FrontDoor/FrontDoor/help/New-AzFrontDoor.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,10 @@ The **New-AzFrontDoor** cmdlet creates a new Azure Front Door load balancer in t
3737

3838
### Example 1: Create a Front Door based on given parameters.
3939
```powershell
40-
PS C:\> New-AzFrontDoor -Name "frontDoor1" -ResourceGroupName "rg1" -RoutingRule $routingrule1 -BackendPool $backendpool1 -FrontendEndpoint $frontendEndpoint1 -LoadBalancingSetting $loadBalancingSetting1 -HealthProbeSetting $healthProbeSetting1 -BackendPoolsSetting $backendPoolsSetting1
40+
New-AzFrontDoor -Name "frontDoor1" -ResourceGroupName "rg1" -RoutingRule $routingrule1 -BackendPool $backendpool1 -FrontendEndpoint $frontendEndpoint1 -LoadBalancingSetting $loadBalancingSetting1 -HealthProbeSetting $healthProbeSetting1 -BackendPoolsSetting $backendPoolsSetting1
41+
```
4142

43+
```output
4244
FriendlyName : frontdoor1
4345
RoutingRules : {routingrule1}
4446
BackendPools : {backendpool1}

src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendObject.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,10 @@ Create a PSBackend object for Front Door creation
2626

2727
### Example 1
2828
```powershell
29-
PS C:\>New-AzFrontDoorBackendObject -Address "contoso1.azurewebsites.net"
30-
29+
New-AzFrontDoorBackendObject -Address "contoso1.azurewebsites.net"
30+
```
3131

32+
```output
3233
Address : contoso1.azurewebsites.net
3334
HttpPort : 80
3435
HttpsPort : 443

src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendPoolObject.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,10 +25,11 @@ Create a PSBackendPool object for Front Door creation
2525

2626
### Example 1
2727
```powershell
28-
PS C:\> New-AzFrontDoorBackendPoolObject -Name "backendpool1" -FrontDoorName $Name -ResourceGroupName $resourceGroupName -Backend $backend1 -He
28+
New-AzFrontDoorBackendPoolObject -Name "backendpool1" -FrontDoorName $Name -ResourceGroupName $resourceGroupName -Backend $backend1 -He
2929
althProbeSettingsName "healthProbeSetting1" -LoadBalancingSettingsName "loadBalancingSetting1"
30+
```
3031

31-
32+
```output
3233
Backends : {Microsoft.Azure.Commands.FrontDoor.Models.PSBackend}
3334
LoadBalancingSettingRef : /subscriptions/{subid}/resourceGroups/{resourceGroupName}/providers
3435
/Microsoft.Network/frontDoors/frontdoor5/LoadBalancingSettings/loadBalancingSetting1

src/FrontDoor/FrontDoor/help/New-AzFrontDoorBackendPoolsSettingObject.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,10 @@ The **New-AzFrontDoorBackendpoolsSettingObject** cmdlet creates a new PSBackendP
2424

2525
### Example 1: Create BackendPoolsSettings object using defaults
2626
```powershell
27-
PS C:\> New-AzFrontDoorBackendpoolsSettingObject
28-
27+
New-AzFrontDoorBackendpoolsSettingObject
28+
```
2929

30+
```output
3031
EnforceCertificateNameCheck : Enabled
3132
SendRecvTimeoutInSeconds : 30
3233
Id :
@@ -36,9 +37,10 @@ Type :
3637

3738
### Example 2: Create BackendPoolsSettings object with user specified values
3839
```powershell
39-
PS C:\> New-AzFrontDoorBackendpoolsSettingObject -SendRecvTimeoutInSeconds 60 -EnforceCertificateNameCheck Enabled
40-
40+
New-AzFrontDoorBackendpoolsSettingObject -SendRecvTimeoutInSeconds 60 -EnforceCertificateNameCheck Enabled
41+
```
4142

43+
```output
4244
EnforceCertificateNameCheck : Enabled
4345
SendRecvTimeoutInSeconds : 60
4446
Id :

src/FrontDoor/FrontDoor/help/New-AzFrontDoorFrontendEndpointObject.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,10 @@ Create a PSFrontendEndpoint Object for Front Door creation
2727

2828
### Example 1
2929
```powershell
30-
PS C:\> New-AzFrontDoorFrontendEndpointObject -Name "frontendendpoint1" -HostName "frontendendpoint1"
31-
30+
New-AzFrontDoorFrontendEndpointObject -Name "frontendendpoint1" -HostName "frontendendpoint1"
31+
```
3232

33+
```output
3334
HostName : frontendendpoint1
3435
SessionAffinityEnabledState : Disabled
3536
SessionAffinityTtlSeconds : 0

src/FrontDoor/FrontDoor/help/New-AzFrontDoorHeaderActionObject.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,10 @@ Creates PSHeaderAction object for the creation of PSRulesEngineAction object.
2424

2525
### Example 1
2626
```powershell
27-
PS C:\> New-AzFrontDoorHeaderActionObject -HeaderName headername -HeaderActionType Append
27+
New-AzFrontDoorHeaderActionObject -HeaderName headername -HeaderActionType Append
28+
```
2829

30+
```output
2931
HeaderName HeaderActionType Value
3032
---------- ---------------- -----
3133
headername Append

src/FrontDoor/FrontDoor/help/New-AzFrontDoorHealthProbeSettingObject.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,10 @@ Create a PSHealthProbeSetting object for Front Door creation
2525

2626
### Example 1
2727
```powershell
28-
PS C:\> New-AzFrontDoorHealthProbeSettingObject -Name "healthProbeSetting1"
29-
28+
New-AzFrontDoorHealthProbeSettingObject -Name "healthProbeSetting1"
29+
```
3030

31+
```output
3132
Path : /
3233
Protocol : Http
3334
IntervalInSeconds : 30

src/FrontDoor/FrontDoor/help/New-AzFrontDoorLoadBalancingSettingObject.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,10 @@ Create a PSLoadBalancingSetting object for Front Door creation
2525

2626
### Example 1
2727
```powershell
28-
PS C:\> New-AzFrontDoorLoadBalancingSettingObject -Name "loadbalancingsetting1"
29-
28+
New-AzFrontDoorLoadBalancingSettingObject -Name "loadbalancingsetting1"
29+
```
3030

31+
```output
3132
SampleSize : 4
3233
AdditionalLatencyMilliseconds : 0
3334
SuccessfulSamplesRequired : 2

src/FrontDoor/FrontDoor/help/New-AzFrontDoorRoutingRuleObject.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,10 @@ Create a PSRoutingRuleObject for Front Door creation
3838

3939
### Example 1: Create a PSRoutingRuleObject for Front Door creation with a forwarding rule
4040
```powershell
41-
PS C:\> New-AzFrontDoorRoutingRuleObject -Name $routingRuleName -FrontDoorName $frontDoorName -ResourceGroupName $rgname -FrontendEndpointName "frontendEndpoint1" -BackendPoolName "backendPool1"
41+
New-AzFrontDoorRoutingRuleObject -Name $routingRuleName -FrontDoorName $frontDoorName -ResourceGroupName $rgname -FrontendEndpointName "frontendEndpoint1" -BackendPoolName "backendPool1"
42+
```
4243

44+
```output
4345
FrontendEndpointIds : {/subscriptions/{subid}/resourceGroups/{rgname}/pro
4446
viders/Microsoft.Network/frontDoors/{frontdoorname}/FrontendEndpoints/frontendEndpoint1}
4547
AcceptedProtocols : {Http, Https}
@@ -55,12 +57,14 @@ Type :
5557

5658
### Example 2: Create a PSRoutingRuleObject for Front Door creation with a redirect rule
5759
```powershell
58-
PS C:\> $customHost = "www.contoso.com"
59-
PS C:\> $customPath = "/images/contoso.png"
60-
PS C:\> $queryString = "field1=value1&field2=value2"
61-
PS C:\> $destinationFragment = "section-header-2"
62-
PS C:\> New-AzFrontDoorRoutingRuleObject -Name $routingRuleName -FrontDoorName $frontDoorName -ResourceGroupName $rgname -FrontendEndpointName "frontendEndpoint1" -CustomHost $customHost -CustomPath $customPath -CustomQueryString $queryString -CustomFragment $destinationFragment
60+
$customHost = "www.contoso.com"
61+
$customPath = "/images/contoso.png"
62+
$queryString = "field1=value1&field2=value2"
63+
$destinationFragment = "section-header-2"
64+
New-AzFrontDoorRoutingRuleObject -Name $routingRuleName -FrontDoorName $frontDoorName -ResourceGroupName $rgname -FrontendEndpointName "frontendEndpoint1" -CustomHost $customHost -CustomPath $customPath -CustomQueryString $queryString -CustomFragment $destinationFragment
65+
```
6366

67+
```output
6468
FrontendEndpointIds : {/subscriptions/{subid}/resourceGroups/{rgname}/pro
6569
viders/Microsoft.Network/frontDoors/{frontdoorname}/FrontendEndpoints/frontendEndpoint1}
6670
AcceptedProtocols : {Http, Https}

src/FrontDoor/FrontDoor/help/New-AzFrontDoorRulesEngine.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,10 @@ Use cmdlet "New-AzFrontDoorRulesEngineRule" to construct rules engine rules to p
2727

2828
### Example 1
2929
```powershell
30-
PS C:\> New-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName -Name myRulesEngine -Rule $rulesEngineRule1
30+
New-AzFrontDoorRulesEngine -ResourceGroupName $resourceGroupName -FrontDoorName $frontDoorName -Name myRulesEngine -Rule $rulesEngineRule1
31+
```
3132

33+
```output
3234
Name RulesEngineRules
3335
---- ----------------
3436
myRulesEngine {rules1}

0 commit comments

Comments
 (0)