Průvodce migrací pro Az 3.0.0

Tento dokument popisuje změny mezi verzemi 2.0.0 a 3.0.0 modulu Az.

Batch

Get-AzBatchNodeAgentSku

  • Odstraněn přepínač Get-AzBatchNodeAgentSku, nahrazuje ho Get-AzBatchSupportedImage.
  • Get-AzBatchSupportedImage vrátí stejná data jako Get-AzBatchNodeAgentSku, ale ve srozumitelnějším formátu.
  • Nyní se vrací také nové neověřené image. K dispozici jsou také další informace o vlastnostech Capabilities a BatchSupportEndOfLife pro každou image.

Před

$Context = Get-AzBatchAccountKeys -AccountName "ContosoBatchAccount"
Get-AzBatchNodeAgentSku -BatchContext $Context

Po

$Context = Get-AzBatchAccountKey -AccountName "ContosoBatchAccount"
Get-AzBatchSupportedImage -BatchContext $Context

Nekompatibilita předchozí verze s modulem Az.Resources

Verze 2.0.1 modulu Az.Batch je nekompatibilní se staršími verzemi modulu Az.Resources (verze 1.7.0 nebo starší). Výsledkem bude, že nepůjde importovat verzi 1.7.0 modulu Az.Resources, když je naimportovaná verze 2.0.1 modulu Az.Batch. Pokud chcete tento problém vyřešit, stačí aktualizovat modul Az.Resources na verzi 1.7.1 nebo novější, nebo jednoduše nainstalovat nejnovější verzi modulu Az.

Compute

New-AzDiskConfig

Pokud CreateOption je Upload, pro New-AzDiskConfig se použije parametr UploadSizeInBytes místo parametru DiskSizeGB.

Před

$diskconfig = New-AzDiskConfig -Location 'Central US' -DiskSizeGB 1023 -SkuName Standard_LRS -OsType Windows -CreateOption Upload -DiskIOPSReadWrite 500 -DiskMBpsReadWrite 8

Po

$diskconfig = New-AzDiskConfig -Location 'Central US' -UploadSizeInBytes 1023 * 1024 * 1024 * 1024 -SkuName Standard_LRS -OsType Windows -CreateOption Upload -DiskIOPSReadWrite 500 -DiskMBpsReadWrite 8

HDInsight

Get-AzHDInsightJobOutput

  • Aktualizace rutiny Get-AzHDInsightJobOutput tak, aby podporovala podrobné řízení přístupu na základě role ke klíči úložiště.
  • Uživatelů s rolemi Vlastník, Přispěvatel a Operátor clusteru HDInsight se tato změna nedotkne.
  • Pouze uživatelé s rolí Čtenář budou muset explicitně zadat parametr DefaultStorageAccountKey.

Před

Get-AzHDInsightJobOutput  -ClusterName $clusterName -JobId $jobId

Po

Get-AzHDInsightJobOutput -ClusterName $clusterName -JobId $jobId -DefaultStorageAccountKey $storageAccountKey

Add-AzHDInsightConfigValues

Odebrání aliasu Add-AzHDInsightConfigValues pro rutinu Add-AzHDInsightConfigValue

Před

Použití zastaralého aliasu

Add-AzHDInsightConfigValues

Po

Add-AzHDInsightConfigValue

Disable-AzHDInsightMonitoring

Přidání nové rutiny Disable-AzHDInsightMonitoring. Pomocí této rutiny můžete zakázat monitorování v clusteru HDInsight (nahrazuje Disable-AzHDInsightOperationsManagementSuite a Disable-AzHDInsightOMS).

Před

Disable-AzHDInsightOMS -Name testcluster
Disable-AzHDInsightOperationsManagementSuite -Name testcluster

Po

Disable-AzHDInsightMonitoring -Name testcluster

Enable-AzHDInsightMonitoring

Přidání nové rutiny Enable-AzHDInsightMonitoring. Pomocí této rutiny můžete povolit monitorování v clusteru HDInsight (nahrazuje Enable-AzHDInsightOperationsManagementSuite a Enable-AzHDInsightOMS).

Před

Enable-AzHDInsightOMS Enable-AzHDInsightMonitoring -Name testcluster -WorkspaceId 1d364e89-bb71-4503-aa3d-a23535aea7bd -PrimaryKey <key for workspace 1d364e89-bb71-4503-aa3d-a23535aea7bd>
Enable-AzHDInsightOperationsManagementSuite Enable-AzHDInsightMonitoring -Name testcluster -WorkspaceId 1d364e89-bb71-4503-aa3d-a23535aea7bd -PrimaryKey <key for workspace 1d364e89-bb71-4503-aa3d-a23535aea7bd>

Po

Enable-AzHDInsightMonitoring Enable-AzHDInsightMonitoring -Name testcluster -WorkspaceId 1d364e89-bb71-4503-aa3d-a23535aea7bd -PrimaryKey <key for workspace 1d364e89-bb71-4503-aa3d-a23535aea7bd>

Get-AzHDInsightMonitoring

Přidání nové rutiny Get-AzHDInsightMonitoring. Pomocí této rutiny můžete získat stav instalace monitorování v clusteru Azure HDInsight (nahrazuje Get-AzHDInsightOperationsManagementSuite a Get-AzHDInsightOMS).

Před

Get-AzHDInsightOMS -Name testcluster
Get-AzHDInsightOperationsManagementSuite -Name testcluster

Po

Get-AzHDInsightMonitoring -Name testcluster

Get-AzHDInsightProperty

Odebrání aliasu Get-AzHDInsightProperties pro rutinu Get-HDInsightProperty

Před

Použití zastaralého aliasu

Get-AzHDInsightProperties -Location "East US 2"

Po

Get-AzHDInsightProperty -Location "East US 2"

Grant-AzHDInsightRdpServicesAccess

Odebrání rutin Grant-AzHDInsightRdpServicesAccess a Revoke-AzHDInsightRdpServicesAccess. Ty už nejsou potřebné, protože clustery používající typ operačního systému Windows nejsou podporované. Místo toho vytvořte prosím cluster používající typ operačního systému Linux.

Remove-AzHDInsightCluster

Typ výstupu Remove-AzHDInsightCluster se změnil z Microsoft.Azure.Management.HDInsight.Models.ClusterGetResponse na bool.

Před

$cluster = Remove-AzHDInsightCluster -ClusterName "your-hadoop-001"

Po

Remove-AzHDInsightCluster -ClusterName "your-hadoop-001" -PassThru
True

Revoke-AzHDInsightRdpServicesAccess

Rutina je zastaralá. Neexistuje pro ni žádná náhrada.

Set-AzHDInsightGatewayCredential

Typ výstupu Set-AzHDInsightGatewayCredential se změnil z HttpConnectivitySettings na AzureHDInsightGatewaySettings.

IotHub

New-AzIotHubImportDevices

Tento alias se odebral. Použijte prosím místo toho New-AzIotHubImportDevice.

Před

New-AzIotHubImportDevices -ResourceGroupName "myresourcegroup" -Name "myiothub" -InputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -OutputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D"

Po

New-AzIotHubImportDevice -ResourceGroupName "myresourcegroup" -Name "myiothub" -InputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -OutputBlobContainerUri "https://mystorageaccount.blob.core.windows.net/?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D"

New-AzIotHubExportDevices

Tento alias se odebral. Použijte prosím místo toho New-AzIotHubExportDevice.

Před

New-AzIotHubExportDevices -ResourceGroupName "myresourcegroup" -Name "myiothub" -ExportBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -ExcludeKeys

Po

New-AzIotHubExportDevice -ResourceGroupName "myresourcegroup" -Name "myiothub" -ExportBlobContainerUri "https://mystorageaccount.blob.core.windows.net/mystoragecontainer?sv=2015-04-05&ss=bfqt&sr=c&srt=sco&sp=rwdl&se=2016-10-27T04:01:48Z&st=2016-10-26T20:01:48Z&spr=https&sig=QqpIhHsIMF8hNuFO%3D" -ExcludeKeys

Add-AzIotHubEventHubConsumerGroup

Parametr EventHubEndPointName je zastaralý bez náhrady, protože IotHub obsahuje jenom jeden integrovaný koncový bod (events), který může zpracovávat zprávy systému a zařízení.

Před

Add-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName "myconsumergroup" -EventHubEndpointName "/EventHubEndpointName"

Po

Add-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName "myconsumergroup"

Get-AzIotHubEventHubConsumerGroup

Parametr EventHubEndPointName je zastaralý bez náhrady, protože IotHub obsahuje jenom jeden integrovaný koncový bod (events), který může zpracovávat zprávy systému a zařízení.

Před

Get-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubEndpointName "/EventHubEndpointName"

Po

Get-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub"

Remove-AzIotHubEventHubConsumerGroup

Parametr EventHubEndPointName je zastaralý bez náhrady, protože IotHub obsahuje jenom jeden integrovaný koncový bod (events), který může zpracovávat zprávy systému a zařízení.

Před

Remove-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName myconsumergroup -EventHubEndpointName "/EventHubEndpointName"

Po

Remove-AzIotHubEventHubConsumerGroup -ResourceGroupName "myresourcegroup" -Name "myiothub" -EventHubConsumerGroupName myconsumergroup

Set-AzIotHub

Parametr OperationsMonitoringProperties je zastaralý bez náhrady, protože IotHub už nepoužívá integrovaný koncový bod (operationsMonitoringEvents).

RecoveryServices

Edit-AzRecoveryServicesAsrRecoveryPlan

Pole ASRRecoveryPlanGroup.ReplicationProtectedItems, ASRRecoveryPlanGroup.StartGroupActions a ASRRecoveryPlanGroup.EndGroupActions byla z výstupu odebrána.

Get-AzRecoveryServicesAsrRecoveryPlan

Pole ASRRecoveryPlanGroup.ReplicationProtectedItems, ASRRecoveryPlanGroup.StartGroupActions a ASRRecoveryPlanGroup.EndGroupActions byla z výstupu odebrána.

New-AzRecoveryServicesAsrReplicationProtectedItem

Parametr IncludeDiskId se změnil, aby podporoval přímý zápis na spravovaný disk v Azure Site Recovery.

Před

$job = New-AzRecoveryServicesAsrReplicationProtectedItem -RecoveryAzureStorageAccountId $recoveryAzureStorageAccountId -IncludeDiskId $includeDiskId -VMwareToAzure -Account $fabric.FabricSpecificDetails.RunAsAccounts[0] -RecoveryResourceGroupId $RecoveryResourceGroupId -RecoveryAzureNetworkId $RecoveryAzureNetworkId -name $name -ProcessServer $fabric.FabricSpecificDetails.ProcessServers[0] -ProtectableItem $protectableItem -ProtectionContainerMapping $pcm -RecoveryAzureSubnetName $RecoveryAzureSubnetName -RecoveryVmName $RecoveryVmName -LogStorageAccountId $LogStorageAccountId

Po

$disk1 = New-AzRecoveryServicesAsrInMageAzureV2DiskInput -DiskId $diskId -LogStorageAccountId $logStorageAccountId -DiskType $diskType
$disk2 = New-AzRecoveryServicesAsrInMageAzureV2DiskInput -DiskId $diskId2 -LogStorageAccountId $logStorageAccountId -DiskType $diskType2
$job = New-AzRecoveryServicesAsrReplicationProtectedItem -VMwareToAzure -Account $fabric.FabricSpecificDetails.RunAsAccounts[0] -RecoveryResourceGroupId $RecoveryResourceGroupId -RecoveryAzureNetworkId $RecoveryAzureNetworkId -name $name -ProcessServer $fabric.FabricSpecificDetails.ProcessServers[0] -ProtectableItem $protectableItem -ProtectionContainerMapping $pcm -RecoveryAzureSubnetName $RecoveryAzureSubnetName -RecoveryVmName $RecoveryVmName -LogStorageAccountId $LogStorageAccountId -InMageAzureV2DiskInput $disk1,$disk2

Zdroje informací

Nekompatibilita předchozí verze s modulem Az.Batch

Verze 1.7.1 modulu Az.Resources je nekompatibilní se staršími verzemi modulu Az.Batch (verze 1.1.2 nebo starší). Výsledkem bude, že nepůjde importovat verzi 1.1.2 modulu Az.Batch, když je naimportovaná verze 1.7.1 modulu Az.Resources. Pokud chcete tento problém vyřešit, aktualizujte modul Az.Batch na verzi 2.0.1 nebo novější, nebo jednoduše nainstalujte nejnovější verzi modulu Az.

ServiceFabric

Add-ServiceFabricApplicationCertificate

Odebralo se Add-ServiceFabricApplicationCertificate, protože tento scénář pokrývá Add-AzVmssSecret.

Před

Add-AzServiceFabricApplicationCertificate -ResourceGroupName "Group1" -Name "Contoso01SFCluster" -SecretIdentifier "http://keyVaultName.vault.contoso.net/secrets/secretName/secretVersion"

Po

$Vault = Get-AzKeyVault -VaultName "ContosoVault"
$CertConfig = New-AzVmssVaultCertificateConfig -CertificateUrl "http://keyVaultName.vault.contoso.net/secrets/secretName/secretVersion" -CertificateStore "Certificates"
$VMSS = New-AzVmssConfig
Add-AzVmssSecret -VirtualMachineScaleSet $VMSS -SourceVaultId $Vault.ResourceId -VaultCertificate $CertConfig

Sql

Get-AzSqlDatabaseSecureConnectionPolicy

Mějte na paměti, že zabezpečené připojení je zastaralé a příkaz je proto odebraný. Pokud chcete zobrazit připojovací řetězce, použijte prosím okno databáze SQL na webu Azure Portal.

Get-AzSqlDatabaseIndexRecommendations

Alias Get-AzSqlDatabaseIndexRecommendations je odebraný. Místo toho použijte Get-AzSqlDatabaseIndexRecommendation.

Get-AzSqlDatabaseRestorePoints

Alias Get-AzSqlDatabaseRestorePoints je odebraný. Místo toho použijte Get-AzSqlDatabaseRestorePoint.

Get-AzSqlDatabaseAuditing

  • Tuto rutinu nahrazuje rutina Get-AzSqlDatabaseAudit.
  • Typ výstupu se mění z existujícího typu Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditingSettingsModel na nový typ Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseAuditingSettingsModel, jsou odebrané vlastnosti AuditState a StorageAccountName. a StorageAccountSubscriptionId. Skripty mohou načíst informace o účtu úložiště z nové vlastnosti StorageAccountResourceId.

Před

PS C:\> Get-AzSqlDatabaseAuditing -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01"
DatabaseName                 : database01
AuditAction                  : {}
AuditActionGroup             : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP,
                                BATCH_COMPLETED_GROUP, ...}
ResourceGroupName            : resourcegroup01
ServerName                   : server01
AuditState                   : Enabled
StorageAccountName           : mystorage
StorageKeyType               : Primary
RetentionInDays              : 0
StorageAccountSubscriptionId : 7fe3301d-31d3-4668-af5e-211a890ba6e3
PredicateExpression          : statement <> 'select 1'

Po

PS C:\> Get-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01"
ServerName                          : server01
DatabaseName                        : database01
AuditAction                         : {}
ResourceGroupName                   : resourcegroup01
AuditActionGroup                    : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP,
                                       BATCH_COMPLETED_GROUP, ...}
PredicateExpression                 : statement <> 'select 1'
BlobStorageTargetState              : Enabled
StorageAccountResourceId            : /subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage
StorageKeyType                      : Primary
RetentionInDays                     : 0
EventHubTargetState                 : Enabled
EventHubName                        : eventHubName
EventHubAuthorizationRuleResourceId : EventHubAuthorizationRuleResourceId
LogAnalyticsTargetState             : Enabled
WorkspaceResourceId                 : "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"

Set-AzSqlDatabaseAuditing

  • Tuto rutinu nahrazuje rutina Set-AzSqlDatabaseAudit.
  • Typ výstupu se mění z existujícího typu Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditingSettingsModel na nový typ bool.

Před

Set-AzSqlDatabaseAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -StorageAccountName "Storage22" -DatabaseName "Database01"

Po

Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage"

Get-AzSqlServerAuditing

  • Tuto rutinu nahrazuje rutina Get-AzSqlServerAudit.
  • Typ výstupu se mění z existujícího typu Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditingSettingsModel na nový typ Microsoft.Azure.Commands.Sql.Auditing.Model.ServerAuditingSettingsModel. Jsou odebrané vlastnosti AuditState, StorageAccountNamea StorageAccountSubscriptionId. Skripty, které používají vlastnosti StorageAccountName a StorageAccountSubscriptionId, můžou načíst tyto informace z nové vlastnosti StorageAccountResourceId.

Před

PS C:\> Get-AzSqlServerAuditing -ResourceGroupName "resourcegroup01" -ServerName "server01"
AuditActionGroup             : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP, BATCH_COMPLETED_GROUP, ...}
ResourceGroupName            : resourcegroup01
ServerName                   : server01
AuditState                   : Enabled
StorageAccountName           : mystorage
StorageKeyType               : Primary
RetentionInDays              : 0
StorageAccountSubscriptionId : 7fe3301d-31d3-4668-af5e-211a890ba6e3
PredicateExpression          : statement <> 'select 1'

Po

PS C:\> Get-AzSqlServerAudit -ResourceGroupName "resourcegroup01" -ServerName "server01"
ServerName                          : server01
ResourceGroupName                   : resourcegroup01
AuditActionGroup                    : {SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP, BATCH_COMPLETED_GROUP, ...}
PredicateExpression                 : statement <> 'select 1'
BlobStorageTargetState              : Enabled
StorageAccountResourceId            : /subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage
StorageKeyType                      : Primary
RetentionInDays                     : 0
EventHubTargetState                 : Enabled
EventHubName                        : eventHubName
EventHubAuthorizationRuleResourceId : EventHubAuthorizationRuleResourceId
LogAnalyticsTargetState             : Enabled
WorkspaceResourceId                 : "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2"

Set-AzSqlServerAuditing

  • Tuto rutinu nahrazuje rutina Set-AzSqlServerAudit.
  • Typ výstupu se mění z existujícího typu Microsoft.Azure.Commands.Sql.Auditing.Model.DatabaseBlobAuditingSettingsModel na nový typ bool.

Před

Set-AzSqlServerAuditing -State Enabled -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -StorageAccountName "Storage22"

Po

PS C:\> Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage"

Get-AzSqlServerAdvancedThreatProtectionSettings

Rutinu Get-AzSqlServerAdvancedThreatProtectionSettings nahradila rutina Get-AzSqlServerAdvancedThreatProtectionSetting.

Před

Get-AzSqlServerAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01"

Po

Get-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"

Clear-AzSqlServerAdvancedThreatProtectionSettings

Rutinu Clear-AzSqlServerAdvancedThreatProtectionSettings nahradila rutina Clear-AzSqlServerAdvancedThreatProtectionSetting.

Před

Clear-AzSqlServerAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01"

Po

Clear-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"

Update-AzSqlServerAdvancedThreatProtectionSettings

Rutinu Update-AzSqlServerAdvancedThreatProtectionSettings nahradila rutina Update-AzSqlServerAdvancedThreatProtectionSetting.

Před

Update-AzSqlServerAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"

Po

Update-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"

Get-AzSqlDatabaseAdvancedThreatProtectionSettings

Rutinu Get-AzSqlDatabaseAdvancedThreatProtectionSettings nahradila rutina Get-AzSqlDatabaseAdvancedThreatProtectionSetting.

Před

Get-AzSqlDatabaseAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"

Po

Get-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"

Update-AzSqlDatabaseAdvancedThreatProtectionSettings

Rutinu Update-AzSqlDatabaseAdvancedThreatProtectionSettings nahradila rutina Update-AzSqlDatabaseAdvancedThreatProtectionSetting.

Před

Update-AzSqlDatabaseAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"

Po

Update-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"

Clear-AzSqlDatabaseAdvancedThreatProtectionSettings

Rutinu Clear-AzSqlDatabaseAdvancedThreatProtectionSettings nahradila rutina Clear-AzSqlDatabaseAdvancedThreatProtectionSetting.

Před

Clear-AzSqlDatabaseAdvancedThreatProtectionSettings -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"

Po

Clear-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"

Update-AzSqlDatabaseVulnerabilityAssessmentSettings

Rutinu Update-AzSqlDatabaseVulnerabilityAssessmentSettings nahradila rutina Update-AzSqlDatabaseVulnerabilityAssessmentSetting.

Před

Update-AzSqlDatabaseVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01"`
    -ServerName "Server01"`
    -DatabaseName "Database01" `
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Po

Update-AzSqlDatabaseVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01"`
    -ServerName "Server01"`
    -DatabaseName "Database01" `
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Get-AzSqlDatabaseVulnerabilityAssessmentSettings

Rutinu Get-AzSqlDatabaseVulnerabilityAssessmentSettings nahradila rutina Get-AzSqlDatabaseVulnerabilityAssessmentSetting.

Před

Get-AzSqlDatabaseVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Po

Get-AzSqlDatabaseVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Clear-AzSqlDatabaseVulnerabilityAssessmentSettings

Rutinu Clear-AzSqlDatabaseVulnerabilityAssessmentSettings nahradila rutina Clear-AzSqlDatabaseVulnerabilityAssessmentSetting.

Před

Clear-AzSqlDatabaseVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Po

Clear-AzSqlDatabaseVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings

Rutinu Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings nahradila rutina Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting.

Před

Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -InstanceName "ManagedInstance01" `
    -DatabaseName "Database01" `
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Po

Update-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -InstanceName "ManagedInstance01" `
    -DatabaseName "Database01" `
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings

Rutinu Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings nahradila rutina Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting.

Před

Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Po

Get-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings

Rutinu Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings nahradila rutina Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting.

Před

Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Po

Clear-AzSqlInstanceDatabaseVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Update-AzSqlInstanceVulnerabilityAssessmentSettings

Rutinu Update-AzSqlInstanceVulnerabilityAssessmentSettings nahradila rutina Update-AzSqlInstanceVulnerabilityAssessmentSetting.

Před

Update-AzSqlInstanceVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -InstanceName "ManagedInstance01" `
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Po

Update-AzSqlInstanceVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -InstanceName "ManagedInstance01" `
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Get-AzSqlInstanceVulnerabilityAssessmentSettings

Rutinu Get-AzSqlInstanceVulnerabilityAssessmentSettings nahradila rutina Get-AzSqlInstanceVulnerabilityAssessmentSetting.

Před

Get-AzSqlInstanceVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Po

Get-AzSqlInstanceVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Clear-AzSqlInstanceVulnerabilityAssessmentSettings

Rutinu Clear-AzSqlInstanceVulnerabilityAssessmentSettings nahradila rutina Clear-AzSqlInstanceVulnerabilityAssessmentSetting.

Před

Clear-AzSqlInstanceVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Po

Clear-AzSqlInstanceVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Update-AzSqlServerVulnerabilityAssessmentSettings

Rutinu Update-AzSqlServerVulnerabilityAssessmentSettings nahradila rutina Update-AzSqlServerVulnerabilityAssessmentSetting.

Před

Update-AzSqlServerVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01"`
    -ServerName "Server01"`
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Po

Update-AzSqlServerVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01"`
    -ServerName "Server01"`
    -StorageAccountName "mystorage" `
    -ScanResultsContainerName "vulnerability-assessment" `
    -RecurringScansInterval Weekly `
    -EmailSubscriptionAdmins $true `
    -NotificationEmail @("mail1@mail.com" , "mail2@mail.com")

Get-AzSqlServerVulnerabilityAssessmentSettings

Rutinu Get-AzSqlServerVulnerabilityAssessmentSettings nahradila rutina Get-AzSqlServerVulnerabilityAssessmentSetting.

Před

Get-AzSqlServerVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Po

Get-AzSqlServerVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Clear-AzSqlServerVulnerabilityAssessmentSettings

Rutinu Clear-AzSqlServerVulnerabilityAssessmentSettings nahradila rutina Clear-AzSqlServerVulnerabilityAssessmentSetting.

Před

Clear-AzSqlServerVulnerabilityAssessmentSettings `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Po

Clear-AzSqlDatabaseVulnerabilityAssessmentSetting `
    -ResourceGroupName "ResourceGroup01" `
    -ServerName "Server01" `
    -DatabaseName "Database01"

Get-AzSqlServerAdvancedThreatProtectionPolicy

Rutina Get-AzSqlServerAdvancedThreatProtectionPolicy je odstraněná a nenahrazuje ji žádná rutina.

Get-AzSqlServerThreatDetectionPolicy

Rutinu Get-AzSqlServerThreatDetectionPolicy nahradila rutina Get-AzSqlServerThreatDetectionSetting.

Před

PS C:\> Get-AzSqlServerThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
ResourceGroupName            : ResourceGroup11
ServerName                   : Server01
ThreatDetectionState         : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName           : mystorage
EmailAdmins                  : True
ExcludedDetectionTypes       : {}
RetentionInDays              : 0

Po

PS C:\> Get-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"
ResourceGroupName            : ResourceGroup11
ServerName                   : Server01
ThreatDetectionState         : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName           : mystorage
EmailAdmins                  : True
ExcludedDetectionTypes       : {}
RetentionInDays              : 0

Remove-AzSqlServerThreatDetectionPolicy

Rutinu Remove-AzSqlServerThreatDetectionPolicy nahradila rutina Clear-AzSqlServerAdvancedThreatProtectionSetting.

Před

Remove-AzSqlServerThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01"

Po

Clear-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"

Set-AzSqlServerThreatDetectionPolicy

Rutinu Set-AzSqlServerThreatDetectionPolicy nahradila rutina Update-AzSqlServerAdvancedThreatProtectionSetting.

Před

Set-AzSqlServerThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"

Po

Update-AzSqlServerAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability","SQL_Injection" -StorageAccountName "mystorageAccount"

Get-AzSqlDatabaseThreatDetectionPolicy

Rutinu Get-AzSqlDatabaseThreatDetectionPolicy nahradila rutina Get-AzSqlDatabaseThreatDetectionSetting.

Před

PS C:\> Get-AzSqlDatabaseThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName   "Database01"
DatabaseName                 : Database01
ResourceGroupName            : ResourceGroup11
ServerName                   : Server01
ThreatDetectionState         : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName           : mystorage
EmailAdmins                  : True
ExcludedDetectionTypes       : {}
RetentionInDays              : 0

Po

PS C:\> Get-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01"   -DatabaseName "Database01"
DatabaseName                 : Database01
ResourceGroupName            : ResourceGroup11
ServerName                   : Server01
ThreatDetectionState         : Enabled
NotificationRecipientsEmails : admin@myCompany.com
StorageAccountName           : mystorage
EmailAdmins                  : True
ExcludedDetectionTypes       : {}
RetentionInDays              : 0

Set-AzSqlDatabaseThreatDetectionPolicy

Rutinu Set-AzSqlDatabaseThreatDetectionPolicy nahradila rutina Update-AzSqlDatabaseAdvancedThreatProtectionSetting.

Před

Set-AzSqlDatabaseThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"

Po

Update-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01" -NotificationRecipientsEmails "admin01@contoso.com;secadmin@contoso.com" -EmailAdmins $False -ExcludedDetectionType "Sql_Injection_Vulnerability", "SQL_Injection" -StorageAccountName "mystorageAccount"

Remove-AzSqlDatabaseThreatDetectionPolicy

Rutinu Remove-AzSqlDatabaseThreatDetectionPolicy nahradila rutina Clear-AzSqlDatabaseAdvancedThreatProtectionSetting.

Před

Remove-AzSqlDatabaseThreatDetectionPolicy -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"

Po

Clear-AzSqlDatabaseAdvancedThreatProtectionSetting -ResourceGroupName "ResourceGroup11" -ServerName "Server01" -DatabaseName "Database01"