Skip to content

Commit 1aae202

Browse files
committed
Acrolinx cleanup
1 parent c412f32 commit 1aae202

File tree

2 files changed

+15
-9
lines changed

2 files changed

+15
-9
lines changed

articles/governance/policy/concepts/definition-structure.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,12 @@ ms.topic: conceptual
66
---
77
# Azure Policy definition structure
88

9-
Azure Policy establishes conventions for resources. Policy definitions describe resource compliance [conditions](#conditions) and the effect to take if a condition is met. A condition compares a resource property [field](#fields) to a required value. Resource property fields are accessed by using [aliases](#aliases). A resource property field is either a single-valued field or an [array](#understanding-the--alias) of multiple values. Condition evaluation is different on arrays. Learn more about [conditions](#conditions).
9+
Azure Policy establishes conventions for resources. Policy definitions describe resource compliance
10+
[conditions](#conditions) and the effect to take if a condition is met. A condition compares a
11+
resource property [field](#fields) to a required value. Resource property fields are accessed by
12+
using [aliases](#aliases). A resource property field is either a single-valued field or an
13+
[array](#understanding-the--alias) of multiple values. Condition evaluation is different on arrays.
14+
Learn more about [conditions](#conditions).
1015

1116
By defining conventions, you can control costs and more easily manage your resources. For example,
1217
you can specify that only certain types of virtual machines are allowed. Or, you can require that
@@ -74,8 +79,9 @@ are:
7479
- `all`: evaluate resource groups and all resource types
7580
- `indexed`: only evaluate resource types that support tags and location
7681

77-
For example, resource `Microsoft.Network/routeTables` supports tags and location and would be evaluated in both modes.
78-
However, resource `Microsoft.Network/routeTables/routes` cannot be tagged, and would not be evaluated in `Indexed` mode.
82+
For example, resource `Microsoft.Network/routeTables` supports tags and location and is evaluated in
83+
both modes. However, resource `Microsoft.Network/routeTables/routes` can't be tagged isn't evaluated
84+
in `Indexed` mode.
7985

8086
We recommend that you set **mode** to `all` in most cases. All policy definitions created through
8187
the portal use the `all` mode. If you use PowerShell or Azure CLI, you can specify the **mode**
@@ -312,9 +318,9 @@ are case-insensitive. Case-insensitive alternatives are available in **matchInse
312318
**notMatchInsensitively**. For examples, see
313319
[Allow several name patterns](../samples/allow-multiple-name-patterns.md).
314320

315-
In an **\[\*\] alias** array field value, every element in the
316-
array is evaluated individually, with logical AND between elements. For more information, see
317-
[Evaluating the \[\*\] alias](../how-to/author-policies-for-arrays.md#evaluating-the--alias).
321+
In an **\[\*\] alias** array field value, each element in the array is evaluated individually with
322+
logical **and** between elements. For more information, see [Evaluating the \[\*\]
323+
alias](../how-to/author-policies-for-arrays.md#evaluating-the--alias).
318324

319325
### Fields
320326

articles/governance/policy/how-to/author-policies-for-arrays.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -163,9 +163,9 @@ expression. To resolve this error message, change `equals` to either `in` or `no
163163

164164
Aliases that have **\[\*\]** attached to their name indicate the **type** is an _array_. Instead of
165165
evaluating the value of the entire array, **\[\*\]** makes it possible to evaluate each element of
166-
the array individually, with logical AND between them. There are three standard scenarios this per
167-
item evaluation is useful in: _None_, _Any_, or _All_ elements match.
168-
For complex scenarios, use [count](../concepts/definition-structure.md#count).
166+
the array individually, with logical AND between them. There are three standard scenarios this per
167+
item evaluation is useful in: _None_, _Any_, or _All_ elements match. For complex scenarios, use
168+
[count](../concepts/definition-structure.md#count).
169169

170170
The policy engine triggers the **effect** in **then** only when the **if** rule evaluates as true.
171171
This fact is important to understand in context of the way **\[\*\]** evaluates each individual

0 commit comments

Comments
 (0)