You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/governance/policy/concepts/effects.md
+30-4Lines changed: 30 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,7 @@ resource, an updated resource, or an existing resource.
15
15
16
16
These effects are currently supported in a policy definition:
17
17
18
+
-[AddToNetworkGroup](#addtonetworkgroup)
18
19
-[Append](#append)
19
20
-[Audit](#audit)
20
21
-[AuditIfNotExists](#auditifnotexists)
@@ -24,6 +25,7 @@ These effects are currently supported in a policy definition:
24
25
-[Disabled](#disabled)
25
26
-[Manual](#manual)
26
27
-[Modify](#modify)
28
+
-[Mutate](#mutate-preview)
27
29
28
30
## Interchanging effects
29
31
@@ -48,7 +50,7 @@ manages the evaluation and outcome and reports the results back to Azure Policy.
48
50
49
51
-**Disabled** is checked first to determine whether the policy rule should be evaluated.
50
52
-**Append** and **Modify** are then evaluated. Since either could alter the request, a change made
51
-
may prevent an audit or deny effect from triggering. These effects are only available with a
53
+
might prevent an audit or deny effect from triggering. These effects are only available with a
52
54
Resource Manager mode.
53
55
-**Deny** is then evaluated. By evaluating deny before audit, double logging of an undesired
54
56
resource is prevented.
@@ -64,6 +66,14 @@ logging or action is required.
64
66
`PATCH` requests that only modify `tags` related fields restricts policy evaluation to
65
67
policies containing conditions that inspect `tags` related fields.
66
68
69
+
## AddToNetworkGroup
70
+
71
+
AddToNetworkGroup is used in Azure Virtual Network Manager to define dynamic network group membership. This effect is specific to _Microsoft.Network.Data_[policy mode](./definition-structure.md#resource-provider-modes) definitions only.
72
+
73
+
With network groups, your policy definition includes your conditional expression for matching virtual networks meeting your criteria, and specifies the destination network group where any matching resources are placed. The addToNetworkGroup effect is used to place resources in the destination network group.
74
+
75
+
To learn more, go to [Configuring Azure Policy with network groups in Azure Virtual Network Manager](../../../virtual-network-manager/concept-azure-policy-integration.md).
76
+
67
77
## Append
68
78
69
79
Append is used to add more fields to the requested resource during creation or update. A
@@ -312,7 +322,7 @@ related resources to match.
312
322
complete, regardless of outcome. If provisioning takes longer than 6 hours, it's treated as a
313
323
failure when determining _AfterProvisioning_ evaluation delays.
314
324
- Default is `PT10M` (10 minutes).
315
-
- Specifying a long evaluation delay may cause the recorded compliance state of the resource to
325
+
- Specifying a long evaluation delay might cause the recorded compliance state of the resource to
@@ -991,10 +1001,26 @@ is applied only when evaluating requests with API version greater or equals to `
991
1001
}
992
1002
}
993
1003
```
1004
+
## Mutate (preview)
1005
+
1006
+
Mutation is used in Azure Policy for Kubernetes to remediate AKS cluster components, like pods. This effect is specific to _Microsoft.Kubernetes.Data_[policy mode](./definition-structure.md#resource-provider-modes) definitions only.
1007
+
1008
+
To learn more, go to [Understand Azure Policy for Kubernetes clusters](./policy-for-kubernetes.md).
1009
+
1010
+
### Mutate properties
1011
+
-**mutationInfo** (optional)
1012
+
- Can't be used with `constraint`, `constraintTemplate`, `apiGroups`, or `kinds`.
1013
+
- Cannot be parameterized.
1014
+
-**sourceType** (required)
1015
+
- Defines the type of source for the constraint. Allowed values: _PublicURL_ or _Base64Encoded_.
1016
+
- If _PublicURL_, paired with property `url` to provide location of the mutation template. The location must be publicly accessible.
1017
+
> [!WARNING]
1018
+
> Don't use SAS URIs or tokens in `url` or anything else that could expose a secret.
1019
+
994
1020
995
1021
## Layering policy definitions
996
1022
997
-
A resource may be affected by several assignments. These assignments may be at the same scope or at
1023
+
A resource can be affected by several assignments. These assignments might be at the same scope or at
998
1024
different scopes. Each of these assignments is also likely to have a different effect defined. The
999
1025
condition and effect for each policy is independently evaluated. For example:
0 commit comments