You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-policy/policy-effects.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -279,9 +279,9 @@ related resources to match and the template deployment to execute.
279
279
- For _Subscription_, queries the entire subscription for the related resource.
280
280
- Default is _ResourceGroup_.
281
281
-**ExistenceCondition** (optional)
282
-
- If not specified, any related resource of **type** satisfies the effect and does not trigger the audit.
282
+
- If not specified, any related resource of **type** satisfies the effect and does not trigger the deployment.
283
283
- Uses the same language as the policy rule for the **if** condition, but is evaluated against each related resource individually.
284
-
- If any matching related resource evaluates to true, the effect is satisfied and does not trigger the audit.
284
+
- If any matching related resource evaluates to true, the effect is satisfied and does not trigger the deployment.
285
285
- Can use [field()] to check equivalence with values in the **if** condition.
286
286
- As an example, this could be used to validate that the parent resource (in the **if** condition) is in the same resource location as the matching related resource.
287
287
-**Deployment**[required]
@@ -347,4 +347,4 @@ not, then a deployment to enable it is executed.
347
347
348
348
Now that you have a deeper understanding of policy definition effects, review the policy samples:
349
349
350
-
- Review more examples at [Azure Policy samples](json-samples.md).
350
+
- Review more examples at [Azure Policy samples](json-samples.md).
0 commit comments