Skip to content

Commit 63b1469

Browse files
Update how-to-use-azure-policy.md
Addressing PR review comments from content engineering team
1 parent ef29c96 commit 63b1469

File tree

1 file changed

+36
-22
lines changed

1 file changed

+36
-22
lines changed

articles/load-testing/how-to-use-azure-policy.md

Lines changed: 36 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -12,75 +12,89 @@ ms.topic: how-to
1212

1313
# Secure your Azure Load Testing resources with Azure Policy
1414

15-
[Azure Policy](../governance/policy/overview.md) is a governance tool that gives users the ability to audit and manage their Azure environment at scale. Azure Policy helps you place guardrails on Azure resources to ensure they are compliant with assigned policy rules. It allows users to perform audit, real-time enforcement, and remediation of their Azure environment. The results of audits that are performed by policy are available to users in a compliance dashboard. In the compliance dashboard, you can see a drill down of the resources and components that are compliant and noncompliant. For more information, see the [Overview of the Azure Policy service](../governance/policy/overview.md).
15+
[Azure Policy](../governance/policy/overview.md) is a governance tool that allows you to enforce organizational standards and to assess compliance at-scale. The policies allow you to perform audits, real-time enforcement, and remediation of your Azure environment. Audit results are available in your compliance dashboard. In the dashboard, you can review which resources and components are compliant and noncompliant, and take remediation actions. For more information, see the [Overview of the Azure Policy service](../governance/policy/overview.md).
1616

17-
Example Usage Scenarios:
17+
Use Azure policy to manage your load testing resources in scenarios like:
1818

19-
- Azure Load Testing service creates Azure resources like virtual machines, Network Security Group (NSG), Azure load balancer in your subscription to run a load test. You want to ensure that these resources get created only in a set of virtual networks in your subscription.
20-
- You want to ensure that load tests in Azure Load Testing can be created only in private test traffic mode.
21-
- You want to use customer-managed keys(CMK) to manage the encryption at rest for your Azure Load Testing resource.
19+
- **Private tests**
20+
- When you want to ensure that load tests in Azure Load Testing can be created only in private test traffic mode.
21+
- When you want to ensure that the resources like virtual machines, Network Security Group (NSG), Azure load balancer and public IP created by the Azure Load Testing service get created only in a set of virtual networks in your subscription.
22+
- **Customer-managed keys**
23+
- You want to use customer-managed keys(CMK) to manage the encryption at rest for your Azure Load Testing resource.
2224

2325
## Types of policy effects and guidance
2426

25-
When enforcing a policy, you can determine its effect over the resulting evaluation. Each policy definition allows you to choose one of multiple effects. Therefore, policy enforcement may behave differently depending on the type of operation you are evaluating. In general, the effects for policies that integrate with Azure Load Testing include:
27+
When enforcing a policy, you can determine its [effect](../governance/policy/policy-glossary.md#effect) over the resulting evaluation. Each policy definition allows you to choose one of multiple [effects](../governance/policy/concepts/effect-basics.md). Therefore, policy enforcement may behave differently depending on the type of operation you are evaluating. In general, the effects for policies that integrate with Azure Load Testing include:
2628

27-
- [**Audit**](../governance/policy/concepts/effects.md#audit): when the effect of a policy is set to `Audit`, the policy doesn't cause any breaking changes to your environment. It only alerts you to Azure Load Testing resources that don't comply with the policy definitions within a specified scope, by marking these components as noncompliant in the policy compliance dashboard. Audit is default if no policy effect is selected.
29+
- [**Audit**](../governance/policy/concepts/effects.md#audit): When the effect of a policy is set to `Audit`, the policy doesn't cause any breaking changes to your environment. The policy alerts you to Azure Load Testing resources that don't comply with the policy definitions within a specified scope. Components are marked as noncompliant in the policy compliance dashboard. The `Audit` value is default if no policy effect is selected.
2830

29-
- [**Deny**](../governance/policy/concepts/effects.md#deny): when the effect of a policy is set to `Deny`, the policy blocks the creation of a new resource or new test runs that don't comply with the policy definition. Existing noncompliant test runs are not affected. The 'audit' capabilities continue to operate.
31+
- [**Deny**](../governance/policy/concepts/effects.md#deny): When the effect of a policy is set to `Deny`, the policy blocks the creation of a new test run that doesn't comply with the policy definition. Existing noncompliant test runs and resources are not affected. The 'Audit' capabilities continue to operate.
3032

31-
- [**Disabled**](../governance/policy/concepts/effects.md#disabled): when the effect of a policy is set to `Disabled`, the policy gets evaluated but enforcement doesn't take effect, thus being compliant for the condition with `Disabled` effect. This effect is useful to disable the policy for a specific condition as opposed to all conditions.
33+
- [**Disabled**](../governance/policy/concepts/effects.md#disabled): When the effect of a policy is set to `Disabled`, the policy gets evaluated but enforcement doesn't take effect. This effect is useful to disable the policy for a specific condition as opposed to all conditions.
3234

33-
## Available Built-In Policy Definitions
35+
## Built-in policy definitions
3436

35-
Predetermined policies, referred to as 'built-ins', facilitate governance over your load testing resources so you don't have to write custom policies in JSON format to enforce commonly used rules associated with best security practices. Even though built-ins are predetermined, certain policies require you to define parameters. For example, by defining the effect of the policy, you can audit the load testing resource before enforcing a deny operation to prevent outages. See [built-in policies for Azure Load Testing](../governance/policy/samples/built-in-policies#azure-load-testing) to view the current built-in policies available for Azure Load Testing.
37+
Predetermined policies, referred to as 'built-ins', allow governance over your load testing resources so you don't have to write custom policies in JSON format to enforce commonly used rules associated with best security practices. Even though built-ins are predetermined, certain policies require you to define parameters. For example, by defining the effect of the policy, you can audit the load testing resource before enforcing a deny operation to prevent outages. See [built-in policies for Azure Load Testing](../governance/policy/samples/built-in-policies#azure-load-testing) to view the current built-in policies available for Azure Load Testing.
3638

37-
## Enabling and managing a load testing policy through the Azure portal
39+
## Enable and manage a load testing policy
3840

3941
### Select a Policy Definition
4042

4143
1. Log in to the Azure portal.
42-
1. Search "Policy" in the Search Bar and Select **Policy**.
44+
1.Search **Policy** in the search bar and select **Policy**.
4345

4446
![Screenshot that shows the Search Bar.](media/how-to-use-azure-policy/search-policy.png)
4547

46-
1. In the Policy window, select **Definitions**.
48+
1. In the **Policy** window, select **Definitions**.
4749

4850
![Screenshot that highlights the Definitions option.](media/how-to-use-azure-policy/select-definitions.png)
4951

50-
1. In the Category Filter, unselect **Select All** and select **Azure Load Testing**.
52+
1. In the *Category* filter, unselect **Select All** and select **Azure Load Testing**.
5153

5254
![Screenshot that shows the Category Filter and the selected Azure Load Testing category.](media/how-to-use-azure-policy/select-category.png)
5355

5456
1. Now you should be able to see all the policies available for Azure Load Testing. Make sure you read and understand the [policy guidance](#types-of-policy-effects-and-guidance) and select a policy you want to assign to a scope.
5557

5658
![Screenshot that shows the available policies.](media/how-to-use-azure-policy/search-policy.png)
5759

58-
### Assign a Policy to a Scope
60+
### Assign a policy to a scope
5961

60-
1. Select a policy you wish to apply. In this example, the **Load tests using Azure Load Testing should be run only against private endpoints from within a virtual network** policy is shown. Click the assign button in the top-left corner.
62+
1. Select a policy to apply. In this example, the **Load tests using Azure Load Testing should be run only against private endpoints from within a virtual network** policy is shown. Click the **Assign** button in the top-left corner.
6163

6264
![Screenshot that shows the Load tests using Azure Load Testing should be run only against private endpoints from within a virtual network policy.](media/how-to-use-azure-policy/select-policy.png)
6365

64-
1. Select the subscription where you want the policy to be applied. You can choose to restrict the scope to only a single resource group within a subscription. If you want to apply the policy to the entire subscription and exclude some resource groups, you can also configure an exclusion list. Set the policy enforcement selector to **Enabled** if you want the effect of the policy (audit or deny) to occur or **Disabled** to turn the effect (audit or deny) off.
66+
1. Select the subscription where you want the policy to be applied.
67+
68+
You can choose to restrict the scope to only a single resource group within a subscription.
69+
70+
If you want to apply the policy to the entire subscription and exclude some resource groups, you can also configure an exclusion list.
71+
72+
Set the policy enforcement selector to **Enabled** if you want the effect of the policy (audit or deny) to occur or **Disabled** to turn the effect (audit or deny) off.
6573

6674
![Screenshot that shows where you can choose to restrict the scope to only a single resource group within a subscription.](media/how-to-use-azure-policy/select-policy-scope.png)
6775

68-
1. To specify the policy effect, click on the parameters tab at the top of the screen. Uncheck 'Only show parameters that need input or review' option. Select **Audit** or **Deny** or **Disabled** for the effect of the policy following the [policy guidance](#types-of-policy-effects-and-guidance). Then select the review + create button.
76+
1. To specify the policy effect, select the parameters tab at the top of the screen.
77+
78+
1. Uncheck the *Only show parameters that need input or review* option.
79+
80+
1. Select **Audit** or **Deny** or **Disabled** for the effect of the policy following the [policy guidance](#types-of-policy-effects-and-guidance).
81+
82+
1. Select the **Review + create** button.
6983

7084
![Screenshot that shows the Parameters tab where you can specify the policy effect.](media/how-to-use-azure-policy/select-policy-effect.png)
7185

7286
## Feature Limitations
7387

74-
Assigning a policy with a "deny" effect may take up to 30 mins (average case) and 1 hour (worst case) to start denying the creation of non-compliant resources. The delay refers to following scenarios -
88+
Assigning a policy with a "deny" effect may take from 30 mins (on average) or up to one hour to start denying the creation of non-compliant resources. The delay refers to following scenarios:
7589
1. A new policy is assigned.
7690
2. An existing policy assignment is modified.
7791
3. A new Azure Load Testing resource is created in a scope with existing policies.
7892

79-
The policy evaluation of existing components in an Azure Load Testing resource may take up to 1 hour (average case) and 2 hours (worst case) before compliance results are viewable in the portal UI.
93+
The policy evaluation of existing components in an Azure Load Testing resource may take up to one hour (one averagee) or up to two hours before compliance results are viewable in the portal.
8094

8195
If the compliance results show up as "Not Started" it may be due to the following reasons:
8296

83-
- The policy evaluation is not completed. Initial evaluation latency can take up to 2 hours in the worst-case scenario.
97+
- The policy evaluation is not completed. Initial evaluation latency can take up to two hours.
8498
- There are no Azure Load Testing resources in the scope of the policy assignment.
8599

86100
## Next Steps

0 commit comments

Comments
 (0)