Skip to content

Commit 7277a9d

Browse files
authored
Merge pull request #194841 from timwarner-msft/timwarner-vscpolicy
Correct minor brand and language issues
2 parents d589f2b + d0cec37 commit 7277a9d

File tree

1 file changed

+17
-16
lines changed

1 file changed

+17
-16
lines changed

articles/governance/policy/how-to/extension-for-vscode.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,20 @@
11
---
22
title: Azure Policy extension for Visual Studio Code
33
description: Learn how to use the Azure Policy extension for Visual Studio Code to look up Azure Resource Manager aliases.
4-
ms.date: 09/01/2021
4+
ms.date: 04/12/2022
55
ms.topic: how-to
6+
ms.custom: timwarner
67
---
78
# Use Azure Policy extension for Visual Studio Code
89

910
> Applies to Azure Policy extension version **0.1.2** and newer
1011
11-
Learn how to use the Azure Policy extension for Visual Studio Code to look up
12+
Learn how to use the Azure Policy extension for Visual Studio Code (VS Code) to look up
1213
[aliases](../concepts/definition-structure.md#aliases), review resources and policy definitions,
1314
export objects, and evaluate policy definitions. First, we'll describe how to install the Azure
1415
Policy extension in Visual Studio Code. Then we'll walk through how to look up aliases.
1516

16-
The Azure Policy extension for Visual Studio Code can be installed on Linux, Mac, and Windows.
17+
The Azure Policy extension for Visual Studio Code can be installed on Linux, macOS, and Windows.
1718

1819
## Prerequisites
1920

@@ -25,7 +26,7 @@ The following items are required for completing the steps in this article:
2526

2627
## Install and configure the Azure Policy extension
2728

28-
After you meet the prerequisites, you can install Azure Policy extension for Visual Studio Code by
29+
After you meet the prerequisites, you can install the [Azure Policy extension for Visual Studio Code](https://marketplace.visualstudio.com/items?itemName=AzurePolicy.azurepolicyextension) by
2930
following these steps:
3031

3132
1. Open Visual Studio Code.
@@ -36,7 +37,7 @@ following these steps:
3637

3738
For a national cloud user, follow these steps to set the Azure environment first:
3839

39-
1. Select **File\Preferences\Settings**.
40+
1. Select **File** > **Preferences** > **Settings**.
4041
1. Search on the following string: _Azure: Cloud_
4142
1. Select the nation cloud from the list:
4243

@@ -78,7 +79,7 @@ definitions, follow these steps:
7879

7980
1. Start the subscription command from the Command Palette or the window footer.
8081

81-
- Command Palette:
82+
- Command Palette
8283

8384
From the menu bar, go to **View** > **Command Palette**, and enter **Azure: Select
8485
Subscriptions**.
@@ -95,7 +96,7 @@ definitions, follow these steps:
9596
### Search for and view resources
9697

9798
The Azure Policy extension lists resources in the selected subscriptions by Resource Provider and by
98-
resource group in the **Resources** pane. The treeview includes the following groupings of resources
99+
resource group in the **Resources** pane. The tree view includes the following groupings of resources
99100
within the selected subscription or at the subscription level:
100101

101102
- **Resource Providers**
@@ -119,7 +120,7 @@ resource with the following steps:
119120
From the Azure Policy extension, hover over the **Resources** panel and select the ellipsis,
120121
then select **Search Resources**.
121122

122-
- Command Palette:
123+
- Command Palette
123124

124125
From the menu bar, go to **View** > **Command Palette**, and enter **Azure Policy: Search
125126
Resources**.
@@ -136,7 +137,7 @@ resource with the following steps:
136137
### Discover aliases for resource properties
137138

138139
When a resource is selected, whether through the search interface or by selecting it in the
139-
treeview, the Azure Policy extension opens the JSON file representing that resource and all its
140+
tree view, the Azure Policy extension opens the JavaScript Object Notation (JSON) file representing that resource and all its
140141
Azure Resource Manager property values.
141142

142143
Once a resource is open, hovering over the Resource Manager property name or value displays the
@@ -153,7 +154,7 @@ matching aliases.
153154
154155
### Search for and view policy definitions and assignments
155156

156-
The Azure Policy extension lists policy types and policy assignments as a treeview for the
157+
The Azure Policy extension lists policy types and policy assignments as a tree view for the
157158
subscriptions selected to be displayed in the **Policies** pane. Customers with hundreds or
158159
thousands of policy definitions or assignments in a single subscription may prefer a searchable way
159160
to locate their policy definitions or assignments. The Azure Policy extension makes it possible to
@@ -166,7 +167,7 @@ search for a specific policy or assignment with the following steps:
166167
From the Azure Policy extension, hover over the **Policies** panel and select the ellipsis,
167168
then select **Search Policies**.
168169

169-
- Command Palette:
170+
- Command Palette
170171

171172
From the menu bar, go to **View** > **Command Palette**, and enter **Azure Policy: Search
172173
Policies**.
@@ -181,7 +182,7 @@ search for a specific policy or assignment with the following steps:
181182
policy definition or policy assignment.
182183

183184
When selecting a policy or assignment, whether through the search interface or by selecting it in
184-
the treeview, the Azure Policy extension opens the JSON that represents the policy or assignment and
185+
the tree view, the Azure Policy extension opens the JSON that represents the policy or assignment and
185186
all its Resource Manager property values. The extension can validate the opened Azure Policy JSON
186187
schema.
187188

@@ -254,7 +255,7 @@ example:
254255

255256
The VS Code extension can create a policy definition from an existing
256257
[Open Policy Agent](https://www.openpolicyagent.org/) (OPA) GateKeeper v3
257-
[constraint template](https://open-policy-agent.github.io/gatekeeper/website/docs/howto/#constraint-templates). The YAML
258+
[constraint template](https://open-policy-agent.github.io/gatekeeper/website/docs/howto/#constraint-templates). The YAML Ain't Markup Language (YAML)
258259
file must be open in VS Code for the Command Palette to be an option.
259260

260261
1. Open a valid OPA GateKeeper v3 constraint template YAML file.
@@ -278,8 +279,8 @@ From the menu bar, go to **View** > **Command Palette**, and then enter **Azure:
278279
## Next steps
279280

280281
- Review examples at [Azure Policy samples](../samples/index.md).
281-
- Review the [Azure Policy definition structure](../concepts/definition-structure.md).
282-
- Review [Understanding policy effects](../concepts/effects.md).
282+
- Study the [Azure Policy definition structure](../concepts/definition-structure.md).
283+
- Read [Understanding policy effects](../concepts/effects.md).
283284
- Understand how to [programmatically create policy definitions](programmatically-create.md).
284285
- Learn how to [remediate non-compliant resources](remediate-resources.md).
285-
- Review what a management group is with [Organize your resources with Azure management groups](../../management-groups/overview.md).
286+
- Grasp what a management group is with [Organize your resources with Azure management groups](../../management-groups/overview.md).

0 commit comments

Comments
 (0)