|
2 | 2 | title: Protect your Azure resources with a lock
|
3 | 3 | description: You can safeguard Azure resources from updates or deletions by locking all users and roles.
|
4 | 4 | ms.topic: conceptual
|
5 |
| -ms.date: 01/02/2024 |
| 5 | +ms.date: 03/08/2024 |
6 | 6 | ms.custom: devx-track-azurecli, devx-track-azurepowershell
|
7 | 7 | content_well_notification:
|
8 | 8 | - AI-contribution
|
@@ -90,19 +90,19 @@ Applying locks can lead to unexpected results. Some operations, which don't seem
|
90 | 90 |
|
91 | 91 | - A read-only lock on a **Log Analytics workspace** prevents **User and Entity Behavior Analytics (UEBA)** from being enabled.
|
92 | 92 |
|
93 |
| -- A cannot-delete lock on a **Log Analytics workspace** doesn't prevent [data purge operations](../../azure-monitor/logs/personal-data-mgmt.md#delete), remove the [data purge](../../role-based-access-control/built-in-roles.md#data-purger) role from the user instead. |
| 93 | +- A cannot-delete lock on a **Log Analytics workspace** doesn't prevent [data purge operations](../../azure-monitor/logs/personal-data-mgmt.md#delete). Instead, remove the [data purge](../../role-based-access-control/built-in-roles.md#data-purger) role from the user. |
94 | 94 |
|
95 | 95 | - A read-only lock on a **subscription** prevents **Azure Advisor** from working correctly. Advisor is unable to store the results of its queries.
|
96 | 96 |
|
97 | 97 | - A read-only lock on an **Application Gateway** prevents you from getting the backend health of the application gateway. That [operation uses a POST method](/rest/api/application-gateway/application-gateways/backend-health), which a read-only lock blocks.
|
98 | 98 |
|
99 | 99 | - A read-only lock on an Azure Kubernetes Service (AKS) cluster limits how you can access cluster resources through the portal. A read-only lock prevents you from using the AKS cluster's Kubernetes resources section in the Azure portal to choose a cluster resource. These operations require a POST method request for authentication.
|
100 | 100 |
|
101 |
| -- A cannot-delete lock on a **Virtual Machine** that is protected by **Site Recovery** prevents certain resource links related to Site Recovery from being removed properly when you remove the protection or disable replication. If you plan to protect the VM again later, you need to remove the lock prior to disabling protection. If you don't remove the lock, you need to follow certain steps to clean up the stale links before you can protect the VM. For more information, see [Troubleshoot Azure VM replication](../../site-recovery/azure-to-azure-troubleshoot-errors.md#replication-not-enabled-on-vm-with-stale-resources-error-code-150226). |
| 101 | +- A cannot-delete lock on a **Virtual Machine** that is protected by **Site Recovery** prevents certain resource links related to Site Recovery from being removed properly when you remove the protection or disable replication. If you plan to protect the VM again later, you need to remove the lock before disabling protection. If you don't remove the lock, you need to follow certain steps to clean up the stale links before you can protect the VM. For more information, see [Troubleshoot Azure VM replication](../../site-recovery/azure-to-azure-troubleshoot-errors.md#replication-not-enabled-on-vm-with-stale-resources-error-code-150226). |
102 | 102 |
|
103 | 103 | ## Who can create or delete locks
|
104 | 104 |
|
105 |
| -To create or delete management locks, you need access to `Microsoft.Authorization/*` or `Microsoft.Authorization/locks/*` actions. Only the **Owner** and the **User Access Administrator** built-in roles can create and delete management locks. You can create a custom role with the required permissions. |
| 105 | +To create or delete management locks, you need access to `Microsoft.Authorization/*` or `Microsoft.Authorization/locks/*` actions. Users assigned to the **Owner** and the **User Access Administrator** roles have the required access. Some specialized built-in roles also grant this access. You can create a custom role with the required permissions. |
106 | 106 |
|
107 | 107 | ## Managed applications and locks
|
108 | 108 |
|
@@ -136,7 +136,7 @@ In the left navigation panel, the subscription lock feature's name is **Resource
|
136 | 136 |
|
137 | 137 | When using an ARM template or Bicep file to deploy a lock, it's good to understand how the deployment scope and the lock scope work together. To apply a lock at the deployment scope, such as locking a resource group or a subscription, leave the scope property unset. When locking a resource, within the deployment scope, set the scope property on the lock.
|
138 | 138 |
|
139 |
| -The following template applies a lock to the resource group it's deployed to. Notice there isn't a scope property on the lock resource because the lock scope matches the deployment scope. Deploy this template at the resource group level. |
| 139 | +The following template applies a lock to the resource group. Notice there isn't a scope property on the lock resource because the lock scope matches the deployment scope. Deploy this template at the resource group level. |
140 | 140 |
|
141 | 141 | # [JSON](#tab/json)
|
142 | 142 |
|
|
0 commit comments