Skip to content

Commit 79636be

Browse files
authored
Merge pull request #294297 from MicrosoftDocs/main
2/7/2025 PM Publish
2 parents a332570 + 39ee3d3 commit 79636be

File tree

147 files changed

+1435
-1167
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

147 files changed

+1435
-1167
lines changed

.openpublishing.redirection.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,46 @@
3030
"redirect_url": "/previous-versions/azure/partner-solutions/logzio/troubleshoot",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path_from_root": "/articles/hdinsight-aks/index.yml",
35+
"redirect_url": "/previous-versions/azure/hdinsight-aks",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path_from_root": "/articles/hdinsight-aks/flink/index.md",
40+
"redirect_url": "/previous-versions/azure/hdinsight-aks/flink/flink-overview",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path_from_root": "/articles/hdinsight-aks/prerequisites-subscription.md",
45+
"redirect_url": "/previous-versions/azure/hdinsight-aks/quickstart-prerequisites-subscription",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path_from_root": "/articles/hdinsight-aks/release-notes/index.md",
50+
"redirect_url": "/previous-versions/azure/hdinsight-aks/release-notes/hdinsight-aks-release-notes",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path_from_root": "/articles/hdinsight-aks/prerequisites-resources.md",
55+
"redirect_url": "/previous-versions/azure/hdinsight-aks/quickstart-prerequisites-resources",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path_from_root": "/articles/hdinsight-aks/spark/index.md",
60+
"redirect_url": "/previous-versions/azure/hdinsight-aks/spark/hdinsight-on-aks-spark-overview",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path_from_root": "/articles/hdinsight-aks/get-started.md",
65+
"redirect_url": "/previous-versions/azure/hdinsight-aks/quickstart-get-started",
66+
"redirect_document_id": false
67+
},
68+
{
69+
"source_path_from_root": "/articles/hdinsight-aks/trino/index.md",
70+
"redirect_url": "/previous-versions/azure/hdinsight-aks/trino/trino-overview ",
71+
"redirect_document_id": false
72+
},
3373
{
3474
"source_path": "articles/hdinsight-aks/cluster-storage.md",
3575
"redirect_url": "/previous-versions/azure/hdinsight-aks/cluster-storage",

articles/app-service/configure-ssl-app-service-certificate.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -139,6 +139,13 @@ By default, App Service certificates have a one-year validity period. Before the
139139

140140
If you think your certificate's private key is compromised, you can rekey your certificate. This action rotates the certificate with a new certificate issued from the certificate authority.
141141

142+
> [!NOTE]
143+
> Starting September 23 2021, if you haven't verified the domain in the last 395 days, App Service certificates require domain verification during a renew, auto-renew, or rekey process. The new certificate order remains in "pending issuance" mode during the renew, auto-renew, or rekey process until you complete the domain verification.
144+
>
145+
> Unlike the free App Service managed certificate, purchased App Service certificates don't have automated domain re-verification. Failure to verify domain ownership results in failed renewals. For more information about how to verify your App Service certificate, review [Confirm domain ownership](#confirm-domain-ownership).
146+
>
147+
> The rekey process requires that the service principal for App Service has the required permissions on your key vault. These permissions are set up for you when you import an App Service certificate through the Azure portal. Make sure that you don't remove these permissions from your key vault.
148+
142149
1. On the [App Service Certificates page](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.CertificateRegistration%2FcertificateOrders), select the certificate. From the left menu, select **Rekey and Sync**.
143150

144151
1. To start the process, select **Rekey**. This process can take 1-10 minutes to complete.

articles/azure-resource-manager/management/lock-resources.md

Lines changed: 38 additions & 36 deletions
Large diffs are not rendered by default.

articles/azure-resource-manager/management/overview.md

Lines changed: 50 additions & 51 deletions
Large diffs are not rendered by default.

articles/azure-resource-manager/management/resource-name-rules.md

Lines changed: 350 additions & 351 deletions
Large diffs are not rendered by default.

articles/azure-resource-manager/management/resource-providers-and-types.md

Lines changed: 46 additions & 47 deletions
Large diffs are not rendered by default.
Lines changed: 37 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -1,36 +1,29 @@
11
---
2-
title: Tag resources, resource groups, and subscriptions for logical organization
3-
description: Describes the conditions and limitations for using tags with Azure resources.
2+
title: Use tags to organize your Azure resources and management hierarchy
3+
description: Understand how to tag Azure resources, resource groups, and subscriptions for logical organization. Learn about the conditions and limitations of using tags with Azure resources.
44
ms.topic: conceptual
5-
ms.date: 01/22/2025
5+
ms.date: 02/06/2025
66
---
77

88
# Use tags to organize your Azure resources and management hierarchy
99

10-
Tags are metadata elements that you apply to your Azure resources. They're key-value pairs that help you identify resources based on settings that are relevant to your organization. If you want to track the deployment environment for your resources, add a key named `Environment`. To identify the resources deployed to production, give them a value of `Production`. The full key-value pair is `Environment = Production`.
10+
Tags are metadata elements that you apply to your Azure resources. They are key-value pairs that help you identify resources based on settings that are relevant to your organization. If you want to track the deployment environment for your resources, add a key named `Environment`. To identify the resources deployed to production, give them a value of `Production`. The full key-value pair is `Environment = Production`.
1111

12-
This article describes the conditions and limitations for using tags. For steps on how to work with tags, see:
13-
14-
* [Portal](tag-resources-portal.md)
15-
* [Azure CLI](tag-resources-cli.md)
16-
* [Azure PowerShell](tag-resources-powershell.md)
17-
* [Python](tag-resources-python.md)
18-
* [ARM templates](tag-resources-templates.md)
19-
* [Bicep](tag-resources-bicep.md)
12+
This article describes the conditions and limitations for using tags.
2013

2114
## Tag usage and recommendations
2215

23-
You can apply tags to your Azure resources, resource groups, and subscriptions, but not to management groups.
16+
You can apply tags to your Azure resources, resource groups, and subscriptions but not to management groups.
2417

2518
For recommendations on how to implement a tagging strategy, see [Resource naming and tagging decision guide](/azure/cloud-adoption-framework/decision-guides/resource-tagging/?toc=/azure/azure-resource-manager/management/toc.json).
2619

2720
Resource tags support all cost-accruing services. To ensure that cost-accruing services are provisioned with a tag, use one of the [tag policies](tag-policies.md).
2821

2922
> [!WARNING]
30-
> Tags are stored as plain text. Never add sensitive values to tags. Sensitive values could be exposed through many methods, including cost reports, commands that return existing tag definitions, deployment histories, exported templates, and monitoring logs.
23+
> Tags are stored as plain text. Do not add sensitive values to tags. Sensitive values could be exposed through many methods, including cost reports, commands that return existing tag definitions, deployment histories, exported templates, and monitoring logs.
3124
3225
> [!WARNING]
33-
> Be careful when using non-English language in your tags. It can cause decoding progress failure while loading your VM's metadata from IMDS (Instance Metadata Service).
26+
> Be careful when using non-English language in your tags. It can cause decoding progress failure while loading your virtual machine's metadata from IMDS (Instance Metadata Service).
3427
3528
> [!IMPORTANT]
3629
> Tag names are case-insensitive for operations. An operation updates or retrieves a tag with a tag name, regardless of the casing. However, the resource provider might keep the casing you provide for the tag name. You see that casing in cost reports.
@@ -41,66 +34,70 @@ Resource tags support all cost-accruing services. To ensure that cost-accruing s
4134

4235
## Required access
4336

44-
There are two ways to get the required access to tag resources.
37+
There are two ways to get the required access to tag resources:
4538

46-
* You can have write access to the `Microsoft.Resources/tags` resource type. This access lets you tag any resource, even if you don't have access to the resource itself. The [Tag Contributor](../../role-based-access-control/built-in-roles.md#tag-contributor) role grants this access. The tag contributor role, for example, can't apply tags to resources or resource groups through the portal. It can, however, apply tags to subscriptions through the portal. It supports all tag operations through Azure PowerShell and REST API.
39+
- You can have write access to the `Microsoft.Resources/tags` resource type. This access lets you tag any resource, even if you don't have access to the resource itself. The [Tag Contributor](../../role-based-access-control/built-in-roles.md#tag-contributor) role grants this access. For example, this role can't apply tags to resources or resource groups through the Azure portal. However, it can apply tags to subscriptions through the Azure portal. It supports all tag operations through Azure PowerShell and REST API.
4740

48-
* You can have write access to the resource itself. The [Contributor](../../role-based-access-control/built-in-roles.md#contributor) role grants the required access to apply tags to any entity. To apply tags to only one resource type, use the contributor role for that resource. To apply tags to virtual machines, for example, use the [Virtual Machine Contributor](../../role-based-access-control/built-in-roles.md#virtual-machine-contributor).
41+
- You can have write access to the resource itself. The [Contributor](../../role-based-access-control/built-in-roles.md#contributor) role grants the required access to apply tags to any entity. To apply tags to only one resource type, use the Contributor role for that resource. To apply tags to virtual machines, use the [Virtual Machine Contributor](../../role-based-access-control/built-in-roles.md#virtual-machine-contributor) role.
4942

5043
## Inherit tags
5144

52-
Resources don't inherit the tags you apply to a resource group or a subscription. To apply tags from a subscription or resource group to the resources, see [Azure Policies - tags](tag-policies.md).
45+
Resources don't inherit the tags you apply to a resource group or a subscription. To apply tags from a subscription or resource group to the resources, see [Assign policy definitions for tag compliance](tag-policies.md).
5346

54-
You can group costs for an Azure resource by using the **cm-resource-parent** tag. This tag lets you review tagged costs in Microsoft Cost Management without having to use filters. The key for this tag is `cm-resource-parent` and its value is the resource ID of the Azure resource you want to group costs by. For example, to group costs by an Azure Virtual Desktop host pool, provide the resource ID of the host pool. For more information, see [Group related resources in the cost analysis](../../cost-management-billing/costs/group-filter.md#group-related-resources-in-the-resources-view).
47+
You can group costs for an Azure resource by using the **cm-resource-parent** tag. This tag lets you review tagged costs in Microsoft Cost Management without having to use filters. The key for this tag is `cm-resource-parent` and its value is the resource ID of the Azure resource you want to group costs by. For example, to group costs by an Azure Virtual Desktop host pool, provide the resource ID of the host pool. For more information, see [Group related resources in the Resources view](../../cost-management-billing/costs/group-filter.md#group-related-resources-in-the-resources-view).
5548

5649
## Tags and billing
5750

58-
Use tags to group your billing data. For example, if you're running multiple VMs for different organizations, use the tags to group usage by cost center. You can also use tags to categorize costs by runtime environment, such as the billing usage for VMs running in the production environment.
51+
Use tags to group your billing data. For example, if you're running multiple virtual machines for different organizations, use the tags to group usage by cost center. You can also use tags to categorize costs by runtime environment, including the billing usage for virtual machines running in the production environment.
5952

60-
To retrieve information about tags, download the usage file from the Azure portal. For more information, see [Download or view your Azure billing invoice and daily usage data](../../cost-management-billing/manage/download-azure-invoice-daily-usage-date.md). For services that support tags with billing, the tags appear in the **Tags** column.
53+
To retrieve information about tags, download the usage file from the Azure portal. For more information, see [Download or view your Azure billing invoice](../../cost-management-billing/manage/download-azure-invoice-daily-usage-date.md). For services that support tags with billing, the tags appear in the **Tags** column.
6154

62-
For REST API operations, see [Azure Billing REST API Reference](/rest/api/billing/).
55+
For REST API operations, see the [Azure Billing REST API](/rest/api/billing/) overview.
6356

6457
## Unique tags pagination
6558

66-
When you call the [Unique Tags API](/rest/api/resources/tags/list), there's a limit to the size of each API response page. A tag that has a large set of unique values requires the API to fetch the next page to retrieve the remaining set of values. When the results are divided over multiple pages, the API response shows the tag key again to indicate that the values are still under this key.
59+
When you call the [Unique tags API](/rest/api/resources/tags/list), there's a limit to the size of each API response page. A tag that has a large set of unique values requires the API to fetch the next page to retrieve the remaining set of values. When the results are divided over multiple pages, the API response shows the tag key again to indicate that the values are still under this key.
6760

68-
This behavior can result in some tools, like the Azure portal, showing the tag key twice.
61+
This behavior can cause some tools like the Azure portal to show the tag key twice.
6962

7063
## Limitations
7164

7265
The following limitations apply to tags:
7366

7467
* Not all resource types support tags. To determine if you can apply a tag to a resource type, see [Tag support for Azure resources](tag-support.md).
75-
* Each resource type might have specific requirements when working with tags. For example, you can only update tags on virtual machine (VM) extensions when the VM is running. If you receive an error message while trying to update a tag, follow the instructions in the message.
68+
69+
* Each resource type might have specific requirements when working with tags. For example, you can only update tags on virtual machine extensions when the virtual machine is running. If you receive an error message while trying to update a tag, follow the instructions in the message.
70+
7671
* Each resource, resource group, and subscription can have a maximum of 50 tag name-value pairs. If you need to apply more tags than the maximum allowed number, use a JSON string for the tag value. The JSON string can contain many of the values that you apply to a single tag name. A resource group or subscription can contain many resources that each have 50 tag name-value pairs.
72+
7773
* The tag name has a limit of 512 characters and the tag value has a limit of 256 characters. For storage accounts, the tag name has a limit of 128 characters and the tag value has a limit of 256 characters.
74+
7875
* Classic resources such as Cloud Services don't support tags.
79-
* Azure IP Groups and Azure Firewall Policies don't support PATCH operations. PATCH API method operations, therefore, can't update tags through the portal. Instead, use the update commands for those resources. For example, you can update tags for an IP group with the [az network ip-group update](/cli/azure/network/ip-group#az-network-ip-group-update) command.
76+
77+
* Azure IP Groups and Azure Firewall policies don't support PATCH operations. Therefore, PATCH API method operations can't update tags through the Azure portal. Instead, use the update commands for those resources. For example, you can update tags for an IP group with the [`az network ip-group update`](/cli/azure/network/ip-group?view=azure-cli-latest) command.
78+
8079
* Tag names can't contain these characters: `<`, `>`, `%`, `&`, `\`, `?`, `/`
8180

8281
> [!NOTE]
83-
> * Azure Domain Name System (DNS) zones don't support the use of spaces or parentheses in the tag or a tag that starts with a number. Azure DNS tag names don't support special and Unicode characters. The value can contain all characters.
82+
> * Azure DNS zones don't support the use of spaces or parentheses in the tag or a tag that starts with a number. Azure DNS tag names don't support special and Unicode characters. The value can contain all characters.
8483
>
8584
> * Traffic Manager doesn't support the use of spaces, `#`, or `:` in the tag name. The tag name can't start with a number.
8685
>
8786
> * Azure Front Door doesn't support the use of `#` or `:` in the tag name.
8887
>
8988
> * The following Azure resources only support 15 tags:
9089
> * Azure Automation
91-
> * Azure Content Delivery Network (CDN)
90+
> * Azure Content Delivery Network
9291
> * Azure DNS (Zone and A records)
93-
> * Azure Log Analytics Saved Search
92+
> * Azure Log Analytics saved search
9493
9594
## Next steps
9695

97-
* Not all resource types support tags. To determine if you can apply a tag to a resource type, see [Tag support for Azure resources](tag-support.md).
98-
* For recommendations on how to implement a tagging strategy, see [Resource naming and tagging decision guide](/azure/cloud-adoption-framework/decision-guides/resource-tagging/?toc=/azure/azure-resource-manager/management/toc.json).
99-
* For steps on how to work with tags, see:
100-
101-
* [Portal](tag-resources-portal.md)
102-
* [Azure CLI](tag-resources-cli.md)
103-
* [Azure PowerShell](tag-resources-powershell.md)
104-
* [Python](tag-resources-python.md)
105-
* [ARM templates](tag-resources-templates.md)
106-
* [Bicep](tag-resources-bicep.md)
96+
For more information on how to work with tags, see:
97+
98+
* [Azure portal](tag-resources-portal.md)
99+
* [Azure CLI](tag-resources-cli.md)
100+
* [Azure PowerShell](tag-resources-powershell.md)
101+
* [Python](tag-resources-python.md)
102+
* [ARM templates](tag-resources-templates.md)
103+
* [Bicep](tag-resources-bicep.md)

0 commit comments

Comments
 (0)