Skip to content

Commit 8968374

Browse files
committed
Addresses error
1 parent e68f2d0 commit 8968374

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

articles/governance/policy/concepts/effects.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ These effects are currently supported in a policy definition:
1818
- [Audit](#audit)
1919
- [AuditIfNotExists](#auditifnotexists)
2020
- [Deny](#deny)
21-
- [DenyAction (preview)](#denyAction-preview)
21+
- [DenyAction (preview)](#denyaction-preview)
2222
- [DeployIfNotExists](#deployifnotexists)
2323
- [Disabled](#disabled)
2424
- [Manual (preview)](#manual-preview)
@@ -475,7 +475,7 @@ Policy will evaluate resources that support location and tags against `DenyActio
475475
**Cascade Deletion**
476476
Cascade Deletion ocurs when deleting of a parent resources is implicately deletes all its child resources. Policy will not block removal of child resources when an deletion action targets the parent resources. For example, `Microsoft.Insights/diagnosticSettings` is a child resource of `Microsoft.Storage/storageaccounts`. If a `denyAction` policy targets `Microsoft.Insights/diagnosticSettings`, a delete call to the diagnostic setting (child) will fail, but a delete to the storage account (parent) will implictely delete the diagnostic setting (child).
477477

478-
[!INCLUDE [policy-denyAction](../../../includes/azure-policy-denyAction.md)]
478+
[!INCLUDE [policy-denyAction](../../../../includes/azure-policy-denyAction.md)]
479479

480480
### DenyAction properties
481481

articles/governance/policy/concepts/evaluate-impact.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ reviews the request. When the policy definition effect is [Modify](./effects.md#
1212
[Append](./effects.md#deny), or [DeployIfNotExists](./effects.md#deployifnotexists), Policy alters
1313
the request or adds to it. When the policy definition effect is [Audit](./effects.md#audit) or
1414
[AuditIfNotExists](./effects.md#auditifnotexists), Policy causes an Activity log entry to be created
15-
for new and updated resources. And when the policy definition effect is [Deny](./effects.md#deny) or [DenyAction](./effects.md#denyAction), Policy stops the creation or alteration of the request.
15+
for new and updated resources. And when the policy definition effect is [Deny](./effects.md#deny) or [DenyAction](./effects.md#denyaction-preview), Policy stops the creation or alteration of the request.
1616

1717
These outcomes are exactly as desired when you know the policy is defined correctly. However, it's
1818
important to validate a new policy works as intended before allowing it to change or block work. The

0 commit comments

Comments
 (0)