You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If there are any existing resources that aren't compliant with this new assignment, they appear
81
81
under **Non-compliant resources**.
@@ -93,7 +93,7 @@ To remove the assignment created, follow these steps:
93
93
1. Right-click the **Audit VMs that do not use managed disks** policy assignment and select **Delete
94
94
assignment**.
95
95
96
-

96
+
:::image type="content" source="./media/assign-policy-template/delete-assignment.png" alt-text="Delete an assignment from the compliance overview page" border="false":::
Copy file name to clipboardExpand all lines: articles/governance/policy/concepts/rego-for-aks.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,11 +42,11 @@ preview, follow these steps in either the Azure portal or with Azure CLI:
42
42
1. Launch the Azure Policy service in the Azure portal by clicking **All services**, then
43
43
searching for and selecting **Policy**.
44
44
45
-

45
+
:::image type="content" source="../media/rego-for-aks/search-policy.png" alt-text="Search for Policy in All Services" border="false":::
46
46
47
47
1. Select **Join Preview** on the left side of the Azure Policy page.
48
48
49
-

49
+
:::image type="content" source="../media/rego-for-aks/join-aks-preview.png" alt-text="Join the Policy for AKS preview" border="false":::
50
50
51
51
1. Select the row of the subscription you want added to the preview.
52
52
@@ -144,11 +144,11 @@ manage.
144
144
145
145
1. Select **Policies (preview)** on the left side of the Kubernetes service page.
146
146
147
-

147
+
:::image type="content" source="../media/rego-for-aks/policies-preview-from-aks-cluster.png" alt-text="Policies from the AKS cluster" border="false":::
148
148
149
149
1. In the main page, select the **Enable add-on** button.
150
150
151
-

151
+
:::image type="content" source="../media/rego-for-aks/enable-policy-add-on.png" alt-text="Enable the Azure Policy for AKS add-on" border="false":::
152
152
153
153
> [!NOTE]
154
154
> If the **Enable add-on** button is grayed out, the subscription has not yet been added to the
@@ -252,11 +252,11 @@ To remove the Azure Policy Add-on from your AKS cluster, use either the Azure po
252
252
253
253
1. Select **Policies (preview)** on the left side of the Kubernetes service page.
254
254
255
-

255
+
:::image type="content" source="../media/rego-for-aks/policies-preview-from-aks-cluster.png" alt-text="Policies from the AKS cluster" border="false":::
256
256
257
257
1. In the main page, select the **Disable add-on** button.
258
258
259
-

259
+
:::image type="content" source="../media/rego-for-aks/disable-policy-add-on.png" alt-text="Disable the Azure Policy for AKS add-on" border="false":::
@@ -234,12 +234,12 @@ triggered when the Resource Manager properties are added, removed, or altered.
234
234
1. Select the **Change History (preview)** tab on the **Resource Compliance** page. A list of
235
235
detected changes, if any exist, are displayed.
236
236
237
-

237
+
:::image type="content" source="../media/determine-non-compliance/change-history-tab.png" alt-text="Azure Policy Change History tab on Resource Compliance page" border="false":::
238
238
239
239
1. Select one of the detected changes. The _visual diff_ for the resource is presented on the
240
240
**Change history** page.
241
241
242
-

242
+
:::image type="content" source="../media/determine-non-compliance/change-history-visual-diff.png" alt-text="Azure Policy Change History Visual Diff on Change history page" border="false":::
243
243
244
244
The _visual diff_ aides in identifying changes to a resource. The changes detected may not be
245
245
related to the current compliance state of the resource.
Copy file name to clipboardExpand all lines: articles/governance/policy/how-to/extension-for-vscode.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ For a national cloud user, follow these steps to set the Azure environment first
53
53
54
54
1. Select the nation cloud from the list:
55
55
56
-

56
+
:::image type="content" source="../media/extension-for-vscode/set-default-azure-cloud-sign-in.png" alt-text="Set default Azure cloud sign in for Visual Studio Code" border="false":::
57
57
58
58
## Connect to an Azure account
59
59
@@ -66,13 +66,13 @@ to connect to Azure from Visual Studio Code:
66
66
67
67
From the Azure Policy extension, select **Sign in to Azure**.
68
68
69
-

69
+
:::image type="content" source="../media/extension-for-vscode/azure-cloud-sign-in-policy-extension.png" alt-text="Azure cloud sign in for Visual Studio Code from Azure Policy extension" border="false":::
70
70
71
71
- Command Palette
72
72
73
73
From the menu bar, go to **View** > **Command Palette**, and enter **Azure: Sign In**.
74
74
75
-

75
+
:::image type="content" source="../media/extension-for-vscode/azure-cloud-sign-in-command-palette.png" alt-text="Azure cloud sign in for Visual Studio Code from Command Palette" border="false":::
76
76
77
77
1. Follow the sign in instructions to sign in to Azure. After you're connected, your Azure account
78
78
name is shown on the status bar at the bottom of the Visual Studio Code window.
@@ -150,7 +150,7 @@ Azure Policy alias if one exists. In this example, the resource is a
150
150
**properties.storageProfile.imageReference.offer** property is hovered over. Hovering shows the
Copy file name to clipboardExpand all lines: articles/governance/policy/how-to/get-compliance-data.md
+16-17Lines changed: 16 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,13 +128,13 @@ condition triggers evaluation of the existence condition for the related resourc
128
128
For example, assume that you have a resource group – ContsoRG, with some storage accounts
129
129
(highlighted in red) that are exposed to public networks.
130
130
131
-

131
+
:::image type="content" source="../media/getting-compliance-data/resource-group01.png" alt-text="Storage accounts exposed to public networks" border="false":::
132
132
133
133
In this example, you need to be wary of security risks. Now that you've created a policy assignment,
134
134
it's evaluated for all storage accounts in the ContosoRG resource group. It audits the three
135
135
non-compliant storage accounts, consequently changing their states to **Non-compliant.**
0 commit comments