Skip to content

Commit be08c2a

Browse files
committed
acrolinx pass
1 parent c778f9a commit be08c2a

File tree

2 files changed

+8
-15
lines changed

2 files changed

+8
-15
lines changed

articles/governance/policy/assign-policy-terraform.md

Lines changed: 4 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: 'Quickstart: New policy assignment with Terraform'
3-
description: In this quickstart, you use Terraform and Hashicorp Configuration Language (HCL) syntax to create a policy assignment to identify non-compliant resources.
3+
description: In this quickstart, you use Terraform and Hashicorp Configuration Language (HCL) syntax to create a policy assignment to identify noncompliant resources.
44
ms.date: 03/26/2025
55
ms.topic: quickstart
66
ms.custom: devx-track-terraform
@@ -10,10 +10,10 @@ content_well_notification:
1010
- AI-contribution
1111
---
1212

13-
# Quickstart: Create a policy assignment to identify non-compliant resources using Terraform
13+
# Quickstart: Create a policy assignment to identify noncompliant resources using Terraform
1414

1515
The first step in understanding compliance in Azure is to identify the status of your resources. This quickstart steps you through the process of creating a policy assignment to identify virtual
16-
machines that aren't using managed disks. At the end of this process, you identify virtual machines that aren't using managed disks across subscription. They're _non-compliant_ with the policy assignment.
16+
machines that are not using managed disks.
1717

1818
[!INCLUDE [azure-policy-version-default](../includes/policy/policy-version-default.md)]
1919

@@ -50,13 +50,6 @@ The sample code for this article is located in the [Azure Terraform GitHub repo]
5050
1. Create a file named `outputs.tf` and insert the following code.
5151
:::code language="Terraform" source="~/terraform_samples/quickstart/101-azure-policy/outputs.tf":::
5252

53-
> [!IMPORTANT]
54-
> If you are using the 4.x azurerm provider, you must [explicitly specify the Azure subscription ID](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/guides/4.0-upgrade-guide#specifying-subscription-id-is-now-mandatory) to authenticate to Azure before running the Terraform commands.
55-
>
56-
> One way to specify the Azure subscription ID without putting it in the `providers` block is to specify the subscription ID in an environment variable named `ARM_SUBSCRIPTION_ID`.
57-
>
58-
> For more information, see the [Azure provider reference documentation](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs#argument-reference).
59-
6053
## Specify scope
6154

6255
A scope determines what resources or grouping of resources the policy assignment gets enforced on. It could range from a management group to an individual resource. To use any of the following scopes, update the `scope` variable in the `variables.tf` file. If you leave the `scope` variable value blank, the "subscription" scope is used.
@@ -94,7 +87,7 @@ A scope determines what resources or grouping of resources the policy assignment
9487
armclient post "/subscriptions/<subscription_id>/providers/Microsoft.PolicyInsights/policyStates/latest/queryResults?api-version=2019-10-01&$filter=IsCompliant eq false and PolicyAssignmentId eq '<policyAssignmentID>'&$apply=groupby((ResourceId))" > <json file to direct the output with the resource IDs into>
9588
```
9689
97-
1. The results are comparable to what you see listed under **Non-compliant resources** in the Azure portal view.
90+
1. The results are comparable to what you see listed under **Noncompliant resources** in the Azure portal view.
9891

9992
## Clean up resources
10093

articles/storage-actions/storage-tasks/storage-task-quickstart-terraform.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-storage-actions
77
ms.custom: devx-track-terraform;build-2023-metadata-update
88
ms.topic: quickstart
99
ms.author: normesta
10-
ms.date: 03/25/2025
10+
ms.date: 03/26/2025
1111
#customer intent: As a Terraform user, I want to see how to create a storage task using Terraform.
1212
content_well_notification:
1313
- AI-contribution
@@ -17,7 +17,7 @@ content_well_notification:
1717

1818
A storage task can perform operations on blobs in an Azure Storage account. As you create a task, you can define the conditions that must be met by each object (container or blob), and the operations to perform on the object. You can also identify one or more Azure Storage account targets. See [What are Azure Storage Actions?](../overview.md).
1919

20-
In this how-to article, you'll learn how to create a storage task using Terraform.
20+
In this how-to article, you learn how to create a storage task using Terraform.
2121

2222
> [!IMPORTANT]
2323
> Azure Storage Actions is currently in PREVIEW and is available in these [regions](../overview.md#supported-regions).
@@ -61,15 +61,15 @@ The sample code for this article is located in the [Azure Terraform GitHub repo]
6161
1. Create a file named `outputs.tf` and insert the following code.
6262
:::code language="Terraform" source="~/terraform_samples/quickstart/101-azure-storage-actions-create-storage-task/outputs.tf":::
6363

64+
## Initialize Terraform
65+
6466
> [!IMPORTANT]
6567
> If you are using the 4.x azurerm provider, you must [explicitly specify the Azure subscription ID](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/guides/4.0-upgrade-guide#specifying-subscription-id-is-now-mandatory) to authenticate to Azure before running the Terraform commands.
6668
>
6769
> One way to specify the Azure subscription ID without putting it in the `providers` block is to specify the subscription ID in an environment variable named `ARM_SUBSCRIPTION_ID`.
6870
>
6971
> For more information, see the [Azure provider reference documentation](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs#argument-reference).
7072
71-
## Initialize Terraform
72-
7373
[!INCLUDE [terraform-init.md](~/azure-dev-docs-pr/articles/terraform/includes/terraform-init.md)]
7474

7575
## Create a Terraform execution plan

0 commit comments

Comments
 (0)