Skip to content

Commit f2953db

Browse files
authored
Merge pull request #97843 from tfitzmac/1204tags1
change tag doc structure
2 parents 8a2defd + 5bfbef5 commit f2953db

File tree

2 files changed

+24
-35
lines changed

2 files changed

+24
-35
lines changed

articles/azure-resource-manager/resource-group-using-tags.md

Lines changed: 24 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,37 @@
22
title: Tag resources for logical organization
33
description: Shows how to apply tags to organize Azure resources for billing and managing.
44
ms.topic: conceptual
5-
ms.date: 10/30/2019
5+
ms.date: 12/04/2019
66
---
77
# Use tags to organize your Azure resources
88

9-
[!INCLUDE [resource-manager-governance-tags](../../includes/resource-manager-governance-tags.md)]
9+
You apply tags to your Azure resources to logically organize them into a taxonomy. Each tag consists of a name and a value pair. For example, you can apply the name "Environment" and the value "Production" to all the resources in production.
1010

11-
To apply tags to resources, the user must have write access to that resource type. To apply tags to all resource types, use the [Contributor](../role-based-access-control/built-in-roles.md#contributor) role. To apply tags to only one resource type, use the contributor role for that resource. For example, to apply tags to virtual machines, use the [Virtual Machine Contributor](../role-based-access-control/built-in-roles.md#virtual-machine-contributor).
11+
After you apply tags, you can retrieve all the resources in your subscription with that tag name and value. Tags enable you to retrieve related resources from different resource groups. This approach is helpful when you need to organize resources for billing or management.
12+
13+
Your taxonomy should consider a self-service metadata tagging strategy in addition to an autotagging strategy to reduce the burden on users and increase accuracy.
1214

1315
[!INCLUDE [Handle personal data](../../includes/gdpr-intro-sentence.md)]
1416

17+
## Limitations
18+
19+
The following limitations apply to tags:
20+
21+
* Not all resource types support tags. To determine if you can apply a tag to a resource type, see [Tag support for Azure resources](tag-support.md).
22+
* Each resource or resource group can have a maximum of 50 tag name/value pairs. If you need to apply more tags than the maximum allowed number, use a JSON string for the tag value. The JSON string can contain many values that are applied to a single tag name. A resource group can contain many resources that each have 50 tag name/value pairs.
23+
* The tag name is limited to 512 characters, and the tag value is limited to 256 characters. For storage accounts, the tag name is limited to 128 characters, and the tag value is limited to 256 characters.
24+
* Generalized VMs don't support tags.
25+
* Tags applied to the resource group are not inherited by the resources in that resource group.
26+
* Tags can't be applied to classic resources such as Cloud Services.
27+
* Tag names can't contain these characters: `<`, `>`, `%`, `&`, `\`, `?`, `/`
28+
29+
> [!NOTE]
30+
> Currently Azure DNS zones and Traffic Manger services also don't allow the use of spaces in the tag.
31+
32+
## Required access
33+
34+
To apply tags to resources, the user must have write access to that resource type. To apply tags to all resource types, use the [Contributor](../role-based-access-control/built-in-roles.md#contributor) role. To apply tags to only one resource type, use the contributor role for that resource. For example, to apply tags to virtual machines, use the [Virtual Machine Contributor](../role-based-access-control/built-in-roles.md#virtual-machine-contributor).
35+
1536
## Policies
1637

1738
You can use [Azure Policy](../governance/policy/overview.md) to enforce tagging rules and conventions. By creating a policy, you avoid the scenario of resources being deployed to your subscription that don't comply with the expected tags for your organization. Instead of manually applying tags or searching for resources that aren't compliant, you can create a policy that automatically applies the needed tags during deployment. Tags can also now be applied to existing resources with the new [Modify](../governance/policy/concepts/effects.md#modify) effect and a [remediation task](../governance/policy/how-to/remediate-resources.md). The following section shows example policies for tags.
@@ -20,8 +41,6 @@ You can use [Azure Policy](../governance/policy/overview.md) to enforce tagging
2041

2142
## PowerShell
2243

23-
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
24-
2544
To see the existing tags for a *resource group*, use:
2645

2746
```azurepowershell-interactive

includes/resource-manager-governance-tags.md

Lines changed: 0 additions & 30 deletions
This file was deleted.

0 commit comments

Comments
 (0)