You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/troubleshooting/common-deployment-errors.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ If your error code isn't listed, submit a GitHub issue. On the right side of the
65
65
| PrivateIPAddressInReservedRange | The specified IP address includes an address range required by Azure. Change IP address to avoid reserved range. | [Private IP addresses](../../virtual-network/ip-services/private-ip-addresses.md)
66
66
| PrivateIPAddressNotInSubnet | The specified IP address is outside of the subnet range. Change IP address to fall within subnet range. |[Private IP addresses](../../virtual-network/ip-services/private-ip-addresses.md)|
67
67
| PropertyChangeNotAllowed | Some properties can't be changed on a deployed resource. When updating a resource, limit your changes to permitted properties. |[Update resource](/azure/architecture/guide/azure-resource-manager/advanced-templates/update-resource)|
68
-
| PublicIPCountLimitReached | You've reached the limit for the number of running public IPs. Shut down unneeded resources or contact Azure support to request an increase. For example, in Azure Databricks, see [Unexpected cluster termination](/azure/databricks/kb/clusters/termination-reasons) and [IP address limit prevents cluster creation](/azure/databricks/kb/clusters/azure-ip-limit). |[Public IP address limits](../management/azure-subscription-service-limits.md#publicip-address)|
68
+
| PublicIPCountLimitReached | You've reached the limit for the number of running public IPs. Shut down unneeded resources or contact Azure support to request an increase. For example, in Azure Databricks, see [IP address limit prevents cluster creation](/azure/databricks/kb/clusters/azure-ip-limit). |[Public IP address limits](../management/azure-subscription-service-limits.md#publicip-address)|
69
69
| RegionDoesNotAllowProvisioning | Select a different region or submit a quota support request for **Region access**. ||
70
70
| RequestDisallowedByPolicy | Your subscription includes a resource policy that prevents an action you're trying to do during deployment. Find the policy that blocks the action. If possible, change your deployment to meet the limitations from the policy. |[Resolve policies](error-policy-requestdisallowedbypolicy.md)|
71
71
| ReservedResourceName | Provide a resource name that doesn't include a reserved name. |[Reserved resource names](error-reserved-resource-name.md)|
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-vsan.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,7 +68,7 @@ After vSAN TRIM/UNMAP is enabled, you must meet certain prerequisites in order f
68
68
69
69
For more information about how to reclaim space for Windows and Linux systems for TRIM/UNMAP to execute, see the following VMware articles:
70
70
-[How to reclaim disk space](https://knowledge.broadcom.com/external/article/340005/reclaiming-disk-space-from-thin-provisio.html)
71
-
-[Learn the procedure to enable TRIM/UNMAP](https://knowledge.broadcom.com/external/article/326595/procedure-to-enable-trimunmap.html)
71
+
-[Learn the procedure to enable TRIM/UNMAP](https://techdocs.broadcom.com/us/en/vmware-cis/vsan/vsan/8-0/vsan-administration/expanding-and-managing-a-vsan-cluster/vsan-file-service/reclaiming-space-with-unmap-in-vsan-distributed-file-system.html)
Copy file name to clipboardExpand all lines: articles/firewall/quick-create-ipgroup-template.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ ms.custom:
20
20
In this quickstart, you use an Azure Resource Manager template (ARM template) to deploy an Azure Firewall with sample IP Groups used in a network rule and application rule. An IP Group is a top-level resource that allows you to define and group IP addresses, ranges, and subnets into a single object. This is useful for managing IP addresses in Azure Firewall rules. You can either manually enter IP addresses or import them from a file.
21
21
22
22
> [!NOTE]
23
-
> The template used in this quickstart deploys Ubuntu 18.04 LTS virtual machines, which reached end of standard support on May 31, 2023. For production deployments, consider using [Ubuntu 20.04 LTS](https://azuremarketplace.microsoft.com/marketplace/apps/canonical.0001-com-ubuntu-server-focal) or [Ubuntu 22.04 LTS](https://azuremarketplace.microsoft.com/marketplace/apps/canonical.0001-com-ubuntu-server-jammy) images, or enable [Ubuntu Pro](https://ubuntu.com/azure/pro) for extended security maintenance.
23
+
> The template used in this quickstart deploys Ubuntu 18.04 LTS virtual machines, which reached end of standard support on May 31, 2023. For production deployments, consider using [Ubuntu 20.04 LTS](https://marketplace.microsoft.com/product/canonical.0001-com-ubuntu-pro-focal) or [Ubuntu 22.04 LTS](https://marketplace.microsoft.com/product/canonical.ubuntu-22_04-lts) images, or enable [Ubuntu Pro](https://ubuntu.com/azure/pro) for extended security maintenance.
Copy file name to clipboardExpand all lines: articles/governance/policy/assign-policy-rest-api.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ This guide uses REST API to create a policy assignment and to identify non-compl
23
23
24
24
## Review the REST API syntax
25
25
26
-
There are two elements to run REST API commands: the REST API URI and the request body. For information, go to [Policy Assignments - Create](/rest/api/policy/policy-assignments/create).
26
+
There are two elements to run REST API commands: the REST API URI and the request body. For information, go to [Policy Assignments - Create](/rest/api/policy-authorization/policy-assignments/create).
27
27
28
28
The following example shows the REST API URI syntax to create a policy definition.
29
29
@@ -105,7 +105,7 @@ az rest --method put --uri https://management.azure.com/subscriptions/{subscript
105
105
106
106
In PowerShell, the backtick (``` ` ```) is needed to escape the `at sign` (`@`) to specify a filename. In a Bash shell like Git Bash, omit the backtick.
107
107
108
-
For information, go to [Policy Assignments - Create](/rest/api/policy/policy-assignments/create).
108
+
For information, go to [Policy Assignments - Create](/rest/api/policy-authorization/policy-assignments/create).
109
109
110
110
## Identify non-compliant resources
111
111
@@ -168,7 +168,7 @@ Your results resemble the following example:
168
168
}
169
169
```
170
170
171
-
For more information, go to [Policy States - List Query Results For Resource Group](/rest/api/policy/policy-states/list-query-results-for-resource-group).
171
+
For more information, go to [Policy States - List Query Results For Resource Group](/rest/api/policyinsights/policy-states/list-query-results-for-resource-group).
172
172
173
173
## Clean up resources
174
174
@@ -188,7 +188,7 @@ az rest --method get --uri https://management.azure.com/subscriptions/{subscript
188
188
The policy assignment 'audit-vm-managed-disks' is not found.
189
189
```
190
190
191
-
For more information, go to [Policy Assignments - Delete](/rest/api/policy/policy-assignments/delete) and [Policy Assignments - Get](/rest/api/policy/policy-assignments/get).
191
+
For more information, go to [Policy Assignments - Delete](/rest/api/policy-authorization/policy-assignments/delete) and [Policy Assignments - Get](/rest/api/policy-authorization/policy-assignments/get).
Copy file name to clipboardExpand all lines: articles/governance/policy/concepts/assignment-structure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -349,7 +349,7 @@ In this example, the parameters previously defined in the policy definition are
349
349
350
350
Policy assignments with effect set to `deployIfNotExists` or `modify` must have an identity property to do remediation on non-compliant resources. A single policy assignment can be associated with only one system-assigned or user-assigned managed identity. However, that identity can be assigned more than one role if necessary.
351
351
352
-
Assignments using a system-assigned managed identity must also specify a top-level `location` property to determine where it will be deployed. The location cannot be set to `global`, and it cannot be changed. The `location` property is only specified in [Rest API](/rest/api/policy/policy-assignments/create) versions 2018-05-01 and later. If a location is specified in an assignment that doesn't use an identity, then the location will be ignored.
352
+
Assignments using a system-assigned managed identity must also specify a top-level `location` property to determine where it will be deployed. The location cannot be set to `global`, and it cannot be changed. The `location` property is only specified in [Rest API](/rest/api/policy-authorization/policy-assignments/create) versions 2018-05-01 and later. If a location is specified in an assignment that doesn't use an identity, then the location will be ignored.
Copy file name to clipboardExpand all lines: articles/governance/policy/concepts/attestation-structure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
10
10
Attestations are used by Azure Policy to set compliance states of resources or scopes targeted by [manual policies](effect-manual.md). They also allow users to provide more metadata or link to evidence that accompanies the attested compliance state.
11
11
12
12
> [!NOTE]
13
-
> Attestations can be created and managed only through Azure Policy [Azure Resource Manager (ARM) API](/rest/api/policy/attestations), [PowerShell](/powershell/module/az.policyinsights) or [Azure CLI](/cli/azure/policy/attestation).
13
+
> Attestations can be created and managed only through Azure Policy [Azure Resource Manager (ARM) API](/rest/api/policyinsights/attestations), [PowerShell](/powershell/module/az.policyinsights) or [Azure CLI](/cli/azure/policy/attestation).
- Azure PowerShell: Cmdlet [New-AzPolicyAssignment](/powershell/module/az.resources/New-Azpolicyassignment) with parameter `PolicyParameter`.
93
-
- REST API: In the _PUT_[create](/rest/api/policy/policy-assignments/create) operation as part of the Request Body as the value of the `properties.parameters` property.
93
+
- REST API: In the _PUT_[create](/rest/api/policy-authorization/policy-assignments/create) operation as part of the Request Body as the value of the `properties.parameters` property.
Copy file name to clipboardExpand all lines: articles/governance/policy/how-to/get-compliance-data.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,13 +57,13 @@ In each REST API URI, there are variables that are used that you need to replace
57
57
58
58
The scan supports evaluation of resources in a subscription or in a resource group. Start a scan by scope with a REST API POST command using the following URI structures:
59
59
60
-
Use the following command to evaluate a subscription. You can run the command from your browser at [Policy States - Trigger Subscription Evaluation](/rest/api/policy/policy-states/trigger-subscription-evaluation) using the **Try it** option.
60
+
Use the following command to evaluate a subscription. You can run the command from your browser at [Policy States - Trigger Subscription Evaluation](/rest/api/policyinsights/policy-states/trigger-subscription-evaluation) using the **Try it** option.
61
61
62
62
```http
63
63
POST https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/triggerEvaluation?api-version=2019-10-01
64
64
```
65
65
66
-
Use the following command to evaluate a resource group. You can run the command from your browser at [Policy States - Trigger Resource Group Evaluation](/rest/api/policy/policy-states/trigger-resource-group-evaluation) using the **Try it** option.
66
+
Use the following command to evaluate a resource group. You can run the command from your browser at [Policy States - Trigger Resource Group Evaluation](/rest/api/policyinsights/policy-states/trigger-resource-group-evaluation) using the **Try it** option.
67
67
68
68
```http
69
69
POST https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.PolicyInsights/policyStates/latest/triggerEvaluation?api-version=2019-10-01
@@ -184,7 +184,7 @@ For details about the REST API, see the [Azure Policy](/rest/api/policy/) refere
184
184
185
185
#### Summarize results
186
186
187
-
With the REST API, you can summarize by container, definition, or assignment. Here's an example of summarization at the subscription level using Azure Policy Insight's [Summarize For Subscription](/rest/api/policy/policy-states/summarize-for-subscription):
187
+
With the REST API, you can summarize by container, definition, or assignment. Here's an example of summarization at the subscription level using Azure Policy Insight's [Summarize For Subscription](/rest/api/policyinsights/policy-states/summarize-for-subscription):
188
188
189
189
```http
190
190
POST https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/summarize?api-version=2019-10-01
@@ -210,7 +210,7 @@ When a resource is created or updated, a policy evaluation result is generated.
Copy file name to clipboardExpand all lines: articles/governance/policy/how-to/programmatically-create.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -137,7 +137,7 @@ Use the following procedure to create a policy definition.
137
137
138
138
Replace the preceding `{subscriptionId}` with the ID of your subscription or `{managementGroupId}` with the ID of your [management group](../../management-groups/overview.md).
139
139
140
-
For more information about the structure of the query, see [Azure Policy Definitions - Create or Update](/rest/api/policy/policy-definitions/create-or-update) and [Policy Definitions - Create or Update At Management Group](/rest/api/policy/policy-definitions/create-or-update-at-management-group).
140
+
For more information about the structure of the query, see [Azure Policy Definitions - Create or Update](/rest/api/policy-authorization/policy-definitions/create-or-update) and [Policy Definitions - Create or Update At Management Group](/rest/api/policy-authorization/policy-definitions/create-or-update-at-management-group).
141
141
142
142
Use the following procedure to create a policy assignment and assign the policy definition at the resource group level.
Copy file name to clipboardExpand all lines: articles/high-performance-computing/performance-benchmarking/platform-selection-best-practices-for-hpc-ai-models.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -120,5 +120,5 @@ Platform decisions are trade‑offs, not absolutes, and should be guided by work
0 commit comments