I get below error.
What does it mean ?
and How can I get to know what Naming Policies are being enforced ?
Many thanks in advance.
{"code":"RequestDisallowedByPolicy","target":"mehtadp200","message":"Resource 'mehtadp200' was disallowed by policy. (Code: RequestDisallowedByPolicy)","additionalInfo":[{"type":"PolicyViolation","info":{"policyDefinitionDisplayName":"Git commit Hash tag on Azure resource","policySetDefinitionDisplayName":"Tagging for resource group","evaluationDetails":{"evaluatedExpressions":[{"result":"True","expressionKind":"Field","expression":"type","path":"type","expressionValue":"Microsoft.Resources/subscriptions/resourceGroups","targetValue":["Microsoft.Resources/subscriptions/resourceGroups"],"operator":"In"},{"result":"False","expressionKind":"Value","expression":"[take(field('tags[git_commit_hash]'), 6)]","expressionValue":"","targetValue":"......","operator":"Match"}]},"policyDefinitionId":"/providers/Microsoft.Management/managementgroups/3ded2960-214a-46ff-8cf4-611f125e2398/providers/Microsoft.Authorization/policyDefinitions/tagging-git-commit","policySetDefinitionId":"/providers/Microsoft.Management/managementgroups/3ded2960-214a-46ff-8cf4-611f125e2398/providers/Microsoft.Authorization/policySetDefinitions/tagging-resource-group","policyDefinitionReferenceId":"4845430965885124842","policySetDefinitionName":"tagging-resource-group","policyDefinitionName":"tagging-git-commit","policyDefinitionEffect":"Deny","policyAssignmentId":"/providers/Microsoft.Management/managementgroups/3ded2960-214a-46ff-8cf4-611f125e2398/providers/Microsoft.Authorization/policyAssignments/00251279e9fc4d1ba73e04fa","policyAssignmentName":"00251279e9fc4d1ba73e04fa","policyAssignmentDisplayName":"Tagging for resource group","policyAssignmentScope":"/providers/Microsoft.Management/managementgroups/3ded2960-214a-46ff-8cf4-611f125e2398","policyAssignmentParameters":{}}},{"type":"PolicyViolation","info":{"policyDefinitionDisplayName":"Git url tag on Azure resource","policySetDefinitionDisplayName":"Tagging for resource group","evaluationDetails":{"evaluatedExpressions":[{"result":"True","expressionKind":"Field","expression":"type","path":"type","expressionValue":"Microsoft.Resources/subscriptions/resourceGroups","targetValue":["Microsoft.Resources/subscriptions/resourceGroups"],"operator":"In"},{"result":"False","expressionKind":"Value","expression":"[take(field('tags[git_url]'), 8)]","expressionValue":"","targetValue":"https://","operator":"Match"},{"result":"False","expressionKind":"Value","expression":"[take(field('tags[git_url]'), 4)]","expressionValue":"","targetValue":"git@","operator":"Match"}]},"policyDefinitionId":"/providers/Microsoft.Management/managementgroups/3ded2960-214a-46ff-8cf4-611f125e2398/providers/Microsoft.Authorization/policyDefinitions/tagging-git-url","policySetDefinitionId":"/providers/Microsoft.Management/managementgroups/3ded2960-214a-46ff-8cf4-611f125e2398/providers/Microsoft.Authorization/policySetDefinitions/tagging-resource-group","policyDefinitionReferenceId":"4312284359211068115","policySetDefinitionName":"tagging-resource-group","policyDefinitionName":"tagging-git-url","policyDefinitionEffect":"Deny","policyAssignmentId":"/providers/Microsoft.Management/managementgroups/3ded2960-214a-46ff-8cf4-611f125e2398/providers/Microsoft.Authorization/policyAssignments/00251279e9fc4d1ba73e04fa","policyAssignmentName":"00251279e9fc4d1ba73e04fa","policyAssignmentDisplayName":"Tagging for resource group","policyAssignmentScope":"/providers/Microsoft.Management/managementgroups/3ded2960-214a-46ff-8cf4-611f125e2398","policyAssignmentParameters":{}}},{"type":"PolicyViolation","info":{"policyDefinitionDisplayName":"RG Naming Standards","evaluationDetails":{"evaluatedExpressions":[{"result":"True","expressionKind":"Field","expression":"type","path":"type","expressionValue":"Microsoft.Resources/subscriptions/resourceGroups","targetValue":"Microsoft.Resources/subscriptions/resourceGroups","operator":"Equals"},{"result":"False","expressionKind":"Value","expression":"[first(skip(split(field('name'), '-'), 1))]","expressionValue":null,"targetValue":"UKS","operator":"MatchInsensitively"},{"result":"False","expressionKind":"Value","expression":"[first(skip(split(field('name'), '-'), 1))]","expressionValue":null,"targetValue":"UKW","operator":"MatchInsensitively"},{"result":"False","expressionKind":"Value","expression":"[first(skip(split(field('name'), '-'), 1))]","expressionValue":null,"targetValue":"EUN","operator":"MatchInsensitively"}]},"policyDefinitionId":"/providers/Microsoft.Management/managementGroups/3ded2960-214a-46ff-8cf4-611f125e2398/providers/Microsoft.Authorization/policyDefinitions/RG Naming Standards","policySetDefinitionId":"/providers/Microsoft.Management/managementGroups/3ded2960-214a-46ff-8cf4-611f125e2398/providers/Microsoft.Authorization/policySetDefinitions/Naming Standards","policyDefinitionReferenceId":"7004565952790260503","policySetDefinitionName":"Naming Standards","policyDefinitionName":"RG Naming Standards","policyDefinitionEffect":"Deny","policyAssignmentId":"/providers/Microsoft.Management/managementGroups/3ded2960-214a-46ff-8cf4-611f125e2398/providers/Microsoft.Authorization/policyAssignments/Naming Policies (Global)","policyAssignmentName":"Naming Policies (Global)","policyAssignmentDisplayName":"Naming Policies (Global)","policyAssignmentScope":"/providers/Microsoft.Management/managementGroups/3ded2960-214a-46ff-8cf4-611f125e2398","policyAssignmentParameters":{}}}],"policyDetails":[{"isInitiative":true,"assignmentId":"/providers/Microsoft.Management/managementgroups/3ded2960-214a-46ff-8cf4-611f125e2398/providers/Microsoft.Authorization/policyAssignments/00251279e9fc4d1ba73e04fa","assignmentName":"Tagging for resource group","auxDefinitions":[{"definitionName":"Git commit Hash tag on Azure resource","nonComplianceMessage":null},{"definitionName":"Git url tag on Azure resource","nonComplianceMessage":null}],"viewDetailsUri":"https://portal.azure.com#blade/Microsoft_Azure_Policy/EditAssignmentBladeV2/assignmentId/%2Fproviders%2FMicrosoft.Management%2Fmanagementgroups%2F3ded2960-214a-46ff-8cf4-611f125e2398%2Fproviders%2FMicrosoft.Authorization%2FpolicyAssignments%2F00251279e9fc4d1ba73e04fa"},{"isInitiative":true,"assignmentId":"/providers/Microsoft.Management/managementGroups/3ded2960-214a-46ff-8cf4-611f125e2398/providers/Microsoft.Authorization/policyAssignments/Naming Policies (Global)","assignmentName":"Naming Policies (Global)","auxDefinitions":[{"definitionName":"RG Naming Standards","nonComplianceMessage":null}],"viewDetailsUri":"https://portal.azure.com#blade/Microsoft_Azure_Policy/EditAssignmentBladeV2/assignmentId/%2Fproviders%2FMicrosoft.Management%2FmanagementGroups%2F3ded2960-214a-46ff-8cf4-611f125e2398%2Fproviders%2FMicrosoft.Authorization%2FpolicyAssignments%2FNaming%20Policies%20(Global)"}]}