Skip to content

Commit 7257801

Browse files
Merge pull request #285336 from davidsmatlak/ds-fix-rest-api-links-20240822
Reverts Azure Policy REST API links
2 parents f0c346c + 1fe76fb commit 7257801

File tree

6 files changed

+11
-11
lines changed

6 files changed

+11
-11
lines changed

articles/governance/policy/assign-policy-rest-api.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This guide uses REST API to create a policy assignment and to identify non-compl
2323

2424
## Review the REST API syntax
2525

26-
There are two elements to run REST API commands: the REST API URI and the request body. For information, go to [Policy Assignments - Create](/rest/api/policyauthorization/policy-assignments/create).
26+
There are two elements to run REST API commands: the REST API URI and the request body. For information, go to [Policy Assignments - Create](/rest/api/policy/policy-assignments/create).
2727

2828
The following example shows the REST API URI syntax to create a policy definition.
2929

@@ -105,7 +105,7 @@ az rest --method put --uri https://management.azure.com/subscriptions/{subscript
105105

106106
In PowerShell, the backtick (``` ` ```) is needed to escape the `at sign` (`@`) to specify a filename. In a Bash shell like Git Bash, omit the backtick.
107107

108-
For information, go to [Policy Assignments - Create](/rest/api/policyauthorization/policy-assignments/create).
108+
For information, go to [Policy Assignments - Create](/rest/api/policy/policy-assignments/create).
109109

110110
## Identify non-compliant resources
111111

@@ -168,7 +168,7 @@ Your results resemble the following example:
168168
}
169169
```
170170

171-
For more information, go to [Policy States - List Query Results For Resource Group](/rest/api/policyinsights/policy-states/list-query-results-for-resource-group).
171+
For more information, go to [Policy States - List Query Results For Resource Group](/rest/api/policy/policy-states/list-query-results-for-resource-group).
172172

173173
## Clean up resources
174174

@@ -188,7 +188,7 @@ az rest --method get --uri https://management.azure.com/subscriptions/{subscript
188188
The policy assignment 'audit-vm-managed-disks' is not found.
189189
```
190190

191-
For more information, go to [Policy Assignments - Delete](/rest/api/policyauthorization/policy-assignments/delete) and [Policy Assignments - Get](/rest/api/policyauthorization/policy-assignments/get).
191+
For more information, go to [Policy Assignments - Delete](/rest/api/policy/policy-assignments/delete) and [Policy Assignments - Get](/rest/api/policy/policy-assignments/get).
192192

193193
## Next steps
194194

articles/governance/policy/concepts/attestation-structure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
Attestations are used by Azure Policy to set compliance states of resources or scopes targeted by [manual policies](effect-manual.md). They also allow users to provide more metadata or link to evidence that accompanies the attested compliance state.
1111

1212
> [!NOTE]
13-
> Attestations can be created and managed only through Azure Policy [Azure Resource Manager (ARM) API](/rest/api/policyinsights/attestations), [PowerShell](/powershell/module/az.policyinsights) or [Azure CLI](/cli/azure/policy/attestation).
13+
> Attestations can be created and managed only through Azure Policy [Azure Resource Manager (ARM) API](/rest/api/policy/attestations), [PowerShell](/powershell/module/az.policyinsights) or [Azure CLI](/cli/azure/policy/attestation).
1414
1515
## Best practices
1616

articles/governance/policy/concepts/initiative-definition-structure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -349,7 +349,7 @@ This information is:
349349
- Displayed in the Azure portal on the overview of a **control** on a Regulatory Compliance
350350
initiative.
351351
- Available via REST API. See the `Microsoft.PolicyInsights` resource provider and the
352-
[policyMetadata operation group](/rest/api/policyinsights/policy-metadata/get-resource).
352+
[policyMetadata operation group](/rest/api/policy/policy-metadata/get-resource).
353353
- Available via Azure CLI. See the [az policy metadata](/cli/azure/policy/metadata) command.
354354

355355
> [!IMPORTANT]

articles/governance/policy/how-to/author-policies-for-arrays.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ To use this string with each SDK, use the following commands:
110110
parameter **params**
111111
- Azure PowerShell: Cmdlet [New-AzPolicyAssignment](/powershell/module/az.resources/New-Azpolicyassignment)
112112
with parameter **PolicyParameter**
113-
- REST API: In the _PUT_ [create](/rest/api/policyauthorization/policy-assignments/create) operation as part of
113+
- REST API: In the _PUT_ [create](/rest/api/policy/policy-assignments/create) operation as part of
114114
the Request Body as the value of the **properties.parameters** property
115115

116116
## Using arrays in conditions

articles/governance/policy/how-to/get-compliance-data.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -289,7 +289,7 @@ Use ARMClient or a similar tool to handle authentication to Azure for the REST A
289289

290290
With the REST API, summarization can be performed by container, definition, or assignment. Here's
291291
an example of summarization at the subscription level using Azure Policy Insight's [Summarize For
292-
Subscription](/rest/api/policyinsights/policy-states/summarize-for-subscription):
292+
Subscription](/rest/api/policy/policy-states/summarize-for-subscription):
293293

294294
```http
295295
POST https://management.azure.com/subscriptions/{subscriptionId}/providers/Microsoft.PolicyInsights/policyStates/latest/summarize?api-version=2019-10-01
@@ -417,7 +417,7 @@ Your results resemble the following example:
417417
```
418418

419419
For more information about querying policy events, see the
420-
[Azure Policy Events](/rest/api/policyinsights/policy-events) reference article.
420+
[Azure Policy Events](/rest/api/policy/policy-events) reference article.
421421

422422
### Azure CLI
423423

articles/governance/policy/how-to/programmatically-create.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -164,9 +164,9 @@ Use the following procedure to create a policy definition.
164164
with the ID of your [management group](../../management-groups/overview.md).
165165

166166
For more information about the structure of the query, see
167-
[Azure Policy Definitions - Create or Update](/rest/api/policyauthorization/policy-definitions/create-or-update)
167+
[Azure Policy Definitions - Create or Update](/rest/api/policy/policy-definitions/create-or-update)
168168
and
169-
[Policy Definitions - Create or Update At Management Group](/rest/api/policyauthorization/policy-definitions/create-or-update-at-management-group).
169+
[Policy Definitions - Create or Update At Management Group](/rest/api/policy/policy-definitions/create-or-update-at-management-group).
170170

171171
Use the following procedure to create a policy assignment and assign the policy definition at the
172172
resource group level.

0 commit comments

Comments
 (0)