Skip to content

Commit 85c750b

Browse files
author
Patrick El-Azem
committed
Cosmos DB | Policy | Fix link warnings
1 parent d54274c commit 85c750b

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/cosmos-db/policy.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -11,17 +11,17 @@ ms.date: 05/20/2020
1111

1212
# Use Azure Policy to implement governance and controls for Azure Cosmos DB resources
1313

14-
[Azure Policy](../governance/policy/overview) helps to enforce organizational governance standards, assess resource compliance, and implement automatic remediation. Common use cases include security, cost management, and configuration consistency.
14+
[Azure Policy](../governance/policy/overview.md) helps to enforce organizational governance standards, assess resource compliance, and implement automatic remediation. Common use cases include security, cost management, and configuration consistency.
1515

16-
Azure Policy provides built-in policy definitions. You can create custom policy definitions for scenarios that are not addressed by the built-in policy definitions. See the [Azure Policy documentation](../governance/policy/overview) for more details.
16+
Azure Policy provides built-in policy definitions. You can create custom policy definitions for scenarios that are not addressed by the built-in policy definitions. See the [Azure Policy documentation](../governance/policy/overview.md) for more details.
1717

1818
## Assign a built-in policy definition
1919

2020
Policy definitions describe resource compliance conditions and the effect to take if a condition is met. Policy _assignments_ are created from policy _definitions_. You can use built-in or custom policy definitions for your Azure Cosmos DB resources. Policy assignments are scoped to an Azure management group, an Azure subscription, or a resource group and they are applied to the resources within the selected scope. Optionally, you can exclude specific resources from the scope.
2121

22-
You can create policy assignments with the [Azure portal](../governance/policy/assign-policy-portal), [Azure PowerShell](../governance/policy/assign-policy-powershell), [Azure CLI](../governance/policy/assign-policy-azurecli), or [ARM template](../governance/policy/assign-policy-template).
22+
You can create policy assignments with the [Azure portal](../governance/policy/assign-policy-portal.md), [Azure PowerShell](../governance/policy/assign-policy-powershell.md), [Azure CLI](../governance/policy/assign-policy-azurecli.md), or [ARM template](../governance/policy/assign-policy-template.md).
2323

24-
To create a policy assignment from a built-in policy definition for Azure Cosmos DB, use the steps in [create a policy assignment with the Azure portal](../governance/policy/assign-policy-portal) article.
24+
To create a policy assignment from a built-in policy definition for Azure Cosmos DB, use the steps in [create a policy assignment with the Azure portal](../governance/policy/assign-policy-portal.md) article.
2525

2626
At the step to select a policy definition, enter `Cosmos DB` in the Search field to filter the list of available built-in policy definitions. Select one of the available built-in policy definitions, and then choose **Select** to continue creating the policy assignment.
2727

@@ -32,11 +32,11 @@ At the step to select a policy definition, enter `Cosmos DB` in the Search field
3232

3333
## Create a custom policy definition
3434

35-
For specific scenarios that are not addressed by built-in policies, you can create [a custom policy definition](../governance/policy/tutorials/create-custom-policy-definition). Later you create a Policy _assignment_ from your custom policy _definition_.
35+
For specific scenarios that are not addressed by built-in policies, you can create [a custom policy definition](../governance/policy/tutorials/create-custom-policy-definition.md). Later you create a Policy _assignment_ from your custom policy _definition_.
3636

3737
### Property types and property aliases in policy rules
3838

39-
Use the [custom policy definition steps](../governance/policy/tutorials/create-custom-policy-definition) to identify the resource properties and property aliases, which are required to create policy rules.
39+
Use the [custom policy definition steps](../governance/policy/tutorials/create-custom-policy-definition.md) to identify the resource properties and property aliases, which are required to create policy rules.
4040

4141
To identify Azure Cosmos DB specific property aliases, use the namespace `Microsoft.DocumentDB` with one of the methods shown in the custom policy definition steps article.
4242

@@ -73,7 +73,7 @@ These commands output the list of property alias names for Azure Cosmos DB prope
7373
]
7474
```
7575

76-
You can use any of these property alias names in the [custom policy definition rules](../governance/policy/tutorials/create-custom-policy-definition#policy-rule).
76+
You can use any of these property alias names in the [custom policy definition rules](../governance/policy/tutorials/create-custom-policy-definition.md#policy-rule).
7777

7878
The following is an example policy definition that checks if an Azure Cosmos DB SQL database's provisioned throughput is greater than a maximum allowed limit of 400 RU/s. A custom policy definition includes two rules: one to check for the specific type of property alias, and the second one for the specific property of the type. Both rules use the alias names.
7979

@@ -100,7 +100,7 @@ Custom policy definitions can be used to create policy assignments just like the
100100

101101
After the policy assignments are created, Azure Policy evaluates the resources in the assignment's scope. Each resource's _compliance_ with the policy is assessed. The _effect_ specified in the policy is then applied to non-compliant resources.
102102

103-
You can review the compliance results and remediation details in the [Azure portal](../governance/policy/how-to/get-compliance-data#portal) or via the [Azure CLI](../governance/policy/how-to/get-compliance-data#command-line) or the [Azure Monitor logs](../governance/policy/how-to/get-compliance-data#azure-monitor-logs).
103+
You can review the compliance results and remediation details in the [Azure portal](../governance/policy/how-to/get-compliance-data.md#portal) or via the [Azure CLI](../governance/policy/how-to/get-compliance-data.md#command-line) or the [Azure Monitor logs](../governance/policy/how-to/get-compliance-data.md#azure-monitor-logs).
104104

105105
The following screenshot shows two example policy assignments. One assignment is based on a built-in policy definition, which checks that the Azure Cosmos DB resources are deployed only to the allowed Azure regions. The other assignment is based on a custom policy definition. This assignment checks that the provisioned throughput on Azure Cosmos DB resources does not exceed a specified maximum limit.
106106

@@ -113,10 +113,10 @@ The screenshot shows the following compliance evaluation results:
113113

114114
:::image type="content" source="./media/policy/compliance.png" alt-text="Search for Cosmos DB built-in policy definitions":::
115115

116-
To remediate the non-compliant resources, see the [remediated with Azure Policy](../governance/policy/how-to/remediate-resources) article.
116+
To remediate the non-compliant resources, see the [remediated with Azure Policy](../governance/policy/how-to/remediate-resources.md) article.
117117

118118
## Next Steps
119119

120120
- [Review sample custom policy definitions for Azure Cosmos DB](https://github.com/Azure/azure-policy/tree/master/samples/CosmosDB)
121-
- [Create a policy assignment in the Azure portal](../governance/policy/assign-policy-portal)
122-
- [Review Azure Policy built-in policy definitions for Azure Cosmos DB](./policy-samples)
121+
- [Create a policy assignment in the Azure portal](../governance/policy/assign-policy-portal.md)
122+
- [Review Azure Policy built-in policy definitions for Azure Cosmos DB](./policy-samples.md)

0 commit comments

Comments
 (0)