Skip to content

Commit 93828be

Browse files
committed
format updates
1 parent 36581c4 commit 93828be

File tree

2 files changed

+11
-7
lines changed

2 files changed

+11
-7
lines changed

articles/cosmos-db/TOC.yml

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1059,16 +1059,18 @@
10591059
href: monitor-server-side-latency.md
10601060
- name: Monitor request unit usage
10611061
href: monitor-request-unit-usage.md
1062-
- name: Monitor with diagnostic logs
1063-
href: cosmosdb-monitor-resource-logs.md
1064-
- name: Audit control plane logs
1065-
href: audit-control-plane-logs.md
1062+
- name : Use Azure monitor metrics
1063+
items:
1064+
- name: Monitor with diagnostic logs
1065+
href: cosmosdb-monitor-resource-logs.md
1066+
- name: Audit control plane logs
1067+
href: audit-control-plane-logs.md
10661068
- name: View metrics from Cosmos DB account
10671069
href: use-metrics.md
1068-
- name: Application logging with Logic Apps
1069-
href: ../logic-apps/logic-apps-scenario-error-and-exception-handling.md?toc=/azure/cosmos-db/toc.json&bc=/azure/cosmos-db/breadcrumb/toc.json
10701070
- name: Monitoring data reference
10711071
href: monitor-cosmos-db-reference.md
1072+
- name: Application logging with Logic Apps
1073+
href: ../logic-apps/logic-apps-scenario-error-and-exception-handling.md?toc=/azure/cosmos-db/toc.json&bc=/azure/cosmos-db/breadcrumb/toc.json
10721074
- name: Develop locally
10731075
items:
10741076
- name: Use the emulator

articles/cosmos-db/audit-control-plane-logs.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,9 @@ The following are some example scenarios where auditing control plane operations
2323

2424
## Disable key based metadata write access
2525

26-
Before you audit the control plane operations in Azure Cosmos DB, disable the key-based metadata write access on your account. When key based metadata write access is disabled, clients connecting to the Azure Cosmos account through account keys are prevented from accessing the account. You can disable write access by setting the `disableKeyBasedMetadataWriteAccess` property to true. After you set this property, changes to any resource can happen from a user with the proper Role-based access control(RBAC) role and credentials. To learn more on how to set this property, see the [Preventing changes from SDKs](role-based-access-control.md#preventing-changes-from-cosmos-sdk) article. Once this option - disableKeyBasedMetadataWriteAccess - is switched on - SDK based clients will see an error "Operation 'POST' on resource 'ContainerNameorDatabaseName' is not allowed through Azure Cosmos DB endpoint. Please switch on such operations for your account, or perform this operation through Azure Resource Manager, Azure CLI or Azure Powershell. The way to switch back is to reset disableKeyBasedMetadataWriteAccess to false using CLI as described [here](role-based-access-control.md#preventing-changes-from-cosmos-sdk) - remember to change true to false in the cli command.
26+
Before you audit the control plane operations in Azure Cosmos DB, disable the key-based metadata write access on your account. When key based metadata write access is disabled, clients connecting to the Azure Cosmos account through account keys are prevented from accessing the account. You can disable write access by setting the `disableKeyBasedMetadataWriteAccess` property to true. After you set this property, changes to any resource can happen from a user with the proper Role-based access control(RBAC) role and credentials. To learn more on how to set this property, see the [Preventing changes from SDKs](role-based-access-control.md#preventing-changes-from-cosmos-sdk) article.
27+
28+
After the `disableKeyBasedMetadataWriteAccess` is turned on, if the SDK based clients run create or update operations, an error *"Operation 'POST' on resource 'ContainerNameorDatabaseName' is not allowed through Azure Cosmos DB endpoint* is returned. You have to turn on access to such operations for your account, or perform the create/update operations through Azure Resource Manager, Azure CLI or Azure Powershell. To switch back, set the disableKeyBasedMetadataWriteAccess to **false** by using Azure CLI as described in the [Preventing changes from Cosmos SDK](role-based-access-control.md#preventing-changes-from-cosmos-sdk) article. Make sure to change the value of `disableKeyBasedMetadataWriteAccess` to false instead of true.
2729

2830
Consider the following points when turning off the metadata write access:
2931

0 commit comments

Comments
 (0)