Skip to content

Commit e10b881

Browse files
committed
updates policy links
1 parent 79192e1 commit e10b881

11 files changed

+57
-57
lines changed

articles/governance/policy/concepts/policy-for-kubernetes.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -303,8 +303,8 @@ definitions. There are sample definition files available to assign in [Azure Pol
303303

304304
Azure Policy for Kubernetes also support custom definition creation at the component-level for both Azure Kubernetes Service clusters and Azure Arc-enabled Kubernetes clusters. Constraint template and mutation template samples are available in the [Gatekeeper community library](https://github.com/open-policy-agent/gatekeeper-library/tree/master). [Azure Policy's Visual Studio Code Extension](../how-to/extension-for-vscode.md#create-policy-definition-from-a-constraint-template-or-mutation-template) can be used to help translate an existing constraint template or mutation template to a custom Azure Policy policy definition.
305305

306-
With a [Resource Provider mode](./definition-structure.md#resource-provider-modes) of
307-
`Microsoft.Kubernetes.Data`, the effects [audit](./effects.md#audit), [deny](./effects.md#deny), [disabled](./effects.md#disabled), and [mutate](./effects.md#mutate-preview) are used to manage your Kubernetes clusters.
306+
With a [Resource Provider mode](./definition-structure-basics.md#resource-provider-modes) of
307+
`Microsoft.Kubernetes.Data`, the effects [audit](./effect-audit.md), [deny](./effects.md#deny), [disabled](./effects.md#disabled), and [mutate](./effects.md#mutate-preview) are used to manage your Kubernetes clusters.
308308

309309
_Audit_ and _deny_ must provide `details` properties
310310
specific to working with
@@ -618,9 +618,9 @@ Security improvements.
618618
Introducing CEL and VAP. Common Expression Language (CEL) is a Kubernetes-native expression language that can be used to declare validation rules of a policy. Validating Admission Policy (VAP) feature provides in-tree policy evaluation, reduces admission request latency, and improves reliability and availability. The supported validation actions include Deny, Warn, and Audit. Custom policy authoring for CEL/VAP is allowed, and existing users won't need to convert their Rego to CEL as they will both be supported and be used to enforce policies. To use CEL and VAP, users need to enroll in the feature flag `AKS-AzurePolicyK8sNativeValidation` in the `Microsoft.ContainerService` namespace. For more information, view the [Gatekeeper Documentation](https://open-policy-agent.github.io/gatekeeper/website/docs/validating-admission-policy/).
619619

620620
Security improvements.
621-
- Released September 2024
621+
- Released September 2024
622622
- Kubernetes 1.27+ (VAP generation is only supported on 1.30+)
623-
- Gatekeeper 3.17.1
623+
- Gatekeeper 3.17.1
624624

625625
#### 1.7.0
626626

@@ -759,8 +759,8 @@ aligns with how the add-on was installed:
759759
- Maximum number of Non-compliant records per policy per cluster: **500**
760760
- Maximum number of Non-compliant records per subscription: **1 million**
761761
- Installations of Gatekeeper outside of the Azure Policy Add-on aren't supported. Uninstall any components installed by a previous Gatekeeper installation before enabling the Azure Policy Add-on.
762-
- [Reasons for non-compliance](../how-to/determine-non-compliance.md#compliance-reasons) aren't available for the Microsoft.Kubernetes.Data [Resource Provider mode](./definition-structure.md#resource-provider-modes). Use [Component details](../how-to/determine-non-compliance.md#component-details-for-resource-provider-modes).
763-
- Component-level [exemptions](./exemption-structure.md) aren't supported for [Resource Provider modes](./definition-structure.md#resource-provider-modes). Parameters support is available in Azure Policy definitions to exclude and include particular namespaces.
762+
- [Reasons for non-compliance](../how-to/determine-non-compliance.md#compliance-reasons) aren't available for the Microsoft.Kubernetes.Data [Resource Provider mode](./definition-structure-basics.md#resource-provider-modes). Use [Component details](../how-to/determine-non-compliance.md#component-details-for-resource-provider-modes).
763+
- Component-level [exemptions](./exemption-structure.md) aren't supported for [Resource Provider modes](./definition-structure-basics.md#resource-provider-modes). Parameters support is available in Azure Policy definitions to exclude and include particular namespaces.
764764
- Using the `metadata.gatekeeper.sh/requires-sync-data` annotation in a constraint template to configure the [replication of data](https://open-policy-agent.github.io/gatekeeper/website/docs/sync) from your cluster into the OPA cache is currently only allowed for built-in policies. The reason is because it can dramatically increase the Gatekeeper pods resource usage if not used carefully.
765765

766766
### Configuring the Gatekeeper Config

articles/governance/policy/samples/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -86,5 +86,5 @@ Azure Government:
8686
## Next steps
8787

8888
- See the built-ins on the [Azure Policy GitHub repo](https://github.com/Azure/azure-policy).
89-
- Review the [Azure Policy definition structure](../concepts/definition-structure.md).
90-
- Review [Understanding policy effects](../concepts/effects.md).
89+
- Review the [Azure Policy definition structure](../concepts/definition-structure-basics.md).
90+
- Review [Understanding policy effects](../concepts/effect-basics.md).

articles/governance/policy/samples/pattern-count-operator.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,11 @@ ms.topic: sample
66
---
77
# Azure Policy pattern: the count operator
88

9-
The [count](../concepts/definition-structure.md#count) operator evaluates members of a \[\*\] alias.
9+
The [count](../concepts/definition-structure-policy-rule.md#count) operator evaluates members of a \[\*\] alias.
1010

1111
## Sample policy definition
1212

13-
This policy definition [audits](../concepts/effects.md#audit) Network Security Groups configured to
13+
This policy definition [audits](../concepts/effect-audit.md) Network Security Groups configured to
1414
allow inbound Remote Desktop Protocol (RDP) traffic.
1515

1616
:::code language="json" source="~/policy-templates/patterns/pattern-count-operator.json":::
@@ -20,7 +20,7 @@ allow inbound Remote Desktop Protocol (RDP) traffic.
2020
The core components of the **count** operator are _field_, _where_, and the condition. Each is
2121
highlighted in the following snippet.
2222

23-
- _field_ tells count which [alias](../concepts/definition-structure.md#aliases) to evaluate members
23+
- _field_ tells count which [alias](../concepts/definition-structure-alias.md) to evaluate members
2424
of. Here, we're looking at the **securityRules\[\*\]** alias _array_ of the network security
2525
group.
2626
- _where_ uses the policy language to define which _array_ members meet the criteria. In this
@@ -34,5 +34,5 @@ highlighted in the following snippet.
3434
## Next steps
3535

3636
- Review other [patterns and built-in definitions](./index.md).
37-
- Review the [Azure Policy definition structure](../concepts/definition-structure.md).
38-
- Review [Understanding policy effects](../concepts/effects.md).
37+
- Review the [Azure Policy definition structure](../concepts/definition-structure-basics.md).
38+
- Review [Understanding policy effects](../concepts/effect-basics.md).

articles/governance/policy/samples/pattern-deploy-resources.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,10 +6,10 @@ ms.topic: sample
66
---
77
# Azure Policy pattern: deploy resources
88

9-
The [deployIfNotExists](../concepts/effects.md#deployifnotexists) effect makes it possible to deploy
9+
The [deployIfNotExists](../concepts/effect-deploy-if-not-exists.md) effect makes it possible to deploy
1010
an [Azure Resource Manager template](/azure/azure-resource-manager/templates/overview) (ARM
1111
template) when creating or updating a resource that isn't compliant. This approach can be preferred
12-
to using the [deny](../concepts/effects.md#deny) effect as it lets resources continue to be created,
12+
to using the [deny](../concepts/effect-deny.md) effect as it lets resources continue to be created,
1313
but ensures the changes are made to make them compliant.
1414

1515
## Sample policy definition
@@ -71,5 +71,5 @@ three core components:
7171
## Next steps
7272

7373
- Review other [patterns and built-in definitions](./index.md).
74-
- Review the [Azure Policy definition structure](../concepts/definition-structure.md).
75-
- Review [Understanding policy effects](../concepts/effects.md).
74+
- Review the [Azure Policy definition structure](../concepts/definition-structure-basics.md).
75+
- Review [Understanding policy effects](../concepts/effect-basics.md).

articles/governance/policy/samples/pattern-effect-details.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,14 @@ ms.topic: sample
66
---
77
# Azure Policy pattern: effects
88

9-
Azure Policy has many [effects](../concepts/effects.md) that determine how the service reacts to
9+
Azure Policy has many [effects](../concepts/effect-basics.md) that determine how the service reacts to
1010
non-compliant resources. Some effects are simple and require no additional properties in the policy
1111
definition while others require several properties.
1212

1313
## Sample 1: Simple effect
1414

1515
This policy definition checks to see whether the tag defined in parameter **tagName** exists on the
16-
evaluated resource. If the tag doesn't yet exist, the [modify](../concepts/effects.md#modify) effect
16+
evaluated resource. If the tag doesn't yet exist, the [modify](../concepts/effect-modify.md) effect
1717
is triggered to add the tag with the value in parameter **tagValue**.
1818

1919
:::code language="json" source="~/policy-templates/patterns/pattern-effect-details-1.json":::
@@ -31,7 +31,7 @@ the _add_ **operation** and the parameters are used to set the tag and its value
3131

3232
This policy definition audits each virtual machine for when an extension, defined in parameters
3333
**publisher** and **type**, doesn't exist. It uses
34-
[auditIfNotExists](../concepts/effects.md#auditifnotexists) to check a resource related to the
34+
[auditIfNotExists](../concepts/effect-audit.mdifnotexists) to check a resource related to the
3535
virtual machine to see whether an instance exists that matches the defined parameters. This example
3636
checks the **extensions** type.
3737

@@ -43,12 +43,12 @@ checks the **extensions** type.
4343

4444
An **auditIfNotExists** effect requires the **policyRule.then.details** block to define both a
4545
**type** and the **existenceCondition** to look for. The **existenceCondition** uses policy language
46-
elements, such as [logical operators](../concepts/definition-structure.md#logical-operators), to
46+
elements, such as [logical operators](../concepts/definition-structure-policy-rule.md#logical-operators), to
4747
determine whether a matching related resource exists. In this example, the values checked against
48-
each [alias](../concepts/definition-structure.md#aliases) are defined in parameters.
48+
each [alias](../concepts/definition-structure-alias.md) are defined in parameters.
4949

5050
## Next steps
5151

5252
- Review other [patterns and built-in definitions](./index.md).
53-
- Review the [Azure Policy definition structure](../concepts/definition-structure.md).
54-
- Review [Understanding policy effects](../concepts/effects.md).
53+
- Review the [Azure Policy definition structure](../concepts/definition-structure-basics.md).
54+
- Review [Understanding policy effects](../concepts/effect-basics.md).

articles/governance/policy/samples/pattern-fields.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,15 @@ ms.topic: sample
66
---
77
# Azure Policy pattern: field properties
88

9-
The [field](../concepts/definition-structure.md#fields) operator evaluates the specified property or
10-
[alias](../concepts/definition-structure.md#aliases) to a provided value for a given
11-
[condition](../concepts/definition-structure.md#conditions).
9+
The [field](../concepts/definition-structure-policy-rule.md#fields) operator evaluates the specified property or
10+
[alias](../concepts/definition-structure-alias.md) to a provided value for a given
11+
[condition](../concepts/definition-structure-policy-rule.md#conditions).
1212

1313
## Sample policy definition
1414

1515
This policy definition enables you to define allowed regions that meet your organization's
1616
geo-location requirements. The allowed resources are defined in parameter **listOfAllowedLocations**
17-
(_array_). Resources that match the definition are [denied](../concepts/effects.md#deny).
17+
(_array_). Resources that match the definition are [denied](../concepts/effect-deny.md).
1818

1919
:::code language="json" source="~/policy-templates/patterns/pattern-fields.json":::
2020

@@ -23,7 +23,7 @@ geo-location requirements. The allowed resources are defined in parameter **list
2323
:::code language="json" source="~/policy-templates/patterns/pattern-fields.json" range="18-36" highlight="3,7,11":::
2424

2525
The **field** operator is used three times within the
26-
[logical operator](../concepts/definition-structure.md#logical-operators) **allOf**.
26+
[logical operator](../concepts/definition-structure-policy-rule.md#logical-operators) **allOf**.
2727

2828
- The first use evaluates the `location` property with the **notIn** condition to the
2929
**listOfAllowedLocations** parameter. **notIn** works as it expects an _array_ and the parameter
@@ -42,5 +42,5 @@ creation or update is blocked by Azure Policy.
4242
## Next steps
4343

4444
- Review other [patterns and built-in definitions](./index.md).
45-
- Review the [Azure Policy definition structure](../concepts/definition-structure.md).
46-
- Review [Understanding policy effects](../concepts/effects.md).
45+
- Review the [Azure Policy definition structure](../concepts/definition-structure-basics.md).
46+
- Review [Understanding policy effects](../concepts/effect-basics.md).

articles/governance/policy/samples/pattern-group-with-initiative.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,5 +42,5 @@ passthrough of values improves reuse.
4242
## Next steps
4343

4444
- Review other [patterns and built-in definitions](./index.md).
45-
- Review the [Azure Policy definition structure](../concepts/definition-structure.md).
46-
- Review [Understanding policy effects](../concepts/effects.md).
45+
- Review the [Azure Policy definition structure](../concepts/definition-structure-basics.md).
46+
- Review [Understanding policy effects](../concepts/effect-basics.md).

articles/governance/policy/samples/pattern-logical-operators.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ ms.topic: sample
88

99
A policy definition can contain several conditional statements. You might need each statement to be
1010
true or only need some of them to be true. To support these needs, the language has
11-
[logical operators](../concepts/definition-structure.md#logical-operators) for **not**, **allOf**,
11+
[logical operators](../concepts/definition-structure-policy-rule.md#logical-operators) for **not**, **allOf**,
1212
and **anyOf**. They're optional and can be nested to create complex scenarios.
1313

1414
## Sample 1: One logical operator
1515

1616
This policy definition evaluates [Azure Cosmos DB](/azure/cosmos-db/introduction) accounts to
1717
see whether automatic failovers and multiple write locations are configured. When they aren't, the
18-
[audit](../concepts/effects.md#audit) triggers and creates a log entry when the non-compliant
18+
[audit](../concepts/effect-audit.md) triggers and creates a log entry when the non-compliant
1919
resource is created or updated.
2020

2121
:::code language="json" source="~/policy-templates/patterns/pattern-logical-operators-1.json":::
@@ -30,7 +30,7 @@ Only when all of these conditions evaluate to true does the **audit** effect tri
3030
## Sample 2: Multiple logical operators
3131

3232
This policy definition evaluates resources for a naming pattern. If a resource doesn't match, it's
33-
[denied](../concepts/effects.md#deny).
33+
[denied](../concepts/effect-deny.md).
3434

3535
:::code language="json" source="~/policy-templates/patterns/pattern-logical-operators-2.json":::
3636

@@ -62,5 +62,5 @@ conditions in the **anyOf** are true, the policy effect triggers.
6262
## Next steps
6363

6464
- Review other [patterns and built-in definitions](./index.md).
65-
- Review the [Azure Policy definition structure](../concepts/definition-structure.md).
66-
- Review [Understanding policy effects](../concepts/effects.md).
65+
- Review the [Azure Policy definition structure](../concepts/definition-structure-basics.md).
66+
- Review [Understanding policy effects](../concepts/effect-basics.md).

articles/governance/policy/samples/pattern-parameters.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: sample
77
# Azure Policy pattern: parameters
88

99
A policy definition can be made dynamic to reduce the number of policy definitions that are needed
10-
by using [parameters](../concepts/definition-structure.md#parameters). The parameter is defined
10+
by using [parameters](../concepts/definition-structure-parameters.md). The parameter is defined
1111
during policy assignment. Parameters have a set of pre-defined properties that describe the
1212
parameter and how it's used.
1313

@@ -39,7 +39,7 @@ used to define the field that is evaluated, which is a tag with the value of **t
3939

4040
This policy definition uses a single parameter, **listOfBandwidthinMbps**, to check if the Express
4141
Route Circuit resource has configured the bandwidth setting to one of the approved values. If it
42-
doesn't match, the creation or update to the resource is [denied](../concepts/effects.md#deny).
42+
doesn't match, the creation or update to the resource is [denied](../concepts/effect-deny.md).
4343

4444
:::code language="json" source="~/policy-templates/patterns/pattern-parameters-2.json":::
4545

@@ -51,7 +51,7 @@ In this portion of the policy definition, the **listOfBandwidthinMbps** paramete
5151
_array_ and a description is provided for its use. As an _array_, it has multiple values to match.
5252

5353
The parameter is then used in the **policyRule.if** block. As an _array_ parameter, an _array_
54-
[condition](../concepts/definition-structure.md#conditions)'s **in** or **notIn** must be used.
54+
[condition](../concepts/definition-structure-policy-rule.md#conditions)'s **in** or **notIn** must be used.
5555
Here, it's used against the **serviceProvider.bandwidthInMbps** alias as one of the defined values.
5656

5757
:::code language="json" source="~/policy-templates/patterns/pattern-parameters-2.json" range="21-24" highlight="3":::
@@ -79,5 +79,5 @@ The parameter is then used in the **policyRule.then** block for the _effect_.
7979
## Next steps
8080

8181
- Review other [patterns and built-in definitions](./index.md).
82-
- Review the [Azure Policy definition structure](../concepts/definition-structure.md).
83-
- Review [Understanding policy effects](../concepts/effects.md).
82+
- Review the [Azure Policy definition structure](../concepts/definition-structure-basics.md).
83+
- Review [Understanding policy effects](../concepts/effect-basics.md).

articles/governance/policy/samples/pattern-tags.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: sample
99
[Tags](/azure/azure-resource-manager/management/tag-resources) are an important part of
1010
managing, organizing, and governing your Azure resources. Azure Policy makes it possible to
1111
configure tags on your new and existing resources at scale with the
12-
[modify](../concepts/effects.md#modify) effect and
12+
[modify](../concepts/effect-modify.md) effect and
1313
[remediation tasks](../how-to/remediate-resources.md).
1414

1515
## Sample 1: Parameterize tags
@@ -31,7 +31,7 @@ for any number of tag name and tag value combinations, but only maintain a singl
3131

3232
In this sample, **mode** is set to _All_ since it targets a resource group. In most cases, **mode**
3333
should be set to _Indexed_ when working with tags. For more information, see
34-
[modes](../concepts/definition-structure.md#resource-manager-modes).
34+
[modes](../concepts/definition-structure-basics.md#resource-manager-modes).
3535

3636
:::code language="json" source="~/policy-templates/patterns/pattern-tags-1.json" range="26-36" highlight="7-8":::
3737

@@ -58,7 +58,7 @@ the parent resource group.
5858

5959
In this sample, **mode** is set to _Indexed_ since it doesn't target a resource group or
6060
subscription even though it gets the value from a resource group. For more information, see
61-
[modes](../concepts/definition-structure.md#resource-manager-modes).
61+
[modes](../concepts/definition-structure-basics.md#mode).
6262

6363
:::code language="json" source="~/policy-templates/patterns/pattern-tags-2.json" range="19-29" highlight="3-4,7-8":::
6464

@@ -78,5 +78,5 @@ update existing resources.
7878
## Next steps
7979

8080
- Review other [patterns and built-in definitions](./index.md).
81-
- Review the [Azure Policy definition structure](../concepts/definition-structure.md).
82-
- Review [Understanding policy effects](../concepts/effects.md).
81+
- Review the [Azure Policy definition structure](../concepts/definition-structure-basics.md).
82+
- Review [Understanding policy effects](../concepts/effect-basics.md).

0 commit comments

Comments
 (0)