Skip to content

Sample implementation of an end to end Cloud Custodian deployment on Azure

License

Notifications You must be signed in to change notification settings

justinhauer/cloud-custodian-pipeline-sample

 
 

Repository files navigation

Cloud Custodian Azure DevOps Pipelines Sample

This is a sample implementation of an end to end Cloud Custodian deployment on Azure

Overview

At a high level, this sample pipeline enables you to

  • Author Cloud Custodian policies in a code-first, pull request driven way
  • Validate policies using Azure Pipelines
    • Verify that policies are well-formed
    • See what resources will be impacted by a proposed policy change before rolling it out to production
  • Deploy policies into production as Azure Functions
  • Alert resource owners on policy violations
  • Aggregate and visualize policy results

You'll need to do some one-time setup to configure security, CI/CD, the data processing pipeline, and the mailer used to notify resource owners of policy violations. After this is done, you can iterate on policy development in a safe and automated environment. Follow the Setup Guide to get started.

The sample uses an Azure DevOps YAML-based build pointing to azure-pipelines.yml. You will need to edit this file and replace variable values with values specific to your Azure subscription and environment. The build runs on pull requests to validate new policies and identify what resources will be affected by proposed changes. Check out the Build docs for a deep dive on individual tasks.

Currently, Azure DevOps does not support YAML-based releases. You will need to follow our Release docs to set up your deployment strategy.

Visualization

Cloud custodian generates logs in multiple formats and stores them in Azure Blob Storage. One of the output types contains .json of the resources identified by policies that were run. Those logs can be extracted by Azure Power BI and presented in a visual form. Sample Power BI report (custodian-policy-results.pbix) can be found in the reports directory.

  • open the file in Power BI desktop application
  • right click on the custodianlogs data source and chose "Edit query"
  • in the opened query editor right click on the custodianlogs query and chose "Advanced Editor"
  • replace storageaccount in the first line with your storage account name
  • click "Close & Apply" button

The report will show:

  • list of policies that were executed
  • list of results
  • total count of identified resources
  • total count of identified subscriptions

For adding additional report items and visualization see Power BI documentation.

Security Considerations

The general assumption in this sample is that only trusted people can modify policies. azure-pipelines.yml contains the build definition that will be executed automatically upon receiving a pull request. This means that whoever can send pull requests can execute arbitrary code and access the Service Principals stored in Key Vault - which have access to your Azure Subscriptions. Do not accept pull request from untrusted people.

If you want to have separate permission sets for people who can create policies and those who can manage subscriptions, you'll need to implement additional security measures. Possible solutions are: having an additional branch that doesn't execute dry run or moving pull request validation logic to a standalone service, see: Customize and extend pull request workflows with pull request status.

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.microsoft.com.

When you submit a pull request, a CLA-bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., label, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact [email protected] with any additional questions or comments.

About

Sample implementation of an end to end Cloud Custodian deployment on Azure

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 44.3%
  • Shell 29.9%
  • C# 24.7%
  • JSONiq 1.1%