-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create the cloud-governance infra: User, Policy, Bucket #834
Conversation
87f1d0b
to
b893e0b
Compare
@athiruma, do u want to add how_to image ? |
Writing README docs |
869e7c2
to
94a1b57
Compare
Done, please verify the docs |
/review @ebattat |
|
||
```shell | ||
./create_infra.sh --help | ||
``` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do you want to add image that the explain the process ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
./create_infra.sh --username "$USERNAME" --s3-bucket-name "$BUCKET_NAME" --policy-type delete
Dont need to run
terraform destroy
jenkins/tenant/aws/README.md
Outdated
1. Create AWS User and attach user by [CloudGovernanceDeletePolicy.json](../../../iam/clouds/aws/CloudGovernanceDeletePolicy.json). [ Note: Replace account_id with actual account id] | ||
|
||
1. Create AWS User and attach user | ||
by [CloudGovernanceDeletePolicy.json](../../../iam/clouds/aws/CloudGovernanceCloudCreds/CloudGovernanceDeletePolicy.json). [ Note: Replace account_id with actual account id] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why its different from the create infra flow ?
a7868c1
to
7da3b80
Compare
- Install [AWS-CLI](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html). | ||
- Configure IAM Access credentials. | ||
- Permissions required for the User. | ||
```json lines |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why we need to display it in the readme, and why its include delete policies ?
5. Add account_name to account variable in this [PolicyJenkinsfileDaily](../aws/template/PolicyJenkinsfileDaily) and [TaggingJenkinsfileHourly](../aws/template/TaggingJenkinsfileHourly). | ||
6. Create two Jenkins jobs by using this two Jenkinsfile | ||
|
||
1. Create IAM User with Read/Delete Permissions and create S3 bucket. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think you need to update the readme to use terraform steps
Also pls add the tfvars file for variable
e55046b
to
e760460
Compare
|
||
```shell | ||
./create_infra.sh --help | ||
``` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
./create_infra.sh --username "$USERNAME" --s3-bucket-name "$BUCKET_NAME" --policy-type delete
Dont need to run
terraform destroy
|
||
```shell | ||
terraform init | ||
terraform apply -var=IAM_USERNAME="${USERNAME}" -var=IAM_POLICY_NAME="${IAM_POLICY_NAME}" -var =S3_BUCKET_NAME="${S3_BUCKET_NAME}" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pls put the value of
USERNAME
IAM_POLICY_NAME
S3_BUCKET_NAME
3064efc
to
3c1fa18
Compare
/review @ebattat |
@athiruma, pls remove all the readme file in module and have only 1 readme with working steps:
|
3c1fa18
to
2a1a5a6
Compare
done |
2a1a5a6
to
f56b772
Compare
], | ||
"Resource": "*" | ||
}, | ||
{ | ||
"Sid": "EC2AccountLevel", | ||
"Effect": "Allow", | ||
"Action": [ | ||
"ec2:DeleteTags", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we need it in Read policy: ec2:DeleteTags
@@ -70,7 +76,8 @@ | |||
"Action": [ | |||
"elasticloadbalancing:DescribeTags", | |||
"elasticloadbalancing:AddTags", | |||
"elasticloadbalancing:DescribeLoadBalancers" | |||
"elasticloadbalancing:DescribeLoadBalancers", | |||
"elasticloadbalancing:RemoveTags" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"elasticloadbalancing:RemoveTags" read policy ?
f56b772
to
2ec0837
Compare
2ec0837
to
6b08d03
Compare
Type of change
Note: Fill x in []
Description
Create the CloudGovernance Infra:
Created the terraform script to create the resources.
Note: Access Keys will be displayed on the terminal output, copied and shared with the user.
For security reasons, all pull requests need to be approved first before running any automated CI