AWS Organizations Tag Policies 🎉
https://aws.amazon.com/blogs/mt/enforce-consistent-tagging-across-iac-deployments-with-aws-organizations-tag-policies/
Теперь, наконец-то, можно реально заставить прописывать нужные теги — иначе
https://github.com/hashicorp/terraform-provider-aws/blob/main/website/docs/guides/tag-policy-compliance.html.markdown
#CloudFormation #Terraform #Pulumi
https://aws.amazon.com/blogs/mt/enforce-consistent-tagging-across-iac-deployments-with-aws-organizations-tag-policies/
Теперь, наконец-то, можно реально заставить прописывать нужные теги — иначе
terraform plan не пройдёт.https://github.com/hashicorp/terraform-provider-aws/blob/main/website/docs/guides/tag-policy-compliance.html.markdown
provider "aws" {
tag_policy_compliance = "error"
}When set to error, tag policy violations will trigger an error diagnostic.
When set to warning, tag policy violations will trigger a warning diagnostic. Planned changes will be able to proceed, but the diagnostic will not be silenced until the tag policy violation is resolved.
When set to disabled, the tag policy will not be enforced. This is equivalent to leaving the value unset.
#CloudFormation #Terraform #Pulumi
Amazon
Enforce consistent tagging across IaC deployments with AWS Organizations Tag Policies | Amazon Web Services
Organizations manage thousands of AWS resources across multiple accounts and Regions to support their business operations. They want consistent tagging to support essential workflows such as attribute-based-access-controls (ABAC), cost allocation, organizing…
🔥16