This repository has been archived by the owner on Dec 1, 2022. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 7
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #10 from globalbao/remove-provider-and-more-examples
Remove provider and add count example
- Loading branch information
Showing
11 changed files
with
195 additions
and
65 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,66 @@ | ||
# Terraform AzureRM Policy Exemptions | ||
|
||
Leverges Terraform's [resource group template deployment](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/resource_group_template_deployment) for managing [policy exemptions](https://docs.microsoft.com/en-us/azure/templates/microsoft.authorization/policyexemptions). | ||
|
||
Learn more about [Azure Policy Exemptions](https://docs.microsoft.com/en-us/azure/governance/policy/concepts/exemption-structure) | ||
|
||
# Example Usage | ||
|
||
* Use a count expression on a variable to determine if policy exemptions are created. | ||
* Create 3 policy exemptions with only 'exemption1' referencing select policies to be exempted (via policyDefinitionReferenceIds). | ||
|
||
```hcl | ||
module "policy_exemptions" { | ||
count = var.exemptions_required ? 1 : 0 | ||
source = "globalbao/policy-exemptions/azurerm" | ||
version = "0.2.1" | ||
policyExemptions = { | ||
exemption1 = { | ||
deploymentMode = "Incremental" | ||
name = "exemption1" | ||
displayName = "exemption1 for Insert-Your-RG-Name1" | ||
description = "exemption1 waives compliance on an resource group" | ||
resourceGroupName = "Insert-Your-RG-Name1" | ||
policyAssignmentId = "/providers/Microsoft.Management/managementGroups/production/providers/Microsoft.Authorization/policyAssignments/2f97de7d41f348529e23d8ae" | ||
policyDefinitionReferenceIds = [ | ||
"installLogAnalyticsAgentOnVmMonitoring", | ||
"installLogAnalyticsAgentOnVmssMonitoring", | ||
"windowsDefenderExploitGuardMonitoring", | ||
"useRbacRulesMonitoring" | ||
] | ||
exemptionCategory = "Waiver" | ||
expiresOn = "2025-12-30" | ||
metadata = { | ||
"requestedBy" : "RG team", | ||
"approvedBy" : "DrGovernance", | ||
"approvedOn" : "2021-07-26", | ||
"ticketRef" : "123456" | ||
} | ||
}, | ||
exemption2 = { | ||
deploymentMode = "Incremental" | ||
name = "exemption2" | ||
displayName = "exemption2 for Insert-Your-RG-Name2" | ||
description = "exemption2 waives compliance on an resource group" | ||
resourceGroupName = "Insert-Your-RG-Name2" | ||
policyAssignmentId = "/providers/Microsoft.Management/managementGroups/production/providers/Microsoft.Authorization/policyAssignments/2f97de7d41f348529e23d8ae" | ||
policyDefinitionReferenceIds = [] | ||
exemptionCategory = "Mitigated" | ||
expiresOn = "2025-12-31" | ||
metadata = {} | ||
}, | ||
exemption3 = { | ||
deploymentMode = "Incremental" | ||
name = "exemption3" | ||
displayName = "exemption3 for Insert-Your-RG-Name3" | ||
description = "exemption3 waives compliance on an resource group" | ||
resourceGroupName = "Insert-Your-RG-Name3" | ||
policyAssignmentId = "/providers/Microsoft.Management/managementGroups/production/providers/Microsoft.Authorization/policyAssignments/2f97de7d41f348529e23d8ae" | ||
policyDefinitionReferenceIds = [] | ||
exemptionCategory = "Waiver" | ||
expiresOn = "2025-12-29" | ||
metadata = {} | ||
} | ||
} | ||
} | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,53 @@ | ||
module "policy_exemptions" { | ||
count = var.exemptions_required ? 1 : 0 | ||
source = "globalbao/policy-exemptions/azurerm" | ||
version = "0.2.1" | ||
policyExemptions = { | ||
exemption1 = { | ||
deploymentMode = "Incremental" | ||
name = "exemption1" | ||
displayName = "exemption1 for Insert-Your-RG-Name1" | ||
description = "exemption1 waives compliance on an resource group" | ||
resourceGroupName = "Insert-Your-RG-Name1" | ||
policyAssignmentId = "/providers/Microsoft.Management/managementGroups/production/providers/Microsoft.Authorization/policyAssignments/2f97de7d41f348529e23d8ae" | ||
policyDefinitionReferenceIds = [ | ||
"installLogAnalyticsAgentOnVmMonitoring", | ||
"installLogAnalyticsAgentOnVmssMonitoring", | ||
"windowsDefenderExploitGuardMonitoring", | ||
"useRbacRulesMonitoring" | ||
] | ||
exemptionCategory = "Waiver" | ||
expiresOn = "2025-12-30" | ||
metadata = { | ||
"requestedBy" : "RG team", | ||
"approvedBy" : "DrGovernance", | ||
"approvedOn" : "2021-07-26", | ||
"ticketRef" : "123456" | ||
} | ||
}, | ||
exemption2 = { | ||
deploymentMode = "Incremental" | ||
name = "exemption2" | ||
displayName = "exemption2 for Insert-Your-RG-Name2" | ||
description = "exemption2 waives compliance on an resource group" | ||
resourceGroupName = "Insert-Your-RG-Name2" | ||
policyAssignmentId = "/providers/Microsoft.Management/managementGroups/production/providers/Microsoft.Authorization/policyAssignments/2f97de7d41f348529e23d8ae" | ||
policyDefinitionReferenceIds = [] | ||
exemptionCategory = "Mitigated" | ||
expiresOn = "2025-12-31" | ||
metadata = {} | ||
}, | ||
exemption3 = { | ||
deploymentMode = "Incremental" | ||
name = "exemption3" | ||
displayName = "exemption3 for Insert-Your-RG-Name3" | ||
description = "exemption3 waives compliance on an resource group" | ||
resourceGroupName = "Insert-Your-RG-Name3" | ||
policyAssignmentId = "/providers/Microsoft.Management/managementGroups/production/providers/Microsoft.Authorization/policyAssignments/2f97de7d41f348529e23d8ae" | ||
policyDefinitionReferenceIds = [] | ||
exemptionCategory = "Waiver" | ||
expiresOn = "2025-12-29" | ||
metadata = {} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,4 @@ | ||
output "policy_exemptions" { | ||
value = module.policy_exemptions | ||
description = "All output variables for policy exemptions module" | ||
} |
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
variable "exemptions_required" { | ||
type = bool | ||
default = true | ||
description = "Determines if policy exemptions are required" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
terraform { | ||
required_version = ">= 0.13" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,4 @@ | ||
output "variables" { | ||
value = module.policy_exemptions.variables | ||
} | ||
|
||
output "template_deployment" { | ||
value = module.policy_exemptions.template_deployment | ||
output "policy_exemptions" { | ||
value = module.policy_exemptions | ||
description = "All output variables for policy exemptions module" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,10 +1,12 @@ | ||
output "variables" { | ||
value = var.policyExemptions | ||
value = var.policyExemptions | ||
description = "Outputs the policy exemption variables" | ||
} | ||
|
||
output "template_deployment" { | ||
value = { | ||
for k, v in try(azurerm_resource_group_template_deployment.this.*, {}) : | ||
k => try(jsondecode(v), v) | ||
} | ||
description = "Outputs the policy exemption ARM template" | ||
} |