Project Description

We would like to create a single interface for teams to manage our cloud governance.

We currently provide landing zones for AWS, GCP, and Azure, but in providing them, we’re becoming a central bottleneck, as most changes need to go through us. For our cloud usage to grow, we need to improve our processes, and delegate some responsibility when needed, especially in tasks where we’re not the subject-matter experts. We hope to empower everyone, including non-technical employees, to claim ownership over the processes that matter to them, and strengthen our current offerings.

Goal for this Hack Week

One of the major areas for improvement is the processes around tag maintenance. We use tags to manage account ownership, contact information, billing, alerting, and more. Because they’re a central part in our environments, we need to treat them as first-class citizens and ensure they’re always up-to-date. Our current setup setup isn't sufficient: we manage them in four separate repositories (change risk) and cannot easily allow non-technical employees to make changes.

This project was born out of our centralization efforts, a hope that we could manage our tags with care, and the desire to make a solid foundation for our governance to grow.

There is much we would like to accomplish, but here are the scoped tasks for Hack Week 21:

  • To collect cloud tags for cloud providers (starting with AWS).
  • To allow users to edit tags.
  • To detect tag drift (notifications when the tags aren’t what they should be).
  • To have Okta manage users/groups with SCIM.

In last year’s Hack Week, we experimented with a similar concept, but it covered cloud costs. This year, we took the lessons learned, and used parts of it to start our new project. You can view last year’s efforts at our GitHub project.

Resources

Looking for hackers with the skills:

kubernetes golang angular aws azure gcp

This project is part of:

Hack Week 21

Activity

  • over 2 years ago: tmuntan1 joined this project.
  • over 2 years ago: RicardoFelipeKlein started this project.
  • over 2 years ago: RicardoFelipeKlein liked this project.
  • over 2 years ago: tmuntan1 added keyword "kubernetes" to this project.
  • over 2 years ago: tmuntan1 added keyword "golang" to this project.
  • over 2 years ago: tmuntan1 added keyword "angular" to this project.
  • over 2 years ago: tmuntan1 added keyword "aws" to this project.
  • over 2 years ago: tmuntan1 added keyword "azure" to this project.
  • over 2 years ago: tmuntan1 added keyword "gcp" to this project.
  • over 2 years ago: tmuntan1 originated this project.

  • Comments

    Be the first to comment!

    Similar Projects

    Introducing "Bottles": A Proof of Concept for Multi-Version CRD Management in Kubernetes by aruiz

    Description

    As we delve deeper into the c...


    SUSE AI Meets the Game Board by moio

    Use [tabletopgames.ai](https://tabletopgames.ai...


    Learn enough Golang and hack on CoreDNS by jkuzilek

    Description

    I'm implementing a split-horizo...


    A CLI for Harvester by mohamed.belgaied

    [comment]: # Harvester does not officially come...


    Integrate Backstage with Rancher Manager by nwmacd

    Description

    Backstage (backstage.io) is a...


    Contribute to terraform-provider-libvirt by pinvernizzi

    Description

    The SUSE Manager (SUMA) tea...


    OpenQA Golang api client by hilchev

    Description

    I would like to make a simple c...


    Dartboard TUI by IValentin

    Description

    Our scalability and performance...


    A CLI for Harvester by mohamed.belgaied

    [comment]: # Harvester does not officially come...


    Learn enough Golang and hack on CoreDNS by jkuzilek

    Description

    I'm implementing a split-horizo...


    Cobbler Angular Web Interface by SchoolGuy

    Project Description

    The old Cobbler webin...


    SUSE AI Meets the Game Board by moio

    Use [tabletopgames.ai](https://tabletopgames.ai...