Project Description

We would like to create a single interface for teams to manage our cloud governance.

We currently provide landing zones for AWS, GCP, and Azure, but in providing them, we’re becoming a central bottleneck, as most changes need to go through us. For our cloud usage to grow, we need to improve our processes, and delegate some responsibility when needed, especially in tasks where we’re not the subject-matter experts. We hope to empower everyone, including non-technical employees, to claim ownership over the processes that matter to them, and strengthen our current offerings.

Goal for this Hack Week

One of the major areas for improvement is the processes around tag maintenance. We use tags to manage account ownership, contact information, billing, alerting, and more. Because they’re a central part in our environments, we need to treat them as first-class citizens and ensure they’re always up-to-date. Our current setup setup isn't sufficient: we manage them in four separate repositories (change risk) and cannot easily allow non-technical employees to make changes.

This project was born out of our centralization efforts, a hope that we could manage our tags with care, and the desire to make a solid foundation for our governance to grow.

There is much we would like to accomplish, but here are the scoped tasks for Hack Week 21:

  • To collect cloud tags for cloud providers (starting with AWS).
  • To allow users to edit tags.
  • To detect tag drift (notifications when the tags aren’t what they should be).
  • To have Okta manage users/groups with SCIM.

In last year’s Hack Week, we experimented with a similar concept, but it covered cloud costs. This year, we took the lessons learned, and used parts of it to start our new project. You can view last year’s efforts at our GitHub project.

Resources

Looking for hackers with the skills:

kubernetes golang angular aws azure gcp

This project is part of:

Hack Week 21

Activity

  • 2 months ago: tmuntan1 joined this project.
  • 2 months ago: RicardoFelipeKlein started this project.
  • 2 months ago: RicardoFelipeKlein liked this project.
  • 2 months ago: tmuntan1 added keyword "kubernetes" to this project.
  • 2 months ago: tmuntan1 added keyword "golang" to this project.
  • 2 months ago: tmuntan1 added keyword "angular" to this project.
  • 2 months ago: tmuntan1 added keyword "aws" to this project.
  • 2 months ago: tmuntan1 added keyword "azure" to this project.
  • 2 months ago: tmuntan1 added keyword "gcp" to this project.
  • 2 months ago: tmuntan1 originated this project.

  • Comments

    Be the first to comment!

    Similar Projects

    WASM support for cloud native buildpacks by atgracey

    [comment]: # (Please use the project descriptio...


    Uyuni/SUSE Manager Server Helm chart on k3s by moio

    ![Combined icons of k3s and Uyuni](https://user...


    Updatecli Kubernetes Operator by olblak

    [comment]: # (Please use the project descriptio...


    investigate seal secrets for used in a home-cluster (k3s + fluxci) by fcrozat

    [comment]: # (Please use the project descriptio...


    A CLI for Harvester by mohamed.belgaied

    [comment]: # Harvester does not officially come...


    Create a CLI tool for interacting with Rancher Support Matrix by dpock

    Rancher Support Matrix CLI Helper

    A tool t...


    Updatecli Kubernetes Operator by olblak

    [comment]: # (Please use the project descriptio...


    A CLI for Harvester by mohamed.belgaied

    [comment]: # Harvester does not officially come...


    Multi-cloud Lightweight metadata CLI by seanmarlow

    Project Description

    The goal of this proj...


    Add combustion support to the terraform-provider-libvirt by oholecek

    [comment]: # (Please use the project descriptio...


    Cobbler Angular Web Interface by SchoolGuy

    Project Description

    The old Cobbler webin...


    web-based testing tracker for aquarist-labs's s3gw by jluis

    [comment]: # (Please use the project descriptio...


    AWS Terraform Modules by mtrachier

    Project Description

    Provide modules in Te...


    Azure Active Directory for Linux by lramage

    Project Description

    [comment]: # (What ar...