Project Description

We would like to create a single interface for teams to manage our cloud governance.

We currently provide landing zones for AWS, GCP, and Azure, but in providing them, we’re becoming a central bottleneck, as most changes need to go through us. For our cloud usage to grow, we need to improve our processes, and delegate some responsibility when needed, especially in tasks where we’re not the subject-matter experts. We hope to empower everyone, including non-technical employees, to claim ownership over the processes that matter to them, and strengthen our current offerings.

Goal for this Hack Week

One of the major areas for improvement is the processes around tag maintenance. We use tags to manage account ownership, contact information, billing, alerting, and more. Because they’re a central part in our environments, we need to treat them as first-class citizens and ensure they’re always up-to-date. Our current setup setup isn't sufficient: we manage them in four separate repositories (change risk) and cannot easily allow non-technical employees to make changes.

This project was born out of our centralization efforts, a hope that we could manage our tags with care, and the desire to make a solid foundation for our governance to grow.

There is much we would like to accomplish, but here are the scoped tasks for Hack Week 21:

  • To collect cloud tags for cloud providers (starting with AWS).
  • To allow users to edit tags.
  • To detect tag drift (notifications when the tags aren’t what they should be).
  • To have Okta manage users/groups with SCIM.

In last year’s Hack Week, we experimented with a similar concept, but it covered cloud costs. This year, we took the lessons learned, and used parts of it to start our new project. You can view last year’s efforts at our GitHub project.

Resources

Looking for hackers with the skills:

kubernetes golang angular aws azure gcp

This project is part of:

Hack Week 21

Activity

  • almost 2 years ago: tmuntan1 joined this project.
  • almost 2 years ago: RicardoFelipeKlein started this project.
  • almost 2 years ago: RicardoFelipeKlein liked this project.
  • almost 2 years ago: tmuntan1 added keyword "kubernetes" to this project.
  • almost 2 years ago: tmuntan1 added keyword "golang" to this project.
  • almost 2 years ago: tmuntan1 added keyword "angular" to this project.
  • almost 2 years ago: tmuntan1 added keyword "aws" to this project.
  • almost 2 years ago: tmuntan1 added keyword "azure" to this project.
  • almost 2 years ago: tmuntan1 added keyword "gcp" to this project.
  • almost 2 years ago: tmuntan1 originated this project.

  • Comments

    Be the first to comment!

    Similar Projects

    RKE2/K3S working on IBM Power by tkelly

    [comment]: # (Please use the project descriptio...


    Predefined app security policy template for NeuVector by feih

    Project Description

    Idea is to predefin...


    A CLI for Harvester by mohamed.belgaied

    [comment]: # Harvester does not officially come...


    mikrolite - a cli to create lighweight Kubernetes clusters using microvms by rcase

    [comment]: # (Please use the project descriptio...


    Go zip updater: Appending new files to zip archive without decompressing the whole file by StarryWang

    Project Description

    Currently, Golang's `...


    Gameboy emulator written in Go by mikeletux

    [comment]: # (Please use the project descriptio...


    A CLI for Harvester by mohamed.belgaied

    [comment]: # Harvester does not officially come...


    terraform-provider-feilong by e_bischoff

    Project Description

    People need to test o...


    Rancher Upgrader - Upgrades your rancher install via helm, and communicates critical changes from release A to B. by rweir

    [comment]: # (Please use the project descriptio...


    Cobbler Angular Web Interface by SchoolGuy

    Project Description

    The old Cobbler webin...