You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/concepts/guardrails/stacks.md
+24-65Lines changed: 24 additions & 65 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Stack [Native] Guardrails
3
3
sidebar_label: Stack [Native]
4
4
---
5
5
6
-
# Stack [Native] Guardrails
6
+
# Stack [Native] Guardrails
7
7
8
8
## Overview
9
9
@@ -19,63 +19,22 @@ Guardrails provides many `Stack [Native]` controls in multiple mods. These stac
19
19
- Resource stacks target individual resources, allowing you to configure standard resources that should be associated with them. Resource stacks will run for every resource of that type, and will run whenever new resources of that type are discovered.
|**AWS > Account > Stack [Native]**| Account | Account-level settings and global services like Route53 and CloudFront. |
25
+
|**AWS > Region > Stack [Native]**| Region | Regional resources, like Lambda Functions, EC2 instances, SNS Topics, etc. |
26
+
|**AWS > IAM > Stack [Native]**| Account | IAM resources, like standard users, roles, policies, and identity providers. |
27
+
|**AWS > VPC > Stack [Native]**| Region | VPC resources to set your standard "landing zone" VPCs - subnets, security groups, gateways, etc. |
28
+
|**AWS > S3 > Bucket > Stack [Native]**| Bucket | Resources to associate with buckets such as lifecycle policies or replication configuration |
29
+
|**AWS > VPC > VPC > Stack [Native]**| VPC | Standard VPC resources that belong in *every* VPC, like security groups, gateways, NACLs, etc. |
30
+
|**AWS > CloudFront > Distribution > Stack [Native]**| Distribution | Resources to associate with CloudFront distributions such as logging, monitoring, or WAF configuration |
31
+
|**AWS > Secrets Manager > Secret > Stack [Native]**| Secret | Resources related to secrets such as key rotation, access policies, and tagging |
32
+
|**Azure > Subscription > Stack [Native]**| Subscription | Subscription-level settings and global services |
33
+
|**Azure > Network > Virtual Network > Stack [Native]**| Virtual Network | Standard network resources that belong in *every* Virtual Network |
34
+
|**Azure > Resource Group > Stack [Native]**| Resource Group | Resources like diagnostic settings, policies, and tags applied at the resource group level |
35
+
|**Azure > Key Vault > Vault > Stack [Native]**| Vault | Resources to associate with Key Vaults such as access policies, logging, and diagnostic settings |
36
+
|**Azure > Storage > Storage Account > Stack [Native]**| Storage Account | Resources to associate with storage accounts such as encryption, access configuration, and diagnostic settings |
37
+
|**GCP > Project > Stack [Native]**| Project | Project-level settings and global services |
79
38
80
39
81
40
## Example: Standard IAM policy
@@ -133,7 +92,7 @@ Create a policy setting for the `AWS > IAM > Stack [Native]` policy on an accoun
133
92
134
93
Stack behavior is controlled by the `Stack [Native]` policy and sub-policies.
| **Check: Configured** | An OpenTofu plan will be generated. If the planned configuration does not match the current configuration, the control will alarm.
150
109
| **Enforce: Configured** | An OpenTofu plan will be generated. If the planned configuration does not match the current configuration, the control will apply the configuration.
151
110
@@ -189,13 +148,13 @@ You may also choose to trigger the stack to run when resources change, but:
189
148
### Drift Detection Policies
190
149
Drift detection behavior is controlled by the following sub-policies.
| **Stack [Native] > Drift Detection** | Specify the mechanism for drift detection.
195
154
| **Stack [Native] > Drift Detection > Interval** | Specify the interval at which to run the stack, in minutes.
196
155
197
156
198
-
The `Stack [Native] > Drift Detection` policy allows you to specify the mechanism for drift detection. You may run the stack at regular intervals to keep the resources up to date, and/or automatically trigger the stack to run whenever a resource that it created is modified. Note that resource triggering will only be available for resources that exist in the Guardrails CMDB; you may install the supporting mods and enable the CMDB for those resources.
157
+
The `Stack [Native] > Drift Detection` policy allows you to specify the mechanism for drift detection. You may run the stack at regular intervals to keep the resources up to date, and/or automatically trigger the stack to run whenever a resource that it created is modified. Note that resource triggering will only be available for resources that exist in the Guardrails CMDB; you may install the supporting mods and enable the CMDB for those resources.
199
158
200
159
201
160
The `Stack [Native] > Drift Detection > Interval ` allows you to specify the interval at which to run the stack, in minutes. The default is `1440` (Once a day).
@@ -205,9 +164,9 @@ The `Stack [Native] > Drift Detection > Interval ` allows you to specify the int
205
164
206
165
The `Stack [Native] > Version` policy allows you to select which OpenTofu version Turbot should use for the stack.
207
166
208
-
The policy supports semver semantics, allowing you to use new versions automatically, or to pin to specific versions, depending on your preference.
167
+
The policy supports semver semantics, allowing you to use new versions automatically, or to pin to specific versions, depending on your preference.
209
168
210
-
By default this policy uses the global default value set in the `Turbot > Stack > Native Stack Version [Default]` policy. The shared default allows you to change only a single setting to change your default version, but still migrate versions over time on a per-stack basis.
169
+
By default this policy uses the global default value set in the `Turbot > Stack > Native Stack Version [Default]` policy. The shared default allows you to change only a single setting to change your default version, but still migrate versions over time on a per-stack basis.
211
170
212
171
Guardrails native stack containers include standard cloud [providers](https://opentofu.org/docs/language/providers/). These providers are bundled in the container image, so in practice, the provider versions are tied to the OpenTofu version. The following versions are currently supported:
0 commit comments