You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Local Directory |[local_directory](./turbot/local_directory)| Create local directory and users in your workspace |
10
-
| AWS Setup |[aws_setup](./aws/aws_setup)| Common quickstart setup for AWS - prepare your environment to import an AWS account |
11
-
| AWS Account Import |[aws_account_import](./aws/aws_account_import)| Import an AWS Account into Guardrails |
12
-
| AWS Services |[aws_services](./aws/aws_services)| Enable/Disable AWS Services in Guardrails |
13
-
| GCP Setup |[gcp_setup](./gcp/gcp_setup)| Common quickstart setup for GCP - prepare your environment to import GCP Projects |
14
-
| GCP Services |[gcp_services](./gcp/gcp_services)| Enable/Disable GCP Services in Guardrails & also enforce api enabled policy based on service Enable/Disable |
15
-
| Azure Subscription Import |[azure_sub_import](./azure/azure_sub_import)| Import an Azure subscription into Guardrails |
16
-
| Azure Subscription Readonly |[azure_sub_import_ro](./azure/azure_sub_create_then_import_ro)| Import an Azure subscription into Guardrails with event handler and readonly mode |
17
-
| Azure Services |[azure_services](./azure/azure_services)| Enable/Disable Azure Services in Guardrails |
18
-
| Azure Provider Registration |[azure_provider_registration](./azure/azure_provider_registration)| Set the policy for Azure provider registration |
19
-
20
-
## Prerequisites
21
-
22
-
To run Turbot Guardrails baselines, you must install:
| AWS Mods |[aws_mods](./aws/aws_mods)| A common list of AWS mods to install |
10
+
| AWS Service Enabled |[aws_service_enabled](./aws/aws_service_enabled)| Enable or disable AWS services in Guardrails |
11
+
| Azure Mods |[azure_mods](./azure/azure_mods)| A common list of Azure mods to install |
12
+
| Azure Service Enabled |[azure_service_enabled](./azure/azure_service_enabled)| Enable or disable Azure services in Guardrails; register or deregister Azure providers |
13
+
| GCP Mods |[gcp_mods](./gcp/gcp_mods)| A common list of Google Cloud Platform (GCP) mods to install |
14
+
| GCP Service Enabled |[gcp_service_enabled](./gcp/gcp_service_enabled)| Enable or disable GCP services in Guardrails; enable or disable GCP Service APIs |
15
+
| Folder Hierarchy |[folder_hierarchy](./guardrails/folder_hierarchy)| Create a folder hierarchy in your workspace |
16
+
| Guardrails Mods |[guardrails_mods](./guardrails/guardrails_mods)| A common list of Guardrails mods to install |
17
+
| Local Directory |[local_directory](./guardrails/local_directory)| Create a local directory and users in your workspace |
18
+
| Turbot Directory |[turbot_directory](./guardrails/turbot_profiles)| Create Turbot directory and profiles in your workspace |
19
+
| Workspace Settings |[workspace_settings](./guardrails/workspace_settings)| Apply a common set of policies for better management of your workspace |
Additionally, You must set your `config.tf` or environment variables to connect to your Turbot Guardrails workspace, as detail in the Turbot Guardrails Terraform Provider [Installation Instructions](https://turbot.com/guardrails/docs/reference/terraform/setup)
27
+
### Credentials
28
28
29
-
## Running a Baseline
29
+
To create a policy pack through Terraform:
30
30
31
-
To run a baseline:
31
+
- Ensure you have `Turbot/Owner` permissions in Guardrails
32
+
-[Create access keys](https://turbot.com/guardrails/docs/guides/iam/access-keys#generate-a-new-guardrails-api-access-key) in Guardrails
32
33
33
-
1. Install and configure the [prerequisites](#prerequisites)
34
-
1. At the command line, go to the directory for the baseline, for example: `cd mod_install`
35
-
1. Run `terraform init` to initialize terraform in the directory
36
-
1. Edit any variables in the .tf file that you wish to change, or override with [environment variables](https://www.terraform.io/docs/commands/environment-variables.html) or [variable files](https://www.terraform.io/docs/configuration/variables.html#variable-definitions-tfvars-files)
37
-
1. Run `terraform plan -var-file="<fileName>.tfvars"` and inspect the changes
38
-
1. Run `terraform apply -var-file="<fileName>.tfvars"` to apply the configuration
34
+
And then set your credentials:
39
35
40
-
## Contributing
36
+
```sh
37
+
export TURBOT_WORKSPACE=myworkspace.acme.com
38
+
export TURBOT_ACCESS_KEY=acce6ac5-access-key-here
39
+
export TURBOT_SECRET_KEY=a8af61ec-secret-key-here
40
+
```
41
41
42
-
### Structure
42
+
Please see [Turbot Guardrails Provider authentication](https://registry.terraform.io/providers/turbot/turbot/latest/docs#authentication) for additional authentication methods.
43
43
44
-
Baselines are implemented as independently deployable terraform configurations in a sub-directory of this repository.
44
+
## Usage
45
45
46
-
Commonly changed parameters are implemented using variables. All variables have default values, but they may not be the settings that you want, you may change them as required.
46
+
### Install Baseline
47
47
48
-
The baseline mods contain an individual `README.md` file and follows a specified file structure containing the parameters and configurations. Each baseline mod contains:
48
+
Clone:
49
49
50
-
-`Variables.tf` containing the variable definitions
0 commit comments