Infrastructure as code based provisioning can easily grow to the point of chaos. Sentinel, which is HashiCorp's Policy as Code framework, can easily configure guardrails that are enforced within the provisioning workflow to protect against changes that don't follow security, regulatory compliance, or internal business policies. Check out how to apply some simple policies to your Azure based Terraform configurations!
Jump To:
[02:56] Demo: Validating a configuration is using the appropriate Azure VM type with Sentinel and HashiCorp Terraform Cloud
[05:18] Walking through the previously applied Sentinel policy to check for specific Azure VM types
Learn More:
More information https://aka.ms/DevOpsLab/AnnouncingSe...
Landing Zones in Azure with Terraform https://aka.ms/DevOpsLab/LandingZones
Getting Started https://aka.ms/DevOpsLab/EnforcewithS...
Getting started with Azure Sentinel https://aka.ms/DevOpsLab/WhatIsSentinel
Follow Kyle / kmruddy
Azure DevOps Docs https://aka.ms/AzureDevOps/Docs
GitHub Actions https://aka.ms/GitHubActions
Azure DevOps YouTube https://aka.ms/AzureDevOpsYouTube
Follow Abel / abelsquidhead
Create a Free Azure DevOps Account https://aka.ms/AA7uopu
Watch video Policy as Code with Terraform and Sentinel online without registration, duration hours minute second in high quality. This video was added by user DevOps on Azure 27 October 2020, don't forget to share it with your friends and acquaintances, it has been viewed on our site 4,856 once and liked it 36 people.