-
Notifications
You must be signed in to change notification settings - Fork 2
✍️ Initial draft of tagging standards #25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
This is a work in progress initial draft of the tagging standards for AWS, based on https://github.com/LBHackney-IT/aws-tags-lbh and https://docs.google.com/document/d/1iWsgVYWXAbZQZDYP4PJ-Gv74rFRQUSdDC_XHHSiliXk/edit?pli=1&tab=t.0.
33e6582 to
a39b180
Compare
Because it's the landing page for this section of the documentation
This saves users from needing to open the tree. We may reconsider this is we get lots of content, but for now it's unneccessary
3aef3b8 to
3548181
Compare
Co-authored-by: Stuart Stone <10559951+stonest@users.noreply.github.com>
|
finally having a standard for tagging will enable us to get better transparency visualisation on cost and governance, make it easier to find where resources in AWS are originally defined in Github and gives us potential to make our iam policies for users better so i'm a big fan of this |
LBHMKeyworth
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Agreed, this all seems sensible to me.
A few thoughts:
- Is there a need to tag resources with a commit hash (and/or version) that deployed them?
- I wonder whether there's scope to eventually have some conditional-mandatory tags based on the resource type. (i.e. the Confidentiality tag for anything that holds data). I'm not sure how easy (if it's possible at all) it would be to put controls in place to check this.
- I also wonder about some resources we have now that have tags on them that are not relevant at all because we've tagged ALL resources at the provider level. For example a VPC with the Backup tag is pointless and noisy. (Not a priority now, but maybe something to look at in the future?)
|
I agree with your last two points. Hopefully this standard makes the tags more valuable, so further down the line it's even more worthwhile to do housekeeping like you described.
It's a good question. We'll get that with the AutomationBuildUrl (and I've added steps in the how to guide for that), but I reckon that'll create noise with myriad label updates for every build. I'm not sure if there's a better way which would only tag the resources that changed with the updated build ID/URL. Even just getting back to the repository with the IaC code would be good, so we could loosen the requirement to "either build URL or IaC source code URL", or use separate tags for that. Promoting "something is better than nothing" could get us more, better data. |
|
Hi, |
this feels a little like a 'nice to have' and could perhaps be an iteration planned for a later date? |
|
needless to say, I'm a big fan of this. there are myriad ways that we could use tags to improve, amongst others, our security, budgeting abilities, disaster recovery/business continuity planning -- the list goes on. I've had to reign in my own enthusiasm and desire to add more and more tags to this strategy, however, because I needed to remind myself that in the absence of any form of consistent tagging across all our services and applications, we need to try to achieve consistent coverage with a handful of 'must haves', before we tackle the 'should haves' and 'could haves'. in other words, let's agree an MVP, roll that out and then iterate. |
|
one last thing I forgot to mention:
|
for the second point, we can have an SCP the request that tag on a resource, and then with the tag policy et the values that it must be (if we cant just do that in the SCP as well) i.e. buckets must have a confidentiality tag with a value of INTERNAL, RESTRICTED, PUBLIC |
This is a consolidation of our tagging standards for AWS, based on https://github.com/LBHackney-IT/aws-tags-lbh and https://docs.google.com/document/d/1iWsgVYWXAbZQZDYP4PJ-Gv74rFRQUSdDC_XHHSiliXk/edit?pli=1&tab=t.0.
Deadline for comments
Comments and improvements are welcome! We'll iterate on this and discuss things both in Slack and on this PR directly.
The decision to approve and merge (or discard) this PR will be taken by Monday 27th of January. We'll aim for broad consensus (i.e. no major objections), but if there's disagreement, @LBHSPreston will have the final say.
Why this PR?
We need to keep track of the resources we're running in AWS to meet our security obligations:
All of this is currently tricky. We use tagging inconsistently across the estate, so some things can be reported on easier than others.
This PR introduces a baseline standard that consolidates the rules around tagging, but that introduces a new problem: what are the specific steps a developer needs to take for a system to be consistent with our approach?
This PR addresses both of those issues, following the Diataxis approach to technical documentation authoring.
Changes
This change adds:
Other areas of the site include content which could be a requirement or standard, however they're interspersed with other types of content and many are not current (or at least, not followed). This is an attempt to start archiving the old, irrelevant content and documenting the current standards we work to.
This first commit is very much a work in progress, for comments and iteration.
Things to do if this PR is merged:
AutomationTool: The tool used for Infrastructure as Code, e.g.TerraformorServerless Framework.PhaseStackPatch GroupProjectOOOShutdown(has been superceded)Team(replaced by TeamEmail)OOHShutdownandWeekendShutdowntagsOOHShutdownandWeekendShutdownand deprecateooh_shutdownandweekend_shutdown