Policy types for @turbot/azure

Azure > Client ID

Azure client ID that has been delegated access to the tenant.

URI
tmod:@turbot/azure#/policy/types/clientId
Category
Parent
Schema
{
"type": "string",
"pattern": "^[a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}$",
"tests": [
{
"input": "b679c4b2-edf6-4c42-ba05-69c92dc09e38"
},
{
"description": "invalid - azure client id",
"input": "A61498f8-9caa-42de-9f6e-532bd0fe9f9b",
"expected": false
}
]
}

Azure > Client Secret

Azure client secret key for the client ID that has been delegated access to the tenant.

URI
tmod:@turbot/azure#/policy/types/clientKey
Category
Parent
Schema
{
"type": "string"
}

Azure > Environment

Defines the Azure Cloud Environment that subscription is going to use.

URI
tmod:@turbot/azure#/policy/types/environment
Category
Parent
Valid Value
[
"Global Cloud",
"US Government",
"China Cloud"
]
Schema
{
"type": "string",
"minLength": 1,
"enum": [
"Global Cloud",
"US Government",
"China Cloud"
],
"tests": [
{
"input": "US Government"
},
{
"input": "",
"expected": false
}
]
}

Azure > Management Group > CMDB

Configure whether to record and synchronize details for Azure
Azure management group(s) into the CMDB.

The CMDB control is
responsible for populating and updating all the attributes for that
resource type in the Guardrails CMDB.

Note that if CMDB is set to Skip for a resource, then it will not be added
to the CMDB, and no controls that target it will run.

URI
tmod:@turbot/azure#/policy/types/managementGroupCmdb
Category
Valid Value
[
"Skip",
"Enforce: Enabled",
"Enforce: Disabled"
]
Schema
{
"type": "string",
"enum": [
"Skip",
"Enforce: Enabled",
"Enforce: Disabled"
],
"example": [
"Skip"
],
"default": "Enforce: Enabled"
}

Azure > Resource Group > CMDB

Configure whether to record and synchronize details for the Azure resource group into the CMDB.

The CMDB control is responsible for populating and updating all the attributes for that resource type in the Guardrails CMDB.
All policies and controls in Guardrails are based around the resource, so usually the CMDB policy is set to "Enforce: Enabled".

If set to Skip then all changes to the CMDB are paused - no new resources will be discovered, no updates will be made and deleted resources will not be removed.

To cleanup resources and stop tracking changes, set this policy to "Enforce: Disabled".

URI
tmod:@turbot/azure#/policy/types/resourceGroupCmdb
Category
Valid Value
[
"Skip",
"Enforce: Enabled",
"Enforce: Disabled"
]
Schema
{
"type": "string",
"enum": [
"Skip",
"Enforce: Enabled",
"Enforce: Disabled"
],
"example": [
"Skip"
],
"default": "Enforce: Enabled"
}

Azure > Resource Group > Configured

Determine how to configure this resource.

Note: If the resource is managed by another stack, then the Skip/Check/Enforce values here are ignored
and inherit from the stack that owns it.

The policy values for Azure > Azure > Resource Group are deprecated and
replaced by new values. The deprecated values will be removed in the next major version.

| Deprecated Values | Current Values |
|--------------------------------------------------|----------------------------------------------------------------|
| Skip if using Configured > Source | Skip \\(unless claimed by a stack\\) |
| Check: Configured if using Configured > Source | Check: Per Configured > Source \\(unless claimed by a stack\\) |
| Enforce: Configured if using Configured > Source | Enforce: Per Configured > Source \\(unless claimed by a stack\\) |

URI
tmod:@turbot/azure#/policy/types/resourceGroupConfigured
Valid Value
[
"Skip if using Configured > Source",
"Check: Configured if using Configured > Source",
"Enforce: Configured if using Configured > Source",
"Skip (unless claimed by a stack)",
"Check: Per Configured > Source (unless claimed by a stack)",
"Enforce: Per Configured > Source (unless claimed by a stack)"
]
Schema
{
"enum": [
"Skip if using Configured > Source",
"Check: Configured if using Configured > Source",
"Enforce: Configured if using Configured > Source",
"Skip (unless claimed by a stack)",
"Check: Per Configured > Source (unless claimed by a stack)",
"Enforce: Per Configured > Source (unless claimed by a stack)"
],
"default": "Skip (unless claimed by a stack)"
}

Azure > Resource Group > Configured > Claim Precedence

An ordered list of who is allowed to claim a resource.
A stack cannot claim a resource if it is already claimed by another
stack at a higher level of precedence.

URI
tmod:@turbot/azure#/policy/types/resourceGroupConfiguredPrecedence
Default Template Input
"{\n defaultPrecedence: policy(uri:\"tmod:@turbot/turbot#/policy/types/claimPrecedenceDefault\")\n}\n"
Default Template
"{%- if $.defaultPrecedence | length == 0 %}[]{%- else %}{% for item in $.defaultPrecedence %}- '{{ item }}'{% endfor %}{% endif %}"
Schema
{
"type": "array",
"items": {
"type": "string"
}
}

Azure > Resource Group > Configured > Source

A HCL or JSON format Terraform configuration source used to configure this resource.

URI
tmod:@turbot/azure#/policy/types/resourceGroupConfiguredSource
Schema
{
"type": "string",
"default": "",
"x-schema-form": {
"type": "code",
"language": "hcl"
}
}

Azure > Resource Group > Stack

Configure a custom stack on Azure, per the custom Stack > Source.

A Guardrails Stack is a set of resources configured by Guardrails, as specified
via Terraform source. Stacks are responsible for the creation and deletion
of multiple resources. Once created, stack resources are responsible for
configuring themselves from the stack source via their Configured control.

URI
tmod:@turbot/azure#/policy/types/resourceGroupStack
Valid Value
[
"Skip",
"Check: Configured",
"Enforce: Configured"
]
Schema
{
"type": "string",
"enum": [
"Skip",
"Check: Configured",
"Enforce: Configured"
],
"default": "Skip"
}

Azure > Resource Group > Stack > Secret Variables

Terraform secret variables in Terraform HCL that will be used as
inputs to the stack as a .tfvars file.

A Guardrails Stack is a set of resources configured by Guardrails,
as specified via Terraform source. Stacks are responsible
for the creation and deletion of multiple resources. Once created,
stack resources are responsible for configuring themselves from
the stack source via their Configured control.

URI
tmod:@turbot/azure#/policy/types/resourceGroupStackSecretVariables
Schema
{
"type": "string",
"x-schema-form": {
"type": "code",
"language": "hcl"
}
}

Azure > Resource Group > Stack > Source

The Terraform HCL source used to configure this stack.

A Guardrails Stack is a set of resources configured by Guardrails, as specified
via Terraform source. Stacks are responsible for the creation and deletion
of multiple resources. Once created, stack resources are responsible for
configuring themselves from the stack source via their Configured control.

URI
tmod:@turbot/azure#/policy/types/resourceGroupStackSource
Schema
{
"type": "string",
"default": "",
"x-schema-form": {
"type": "code",
"language": "hcl"
}
}

Azure > Resource Group > Stack > Terraform Version

The Version of Terraform to use for this stack.
Specify an npm-style semver string to
determine which version of the Terraform container
Guardrails will use to run this stack.

A Guardrails Stack is a set of resources configured by Guardrails,
as specified via Terraform source. Stacks are responsible
for the creation and deletion of multiple resources. Once created,
stack resources are responsible for configuring themselves from
the stack source via their Configured control.

URI
tmod:@turbot/azure#/policy/types/resourceGroupStackTerraformVersion
Default Template Input
"{\n terraformVersion: policy(uri:\"tmod:@turbot/turbot#/policy/types/stackTerraformVersion\")\n}\n"
Default Template
"{% if $.terraformVersion %}"{{$.terraformVersion}}"{% else %}""{% endif %}"
Schema
{
"type": "string"
}

Azure > Resource Group > Stack > Variables

Terraform variables in Terraform HCL that will be used as
inputs to the stack as a .tfvars file.

A Guardrails Stack is a set of resources configured by Guardrails,
as specified via Terraform source. Stacks are responsible
for the creation and deletion of multiple resources. Once created,
stack resources are responsible for configuring themselves from
the stack source via their Configured control.

URI
tmod:@turbot/azure#/policy/types/resourceGroupStackVariables
Schema
{
"type": "string",
"x-schema-form": {
"type": "code",
"language": "hcl"
}
}

Azure > Resource Group > Tags

Determine the action to take when an Azure Azure resource group tags are not updated based on the Azure > Azure > Resource Group > Tags > * policies.

The control ensure Azure Azure resource group tags include tags defined in Azure > Azure > Resource Group > Tags > Template.

Tags not defined in Resource Group Tags Template will not be modified or deleted. Setting a tag value to undefined will result in the tag being deleted.

See Tags for more information.

URI
tmod:@turbot/azure#/policy/types/resourceGroupTags
Valid Value
[
"Skip",
"Check: Tags are correct",
"Enforce: Set tags"
]
Schema
{
"type": "string",
"enum": [
"Skip",
"Check: Tags are correct",
"Enforce: Set tags"
],
"example": [
"Check: Tags are correct"
],
"default": "Skip"
}

Azure > Resource Group > Tags > Template

The template is used to generate the keys and values for Azure Azure resource group.

Tags not defined in Resource Group Tags Template will not be modified or deleted. Setting a tag value to undefined will result in the tag being deleted.

See Tags for more information.

URI
tmod:@turbot/azure#/policy/types/resourceGroupTagsTemplate
Default Template Input
[
"{\n subscription {\n turbot {\n id\n }\n }\n}\n",
"{\n defaultTags: policyValue(uri:\"tmod:@turbot/azure#/policy/types/azureTagsTemplate\" resourceId: \"{{ $.subscription.turbot.id }}\") {\n value\n }\n}\n"
]
Default Template
"{%- if $.defaultTags.value | length == 0 %} [] {%- elif $.defaultTags.value != undefined %}{{ $.defaultTags.value | dump | safe }}{%- else %}{% for item in $.defaultTags.value %}- {{ item }}{% endfor %}{% endif %}"

Azure > Subscription > Approved Regions [Default]

A list of Azure regions in which resources are approved for use.

The expected format is an array of regions names. You may use the '*' and
'?' wildcard characters.

This policy is the default value for all service Approved Regions
policies.

URI
tmod:@turbot/azure#/policy/types/approvedRegionsDefault
Schema
{
"allOf": [
{
"$ref": "#/definitions/regionNameMatcherList"
},
{
"default": [
"*"
]
}
]
}

Azure > Subscription > CMDB

Configure whether to record and synchronize details for Azure
Azure subscription(s) into the CMDB.

The CMDB control is
responsible for populating and updating all the attributes for that
resource type in the Guardrails CMDB.

Note that if CMDB is set to Skip for a resource, then it will not be added
to the CMDB, and no controls that target it will run.

URI
tmod:@turbot/azure#/policy/types/subscriptionCmdb
Category
Valid Value
[
"Skip",
"Enforce: Enabled",
"Enforce: Disabled"
]
Schema
{
"type": "string",
"enum": [
"Skip",
"Enforce: Enabled",
"Enforce: Disabled"
],
"example": [
"Skip"
],
"default": "Enforce: Enabled"
}

Azure > Subscription > Regions [Default]

A list of regions supported by Azure.

URI
tmod:@turbot/azure#/policy/types/regionsDefault
Schema
{
"allOf": [
{
"$ref": "azure#/definitions/regionNameMatcherList"
},
{
"default": [
"*"
]
}
]
}

Azure > Subscription > Stack

Configure a custom stack on Azure, per the custom Stack > Source.

A Guardrails Stack is a set of resources configured by Guardrails, as specified
via Terraform source. Stacks are responsible for the creation and deletion
of multiple resources. Once created, stack resources are responsible for
configuring themselves from the stack source via their Configured control.

URI
tmod:@turbot/azure#/policy/types/subscriptionStack
Valid Value
[
"Skip",
"Check: Configured",
"Enforce: Configured"
]
Schema
{
"type": "string",
"enum": [
"Skip",
"Check: Configured",
"Enforce: Configured"
],
"default": "Skip"
}

Azure > Subscription > Stack > Secret Variables

Terraform secret variables in Terraform HCL that will be used as
inputs to the stack as a .tfvars file.

A Guardrails Stack is a set of resources configured by Guardrails,
as specified via Terraform source. Stacks are responsible
for the creation and deletion of multiple resources. Once created,
stack resources are responsible for configuring themselves from
the stack source via their Configured control.

URI
tmod:@turbot/azure#/policy/types/subscriptionStackSecretVariables
Schema
{
"type": "string",
"x-schema-form": {
"type": "code",
"language": "hcl"
}
}

Azure > Subscription > Stack > Source

The Terraform HCL source used to configure this stack.

A Guardrails Stack is a set of resources configured by Guardrails, as specified
via Terraform source. Stacks are responsible for the creation and deletion
of multiple resources. Once created, stack resources are responsible for
configuring themselves from the stack source via their Configured control.

URI
tmod:@turbot/azure#/policy/types/subscriptionStackSource
Schema
{
"type": "string",
"default": "",
"x-schema-form": {
"type": "code",
"language": "hcl"
}
}

Azure > Subscription > Stack > Terraform Version

The Version of Terraform to use for this stack.
Specify an npm-style semver string to
determine which version of the Terraform container
Guardrails will use to run this stack.

A Guardrails Stack is a set of resources configured by Guardrails,
as specified via Terraform source. Stacks are responsible
for the creation and deletion of multiple resources. Once created,
stack resources are responsible for configuring themselves from
the stack source via their Configured control.

URI
tmod:@turbot/azure#/policy/types/subscriptionStackTerraformVersion
Default Template Input
"{\n terraformVersion: policy(uri:\"tmod:@turbot/turbot#/policy/types/stackTerraformVersion\")\n}\n"
Default Template
"{% if $.terraformVersion %}"{{$.terraformVersion}}"{% else %}""{% endif %}"
Schema
{
"type": "string"
}

Azure > Subscription > Stack > Variables

Terraform variables in Terraform HCL that will be used as
inputs to the stack as a .tfvars file.

A Guardrails Stack is a set of resources configured by Guardrails,
as specified via Terraform source. Stacks are responsible
for the creation and deletion of multiple resources. Once created,
stack resources are responsible for configuring themselves from
the stack source via their Configured control.

URI
tmod:@turbot/azure#/policy/types/subscriptionStackVariables
Schema
{
"type": "string",
"x-schema-form": {
"type": "code",
"language": "hcl"
}
}

Azure > Subscription > Tags Template [Default]

A template used to generate the keys and values for Azure
resources. By default, all Azure service Tags Template [Default]
policies will use this value.

URI
tmod:@turbot/azure#/policy/types/defaultTagsTemplate
Default Template Input
"{\n defaultTags: resource {\n tags(resolution: RECOMMENDED)\n }\n}\n"
Default Template
"{%- if $.defaultTags.tags | length == 0 %} [] {%- elif $.defaultTags.tags != undefined %}{{ $.defaultTags.tags | dump | safe }}{% endif %}"

Azure > Tags Template [Default]

A template used to generate the keys and values for Azure Azure resources.

By default, all Azure resource Tags > Template policies will use this value.

URI
tmod:@turbot/azure#/policy/types/azureTagsTemplate
Parent
Default Template Input
"{\n defaultTags: policyValue(uri:\"tmod:@turbot/azure#/policy/types/defaultTagsTemplate\") {\n value\n }\n}\n"
Default Template
"{%- if $.defaultTags.value | length == 0 %} [] {%- elif $.defaultTags.value != undefined %}{{ $.defaultTags.value | dump | safe }}{%- else %}{% for item in $.defaultTags.value %}- {{ item }}{% endfor %}{% endif %}"

Azure > Tenant > CMDB

Configure whether to record and synchronize details for Azure
Azure tenant into the CMDB.

The CMDB control is
responsible for populating and updating all the attributes for that
resource type in the Guardrails CMDB.

Note that if CMDB is set to Skip for a resource, then it will not be added
to the CMDB, and no controls that target it will run.

URI
tmod:@turbot/azure#/policy/types/tenantCmdb
Category
Valid Value
[
"Skip",
"Enforce: Enabled"
]
Schema
{
"type": "string",
"enum": [
"Skip",
"Enforce: Enabled"
],
"example": [
"Skip"
],
"default": "Enforce: Enabled"
}

Azure > Tenant ID

Azure tenant ID used by Guardrails for access to the Azure APIs.

URI
tmod:@turbot/azure#/policy/types/tenantId
Category
Parent
Schema
{
"type": "string",
"pattern": "^[a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}$",
"tests": [
{
"input": "661498f8-9caa-42de-9f6e-532bd0fe9f9b"
},
{
"description": "invalid - azure tenant",
"input": "A61498f8-9caa-42de-9f6e-532bd0fe9f9b",
"expected": false
}
]
}

Azure > Turbot

URI
tmod:@turbot/azure#/policy/types/turbot
Category
Parent
Targets

Azure > Turbot > Event Handlers

Configure the Guardrails Event Handler stack. This stack configures
the Event Handlers for Guardrails real-time event routing.

URI
tmod:@turbot/azure#/policy/types/eventHandlers
Valid Value
[
"Skip",
"Check: Configured",
"Check: Not configured",
"Enforce: Configured",
"Enforce: Not configured"
]
Schema
{
"type": "string",
"enum": [
"Skip",
"Check: Configured",
"Check: Not configured",
"Enforce: Configured",
"Enforce: Not configured"
],
"default": "Skip"
}

Azure > Turbot > Event Handlers > Monitor

URI
tmod:@turbot/azure#/policy/types/eventHandlersMonitor
Category
Targets

Azure > Turbot > Event Handlers > Monitor > Action Group

URI
tmod:@turbot/azure#/policy/types/eventHandlersActionGroup
Category

Azure > Turbot > Event Handlers > Monitor > Action Group > Name Prefix

A string to be Used as a prefix to the turbot generated name on the
Guardrails Event Handler Monitor Action Group. The name will be
pre-pended with this value.

URI
tmod:@turbot/azure#/policy/types/eventHandlersActionGroupNamePrefix
Schema
{
"type": "string",
"default": "turbot_",
"example": "turbot_"
}

Azure > Turbot > Event Handlers > Monitor > Action Group > Tags

A list of key:value pairs to add as Azure Tags on the Guardrails
Event Handler Monitor Alerts.

URI
tmod:@turbot/azure#/policy/types/eventHandlersActionGroupTags
Default Template Input
null
Default Template
"{}"

Azure > Turbot > Event Handlers > Monitor > Action Group > Tags > Ignore Changes

Configure whether to ignore changes to tags on the Action Group. If set to Enabled, the stack will ignore all changes made to the Action Group tags including the changes on Azure > Turbot > Event Handlers > Monitor > Action Group > Tags policy.

URI
tmod:@turbot/azure#/policy/types/eventHandlersActionGroupTagsIgnoreChanges
Valid Value
[
"Enabled",
"Disabled"
]
Schema
{
"type": "string",
"enum": [
"Enabled",
"Disabled"
],
"default": "Disabled"
}

Azure > Turbot > Event Handlers > Monitor > Activity Log Alert

Configure the Guardrails Event Handler stack. This stack configures
the activity log alert for Guardrails real-time event routing.

URI
tmod:@turbot/azure#/policy/types/eventHandlersActivityLogAlert
Category

Azure > Turbot > Event Handlers > Monitor > Activity Log Alert > Name Prefix

A string to be Used as a prefix to the turbot generated name on the
Guardrails Event Handler Monitor Alert. The name will be pre-pended
with this value.

URI
tmod:@turbot/azure#/policy/types/eventHandlersActivityLogAlertNamePrefix
Schema
{
"type": "string",
"default": "turbot_",
"example": "turbot_"
}

Azure > Turbot > Event Handlers > Monitor > Activity Log Alert > Tags

A list of key:value pairs to add as Azure Tags on the Guardrails
Event Handler Monitor Alerts.

URI
tmod:@turbot/azure#/policy/types/eventHandlersActivityLogAlertTags
Default Template Input
null
Default Template
"{}"

Azure > Turbot > Event Handlers > Monitor > Activity Log Alert > Tags > Ignore Changes

Configure whether to ignore changes to tags on the Activity Log Alert. If set to Enabled, the stack will ignore all changes made to the Activity Log Alert tags including the changes on Azure > Turbot > Event Handlers > Monitor > Activity Log Alert > Tags policy.

URI
tmod:@turbot/azure#/policy/types/eventHandlersActivityLogAlertTagsIgnoreChanges
Valid Value
[
"Enabled",
"Disabled"
]
Schema
{
"type": "string",
"enum": [
"Enabled",
"Disabled"
],
"default": "Disabled"
}

Azure > Turbot > Event Handlers > Monitor > Resource Group Name

URI
tmod:@turbot/azure#/policy/types/eventHandlersMonitorResourceGroupName
Default Template Input
"{\n turbotResourceGroupNamePrefix: policy(uri: \"#/policy/types/turbotResourceGroupNamePrefix\")\n}\n"
Default Template
"'{{$.turbotResourceGroupNamePrefix}}rg'"
Schema
{
"type": "string"
}

Azure > Turbot > Event Handlers > Source

The Terraform source used to configure the Event Handler Monitor stack.
This policy is read-only, as the Event Handler source is generated by Guardrails

URI
tmod:@turbot/azure#/policy/types/eventHandlersMonitorSource
Category
Schema
{
"type": "string",
"x-schema-form": {
"type": "code",
"language": "hcl"
}
}

Azure > Turbot > Event Handlers > Terraform Version

The Version of Terraform to use for this stack.
Specify an npm-style semver string to
determine which version of the Terraform container
Guardrails will use to run this stack.
A Guardrails Stack is a set of resources configured by Guardrails,
as specified via Terraform source. Stacks are responsible
for the creation and deletion of multiple resources. Once created,
stack resources are responsible for configuring themselves from
the stack source via their Configured control.

URI
tmod:@turbot/azure#/policy/types/eventHandlersTerraformVersion
Schema
{
"type": "string",
"default": "0.11.*"
}

Azure > Turbot > Event Poller

Configure the Azure Event Poller. When set to Enabled, the poller will
run at the interval specified to retrieve the latest events and forward
them to the Guardrails Router.

Note: The Event Poller and Guardrails Event Handler are different mechanisms for
sending information to Guardrails. You should enable one or the other, but not both.

URI
tmod:@turbot/azure#/policy/types/eventPoller
Category
Default Template Input
"{\n value: policy(uri: \"tmod:@turbot/azure#/policy/types/eventHandlers\")\n}\n"
Default Template
"{% if $.value == 'Enforce: Configured' %}Disabled{% else %}Enabled{% endif%}\n"
Schema
{
"type": "string",
"enum": [
"Enabled",
"Disabled"
]
}

Azure > Turbot > Event Poller > Interval

The polling interval. This policy determines how often
the event poller will run.

URI
tmod:@turbot/azure#/policy/types/eventPollerInterval
Category
Valid Value
[
"Every 1 minute",
"Every 2 minutes",
"Every 3 minutes",
"Every 4 minutes",
"Every 5 minutes",
"Every 6 minutes",
"Every 7 minutes",
"Every 8 minutes",
"Every 9 minutes",
"Every 10 minutes"
]
Schema
{
"type": "string",
"enum": [
"Every 1 minute",
"Every 2 minutes",
"Every 3 minutes",
"Every 4 minutes",
"Every 5 minutes",
"Every 6 minutes",
"Every 7 minutes",
"Every 8 minutes",
"Every 9 minutes",
"Every 10 minutes"
],
"default": "Every 1 minute"
}

Azure > Turbot > Event Poller > Window

The polling window, in minutes. This policies determines the oldest
events the event poller will retrieve. For example, setting the window
to '5 minutes' will cause the poller to retrieve all events from
the previous 5 minutes every time it runs.

The Window must be greater than the Interval, and it is recommended
to be at least twice the Interval. For example, if the Interval
is 'Every 5 Minutes', the Window should be at least '10 Minutes'.

URI
tmod:@turbot/azure#/policy/types/eventPollerWindow
Category
Valid Value
[
"5 minutes",
"6 minutes",
"7 minutes",
"8 minutes",
"9 minutes",
"10 minutes",
"11 minutes",
"12 minutes",
"13 minutes",
"14 minutes",
"15 minutes",
"16 minutes",
"17 minutes",
"18 minutes",
"19 minutes",
"20 minutes"
]
Schema
{
"type": "string",
"enum": [
"5 minutes",
"6 minutes",
"7 minutes",
"8 minutes",
"9 minutes",
"10 minutes",
"11 minutes",
"12 minutes",
"13 minutes",
"14 minutes",
"15 minutes",
"16 minutes",
"17 minutes",
"18 minutes",
"19 minutes",
"20 minutes"
],
"default": "10 minutes"
}

Azure > Turbot > Management Group Event Poller

Configure the Azure Management Group Event Poller. When set to Enabled,
the poller will run at the interval specified to run the mangement group
discovery control to look for changes in the management group hierarcy.

URI
tmod:@turbot/azure#/policy/types/managementGroupEventPoller
Category
Valid Value
[
"Enabled",
"Disabled"
]
Schema
{
"type": "string",
"enum": [
"Enabled",
"Disabled"
],
"default": "Enabled"
}

Azure > Turbot > Management Group Event Poller > Interval

The discovery interval. This policy determines how often the management group discovery will run.

URI
tmod:@turbot/azure#/policy/types/managementGroupEventPollerInterval
Category
Valid Value
[
"Every hour",
"Every 2 hours",
"Every 3 hours",
"Every 6 hours",
"Every 12 hours",
"Every day",
"Every 2 days",
"Every 3 days",
"Every week"
]
Schema
{
"type": "string",
"enum": [
"Every hour",
"Every 2 hours",
"Every 3 hours",
"Every 6 hours",
"Every 12 hours",
"Every day",
"Every 2 days",
"Every 3 days",
"Every week"
],
"default": "Every 12 hours"
}

Azure > Turbot > Resource Group

URI
tmod:@turbot/azure#/policy/types/turbotResourceGroup
Category
Valid Value
[
"Skip",
"Check: Configured",
"Check: Not configured",
"Enforce: Configured",
"Enforce: Not configured"
]
Schema
{
"type": "string",
"enum": [
"Skip",
"Check: Configured",
"Check: Not configured",
"Enforce: Configured",
"Enforce: Not configured"
],
"default": "Skip"
}

Azure > Turbot > Resource Group > Name Prefix

A string to be Used as a prefix to the turbot generated name on the
Guardrails Resource Group. The name will be
pre-pended with this value.

URI
tmod:@turbot/azure#/policy/types/turbotResourceGroupNamePrefix
Schema
{
"type": "string",
"default": "turbot_",
"example": "turbot_"
}

Azure > Turbot > Resource Group > Regions

Regions where Azure supports Resource Group. Guardrails updates this option as Azure expands their regional support. Unless there is an explicit requirement (e.g. accelerated regional support), it should not be set by Guardrails Administrators.

URI
tmod:@turbot/azure#/policy/types/turbotResourceGroupRegion
Category
Default Template Input
"{\n environmentValue: policy(uri: \"azure#/policy/types/environment\")\n}\n"
Default Template
"{% if $.environmentValue == 'US Government' %}USGov Arizona {%- elif $.environmentValue == 'China Cloud' %}China East 2{% else %}WEST US{% endif %}"
Schema
{
"type": "string",
"enum": [
"AUSTRALIA CENTRAL",
"AUSTRALIA CENTRAL 2",
"AUSTRALIA EAST",
"AUSTRALIA SOUTHEAST",
"BRAZIL SOUTH",
"CANADA CENTRAL",
"CANADA EAST",
"CENTRAL INDIA",
"CENTRAL US",
"EAST ASIA",
"EAST US",
"EAST US 2",
"FRANCE CENTRAL",
"FRANCE SOUTH",
"JAPAN EAST",
"JAPAN WEST",
"KOREA CENTRAL",
"KOREA SOUTH",
"NORTHCENTRAL US",
"NORTH EUROPE",
"SOUTHCENTRAL US",
"SOUTH INDIA",
"SOUTHEAST ASIA",
"UK SOUTH",
"UK WEST",
"WESTCENTRAL US",
"WEST EUROPE",
"WEST INDIA",
"WEST US",
"WEST US 2",
"USGov Iowa",
"USGov Virginia",
"USGov Texas",
"USGov Arizona",
"China East",
"China East 2",
"China East 3",
"China North",
"China North 2",
"China North 3"
]
}

Azure > Turbot > Resource Group > Source

The Terraform source used to configure this resource. This policy is
read-only, as the Event Handler source is generated by Guardrails

URI
tmod:@turbot/azure#/policy/types/turbotResourceGroupSource
Category
Schema
{
"type": "string",
"x-schema-form": {
"type": "code",
"language": "hcl"
}
}

Azure > Turbot > Resource Group > Tags

A list of key:value pairs to add as Azure Tags on the Guardrails
Resource Group.

URI
tmod:@turbot/azure#/policy/types/turbotResourceGroupTags
Default Template Input
null
Default Template
"{}"

Azure > Turbot > Resource Group > Tags > Ignore Changes

Configure whether to ignore changes to tags on the Guardrails resource group. If set to Enabled, the stack will ignore all changes made to the Guardrails resource group tags including the changes on Azure > Turbot > Resource Group > Tags policy.

URI
tmod:@turbot/azure#/policy/types/turbotResourceGroupTagsIgnoreChanges
Valid Value
[
"Enabled",
"Disabled"
]
Schema
{
"type": "string",
"enum": [
"Enabled",
"Disabled"
],
"default": "Disabled"
}

Azure > Turbot > Resource Group > Terraform Version

The Version of Terraform to use for this stack.
Specify an npm-style semver string to
determine which version of the Terraform container
Guardrails will use to run this stack.
A Guardrails Stack is a set of resources configured by Guardrails,
as specified via Terraform source. Stacks are responsible
for the creation and deletion of multiple resources. Once created,
stack resources are responsible for configuring themselves from
the stack source via their Configured control.

URI
tmod:@turbot/azure#/policy/types/turbotResourceGroupTerraformVersion
Schema
{
"type": "string",
"default": "0.11.*"
}