You define day 2 action policies so that you can control what changes your users can make to deployments and their component resources. By creating a list of permitted actions that all or some users can run on deployments, you ensure that the users cannot initiate any destructive or costly changes. The use cases related to day 2 actions policies are an introduction to the procedure.
When you entitle users to run day 2 actions, you select the individual actions that they can run. You are creating an inclusion list, not an exclusion list.
When does a day 2 actions policy go into effect?
- If you do not have any Day 2 Action policies defined, then no governance is applied and all users have access to all the actions. This initial lack of governance as you are starting out ensures that you and your users can exercise the day two actions in Service Broker and Cloud Assembly without the need to understand day 2 policies.
- After you determine that you are ready to control who has access to what actions, you add governance in the form of a single Day 2 Action policy. When the first policy goes into effect, the Day 2 Action policies are enforced for all users in Service Broker and Cloud Assembly. As a result, only the users for whom the first policy is true can run the selected actions. All others are excluded. They are excluded because the actions policies include the trusted users. By excluding all others, you are able to craft the policies to match your governance goals.
- To entitle other users, you must create policies that entitle them to run the actions you select.
Deployment sharing in projects affects how you configure the day 2 actions entitlements. If the project is not set to share, then only the requesting user can see a deployment. If the project shares deployments, then all the members of the project can see the deployment, and run any actions that they are entitled to run by a Day 2 Action policy. Deployment sharing is configured in a project. Select Users tab.
, then select the project and click theAs you create your policies, the way that you define Day 2 Actions policies must take sharing status into consideration.
To focus when the Day 2 Actions policies are applied, you can configure scope, role, and criteria. These configurations control what deployments the policy is applied to and who can run the actions when the policy is enforced.
- What deployments the policy is applied to.
- Scope determines whether the policy is applied to deployments at the organization or project level.
- Criteria narrows the scope of the policy to particular aspects of deployments.
- Who can run what actions on those deployments.
- Role entitles the members of the selected role, within the selected scope and criteria, to run the selected actions. The role can be project administrator, project member, or a named custom role.
Day 2 policies are enforced when a user tries to manage a deployment using the Actions menu on the deployment or on the component resources.
In this use case, which is used to illustrate a collection of day 2 action policies, the assumption is that you enabled deployment sharing in the project.
As you review the day 2 actions policies use case, you must also select the actions. You must select the actions that support your cloud accounts.
- Actions are cloud specific. When you are entitling the users to make changes, consider what cloud accounts the entitled users are deploying to and ensure that you select all the cloud-specific versions of the actions. For example, add Cloud.AWS.EC2.Instance.Resize, Cloud.GCP.Machine.Resize, and Cloud.Azure.Machine.Resize to entitle users to resize those machines.
- Cloud agnostic actions, for example, Cloud.Machine.Resize, exist to accommodate resources where the on-boarding or migration process cannot identify the machine type. If you entitle users to the cloud agnostic actions, you have not entitled them to run the cloud-specific action that will make the changes to the deployed resources. The agnostic actions might appear in the action menu, but running the actions has no effect. You should avoid entitling the agnostic actions and only entitle cloud-specific actions to ensure that actions are available to the users for your various cloud platforms.
Prerequisites
- For a list of possible actions, see What actions can I run on Service Broker deployments.
- For more information about constructing deployment criteria, see How do I configure deployment criteria in Service Broker policies.
- Custom roles are used in Day 2 Policy 4. Create a Deployment Troubleshooter role, but with the Manage Deployment role in the custom Deployment Troubleshooting role does not limit the members by project. The Manage Deployment role allows the assignees to see all deployments and run all actions. If the Troubleshooting Deployments role does not include Manage Deployments, then the assignees see deployments based on their project membership. For more information about custom roles, see custom role use case.
Procedure
What to do next
- For more examples of how the policies are processed and enforced, see How are Service Broker policies processed.
- Configure policies that are relevant to your organizations and projects.