Home DEVELOPER Infrastructure-AS-Code: Extended Safety and Control in Pulumi Cloud

Infrastructure-AS-Code: Extended Safety and Control in Pulumi Cloud

0


Pulumi Development Team is expanding its Infrastructure-AS Code (IAC) platform with new tasks to automate safety and access control around cloud resources. Among other things, a system for the integration of zethab action for secrets management when working with a system for roll-based access control (RBAC), automatic rotation of registration data and CI/CD pipelines.

In Pulumi ESC (environment, mystery and configuration management), users can now automatically rotate mysteries for static login data. Its purpose is to be able to increase safety and also to meet compliance requirements in the environment which is not switching to the dynamic login data. The rotten mystery function allows you to start changes if necessary or control it through rotation scheme. It follows the two-second strategy, so that both login information is available in the transition phase. To be able to understand and examine all changes, the time of change by changing each change and who has accessed.

As an alternative to stable mysteries and registration data, it enables dynamics to dynamically insert the integration of github functions in Pulumi ESC development teams and rotate this information in its workflow as required. Any ESC commandos can also be done in Github Action Workflows, for example to make, update, or switch as part of the CI/CD process. To do this, the github action can download the Pulumi Esc CLI and either insert all the environmental variables-or even from the Escay environment. An example is shown in the following list how a simple workflow can be made in Github, from registration in Pulumi cloud to insertion of the environment:

on:
  - pull_request

permissions:
  id-token: write
  contents: read

jobs:
  test-env-injection:
    runs-on: ubuntu-latest
    steps:
      - name: Check out repository
        uses: actions/checkout@v4
      - name: Authenticate with Pulumi Cloud
        uses: pulumi/auth-actions@v1
        with:
          organization: pulumi
          requested-token-type: urn:pulumi:token-type:access_token:organization
      - name: Install and inject ESC environment variables
        uses: pulumi/esc-action@v1
        with:
          environment: 'tinyco/someProject/myEnv@stable'
      - name: Verify environment variables
        run: |
          echo "FOO=$FOO"
          echo "SOME_IMPORTANT_KEY=$SOME_IMPORTANT_KEY"
          echo "TEST_ENV=$TEST_ENV"

Canon presents two new cameras that increase video recording

To be able to be able to improve better within an organization, people who can reach resources and change them, introduce a system to the Pulumi role-based access control (RBAC). The system should work equally in all products in Pulumi Cloud and regulate access to resources such as IAC stack, ESC environment and insight accounts. Users can thus configure specific permissions for access to users and team levels in detail. Roll -Accessed Access Fake can also be controlled that automated procedures have only necessary authority.

New tasks Rolled mystery, Integration of github actions Also expand Policy-AS-Code capabilities in Pulumi insights Users are already fully available. For the declared RBAC system, specific start date should be followed soon.


(Map)

WhatsApp allows you to know if your message has been read by any other person other than the original recipient.

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version