Skip to content

Commit 79d8f43

Browse files
cjobermaiertunzorBrianMMcClain
authored
Apply suggestions from code review
Co-authored-by: Anthony <russo555@gmail.com> Co-authored-by: Brian McClain <brianmmcclain@gmail.com>
1 parent 8fdce20 commit 79d8f43

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

content/well-architected-framework/docs/docs/optimize-systems/lifecycle-management/tag-cloud-resources.mdx

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Once you define and implement your tagging strategy using infrastructure as code
7474

7575
### Use the Terraform validation block
7676

77-
You can use the [Terraform validation block](/terraform/language/values/variables#validation) to enforce tagging policies. The validation block allows you to define custom validation rules for input variables. You can use this feature to ensure that the resources you tag follow your tagging strategy.
77+
You can use the [Terraform validation block](/terraform/language/values/variables#validation) to enforce tagging policies. The validation block allows you to define custom validation rules for input variables. You can use the validation block to ensure that the resources you tag follow your tagging strategy.
7878

7979
The following is an example of a Terraform validation block that ensures the `environment` tag is set to either `dev`, `staging`, or `prod`:
8080

@@ -106,7 +106,7 @@ environment = "testing"
106106

107107
### Use policy as code
108108

109-
For more advanced enforcement of your tagging strategy, you can use policy as code tools such as HashiCorp Sentinel or the Open Policy Agent (OPA) to create policies that enforce tagging rules. You can integrate these policies into your CI/CD pipelines to ensure that all resources comply with your tagging strategy before deployment.
109+
For more advanced enforcement of your tagging strategy, you can use policy as code tools such as HashiCorp Sentinel or the Open Policy Agent (OPA) to create policies that enforce tagging rules. You can integrate these policies into your CI/CD pipelines or with HCP Terraform to ensure that all resources comply with your tagging strategy before deployment.
110110

111111
The following is an example of a [`Pass` or `Fail` Sentinel policy](/terraform/tutorials/policy/sentinel-policy#review-your-policy) that ensures that all AWS EC2 instances have a `Name` tag:
112112

@@ -138,7 +138,7 @@ main = rule {
138138
}
139139
```
140140

141-
You can write similar policies with OPA and HCP Terraform. Refer to the following external resources for more information.
141+
You can write similar policies with OPA and HCP Terraform. Refer to the following resources for more information.
142142

143143
HashiCorp resources:
144144

@@ -149,12 +149,14 @@ HashiCorp resources:
149149
- [Get started with Sentinel](/sentinel/tutorials/get-started)
150150

151151
External resources:
152+
152153
- Use [OPA to write policies](https://www.openpolicyagent.org/docs/terraform) ensuring all resources have tags before you create them.
153154

154155
## Next steps
155156

156157
In this section of Manage cost, you learned how to tag resources using infrastructure as code and enforce tagging policies. Tag resources is part of the Optimize systems pillar.
157158

158159
To learn more about how to manage our resources, visit the following resources:
160+
159161
- [Implement data management policies](/well-architected-framework/optimize-systems/lifecycle-management/data-management)
160162
- [Decommission resources](/well-architected-framework/optimize-systems/lifecycle-management/decommission-infrastructure)

0 commit comments

Comments
 (0)