Skip to content

Commit f47c860

Browse files
committed
fixed some urls and text
1 parent c86bfec commit f47c860

File tree

2 files changed

+10
-9
lines changed

2 files changed

+10
-9
lines changed

content/well-architected-framework/docs/docs/optimize-systems/lifecycle-management/tag-cloud-resources.mdx

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ description: Implement cloud resource tagging best practices with Terraform for
66
# Tag cloud resources
77

88
Managing thousands of cloud resources across regions, environments, and teams is complex without a systematic approach. Tags are key-value pairs that help you manage, identify, organize, locate, and filter resources. It is important to have a clear, well-defined cloud resource tagging strategy. You can also use tags to track cost allocation and usage, and automate resource management tasks.
9+
910
[AWS](https://docs.aws.amazon.com/whitepapers/latest/tagging-best-practices/tagging-best-practices.html), [Azure](https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/ready/azure-best-practices/resource-tagging), and [IBM](https://cloud.ibm.com/docs/framework-financial-services?topic=framework-financial-services-shared-tagging-resources) maintain best practices and strategies for tagging your cloud resources. Follow these best practices when creating your tagging strategy. You can apply these concepts to other infrastructure providers.
1011

1112
You can implement your tagging strategy using infrastructure as code (IaC) and enforce compliance with policy as code, preventing the deployment of resources that don't meet your tagging requirements.
@@ -142,9 +143,9 @@ HashiCorp resources:
142143

143144
- Read about the [Terraform validation block](/terraform/language/values/variables#validation)
144145
- Write a [Sentinel policy for a Terraform deployment](/terraform/tutorials/policy/sentinel-policy) to ensure that the EC2 instance has a `Name` tag.
145-
- [Get started with Sentinel](/sentinel/tutorials/get-started)
146146
- Learn how to [define Open Policy Agent policies for HCP Terraform](/terraform/enterprise/policy-enforcement/define-policies/opa)
147147
- [HCP Terraform policy enforcement overview](/terraform/enterprise/policy-enforcement)
148+
- [Get started with Sentinel](/sentinel/tutorials/get-started)
148149

149150
External resources:
150151
- Use [OPA to write policies](https://www.openpolicyagent.org/docs/terraform) ensuring all resources have tags before you create them.

content/well-architected-framework/docs/docs/optimize-systems/manage-cost/create-cloud-budgets.mdx

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Implementing a budget provides you with the following benefits:
1616

1717
<Note>
1818

19-
The Terraform example in this document has a `tags` block. Refer to the [Tag cloud resources](/well-architected-framework/docs/docs/optimize-systems/lifecycle-management/tag-cloud-resources) document to learn about implementing a tagging strategy.
19+
The Terraform example in this document has a `tags` block. Refer to the [Tag cloud resources](/well-architected-framework/optimize-systems/lifecycle-management/tag-cloud-resources) document to learn about implementing a tagging strategy.
2020

2121
</Note>
2222

@@ -63,7 +63,7 @@ resource "aws_budgets_budget" "ec2" {
6363
}
6464
```
6565

66-
In the previous example
66+
Some of the key components in the previous example include:
6767
- **limit_amount:** Defines the monthly spend limit.
6868
- **notification:** Defines the notification criteria and sends an email to test@example.com.
6969
- **tags:** The tag is applied to the budget resource, not the EC2 instance. The tags allow you to filter and organize budgets in the billing console.
@@ -76,7 +76,7 @@ For Google Cloud Platform, the `google_billing_budget` resource operates at the
7676

7777
HashiCorp resources:
7878

79-
- Learn how to [Tag cloud resources](/well-architected-framework/docs/docs/optimize-systems/lifecycle-management/tag-cloud-resources)
79+
- Learn how to [Tag cloud resources](/well-architected-framework/optimize-systems/lifecycle-management/tag-cloud-resources)
8080
- Terraform resource: [aws_budgets_budget](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/budgets_budget)
8181
- Terraform resource: [azurerm_consumption_budget_subscription](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/consumption_budget_subscription)
8282
- Terraform resource: [google_billing_budget](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/billing_budget)
@@ -125,7 +125,7 @@ resource "aws_ce_anomaly_subscription" "test" {
125125
}
126126
```
127127

128-
In the previous example:
128+
Some of the key components in the previous example include:
129129
- **aws_ce_anomaly_monitor:** Tracks spending patterns across all AWS services such as EC2, S3, and Lambda.
130130
- **frequency = "DAILY":** Sends a daily summary of detected anomalies.
131131
- **threshold_expression:** Only alerts when the anomaly's financial impact exceeds $100.
@@ -137,9 +137,9 @@ HashiCorp resources:
137137

138138
External resources:
139139

140-
- AWS Cost Anomaly Detection: [What is AWS Cost Anomaly Detection?](https://docs.aws.amazon.com/cost-anomaly/latest/userguide/what-is-cost-anomaly.html)
141-
- Azure Cost Management anomalies: [Detect anomalies in your cost data](https://learn.microsoft.com/en-us/azure/cost-management-billing/costs/analyze-cost-data#detect-anomalies-in-your-cost-data)
142-
- Google Cloud's cost anomaly detection: [Using anomaly detection](https://cloud.google.com/billing/docs/how-to/using-anomaly-detection)
140+
- [AWS getting started with AWS Cost Anomaly Detection](https://docs.aws.amazon.com/cost-anomaly/latest/userguide/what-is-cost-anomaly.html)
141+
- [Azure identify anomalies and unexpected changes in cost](https://learn.microsoft.com/en-us/azure/cost-management-billing/understand/analyze-unexpected-charges)
142+
- [Google cloud anomaly detection overview](https://cloud.google.com/bigquery/docs/anomaly-detection-overview)
143143

144144
## Next steps
145145

@@ -149,4 +149,4 @@ To learn more about managing resources with Terraform, view the following resour
149149
- [Create reusable infrastructure modules](/well-architected-framework/define-and-automate-processes/define/modules)
150150
- [Implement CI/CD](/well-architected-framework/define-and-automate-processes/automate/cicd)
151151
- [Reduce costs with Terraform Cloud ephemeral workspaces](https://www.youtube.com/watch?v=-woCmG8yGdA)
152-
- [Tag cloud resources](/well-architected-framework/docs/docs/optimize-systems/lifecycle-management/tag-cloud-resources)
152+
- [Tag cloud resources](/well-architected-framework/optimize-systems/lifecycle-management/tag-cloud-resources)

0 commit comments

Comments
 (0)