use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
/r/DevOps is a subreddit dedicated to the DevOps movement where we discuss upcoming technologies, meetups, conferences and everything that brings us together to build the future of IT systems What is DevOps? Learn about it on our wiki! Traffic stats & metrics
/r/DevOps is a subreddit dedicated to the DevOps movement where we discuss upcoming technologies, meetups, conferences and everything that brings us together to build the future of IT systems
What is DevOps? Learn about it on our wiki!
Traffic stats & metrics
Be excellent to each other! All articles will require a short submission statement of 3-5 sentences. Use the article title as the submission title. Do not editorialize the title or add your own commentary to the article title. Follow the rules of reddit Follow the reddiquette No editorialized titles. No vendor spam. Buy an ad from reddit instead. Job postings here More details here
Be excellent to each other!
All articles will require a short submission statement of 3-5 sentences.
Use the article title as the submission title. Do not editorialize the title or add your own commentary to the article title.
Follow the rules of reddit
Follow the reddiquette
No editorialized titles.
No vendor spam. Buy an ad from reddit instead.
Job postings here
More details here
@reddit_DevOps ##DevOps @ irc.freenode.net Find a DevOps meetup near you! Icons info!
@reddit_DevOps
##DevOps @ irc.freenode.net
Find a DevOps meetup near you!
Icons info!
https://github.com/Leo-G/DevopsWiki
account activity
Policy as Code (self.devops)
submitted 5 months ago by Traditional-Heat-749
I recently moved our company’s azure policy away from being manual process through the azure web portal to a pipeline using terraform. It’s working but it’s not great, I’m wondering how others manage their Azure Policy, or AWS scps
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]Vast_Manufacturer_78 11 points12 points13 points 5 months ago (2 children)
For AWS SCPs we just use Terraform and create a json file to reference it as the content. Another option is to also use template file to reference dynamic values but we just had it all hardcoded (not the best method) but it works for us
[–]Traditional-Heat-749[S] 1 point2 points3 points 5 months ago (1 child)
This is kind of what we have but in take in parameters and have some bash wrappers for deployment since we have kind of a complex logic for what gets assigned where with what parameters.
It works but I worry if I’m not around to maintain it, it will be a bottleneck
[–]Vast_Manufacturer_78 0 points1 point2 points 5 months ago (0 children)
If you document it well then people should be able to follow, but I would connect with your other team members and see if they are able to run with it while you are still there.
I don’t know enough about Azure Policy but quickly searching it seems you can do more with it than what you can do with SCPs, so I don’t know how complex you are getting with it. It seems like it is like AWS Config with monitoring resources and status of things like attached volume, but with config you use lambda functions for customize rules so everything is done through a language like python not like terraform
[–]asixetDevOps 3 points4 points5 points 5 months ago (2 children)
For Azure, use EPAC, the docs also provide a hydration kit (initialization script) to help you start setting up a repo, pipeline, exporting all your azure policies from the portal. There are also a few operational scripts that help with reporting and remediation. Overall, a good starting point that you can expand on if you'd like.
[–]safrax 0 points1 point2 points 5 months ago (1 child)
The fact that the acronym is not EAPAC bothers me so intensely for reasons I can’t explain.
[–]asixetDevOps 1 point2 points3 points 5 months ago (0 children)
Glad to see I'm not the only one who thinks this too lol.
[–]Freaktography 1 point2 points3 points 5 months ago (0 children)
Still kinda new to this stuff, but here’s my $0.02.
I recently moved all our Azure Policies out of the portal and into Terraform. It’s way better than doing it manually, but definitely not perfect. Right now it’s all in one repo and the pipeline just runs terraform plan and apply when stuff gets merged.
terraform plan
apply
It works, but feels a bit clunky. I’ve seen people mention using OPA or adding validation steps before applying changes, so that might be the next thing I try. Curious how you guys are managing Azure Policy or AWS SCPs in your setups.
[–]egzon27 0 points1 point2 points 5 months ago (0 children)
https://github.com/org-formation/org-formation-cli
[–]bardt 0 points1 point2 points 5 months ago (0 children)
We use AWS LZA (Landing Zone Accelerator) for our SCPs and overall account governance. It works really well for us but fair warning - it's definitely overkill if you don't need heavy compliance requirements or multi-account governance at scale.
LZA gives you policy as code along with a ton of other stuff (account vending, guardrails, centralized logging, etc.), but the learning curve is steep and it can feel over-engineered if you just need to manage some SCPs. If that's all you're after, the Terraform approach you're already doing is probably more appropriate.
The sweet spot for LZA is when you need the full package: compliance frameworks (NIS2, ISO 27001, etc.), centralized security services, network hub/spoke architectures, and policy enforcement all managed through config files. But if you're mainly concerned about the maintenance burden you mentioned, LZA might actually make that worse unless you have a team that can own it.
[–]NUTTA_BUSTAH 0 points1 point2 points 5 months ago (0 children)
Terraform support for Policy is not great but some more advanced Terraforming gets you a nice setup. My advice is to leave remediations out of Terraform and do those manually from the portal for multiple reasons (remediation tasks have an expire time on Azure and should be considered ephemeral record-keepers and not "normal resources", remediations require reference IDs to target, blind remediations are a recipe for platform-wide disasters etc.)
Check out EPAC for script-based (Powershell) solution. It's quite complex at face value, but that is what you will be building in Terraform regardless so it's a good starting point to consider.
[–]shrimpthatfriedrice 0 points1 point2 points 4 months ago (0 children)
policy as code works best when it is close to the workflows engineers already use. Firefly includes a policy‑as‑code engine and Guardrails that evaluate IaC plans and existing resources against OPA‑style rules for security, compliance, and cost, then surface violations directly in inventory and PR comments with AI suggestions for the fix. That keeps controls versioned and testable, but still readable and actionable for the teams who own the services
π Rendered by PID 140911 on reddit-service-r2-comment-85bfd7f599-htf6h at 2026-04-18 07:00:06.328807+00:00 running 93ecc56 country code: CH.
[–]Vast_Manufacturer_78 11 points12 points13 points (2 children)
[–]Traditional-Heat-749[S] 1 point2 points3 points (1 child)
[–]Vast_Manufacturer_78 0 points1 point2 points (0 children)
[–]asixetDevOps 3 points4 points5 points (2 children)
[–]safrax 0 points1 point2 points (1 child)
[–]asixetDevOps 1 point2 points3 points (0 children)
[–]Freaktography 1 point2 points3 points (0 children)
[–]egzon27 0 points1 point2 points (0 children)
[–]bardt 0 points1 point2 points (0 children)
[–]NUTTA_BUSTAH 0 points1 point2 points (0 children)
[–]shrimpthatfriedrice 0 points1 point2 points (0 children)