зеркало из
1
0
Форкнуть 0
Rules to validate Azure resources and infrastructure as code (IaC) using PSRule.
Перейти к файлу
Bernie White 0eb13ae8d0
Add NuGet config (#1647)
2022-09-14 18:37:27 +10:00
.azure-pipelines Updated CI versions (#1623) 2022-09-09 00:40:37 +10:00
.config Fixes for VM rules #312 #313 #314 (#315) 2020-03-13 21:35:12 +10:00
.devcontainer Updates to codespaces (#1645) 2022-09-13 16:29:18 +10:00
.github Bump microsoft/ps-rule from 2.3.2 to 2.4.0 (#1639) 2022-09-13 12:29:28 +10:00
.ps-rule Added refs for remaining rules #1431 #1430 (#1460) 2022-06-07 23:37:27 +10:00
.vscode Issue 1479: Check that usernames are not literals (#1488) 2022-09-03 20:02:47 +10:00
data Bump resource providers (#1605) 2022-09-12 22:52:22 +10:00
docs Merge updates from v1.19.2 (#1648) 2022-09-14 17:46:35 +10:00
overrides Added Giscus comment system to pages (#1573) 2022-08-15 01:36:29 +10:00
scripts Bump resource providers (#1598) 2022-08-29 17:55:08 +10:00
src Added Azure.VMSS.PublicKey (#1638) 2022-09-14 17:15:37 +10:00
tests Added Azure.VMSS.PublicKey (#1638) 2022-09-14 17:15:37 +10:00
.editorconfig Bump support projects to .NET 6 #1560 (#1583) 2022-08-18 19:51:16 +10:00
.gitignore Added refs for remaining rules #1431 #1430 (#1460) 2022-06-07 23:37:27 +10:00
.markdownlint.json Documentation updates (#1626) 2022-09-11 14:20:47 +10:00
BaselineToc.Doc.ps1 Add visible tags to baseline and rule docs (#974) 2021-09-18 16:23:07 +10:00
CHANGELOG.md Release v1.0.0 (#627) 2021-02-02 10:35:20 +10:00
CODE_OF_CONDUCT.md Apply OSS guidelines #250 #251 (#260) 2020-02-06 22:22:54 +11:00
CONTRIBUTING.md Added refs for remaining rules #1431 #1430 (#1460) 2022-06-07 23:37:27 +10:00
GitVersion.yml Added GitVersion config (#1375) 2022-04-26 13:37:16 +10:00
LICENSE Apply OSS guidelines #250 #251 (#260) 2020-02-06 22:22:54 +11:00
NuGet.config Add NuGet config (#1647) 2022-09-14 18:37:27 +10:00
PSRule.Rules.Azure.sln Updates to packaging for #1428 (#1489) 2022-06-22 23:42:36 +10:00
README.md Bump PowerShell dependencies (#1574) 2022-08-16 03:19:26 +10:00
RuleHelp.Doc.ps1 Update links with Azure org #800 (#804) 2021-06-18 00:14:44 +10:00
RuleToc.Doc.ps1 Added rule preview information block (#1571) 2022-08-14 18:31:37 +10:00
SECURITY.md Updated project file descriptions (#515) 2020-09-26 21:34:17 +10:00
SUPPORT.md Web updates (#803) 2021-06-17 23:55:40 +10:00
ThirdPartyNotices.txt Export template with custom subscription and resource group #651 (#659) 2021-02-22 21:27:01 +10:00
build.ps1 Expanded contributing instructions (#292) 2020-02-18 22:42:48 +10:00
mkdocs.yml Add outbound management example (#1625) 2022-09-09 04:13:07 +10:00
modules.json Bump PowerShell dependencies (#1620) 2022-09-06 09:41:35 +10:00
pipeline.build.ps1 Rule updates with metadata and ASB controls #1610 (#1611) 2022-09-04 13:02:16 +10:00
ps-docs.yaml Bump CI pipeline (#828) 2021-07-06 13:58:43 +10:00
ps-project.yaml Bump PSRule dependency to v1.9.0 #1081 (#1082) 2021-11-11 01:48:16 +10:00
ps-rule.yaml Added GitHub based code scans (#1170) 2021-12-22 13:37:15 +10:00
requirements-docs.txt Bump mkdocs-material from 8.4.3 to 8.4.4 (#1640) 2022-09-13 14:59:46 +10:00

README.md

PSRule for Azure

A suite of rules to validate Azure resources and infrastructure as code (IaC) using PSRule.

Open in vscode.dev

Features of PSRule for Azure include:

  • Ready to go - Leverage over 280 pre-built rules to validate Azure resources.

  • DevOps - Validate resources and infrastructure code pre or post-deployment.

  • Cross-platform - Run on MacOS, Linux, and Windows.

Project objectives

  1. Ready to go:
  2. DevOps:
    • Resources and templates can be validated before deployment within DevOps workflows.
    • Allow pull request (PR) validation to prevent invalid configuration being merged.
  3. Enterprise ready:
    • Rules can be directly adopted and additional enterprise specific rules can be layed on.
    • Provide regular baselines to allow progressive adoption.

Support

This project uses GitHub Issues to track bugs and feature requests. Before logging an issue please see our troubleshooting guide.

Please search the existing issues before filing new issues to avoid duplicates.

  • For new issues, file your bug or feature request as a new issue.
  • For help, discussion, and support questions about using this project, join or start a discussion.

If you have any problems with the PSRule engine, please check the project GitHub issues page instead.

Support for this project/ product is limited to the resources listed above.

Getting the modules

This project requires the PSRule and Az PowerShell modules. For details on each see install.

You can download and install these modules from the PowerShell Gallery.

Module Description Downloads / instructions
PSRule.Rules.Azure Validate Azure resources and infrastructure as code using PSRule. latest / instructions

Getting started

PSRule for Azure provides two methods for analyzing Azure resources:

  • Pre-flight - Before resources are deployed from Azure Resource Manager templates.
  • In-flight - After resources are deployed to an Azure subscription.

For specific use cases see scenarios. For additional details see the FAQ.

Using with GitHub Actions

The following example shows how to setup GitHub Actions to validate templates pre-flight.

  1. See Creating a workflow file.
  2. Reference Microsoft/ps-rule with modules: 'PSRule.Rules.Azure'.

For example:

# Example: .github/workflows/analyze-arm.yaml

#
# STEP 1: Template validation
#
name: Analyze templates
on:
  push:
    branches:
    - main
  pull_request:
    branches:
    - main
jobs:
  analyze_arm:
    name: Analyze templates
    runs-on: ubuntu-latest
    steps:

    - name: Checkout
      uses: actions/checkout@v3

    # STEP 2: Run analysis against exported data
    - name: Analyze Azure template files
      uses: microsoft/ps-rule@v2.3.2
      with:
        modules: 'PSRule.Rules.Azure'  # Analyze objects using the rules within the PSRule.Rules.Azure PowerShell module.

Using with Azure Pipelines

The following example shows how to setup Azure Pipelines to validate templates pre-flight.

  1. Install PSRule extension for Azure DevOps marketplace.
  2. Create a new YAML pipeline with the Starter pipeline template.
  3. Add the Install PSRule module task.
    • Set module to PSRule.Rules.Azure.
  4. Add the PSRule analysis task.
    • Set input type to repository.
    • Set modules to PSRule.Rules.Azure.

For example:

# Example: .azure-pipelines/analyze-arm.yaml

#
# STEP 2: Template validation
#
jobs:
- job: 'analyze_arm'
  displayName: 'Analyze templates'
  pool:
    vmImage: 'ubuntu-20.04'
  steps:

  # STEP 3: Install PSRule.Rules.Azure from the PowerShell Gallery
  - task: ps-rule-install@2
    displayName: Install PSRule.Rules.Azure
    inputs:
      module: 'PSRule.Rules.Azure'   # Install PSRule.Rules.Azure from the PowerShell Gallery.

  # STEP 4: Run analysis against exported data
  - task: ps-rule-assert@2
    displayName: Analyze Azure template files
    inputs:
      modules: 'PSRule.Rules.Azure'   # Analyze objects using the rules within the PSRule.Rules.Azure PowerShell module.

Using locally

The following example shows how to setup PSRule locally to validate templates pre-flight.

  1. Install the PSRule.Rules.Azure module and dependencies from the PowerShell Gallery.
  2. Run analysis against repository files.

For example:

# STEP 1: Install PSRule.Rules.Azure from the PowerShell Gallery
Install-Module -Name 'PSRule.Rules.Azure' -Scope CurrentUser;

# STEP 2: Run analysis against exported data
Assert-PSRule -Module 'PSRule.Rules.Azure' -InputPath 'out/templates/' -Format File;

Export in-flight resource data

The following example shows how to setup PSRule locally to validate resources running in a subscription.

  1. Install the PSRule.Rules.Azure module and dependencies from the PowerShell Gallery.
  2. Connect and set context to an Azure subscription from PowerShell.
  3. Export the resource data with the Export-AzRuleData cmdlet.
  4. Run analysis against exported data.

For example:

# STEP 1: Install PSRule.Rules.Azure from the PowerShell Gallery
Install-Module -Name 'PSRule.Rules.Azure' -Scope CurrentUser;

# STEP 2: Authenticate to Azure, only required if not currently connected
Connect-AzAccount;

# Confirm the current subscription context
Get-AzContext;

# STEP 3: Exports a resource graph stored as JSON for analysis
Export-AzRuleData -OutputPath 'out/templates/';

# STEP 4: Run analysis against exported data
Assert-PSRule -Module 'PSRule.Rules.Azure' -InputPath 'out/templates/';

Additional options

By default, resource data for the current subscription context will be exported.

To export resource data for specific subscriptions use:

  • -Subscription - to specify subscriptions by id or name.
  • -Tenant - to specify subscriptions within an Azure Active Directory Tenant by id.

For example:

# Export data from two specific subscriptions
Export-AzRuleData -Subscription 'Contoso Production', 'Contoso Non-production';

To export specific resource data use:

  • -ResourceGroupName - to filter resources by Resource Group.
  • -Tag - to filter resources based on tag.

For example:

# Export information from two resource groups within the current subscription context
Export-AzRuleData -ResourceGroupName 'rg-app1-web', 'rg-app1-db';

To export resource data for all subscription contexts use:

  • -All - to export resource data for all subscription contexts.

For example:

# Export data from all subscription contexts
Export-AzRuleData -All;

To filter results to only failed rules, use Invoke-PSRule -Outcome Fail. Passed, failed and error results are shown by default.

For example:

# Only show failed results
Invoke-PSRule -InputPath 'out/templates/' -Module 'PSRule.Rules.Azure' -Outcome Fail;

The output of this example is:

   TargetName: storage

RuleName                            Outcome    Recommendation
--------                            -------    --------------
Azure.Storage.UseReplication        Fail       Storage accounts not using GRS may be at risk
Azure.Storage.SecureTransferRequ... Fail       Storage accounts should only accept secure traffic
Azure.Storage.SoftDelete            Fail       Enable soft delete on Storage Accounts

A summary of results can be displayed by using Invoke-PSRule -As Summary.

For example:

# Display as summary results
Invoke-PSRule -InputPath 'out/templates/' -Module 'PSRule.Rules.Azure' -As Summary;

The output of this example is:

RuleName                            Pass  Fail  Outcome
--------                            ----  ----  -------
Azure.ACR.MinSku                    0     1     Fail
Azure.AppService.PlanInstanceCount  0     1     Fail
Azure.AppService.UseHTTPS           0     2     Fail
Azure.Resource.UseTags              73    36    Fail
Azure.SQL.ThreatDetection           0     1     Fail
Azure.SQL.Auditing                  0     1     Fail
Azure.Storage.UseReplication        1     7     Fail
Azure.Storage.SecureTransferRequ... 2     6     Fail
Azure.Storage.SoftDelete            0     8     Fail

Scenarios

For walk through examples of PSRule for Azure module usage see:

Rule reference

PSRule for Azure includes rules across five pillars of the Microsoft Azure Well-Architected Framework.

To view a list of rules by Azure resources see:

Baseline reference

The following baselines are included within PSRule.Rules.Azure.

Language reference

PSRule for Azure extends PowerShell with the following cmdlets.

Commands

PSRule for Azure included the following cmdlets:

Concepts

To find out more, look at these conceptual topics:

The following projects can also be used with PSRule for Azure.

Name Description
PSRule.Rules.CAF A suite of rules to validate Azure resources against the Cloud Adoption Framework (CAF) using PSRule.
PSRule.Monitor Send and query PSRule analysis results in Azure Monitor.
PSRule-pipelines An Azure DevOps extension for using PSRule within Azure Pipelines.
ps-rule Validate infrastructure as code (IaC) and DevOps repositories using GitHub Actions.

Changes and versioning

This repository uses semantic versioning to declare breaking changes. For a list of module changes please see the change log.

Pre-release module versions are created on major commits and can be installed from the PowerShell Gallery. Pre-release versions should be considered experimental. Modules and change log details for pre-releases will be removed as standard releases are made available.

Contributing

This project welcomes contributions and suggestions. If you are ready to contribute, please visit the contribution guide.

Code of Conduct

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

Maintainers

License

This project is licensed under the MIT License.