Managing Azure Policies with Infrastructure as Code principles: configuring diagnostic logs (Part 2)
In this post we’ll talk about one of the most important part of Azure Governance – Azure Policy. In this part there will be overview of Azure policies together with explaining how to use it for configuring Diagnostic Logs for Azure resources
Managing policies as Infrastructure as Code in Azure DevOps
Infrastructure as Code is a key principle of DevOps practice. This principle allows to describe cloud infrastructure via approved code and manage it through automatic provisioning using pipelines in from DevOps tools. One of the most important benefits of Iac is to create repetitive deployments and avoid human errors. This is primarily used to deploy resources and services, but government components like policies could be deployed as IaC too.
There are several way how to achieve this. Microsoft describes general concepts in Design Azure Policy as Code workflows article and offers easy integration of policies as code with GitHub. Policies could also be described as Azure blueprint (another part of Azure Governance) artifacts. However, Azure doesn’t provide out of the box automation for blueprints, so IaC principles could be applied to them too.
My solution is based on Tao Yang’s brilliant blog series but with several major changes. Management group structure is defined in code repository in different way and all scripts are written by me.
Here are some highlights of this solution:
- Solution consists of three components: repository describing policies and management group, build pipeline performing tests of definition and assignment files in JSON format and release pipeline publishing it all to Azure
- Solution automates deployment and assignment for Azure initiatives (aka policy set)
- Automation is performed for a single tenant. It’s possible to extend it for multi-tenant scenarios adding more root management group to root repo directory and creating additional build adn release pipelines with separate ADO service connection per each tenant
- Build pipeline is enabled for continuous integration and triggers for every commit
- Important: make sure microsoft.insights provider is registered for a subscription(s) before assigning policy configuring Diagnostic Logs otherwise the following error might occur
Code repository
Directory structure for policy management reflects hierarchy of management group in a tenant. Tenant root management group resides in root repo directory and has name corresponding to MG GUID. Child groups are sub-directories of this folder. Policy initiatives are created in directory _policy
. Every policy set is located inside policy.json file (hardcoded in scripts). Policy set assignments always have JSON file names prefixed with ‘assignment.’. This structure is similar to one described in Microsoft article about policy as code in GitHub.
Service connection in Azure DevOps
Service connection in ADO is a way to connect to services to perform various task. When talking about Azure, technically it usually either unmanaged or managed (managed identity linked to VM) service principle. It could be created manually or from ADO portal. Service principle created from the portal provides Owner role to the chosen level.
However we might want to assign more granular permissions for pipelines deploying and assigning policies. For our pipeline we need following permissions:
- Create deployment. Permission:
Microsoft.Resources/deployments/*
- Deploy and assign policies. Permissions:
Microsoft.Authorization/policyassignments/*
Microsoft.Authorization/policyDefinitions/*
Microsoft.Authorization/policysetdefinitions/*
- Assign IAM roles for managed identities of
DeployIfNotExists
policies. Permission:Microsoft.Authorization/roleAssignments/*
Therefore if we want one role, we’d need to create custom one. For simplicity I’ll use Owner role for this example. This indeed makes protection access ADO project where service connector is stored important the same way as access to Azure tenant itself.
Build pipeline
Build pipeline (shown as ‘Pipeline’ in ADO GUI) is normally used to compile and build software code. When performing Infrastructure as Code there is no need to build template files. We’ll perform test JSON files before trying to publish and assigning them.
I simplify the build pipeline and don’t perform complex tests. Test is done using Pester and all it does is checking if JSON files have correct format. Tao Yang developed tests specific to Azure policies that could be used instead.
Pipeline is defined using classic Azure DevOps interface and consists of four tasks:
- powershell performing tests
- Publish test results from 1st task in XML format
- Copy scripts and whole MG structure from repo for a build pipeline
- Publishing artifacts for a build pipeline
The pipeline is configured for CI. To make it multi-tenant, specify root management group all tenants per each build pipeline.
pool:
name: Azure Pipelines
steps:
- powershell: |
import-module pester -Force -RequiredVersion 3.4.0
Import-Module $(Build.SourcesDirectory)\_scripts\Tests\Test-JSON-Content.psm1
Test-JSONContent -Path "$(Build.SourcesDirectory)" -OutputFile "TEST--JSON-blueprint.XML"
failOnStderr: true
displayName: 'Run Test-JSON'
- task: PublishTestResults@2
displayName: 'Publish Test Results **/TEST-*.xml'
inputs:
failTaskOnFailedTests: true
- task: CopyFiles@2
displayName: 'Copy policies and scripts'
inputs:
SourceFolder: '$(Build.SourcesDirectory)'
Contents: |
**/*
!.git/**/*
TargetFolder: '$(Build.ArtifactStagingDirectory)'
- task: PublishBuildArtifacts@1
displayName: 'Publish Artifacts'
Release pipeline
Release pipeline (called just ‘Release’ in ADO interface) is automated way to push code to production. In our case that is policy publishing to the Azure. The pipeline is very simple and contains two stages each containing two tasks of type Azure PowerShell.
Each tasks is one of two PS scripts that define all logic of managing policies based on management group structure described in repo I wrote about above.
Set-AzMGPolicySetDeployment.ps1
. Script publishes policy initiative definition to a management group. This script accept as input parameter path for the root folder where management group structure is defined along with the policies. Each sub-folder under ‘_policies’ directory is considered as policy initiative. Policy should be defined in policy.json file inside policy folder. Name of the folder should be equal to name of initiative defined in template (name property for type Microsoft.Authorization/policySetDefinitions). The script uses standard comandlets from Az module like New-AzManagementGroupDeployment, Get-AzManagementGroup. (When management groups were released only available programmic method to create deployment at MG level was to use REST API). Parameters:[Parameter(Mandatory = $True, HelpMessage = 'Specify local folder containing management group and policies')] [ValidateScript( { Test-Path $_ })] [String]$PoliciesRootFolder, [Parameter(Mandatory = $false, HelpMessage = 'Location for the deployment, westeurope by default')] [String]$DeploymentLocation = 'westeurope', [Parameter(Mandatory = $false, HelpMessage = 'Optional parameter for temporary management group for tests')] [String]$TestManagementGroup
Set-AzMGPolicySetAssignment.ps1
. Script creates assignment to a management group. It has the same parameters as script for definition deployment. It usesassignment.*.json
files inside policy set folders and use parameters from there to create assignment. Names of management group where policy will be assigned follow the ‘assignment.’ word of file names. For example,assignment.MG1.json
contains assignment parameters for MG1 management group. Script automatically sets policyDefinitionId property inside definitions. It also assigns Contributor role for policy assignment where managed identity is used (“type”: “SystemAssigned”). It uses Graph API to perform an assignment to a management group.
Each stage therefore consists of two tasks that first deploy and then assign policies.
- Task Publish Policy Set to Test/Prod environment
steps:
- task: AzurePowerShell@5
displayName: 'Publish Policy Set to Test environment'
inputs:
azureSubscription: 'Azure-DevOps-Connector'
ScriptPath: '$(System.DefaultWorkingDirectory)\$(Release.PrimaryArtifactSourceAlias)\drop\_scripts\Governance\Set-AzMGPolicySetDeployment.ps1'
ScriptArguments: '-PoliciesRootFolder "$(System.DefaultWorkingDirectory)\$(Release.PrimaryArtifactSourceAlias)\drop" -TestManagementGroup "TestMG" -Verbose'
azurePowerShellVersion: LatestVersion
- Task Assign Policy Set to Test/Prod environment
steps:
- task: AzurePowerShell@5
displayName: 'Assign Policy Set to Test environment'
inputs:
azureSubscription: 'Azure-DevOps-Connector'
ScriptPath: '$(System.DefaultWorkingDirectory)\$(Release.PrimaryArtifactSourceAlias)\drop\_scripts\Governance\Set-AzMGPolicySetAssignment.ps1'
ScriptArguments: '-PoliciesRootFolder "$(System.DefaultWorkingDirectory)\$(Release.PrimaryArtifactSourceAlias)\drop" -TestManagementGroup "TestMG" -Verbose'
azurePowerShellVersion: LatestVersion
Depending on task Set-AzMGPolicySetDeployment.ps1
or Set-AzMGPolicySetAssignment.ps1
is invoked. For test stage additional parameter is used: -TestManagementGroup “TestMG”.
Stage two is triggered upon approval after publishing and assigning to test environment is completed.
Pipeline is enabled for continuous deployment and triggered after build pipeline deploys artifacts.
Testing it all together
Here is the sequence of publishing policy definitions and performing assignments by ADO:
- commit is performed to repository to directory representing root management group
- commit triggers build pipeline checking policies and publishing artifacts (scripts and MG structure with policy files)
- Upon completion release pipeline publish policies first to test environment and awaits for approval to continue for production
- In Azure deployment is created at management group level
- assignment is performed for each MG defined in assignment file names
- Troubleshooting could be done using logs of build and release pipelines
Script sources
Scripts for both pipelines could be found in Azure Policies repo of my GitHub.
Azure DevOps project with repository and pipelines is made public and accessible using a link.