Guardrails supported by Terraform against misadevnture or mistakes in landscape configuration ( esp. on customer landscape) #1113
Replies: 1 comment
-
There are several aspects to this:
The leading source of changes and configurations should be the Terraform configuration. The Terraform configuration should be kept a a source code repository using git mechanisms. Changes to the configuration must be authored via changes of the code i.e., via pull requests and we recommend to have a decent safety net for these changes in place (code review, automated checks, preliminary planning of the changes etc.). This is the safeguarding that you need to have in place. I would assume that potential reviewers are the same as the admins of the platform as of today. The change process you have in place will shift towards the checks in the code repository that hosts the changes with the potential that you can have a higher degree of automation and definitly less sources of manual errors. The application should be done after the pull request passed all checks. The execution of the change (= the execution of the In summary, you will have one more technical user in place that can do the changes. Coming back to your question, this would be one additional (technical) user that can apply changes. However, in the best case the number of user that can do changes on the platform can potentially be reduced or at least their privileges can be reduced. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Right now, any change to the structure is restricted to a couple of users with a higher level of privilege.
Does moving to Terraform expose us to the risk of allowing anyone else to mess up with the infrastructure through the code
In general, the safeguard provided by Terraform against misuse or mistakes
Beta Was this translation helpful? Give feedback.
All reactions