|
771 | 771 | "description": "If 'Yes' is selected, policy will be assigned to enforce Hybrid VM monitoring."
|
772 | 772 | }
|
773 | 773 | },
|
774 |
| - "enableAksPolicy": { |
775 |
| - "type": "string", |
776 |
| - "defaultValue": "No", |
777 |
| - "allowedValues": [ |
778 |
| - "Yes", |
779 |
| - "Audit", |
780 |
| - "No" |
781 |
| - ] |
782 |
| - }, |
783 | 774 | "denyAksPrivileged": {
|
784 | 775 | "type": "string",
|
785 | 776 | "defaultValue": "No",
|
|
1610 | 1601 | "azVmssMonitorPolicyAssignment": "[uri(deployment().properties.templateLink.uri, 'managementGroupTemplates/policyAssignments/DINE-VMSSMonitoringPolicyAssignment.json')]",
|
1611 | 1602 | "azVmHybridMonitorPolicyAssignment": "[uri(deployment().properties.templateLink.uri, 'managementGroupTemplates/policyAssignments/DINE-VMHybridMonitoringPolicyAssignment.json')]",
|
1612 | 1603 | "azVmBackupPolicyAssignment": "[uri(deployment().properties.templateLink.uri, 'managementGroupTemplates/policyAssignments/DINE-VMBackupPolicyAssignment.json')]",
|
1613 |
| - "azPolicyForAksPolicyAssignment": "[uri(deployment().properties.templateLink.uri, 'managementGroupTemplates/policyAssignments/DINE-AksPolicyPolicyAssignment.json')]", |
1614 | 1604 | "aksPrivEscalationPolicyAssignment": "[uri(deployment().properties.templateLink.uri, 'managementGroupTemplates/policyAssignments/DENY-AksPrivEscalationPolicyAssignment.json')]",
|
1615 | 1605 | "aksPrivilegedPolicyAssignment": "[uri(deployment().properties.templateLink.uri, 'managementGroupTemplates/policyAssignments/DENY-AksPrivilegedPolicyAssignment.json')]",
|
1616 | 1606 | "tlsSslPolicyAssignment": "[uri(deployment().properties.templateLink.uri, 'managementGroupTemplates/policyAssignments/DENY-DINE-APPEND-TLS-SSL-PolicyAssignment.json')]",
|
|
1735 | 1725 | "azVmHybridMonitorPolicyDeploymentName": "[take(concat('alz-AzVmHybridMonitor', variables('deploymentSuffix')), 64)]",
|
1736 | 1726 | "azBackupLzPolicyDeploymentName": "[take(concat('alz-AzBackupLz', variables('deploymentSuffix')), 64)]",
|
1737 | 1727 | "azBackupIdentityPolicyDeploymentName": "[take(concat('alz-AzBackupIdentity', variables('deploymentSuffix')), 64)]",
|
1738 |
| - "azPolicyForAksPolicyDeploymentName": "[take(concat('alz-AksPolicy', variables('deploymentSuffix')), 64)]", |
1739 | 1728 | "aksPrivEscalationPolicyDeploymentName": "[take(concat('alz-AksPrivEsc', variables('deploymentSuffix')), 64)]",
|
1740 | 1729 | "aksHttpsPolicyDeploymentName": "[take(concat('alz-AksHttps', variables('deploymentSuffix')), 64)]",
|
1741 | 1730 | "aksPrivilegedPolicyDeploymentName": "[take(concat('alz-AksPrivileged', variables('deploymentSuffix')), 64)]",
|
|
6236 | 6225 | }
|
6237 | 6226 | }
|
6238 | 6227 | },
|
6239 |
| - { |
6240 |
| - // Assigning Azure Policy enablement policy for AKS to landing zones management group if condition is true |
6241 |
| - "condition": "[or(equals(parameters('enableAksPolicy'), 'Yes'), equals(parameters('enableAksPolicy'), 'Audit'))]", |
6242 |
| - "type": "Microsoft.Resources/deployments", |
6243 |
| - "apiVersion": "2020-10-01", |
6244 |
| - "name": "[variables('deploymentNames').azPolicyForAksPolicyDeploymentName]", |
6245 |
| - "scope": "[variables('scopes').lzsManagementGroup]", |
6246 |
| - "location": "[deployment().location]", |
6247 |
| - "dependsOn": [ |
6248 |
| - "policyCompletion" |
6249 |
| - ], |
6250 |
| - "properties": { |
6251 |
| - "mode": "Incremental", |
6252 |
| - "templateLink": { |
6253 |
| - "contentVersion": "1.0.0.0", |
6254 |
| - "uri": "[variables('deploymentUris').azPolicyForAksPolicyAssignment]" |
6255 |
| - }, |
6256 |
| - "parameters": { |
6257 |
| - "topLevelManagementGroupPrefix": { |
6258 |
| - "value": "[parameters('enterpriseScaleCompanyPrefix')]" |
6259 |
| - }, |
6260 |
| - "enforcementMode": { |
6261 |
| - "value": "[if(equals(parameters('enableaksPolicy'), 'Yes'), 'Default', 'DoNotEnforce')]" |
6262 |
| - } |
6263 |
| - } |
6264 |
| - } |
6265 |
| - }, |
6266 | 6228 | {
|
6267 | 6229 | // Assigning Aks Priv Escalation policy to landing zones management group if condition is true
|
6268 | 6230 | "condition": "[or(equals(parameters('denyAksPrivilegedEscalation'), 'Yes'), equals(parameters('denyAksPrivilegedEscalation'), 'Audit'))]",
|
|
0 commit comments