Skip to content

Commit da2b2e2

Browse files
author
Chris Sanders
committed
Update use-azure-policy-flux-2.md
Add info on assuring parameter is set. Add info on customizing.
1 parent 2791947 commit da2b2e2

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

articles/azure-arc/kubernetes/use-azure-policy-flux-2.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,9 @@ Verify you have `Microsoft.Authorization/policyAssignments/write` permissions on
4646
1. Give the policy assignment an easily identifiable **Name** and **Description**.
4747
1. Ensure **Policy enforcement** is set to **Enabled**.
4848
1. Select **Next**.
49-
1. Set the parameter values to be used while creating the `fluxConfigurations` resource.
49+
1. Set the parameter values to be used.
5050
* For more information about parameters, see the [tutorial on deploying Flux v2 configurations](./tutorial-use-gitops-flux2.md).
51+
* When creating Flux configurations you must provide a value for one (and only one) of these parameters: `repositoryRefBranch`, `repositoryRefTag`, `repositoryRefSemver`, `repositoryRefCommit`.
5152
1. Select **Next**.
5253
1. Enable **Create a remediation task**.
5354
1. Verify **Create a managed identity** is checked, and that the identity will have **Contributor** permissions.
@@ -67,6 +68,12 @@ For existing clusters, you may need to manually run a remediation task. This tas
6768
* You should see the namespace and artifacts that were created by the Flux configuration.
6869
* You should see the objects described by the manifests in the Git repo deployed on the cluster.
6970

71+
## Customizing a policy
72+
73+
The built-in policies cover the main scenarios for using GitOps with Flux v2 in your Kubernetes clusters. However, due to limitations on the number of parameters allowed in Azure Policy assignments (max of 20), not all parameters are present in the built-in policies. Also, to fit within the 20-parameter limit, only a single Kustomization can be created with the built-in policies.
74+
75+
If you have a scenario that differs from the built-in policies, you can overcome the limitations by creating [custom policies](../../governance/policy/tutorials/create-custom-policy-definition.md) using the built-in policies as templates. You can create custom policies that contain only the parameters you need, and hard-code the rest, therefore working around the 20-parameter limit.
76+
7077
## Next steps
7178

7279
[Set up Azure Monitor for Containers with Azure Arc-enabled Kubernetes clusters](../../azure-monitor/containers/container-insights-enable-arc-enabled-clusters.md).

0 commit comments

Comments
 (0)