featured image

Monitoring for tag compliance is the most effective way to ensure compliance for your cloud environments. If your organization doesn’t enforce proper tagging policies, eventually, no one will know who originally launched the resources and for what purpose.

With nOps’ flexible tag-violation configuration, you will receive real-time notification if newly launched resources violate the tag policy. Let’s say if someone launches an instance with no Name tag, or if the value is empty or value doesn’t contain certain string, you’ll get real time notification with the context about who launched the resource. This is win-win situation, engineers can still experiment fast and IT can trace back every single resource.

Tag Violation Rule

To enable the rule, simply go to the “Available nOps Rules” tab in nOps Rules and click on the “Tag Violation Check” rule.

Tag Violation Summary

Once enabled, the rule will appear on the “Applied nOps Rules” tab with a summary of all resources that violates the rule.

Tag Violation Detail

Clicking on the rule in the “Applied nOps Rules” tab, you will be able to see, in detail, the number of resources and for which tag configurations do these violations occur.

Tag Configuration

To customize this rule to fit the unique nomenclature of your tags, if you use them, you can configure the tags in the Rule Configuration page.

Tag Violation Alerts

Once enabled, you can configure your nOps account to receive email, Slack, and/or Hipchat alerts, alerting you to newly recreated resources that violates the rule.

featured image

nOps Rules – Unused Resources

Unused resources accumulate in AWS as your workflows change and evolve. We do not tend to think about tidying up loose ends every time a workflow change occurs. For example, when you stop an EC2 instance, your automation might not delete EBS volumes. These volumes pile up and continue to incur cost. ELB has a […]
Continue Reading
featured image

nOps Rules – Root-user MFA

Enabling root user multi-factor authentication is great security practice. Some companies go as far as enabling physical MFA and locking it down in vault somewhere. nOps provide easy overview which one of your projects don’t have root MFA enabled. You can also receive real-time notifications when root logs in the console with our without MFA. […]
Continue Reading
featured image

nOps Rules – Unrestricted SSH

Allowing SSH access to everyone is not a secure practice. Once you configure Unrestricted SSH Monitoring, any time someone opens port 22 to all, you’ll receive real-time notification. Unrestricted SSH Rule To enable the rule, simply go to the “Available nOps Rules” tab in nOps Rules and click on the “Unrestricted SSH” rule. Unrestricted SSH […]
Continue Reading

Get started today with nOps Cloud Management for AWS

Monitor, analyze, and manage AWS changes, costs, performance, security, and compliance.