Skip to main content

Preventing accidentally resource deletion - Lock Resource | Azure

A week ago, one of our team member modified a script that clean (removes) Azure resources, based on a naming convention. Because the number of our Azure Subscription is limited, the Development Team is sharing the same subscription between them and for DEV and TEST environment.
To be able to have a control on resources and trace the owner of them we have:
  • Naming conventions: A prefix that specify the owner of the resource or the environment

    • rvteststorage (rv - Radu Vunvulea)
    • dv (Dev Environment) 
    • tt (Test Environment)
    • ...
  • Azure Resource Groups that give us the possibility to group resources together.
 
As we can see in the above diagram, Azure Resource Groups can be used with success to group together different resources that have a logic for your application or from a business perspective. 

Coming back to the initial cleaning script, there was a small bug in the script, that didn't took into account the prefix of Azure Resource Groups and removed all the resources that were under that subscription. 

Now, the questions is what we can do to avoid  this kind of things in the future. Of course, multiple subscriptions would be great, but this will not happen. A review of the script from another team member would work also, but not all the time there will be time for things like this and bugs like this cannot be seen each time.

How nice it would be to have a flag on our resources, that would not allow anybody to remove (delete) the resources. This features exist on AWS for some time and wait.... we forgot that from last year we have a similar feature on Azure also. 
This feature is called "Resource Lock" and allows us to lock a resource for deletion. People will be able to modify it, but as long as this flag is set, nobody will be able to delete this resource. In this way we can avoid in the future situations like this.
This lock can be set not only when we create the resource, but also after it and can be used for any time of resource. The Lock can be set using Power Shell by specifying LockLevel flag to 'CanNotDelete' of using ARM.

Power Shell
$resourceGroup = 'devenv'
$storageAccountName = 'devlogstorage'

New-AzureResourceLock -LockLevel CanNotDelete '
-LockNotes 'Delete is not allowed for DEV env storage' `
-LockName 'DevEnvStorageLock' `
-ResourceName $storageAccountName `
-ResourceType 'Microsoft.Storage/storageAccounts' `
-ResourceGroup $resourceGroup -Verbose

More information about this feature can be found on Azure page: https://azure.microsoft.com/en-us/documentation/articles/resource-group-lock-resources/

Comments

Popular posts from this blog

Why Database Modernization Matters for AI

  When companies transition to the cloud, they typically begin with applications and virtual machines, which is often the easier part of the process. The actual complexity arises later when databases are moved. To save time and effort, cloud adoption is more of a cloud migration in an IaaS manner, fulfilling current, but not future needs. Even organisations that are already in the cloud find that their databases, although “migrated,” are not genuinely modernised. This disparity becomes particularly evident when they begin to explore AI technologies. Understanding Modernisation Beyond Migration Database modernisation is distinct from merely relocating an outdated database to Azure. It's about making your data layer ready for future needs, like automation, real-time analytics, and AI capabilities. AI needs high throughput, which can be achieved using native DB cloud capabilities. When your database runs in a traditional setup (even hosted in the cloud), in that case, you will enc...

Cloud Myths: Migrating to the cloud is quick and easy (Pill 2 of 5 / Cloud Pills)

The idea that migration to the cloud is simple, straightforward and rapid is a wrong assumption. It’s a common misconception of business stakeholders that generates delays, budget overruns and technical dept. A migration requires laborious planning, technical expertise and a rigorous process.  Migrations, especially cloud migrations, are not one-size-fits-all journeys. One of the most critical steps is under evaluation, under budget and under consideration. The evaluation phase, where existing infrastructure, applications, database, network and the end-to-end estate are evaluated and mapped to a cloud strategy, is crucial to ensure the success of cloud migration. Additional factors such as security, compliance, and system dependencies increase the complexity of cloud migration.  A misconception regarding lift-and-shits is that they are fast and cheap. Moving applications to the cloud without changes does not provide the capability to optimise costs and performance, leading to ...

Cloud Myths: Cloud is Cheaper (Pill 1 of 5 / Cloud Pills)

Cloud Myths: Cloud is Cheaper (Pill 1 of 5 / Cloud Pills) The idea that moving to the cloud reduces the costs is a common misconception. The cloud infrastructure provides flexibility, scalability, and better CAPEX, but it does not guarantee lower costs without proper optimisation and management of the cloud services and infrastructure. Idle and unused resources, overprovisioning, oversize databases, and unnecessary data transfer can increase running costs. The regional pricing mode, multi-cloud complexity, and cost variety add extra complexity to the cost function. Cloud adoption without a cost governance strategy can result in unexpected expenses. Improper usage, combined with a pay-as-you-go model, can result in a nightmare for business stakeholders who cannot track and manage the monthly costs. Cloud-native services such as AI services, managed databases, and analytics platforms are powerful, provide out-of-the-shelve capabilities, and increase business agility and innovation. H...