Skip to content

Commit

Permalink
Updates
Browse files Browse the repository at this point in the history
  • Loading branch information
rajlearner17 committed Jan 16, 2025
1 parent 7360c0a commit d5220fa
Show file tree
Hide file tree
Showing 4 changed files with 9 additions and 3 deletions.
6 changes: 3 additions & 3 deletions docs/guides/github/decommission/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,8 @@ title: Decommission GitHub Organization
sidebar_label: Decommission GitHub Organization
---

CHANGES TODO

# Decommission GitHub Organization

In this guide, you will:
Expand All @@ -12,9 +14,7 @@ Guardrails allows administrators to remove a GitHub organization from a workspac

Before starting the process, administrators should determine whether Guardrails-managed resources (e.g., webhooks, event subscriptions) should remain in the organization. The following policies can be configured in Guardrails to facilitate cleanup. Ensure that these changes are applied **only to the target GitHub organization**.

1. `GitHub > Turbot > Permissions` set to `Enforce: None`. This removes Guardrails-managed roles and permissions in the organization.
2. `GitHub > Turbot > Event Handlers > Webhooks` set to `Enforce: Not Configured`. This removes Guardrails-configured webhooks.
3. `GitHub > Turbot > Event Poller` set to `Disabled`. This disables the polling of events into Guardrails.
1. `GitHub > Turbot > Event Handlers > Webhooks` set to `Enforce: Not Configured`. This removes Guardrails-configured webhooks.

Once these policies have been applied and the associated controls have completed their cleanup, the GitHub organization can be safely removed from the Guardrails workspace. You can customize these policies to target specific resources while retaining essential audit data.

Expand Down
3 changes: 3 additions & 0 deletions docs/guides/github/import-github-organization/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,9 @@ title: Import GitHub Organization
sidebar_label: Import GitHub Organization
---

CHANGES TODO


# Import GitHub Organization

In this guide, you will:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,8 @@ nav:
order: 20
---

CHANGES TODO

# GCP Event Pollers

Turbot Guardrails offers a polling mechanism for obtaining relevant events from GCP and
Expand Down
1 change: 1 addition & 0 deletions docs/guides/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ This section provides detailed step-by-step instructions on how to use Guardrail
| [Governing AWS](guides/aws) | Guides to import AWS accounts and configure AWS-specific Guardrails features.
| [Governing Azure](guides/azure) | Guides to import Azure accounts and configure Azure-specific Guardrails features.
| [Governing GCP](guides/gcp) | Guides to import GCP projects and configure GCP-specific Guardrails features.
| [Governing GitHub](guides/github) | Guides to import GitHub organization and configure GitHub-specific Guardrails features.
| [Governing Kubernetes](guides/kubernetes) | Guides to import Kubernetes clusters and configure Kubernetes-specific Guardrails features.
| [Hosting Guardrails](guides/hosting-guardrails) | How to install and maintain the Enterprise version of Turbot Guardrails running in your own AWS account.
| [Integrating ServiceNow](guides/servicenow) | How to install and manage Guardrail's ServiceNow CMDB sync.
Expand Down

0 comments on commit d5220fa

Please sign in to comment.