All Products
Search
Document Center

Resource Management:Getting started

Last Updated:Mar 15, 2024

This topic describes how to use a tag policy to standardize tag-related operations.

Background information

The Tag Policy feature supports the single-account mode and resource directory mode. For more information, see Modes of the Tag Policy feature.

When you use the Tag Policy feature for the first time, we recommend that you enable the feature by using a test account that has a small number of resources. If the test is successful, you can enable the feature by using a production account.

Use the Tag Policy feature that is in single-account mode

Step 1: Enable the Tag Policy feature

  1. Log on to the Resource Management console.

  2. In the left-side navigation pane, choose Tag Policy > Policy Library.

  3. On the Policy Library page, click Enable Tag Policy.

  4. In the Enable Tag Policy message, click OK.

    When you enable the Tag Policy feature, the system creates the service-linked role AliyunServiceRoleForTag. This role can resolve cross-service access issues. For more information, see Service-linked role for Tag.

Step 2: Create a tag policy

You can create and configure a tag policy to define the tags that must be added to a resource. This ensures that the tags added to the resource are compliant.

  1. In the left-side navigation pane, choose Tag Policy > Policy Library.

  2. On the Policy Library page, click Create Tag Policy.

  3. In the Basic Information section, configure Policy Name and Policy Description.

  4. In the Policy Details section, configure the policy details in one of the following modes:

    • Quick Mode (recommended)

      1. Enter a tag key.

      2. Select a policy scenario and configure rules based on your business requirements.

        • Add Tags with Specified Tag Values to Resources

          In a tag policy, you can specify tags that must be added to resources. You can also enable features such as automatic detection, automatic remediation, and pre-event interception for non-compliant tags based on the execution modes you specify for the tag policy.

          Rule

          Description

          Specify Allowed Tag Values

          The tag value that is allowed for the tag key. You can specify multiple tag values. You can also use an asterisk (*) as a wildcard to indicate any tag values.

          Policy Execution Mode

          • Post-detection

            Post-detection is the default execution mode of a tag policy used in this scenario. You can view the detection results on the Detection Results page. You can enable the following detection rules based on your business requirements:

            • Specify Resource Types for Detection: By default, post-detection is performed for all the supported types of resources. You can specify resource types based on your business requirements. If you specify resource types, post-detection is performed only for the specified types of resources.

            • Specify Resource Groups: By default, post-detection is performed for resources in all resource groups. You can specify resource groups based on your business requirements. You can specify up to 20 resource groups.

              Note

              The Tag Policy feature in resource directory mode does not support the Specify Resource Groups parameter.

            • Set Region Scope: By default, post-detection is performed for resources in all regions. You can specify regions based on your business requirements. You can specify up to 20 regions.

            • Automatic Remediation: If you select this option, the system automatically remediates non-compliant tags. You need to specify compliant tag values and the resource scope for automatic remediation. You can specify the resource scope only by using tags.

          • Pre-event Interception

            When you create a resource or add tags to an existing resource, the system performs a check. If the tags defined in the tag policy are not added to the resource, the resource creation or tag addition operation fails. The following descriptions provide details:

            • Scenario 1: Intercept non-compliant tags when you create a resource.

              Situations in which non-compliant tags exist

              • Situation 1: When you create a resource, you add a tag whose key is defined in a tag policy to the resource. However, the value of the tag is not defined in the tag policy.

              • Situation 2: When you create a resource, the tag key that is defined in a tag policy is not added to the resource.

              Default feature and feature in invitational preview

              • Default feature: Pre-event interception of non-compliant tags is triggered only in Situation 1. For information about the resource types and API operations that support the default feature, see the API operation that supports pre-event interception of non-compliant tags column in the Services that support tag policies section of the Overview topic.

              • Feature in invitational preview: Pre-event interception of non-compliant tags is triggered in both Situation 1 and Situation 2. If you want to use the feature in invitational preview, you must contact the customer business manager (CBM) of Alibaba Cloud to apply for a trial. For information about the resource types and API operations that support the feature in invitational preview, see the API operation that supports pre-event interception of non-compliant tags when you create a resource column in the Services that support tag policies section of the Overview topic.

              Example

              A tag policy in which the CostCenter:Beijing tag is defined for Elastic Compute Service (ECS) instances is created and attached to an Alibaba Cloud account. When you create an ECS instance within the Alibaba Cloud account, you must add the tag to the instance. Otherwise, the instance fails to be created. If you use the default feature, the system checks tag compliance of the instance based only on the tag key CostCenter when you create the instance. The check can be triggered regardless of the case sensitivity of the tag key. If a tag such as CostCenter:Beijing is added to the instance, the tag is compliant and the instance can be successfully created. If a tag such as costcenter:Shanghai is added to the instance, the tag is non-compliant and the instance cannot be created. If you use the feature in invitational preview, the system also checks whether the tag key CostCenter is added to the instance when you create the instance. If the tag CostCenter:Beijing is not added to the instance, the instance fails to be created.

            • Scenario 2: Intercept non-compliant tags when you add tags to a resource.

              When you add tags to a resource, the system checks whether the tag keys and tag values of the tags meet the requirements of a tag policy. You can add tags to the resource only if the tag keys and tag values of the tags meet the requirements of the tag policy.

        • Automatically Inherit Tags for Resources from Resource Groups

          After you add tags to a resource group, you can configure a tag policy to use the automatic tag inheritance feature. This feature allows resources that are added to or created in a resource group to automatically inherit the tags that are added to the resource group.

          Rule

          Description

          Specify Resource Types for Detection

          By default, all the supported types of resources are detected. You can specify resource types based on your business requirements. If you specify resource types, only the specified types of resources are detected.

          Specify Resource Groups

          By default, resources in all resource groups are detected. You can specify resource groups based on your business requirements. You can specify up to 20 resource groups.

          Note

          The Tag Policy feature in resource directory mode does not support the Specify Resource Groups parameter.

          Specify IDs of Resources to Be Excluded

          You can specify the IDs of resources that do not inherit tags from the resource groups to which the resources belong. You can specify up to 20 resource IDs.

          Set Region Scope

          By default, resources in all regions are detected. You can specify regions based on your business requirements. You can specify up to 20 regions.

        • Match Tag Values with Specified Regular Expression

          You can specify a regular expression in a tag policy to limit the format of tag values. Tag values that do not match the regular expression can be automatically remediated.

          Rule

          Description

          Specify Allowed Tag Values

          Enter a regular expression to limit the format of tag values.

          Policy Execution Mode

          Post-detection is the default execution mode of a tag policy used in this scenario. You can view the detection results on the Detection Results page. You can enable the following detection rules based on your business requirements:

          • Specify Resource Types for Detection: By default, post-detection is performed for all the supported types of resources. You can specify resource types based on your business requirements. If you specify resource types, post-detection is performed only for the specified types of resources.

          • Specify Resource Groups: By default, post-detection is performed for resources in all resource groups. You can specify resource groups based on your business requirements. You can specify up to 20 resource groups.

            Note

            The Tag Policy feature in resource directory mode does not support the Specify Resource Groups parameter.

          • Set Region Scope: By default, post-detection is performed for resources in all regions. You can specify regions based on your business requirements. You can specify up to 20 regions.

          • Automatic Remediation: If you select this option, the system automatically remediates non-compliant tags. You need to specify compliant tag values and the resource scope for automatic remediation. You can specify the resource scope only by using tags.

      You can click Add Tag Key to add tag keys and configure rules for the tag keys.

    • JSON

      In this mode, you need to specify the policy details in the JSON format. If you have high requirements for tag policies, use this mode. Before you use this mode, you must have a command of the syntax of a tag policy. For more information, see Syntax of a tag policy.

  5. Click Create.

Step 3: Attach the tag policy

After the tag policy is created, you must attach the policy to the current Alibaba Cloud account. This way, you can use the tag policy to standardize tags added to the resources within the account.

  1. In the left-side navigation pane, choose Tag Policy > Policy Library.

  2. On the Policy Library page, find the desired tag policy and click Attach in the Actions column.

  3. In the Attach message, click OK.

    The tag policy is attached to the Alibaba Cloud account that you use for logon.

Step 4: (Optional) View the effective policy

After the tag policy is attached to the current Alibaba Cloud account, you can view the effective policy of the account.

  1. In the left-side navigation pane, choose Tag Policy > Effective Policies.

  2. Click the tab of a policy scenario. On this tab, click the name of a tag key to view the basic information about the related effective policy and detection tasks.

Step 5: Check whether the tag policy is in effect

You can use the current Alibaba Cloud account or a RAM user within the account to perform a tag-related operation to check whether the tag policy is in effect. For example, you apply a tag policy to a virtual private cloud (VPC), and the tag policy defines that the tag CostCenter:Beijing must be added to the VPC. When you add tags to the VPC, only the compliant tag CostCenter:Beijing is added to the VPC. Non-compliant tags such as costCenter:Shanghai fail to be added to the VPC. This indicates that the tag policy is in effect.

Use the Tag Policy feature that is in resource directory mode

For security purposes, we recommend that you create a RAM user within the management account of your resource directory, attach the AdministratorAccess policy to the RAM user, and then use the RAM user as the administrator of the resource directory. Perform the following operations by using the RAM user. For more information about how to create a RAM user and grant permissions to the RAM user, see Create a RAM user and Grant permissions to RAM users.

Step 1: Enable the Tag Policy feature

  1. Log on to the Resource Management console.

  2. In the left-side navigation pane, choose Tag Policy > Policy Library.

  3. On the Policy Library page, click Enable Tag Policy.

  4. In the Enable Tag Policy dialog box, specify the mode of the Tag Policy feature that you want to enable.

    You can select both or one of the following options:

    • Enable Tag Policy for Resource Directory: If you select this option, the Tag Policy feature in resource directory mode is enabled.

    • Enable Tag Policy for Current Account: If you select this option, the Tag Policy feature in single-account mode is enabled.

  5. Click OK.

    When you enable the Tag Policy feature, the system creates the service-linked role AliyunServiceRoleForTag. This role can resolve cross-service access issues. For more information, see Service-linked role for Tag.

Step 2: Create a tag policy

You can create and configure a tag policy to define the tags that must be added to a resource. This ensures that the tags added to the resource are compliant.

  1. In the left-side navigation pane, choose Tag Policy > Policy Library.

  2. On the Resource Directory tab of the Policy Library page, click Create Tag Policy.

  3. In the Basic Information section, configure Policy Name and Policy Description.

  4. In the Policy Details section, configure the policy details in one of the following modes:

    • Quick Mode (recommended)

      1. Enter a tag key.

      2. Select a policy scenario and configure rules based on your business requirements.

        • Add Tags with Specified Tag Values to Resources

          In a tag policy, you can specify tags that must be added to resources. You can also enable features such as automatic detection, automatic remediation, and pre-event interception for non-compliant tags based on the execution modes you specify for the tag policy.

          Rule

          Description

          Specify Allowed Tag Values

          The tag value that is allowed for the tag key. You can specify multiple tag values. You can also use an asterisk (*) as a wildcard to indicate any tag values.

          Policy Execution Mode

          • Post-detection

            Post-detection is the default execution mode of a tag policy used in this scenario. You can view the detection results on the Detection Results page. You can enable the following detection rules based on your business requirements:

            • Specify Resource Types for Detection: By default, post-detection is performed for all the supported types of resources. You can specify resource types based on your business requirements. If you specify resource types, post-detection is performed only for the specified types of resources.

            • Specify Resource Groups: By default, post-detection is performed for resources in all resource groups. You can specify resource groups based on your business requirements. You can specify up to 20 resource groups.

              Note

              The Tag Policy feature in resource directory mode does not support the Specify Resource Groups parameter.

            • Set Region Scope: By default, post-detection is performed for resources in all regions. You can specify regions based on your business requirements. You can specify up to 20 regions.

            • Automatic Remediation: If you select this option, the system automatically remediates non-compliant tags. You need to specify compliant tag values and the resource scope for automatic remediation. You can specify the resource scope only by using tags.

          • Pre-event Interception

            When you create a resource or add tags to an existing resource, the system performs a check. If the tags defined in the tag policy are not added to the resource, the resource creation or tag addition operation fails. The following descriptions provide details:

            • Scenario 1: Intercept non-compliant tags when you create a resource.

              Situations in which non-compliant tags exist

              • Situation 1: When you create a resource, you add a tag whose key is defined in a tag policy to the resource. However, the value of the tag is not defined in the tag policy.

              • Situation 2: When you create a resource, the tag key that is defined in a tag policy is not added to the resource.

              Default feature and feature in invitational preview

              • Default feature: Pre-event interception of non-compliant tags is triggered only in Situation 1. For information about the resource types and API operations that support the default feature, see the API operation that supports pre-event interception of non-compliant tags column in the Services that support tag policies section of the Overview topic.

              • Feature in invitational preview: Pre-event interception of non-compliant tags is triggered in both Situation 1 and Situation 2. If you want to use the feature in invitational preview, you must contact the customer business manager (CBM) of Alibaba Cloud to apply for a trial. For information about the resource types and API operations that support the feature in invitational preview, see the API operation that supports pre-event interception of non-compliant tags when you create a resource column in the Services that support tag policies section of the Overview topic.

              Example

              A tag policy in which the CostCenter:Beijing tag is defined for Elastic Compute Service (ECS) instances is created and attached to an Alibaba Cloud account. When you create an ECS instance within the Alibaba Cloud account, you must add the tag to the instance. Otherwise, the instance fails to be created. If you use the default feature, the system checks tag compliance of the instance based only on the tag key CostCenter when you create the instance. The check can be triggered regardless of the case sensitivity of the tag key. If a tag such as CostCenter:Beijing is added to the instance, the tag is compliant and the instance can be successfully created. If a tag such as costcenter:Shanghai is added to the instance, the tag is non-compliant and the instance cannot be created. If you use the feature in invitational preview, the system also checks whether the tag key CostCenter is added to the instance when you create the instance. If the tag CostCenter:Beijing is not added to the instance, the instance fails to be created.

            • Scenario 2: Intercept non-compliant tags when you add tags to a resource.

              When you add tags to a resource, the system checks whether the tag keys and tag values of the tags meet the requirements of a tag policy. You can add tags to the resource only if the tag keys and tag values of the tags meet the requirements of the tag policy.

        • Automatically Inherit Tags for Resources from Resource Groups

          After you add tags to a resource group, you can configure a tag policy to use the automatic tag inheritance feature. This feature allows resources that are added to or created in a resource group to automatically inherit the tags that are added to the resource group.

          Rule

          Description

          Specify Resource Types for Detection

          By default, all the supported types of resources are detected. You can specify resource types based on your business requirements. If you specify resource types, only the specified types of resources are detected.

          Specify Resource Groups

          By default, resources in all resource groups are detected. You can specify resource groups based on your business requirements. You can specify up to 20 resource groups.

          Note

          The Tag Policy feature in resource directory mode does not support the Specify Resource Groups parameter.

          Specify IDs of Resources to Be Excluded

          You can specify the IDs of resources that do not inherit tags from the resource groups to which the resources belong. You can specify up to 20 resource IDs.

          Set Region Scope

          By default, resources in all regions are detected. You can specify regions based on your business requirements. You can specify up to 20 regions.

        • Match Tag Values with Specified Regular Expression

          You can specify a regular expression in a tag policy to limit the format of tag values. Tag values that do not match the regular expression can be automatically remediated.

          Rule

          Description

          Specify Allowed Tag Values

          Enter a regular expression to limit the format of tag values.

          Policy Execution Mode

          Post-detection is the default execution mode of a tag policy used in this scenario. You can view the detection results on the Detection Results page. You can enable the following detection rules based on your business requirements:

          • Specify Resource Types for Detection: By default, post-detection is performed for all the supported types of resources. You can specify resource types based on your business requirements. If you specify resource types, post-detection is performed only for the specified types of resources.

          • Specify Resource Groups: By default, post-detection is performed for resources in all resource groups. You can specify resource groups based on your business requirements. You can specify up to 20 resource groups.

            Note

            The Tag Policy feature in resource directory mode does not support the Specify Resource Groups parameter.

          • Set Region Scope: By default, post-detection is performed for resources in all regions. You can specify regions based on your business requirements. You can specify up to 20 regions.

          • Automatic Remediation: If you select this option, the system automatically remediates non-compliant tags. You need to specify compliant tag values and the resource scope for automatic remediation. You can specify the resource scope only by using tags.

      You can click Add Tag Key to add tag keys and configure rules for the tag keys.

    • JSON

      In this mode, you need to specify the policy details in the JSON format. If you have high requirements for tag policies, use this mode. Before you use this mode, you must have a command of the syntax of a tag policy. For more information, see Syntax of a tag policy.

  5. Click Create.

Step 3: Attach the tag policy

After the tag policy is created, you must attach the tag policy to the Root folder, a specific folder, or a specific member. This way, you can use the tag policy to standardize the tags added to the resources within the members.

  1. In the left-side navigation pane, choose Tag Policy > Policy Library.

  2. On the Policy Library page, click the Resource Directory tab.

  3. Find the desired tag policy and click Attach in the Actions column.

  4. In the Attach dialog box, select the objects to which you want to attach the tag policy, and click OK.

    The effective scope of the tag policy varies based on the object type.

    • Root folder: If you attach the tag policy to the Root folder, the tag policy takes effect for all members in the resource directory.

    • Specific folder: If you attach the tag policy to a specific folder, the tag policy takes effect only for all members in the folder.

    • Specific member: If you attach a tag policy to a specific member, the tag policy takes effect only for the member.

    Note

    If you enable only the Tag Policy feature in resource directory mode, you cannot attach tag policies to the management account of your resource directory. You can create tag policies for and attach tag policies to the account only after you enable the Tag Policy feature in single-account mode.

Step 4: (Optional) View the effective policy

After the tag policy is attached, you can use the RAM user to view the effective policy of the Root folder, the specific folder, or the specific member. You can use a member to view the effective policy of the member. An effective policy is obtained based on the inheritance relationship of a tag policy. For more information, see Inheritance of a tag policy and calculation of an effective tag policy.

  1. In the left-side navigation pane, choose Tag Policy > Effective Policies.

  2. View the related effective policy.

    • Click the Effective Policies for All Members tab to view the effective policies that are attached to the members in the resource directory and view the related detection tasks.

    • Click the Effective Policies for Current Resource Directory tab to view the effective policies that are attached to the management account of the resource directory and the folders and members in the resource directory and view the related detection tasks.

Step 5: Check whether the tag policy is in effect

  1. Use the RAM user to access a member to which the tag policy is attached.

  2. Perform a tag-related operation on a resource within the member to check whether the tag policy is in effect.

    For example, you apply a tag policy to a VPC, and the tag policy defines that the tag CostCenter:Beijing must be added to the VPC. When you add tags to the VPC, only the compliant tag CostCenter:Beijing is added to the VPC. Non-compliant tags such as costCenter:Shanghai fail to be added to the VPC. This indicates that the tag policy is in effect.