Log in to your harness - The Modern Software Delivery Platform® account to give feedback

Feature Requests

Anonymous

Feature Requests for Harness. Select 'Category' based on the module you are requesting the feature for.
Unable to adjust the schedules priority order inside as rule using terraform. we can only adjust using manually.
Hi Team, Unable to adjust the schedules priority order inside as rule using terraform. we can only adjust using manually. We need support to set the order priority of scheduled inside a rule as well. Sample terraform code rule with 4 schedules. these 4 schedules are added randomly. Please refer attached tf file for used terraform code for rule with 4 schedules without priority. resource "harness_autostopping_rule_vm" "aws_vm" { name = "cpms-aws-ec2-01-us-work-hours1" cloud_connector_id = var.cloud _connector_id idle_time_mins = 5 filter { vm_ids = [ "i-xxx" ] regions = [ "us-east-2" ] } dry_run = false } Priorities test resource "harness_autostopping_schedule" "MondayThroughFridayUptimeFrom9amTo6pm_vm" { name = "MondayThroughFridayUptimeFrom9amTo6pm_vm" schedule_type = "uptime" time_zone = "EST" starting_from = "2025-01-02 15:04:05" repeats { days = ["MON", "TUE", "WED", "THU", "FRI"] start_time = "21:46" end_time = "22:00" } rules = concat([ harness_autostopping_rule_ vm.aws _ vm.id harness_autostopping_rule_ rds.aws _ rds.id , harness_autostopping_rule_scale_ group.aws _ asg.id ]) } resource "harness_autostopping_schedule" "twopmto3pmDowntimeOnWeekDays" { name = "twopmto3pmDowntimeOnWeekDays_2" schedule_type = "downtime" time_zone = "EST" starting_from = "2025-01-02 15:04:05" repeats { days = ["MON", "TUE", "WED", "THU", "FRI"] start_time = "14:01" end_time = "15:00" } rules = concat([ harness_autostopping_rule_ vm.aws _ vm.id harness_autostopping_rule_ rds.aws _ rds.id , harness_autostopping_rule_scale_ group.aws _ asg.id ]) } resource "harness_autostopping_schedule" "OverNightDowntimeOnWeekDays" { name = "OverNightDowntimeOnWeekDays_3" schedule_type = "downtime" time_zone = "EST" starting_from = "2026-01-02 15:04:05" repeats { days = ["MON", "TUE", "WED", "THU", "FRI"] start_time = "17:02" end_time = "18:00" } rules = concat([ harness_autostopping_rule_ vm.aws _ vm.id harness_autostopping_rule_ rds.aws _ rds.id , harness_autostopping_rule_scale_ group.aws _ asg.id ]) } resource "harness_autostopping_schedule" "CompleteDownTimeOnWeekEnd" { name = "CompleteDownTimeOnWeekEnd_4" schedule_type = "downtime" time_zone = "EST" starting_from = "2025-01-03 15:04:05" repeats { days = ["SUN", "SAT"] } rules = concat([ harness_autostopping_rule_ vm.aws _ vm.id harness_autostopping_rule_ rds.aws _ rds.id , harness_autostopping_rule_scale_ group.aws _ asg.id ]) }
1
·
General Platform Requests
·
this fiscal quarter
Multi-Tenant Org-Level Platform Controls — Per-BU Concurrency Quotas, Rate Limits, and Resource Guardrails at Org Scope
Harness Enterprise accounts running multiple organizations — each with distinct engineering teams, security postures, and compliance requirements — have no resource partitioning at the org tier today. All platform controls are either account-wide or project-level, with no intermediate org-level tier between them. This creates real operational risk in multi-org accounts: — One org's pipeline surge can queue out another org's commits with no isolation. — A delegate misconfiguration in one org can affect all other orgs on the same account. — OPA policies cannot be scoped per org — any policy is either account-wide or per-project, with no way to match a specific org's compliance posture. — Security reviews requiring prod delegate isolation cannot be satisfied with account-wide delegate pools. — A concurrency spike in one org causes an account-wide incident affecting all other orgs. Project-level concurrency controls are not a practical substitute at enterprise scale — they require per-project configuration and do not enforce org-level resource boundaries. We need org-scoped resource partitioning controls sitting between the account level and the project level: Per-org concurrent execution quota — enforced by Harness at the platform level, not by customer configuration. Each org gets an allocated slot count that other orgs cannot consume. Per-org delegate affinity — delegates registered to an org only accept tasks from that org's projects. Cross-org task routing is not possible without explicit configuration. Per-org OPA enforcement scope — policy sets applied at org scope, not just account or project scope, so each org's compliance rules apply only to its own pipelines. Per-org rate limits and timeout defaults — org-level settings override account defaults for that org's projects without requiring project-by-project configuration. Per-org audit and compliance scope — org-level audit log filtering so each org's security team can access only their own activity without account-wide visibility. Business value: Without org-level controls, enterprise customers running multiple business units or teams on a shared Harness account cannot safely isolate workloads, enforce per-team compliance rules, or prevent one team's activity from impacting others. Every new org onboarded increases the blast radius for all existing orgs. Org-scoped partitioning enables enterprise customers to operate a single shared platform without sacrificing isolation, compliance, or stability across teams.
0
·
General Platform Requests
Load More