From 5ef4a835d723fdf76c9405925c94201442c4ebec Mon Sep 17 00:00:00 2001 From: Bayron Carranza Date: Thu, 16 Jun 2022 13:35:38 -0600 Subject: [PATCH] Feat cloudpass cloudwatch cloudtrail alarm (#311) --- .../README.md | 112 +++++++ .../context.tf | 279 ++++++++++++++++++ .../aws-cloudtrail-cloudwatch-alarms/main.tf | 84 ++++++ .../outputs.tf | 11 + .../variables.tf | 26 ++ .../aws/sns/suscription/README.md | 31 ++ terraform-modules/aws/sns/suscription/main.tf | 5 + .../aws/sns/suscription/variables.tf | 11 + 8 files changed, 559 insertions(+) create mode 100644 terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/README.md create mode 100644 terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/context.tf create mode 100644 terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/main.tf create mode 100644 terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/outputs.tf create mode 100644 terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/variables.tf create mode 100644 terraform-modules/aws/sns/suscription/README.md create mode 100644 terraform-modules/aws/sns/suscription/main.tf create mode 100644 terraform-modules/aws/sns/suscription/variables.tf diff --git a/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/README.md b/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/README.md new file mode 100644 index 000000000..8062b551b --- /dev/null +++ b/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/README.md @@ -0,0 +1,112 @@ +## Requirements + +No requirements. + +## Providers + +| Name | Version | +|------|---------| +| [aws](#provider\_aws) | n/a | + +## Modules + +| Name | Source | Version | +|------|--------|---------| +| [cis\_alarms](#module\_cis\_alarms) | cloudposse/cloudtrail-cloudwatch-alarms/aws | 0.14.3 | +| [cloudtrail](#module\_cloudtrail) | cloudposse/cloudtrail/aws | 0.17.0 | +| [cloudtrail\_s3\_bucket](#module\_cloudtrail\_s3\_bucket) | cloudposse/cloudtrail-s3-bucket/aws | 0.15.0 | +| [metric\_configs](#module\_metric\_configs) | cloudposse/config/yaml | 0.7.0 | +| [this](#module\_this) | cloudposse/label/null | 0.25.0 | + +## Resources + +| Name | Type | +|------|------| +| [aws_cloudwatch_log_group.default](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group) | resource | +| [aws_iam_role.cloudtrail_cloudwatch_events_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource | +| [aws_iam_role_policy.policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy) | resource | +| [aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity) | data source | +| [aws_iam_policy_document.assume_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source | +| [aws_iam_policy_document.log_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source | + +## Inputs + +| Name | Description | Type | Default | Required | +|------|-------------|------|---------|:--------:| +| [additional\_tag\_map](#input\_additional\_tag\_map) | Additional key-value pairs to add to each map in `tags_as_list_of_maps`. Not added to `tags` or `id`.
This is for some rare cases where resources want additional configuration of tags
and therefore take a list of maps with tag key, value, and additional configuration. | `map(string)` | `{}` | no | +| [attributes](#input\_attributes) | ID element. Additional attributes (e.g. `workers` or `cluster`) to add to `id`,
in the order they appear in the list. New attributes are appended to the
end of the list. The elements of the list are joined by the `delimiter`
and treated as a single ID element. | `list(string)` | `[]` | no | +| [cloudtrail\_event\_selector](#input\_cloudtrail\_event\_selector) | This enables the cloudtrail even selector to track all S3 API calls by default: https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail. | `list(object({include_management_events = bool, read_write_type = string, data_resource = list(object({type = string, values = list(string)}))}))` |
[
{
"data_resource": [
{
"type": "AWS::S3::Object",
"values": [
"arn:aws:s3"
]
}
],
"include_management_events": true,
"read_write_type": "All"
}
]
| no | +| [context](#input\_context) | Single object for setting entire context at once.
See description of individual variables for details.
Leave string and numeric variables as `null` to use default value.
Individual variable settings (non-null) override settings in context object,
except for attributes, tags, and additional\_tag\_map, which are merged. | `any` |
{
"additional_tag_map": {},
"attributes": [],
"delimiter": null,
"descriptor_formats": {},
"enabled": true,
"environment": null,
"id_length_limit": null,
"label_key_case": null,
"label_order": [],
"label_value_case": null,
"labels_as_tags": [
"unset"
],
"name": null,
"namespace": null,
"regex_replace_chars": null,
"stage": null,
"tags": {},
"tenant": null
}
| no | +| [delimiter](#input\_delimiter) | Delimiter to be used between ID elements.
Defaults to `-` (hyphen). Set to `""` to use no delimiter at all. | `string` | `null` | no | +| [descriptor\_formats](#input\_descriptor\_formats) | Describe additional descriptors to be output in the `descriptors` output map.
Map of maps. Keys are names of descriptors. Values are maps of the form
`{
format = string
labels = list(string)
}`
(Type is `any` so the map values can later be enhanced to provide additional options.)
`format` is a Terraform format string to be passed to the `format()` function.
`labels` is a list of labels, in order, to pass to `format()` function.
Label values will be normalized before being passed to `format()` so they will be
identical to how they appear in `id`.
Default is `{}` (`descriptors` output will be empty). | `any` | `{}` | no | +| [enabled](#input\_enabled) | Set to false to prevent the module from creating any resources | `bool` | `null` | no | +| [environment](#input\_environment) | ID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'staging', 'dev', 'UAT' | `string` | `null` | no | +| [id\_length\_limit](#input\_id\_length\_limit) | Limit `id` to this many characters (minimum 6).
Set to `0` for unlimited length.
Set to `null` for keep the existing setting, which defaults to `0`.
Does not affect `id_full`. | `number` | `null` | no | +| [label\_key\_case](#input\_label\_key\_case) | Controls the letter case of the `tags` keys (label names) for tags generated by this module.
Does not affect keys of tags passed in via the `tags` input.
Possible values: `lower`, `title`, `upper`.
Default value: `title`. | `string` | `null` | no | +| [label\_order](#input\_label\_order) | The order in which the labels (ID elements) appear in the `id`.
Defaults to ["namespace", "environment", "stage", "name", "attributes"].
You can omit any of the 6 labels ("tenant" is the 6th), but at least one must be present. | `list(string)` | `null` | no | +| [label\_value\_case](#input\_label\_value\_case) | Controls the letter case of ID elements (labels) as included in `id`,
set as tag values, and output by this module individually.
Does not affect values of tags passed in via the `tags` input.
Possible values: `lower`, `title`, `upper` and `none` (no transformation).
Set this to `title` and set `delimiter` to `""` to yield Pascal Case IDs.
Default value: `lower`. | `string` | `null` | no | +| [labels\_as\_tags](#input\_labels\_as\_tags) | Set of labels (ID elements) to include as tags in the `tags` output.
Default is to include all labels.
Tags with empty values will not be included in the `tags` output.
Set to `[]` to suppress all generated tags.
**Notes:**
The value of the `name` tag, if included, will be the `id`, not the `name`.
Unlike other `null-label` inputs, the initial setting of `labels_as_tags` cannot be
changed in later chained modules. Attempts to change it will be silently ignored. | `set(string)` |
[
"default"
]
| no | +| [metrics\_paths](#input\_metrics\_paths) | List of paths to CloudWatch metrics configurations | `list(string)` | n/a | yes | +| [name](#input\_name) | ID element. Usually the component or solution name, e.g. 'app' or 'jenkins'.
This is the only ID element not also included as a `tag`.
The "name" tag is set to the full `id` string. There is no tag with the value of the `name` input. | `string` | `null` | no | +| [namespace](#input\_namespace) | ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique | `string` | `null` | no | +| [regex\_replace\_chars](#input\_regex\_replace\_chars) | Terraform regular expression (regex) string.
Characters matching the regex will be removed from the ID elements.
If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. | `string` | `null` | no | +| [region](#input\_region) | n/a | `string` | n/a | yes | +| [stage](#input\_stage) | ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release' | `string` | `null` | no | +| [tags](#input\_tags) | Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`).
Neither the tag keys nor the tag values will be modified by this module. | `map(string)` | `{}` | no | +| [tenant](#input\_tenant) | ID element \_(Rarely used, not included by default)\_. A customer identifier, indicating who this instance of a resource is for | `string` | `null` | no | + +## Outputs + +| Name | Description | +|------|-------------| +| [dashboard\_combined](#output\_dashboard\_combined) | n/a | +| [dashboard\_individual](#output\_dashboard\_individual) | n/a | +| [sns\_topic\_arn](#output\_sns\_topic\_arn) | n/a | + +## What does it solve? + +https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-cis-controls.html#cis-1.1-remediation +https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-cis-controls.html#cis-3.3-remediation +- 1.1 – Avoid the use of the "root" account +- 3.3 – Ensure a log metric filter and alarm exist for usage of "root" account +https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-cis-controls.html#securityhub-cis-controls-3.8 +- 3.1 – Ensure a log metric filter and alarm exist for unauthorized API calls +- 3.2 – Ensure a log metric filter and alarm exist for AWS Management Console sign-in without MFA +- 3.4 – Ensure a log metric filter and alarm exist for IAM policy changes +- 3.5 – Ensure a log metric filter and alarm exist for CloudTrail configuration changes +- 3.6 – Ensure a log metric filter and alarm exist for AWS Management Console authentication failures +- 3.7 – Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs +- 3.8 – Ensure a log metric filter and alarm exist for S3 bucket policy changes +- 3.9 – Ensure a log metric filter and alarm exist for AWS Config configuration changes +- 3.10 – Ensure a log metric filter and alarm exist for security group changes +- 3.11 – Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) +- 3.12 – Ensure a log metric filter and alarm exist for changes to network gateways +- 3.13 – Ensure a log metric filter and alarm exist for route table changes +- 3.14 – Ensure a log metric filter and alarm exist for VPC changes + +## Best practice for adding alarms ? +We recommend adding this file through the input variable: ```input_metrics_paths``` +``` +metrics_paths = ["./cis_benchmark.yaml"] +``` +https://github.com/cloudposse/terraform-aws-cloudtrail-cloudwatch-alarms/blob/master/catalog/cis_benchmark.yaml + +If you want to add more alerts or modify existing alerts, you can use the following format: + +``` +ec2-instance-event-count: + metric_name: "EC2InstanceEventCount" + filter_pattern: + "{ ($.eventName = RunInstances) || ($.eventName = RebootInstances) || ($.eventName = StartInstances) || ($.eventName + = StopInstances) || ($.eventName = TerminateInstances) }" + metric_namespace: "CISBenchmark" + alarm_description: "Alarms when an API call is made to create, terminate, start, stop or reboot an EC2 instance." + metric_value: "1" + alarm_name: "EC2InstanceEventCountExceeded" + alarm_comparison_operator: "GreaterThanOrEqualToThreshold" + alarm_evaluation_periods: "1" + alarm_period: "300" + alarm_statistic: "Sum" + alarm_treat_missing_data: "notBreaching" + alarm_threshold: "1" +``` \ No newline at end of file diff --git a/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/context.tf b/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/context.tf new file mode 100644 index 000000000..3955ebd47 --- /dev/null +++ b/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/context.tf @@ -0,0 +1,279 @@ +# +# ONLY EDIT THIS FILE IN github.com/cloudposse/terraform-null-label +# All other instances of this file should be a copy of that one +# +# +# Copy this file from https://github.com/cloudposse/terraform-null-label/blob/master/exports/context.tf +# and then place it in your Terraform module to automatically get +# Cloud Posse's standard configuration inputs suitable for passing +# to Cloud Posse modules. +# +# curl -sL https://raw.githubusercontent.com/cloudposse/terraform-null-label/master/exports/context.tf -o context.tf +# +# Modules should access the whole context as `module.this.context` +# to get the input variables with nulls for defaults, +# for example `context = module.this.context`, +# and access individual variables as `module.this.`, +# with final values filled in. +# +# For example, when using defaults, `module.this.context.delimiter` +# will be null, and `module.this.delimiter` will be `-` (hyphen). +# + +module "this" { + source = "cloudposse/label/null" + version = "0.25.0" # requires Terraform >= 0.13.0 + + enabled = var.enabled + namespace = var.namespace + tenant = var.tenant + environment = var.environment + stage = var.stage + name = var.name + delimiter = var.delimiter + attributes = var.attributes + tags = var.tags + additional_tag_map = var.additional_tag_map + label_order = var.label_order + regex_replace_chars = var.regex_replace_chars + id_length_limit = var.id_length_limit + label_key_case = var.label_key_case + label_value_case = var.label_value_case + descriptor_formats = var.descriptor_formats + labels_as_tags = var.labels_as_tags + + context = var.context +} + +# Copy contents of cloudposse/terraform-null-label/variables.tf here + +variable "context" { + type = any + default = { + enabled = true + namespace = null + tenant = null + environment = null + stage = null + name = null + delimiter = null + attributes = [] + tags = {} + additional_tag_map = {} + regex_replace_chars = null + label_order = [] + id_length_limit = null + label_key_case = null + label_value_case = null + descriptor_formats = {} + # Note: we have to use [] instead of null for unset lists due to + # https://github.com/hashicorp/terraform/issues/28137 + # which was not fixed until Terraform 1.0.0, + # but we want the default to be all the labels in `label_order` + # and we want users to be able to prevent all tag generation + # by setting `labels_as_tags` to `[]`, so we need + # a different sentinel to indicate "default" + labels_as_tags = ["unset"] + } + description = <<-EOT + Single object for setting entire context at once. + See description of individual variables for details. + Leave string and numeric variables as `null` to use default value. + Individual variable settings (non-null) override settings in context object, + except for attributes, tags, and additional_tag_map, which are merged. + EOT + + validation { + condition = lookup(var.context, "label_key_case", null) == null ? true : contains(["lower", "title", "upper"], var.context["label_key_case"]) + error_message = "Allowed values: `lower`, `title`, `upper`." + } + + validation { + condition = lookup(var.context, "label_value_case", null) == null ? true : contains(["lower", "title", "upper", "none"], var.context["label_value_case"]) + error_message = "Allowed values: `lower`, `title`, `upper`, `none`." + } +} + +variable "enabled" { + type = bool + default = null + description = "Set to false to prevent the module from creating any resources" +} + +variable "namespace" { + type = string + default = null + description = "ID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp', to help ensure generated IDs are globally unique" +} + +variable "tenant" { + type = string + default = null + description = "ID element _(Rarely used, not included by default)_. A customer identifier, indicating who this instance of a resource is for" +} + +variable "environment" { + type = string + default = null + description = "ID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'staging', 'dev', 'UAT'" +} + +variable "stage" { + type = string + default = null + description = "ID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'build', 'test', 'deploy', 'release'" +} + +variable "name" { + type = string + default = null + description = <<-EOT + ID element. Usually the component or solution name, e.g. 'app' or 'jenkins'. + This is the only ID element not also included as a `tag`. + The "name" tag is set to the full `id` string. There is no tag with the value of the `name` input. + EOT +} + +variable "delimiter" { + type = string + default = null + description = <<-EOT + Delimiter to be used between ID elements. + Defaults to `-` (hyphen). Set to `""` to use no delimiter at all. + EOT +} + +variable "attributes" { + type = list(string) + default = [] + description = <<-EOT + ID element. Additional attributes (e.g. `workers` or `cluster`) to add to `id`, + in the order they appear in the list. New attributes are appended to the + end of the list. The elements of the list are joined by the `delimiter` + and treated as a single ID element. + EOT +} + +variable "labels_as_tags" { + type = set(string) + default = ["default"] + description = <<-EOT + Set of labels (ID elements) to include as tags in the `tags` output. + Default is to include all labels. + Tags with empty values will not be included in the `tags` output. + Set to `[]` to suppress all generated tags. + **Notes:** + The value of the `name` tag, if included, will be the `id`, not the `name`. + Unlike other `null-label` inputs, the initial setting of `labels_as_tags` cannot be + changed in later chained modules. Attempts to change it will be silently ignored. + EOT +} + +variable "tags" { + type = map(string) + default = {} + description = <<-EOT + Additional tags (e.g. `{'BusinessUnit': 'XYZ'}`). + Neither the tag keys nor the tag values will be modified by this module. + EOT +} + +variable "additional_tag_map" { + type = map(string) + default = {} + description = <<-EOT + Additional key-value pairs to add to each map in `tags_as_list_of_maps`. Not added to `tags` or `id`. + This is for some rare cases where resources want additional configuration of tags + and therefore take a list of maps with tag key, value, and additional configuration. + EOT +} + +variable "label_order" { + type = list(string) + default = null + description = <<-EOT + The order in which the labels (ID elements) appear in the `id`. + Defaults to ["namespace", "environment", "stage", "name", "attributes"]. + You can omit any of the 6 labels ("tenant" is the 6th), but at least one must be present. + EOT +} + +variable "regex_replace_chars" { + type = string + default = null + description = <<-EOT + Terraform regular expression (regex) string. + Characters matching the regex will be removed from the ID elements. + If not set, `"/[^a-zA-Z0-9-]/"` is used to remove all characters other than hyphens, letters and digits. + EOT +} + +variable "id_length_limit" { + type = number + default = null + description = <<-EOT + Limit `id` to this many characters (minimum 6). + Set to `0` for unlimited length. + Set to `null` for keep the existing setting, which defaults to `0`. + Does not affect `id_full`. + EOT + validation { + condition = var.id_length_limit == null ? true : var.id_length_limit >= 6 || var.id_length_limit == 0 + error_message = "The id_length_limit must be >= 6 if supplied (not null), or 0 for unlimited length." + } +} + +variable "label_key_case" { + type = string + default = null + description = <<-EOT + Controls the letter case of the `tags` keys (label names) for tags generated by this module. + Does not affect keys of tags passed in via the `tags` input. + Possible values: `lower`, `title`, `upper`. + Default value: `title`. + EOT + + validation { + condition = var.label_key_case == null ? true : contains(["lower", "title", "upper"], var.label_key_case) + error_message = "Allowed values: `lower`, `title`, `upper`." + } +} + +variable "label_value_case" { + type = string + default = null + description = <<-EOT + Controls the letter case of ID elements (labels) as included in `id`, + set as tag values, and output by this module individually. + Does not affect values of tags passed in via the `tags` input. + Possible values: `lower`, `title`, `upper` and `none` (no transformation). + Set this to `title` and set `delimiter` to `""` to yield Pascal Case IDs. + Default value: `lower`. + EOT + + validation { + condition = var.label_value_case == null ? true : contains(["lower", "title", "upper", "none"], var.label_value_case) + error_message = "Allowed values: `lower`, `title`, `upper`, `none`." + } +} + +variable "descriptor_formats" { + type = any + default = {} + description = <<-EOT + Describe additional descriptors to be output in the `descriptors` output map. + Map of maps. Keys are names of descriptors. Values are maps of the form + `{ + format = string + labels = list(string) + }` + (Type is `any` so the map values can later be enhanced to provide additional options.) + `format` is a Terraform format string to be passed to the `format()` function. + `labels` is a list of labels, in order, to pass to `format()` function. + Label values will be normalized before being passed to `format()` so they will be + identical to how they appear in `id`. + Default is `{}` (`descriptors` output will be empty). + EOT +} + +#### End of copy of cloudposse/terraform-null-label/variables.tf \ No newline at end of file diff --git a/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/main.tf b/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/main.tf new file mode 100644 index 000000000..170c73ae6 --- /dev/null +++ b/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/main.tf @@ -0,0 +1,84 @@ +## Everything after this is standard cloudtrail setup +data "aws_caller_identity" "current" {} + +module "cloudtrail_s3_bucket" { + source = "cloudposse/cloudtrail-s3-bucket/aws" + version = "0.15.0" + + force_destroy = true + + context = module.this.context +} + +resource "aws_cloudwatch_log_group" "default" { + name = module.this.id + tags = module.this.tags + retention_in_days = 90 +} + +data "aws_iam_policy_document" "log_policy" { + statement { + effect = "Allow" + actions = ["logs:CreateLogStream", "logs:PutLogEvents"] + resources = [ + "arn:aws:logs:${var.region}:${data.aws_caller_identity.current.account_id}:log-group:${aws_cloudwatch_log_group.default.name}:log-stream:*" + ] + } +} + +data "aws_iam_policy_document" "assume_policy" { + statement { + effect = "Allow" + actions = ["sts:AssumeRole"] + + principals { + identifiers = ["cloudtrail.amazonaws.com"] + type = "Service" + } + } +} + +resource "aws_iam_role" "cloudtrail_cloudwatch_events_role" { + name = lower(join(module.this.delimiter, [module.this.id, "role"])) + assume_role_policy = data.aws_iam_policy_document.assume_policy.json + tags = module.this.tags +} + +resource "aws_iam_role_policy" "policy" { + name = lower(join(module.this.delimiter, [module.this.id, "policy"])) + policy = data.aws_iam_policy_document.log_policy.json + role = aws_iam_role.cloudtrail_cloudwatch_events_role.id +} + +module "metric_configs" { + source = "cloudposse/config/yaml" + version = "0.7.0" + + map_config_local_base_path = path.module + map_config_paths = var.metrics_paths + + context = module.this.context +} + +module "cloudtrail" { + source = "cloudposse/cloudtrail/aws" + version = "0.17.0" + enable_log_file_validation = true + include_global_service_events = true + is_multi_region_trail = true + enable_logging = true + s3_bucket_name = module.cloudtrail_s3_bucket.bucket_id + # https://github.com/terraform-providers/terraform-provider-aws/issues/14557#issuecomment-671975672 + cloud_watch_logs_group_arn = "${aws_cloudwatch_log_group.default.arn}:*" + cloud_watch_logs_role_arn = aws_iam_role.cloudtrail_cloudwatch_events_role.arn + event_selector = var.cloudtrail_event_selector + context = module.this.context +} + +## This is the module being used +module "cis_alarms" { + source = "cloudposse/cloudtrail-cloudwatch-alarms/aws" + version = "0.14.3" + log_group_name = aws_cloudwatch_log_group.default.name + metrics = module.metric_configs.map_configs +} \ No newline at end of file diff --git a/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/outputs.tf b/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/outputs.tf new file mode 100644 index 000000000..1e829941d --- /dev/null +++ b/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/outputs.tf @@ -0,0 +1,11 @@ +output "sns_topic_arn" { + value = module.cis_alarms.sns_topic_arn +} + +output "dashboard_individual" { + value = module.cis_alarms.dashboard_individual +} + +output "dashboard_combined" { + value = module.cis_alarms.dashboard_combined +} \ No newline at end of file diff --git a/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/variables.tf b/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/variables.tf new file mode 100644 index 000000000..d0bf64ce9 --- /dev/null +++ b/terraform-modules/aws/cloudposse/aws-cloudtrail-cloudwatch-alarms/variables.tf @@ -0,0 +1,26 @@ +variable "region" { + type = string +} + +variable "metrics_paths" { + type = list(string) + description = "List of paths to CloudWatch metrics configurations" +} + +variable "cloudtrail_event_selector" { + type = list(object({include_management_events = bool, read_write_type = string, data_resource = list(object({type = string, values = list(string)}))})) + + description = "This enables the cloudtrail even selector to track all S3 API calls by default: https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail." + default = [ + { + include_management_events = true + read_write_type = "All" + data_resource = [{ + type = "AWS::S3::Object" + values = ["arn:aws:s3"] + }] + } + ] +} + + diff --git a/terraform-modules/aws/sns/suscription/README.md b/terraform-modules/aws/sns/suscription/README.md new file mode 100644 index 000000000..d1d721682 --- /dev/null +++ b/terraform-modules/aws/sns/suscription/README.md @@ -0,0 +1,31 @@ +## Requirements + +No requirements. + +## Providers + +| Name | Version | +|------|---------| +| [aws](#provider\_aws) | n/a | + +## Modules + +No modules. + +## Resources + +| Name | Type | +|------|------| +| [aws_sns_topic_subscription.user_updates_sqs_target](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription) | resource | + +## Inputs + +| Name | Description | Type | Default | Required | +|------|-------------|------|---------|:--------:| +| [endpoint](#input\_endpoint) | (Required) In email endpoint is an email address. | `any` | n/a | yes | +| [protocol](#input\_protocol) | (Required) Protocol to use. Valid values are: sqs, sms, lambda, firehose, and application. Protocols email, email-json, http and https | `any` | n/a | yes | +| [topic\_arn](#input\_topic\_arn) | (Required) ARN of the SNS topic to subscribe to. | `any` | n/a | yes | + +## Outputs + +No outputs. diff --git a/terraform-modules/aws/sns/suscription/main.tf b/terraform-modules/aws/sns/suscription/main.tf new file mode 100644 index 000000000..bdcbc8e75 --- /dev/null +++ b/terraform-modules/aws/sns/suscription/main.tf @@ -0,0 +1,5 @@ +resource "aws_sns_topic_subscription" "user_updates_sqs_target" { + topic_arn = var.topic_arn + protocol = var.protocol + endpoint = var.endpoint +} \ No newline at end of file diff --git a/terraform-modules/aws/sns/suscription/variables.tf b/terraform-modules/aws/sns/suscription/variables.tf new file mode 100644 index 000000000..39fe1d75d --- /dev/null +++ b/terraform-modules/aws/sns/suscription/variables.tf @@ -0,0 +1,11 @@ +variable "protocol" { + description = "(Required) Protocol to use. Valid values are: sqs, sms, lambda, firehose, and application. Protocols email, email-json, http and https" +} + +variable "endpoint" { + description = "(Required) In email endpoint is an email address." +} + +variable "topic_arn" { + description = "(Required) ARN of the SNS topic to subscribe to." +} \ No newline at end of file