Skip to content

feat: 각 계정별 guardduty 활성화#100

Open
maybSubin wants to merge 2 commits intomainfrom
feat/#99
Open

feat: 각 계정별 guardduty 활성화#100
maybSubin wants to merge 2 commits intomainfrom
feat/#99

Conversation

@maybSubin
Copy link
Contributor

#️⃣ Related Issues

#99

📝 Work Summary

각 계정별 GuardDuty 활성화를 위한 리소스 구성 및 모듈화 진행

Screenshot (Optional)

💬 Review Notes (Optional)

Add any specific points you would like the reviewers to focus on.

@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory operation-team-account/state/dynamodb
Executed At 2025-07-29 12:57:19 UTC

Plan Output

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Plan Error (if any)


@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory security-team-account/state/dynamodb
Executed At 2025-07-29 12:57:20 UTC

Plan Output

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Plan Error (if any)


@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory stage-team-account/state/dynamodb
Executed At 2025-07-29 12:57:22 UTC

Plan Output

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Plan Error (if any)


@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory prod-team-account/state/dynamodb
Executed At 2025-07-29 12:57:21 UTC

Plan Output

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Plan Error (if any)


@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory dev-team-account/state/dynamodb
Executed At 2025-07-29 12:57:21 UTC

Plan Output

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Plan Error (if any)


@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory management-team-account/state/dynamodb
Executed At 2025-07-29 12:57:21 UTC

Plan Output

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Plan Error (if any)


@github-actions
Copy link

github-actions bot commented Jul 29, 2025

💰 Infracost report

Monthly estimate generated

This comment will be updated when code changes.

@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory prod-team-account/guardduty-detector
Executed At 2025-07-29 12:59:29 UTC

Plan Output

Plan failed

Plan Error (if any)


Error: reading GuardDuty Detector (6ccc2b1ccd42ba1189861d16472f0bd5): operation error GuardDuty: GetDetector, https response error StatusCode: 403, RequestID: 1503412c-0440-4bcc-87a7-4ef7c1182c87, api error AccessDeniedException: User: arn:aws:sts::243359234795:assumed-role/Application-Deployment-role2/GitHubActions is not authorized to perform: guardduty:GetDetector on resource: arn:aws:guardduty:ap-northeast-2:243359234795:detector/6ccc2b1ccd42ba1189861d16472f0bd5

  with module.guardduty-detector.aws_guardduty_detector.this,
  on ../../modules/guardduty-detector/main.tf line 1, in resource "aws_guardduty_detector" "this":
   1: resource "aws_guardduty_detector" "this" {

@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory identity-team-account/state/dynamodb
Executed At 2025-07-29 12:59:35 UTC

Plan Output

Plan failed

Plan Error (if any)


Error: Error acquiring the state lock

Error message: ConditionalCheckFailedException: The conditional request
failed
Lock Info:
  ID:        c7c0f449-ef8c-d5c3-fae4-cf6099eacb67
  Path:      cloudfence-identity-state/state/dynamodb.tfstate
  Operation: OperationTypePlan
  Who:       runner@pkrvmpptgkbjq6m
  Version:   1.4.0
  Created:   2025-07-29 12:59:33.288109063 +0000 UTC
  Info:      


Terraform acquires a state lock to protect the state from being written
by multiple users at the same time. Please resolve the issue above and try
again. For most commands, you can disable locking with the "-lock=false"
flag, but this is not recommended.

@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory stage-team-account/guardduty-detector
Executed At 2025-07-29 12:59:29 UTC

Plan Output

Plan failed

Plan Error (if any)


Error: reading GuardDuty Detector (aecc2b1f0c70a957880849270ccc97de): operation error GuardDuty: GetDetector, https response error StatusCode: 403, RequestID: bcb0a8be-c6e0-4ba4-99ce-acb80392ca09, api error AccessDeniedException: User: arn:aws:sts::929368846645:assumed-role/Application-deployment-role3/GitHubActions is not authorized to perform: guardduty:GetDetector on resource: arn:aws:guardduty:ap-northeast-2:929368846645:detector/aecc2b1f0c70a957880849270ccc97de

  with module.guardduty-detector.aws_guardduty_detector.this,
  on ../../modules/guardduty-detector/main.tf line 1, in resource "aws_guardduty_detector" "this":
   1: resource "aws_guardduty_detector" "this" {

@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory dev-team-account/guardduty-detector
Executed At 2025-07-29 12:59:28 UTC

Plan Output

Plan failed

Plan Error (if any)


Error: reading GuardDuty Detector (66cc2b0fd5c00b58ac12c9122340b0d3): operation error GuardDuty: GetDetector, https response error StatusCode: 403, RequestID: 3fb0dd23-7b25-4802-8f0d-12dd3db1c81a, api error AccessDeniedException: User: arn:aws:sts::926943999891:assumed-role/application-deployment-role1/GitHubActions is not authorized to perform: guardduty:GetDetector on resource: arn:aws:guardduty:ap-northeast-2:926943999891:detector/66cc2b0fd5c00b58ac12c9122340b0d3

  with module.guardduty-detector.aws_guardduty_detector.this,
  on ../../modules/guardduty-detector/main.tf line 1, in resource "aws_guardduty_detector" "this":
   1: resource "aws_guardduty_detector" "this" {

@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory operation-team-account/guardduty-detector
Executed At 2025-07-29 12:59:30 UTC

Plan Output

Plan failed

Plan Error (if any)


Error: reading GuardDuty Detector (0ecc2afdbf888dffe5ab908d9cb53019): operation error GuardDuty: GetDetector, https response error StatusCode: 403, RequestID: 0dc1a8f7-e568-4581-b6af-ff0ea2f84907, api error AccessDeniedException: User: arn:aws:sts::502676416967:assumed-role/operation-cicd/GitHubActions is not authorized to perform: guardduty:GetDetector on resource: arn:aws:guardduty:ap-northeast-2:502676416967:detector/0ecc2afdbf888dffe5ab908d9cb53019

  with module.guardduty-detector.aws_guardduty_detector.this,
  on ../../modules/guardduty-detector/main.tf line 1, in resource "aws_guardduty_detector" "this":
   1: resource "aws_guardduty_detector" "this" {

@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory management-team-account/guardduty-detector
Executed At 2025-07-29 12:59:31 UTC

Plan Output

Plan failed

Plan Error (if any)


Error: reading GuardDuty Detector (3acc2b187ea7bffaba999c8ba96a9677): operation error GuardDuty: GetDetector, https response error StatusCode: 403, RequestID: 676af616-4b7d-4b0d-9727-d9895cd8c5b7, api error AccessDeniedException: User: arn:aws:sts::433331841346:assumed-role/management-role/GitHubActions is not authorized to perform: guardduty:GetDetector on resource: arn:aws:guardduty:ap-northeast-2:433331841346:detector/3acc2b187ea7bffaba999c8ba96a9677

  with module.guardduty-detector.aws_guardduty_detector.this,
  on ../../modules/guardduty-detector/main.tf line 1, in resource "aws_guardduty_detector" "this":
   1: resource "aws_guardduty_detector" "this" {

@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory security-team-account/guardduty-detector
Executed At 2025-07-29 12:59:35 UTC

Plan Output

Plan failed

Plan Error (if any)


Error: reading GuardDuty Detector (42cc2b1de2dc2295c624b0c14279dc38): operation error GuardDuty: GetDetector, https response error StatusCode: 403, RequestID: ecd12f3d-7d11-4cdc-95ee-2b95f3653676, api error AccessDeniedException: User: arn:aws:sts::694318440367:assumed-role/security-role/GitHubActions is not authorized to perform: guardduty:GetDetector on resource: arn:aws:guardduty:ap-northeast-2:694318440367:detector/42cc2b1de2dc2295c624b0c14279dc38

  with module.guardduty-detector.aws_guardduty_detector.this,
  on ../../modules/guardduty-detector/main.tf line 1, in resource "aws_guardduty_detector" "this":
   1: resource "aws_guardduty_detector" "this" {

@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory dev-team-account/state/dynamodb
Executed At 2025-07-29 12:59:29 UTC

Plan Output

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Plan Error (if any)


@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory management-team-account/state/dynamodb
Executed At 2025-07-29 12:59:29 UTC

Plan Output

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Plan Error (if any)


@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory prod-team-account/state/dynamodb
Executed At 2025-07-29 12:59:27 UTC

Plan Output

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Plan Error (if any)


@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory stage-team-account/state/dynamodb
Executed At 2025-07-29 12:59:27 UTC

Plan Output

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Plan Error (if any)


@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory security-team-account/state/dynamodb
Executed At 2025-07-29 12:59:28 UTC

Plan Output

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Plan Error (if any)


@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory operation-team-account/state/dynamodb
Executed At 2025-07-29 12:59:31 UTC

Plan Output

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Plan Error (if any)


@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory identity-team-account/state/dynamodb
Executed At 2025-07-29 12:59:29 UTC

Plan Output

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Plan Error (if any)


@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory identity-team-account/guardduty-detector
Executed At 2025-07-29 12:59:39 UTC

Plan Output

Plan failed

Plan Error (if any)


Error: reading GuardDuty Detector (14cc2b1641a449ac79db115fa1489fa4): operation error GuardDuty: GetDetector, https response error StatusCode: 403, RequestID: 4da05210-9e84-48b4-ac8a-812269a0407c, api error AccessDeniedException: User: arn:aws:sts::193186106478:assumed-role/Organization-role/GitHubActions is not authorized to perform: guardduty:GetDetector on resource: arn:aws:guardduty:ap-northeast-2:193186106478:detector/14cc2b1641a449ac79db115fa1489fa4

  with module.guardduty-detector.aws_guardduty_detector.this,
  on ../../modules/guardduty-detector/main.tf line 1, in resource "aws_guardduty_detector" "this":
   1: resource "aws_guardduty_detector" "this" {

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant