Skip to content

Releases: cloudposse/terraform-aws-cloudtrail-cloudwatch-alarms

v0.9.0

30 Jan 14:32
179abf0
Compare
Choose a tag to compare
readme updated, Encrypt SNS Topic Data enabled by default @maximmi (#26)

what

  • BridgeCrew compliance checks fix
  • readme updated
  • default behaviour changed: Encrypt SNS Topic Data enabled by default

why

  • To be able to position our modules as standards compliant
  • Providing explicit note about policy attached directly to user
  • To comply BridgeCrew check

references

v0.8.0

23 Jan 16:02
6f12cae
Compare
Choose a tag to compare
Terraform 0.14 upgrade @maximmi (#25)

what

  • Upgrade to support Terraform 0.14 and bring up to current Cloud Posse standard

why

  • Support Terraform 0.14

v0.7.0

27 Oct 18:49
10960c6
Compare
Choose a tag to compare
fix: regenerate readmes @dotCipher (#22) ## what * Regenerates readmes

why

  • There was drift since #21 was merged

references

v0.6.0

26 Oct 22:37
32ca6a2
Compare
Choose a tag to compare
Rewrite for TF 0.12 and testing @dotCipher (#21) ## what
  • Brings this module into the new ecosystem of tools used by CloudPosse, and updates terraform compatibility to v0.12.x.
  • Adds .github dir with all the CloudPosse defaults
  • Created a complete test case with updated CloudPosse module references
  • Updated syntax for dashboard creation to use terraform native code, then jsonencode
  • Extract all metric definitions into single metric_definitions.tf file for readability

why

  • Hasn't been updated in a while, and I would like to use it 😄

references

0.5.0 Fix parenthesis

20 Jan 17:12
Compare
Choose a tag to compare

what

  • Fix parenthesis

why

  • Some code did not properly include a set of parenthesis

0.4.0 Change filter expressions as per CIS Benchmark guide

09 Jan 22:39
Compare
Choose a tag to compare

what

  • Change filter expressions as per CIS Benchmark guide

why

  • Update 3 filters in alarms.tf as per CIS Benchmark guide.

    • Ensure a log metric filter and alarm exist for Management Console sign-in without MFA
    • Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs
    • Ensure a log metric filter and alarm exist for AWS Config configuration changes

references

related

  • Closes #9

0.3.0 Fix permissions

19 Oct 01:37
Compare
Choose a tag to compare

what

  • Fix permissions

why

  • The alerts do not originate from events.amazonaws.com

0.2.0: Add extra filters to comply with CIS AWS benchmark (#7)

14 Sep 02:50
Compare
Choose a tag to compare
* Add filter for sign in with no MFA

* Run build-harness/vendor/terraform fmt

* Add period at the end of no MFA alert description

* Fix no MFA dashboard layout y value

* Add root account usage filter, alarm and widget

* Add KMS key deletion filter, alarm and widget

Source: https://docs.aws.amazon.com/kms/latest/developerguide/deleting-keys-creating-cloudwatch-alarm.html

* Add AWS config changes filter, alarm and widget

* Add route table changes filter, alert and widget

* Fix alarm description

* Add new metrics to the README

* Update available targets, autogenerated

* Add one single (whole) period.

Regenerate README.md

27 Jul 14:12
Compare
Choose a tag to compare

what

  • Regenerate README.md

why

  • Previous version of build-harness has some typos

Fix readme

13 Jul 09:27
0e5aee8
Compare
Choose a tag to compare
  • Fix avatars links