-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add lambda module for subscription filtering #86
Conversation
|
|
terraform/scheduling/main.tf
Outdated
module "custom_lambda" { | ||
source = "../modules/lambda" | ||
log_group_name = "/aws/ecs/minecraft-firelens-logs" | ||
log_group_arn = "arn:aws:logs:ap-northeast-1:528163014577:log-group:/aws/ecs/minecraft-firelens-logs:*" | ||
filter_patterns = ["{ ($.log = \"*joined*\") || ($.log = \"*Disconnected*\") || ($.log = \"*left*\") }", "{ ($.log = \"<*\") }"] | ||
sns_topic_arn = data.aws_sns_topic.my_sns.arn | ||
slack_webhook_url = "https://hooks.slack.com/services/${var.WEBHOOK_PATH}" | ||
|
||
owners = local.owners | ||
environment = local.environment | ||
} |
Check failure
Code scanning / defsec
IAM policy should avoid use of wildcards and instead apply the principle of least privilege
|
|
|
|
|
|
|
|
|
|
|
|
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
|
|
|
|
|
CLI Command Output:
|
CLI Command Output:
|
️✅ There are no secrets present in this pull request anymore.If these secrets were true positive and are still valid, we highly recommend you to revoke them. 🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request. |
|
|
CLI Command Output:
|
CLI Command Output:
|
f224a31
to
c2cd370
Compare
|
|
Snyk Container Vulnerabilities
|
Snyk Container Vulnerabilities
|
|
|
Snyk Scan
|
Snyk Scan
|
fixes #68 |
|
|
Snyk Scan
|
Snyk Scan
|
related #21
fixes #68