Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Existing CloudTrail Onboarding Functionality #29

Merged
merged 6 commits into from
Sep 28, 2022
Merged

Conversation

ethanmil
Copy link
Contributor

@ethanmil ethanmil commented Jul 26, 2022

Add functionality to allow the onboarding of existing CloudTrails.

Note

Currently only accounts for hooking up all the necessary resources within THE SAME AWS account.

Added

  • SNS Topic entity to function as a one -> many subscription tool between S3 notification configuration to multiple interested parties (including Expel WB which subscribes via SQS Queue)
  • Several local variables to help keep existing CloudTrail vs. new CloudTrail logic isolated from granular infrastructure configuration
  • Existing CloudTrail example
  • A notification specific KMS key to be used separate from the CloudTrail & S3 Bucket KMS keys to simplify permissions when using an existing CloudTrail entity
  • Comments to categorize groups of variables in variables.tf file
  • Update readme

Removed

  • Providers from readme as it was redundant with Requirements

Fixed (internal)

  • pre-commit issue with readme doc -- wasn't validating properly

@ethanmil ethanmil marked this pull request as ready for review September 6, 2022 22:17
@ethanmil ethanmil changed the title Existing CloudTrail [WIP] Add Existing CloudTrail Onboarding Functionality Sep 6, 2022
@ethanmil ethanmil requested a review from a team September 7, 2022 17:00
aws.tf Show resolved Hide resolved
- Added SNS Topic entity to function as a one -> many subscription tool between S3 notification configuration to multiple interested parties (including Expel WB which subscribes via SQS Queue)
- Added several local variables to help keep existing CloudTrail vs. new CloudTrail logic isolated from granular infrastructure configuration
- Added existing CloudTrail example
- Added a notification specific KMS key to be used separate from the CloudTrail & S3 Bucket KMS keys to simplify permissions when using an existing CloudTrail entity
- Added comments to categorize groups of variables in variables.tf file
- Removed providers from readme
- Fixed generated doc check
Copy link
Contributor

@davidmontoyago davidmontoyago left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Copy link
Contributor

@sarjumulmi sarjumulmi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM...

@bachu20 bachu20 merged commit 9c8c480 into main Sep 28, 2022
@bachu20 bachu20 deleted the existing-cloudtrail branch September 28, 2022 18:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants