aws-config-rules | sample Custom Rules for AWS Config | Configuration Management library
kandi X-RAY | aws-config-rules Summary
kandi X-RAY | aws-config-rules Summary
AWS Community repository of custom Config rules. Contributions welcome. Instructions for leveraging these rules are below.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Evaluate a change .
- Returns a mapping of cluster names to cluster ids
- Evaluate a scheduled compliance .
- Check if a service is open .
- Cleanup old evaluation results .
- Check if statements are allowed .
- Evaluate the compliance condition .
- Evaluate an AMI
- Determine if statements include full starred star
- Helper function to get the name of an ASG .
aws-config-rules Key Features
aws-config-rules Examples and Code Snippets
Community Discussions
Trending Discussions on aws-config-rules
QUESTION
I'm working on applying config rules in my organisation by leveraging Python CDK for AWS. In my setup I have a list of managed config rules from here. This list is in the stack that would be further deployed through a stackset. I've got a problem with some config rules from the conformance pack. For some reason cloudformation is not accepting SourceIdentifier: AWS_CONFIG_PROCESS_CHECK
ANSWER
Answered 2021-Sep-28 at 14:52You are creating a new rule with an identifier that is the same as an existing AWS-owned ManagedRule.
To import an existing rule instead of creating a new one, use ManagedRule.fromConfigRuleName
:
QUESTION
My company has 2 AWS accounts. On the first (lets call it playground), I have full administrative permissions. On the second (lets call it production) I have limited IAM permissions
I enabled AWS Config (using the terraform file on the appendix) on both accounts.
- On the playground it runs smoothly, everything is fine.
- One the production, it fails. More specifically, it fails to detect the account's resources with the message "Your resources are being discovered" as shown in the screenshot below.
I initially suspected this could be an IAM role permission issue.
e.g running
aws configservice list-discovered-resources --resource-type AWS::EC2::SecurityGroup --profile playground
gives me a list of the SecurityGroups discovered by the AWS Config on the playground (pretty much what I see on the console dashboard).
On the other hand:
aws configservice list-discovered-resources --resource-type AWS::EC2::SecurityGroup --profile production
returns a null list (there are security groups though. Same results with other types such as AWS::EC2::Instance
)
ANSWER
Answered 2021-May-19 at 11:52This was likely a AWS terraform provider bug.
The service linked role AWSServiceRoleForConfig
does not get activated automatically the first time you apply the terraform plan. You need to manually add it to AWS config. Then it works fine.
EDIT
The solution could be another than the aforementioned (or a combination of both). I also noticed that AWS Config get stuck on "resources are being discovered" when there are no rules/conformance packs deployed. If you deploy a single rule it discovers resources (?!)
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install aws-config-rules
You can use aws-config-rules like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page