Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create CFN template for CloudWatch Rule and Lambda #36

Open
mnkg561 opened this issue Feb 14, 2020 · 0 comments
Open

Create CFN template for CloudWatch Rule and Lambda #36

mnkg561 opened this issue Feb 14, 2020 · 0 comments
Labels
enhancement New feature or request must-to-have

Comments

@mnkg561
Copy link
Contributor

mnkg561 commented Feb 14, 2020

Is this a BUG REPORT or FEATURE REQUEST?:
FEATURE REQUEST

What happened:
For iam-manager role Lambda, we need a way to install Lambda as well as the Cloud Watch rule which triggers Lambda as part of CFN(Cloud Formation) Template.

Sample Event Rule:

{
  "source": [
    "aws.iam"
  ],
  "detail-type": [
    "AWS API Call via CloudTrail"
  ],
  "detail": {
    "eventSource": [
      "iam.amazonaws.com"
    ],
    "userIdentity": {
      "arn": [
        "arn:aws:sts::123456789012:assumed-role/k8s-iam-manager-role"
      ]
    }
  }

What you expected to happen:
Lambda and Cloud Watch event rule must be created just using CFN template

How to reproduce it (as minimally and precisely as possible):

Anything else we need to know?:

Environment:

  • iam-manager version
  • Kubernetes version :
$ kubectl version -o yaml

Other debugging information (if applicable):

- controller logs:

$ kubectl logs

@wanghong230 wanghong230 added this to the 2.18.0 milestone Feb 21, 2020
@wanghong230 wanghong230 added enhancement New feature or request must-to-have 3 labels Feb 21, 2020
@mnkg561 mnkg561 removed the 3 label Mar 30, 2020
@mnkg561 mnkg561 removed this from the 2.18.0 milestone May 27, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request must-to-have
Projects
None yet
Development

No branches or pull requests

2 participants