Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Add option to enable audit log export to cloudwatch #549

Merged
merged 5 commits into from
Oct 20, 2022

Conversation

nouseforaname
Copy link
Contributor

[#183457241]
We want to enable users to be able to export their audit logs for a service instance. This adds the required resources and input variables to enable exporting audit logs to cloudwatch. This setting requires providing a properly configured option_group identified by option_group_name (enabling the audit log plugin, (see)[https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Appendix.MySQL.Options.AuditPlugin.html] )

Known Issues:

IF an instance is created without audit log enabled AND then the Instance get's updated to enable audit logging AND then the Instance get's updated to disable audit logging

THEN the log group created in step 2 will NOT be deleted.

This will create an issue if you try to set audit logging to true again because terraform will error trying to create an existing log group.

To avoid this, the log groups use name_prefix rather than name.

Checklist:

* [ ] Have you added Release Notes in the docs repositories?

@FelisiaM FelisiaM changed the title feat:Add option to enable audit log export to cloudwatch feat: Add option to enable audit log export to cloudwatch Oct 17, 2022
[#183457241]
We want to enable users to be able to export their audit logs for a
service instance. This adds the required resources and input variables
to enable exporting audit logs to cloudwatch. This setting requires
providing a properly configured option_group identified by `option_group_name`
(enabling the audit log plugin, (see)[https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Appendix.MySQL.Options.AuditPlugin.html] )

Known Issues:

IF an instance is created without audit log enabled
AND then the Instance get's updated to enable audit logging
AND then the Instance get's updated to disable audit logging

THEN the log group created in step 2 will NOT be deleted.

This will create an issue if you try to set audit logging to
true again because terraform will error trying to create an
existing log group.

To avoid this, the log groups use name_prefix rather than name.
@blgm blgm marked this pull request as draft October 19, 2022 10:06
@FelisiaM FelisiaM marked this pull request as ready for review October 20, 2022 08:30
@FelisiaM FelisiaM merged commit f803d4b into cloudfoundry:main Oct 20, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Development

Successfully merging this pull request may close these issues.

2 participants