-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Add back in CloudWatch log group create deny policy to cluster IAM role #1974
feat: Add back in CloudWatch log group create deny policy to cluster IAM role #1974
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cool solution!
## [18.17.0](v18.16.0...v18.17.0) (2022-03-30) ### Features * Add back in CloudWatch log group create deny policy to cluster IAM role ([#1974](#1974)) ([98e137f](98e137f))
This PR is included in version 18.17.0 🎉 |
For some reason terraform keeps showing this field as wanting to change; even after applying
|
## [18.17.0](terraform-aws-modules/terraform-aws-eks@v18.16.0...v18.17.0) (2022-03-30) ### Features * Add back in CloudWatch log group create deny policy to cluster IAM role ([terraform-aws-modules#1974](terraform-aws-modules#1974)) ([98e137f](terraform-aws-modules@98e137f))
## [18.17.0](terraform-aws-modules/terraform-aws-eks@v18.16.0...v18.17.0) (2022-03-30) ### Features * Add back in CloudWatch log group create deny policy to cluster IAM role ([terraform-aws-modules#1974](terraform-aws-modules#1974)) ([98e137f](terraform-aws-modules@98e137f))
## [18.17.0](terraform-aws-modules/terraform-aws-eks@v18.16.0...v18.17.0) (2022-03-30) ### Features * Add back in CloudWatch log group create deny policy to cluster IAM role ([#1974](terraform-aws-modules/terraform-aws-eks#1974)) ([d939034](terraform-aws-modules/terraform-aws-eks@d939034))
I note that this is implemented as an inline policy. The original implementation (#1594) used an attached policy. Inline policies should not be used as they are not compliant with the CIS AWS Foundations Benchmark security standard. This should be reverted to the original implementation. |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
Motivation and Context
Breaking Changes
How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectsexamples/eks_managed_node_group
pre-commit run -a
on my pull request