turbot/aws_compliance

Query: es_domain_logs_to_cloudwatch

Usage

powerpipe query aws_compliance.query.es_domain_logs_to_cloudwatch

Steampipe Tables

SQL

select
arn as resource,
case
when
( log_publishing_options -> 'ES_APPLICATION_LOGS' -> 'Enabled' = 'true'
and log_publishing_options -> 'ES_APPLICATION_LOGS' -> 'CloudWatchLogsLogGroupArn' is not null
)
and
( log_publishing_options -> 'SEARCH_SLOW_LOGS' -> 'Enabled' = 'true'
and log_publishing_options -> 'SEARCH_SLOW_LOGS' -> 'CloudWatchLogsLogGroupArn' is not null
)
and
( log_publishing_options -> 'INDEX_SLOW_LOGS' -> 'Enabled' = 'true'
and log_publishing_options -> 'INDEX_SLOW_LOGS' -> 'CloudWatchLogsLogGroupArn' is not null
)
then 'ok'
else 'alarm'
end as status,
case
when
( log_publishing_options -> 'ES_APPLICATION_LOGS' -> 'Enabled' = 'true'
and log_publishing_options -> 'ES_APPLICATION_LOGS' -> 'CloudWatchLogsLogGroupArn' is not null
)
and
( log_publishing_options -> 'SEARCH_SLOW_LOGS' -> 'Enabled' = 'true'
and log_publishing_options -> 'SEARCH_SLOW_LOGS' -> 'CloudWatchLogsLogGroupArn' is not null
)
and
( log_publishing_options -> 'INDEX_SLOW_LOGS' -> 'Enabled' = 'true'
and log_publishing_options -> 'INDEX_SLOW_LOGS' -> 'CloudWatchLogsLogGroupArn' is not null
) then title || ' logging enabled for search , index and error.'
else title || ' logging not enabled for all search, index and error.'
end as reason
, region, account_id
from
aws_elasticsearch_domain;

Controls

The query is being used by the following controls: