turbot/gcp_compliance

Query: logging_metric_alert_firewall_rule_changes

Usage

powerpipe query gcp_compliance.query.logging_metric_alert_firewall_rule_changes

SQL

with filter_data as (
select
m.project as project,
display_name alert_name,
count(m.name) metric_name
from
gcp_monitoring_alert_policy,
jsonb_array_elements(conditions) as filter_condition
join gcp_logging_metric m on m.filter ~ '\s*resource\.type\s*=\s*"gce_firewall_rule"\s*AND\s*\(\s*protoPayload\.methodName\s*:\s*"compute\.firewalls\.patch"\s*OR\s*protoPayload\.methodName\s*:\s*"compute\.firewalls\.insert"\s*OR\s*protoPayload\.methodName\s*:\s*"compute\.firewalls\.delete"\s*\)'
and filter_condition -> 'conditionThreshold' ->> 'filter' like '%metric.type="' || m.metric_descriptor_type || '"%'
where
enabled
group by
m.project, display_name, m.name
)
select
'https://cloudresourcemanager.googleapis.com/v1/projects/' || project_id resource,
case
when d.metric_name > 0 then 'ok'
else 'alarm'
end as status,
case
when d.metric_name > 0
then 'Log metric and alert exist for network firewall rule changes.'
else 'Log metric and alert do not exist network for firewall rule changes.'
end as reason
, project_id as project
from
gcp_project as p
left join filter_data as d on d.project = p.name;

Controls

The query is being used by the following controls: