turbot/steampipe-mod-terraform-aws-compliance

Control: MSK Cluster Nodes should have logging enabled

Description

This control checks whether logging is enabled for the MSK Cluster.

Usage

Run the control in your terminal:

powerpipe control run terraform_aws_compliance.control.msk_cluster_logging_enabled

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run terraform_aws_compliance.control.msk_cluster_logging_enabled --share

SQL

This control uses a named query:

select
address as resource,
case
when ((attributes_std -> 'logging_info' -> 'broker_logs' -> 'cloudwatch_logs' ->> 'enabled')::bool or (attributes_std -> 'logging_info' -> 'broker_logs' -> 'firehose' ->> 'enabled')::bool or (attributes_std -> 'logging_info' -> 'broker_logs' -> 's3' ->> 'enabled')::bool) then 'ok'
else 'alarm'
end as status,
split_part(address, '.', 2) || case
when ((attributes_std -> 'logging_info' -> 'broker_logs' -> 'cloudwatch_logs' ->> 'enabled')::bool or (attributes_std -> 'logging_info' -> 'broker_logs' -> 'firehose' ->> 'enabled')::bool or (attributes_std -> 'logging_info' -> 'broker_logs' -> 's3' ->> 'enabled')::bool) then ' logging enabled'
else ' logging disabled'
end || '.' as reason
, path || ':' || start_line
from
terraform_resource
where
type = 'aws_msk_cluster';

Tags