Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update(plugins/cloudtrail): support pre-ControlTower organization trails #650

Merged
merged 1 commit into from
Mar 11, 2025

Conversation

uhei
Copy link
Contributor

@uhei uhei commented Mar 5, 2025

What type of PR is this?

/kind cleanup
/kind feature

Any specific area of the project related to this PR?

/area plugins

What this PR does / why we need it:

Some pre-ControlTower organization Cloutrail trails are missing the OrgId in the AWSLogs S3 path. Making the OrgId optional gives them the option to use S3AccountList.

Copy link

github-actions bot commented Mar 5, 2025

Rules files suggestions

rules

Comparing 97ae6516be1af52fcc624ed558f0d1c46c97d414 with latest tag plugins/cloudtrail/v0.12.4

No changes detected

Copy link
Contributor

@legobrick legobrick left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi, thanks for the contribution!

the change itself looks good to me. I'd just update the comment to avoid potential issues understanding what that use case is about in the future. Here's the reference in AWS docs: https://docs.aws.amazon.com/controltower/latest/userguide/logging-using-cloudtrail.html

@poiana
Copy link
Contributor

poiana commented Mar 11, 2025

@legobrick: changing LGTM is restricted to collaborators

In response to this:

Hi, thanks for the contribution!

the change itself looks good to me. I'd just update the comment to avoid potential issues understanding what that use case is about in the future. Here's the reference in AWS docs: https://docs.aws.amazon.com/controltower/latest/userguide/logging-using-cloudtrail.html

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Some pre-ControlTower organization Cloutrail trails are missing the OrgId
in the AWSLogs S3 path. Making the OrgId optional gives them the option
to use S3AccountList.

Signed-off-by: Uli Heilmeier <uh@heilmeier.eu>
@uhei uhei force-pushed the cloudtail-pre-controltower branch from 97ae651 to b32a0e3 Compare March 11, 2025 09:25
@leogr leogr requested a review from legobrick March 11, 2025 09:27
@poiana
Copy link
Contributor

poiana commented Mar 11, 2025

LGTM label has been added.

Git tree hash: 561e28bb9cb9b31db75cf8dd732bc871aa36771d

@poiana
Copy link
Contributor

poiana commented Mar 11, 2025

@legobrick: changing LGTM is restricted to collaborators

In response to this:

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@poiana
Copy link
Contributor

poiana commented Mar 11, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: legobrick, leogr, uhei

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@poiana poiana merged commit f2fe57d into falcosecurity:main Mar 11, 2025
11 checks passed
Copy link

Rules files suggestions

rules

Comparing b32a0e31097e6e22738dff9658dcf31fd34ee022 with latest tag plugins/cloudtrail/v0.12.4

No changes detected

@uhei uhei deleted the cloudtail-pre-controltower branch March 11, 2025 09:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants