2 réponses
- Le plus récent
- Le plus de votes
- La plupart des commentaires
0
For CloudFormation based stacks, you could run a drift-detection and emit a custom metric and alert should drift be found. To automate the process, you could set up a custom AWS Config rule to run the drift detection.
répondu il y a 2 ans
0
I meant not tracking drift status
terraform was introduced relatively recently in our infrastructure, before that it was deployed through a self-written platform on nodejs
Right now we want to monitor security group and vpc for manual changes (someone went into the console and changed it manually) in the eventbridge solution, we tracked userAgent through exclusions (we excluded terraform, our deployment platform)
as I wrote above, the solutions of eventbridge and cloudwatch alarm are not suitable for us
répondu il y a 2 ans
Contenus pertinents
- demandé il y a un an
- demandé il y a 9 mois
- demandé il y a un an
- demandé il y a 4 jours
- AWS OFFICIELA mis à jour il y a un an
- AWS OFFICIELA mis à jour il y a un an
- AWS OFFICIELA mis à jour il y a 4 ans
This does not work. Solution is not stable and can not see differences.