Skip to content

Commit fcf6fde

Browse files
committed
Prettify URLs
- Make log URLs more readable - Mask URLs to avoid displaying long raw hyperlinks - Format commands as inline code - Fix AWS CloudWatch links
1 parent 2a7131c commit fcf6fde

11 files changed

+68
-68
lines changed

capacity-experiments/capacity-experiments.yaml.tmpl

+4-4
Original file line numberDiff line numberDiff line change
@@ -11,31 +11,31 @@ groups:
1111
team: infra
1212
annotations:
1313
summary: "AZ {{ $labels.zone}} is running out of memory for pods"
14-
dashboard: "https://grafana.$ENVIRONMENT.$PROVIDER.uw.systems/d/Mig_eDNVz/kubernetes-cluster-utilization"
14+
dashboard: <https://grafana.$ENVIRONMENT.$PROVIDER.uw.systems/d/Mig_eDNVz/kubernetes-cluster-utilization"|link>
1515
- alert: AvailabilityZoneRunningOutOfMemory99for10m
1616
expr: avg(node_memory_working_set_bytes/on(node)(kube_node_status_capacity{resource="memory"} - on (node) node_eviction_threshold) * on(node) group_left(zone) kube_node_labels{role="worker"}) by (zone) > 0.99
1717
for: 10m
1818
labels:
1919
team: infra
2020
annotations:
2121
summary: "AZ {{ $labels.zone}} is running out of memory for pods"
22-
dashboard: "https://grafana.$ENVIRONMENT.$PROVIDER.uw.systems/d/Mig_eDNVz/kubernetes-cluster-utilization"
22+
dashboard: <https://grafana.$ENVIRONMENT.$PROVIDER.uw.systems/d/Mig_eDNVz/kubernetes-cluster-utilization|link>
2323
- alert: AvailabilityZoneRunningOutOfMemory95for1h
2424
expr: avg(node_memory_working_set_bytes/on(node)(kube_node_status_capacity{resource="memory"} - on (node) node_eviction_threshold) * on(node) group_left(zone) kube_node_labels{role="worker"}) by (zone) > 0.95
2525
for: 1h
2626
labels:
2727
team: infra
2828
annotations:
2929
summary: "AZ {{ $labels.zone}} is running out of memory for pods"
30-
dashboard: "https://grafana.$ENVIRONMENT.$PROVIDER.uw.systems/d/Mig_eDNVz/kubernetes-cluster-utilization"
30+
dashboard: <https://grafana.$ENVIRONMENT.$PROVIDER.uw.systems/d/Mig_eDNVz/kubernetes-cluster-utilization|link>
3131
- alert: AvailabilityZoneRunningOutOfMemory99for1h
3232
expr: avg(node_memory_working_set_bytes/on(node)(kube_node_status_capacity{resource="memory"} - on (node) node_eviction_threshold) * on(node) group_left(zone) kube_node_labels{role="worker"}) by (zone) > 0.99
3333
for: 1h
3434
labels:
3535
team: infra
3636
annotations:
3737
summary: "AZ {{ $labels.zone}} is running out of memory for pods"
38-
dashboard: "https://grafana.$ENVIRONMENT.$PROVIDER.uw.systems/d/Mig_eDNVz/kubernetes-cluster-utilization"
38+
dashboard: <https://grafana.$ENVIRONMENT.$PROVIDER.uw.systems/d/Mig_eDNVz/kubernetes-cluster-utilization|link>
3939
- alert: NodeUnderMemoryPressure
4040
expr: kube_node_status_condition{condition="MemoryPressure",status="true"} == 1
4141
for: 5m

cis-aws/cis-aws.yaml.tmpl

+2-2
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ groups:
1515
summary: AWS console login without MFA detected
1616
action: |
1717
Identify the users in question from the Cloudtrail logs, disable their account and notify the user.
18-
logs: https://eu-west-1.console.aws.amazon.com/cloudwatch/home?region=eu-west-1#logEventViewer:group=cloudtrail-multi-region;filter=%257B%2520(%2524.eventName%2520%253D%2520%2522ConsoleLogin%2522)%2520%2526%2526%2520(%2524.additionalEventData.MFAUsed%2521%253D%2520%2522Yes%2522)%2520%2526%2526%2520(%2524.responseElements.ConsoleLogin%2520%253D%2520%2522Success%2522)%2520%2526%2526%2520(%2524.userIdentity.type%2521%253D%2520%2522AssumedRole%2522)%257D;start=PT1H
18+
logs: <https://eu-west-1.console.aws.amazon.com/cloudwatch/home?region=eu-west-1#logsV2:log-groups/log-group/cloudtrail-multi-region/log-events/$3Fstart$3D-3600000$26filterPattern$3D$257B+$2528$2524.eventName+$253D+$2522ConsoleLogin$2522$2529+$2526$2526+$2528$2524.additionalEventData.MFAUsed$2521$253D+$2522Yes$2522$2529+$2526$2526+$2528$2524.responseElements.ConsoleLogin+$253D+$2522Success$2522$2529+$2526$2526+$2528$2524.userIdentity.type$2521$253D+$2522AssumedRole$2522$2529$257D$26+$2528$2524.additionalEventData.MFAUsed$2521$3D+$2522Yes$2522$2529+$26+$2528$2524.responseElements.ConsoleLogin+$3D+$2522Success$2522$2529+$26+$2528$2524.userIdentity.type$2521$3D+$2522AssumedRole$2522$2529$257D|link>
1919
- alert: AWSRootUsage
2020
expr: cisbenchmark_root_usage_sum >= 1
2121
for: 1m
@@ -29,4 +29,4 @@ groups:
2929
Identify the activity in the Cloudtrail logs. Verify if the activity is legitimate. If not, change
3030
the root user password, MFA and any access keys immediately. Contact
3131
AWS support in the case of complete lock out.
32-
logs: https://eu-west-1.console.aws.amazon.com/cloudwatch/home?region=eu-west-1#logEventViewer:group=cloudtrail-multi-region;filter=%257B%2520%2524.userIdentity.type%2520%253D%2520%2522Root%2522%2520%2526%2526%2520%2524.userIdentity.invokedBy%2520NOT%2520EXISTS%2520%2526%2526%2520%2524.eventType%2521%253D%2520%2522AwsServiceEvent%2522%2520%257D;start=PT1H
32+
logs: <https://eu-west-1.console.aws.amazon.com/cloudwatch/home?region=eu-west-1#logsV2:log-groups/log-group/cloudtrail-multi-region/log-events/$3Fstart$3D-3600000$26filterPattern$3D$257B+$2524.userIdentity.type+$253D+$2522Root$2522+$2526$2526+$2524.userIdentity.invokedBy+NOT+EXISTS+$2526$2526+$2524.eventType$2521$253D+$2522AwsServiceEvent$2522+$257D$26+$2528$2524.additionalEventData.MFAUsed$2521$3D+$2522Yes$2522$2529+$26+$2528$2524.responseElements.ConsoleLogin+$3D+$2522Success$2522$2529+$26+$2528$2524.userIdentity.type$2521$3D+$2522AssumedRole$2522$2529$257D|link>

0 commit comments

Comments
 (0)