You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-09-19T13:29:12Z INFO [db] Need to update DB
2024-09-19T13:29:12Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-09-19T13:29:14Z INFO [vuln] Vulnerability scanning is enabled
2024-09-19T13:29:14Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-19T13:29:14Z INFO Need to update the built-in policies
2024-09-19T13:29:14Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-09-19T13:29:14Z INFO [secret] Secret scanning is enabled
2024-09-19T13:29:14Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-19T13:29:14Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection
2024-09-19T13:29:14Z INFO [terraform scanner] Scanning root module file_path="."
2024-09-19T13:29:14Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="pagerduty_token, pagerduty_user_token"
2024-09-19T13:29:14Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="pagerduty_team_membership.modernisation_platform_membership" value="cty.NilVal"
2024-09-19T13:29:14Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:5-16"
2024-09-19T13:29:14Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:102-111"
2024-09-19T13:29:14Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:116-125"
2024-09-19T13:29:14Z INFO Number of language-specific files num=0
2024-09-19T13:29:14Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-09-19T13:29:12Z INFO [db] Need to update DB
2024-09-19T13:29:12Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-09-19T13:29:14Z INFO [vuln] Vulnerability scanning is enabled
2024-09-19T13:29:14Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-19T13:29:14Z INFO Need to update the built-in policies
2024-09-19T13:29:14Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-09-19T13:29:14Z INFO [secret] Secret scanning is enabled
2024-09-19T13:29:14Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-19T13:29:14Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-09-19T13:29:14Z INFO [terraformscanner] Scanning root module file_path="."2024-09-19T13:29:14Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="pagerduty_token, pagerduty_user_token"2024-09-19T13:29:14Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="pagerduty_team_membership.modernisation_platform_membership"value="cty.NilVal"2024-09-19T13:29:14Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:5-16"2024-09-19T13:29:14Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:102-111"2024-09-19T13:29:14Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:116-125"2024-09-19T13:29:14Z INFO Number of language-specific files num=02024-09-19T13:29:14Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-09-19T13:47:33Z INFO [db] Need to update DB
2024-09-19T13:47:33Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-09-19T13:47:36Z INFO [vuln] Vulnerability scanning is enabled
2024-09-19T13:47:36Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-19T13:47:36Z INFO Need to update the built-in policies
2024-09-19T13:47:36Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-09-19T13:47:36Z INFO [secret] Secret scanning is enabled
2024-09-19T13:47:36Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-19T13:47:36Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection
2024-09-19T13:47:37Z INFO [terraform scanner] Scanning root module file_path="."
2024-09-19T13:47:37Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="pagerduty_token, pagerduty_user_token"
2024-09-19T13:47:37Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="pagerduty_team_membership.modernisation_platform_membership" value="cty.NilVal"
2024-09-19T13:47:37Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:5-16"
2024-09-19T13:47:37Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:102-111"
2024-09-19T13:47:37Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:116-125"
2024-09-19T13:47:37Z INFO Number of language-specific files num=0
2024-09-19T13:47:37Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-09-19T13:47:33Z INFO [db] Need to update DB
2024-09-19T13:47:33Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-09-19T13:47:36Z INFO [vuln] Vulnerability scanning is enabled
2024-09-19T13:47:36Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-19T13:47:36Z INFO Need to update the built-in policies
2024-09-19T13:47:36Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-09-19T13:47:36Z INFO [secret] Secret scanning is enabled
2024-09-19T13:47:36Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-19T13:47:36Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-09-19T13:47:37Z INFO [terraformscanner] Scanning root module file_path="."2024-09-19T13:47:37Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="pagerduty_token, pagerduty_user_token"2024-09-19T13:47:37Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="pagerduty_team_membership.modernisation_platform_membership"value="cty.NilVal"2024-09-19T13:47:37Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:5-16"2024-09-19T13:47:37Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:102-111"2024-09-19T13:47:37Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:116-125"2024-09-19T13:47:37Z INFO Number of language-specific files num=02024-09-19T13:47:37Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-09-19T13:59:18Z INFO [db] Need to update DB
2024-09-19T13:59:18Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-09-19T13:59:21Z INFO [vuln] Vulnerability scanning is enabled
2024-09-19T13:59:21Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-19T13:59:21Z INFO Need to update the built-in policies
2024-09-19T13:59:21Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-09-19T13:59:21Z INFO [secret] Secret scanning is enabled
2024-09-19T13:59:21Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-19T13:59:21Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection
2024-09-19T13:59:21Z INFO [terraform scanner] Scanning root module file_path="."
2024-09-19T13:59:21Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="pagerduty_token, pagerduty_user_token"
2024-09-19T13:59:21Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="pagerduty_team_membership.modernisation_platform_membership" value="cty.NilVal"
2024-09-19T13:59:21Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:5-16"
2024-09-19T13:59:21Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:102-111"
2024-09-19T13:59:21Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:116-125"
2024-09-19T13:59:21Z INFO Number of language-specific files num=0
2024-09-19T13:59:21Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-09-19T13:59:18Z INFO [db] Need to update DB
2024-09-19T13:59:18Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-09-19T13:59:21Z INFO [vuln] Vulnerability scanning is enabled
2024-09-19T13:59:21Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-19T13:59:21Z INFO Need to update the built-in policies
2024-09-19T13:59:21Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-09-19T13:59:21Z INFO [secret] Secret scanning is enabled
2024-09-19T13:59:21Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-19T13:59:21Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-09-19T13:59:21Z INFO [terraformscanner] Scanning root module file_path="."2024-09-19T13:59:21Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="pagerduty_token, pagerduty_user_token"2024-09-19T13:59:21Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="pagerduty_team_membership.modernisation_platform_membership"value="cty.NilVal"2024-09-19T13:59:21Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:5-16"2024-09-19T13:59:21Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:102-111"2024-09-19T13:59:21Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:116-125"2024-09-19T13:59:21Z INFO Number of language-specific files num=02024-09-19T13:59:21Z INFO Detected config files num=3trivy_exitcode=0
Trivy will check the following folders:
terraform/pagerduty
Running Trivy in terraform/pagerduty
2024-09-19T14:08:04Z INFO [db] Need to update DB
2024-09-19T14:08:04Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-09-19T14:08:06Z INFO [vuln] Vulnerability scanning is enabled
2024-09-19T14:08:06Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-19T14:08:06Z INFO Need to update the built-in policies
2024-09-19T14:08:06Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-09-19T14:08:06Z INFO [secret] Secret scanning is enabled
2024-09-19T14:08:06Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-19T14:08:06Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection
2024-09-19T14:08:06Z INFO [terraform scanner] Scanning root module file_path="."
2024-09-19T14:08:06Z WARN [terraform parser] Variable values was not found in the environment or variable files. Evaluating may not work correctly. module="root" variables="pagerduty_token, pagerduty_user_token"
2024-09-19T14:08:06Z ERROR [terraform evaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable. block="pagerduty_team_membership.modernisation_platform_membership" value="cty.NilVal"
2024-09-19T14:08:06Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:5-16"
2024-09-19T14:08:06Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:102-111"
2024-09-19T14:08:06Z INFO [terraform executor] Ignore finding rule="aws-ssm-secret-use-customer-key" range="aws.tf:116-125"
2024-09-19T14:08:06Z INFO Number of language-specific files num=0
2024-09-19T14:08:06Z INFO Detected config files num=3
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
terraform/pagerduty
*****************************
Running Checkov in terraform/pagerduty
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 28, Failed checks: 0, Skipped checks: 10
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.9.1)
tflint will check the following folders:
terraform/pagerduty
*****************************
Running tflint in terraform/pagerduty
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
terraform/pagerduty
*****************************
Running Trivy in terraform/pagerduty
2024-09-19T14:08:04Z INFO [db] Need to update DB
2024-09-19T14:08:04Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-09-19T14:08:06Z INFO [vuln] Vulnerability scanning is enabled
2024-09-19T14:08:06Z INFO [misconfig] Misconfiguration scanning is enabled
2024-09-19T14:08:06Z INFO Need to update the built-in policies
2024-09-19T14:08:06Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-09-19T14:08:06Z INFO [secret] Secret scanning is enabled
2024-09-19T14:08:06Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-09-19T14:08:06Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.55/docs/scanner/secret#recommendation for faster secret detection2024-09-19T14:08:06Z INFO [terraformscanner] Scanning root module file_path="."2024-09-19T14:08:06Z WARN [terraformparser] Variable values was not found in the environment or variable files. Evaluating may not work correctly.module="root"variables="pagerduty_token, pagerduty_user_token"2024-09-19T14:08:06Z ERROR [terraformevaluator] Failed to expand block. Invalid "for-each" argument. Must be known and iterable.block="pagerduty_team_membership.modernisation_platform_membership"value="cty.NilVal"2024-09-19T14:08:06Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:5-16"2024-09-19T14:08:06Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:102-111"2024-09-19T14:08:06Z INFO [terraformexecutor] Ignore finding rule="aws-ssm-secret-use-customer-key"range="aws.tf:116-125"2024-09-19T14:08:06Z INFO Number of language-specific files num=02024-09-19T14:08:06Z INFO Detected config files num=3trivy_exitcode=0
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
A reference to the issue / Description of it
DBAs need to receive Slack Alerts for Cloudwatch Alarms
How does this PR fix the problem?
Integration added for PagerDuty
How has this been tested?
Please describe the tests that you ran and provide instructions to reproduce.
Cannot test yet as not installed
Deployment Plan / Instructions
Will this deployment impact the platform and / or services on it?
{Please write here}
Checklist (check
x
in[ ]
of list items)Additional comments (if any)