Afanasiev Dmytro
Afanasiev Dmytro
@kapilt, hello, could you please tell whether the policy in example would work as the name suggests? Because i'm not sure whether the `count` is applied after performing all filtering...
> It feels like the fix is two fold, handle better on not getting tags, but also default to listing active/pending environments. Rewrote to return just empty tags
#### The bug is much deeper than it seemed It doesn't occur steadily but, supposedly, when you assemble multiple bundles with some similar dependencies in python lambdas one by one....
https://github.com/epam/aws-syndicate/pull/183
Also, some note in favor of this one: I'd like to filter `aws.workspaces` items based on their related security groups' inbounds. But that would require making a chain of fetches:...
Hello!, I added an implementation for generic `policy` filter. Example usage: ```yaml policies: - name: cloudtrail-s3 resource: aws.cloudtrail description: "Finds all the CloudTrail logs where s3 access logging is enabled...
> Thanks again @dmytro-afanasiev for putting this together. I've got a couple questions about how it'll shake out but for the most part good to roll with this and iterate...
> this feels like it should actually fetch the signing config versus just the arn so assertions can be made on the configuration. also should dial on workers, and only...
> looks like this will need some other changes re azure api incompatibilities. Fixed https://learn.microsoft.com/en-us/rest/api/redis/redis/list-by-subscription?view=rest-redis-2024-11-01&tabs=HTTP
> this should definitely be a separate filter, we're trying to slim augment table not add to it for s3, re not forcing api calls when they aren't explicitly needed...