AWS Config Compliance information in Dashoard using AWS Elastic Search and Kibana (Work in progress)
Visualize AWS Config Compliance information in Dashoard using AWS Elastic Search and Kibana.
- VPC
- Internet Gateway (IGW)
- Public and Private Subnets
- Security Groups, Route Tables and Route Table Associations
- IAM roles, instance profiles and policies
- An Elastic Search Service Cluster
- lambda funtion for wiring Kibana and Cognito, for transfer AWS Config Snapshot to Elastic Search
- Cognito User pool, Identity Pool (Optional)
- S3 Event (Work in progess)
- Lambda Layer (Compatible for Python 3.7)
- Python v3.7
- Terraform v0.11.14
- AWS Account (With Admin Access)
git clone [email protected]:nitinda/terraform_aws_config_on_elk.git
cd terraform_aws_config_on_elk/layer
terraform init
terraform plan
terrafomr apply --auto-approve
- Deployed Lambda function (i.e. terraform-demo-lambda-wiringfunction) needs to be executed before accessing the kibana
- Create test evnet, this function will create Cognito user (i.e. - kibana default password : Abcd1234!)
You can destroy this cluster entirely by running:
terraform plan -destroy
terraform destroy --force --auto-approve