Skip to content

Set CA cert authority value for aurora cluster #34

Set CA cert authority value for aurora cluster

Set CA cert authority value for aurora cluster #34

Triggered via pull request August 14, 2024 16:07
Status Failure
Total duration 1m 5s
Artifacts

pr.yml

on: pull_request
terraform-format-test  /  Terraform Format Check
9s
terraform-format-test / Terraform Format Check
terraform-docs  /  docs
5s
terraform-docs / docs
tfscan  /  checkov-action
19s
tfscan / checkov-action
Fit to window
Zoom out
Zoom in

Annotations

10 errors
tfscan / checkov-action: ecs_task_definitions.tf#L24
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
tfscan / checkov-action: ecs_task_definitions.tf#L20
CKV_AWS_66: "Ensure that CloudWatch Log Group specifies retention days"
tfscan / checkov-action: ecs_task_definitions.tf#L20
CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
tfscan / checkov-action: ecs_task_definitions.tf#L20
CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
tfscan / checkov-action: rds_cluster/main.tf#L6
CKV_AWS_313: "Ensure RDS cluster configured to copy tags to snapshots"
tfscan / checkov-action: rds_cluster/main.tf#L6
CKV_AWS_327: "Ensure RDS Clusters are encrypted using KMS CMKs"
tfscan / checkov-action: rds_cluster/main.tf#L6
CKV_AWS_162: "Ensure RDS cluster has IAM authentication enabled"
tfscan / checkov-action: rds_cluster/main.tf#L6
CKV_AWS_324: "Ensure that RDS Cluster log capture is enabled"
tfscan / checkov-action: rds_cluster/main.tf#L35
CKV_AWS_149: "Ensure that Secrets Manager secret is encrypted using KMS CMK"
tfscan / checkov-action: rds_cluster/main.tf#L47
CKV_AWS_149: "Ensure that Secrets Manager secret is encrypted using KMS CMK"