{
"test_connectivity": "True",
"test_config": 0,
"test_read_issues": 0,
"test_splunk_search": 0,
"test_vault_read": 0
}
read moose port 8089 send to portal port 443 HTTPS
need execution role (IAM role needs perms to upload logs to ) policy policy_portal_data_sync_lambda description IAM policy for portal_data_sync_lambda
role portal-data-sync-lambda-role description Allows Lambda functions to call AWS services on your behalf.
create new lambda test_portal_data_sync
VPC Moose
vpc-0b455a7f22
subnet-0b1e9d82bc
subnet-0d65c22aa4
sg-03b225559f
CREATE new SG that can only access
Access to Moose + portal 8089 -> 10.96.101.59 443 -> ANY
portal-data-sync-lambda-sg allow lambda access to Moose
sg-0a0974a250
vpc -same as portal (test)
vpc-075e58bd76
subnet
subnet-02575f16e2
subnet-0662ad00a4
Create test for lambda function { "test_read_issues": "True", "test_splunk_search": "True", "test_token": "redacted" }
I think the token is for portal?
Splunk username & password will be needed to access SH on port 8089 See vault for creds test api-portal-data-sync-lambda M7P6U9!0uHL3s1blTW
increase timeout to 20 seconds figure out sg for access proxy
Terraform terraform apply -target=aws_lambda_function.portal_data_sync -target=aws_iam_policy.policy_portal_data_sync_lambda -target=aws_iam_role_policy_attachment.lambda-role -target=aws_iam_role_policy_attachment.lambda-role -target=aws_cloudwatch_log_group.function -target=aws_security_group.portal_lambda_sg -target=aws_security_group.portal_lambda_splunk_sg -target=aws_security_group_rule.portal_lambda_https -target=aws_security_group_rule.portal_lambda_splunk_in -target=aws_security_group_rule.portal_lambda_splunk_out -target=aws_cloudwatch_event_rule.portal_event_rule -target=aws_cloudwatch_event_target.portal_lambda_cloudwatch_target -target=aws_lambda_permission.allow_cloudwatch_to_call_portal_lambda
Vault auth vault write auth/aws/role/portal auth_type=iam bound_iam_principal_arn=arn:aws:iam::527700175026:role/portal-data-sync-lambda-role policies=portal max_ttl=24h vault write auth/aws/role/portal-data-sync-lambda-role auth_type=iam bound_iam_principal_arn=arn:aws:iam::527700175026:role/portal-data-sync-lambda-role policies=portal max_ttl=24h
vault write auth/aws/role/portal-data-sync-lambda-role auth_type=iam bound_iam_principal_arn=arn:aws:iam::527700175026:role/portal-data-sync-lambda-role policies=portal max_ttl=24h
vault write auth/aws/role/portal-data-sync-lambda-role auth_type=iam bound_iam_principal_arn=arn:aws:iam::477548533976:role/portal-data-sync-lambda-role policies=portal max_ttl=24h