@@ -43,7 +43,7 @@ resource "aws_cloudwatch_log_metric_filter" "unauthorized_api_calls" {
43
43
count = var. unauthorized_api_calls_enabled ? 1 : 0
44
44
45
45
name = " UnauthorizedAPICalls"
46
- pattern = " {(($.errorCode = \" *UnauthorizedOperation \" ) || ($.errorCode = \" AccessDenied* \" )) && (($.sourceIPAddress!= \" delivery.logs.amazonaws.com \" ) && ($.eventName!= \" HeadBucket \" ))} "
46
+ pattern = var . unauthorized_api_calls_pattern
47
47
log_group_name = var. cloudtrail_log_group_name
48
48
49
49
metric_transformation {
@@ -76,10 +76,7 @@ resource "aws_cloudwatch_log_metric_filter" "no_mfa_console_signin" {
76
76
count = var. no_mfa_console_signin_enabled ? 1 : 0
77
77
78
78
name = " NoMFAConsoleSignin"
79
- pattern = join (" " , [
80
- " { ($.eventName = \" ConsoleLogin\" ) && ($.additionalEventData.MFAUsed != \" Yes\" )" ,
81
- var . mfa_console_signin_allow_sso ? " && ($.userIdentity.type = \" IAMUser\" ) && ($.responseElements.ConsoleLogin = \" Success\" ) }" : " }" ,
82
- ])
79
+ pattern = var. no_mfa_console_signin_pattern
83
80
log_group_name = var. cloudtrail_log_group_name
84
81
85
82
metric_transformation {
@@ -112,7 +109,7 @@ resource "aws_cloudwatch_log_metric_filter" "root_usage" {
112
109
count = var. root_usage_enabled ? 1 : 0
113
110
114
111
name = " RootUsage"
115
- pattern = " { $.userIdentity.type = \" Root \" && $.userIdentity.invokedBy NOT EXISTS && $.eventType != \" AwsServiceEvent \" } "
112
+ pattern = var . root_usage_pattern
116
113
log_group_name = var. cloudtrail_log_group_name
117
114
118
115
metric_transformation {
@@ -145,7 +142,7 @@ resource "aws_cloudwatch_log_metric_filter" "iam_changes" {
145
142
count = var. iam_changes_enabled ? 1 : 0
146
143
147
144
name = " IAMChanges"
148
- pattern = " {($.eventName=DeleteGroupPolicy)||($.eventName=DeleteRolePolicy)||($.eventName=DeleteUserPolicy)||($.eventName=PutGroupPolicy)||($.eventName=PutRolePolicy)||($.eventName=PutUserPolicy)||($.eventName=CreatePolicy)||($.eventName=DeletePolicy)||($.eventName=CreatePolicyVersion)||($.eventName=DeletePolicyVersion)||($.eventName=AttachRolePolicy)||($.eventName=DetachRolePolicy)||($.eventName=AttachUserPolicy)||($.eventName=DetachUserPolicy)||($.eventName=AttachGroupPolicy)||($.eventName=DetachGroupPolicy)} "
145
+ pattern = var . iam_changes_pattern
149
146
log_group_name = var. cloudtrail_log_group_name
150
147
151
148
metric_transformation {
@@ -178,7 +175,7 @@ resource "aws_cloudwatch_log_metric_filter" "cloudtrail_cfg_changes" {
178
175
count = var. cloudtrail_cfg_changes_enabled ? 1 : 0
179
176
180
177
name = " CloudTrailCfgChanges"
181
- pattern = " { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } "
178
+ pattern = var . cloudtrail_cfg_changes_pattern
182
179
log_group_name = var. cloudtrail_log_group_name
183
180
184
181
metric_transformation {
@@ -211,7 +208,7 @@ resource "aws_cloudwatch_log_metric_filter" "console_signin_failures" {
211
208
count = var. console_signin_failures_enabled ? 1 : 0
212
209
213
210
name = " ConsoleSigninFailures"
214
- pattern = " { ($.eventName = ConsoleLogin) && ($.errorMessage = \" Failed authentication \" ) } "
211
+ pattern = var . console_signin_failures_pattern
215
212
log_group_name = var. cloudtrail_log_group_name
216
213
217
214
metric_transformation {
@@ -244,7 +241,7 @@ resource "aws_cloudwatch_log_metric_filter" "disable_or_delete_cmk" {
244
241
count = var. disable_or_delete_cmk_enabled ? 1 : 0
245
242
246
243
name = " DisableOrDeleteCMK"
247
- pattern = " { ($.eventSource = kms.amazonaws.com) && (($.eventName = DisableKey) || ($.eventName = ScheduleKeyDeletion)) } "
244
+ pattern = var . disable_or_delete_cmk_pattern
248
245
log_group_name = var. cloudtrail_log_group_name
249
246
250
247
metric_transformation {
@@ -277,7 +274,7 @@ resource "aws_cloudwatch_log_metric_filter" "s3_bucket_policy_changes" {
277
274
count = var. s3_bucket_policy_changes_enabled ? 1 : 0
278
275
279
276
name = " S3BucketPolicyChanges"
280
- pattern = " { ($.eventSource = s3.amazonaws.com) && (($.eventName = PutBucketAcl) || ($.eventName = PutBucketPolicy) || ($.eventName = PutBucketCors) || ($.eventName = PutBucketLifecycle) || ($.eventName = PutBucketReplication) || ($.eventName = DeleteBucketPolicy) || ($.eventName = DeleteBucketCors) || ($.eventName = DeleteBucketLifecycle) || ($.eventName = DeleteBucketReplication)) } "
277
+ pattern = var . s3_bucket_policy_changes_pattern
281
278
log_group_name = var. cloudtrail_log_group_name
282
279
283
280
metric_transformation {
@@ -310,7 +307,7 @@ resource "aws_cloudwatch_log_metric_filter" "aws_config_changes" {
310
307
count = var. aws_config_changes_enabled ? 1 : 0
311
308
312
309
name = " AWSConfigChanges"
313
- pattern = " { ($.eventSource = config.amazonaws.com) && (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } "
310
+ pattern = var . aws_config_changes_pattern
314
311
log_group_name = var. cloudtrail_log_group_name
315
312
316
313
metric_transformation {
@@ -343,7 +340,7 @@ resource "aws_cloudwatch_log_metric_filter" "security_group_changes" {
343
340
count = var. security_group_changes_enabled ? 1 : 0
344
341
345
342
name = " SecurityGroupChanges"
346
- pattern = " { ($.eventName = AuthorizeSecurityGroupIngress) || ($.eventName = AuthorizeSecurityGroupEgress) || ($.eventName = RevokeSecurityGroupIngress) || ($.eventName = RevokeSecurityGroupEgress) || ($.eventName = CreateSecurityGroup) || ($.eventName = DeleteSecurityGroup)} "
343
+ pattern = var . security_group_changes_pattern
347
344
log_group_name = var. cloudtrail_log_group_name
348
345
349
346
metric_transformation {
@@ -376,7 +373,7 @@ resource "aws_cloudwatch_log_metric_filter" "nacl_changes" {
376
373
count = var. nacl_changes_enabled ? 1 : 0
377
374
378
375
name = " NACLChanges"
379
- pattern = " { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } "
376
+ pattern = var . nacl_changes_pattern
380
377
log_group_name = var. cloudtrail_log_group_name
381
378
382
379
metric_transformation {
@@ -409,7 +406,7 @@ resource "aws_cloudwatch_log_metric_filter" "network_gw_changes" {
409
406
count = var. network_gw_changes_enabled ? 1 : 0
410
407
411
408
name = " NetworkGWChanges"
412
- pattern = " { ($.eventName = CreateCustomerGateway) || ($.eventName = DeleteCustomerGateway) || ($.eventName = AttachInternetGateway) || ($.eventName = CreateInternetGateway) || ($.eventName = DeleteInternetGateway) || ($.eventName = DetachInternetGateway) } "
409
+ pattern = var . network_gw_changes_pattern
413
410
log_group_name = var. cloudtrail_log_group_name
414
411
415
412
metric_transformation {
@@ -442,7 +439,7 @@ resource "aws_cloudwatch_log_metric_filter" "route_table_changes" {
442
439
count = var. route_table_changes_enabled ? 1 : 0
443
440
444
441
name = " RouteTableChanges"
445
- pattern = " { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } "
442
+ pattern = var . route_table_changes_pattern
446
443
log_group_name = var. cloudtrail_log_group_name
447
444
448
445
metric_transformation {
@@ -475,7 +472,7 @@ resource "aws_cloudwatch_log_metric_filter" "vpc_changes" {
475
472
count = var. vpc_changes_enabled ? 1 : 0
476
473
477
474
name = " VPCChanges"
478
- pattern = " { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } "
475
+ pattern = var . vpc_changes_pattern
479
476
log_group_name = var. cloudtrail_log_group_name
480
477
481
478
metric_transformation {
@@ -508,7 +505,7 @@ resource "aws_cloudwatch_log_metric_filter" "organizations_changes" {
508
505
count = var. organizations_changes_enabled ? 1 : 0
509
506
510
507
name = " OrganizationsChanges"
511
- pattern = " { ($.eventSource = organizations.amazonaws.com) && (($.eventName = \" AcceptHandshake \" ) || ($.eventName = \" AttachPolicy \" ) || ($.eventName = \" CreateAccount \" ) || ($.eventName = \" CreateOrganizationalUnit \" ) || ($.eventName= \" CreatePolicy \" ) || ($.eventName = \" DeclineHandshake \" ) || ($.eventName = \" DeleteOrganization \" ) || ($.eventName = \" DeleteOrganizationalUnit \" ) || ($.eventName = \" DeletePolicy \" ) || ($.eventName = \" DetachPolicy \" ) || ($.eventName = \" DisablePolicyType \" ) || ($.eventName = \" EnablePolicyType \" ) || ($.eventName = \" InviteAccountToOrganization \" ) || ($.eventName = \" LeaveOrganization \" ) || ($.eventName = \" MoveAccount \" ) || ($.eventName = \" RemoveAccountFromOrganization \" ) || ($.eventName = \" UpdatePolicy \" ) || ($.eventName = \" UpdateOrganizationalUnit \" )) } "
508
+ pattern = var . organizations_changes_pattern
512
509
log_group_name = var. cloudtrail_log_group_name
513
510
514
511
metric_transformation {
0 commit comments