All Projects → Snapchat → aws-support-tickets-aggregator

Snapchat / aws-support-tickets-aggregator

Licence: MIT license
AWS support tickets aggregation service

Programming Languages

python
139335 projects - #7 most used programming language
shell
77523 projects

Projects that are alternatives of or similar to aws-support-tickets-aggregator

graylog-plugin-aws
Several bundled Graylog plugins to integrate with different AWS services like CloudTrail and FlowLogs.
Stars: ✭ 88 (+137.84%)
Mutual labels:  cloudtrail
terraform-aws-cloudtrail
Terraform module to provision an AWS CloudTrail and an encrypted S3 bucket with versioning to store CloudTrail logs
Stars: ✭ 78 (+110.81%)
Mutual labels:  cloudtrail
terraform-aws-cloudtrail-s3-bucket
S3 bucket with built in IAM policy to allow CloudTrail logs
Stars: ✭ 38 (+2.7%)
Mutual labels:  cloudtrail
My Arsenal Of Aws Security Tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
Stars: ✭ 6,464 (+17370.27%)
Mutual labels:  cloudtrail
Prowler
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+12227.03%)
Mutual labels:  cloudtrail
cloudtrailbeat
Easily export AWS CloudTrail events to ElasticSearch
Stars: ✭ 31 (-16.22%)
Mutual labels:  cloudtrail

AWS Support Cases Aggregator

AWS Support Cases aggregation for a multi-account organization

ci

This is a simple CloudFormation-based serverless pipeline for collecting support case information from all users across an AWS Organization into a single database.

This allows users to easily discover and monitor all Support Cases within an organization. See our AWS Blog Post for details.

AWS Support Cases Aggregator Architecture

aws-support-cases-aggregator-pipeline-diagram

Topology - Hub and Spoke

This service uses a Hub (central aggregator account) and Spoke (member accounts) model. The aggregator can be configured in two ways:

  1. Aggregator account is AWS Organizations master account

  2. Aggregator account is NOT AWS Organizations master account

Setup

Central Aggregator Account (Hub)

Ensure you have permissions for creating requisite AWS resources including IAM roles and policies.

Prerequisite Steps
  1. Create a S3 bucket in your central aggregator account to hold the CloudFormation stack template. Pass the bucket name to the --cf_s3_bucket parameter of the run_cloudformation.sh script.

    The CloudFormation stack must be created in the same region as the aforementioned S3 bucket.

  2. Choose a free name for your CloudTrail S3 bucket. Pass it to the --ct_s3_bucket parameter of the run_cloudformation.sh script.

    Ensure a bucket with the same name does not already exist, or the CloudFormation stack will fail to create.

    The CloudFormation stack will handle bucket creation.

  3. (Optional) If your aggregator account will not be your AWS Organizations master account:

    • Pass the role arn arn:aws:iam::<ORG MASTER ACCOUNT ID>:role/OrgListAccountsViewer to the --org_role parameter of the run_cloudformation.sh script.

    Note this role can be created in section AWS Organizations Master Account #2

Creating the CloudFormation Stack

Run the shell script:

./run_cloudformation.sh --profile=<profile_name> --stack_name=<stack name> --cf_region=<cloudformation region> --cf_s3_bucket=<cloudformation s3 bucket> --ct_s3_bucket=<cloudtrail S3 bucket> [--template_file=<template file> --org_role=<org master role>]

For instructions on how to set up an AWS command line profile, see the AWS documentation.

You may use any name in the <stack name> parameter (e.g. central-support).

Setting the CloudTrail S3 Bucket

CloudTrail trails from every account you wish to monitor must be deposit their events into the newly created CloudTrail S3 bucket specified in the --ct_s3_bucket parameter above.

If you are using an organization CloudTrail trail, you only need to modify that organization trail S3 bucket location. If not, you must set a CloudTrail trail in every member account you wish to monitor to use the newly created S3 bucket.

Member Account (Spoke)

Create an IAM role called GetSupportInfoRole in every member account with support: and support:Describe* permissions that trusts the SupportAggregator role in the central aggregator account.

For specific details, follow instructions here.

AWS Organizations Master Account

  1. Create an organization trail in your AWS organizations master account and configure the CloudTrail service to send events to your CloudTrail bucket.

    For details on organization trails, see the AWS docs on Creating a Trail for an Organization.

    Deposit CloudTrail events into the CloudTrail S3 bucket specified in central aggregator prerequisites #2.

    You may also configure individual member accounts with CloudTrail trails that send events to the CloudTrail S3 bucket.

  2. (Optional) If your aggregator account will not be your AWS Organizations master account:

    • Create an IAM Role OrgListAccountsViewer in the AWS Organizations master account that trusts central aggregator account and has role policy with organizations:ListAccounts actions. For specific details, follow instructions here.

Periodic Scanning

This pipeline scans case data from the past 60 days every 3 days. You can configure the scan to get all historical case data by setting get_all_existing_cases(recent_cases_only=False) in support_cases_aggregator.py.

If you do not use AWS Organizations, modify list_account_ids() in support_cases_aggregator.py to return a list of strings of the account ids you want to monitor support cases for.

Project Resources

Development Guide

Contributing Guide

License

The MIT License

Copyright (c) 2020 Snap Inc.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].