-
**Describe the bug**
Observing sporadic fixed 404 errors on an EKS cluster hosting multiple container services. The services are fronted by a single ALB using host based routing. All services have a …
-
### Describe the bug
After upgrade from Cloud Custodian v0.9.5.0 to 0.9.13.0 we are getting errors on auto-tag-user.
After investigation it is found to be an error with autotag.py after a recent u…
-
### Description
**Observed Behavior**:
Karpenter deleting nodes with reason securityGroupDrift even though there is no change In the security group.
Karpenter Logs:
```
{"level":"DEBUG","time":…
-
Looking at the root-user-login-detected example here:
http://www.capitalone.io/docs/usecases/accountrootlogin.html
It wouldn't take much to turn it into a console login detector - by looking for…
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Current Behavior
On a global aurora db set up with a primary cluster and a secondary cluster, running
…
-
|Wazuh 4.5.2 | AMI AWS | All-in-one | Linux |
I integrated Wazuh with Amazon Security Lake.
Analyzing the logs being received, I see all services being delivered: CloudTrail, Amazon VPC, Route 53.…
-
### Describe the bug
Hi Cloud Custodian Team
We are using the tool to create cloud trail detective measures for MWAA. We have the following rule implemented:
```
policies:
- actions:
…
-
AWS provides the ability to send a request, such as deleting as resource, then wait and block until that request has been finished. AWS calls these 'waiters'. I'm sure Azure and GCP have similar funct…
-
I have tried running through the whole flow multiple times on mac1.metal, then I have switched to mac2.metal and the instance does not get any profiles at all. try rebooting as well does not seem to h…
-
I'm still in the process of testing out what exactly the issue might be but I have a good hunch that the service does not know how to deal with edge function logs.
Likely this is because they're l…